Earticle

현재 위치 Home

International Journal of Advanced Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJAST) [Science & Engineering Research Support Center, Republic of Korea(IJAST)]
  • pISSN
    2005-4238
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.44 (11건)
No
1

A Comprehensive Study on Fast image Deblurring Techniques

Zohair Al-Ameen, Ghazali Sulong, Md. Gapar Md. Johar

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.1-10

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Image deblurring refers to procedures that attempt to reduce the blur amount in a blurry image and grant the degraded image an overall sharpened appearance to obtain a clearer image. The point spread function (PSF) is one of the essential factors that needed to be calculated, since it will be employed with different types of deblurring algorithms. In this paper, the authors studied various fast deblurring techniques like Richardson – Lucy and its optimized version, Van Cittert and its enhanced version, Landweber, Poisson Map, and Laplacian sharpening filters. Furthermore, altered optimized versions of Landweber and Poisson Map algorithms have been presented. The usage of the PSF in the deblurring algorithm is explained and a comparison between the optimized, the enhanced algorithms and Laplacian sharpening filters in terms of the number of mathematical operations, number of iterations employed, computation time, deblurring in case of noise existence, and the accuracy measurement using peak signal to noise ratio (PSNR) for each technique is conducted.

2

A Method for Improving Data Delivery Efficiency in Vehicular Adhoc Networks

Neha Verma, Rakesh Kumar

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.11-24

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As vehicular networks become popular and many vehicles want to access data through a roadside unit. In this paper, there was a vehicle to roadside communication and we propose scheduling schemes for efficient delivery of data packets in vehicular adhoc network. On the basis of priority scheduling algorithm vehicles can download/upload the data from RSU. In this paper we can control the congestion and delay of data by assigning the priorities to the message. The process with highest priority is executed first and highest priority is assign to those processes which have the smallest data size and this scheme is the smallest data size first scheduling(SDF) . If the two processes having the same data size then we can assign the priority on the basis of first come first serve scheduling (FCFS). We can combine these two algorithms and the new algorithm D*A. is introduced. This algorithm is responsible for only sending the commercial messages and the safety messages will be send on the different channel. The emergency messages will be sending through control channel with help of EDF scheduling. This paper increases the efficiency and throughput of the process and decreases the turnaround time for the process.

3

Simulation and Optimization of Services at Port in Indonesia

M. Dachyar

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.25-32

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Port of Merak and port of Bakauheni is the biggest ferry port in Indonesia, which linking two main islands; Java and Sumatra. The growing population of both islands have effected to the increasing of economic level and mobilities. The existing of port users have to be accompanied by the reduction of time services which caused reduction of waiting time and vehicles queuing. This study uses simulation methods to obtain a description of conditions of port of Merak and port of Bakauheni at various scenarios which are number of ships, number of docks, passenger arrival rate, sea wave, and intervals of ship arrivals.The results showed,on weekdays and weekend, vehicle waiting time was about 10-30 minutes. On national holidays the waiting time increased to more than 10 hours. The recommendation to data analysis; the port should operates 5 docks and 3 additional ships at long holiday to solve vehicle queues, which can reduce to 1-3 hours.

4

Hybrid Approach for Radio Network Selection in Heterogeneous Wireless Networks

Mohammed M. Alkhawlani, Abdulqader M. Mohsen

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.33-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Next generation wireless network (NGWN) will be composed of multiple radio access technologies (RATs) and domains. Radio network selection (RNS) is the mechanism which decides how to select the most suitable RAT based on the discovered accesses, QoS constraints, operator policies, user preferences and available system capacity and utilization. Optimizing the selection process is an important issue of research, which leads to reduction of network signaling and mobile device power loss and on the other hand improves network quality of service (QoS) and grade of service (GoS). This paper presents and designs a multi criteria RNS solution that considers an environment with a co-existed WWAN, WMAN, and WLAN. The developed solution contains two modules. The first module resides in the user terminal. It contains a network-assisted terminal-controlled algorithm to reflect the user viewpoint in the selection process. The second module resides in the common radio resource management (CRRM) entity. It contains a terminal-assisted network-controlled algorithm to reflect the operator viewpoint of the selection decision. The developed solution uses a combined parallel fuzzy logic control and Multi-criteria decision making (MCDM) system to achieve scalable, flexible, general, and adaptable solution. The simulation results show that our solution has better and more robust performance over several reference algorithms.

5

Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions

Harjit Pal Singh, Sarabjeet Singh, Jasvir Singh

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.49-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In Voice over Internet Protocol (VoIP) system, the speech signal is degraded when passed through the network layers. The speech signal is processed through the best effort policy based IP network, which leads to the network degradations including delay, packet loss and jitter. The packet loss is the major issue of the degradation in the VoIP signal quality; even a single lost packet may generate audible distortion in the decoded speech signal. In addition to these network degradations, the quality of the speech signal is also affected by the environmental noises and coder distortions. The signal quality of the VoIP system is improved through the interleaving technique. The performance of the system is evaluated for various types of noises at different network conditions. The performance of the enhanced VoIP signal is evaluated using wideband extension-perceptual evaluation of speech quality (WB-PESQ) measurement for wideband signal.

