Vol 4 Issue 4 October 2016-December 2016
Wenjian Cai
Abstract: In this article, we utilizing twice sampling stochastic resonance, combined with twice sampling, realized the speech-denoising of weak speech signals. The traditional speech-denoising methods treat the noise as harmful interference signal, and eliminate the noise from the noise speech signal. But in low signal-to-noise(SNR) ratio environment, it will lost very much of the speech information, or make the waveform distortion. Stochastic resonance can transfer the noise energy to the weak signal, but classic SR is only realized under small parameters in terms of the theory of adiabatic elimination, which can’t using in speech-denoising. So our group using the technique of twice sampling realized the speech-denoising using stochastic resonance. The experiment result prove that this method can enhance the weak speech signals and improve initial SNR from -9 to -2.37, markedly enhance the SNR of output speech signals.
Keywords: stochastic resonance, twice sampling, speech denoising, signal-to-noise ratio.
Title: The Weak Speech-Denoising Base on Twice Sampling Stochastic Resonance
Author: Wenjian Cai
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
Ali M A Abuagoub
Abstract: Development in the technology of wireless sensor network (WSN) has contributed a large transformation in all sectors of our daily life from homes to industries. In particular, industrial WSN (IWSN) has attracted more attention due to its large benefits. Nevertheless, the implementation of WSN by the industrial community has faced a number of challenges. In fact, several research efforts have been conducted in this area. However, a number of issues are still open for further investigation. This paper provides an extensive survey on IWSN technologies, standards, products, protocols, applications, challenges and opportunities. Thus, it compares common wireless network technologies, presents specifications of some IWSN standards and products, describes a group of proposed routing protocols, highlights some real applications, and addresses major challenges to be considered when designing the IWSN.
Keywords: Wireless Sensor Network, ZigBee, WirelessHART, ISA100.11a.
Title: An Overview of Industrial Wireless Sensor Networks
Author: Ali M A Abuagoub
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
D.Mishra, S.P.Behera, S. Bhattacharjee
Abstract: Given an edge-weighted graph, a spanning tree of the graph is a tree containing all the vertices and some or all the edges. The minimum spanning tree (MST) or minimum weight spanning tree (MWST) problem calls for finding the spanning tree whose weight is less than or equal to the weight of every other spanning tree. In this paper, we have presented an algorithm for finding minimum spanning tree which is different from the traditional Kruskal’s and Prim’s algorithm. In this algorithm we transform the given graph into a forest and then the minimum spanning tree is obtained from the forest. We have also implemented the proposed algorithm and the Kruskal’s algorithm to find minimal spanning tree using Java programming language and the illustrations are demonstrated through a Java applet. We have presented some numerical examples to explain the solution procedure.
Keywords: Graph, Spanning Tree, Minimum Spanning Tree, Kruskal’s algorithm.
Title: Minimum Spanning Tree Algorithm
Author: D.Mishra, S.P.Behera, S. Bhattacharjee
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
Deepa V B, UshaDevi M B
Abstract: The construction of multicast tree within given constraints, such as delay and capacity, is becoming a major problem in many wireless multicast networks. The paper’s contributions are to investigate the computational complexity of solving the Shortest path problem among different network shortest path algorithms and network simplex method and revised network simplex method .The network simplex algorithm is one of the most popular algorithms in practice for solving the minimum cost flow problem. This algorithm is an adaptation for the minimum cost flow problem of the well-known simplex method of linear programming. This result permits us to restrict our search for an optimal solution among spanning tree. The algorithm is flexible in the sense that we can select the entering arc in a variety of ways and obtain algorithms with different worst-case and empirical attributes tree solutions.
Keywords: Multicast, Shortest Path, Network Simplex Algorithms.
