Showing papers in "Journal of Information and Optimization Sciences in 2017"
TL;DR: The proposed algorithm (TA-ABC) provide an optimal balance results for multiple objectives and the results are comparable to the state-of-the-art existing scheduling algorithms.
Abstract: Cloud computing is an emerging distributed, low cost computing paradigm with a large collection of heterogeneous autonomous systems. It provides, on demand, flexible and scalable services t...
37 citations
TL;DR: A new secure multipath routing protocol (NSRP) for military heterogeneous wireless sensor network (MHTWSN) for secure data transmission that has achieved low communication overhead, memory requirement and energy consumption as compared with existing key management schemes.
Abstract: Military Heterogeneous Wireless Sensor Network (MHTWSN) is an emerging technology. Due to its extending services, MHTWSN is becoming a widely preferable network for border area monitoring and enemy object tracking in sensitive, unmanned areas. However, security is one of the key challenging issue in MHTWSN. Many routing protocols like AODV, AOMDV, I2MR, and IMCC have proposed for efficient routing establishment and data delivery, but these routing protocols results the poor performance when the network is under any security attack. So we have proposed a new secure multipath routing protocol (NSRP) for military heterogeneous wireless sensor network (MHTWSN) for secure data transmission. NSRP uses elliptic curve cryptography (ECC) to discover trusted neighbor nodes and establish the secure multiple routes for reliable data delivery in MHTWSN. Our protocol has an efficient key management mechanism which provides better security and improves the network performance. NSRP has achieved low communication...
35 citations
TL;DR: This paper proposes sign language interpreter model which is focusing on interpretation of sign language in proper English sentence with a good accuracy.
Abstract: Sign language is a way of communication for deaf & dumb. Different sign recognition techniques are there which are giving output in the form of word for recognized sign. The proposed method is focusing on interpretation of sign language in proper English sentence. Different NLP techniques are used in addition to sign recognition. Input is given as video of sign language followed by framing & segmentation on video. CamShift algorithm is used for tracking & P2DHMM for hand tracking. Haar Cascade classifier is used for sign identification. After sign recognition, the continuous words for respective sign are given as input to POS tagging module. Word net POS tagger is used which is having its own WordNet dictionary. At last LALR parser is used to frame the sentence. In this way proposed sign language interpreter model gives the output in meaningful English sentence & with a goodaccuracy.
25 citations
TL;DR: This research developed a ‘process performance model’ for a warehouse management system, and extensive case studies were conducted with respect to four different types of logistics corporations to develop the KPIs for logistics corporations.
Abstract: Logistics corporations have very important roles in the current economic development for most countries around the world, but they also have encountered intense competition. Usually, such industrie...
22 citations
TL;DR: A 3-level heterogeneous network model for WSNs to enhance the network lifetime and helps to select cluster heads and their respective cluster members by using weighted election probability and threshold function.
Abstract: In this paper, we propose a 3-level heterogeneous network model for WSNs to enhance the network lifetime, which is characterized by a single parameter. Depending upon the value of the model parameter, it can describe 1-level, 2-level, and 3-level heterogeneity. Our heterogeneous network model also helps to select cluster heads and their respective cluster members by using weighted election probability and threshold function. We compute the network lifetime by implementing SEP protocol for our network model. The SEP implementation for the existing 1-level, 2-level, and 3-level heterogeneous network models are denoted as SEP-1, SEP-2, and SEP-3, respectively, and for our proposed 3-level heterogeneous network model, the SEP implementations are denoted as hetSEP-1, hetSEP-2, and hetSEP-3, respectively. In SEP-3 and hetSEP-3 the values of the network lifetime increase by 164.18% and 192.80%, respectively for increasing 100% in network energies as compared to the original implementation of SEP.
21 citations
TL;DR: A robust image watermarking pattern for hiding watermark into RGB colour component based on combined approach of discrete wavelet transform and singular value decomposition and the quick response code is taken as a watermark image.
Abstract: Now days, the protection of digital data in multimedia communication, in the form of image, text, video and audio has become an important problem because it can be copied and modified easil...
21 citations
TL;DR: The ultimate goal is to provide immediate water to the plant wherever required depending upon the moisture values of the wireless irrigation system, which works on the priority driven scheduling principle.
Abstract: Adopting smart irrigation will be the future need we can it is the thirst due to many critical factors such as irregularity of monsoon, less availability of groundwater etc. Though we say sufficient water is available but need is arise to think about the utilization of water in an effective way. We must also think water which we are using is good for better yielding of the crops. Similarly temperature, humidity, and soil moisture these parameters will play important roles in better crop yielding.To be a best example of interdisciplinary application we are tying wireless sensor network (WSN) with this agriculture field. It is a challenging task to implement this wireless irrigation system (WSN-IS) as focus is on capturing the sensor values for humidity, temperature, moisture, pH level, conductivity of water etc. Our ultimate goal is to provide immediate water to the plant wherever required depending upon the moisture values. This proposed system works on the priority driven scheduling principle. Co...
