Earticle

현재 위치 Home

International Journal of Advanced Science and Technology

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJAST) [Science & Engineering Research Support Center, Republic of Korea(IJAST)]
  • pISSN
    2005-4238
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.56 (12건)
No
1

CAP Theorem between Claims and Misunderstandings: What is to be Sacrificed?

Balla Wade Diack, Samba Ndiaye, Yahya Slimani

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.1-12

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Modern large distributed Systems at wide scale have adopted new types of databases that are not subject to the features which ensure strong Consistency. In this paper, we discuss the CAP theorem, its evolution and its influence on these systems. After, we talk about the misunderstandings and problems aroused by this theorem. Finally, we give the updates on CAP brought by some researchers.

2

Enhancing Worst Sorting Algorithms

Md. Khairullah

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.13-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Sorting is a commonly used operation in computer science. In addition to its main job, sorting is often required to facilitate some other operation such as searching, merging and normalization. There are many sorting algorithm that are being used in practical life as well as in computation. A sorting algorithm consists of comparison, swap, and assignment operations. Bubble sort, selection sort and insertion sort are algorithms which are easy to comprehend but have the worst time complexity of O(n2). In this paper enhancement of the selection sort and the bubble sort by eliminating some useless comparisons is presented. A stack is used to store the locations of the past or local maximums, which can be used in later iterations of these algorithms. The insertion sort is improved by reducing shift operations with the aid of a double sized temporary array. The new algorithms are discussed, analyzed, tested and executed for benchmarking along with representing results. A significant improvement of well above 200% is achieved.

3

A Novel Algorithm for Self Localized Packet Forwarding in Wireless Sensor Networks

Tarun Dubey, O. P. Sahu

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.27-36

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Wireless sensor networks (WSNs) consist of sensor nodes that onward the sensed data in form of packets within the deployed network. Efficient packet forwarding is a key constraint in sensor networks and many demanding tasks in the network, together with redundancy estimation and sensor node localization depend principally on packet forwarding. Location based forwarding schemes have recently evolved as a promising solution for packet forwarding in WSNs, however, as the node density increases, the overhead incurred in terms of redundancy also increases considerably. With the motivation to develop a packet forwarding scheme that is tolerant to increase in node density and offers controlled redundancy a Self Localized Packet Forwarding Algorithm (SLPFA) is proposed in this paper.

4

Auto Pilot System for Small Helicopter Type UAV with Three Independent Control Systems

Asif Sajjad Khan Anjum Salman Afghani, Mati-ur-Rehman, Muhammad Safwan Yaseen Khan, Muhammad Arslan

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.37-46

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper we have discussed the development of a new approach for small low cost helicopter based UAV in which independency of control system is achieved and other features like power enhancement, development, flight of helicopter at fix altitude of highly cost effective, autonomous reconnaissance UAV, suitable for safe flights in close environments . Our approach is focused on development of reliable flight control system in which constituent subsystem are independent of each other. The constituent subsystems being,  Altitude Control Subsystem  Spin Lock Subsystem  Horizontal Drift Control Subsystem Auto Pilot, Helicopter, UAV, Independent Control Systems, Fix Altitude, Cost Effective UAV

5

Vertical Handover Decision Algorithm from WWAN to WMAN or WLAN Environments

Kire Jakimoski, Toni Janevski

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.47-60

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Decisions for vertical handovers from WWAN to WMAN or WLAN access technologies are very challenging issue because it needs to deal with different radio access networks and make smart decisions for vertical handover calls between them. Especially the decisions for vertical handovers from WWAN to WLAN hotspots in heterogeneous mobile and wireless networks are very important because they impact the QoS of the mobile users, especially when they are using real-time services. In this paper we propose vertical handover decision algorithm from WWAN to WMAN or WLAN networks based on the load of the networks, speed of the mobile users, bandwidth and priority of the sessions of the mobile nodes. We use the IEEE 802.21 standard as a layout for implementing the algorithm. The results show that the proposed algorithm reduces unnecessary vertical handovers from WWAN to WMAN or WLAN access technologies and optimizes the load of the networks, improves the distribution of the call arrival rates and blocking probability of the vertical handovers from WWAN to WMAN or WLAN.

6

Distributed Generation Location and Size Determination to Reduce Power Losses of a Distribution Feeder by Firefly Algorithm

Ketfi Nadhir, Djabali Chabane, Bouktir Tarek

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.61-72

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In order to minimize power losses caused by high current and improve the voltage profile in the network distribution, the introduction of dispersed generations also called productions decentralized in distribution network (DG) plays an important role. The installation of DGs directly affects the power requested or purchased. The sizing and placement of DGs in the system must be optimal because a wrong choice has a negative impact on the system behavior. To solve this combinatorial problem, an algorithm known as Firefly algorithm is proposed in this paper. This is a meta-heuristic algorithm inspired by the behavior of fireflies flashing. The main objective of firefly flash is to act as a signaling system to attract other fireflies. Networks tested IEEE69-bus and IEEE33-bus are used to evaluate the effectiveness of this method. The results are compared with those obtained by genetic algorithm (GA) to IEEE69-bus, and Shuffled frog leaping algorithm (SFLA) for IEEE 33-bus.