6

Development of a Capacitive Sensing Device for Prediction of Water Content in Sugarcanes Stalks

Javad Taghinezhad, Reza Alimardani, Ali Jafari

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.61-68

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Practically, all properties of agricultural crops depend on moisture content. A new parallel plate capacitance sensor was built to relate the moisture content and dielectric properties of sugarcane stalks. The results revealed a relatively strong quadratic relationship between the moisture content on green weight basis of sugarcane material put through the plates of sensor and the measured voltage (mV) by capacitance sensor circuit output. The coefficient of determination (R2) was 0.91. Some other samples were used to test the results and there was a high correlation between calibrating and testing samples for the device and the coefficient of determination (R2) was found to be 0.95. More research is suggested for improving the electronic circuit and investigation about the sensor type is suggested.

7

Trust Model: Cloud’s Provider and Cloud’s User

Shakeel Ahmad, Bashir Ahmad, Sheikh Muhammad Saqib, Rashid Muhammad Khattak

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.69-80

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Most of the organization is not moving to cloud computing due to lack of trust on service provider. Although different advantages are suggested by many researchers, but they still have some reservations. In this paper, argued advantages and disadvantages are evaluated for satisfaction of users. A new trust model has been proposed between cloud provider and cloud users in three turns. At first turn user must be satisfied with previous experience of cloud provider, at second turn user must have knowledge about Cloud Computing, SLA (Service Level Agreement), Cloud Advantages, Cloud Disadvantages Issues related to advantages & disadvantages and securities at different levels. With the satisfaction of implementation of different securities at second turn, cloud provider can be a reliable provider. Now at third turn organization owner/ user can trust on reliable cloud provider. With proposed model any organization can easily make a trust on cloud provider and can use third parties service.

8

Security Considerations for Public Mobile Cloud Computing

Ronnie D. Caytiles, Sunguk Lee

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.81-88

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Mobile cloud computing refers to the incorporation of the elements of mobile networks and cloud computing that offers optimal services for mobile users. It offers on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. The more and more information is placed into the cloud by individuals and enterprises, security issues begins to grow and raised. This paper discusses the different security issues that arise about how safe the mobile cloud computing environment is. The list of considerations for cloud computing security are identified and discussed which needs to be understood and assess the risks associated.

9

A Fabricated Solar Cell from ZnO/a-Si/Polymers

Ehsan H. Sabbar, Mustafa H. Saleh, Salih Mohammed Salih

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.89-98

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, a Al/ZnO/a-Si/polymer solar cell is fabricated by using the sputtering technique. The current–voltage characteristic curve indicates that the cell efficiency increased from 0.05453% to 0.484% for ZnO/Si/poly(3-hexylthiophene) as the Si film thickness increased. When the cell was fabricated using ZnO/Si/polyvinyl chloride and ZnO/Si/paraphenylene vinylene, the efficiencies increased from 0.505% to 2.793% and from 1.6% to 2.934%, respectively, as the Si film thickness increased.

10

Hybrid Classification Algorithm for Knowledge Acquisition of Biomedical Data

Shovon K. Pramanik, Subrata Pramanik, Bimal K. Pramanik, M. K. Islam Molla, Md. Ekramul Hamid

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.99-112

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a new hybrid classifier that combines the k-Nearest Neighbor (k-NN) distance based algorithm with the classification tree paradigm based on the ID3 algorithm. The k-NN algorithm is used as a preprocessing algorithm in order to obtain a modified training database for the posterior learning of the classification tree structure. Then the incorrectly classified instances are duplicated with the previous data set and finally ID3 is applied to complete the classification procedure of biomedical data. In this approach a boosting technique is incorporated in such way that the incorrectly classified instances in the training set are identified using the k –NN algorithm. The performance of the proposed method is compared with the related algorithms. Experimental results show that the newly proposed approach performs better than the other existing techniques.

11

Performance Improvement of Leaf Identification System Using Principal Component Analysis

Abdul Kadir, Lukito Edi Nugroho, Adhi Susanto, Paulus Insap Santosa

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.44 2012.07 pp.113-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper reports the results of experiments in improving performance of leaf identification system using Principal Component Analysis (PCA). The system involved combination of features derived from shape, vein, color, and texture of leaf. PCA was incorporated to the identification system to convert the features into orthogonal features and then the results were inputted to the classifier that used Probabilistic Neural Network (PNN). This approach has been tested on two datasets, Foliage and Flavia, that contain various color leaves (foliage plants) and green leaves respectively. The results showed that PCA can increase the accuracy of the leaf identification system on both datasets.

 
페이지 저장