21 citations
TL;DR: A meta-heuristic firefly algorithm has been proposed for state chart testing of five benchmarks of object-oriented application and optimized test cases have been generated for them and the results have been compared with already existing nature-inspired ant colony optimization algorithm.
Abstract: Software testing is an integral part of software development. Testing ensures that software is correctly doing what it was designed for and not terminating abruptly. To overcome the challenges asso...
20 citations
TL;DR: In this article, a survey was developed and implemented in Taipei, Taiwan to investigate outbound Chinese tourists' travel decision-making in terms of destination attributes, as well as travel safety and security and destination image toward international travel.
Abstract: Based on theory of travel behaviour a survey was developed and implemented in Taipei, Taiwan to investigate outbound Chinese tourists’ travel decision-making in terms of destination attributes, as well as travel safety and security and destination image toward international travel. This study explored the effects of travel safety and security (TSS) via tourism destination image (TDI) as a mediator on travel decision-making (TDM) from the Chinese outbound tourists’ perspectives. A self-administered questionnaire survey was conducted on the Chinese outbound tourists visiting Taipei’s prevalent tourism sites with 410 effective samples collected for analysis. This study concluded travel safety and security (TSS) impact on the tourism destination image (TDI) during the early travel decision-making (TDM) process. The results supported the hypotheses that travel safety and security (TSS) has direct and positive effects on travel decision-making (TDM) and that both travel safety and security (TSS) and tou...
18 citations
TL;DR: The use of the proposed IHPSO to identify the parameters of a suspension system shows that the algorithm successfully determine the parameters and provide a good model to the system.
Abstract: In this paper, we propose an improved heterogeneous particle swarm optimization (IHPSO) with enhanced exploration and exploitation. Heterogeneous PSOs allow particles to have different position and...
17 citations
TL;DR: In this paper, emissions of N2O and partial CO2, CH4 among the greenhouse gases (GHGs) are mainly from agricultural production and show reciprocal relationships that change with tillage patterns of upland crops.
Abstract: Emissions of N2O and partial CO2, CH4 among the greenhouse gases (GHGs) are mainly from agricultural production and show reciprocal relationships that change with tillage patterns of upland crops. ...
TL;DR: In this article, the solution of Bergman's minimal model of fractional order, used to describe blood glucose and insulin metabolism by Adomian decomposition method (ADM), is discussed.
Abstract: In this paper, we discuss the solution of Bergman’s minimal model of fractional order, used to describe blood glucose and insulin metabolism by Adomian decomposition method (ADM). Numerical simulat...
TL;DR: A new coding theory called generalized Fibonacci n-step polynomial coding theory is state, which defines a new class of square matrix Mh, n(x) of order n and obtains the relations among the code matrix elements.
Abstract: In this paper, we introduce generalized Fibonacci n-step polynomials. Based on generalized Fibonacci n-step polynomials, we define a new class of square matrix Mh, n(x) of order n. Thereby, we stat...
TL;DR: In this paper, the modified wavelet multigrid method is proposed for numerical solution of boundary value problems, where the new intergrid operators (prolongation and restriction) based on Daubechies high pass and low pass filter coefficients are introduced for the sake of numerical efficiency.
Abstract: Abstract In this paper, we propose the modified wavelet multigrid method for the numerical solution of boundary value problems. Here we introduced the new intergrid operators (prolongation and restriction) based on Daubechies high pass and low pass filter coefficients for the sake of numerical efficiency. Numerical examples are presented to demonstrate the versatility of the proposed method in comparison with the standard methods viz multigrid and wavelet multigrid. Modified wavelet multigrid method is the robust technique for faster convergence with low computational cost which is justified through operator complexity, grid complexity, rate of convergence, condition number and error analysis.
TL;DR: A 3-level heterogeneous network model for WSNs to enhance the network lifetime and helps to select cluster heads and their respective cluster members by using weighted election probability and threshold function.
Abstract: In this paper, we propose a 3-level heterogeneous network model for WSNs to enhance the network lifetime, which is characterized by a single parameter. Depending upon the value of the model paramet...
TL;DR: A new method for image segmentation is shown using improved K-means and region of interest (ROI) saliency map to detect the portion of tumor from MRI image.
Abstract: The very crucial part of image processing system is Image Segmentation (IS). In the IS process, the accuracy is dependent on segmented image. In this paper, a new method for image segmentation is s...
TL;DR: An extended model to determine the economic production quantity of a batch production system in which a general discrete distribution is used to describe the process failure or process degradation in the production system is developed.
