2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
A Comprehensive Study on Fast image Deblurring Techniques
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Image deblurring refers to procedures that attempt to reduce the blur amount in a blurry image and grant the degraded image an overall sharpened appearance to obtain a clearer image. The point spread function (PSF) is one of the essential factors that needed to be calculated, since it will be employed with different types of deblurring algorithms. In this paper, the authors studied various fast deblurring techniques like Richardson – Lucy and its optimized version, Van Cittert and its enhanced version, Landweber, Poisson Map, and Laplacian sharpening filters. Furthermore, altered optimized versions of Landweber and Poisson Map algorithms have been presented. The usage of the PSF in the deblurring algorithm is explained and a comparison between the optimized, the enhanced algorithms and Laplacian sharpening filters in terms of the number of mathematical operations, number of iterations employed, computation time, deblurring in case of noise existence, and the accuracy measurement using peak signal to noise ratio (PSNR) for each technique is conducted.
A Method for Improving Data Delivery Efficiency in Vehicular Adhoc Networks
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.11-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As vehicular networks become popular and many vehicles want to access data through a roadside unit. In this paper, there was a vehicle to roadside communication and we propose scheduling schemes for efficient delivery of data packets in vehicular adhoc network. On the basis of priority scheduling algorithm vehicles can download/upload the data from RSU. In this paper we can control the congestion and delay of data by assigning the priorities to the message. The process with highest priority is executed first and highest priority is assign to those processes which have the smallest data size and this scheme is the smallest data size first scheduling(SDF) . If the two processes having the same data size then we can assign the priority on the basis of first come first serve scheduling (FCFS). We can combine these two algorithms and the new algorithm D*A. is introduced. This algorithm is responsible for only sending the commercial messages and the safety messages will be send on the different channel. The emergency messages will be sending through control channel with help of EDF scheduling. This paper increases the efficiency and throughput of the process and decreases the turnaround time for the process.
Simulation and Optimization of Services at Port in Indonesia
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.25-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Port of Merak and port of Bakauheni is the biggest ferry port in Indonesia, which linking two main islands; Java and Sumatra. The growing population of both islands have effected to the increasing of economic level and mobilities. The existing of port users have to be accompanied by the reduction of time services which caused reduction of waiting time and vehicles queuing. This study uses simulation methods to obtain a description of conditions of port of Merak and port of Bakauheni at various scenarios which are number of ships, number of docks, passenger arrival rate, sea wave, and intervals of ship arrivals.The results showed,on weekdays and weekend, vehicle waiting time was about 10-30 minutes. On national holidays the waiting time increased to more than 10 hours. The recommendation to data analysis; the port should operates 5 docks and 3 additional ships at long holiday to solve vehicle queues, which can reduce to 1-3 hours.
Hybrid Approach for Radio Network Selection in Heterogeneous Wireless Networks
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.33-48
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Next generation wireless network (NGWN) will be composed of multiple radio access technologies (RATs) and domains. Radio network selection (RNS) is the mechanism which decides how to select the most suitable RAT based on the discovered accesses, QoS constraints, operator policies, user preferences and available system capacity and utilization. Optimizing the selection process is an important issue of research, which leads to reduction of network signaling and mobile device power loss and on the other hand improves network quality of service (QoS) and grade of service (GoS). This paper presents and designs a multi criteria RNS solution that considers an environment with a co-existed WWAN, WMAN, and WLAN. The developed solution contains two modules. The first module resides in the user terminal. It contains a network-assisted terminal-controlled algorithm to reflect the user viewpoint in the selection process. The second module resides in the common radio resource management (CRRM) entity. It contains a terminal-assisted network-controlled algorithm to reflect the operator viewpoint of the selection decision. The developed solution uses a combined parallel fuzzy logic control and Multi-criteria decision making (MCDM) system to achieve scalable, flexible, general, and adaptable solution. The simulation results show that our solution has better and more robust performance over several reference algorithms.