Title: Computation of Shortest path using Network Simplex Algorithm in Wireless Multicast Network
Author: Deepa V B, UshaDevi M B
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
Alex L. Munyole, Erick M. Ayienga
Abstract: Content Delivery Networks has created a sharp rise in internet traffic in recent years. New technologies have simplified users access to rich content, however, as the internet continues to grow and more users access content stored in CDNs, issues such as reduced scalability, reliability and availability becomes a challenge to end users. This study investigates end user request redirection performance in content development network using software-defined networking - based network. The results should assist researchers in network management, Internet Service Providers (ISPs) in managing request redirection as a service. An experiment to determine effects of client-side DNS caching on the contemporary DNS-based redirection technique found out that both Firefox and Chrome are prone to client-side DNS caching. When subjected to a passive testing, Firefox and Chrome “timeout.” Moreover, users had to refresh their browsers for over a minute to get a response from a CDN server. The findings further indicate that Software Defined Networking improves users’ quality of service in request redirection. It took ten seconds for multiple users accessing CDN servers to download content and get redirected. Further, the Domain Name System augmented with Network Address Translation technique, based on SDN approach can reliably redirect user request to an optimal CDN server. This is when if it discovers the DNS contains out of date information. The Ryu controller gathered network statistics and pushed SNAT and DNAT rules. The rules directed TCP packets, hence reliably redirecting users to a better performing CDN server.
Keywords: Request redirection, domain name system, software defined networking, content development network, the end user.
Title: End-User Request Redirection Performance in Content Development Network using Software Defined Networking-Based Network
Author: Alex L. Munyole, Erick M. Ayienga
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
Shubhavi Arya
Abstract: Big Data is a data investigation method empowered by late advances in technologies and engineering. Big data involves an enormous amount of hardware equipment and preparing resources, making adoption expenses of big data methodology restrictive to small and medium organizations. Cloud Computing offers the potential of big data execution to small and medium sized organizations.
Big Data processing is performed through a programming methodology known as MapReduce. Often, execution of MapReduce methodology requires networked appended storage and parallel processing. The computing requirements of MapReduce programming are frequently past what small and medium sized organizations are able to commit.
Cloud Computing is on-request network access to figuring assets, given by an outside entity. Basic deployment models for cloud computing incorporate platform as a service (PaaS), hardware as a service (HaaS), software as a service (SaaS), and infrastructure as a service (IaaS).
The three sorts of cloud computing are the private cloud, hybrid cloud and public cloud. A private cloud is internal data center of an organization not accessible to the general population but rather takes into account cloud structure. A public cloud is the pay-as-you-go service. The hybrid cloud is a mix of the private cloud and general public cloud.
Three noteworthy explanations behind small to medium sized organizations to utilize cloud computing for big data methodology execution are reduction in hardware cost, processing cost reduction, and capacity to test the estimation of big data. The significant concerns with respect to cloud computing are security and loss of control.
Keywords: Cloud computing, big data, private cloud, hybrid cloud, public cloud.
Title: Big Data with Cloud Computing
Author: Shubhavi Arya
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
Faustina Jeroma Anto Morais
Abstract: The Internet of Things (IoT) refers to the network of physical objects and things connected to the internet. These objects will be embedded with electronics, software, sensors and network connectivity through which they collect and exchange data. IoT is the major growing technology as the application such as monitoring and home automation are used widely. Trustworthiness is one of the main issue with all the IoT appliances. This paper discusses about the enhancement of security system and trustworthiness by providing a virtual reality user interface with which they can check the end to end connectivity. The outcome will be the transparent middleware which shows the end to end virtual connectivity. The system can be used by the end users to operate their daily used domestic IoT applications.
Keywords: Internet of Things, Virtual user interface, information security.