Abstract: This study develops an extended model to determine the economic production quantity of a batch production system in which a general discrete distribution is used to describe the process failure or process degradation in the production system. The optimal production batch size is determined by minimizing the expected total cost per product during a production cycle, where a loss function is used to measure the quality cost. A numerical example is employed to demonstrate the use of the proposed model. Sensitivity analysis is also performed to determine the various parameter values that affectthe optimal production batch.
TL;DR: Different accessible strategies and methods that have been utilized as a part of the past exploration concentrates on furthermore gives the bearing to further research in the different field of inactive unique finger impression application.
Abstract: Latent fingerprint has become more popular and attracted among the researchers in the recent days and it has been used widely in security such as India’s Aadhaar project, Department of Homeland Security’s US-VISIT program, the UK Border Agency, law enforcement and forensic applications. There have been different biometric traits that were used for matching to identify the person. While investigation a small number of accesses are recognized in latent fingerprint images because the fingerprint has own individuality. Latent fingerprint has been consisting some challenges in term of poor quality images, unclear texture and nonlinear distortion, appropriate matching algorithm and publicly available latent fingerprint database. Consequently, the study has considered and talked about different accessible strategies and methods that have been utilized as a part of the past exploration concentrates on furthermore gives the bearing to further research in the different field of inactive unique finger impres...
TL;DR: A novel and precise numerical relaying approach based on discrete wavelet transform (DWT), Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference System (ANFIS) is presented, demonstrating that proposed method is effective in detecting, classifying and predicting faults position in the network.
Abstract: A novel and precise numerical relaying approach based on discrete wavelet transform (DWT), Artificial Neural Network (ANN) and Adaptive Neuro-Fuzzy Inference System (ANFIS) is presented in this paper. Detection and categorisation of the faults are achieved using designed neural network (NN) which is trained by samples of voltage and current, procured from the simulated test system. However, for localizing the faults, ANFIS is employed. The summation values of discrete wavelet coefficients of 3-phases are extracted for training and testing of ANFIS model. Daubechies db4 (mother wavelet) is applied for decomposing 3-phase current samples. For validating the effectiveness of the present approach, it is checked on a 400 kV transmission system in MATLAB. The results obtained demonstrate that proposed method is effective in detecting, classifying and predicting faults position in the network.
TL;DR: A high capacity text steganography scheme by using a combination of Move to Front (MTF) encoding, huffman compression, and color coding to hide secret data.
Abstract: In this paper, we propose a high capacity text steganography scheme by using a combination of Move to Front (MTF) encoding, huffman compression, and color coding. The forward email platform is used...
TL;DR: In this article, the authors studied the so-called Kumaraswamy Exponential Pareto (KEP) distribution and discussed the structural and mathematical properties of the KEP distribution.
Abstract: In this article we study the so-called Kumaraswamy Exponential Pareto (KEP) distribution. Several lifetime distributions such as the Kumaraswamy Weibull, Kumaraswamy exponential, Kumaraswamy Rayleigh, generalized Weibull, among several others are embedded in the proposed distribution. Various structural and mathematical properties of the KEP distribution are presented. We also discuss the parameter estimation and simulation methods. Real data set is used to illustrate the importance and flexibility of the proposed model.
TL;DR: In this paper, the first Zagreb coindex of Hamiltonian graphs was investigated, which may be helpful to find the characterization for hamiltonian graphs. But it is not a coindex for all graphs.
Abstract: In this paper, we have investigated the first Zagreb coindex of Hamiltonian graphs which may be helpful to find the characterization for hamiltonian graphs.
TL;DR: This game is shown to be equivalent to two fuzzy linear programming problems involving piecewise linear membership functions and the crisp equivalent of theses problems are formulated using Yang et al.
Abstract: This paper studies two person zero sum matrix games with Atanassov’s I-fuzzy goals. The indeterminacy factor in the goals of each player is resolved using Yager’s indeterminacy resolution principle [38] and Hurwicz optimism-pessimism criterion [20]. This game is shown to be equivalent to two fuzzy linear programming problems involving piecewise linear membership functions. The crisp equivalent of theses problems are formulated using Yang et al. [39] and Inuiguchi et al. [21] approaches.
TL;DR: This paper constructs the multiple objectives programming for the PCB line assignment problem based on the Assignment Problem (AP) and Transportation Problem (TP) models, which employs the fuzzy goal programming technique with nonlinear membership function for solving thismultiple objectives programming problem.