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.49-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In Voice over Internet Protocol (VoIP) system, the speech signal is degraded when passed through the network layers. The speech signal is processed through the best effort policy based IP network, which leads to the network degradations including delay, packet loss and jitter. The packet loss is the major issue of the degradation in the VoIP signal quality; even a single lost packet may generate audible distortion in the decoded speech signal. In addition to these network degradations, the quality of the speech signal is also affected by the environmental noises and coder distortions. The signal quality of the VoIP system is improved through the interleaving technique. The performance of the system is evaluated for various types of noises at different network conditions. The performance of the enhanced VoIP signal is evaluated using wideband extension-perceptual evaluation of speech quality (WB-PESQ) measurement for wideband signal.
Development of a Capacitive Sensing Device for Prediction of Water Content in Sugarcanes Stalks
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.61-68
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Practically, all properties of agricultural crops depend on moisture content. A new parallel plate capacitance sensor was built to relate the moisture content and dielectric properties of sugarcane stalks. The results revealed a relatively strong quadratic relationship between the moisture content on green weight basis of sugarcane material put through the plates of sensor and the measured voltage (mV) by capacitance sensor circuit output. The coefficient of determination (R2) was 0.91. Some other samples were used to test the results and there was a high correlation between calibrating and testing samples for the device and the coefficient of determination (R2) was found to be 0.95. More research is suggested for improving the electronic circuit and investigation about the sensor type is suggested.
Trust Model: Cloud’s Provider and Cloud’s User
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.69-80
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Most of the organization is not moving to cloud computing due to lack of trust on service provider. Although different advantages are suggested by many researchers, but they still have some reservations. In this paper, argued advantages and disadvantages are evaluated for satisfaction of users. A new trust model has been proposed between cloud provider and cloud users in three turns. At first turn user must be satisfied with previous experience of cloud provider, at second turn user must have knowledge about Cloud Computing, SLA (Service Level Agreement), Cloud Advantages, Cloud Disadvantages Issues related to advantages & disadvantages and securities at different levels. With the satisfaction of implementation of different securities at second turn, cloud provider can be a reliable provider. Now at third turn organization owner/ user can trust on reliable cloud provider. With proposed model any organization can easily make a trust on cloud provider and can use third parties service.
Security Considerations for Public Mobile Cloud Computing
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.81-88
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile cloud computing refers to the incorporation of the elements of mobile networks and cloud computing that offers optimal services for mobile users. It offers on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The more and more information is placed into the cloud by individuals and enterprises, security issues begins to grow and raised. This paper discusses the different security issues that arise about how safe the mobile cloud computing environment is. The list of considerations for cloud computing security are identified and discussed which needs to be understood and assess the risks associated.
A Fabricated Solar Cell from ZnO/a-Si/Polymers
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.89-98
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, a Al/ZnO/a-Si/polymer solar cell is fabricated by using the sputtering technique. The current–voltage characteristic curve indicates that the cell efficiency increased from 0.05453% to 0.484% for ZnO/Si/poly(3-hexylthiophene) as the Si film thickness increased. When the cell was fabricated using ZnO/Si/polyvinyl chloride and ZnO/Si/paraphenylene vinylene, the efficiencies increased from 0.505% to 2.793% and from 1.6% to 2.934%, respectively, as the Si film thickness increased.
Hybrid Classification Algorithm for Knowledge Acquisition of Biomedical Data
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.99-112
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a new hybrid classifier that combines the k-Nearest Neighbor (k-NN) distance based algorithm with the classification tree paradigm based on the ID3 algorithm. The k-NN algorithm is used as a preprocessing algorithm in order to obtain a modified training database for the posterior learning of the classification tree structure. Then the incorrectly classified instances are duplicated with the previous data set and finally ID3 is applied to complete the classification procedure of biomedical data. In this approach a boosting technique is incorporated in such way that the incorrectly classified instances in the training set are identified using the k –NN algorithm. The performance of the proposed method is compared with the related algorithms. Experimental results show that the newly proposed approach performs better than the other existing techniques.
Performance Improvement of Leaf Identification System Using Principal Component Analysis
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.113-124
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper reports the results of experiments in improving performance of leaf identification system using Principal Component Analysis (PCA). The system involved combination of features derived from shape, vein, color, and texture of leaf. PCA was incorporated to the identification system to convert the features into orthogonal features and then the results were inputted to the classifier that used Probabilistic Neural Network (PNN). This approach has been tested on two datasets, Foliage and Flavia, that contain various color leaves (foliage plants) and green leaves respectively. The results showed that PCA can increase the accuracy of the leaf identification system on both datasets.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.