IJISA Vol. 11, No. 11, Nov. 2019
Cover page and Table of Contents: PDF (size: 187KB)
Nowadays, the security of confidential data is the vital issue in the digital world. Information security becomes even more essential in storing and transmitting data while online. For protecting digital data and achieving security and confidentiality over an insecure internet, the iterative Bat-Genetic Encryption Technique (B-GET) is proposed. The main stages of B-GET are pre-processing, encryption process, bat algorithm steps, and genetic processes. B-GET also comprises an arithmetic and logical operators that increase encryption quality. Empirical results show that the reconstructed data is a copy of the original. It also demonstrates that B-GET technique has a large space key and several defensive stages that resist many attacks and it has strong security based on multiple steps, multiple variables, and the main stages of the B-GET technique. Encrypted data is nearly random and does not contain any indication to secret data.[...] Read more.
Manually, to manage stocks amounts spending the every day in the rays to count for each product the number which it remains in stores, or to record by a scanner head barcode information dependent of each product. However, the mission become increasingly difficult if several warehouses are found, that involves much time to pass from a product to another, moreover that requires agents to carry out these spots. In this article we use a network architecture neuron combined with the readers bar code of technology vision, this method allows to know in real time information concerning each product in stock. It will allow besides introducing the concept of real stocks rather than physical. However The basic classical use of data and to feed it will be completely changed by the spheres of knowledge which generates the NN (Neural Network) to store information on the quantity at a given time (Dynamic inventory), the entries(delivery of suppliers ) and the outputs ( delivery or sale with the customers and use of manufacturing pieces or repair ).[...] Read more.
Nowadays, Intelligent Transportation Systems (ITS) are known as powerful solutions for handling traffic-related issues. ITS are used in various applications such as traffic signal control, vehicle counting, and automatic license plate detection. In the special case, video cameras are applied in ITS which can provide useful information after processing their outputs, known as Video-based Intelligent Transportation Systems (V-ITS). Among various applications of V-ITS, automatic vehicle speed measurement is a fast-growing field due to its numerous benefits. In this regard, visual appearance-based methods are common types of video-based speed measurement approaches which suffer from a computationally intensive performance. These methods repeatedly search for special visual features of vehicles, like the license plate, in consecutive frames. In this paper, a parallelized version of an appearance-based speed measurement method is presented which is real-time and requires lower computational costs. To acquire this, data-level parallelism was applied on three computationally intensive modules of the method with low dependencies using NVidia’s CUDA platform. The parallelization process was performed by the distribution of the method’s constituent modules on multiple processing elements, which resulted in better throughputs and massively parallelism. Experimental results have shown that the CUDA-enabled implementation runs about 1.81 times faster than the main sequential approach to calculate each vehicle’s speed. In addition, the parallelized kernels of the mentioned modules provide 21.28, 408.71 and 188.87 speed-up in singularly execution. The reason for performing these experiments was to clarify the vital role of computational cost in developing video-based speed measurement systems for real-time applications.[...] Read more.
Scour around the bridge pier is one of the major factors which affect the safety and stability of the bridge structure. Due to the presence of complexity in the scour mechanism, there is no common and simple method to estimate the scour depth. The present paper gives an idea of hybridizing two techniques such as an artificial neural network with swarm intelligence technique particle swarm optimization to estimate the scour depth around the bridge pier and abbreviated as PSO-ANN. The present discussion covers the estimation of scour depth for clear water and live bed scour condition around circular and rectangular pier shapes. The independent variables, Sediment size (d50), sediment quantity (Sq), velocity (u) and time (t) are used as input to develop the models to estimate or quantify a dependent variable scour depth (ds). The efficiency and accuracy of the model are measured using model performances indicators such as Correlation Coefficient (CC), Normalized Root Mean Square Error (NRMSE), Nash Sutcliffe Error (NSE), and Normalized Mean Bias (NMB). The predicted results of both the models are compared with each other and also compared with measured scour depth. The study concludes that the proposed PSO-ANN model is suitable to estimate the scour depth in both the cases for circular and rectangular pier shapes.[...] Read more.
Cyberbullying is an intentional action of harassment along the complex domain of social media utilizing information technology online. This research experimented unsupervised associative approach on text mining technique to automatically find cyberbullying words, patterns and extract association rules from a collection of tweets based on the domain / frequent words. Furthermore, this research identifies the relationship between cyberbullying keywords with other cyberbullying words, thus generating knowledge discovery of different cyberbullying word patterns from unstructured tweets. The study revealed that the type of dominant frequent cyberbullying words are intelligence, personality, and insulting words that describe the behavior, appearance of the female victims and sex related words that humiliate female victims. The results of the study suggest that we can utilize unsupervised associative approached in text mining to extract important information from unstructured text. Further, applying association rules can be helpful in recognizing the relationship and meaning between keywords with other words, therefore generating knowledge discovery of different datasets from unstructured text.[...] Read more.
The feature of the fractional order derivative and fractional order integration is one of the important tools to realize the beauty of the fractional calculus. Fractional order derivative and integration has a long history like classical calculus but its users are much less compared to the classical calculus. The purpose of this paper is to study an inventory model with linear type demand rate under the fuzzy environment. This paper also wants to introduce the memory effect property of fractional order derivative which can help to setup the model more authentic. Two advantages have been included to the model (i) memory effect,(ii) fuzzy environment. Here, the fractional order model is defuzzyfied using (i) signed distance method,(ii) graded mean integration method. Fuzzification can close to the reality with incorporating uncertainty behavior of some economic parameters of the inventory system and fractional order can explain the memory phenomena. For this problem due to illustrate defuzzification, set up cost, holding cost per unit, per unit cost are assumed as triangular fuzzy numbers. Fractional order derivative and integration are applied to develop the whole work. It is known that fractional calculus is a valuable tool to describe memory phenomena. Fractional order is established as the index of the memory. In this paper, depending on strength of memory, memory phenomena considered in two steps(i) long memory,(ii) short memory. The proposed fuzzy models and technique lastly have been illustrated. Results of two defuzzyfications are compared with graphical presentations. This present studies can help to moderate the classical fuzzy inventory model. From the numerical studied it is observed that in long memory effect, profit is good compared to the low memory effect or memory less system.[...] Read more.