Abstract: In this paper, we construct the multiple objectives programming for the PCB line assignment problem based on the Assignment Problem (AP) and Transportation Problem (TP) models, which employs the fuzzy goal programming technique with nonlinear membership function for solving this multiple objectives programming problem. This computational mathematics has been addressed to solve an AP under uncertainty and in real world scenarios is using fuzzy theory. Fuzzy goal programming technique usually deals with flexible aspiration levels that are indicative of optimality when considering all objectives or goals simultaneously with possible deviation in objectives or constraints in vague, imprecise and uncertain environment. Therefore; the proposed model will give a compromise solution for suitable optimality and adjust the interval objective values of the upper and lower bounds of each objective function for parameters being considered in uncertain environment. Finally, a case study is taken to illustrate t...
TL;DR: In this article, the authors studied unit graphs of Symmetric, Quaternion and Heisenberg groups and also study of different properties like the subgroups of a group, normal subgroups are carried out using the unit graph of the group.
Abstract: We represent finite group in the form of a graph, these graphs are called unit graph. In this paper we shall study unit graphs of Symmetric, Quaternion and Heisenberg groups. Also study of different properties like the subgroups of a group, normal subgroups of a group are carried out using the unit graph of the group.
TL;DR: In this article, a photonic crystal based 1 × 2 decoder is proposed with dual output logic using T-shaped beam splitters and waveguides which can also be used for the concurrent implementation of X.
Abstract: In this article, a photonic crystal based 1 × 2 decoder is proposed with dual output logic using T-shaped beam splitters and waveguides which can also be used for the concurrent implementation of X...
TL;DR: In this article, the authors proposed an analysis framework for comparing CCTV legislation and privacy protection among Taiwan, the United Kingdom (UK), and Japan in an attempt to reverse the phenomenon of safety outweighing privacy.
Abstract: Closed-circuit television (CCTV) surveillance can be used to effectively prevent crime and enable people to feel safe, but most countries tend to emphasize safety over privacy. This study proposed an analysis framework for comparing CCTV legislation and privacy protection among Taiwan, the United Kingdom (UK), and Japan in an attempt to reverse the phenomenon of safety outweighing privacy. The UK and Japan have the richest CCTV studies worldwide and in Asia, respectively. In contrast, Taiwan has dense installation but few CCTV studies. Furthermore, the local CCTV studies in Japan and Taiwan are unfamiliar to the West. Comparison results indicated that the largest disparities in CCTV policy were related to dissimilar regulations and cultures, but the three countries consistently adhered to the principle of protecting public privacy. Based on the comparison, the study referenced relevant research to discuss the CCTV legislation among the three countries and propose practical and research recommendat...
TL;DR: Investigation of various NoC topologies are investigated and analysis is done on basis of average throughput and average latency for ensuring network performance.
Abstract: Network on chip architecture provides a way to design complex integrated circuits with an objective to reduce connection issues, design productivity, and energy utilization. Network performance of a network is calculated by various factors but throughput is the most dominant characteristic for measuring network performance. So, this work includes investigation of various NoC topologies and analysis is done on basis of average throughput and average latency for ensuring network performance.
TL;DR: Performance analysis of cooperative spectrum sharing network using multi-antenna based Adaptive Hybrid Relay (AHR) scheme in presence of multiple primary users under non-identical Rayleigh fading channel shows that the outage performance increases with increse in number of primary users (PUs).
Abstract: Performance analysis of cooperative spectrum sharing network using multi-antenna based Adaptive Hybrid Relay (AHR) scheme in presence of multiple primary users under non-identical Rayleigh fading channel has been studied in this paper. An Adaptive Hybrid Relay equipped with multiple antennas at the input employs selection combining (SC) on the signals received from secondary user source (S) via multiple receiving antenna at the input and forwards the received signal to secondary user destination (D). The outage probability has been evaluated at the secondary destination where Best Relay Selection (BRS) scheme is used. The comparison between outage performances of cooperative spectrum sharing for Amplify-and-Forward (AF), Decode-and-Forward (DF) and Adaptive Hybrid Relay (AHR) scheme is also presented. The effects of number of relay antennas (L), number of relays (K) and number of primary users (PUs) on the system performance have also been studied. It is also seen that the outage performance increases with increse in number of primary users (PUs). A tradeoff between number of relay and number of antenna at each relay is also shown.
TL;DR: Object oriented approach is used in the simulation designing of new protocol and B92 protocol and a new protocol is proposed which is a variation over B 92 protocol, second the design of simulation setup is discussed.
Abstract: Quantum key distribution is the latest advancement in quantum cryptography. There are several QKD protocols like BB84, B92, Ekert91, COW, SARG04, etc. out of which B92 is the Second protocol developed in 1992 based on Heisenberg’s Uncertainty Principle. In this paper we are discussing first about the working of B92 protocol and then proposing a new protocol which is a variation over B92 protocol, second the design of simulation setup is discussed. Object oriented approach is used in the simulation designing of new protocol and B92 protocol.