7

Transient Thermal Conduction Analysis of High Voltage Cap and Pin Type Ceramic Disc Insulator Assembly

R. D. Palhade, V. B. Tungikar, G. M. Dhole, S. M. Kherde

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.73-86

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Use of high temperature conductors is being considered by more and more electric utilities as a means to increase transmission line capacity. Hence there is a need to investigate temperature rise of transmission line insulators when the current carried by the line conductor is high. This has raised questions regarding the effect of these increased temperatures on the performance of all components attached to the conductor, including the insulators. This paper presents the results of finite element simulation of transient thermal conduction analysis to determine the temperatures reached at various locations on the conductor attachment hardware, end fittings of cap and pin type ceramic disc insulator assembly by using commercially available software Ansys-11. Remarkable temperature rise was not observed at porcelain and cement of insulators in spite of the high conductor temperature, suggesting almost no reduction in electrical and mechanical characteristics of insulators for short period of time but for longer period of time and varying environmental conditions there might be development of high temperature and chances of affects of this high temperatures of conductor on the insulator assembly and end fittings of insulator.

8

In this paper, we present a method for duration and spectral shape transformations of speech based on the combination of pyramidal Discrete Wavelet Transform (DWT) and Synchronized Overlap and Addition (SOLA) technique. The developed scheme is devoted to the diagnosis of hearing problems. The SOLA technique is basically used for duration modifications. The pyramidal DWT gives a semi logarithmic frequency decomposition that represents the frequency scales of human hearing. In addition, it allows a separate manipulation of speech sub-bands. In the proposed scheme, we explore the frame synchronization provided by SOLA technique and the frequency reparation given by the DWT to develop simultaneous time-scale and frequency-magnitude transformations. We have compared the developed method to another scheme that uses the same concept in which the frequency decomposition is based on the Cosine Modulated Pseudo- Quadratic Mirror Filter Bank (CMP-QMF). A software system of speech transformations is implemented. Experimental results show that speech waveforms can be successfully modified to different time-scales and frequency-magnitudes with high quality.

9

An Analysis of Automated Detection Techniques for Textual Similarity in Research Documents

Ranjeet Kumar, R. C.Tripathi

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.99-110

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the present age of Internet access, the world is growing with lots of easily accessible information available on almost every subject matter. The use of the freely available internet resource is causing easy copy and paste culture resulting in plagiarism in various research documents and academic reports. In such a scenario of the growing research and development publications, many techniques and methodologies have been developed for the plagiarism detection to evaluate the originality in the research documents both in regard to the web based as well as local repository based contents. Most important techniques and methodologies in use have been reviewed in this research paper, with their due analysis in terms of their methodologies, procedures and working principles along with their efficiency in finding the text similarity for a given query document.

10

Displacement Detection of Structures using a Micro-genetic Algorithm

Sang-Youl Lee

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.111-118

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study deals with a method to identify displacements on structures using a Micro-genetic algorithm (M-GA). We developed the inverse technique using a Micro-genetic algorithm which can make global solution searches possible as opposed to classical gradient-based optimization techniques such as the Least-square method. The technique described in this paper may allow us not only to detect the base function but also to find unknown displacements of a structure. Example models are simulated to detect unknown displacements and weight values at the same time.

11

ANTSREC: A Semantic Recommender System Based on Ant Colony Meta-Heuristic in Electronic Commerce

Mojtaba Salehi, Abdolhossein Fathi, Fardin Abdali-Mohammadi

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.119-130

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A recommender system is a guide and assistance for choosing the required product or service for improving the electronic commerce systems. Most of the recommender systems use the history of customer purchase and a few are based on Semantic relatedness of purchased commodities. In this paper a semantic recommender system based on Ant Colony and Ontology dependencies is used for improvement of electronic commerce. This system comprises heuristic, stochastic, reinforcement learning in Ant Colony theory and semantic dependency in ontology characteristics. The presented system is able to recommend similar, complement and bundled products. This characteristic can overcome problems such as cold start, scalability and scarcity of information. In this paper applied tests results show the performance and efficiency of presented algorithms.

12

Modeling E-Learning Assisted Distance Education System for Bangladesh

M. Mozammel Hoque Chowdhury, Amina Khatun

보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.56 2013.07 pp.131-142

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Distance Education is a very important instructional delivery for higher education in the 21st century. Along with the rapid development of computer related modern technology such as Internet, videoconferencing, Web conferencing etc., distance education is playing an increasingly important role in schools, colleges and other educational institutes. The advancement of information and communication technology (ICT) has brought revolutionary changes to the mode of distance education. Distance education in the form of E-learning can play a crucial role in broadening access to education for the whole society. The framework of this research focuses on the trends and issues of existing Distance Education in Bangladesh and explores the opportunities as well as the challenges of E-learning to develop a modern distance education system for the disadvantaged people of the country. Considering all issues and challenges this research proposes a model of E-learning assisted distance education system for Bangladesh. This paper also intends to suggest some recommendations for facing the challenges and strengthening infrastructures to implement the system for quality education.

 
페이지 저장