Title: A Study on Highly Secured Transparent User Interface for IoT Appliances
Author: Faustina Jeroma Anto Morais
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
M.Senthamilselvi, N.Vijayalakshmi
Abstract: In this paper, a three-layer framework is proposed for mobile data collection in wireless sensor networks, which includes the sensor layer, cluster head layer, and mobile collector (called SenCar) layer. The framework employs distributed load balanced clustering and dual data uploading, which is referred to as LBC-DDU. The objective is to achieve good scalability, long network lifetime and low data collection latency. At the sensor layer, a distributed load balanced clustering (LBC) algorithm is proposed for sensors to self-organize themselves into clusters. In contrast to existing clustering methods, our scheme generates multiple cluster heads in each cluster to balance the work load and facilitate dual data uploading. At the cluster head layer, the inter-cluster transmission range is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster cooperate with each other to perform energy-saving inter-cluster communications. Through inter-cluster transmissions, cluster head information is forwarded to SenCar for its moving trajectory planning. At the mobile collector layer, SenCar is equipped with two antennas, which enables two cluster heads to simultaneously upload data to SenCar in each time by utilizing multi-user multiple-input and multiple-output (MU-MIMO) technique. The trajectory planning for SenCar is optimized to fully utilize dual data uploading capability by properly selecting polling points in each cluster. By visiting each selected polling point, SenCar can efficiently gather data from cluster heads and transport the data to the static data sink. Extensive simulations are conducted to evaluate the effectiveness of the proposed LBC-DDU scheme. The results show that when each cluster has at most two cluster heads, LBC-DDU achieves over 50 percent energy saving per node and 60 percent energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink, and 20 percent shorter data collection time compared to traditional mobile data gathering.
Keywords: Wireless sensor networks (WSNs), data collection, load balanced clustering, dual data uploading, multi-user multiple-input and multiple-output (MU-MIMO), mobility control, polling point.
Title: Efficient Data Collection Using Cluster Technique to Avoid Data Redundancy
Author: M.Senthamilselvi, N.Vijayalakshmi
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
David Kirop, George Okeyo, Richard Rimiru
Abstract: A reflex is an involuntary muscle reaction in response to sensory stimulation that brings about a change. Some changes are clearly visible while others are not, depending on the distances between the surveillance camera and subjects. Incidents are unexpected occurrences that could cause harm or destroy the property being protected. Intelligent video surveillance system requires fast and robust methods of moving object detection, tracking, and event analysis. They are more useful if they can report reflexes that result from critical incidences. There are incidences that happen in solitude and the subjects may need assistance. A combination of thresholding and frame differencing proved to be a simpler method for object detection and event analysis for automatic reflex action incidents detection. The “knee jack” response of limbs is normally caused by unexpected reaction or presence of an unexpected frightening item or occurrence in a scene. Unlike other incident detection methods, this is not based on predetermined and classified human behavior. The identification of reflex action incidents in the scene can then be used to raise an alarm or notification to the human operators for necessary security action.
Keywords: Security, video surveillance, reflexes, incidents.
Title: Reflex Action Incidents Detection for Intelligent Video Surveillance
Author: David Kirop, George Okeyo, Richard Rimiru
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 4 Issue 4 October 2016-December 2016
AMINA IBRAHIM MAKINTAMI
Abstract: This study surveyed the attitude of the Yobe state University students towards computerized services at the Jonathan library. Descriptive survey research design was adopted for the study. Data was collected through questionnaire and observation. A sample of 200, with 158 used for analysis, was taken from the study population of 734 students using the university library. The study’s findings revealed availability of CD-ROM, OPAC and Internet services in the library as well as favorable views from the respondents towards the computerized services in the library. There was however, the problem of disrupting power supply as major hindrances to the use of the computerized services. The study concluded that there is a positive attitude from the students of the university towards computerized services in the library. It therefore recommended that the keep up and responsibility of the library’s generating set should be handle by the library staff and also that the library should increases the level of awareness of its users towards the computerized services in the library.
Keywords: Yobe state University, students towards computerized services, questionnaire and observation.
Title: ATTITUDES OF YOBE STATE UNIVERSITY STUDENTS TOWARDS COMPUTERIZED SERVICES AT THE JONATHAN LIBRARY
Author: AMINA IBRAHIM MAKINTAMI
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals