Earticle

현재 위치 Home

International Journal of Advanced Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJAST) [Science & Engineering Research Support Center, Republic of Korea(IJAST)]
  • pISSN
    2005-4238
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
vol.28 (7건)
No
1

A Multi Objective Approach to solve Capacitated Vehicle Routing Problems with Time Windows Using Mixed Integer Linear Programming

Jose Carlos Sousa, Haider Ali Biswas, Rui Brito, Alexandre Silveira

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.1-8

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a multi objective approach to solve a Capacitated Vehicle Routing Problem ith Time Windows (CVRPTW). The proposed model was implemented and tested in a real life roblem of a distribution company “Just in Time Delivery S.A” in Portugal. In this paper we ave considered an objective function with two main goals: the first is to minimize the total number f vehicles used in the distribution of the commodities to the several clients and the second is to inimize the travelling time of the used vehicles. The proposed model has been solved numerically sing the GLPK software and the optimal solution is presented.

2

A New approach to Requirements Elicitation Using Paper Prototype

Jaya Vijayan, G.Raju

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.9-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Requirement elicitation is a critical activity in the requirement development process and it xplores the requirements of stakeholders. The common challenges that analysts face during licitation process are to ensure effective communication between analyst and the users. Mostly rrors in the systems are due to poor communication between user and analyst. This paper roposes an improved approach for requirements elicitation using paper prototype. The paper rogresses through an assessment of the new approach using student projects developed for arious organizations. A case study project is explained in the paper.

3

Detection of Epilepsy Disorder Using Discrete Wavelet Transforms Using MATLABs

Laxman Tawade, Hemant Warpe

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.17-24

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

EEG (Electroencephalograph) is a technique for identifying neurological disorders. There are arious neurological disorders like Epilepsy, brain cancer, etc. Epilepsy is one of the common eurological disorders. In this paper we propose a technique of detecting epilepsy disorder using iscrete wavelet transform using MATLAB. The back propagation algorithm is also used in the lassification network. This paper also provides a technique of detecting epilepsy disorder with reat accuracy.

4

Morphological Pattern Based Approach for Retrieval of Similar Trademarks

Ranjeet Kumar, R.C.Tripathi, M.D.Tiwari

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.25-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the current scenario of the economic developments in to capture the world market growing ole of Trademarks is to attract customers and beat over the imitated/fake products and services. rademark registration is becoming a critical issue. New trademarks need to be distinct from existing millions of trademarks. This demand searching their similarity out of all trademarks is a typical combination of characters, graphics, images, colors and texture. The number of company and brand is increasing day by day and they all demand a trademark registration for trade practices. In this paper we propose a novel approach to obtain noise free trademark, break it into the character/texture and shape of the trademark logo or design and their relation attributes to build an efficient trademark retrieval tool. We create the input image in a negative image format for ignoring the background and objects reverse intensities values. The paper illustrates the use of morphological opening approach for removing the very small objects which can act as a noise. The work is also implemented to extract the image from the trademark database will be matched further for similar input trademarks on the basis of trademark retrieval process in the database.

5

Bias Current Optimization Studies on Avalanche Transit Time Diode Based on Wurtzite and Zinc-Blende Phase of GaN at Terahertz Frequency

Soumen Banerjee, Priya Chakrabarti, Riya Baidya

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.35-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The Terahertz performances of Wurtzite (α-phase) and Zinc-Blende (β-phase) of GaN based p+pnn+ DDR IMPATTs has been investigated at optimum bias current density. The modeling and simulation based on drift diffusion model has been carried out to study the DC and small signal properties of the device. The bias current optimization is based on maximum conversion efficiency and device negative resistance at 0.3 THz. The simulation results obtained reveals the strong potentiality of DDR IMPATTs based on α- and β-GaN as a powerful solid state source for generating high power in Terahertz domain. The conversion efficiency of the device is found to be 12.3% at an optimum bias current density of 0.2×108 A/m2 for α-GaN IMPATTs while the same result for β-GaN IMPATTs is 11.5% at 3.1×109 A/m2. The design results presented in the paper are very promising and immensely useful to realize experimentally α- and β-GaN IMPATTs at THz frequency.

6

Design Patterns Consideration in Class Interactions Prediction Development

Nazri Kama, Tim French, Mark Reynolds

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.45-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Customer changing their needs is a typical phenomenon in the software development phase. Predicting impact of a change is needed prior to actual change implementation so that an effective planning can be made. Several high level artifact analysis approaches have been developed including performing the prediction using class interactions. Since design patterns are one of the elements that affect the structure of actual class interactions, this paper proposes a new class interactions prediction approach that considers a design pattern analysis in its process. To demonstrate the design pattern analysis implementation, this paper selects the Boundary-Controller-Entity (BCE) pattern as an instance. A comparison between the new approach (with design pattern analysis) and two selected current approaches (without design pattern analysis) were conducted. The contributions of the paper are: (1) a new class interactions prediction approach; and (2) an evaluation that shows the new approach gives more accurate class interactions prediction than the selected current approaches.

7

Confidentiality and Privacy for Videos Storage and Transmission

Shaimaa A. El-said, Khalid F. A. Hussein, Mohamed M. Fouad

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.28 2011.03 pp.65-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Security and privacy issues of the transmitted data have become an important concern in multimedia technology. In this paper, we propose a computationally efficient and secure video encryption algorithm. This makes secure video encryption feasible for real-time applications without any extra dedicated hardware. We achieve computational efficiency by exploiting the frequently occurring patterns in the DCT coefficients of the video data. Computational complexity of the encryption is made proportional to the influence of the DCT coefficients on the visual content. On an average, our algorithm takes only 2 ms of encryption time per frame. This paper deals with the issues of color videos in-compression encryption, this done by using the optimized multiple Huffman table (OMHT) technique, will be elucidated upon in order to compress and encrypt both color images and videos. Only visual processing will be discussed (no audio processing). OMHT produces an encrypted coded sequence with an improved quality for the high compression ratios when compared to the existing standards in addition to the ability of encryption. The performance of the proposed technique is compared with that of the standard encryptions and it gives a very good perceptual quality especially at lower bit rates. We present experimental results which show that OMHT outperforms many traditional and selective techniques for video over wireless applications.

 
페이지 저장