首页 > 最新文献

Journal of Computational and Theoretical Nanoscience最新文献

英文 中文
Multi Objective Task Scheduling Algorithm in Cloud Computing Using the Hybridization of Particle Swarm Optimization and Cuckoo Search 基于粒子群优化和布谷鸟搜索的云计算多目标任务调度算法
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9427
S. Mangalampalli, Vamsi Krishna Mangalampalli, S. K. Swain
Rapid growth has been occurred in the IT industry with the emergence of Cloud computing in terms of the resources provisioned to the users in a seamless and flexible way. Task Scheduling is a prodigious challenge in the Cloud Computing. It is difficult to schedule the continuously varying requests to schedule on continuously varying resources. The existing approaches haven’t considered all the metrics while considering only the metrics like makespan and waiting time. In this paper, our focus is to formulate a Multi objective approach which is used to optimally map and load balance the tasks in the cloud by calculating the task priority and VM priority based on the electricity price per unit cost while minimizing the makespan, migration time and the power cost in the datacenters. The proposed algorithm is modeled using the hybridized approach by combining PSO and Cuckoo search algorithms. It is simulated on cloudsim simulator and it is compared against the basic ACO, GA, PSO and CS algorithms and our algorithm is outperformed against these basic algorithms with concerned parameters such as makespan, Migration time and the Total Power cost in the datacenters.
随着云计算的出现,IT行业以无缝和灵活的方式向用户提供资源,实现了快速增长。任务调度是云计算领域的一个巨大挑战。将连续变化的请求调度到连续变化的资源上是困难的。现有的方法没有考虑所有的指标,而只考虑了完工时间和等待时间等指标。在本文中,我们的重点是制定一种多目标方法,通过基于单位成本电价计算任务优先级和VM优先级,同时最小化数据中心的完工时间、迁移时间和电力成本,来优化映射和负载平衡云中的任务。将粒子群算法和杜鹃搜索算法相结合,使用混合方法对所提出的算法进行建模。它在cloudsim模拟器上进行了模拟,并与基本的ACO、GA、PSO和CS算法进行了比较,在数据中心的完工时间、迁移时间和总功率成本等相关参数方面,我们的算法优于这些基本算法。
{"title":"Multi Objective Task Scheduling Algorithm in Cloud Computing Using the Hybridization of Particle Swarm Optimization and Cuckoo Search","authors":"S. Mangalampalli, Vamsi Krishna Mangalampalli, S. K. Swain","doi":"10.1166/JCTN.2020.9427","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9427","url":null,"abstract":"Rapid growth has been occurred in the IT industry with the emergence of Cloud computing in terms of the resources provisioned to the users in a seamless and flexible way. Task Scheduling is a prodigious challenge in the Cloud Computing. It is difficult to schedule the continuously varying\u0000 requests to schedule on continuously varying resources. The existing approaches haven’t considered all the metrics while considering only the metrics like makespan and waiting time. In this paper, our focus is to formulate a Multi objective approach which is used to optimally map and\u0000 load balance the tasks in the cloud by calculating the task priority and VM priority based on the electricity price per unit cost while minimizing the makespan, migration time and the power cost in the datacenters. The proposed algorithm is modeled using the hybridized approach by combining\u0000 PSO and Cuckoo search algorithms. It is simulated on cloudsim simulator and it is compared against the basic ACO, GA, PSO and CS algorithms and our algorithm is outperformed against these basic algorithms with concerned parameters such as makespan, Migration time and the Total Power cost in\u0000 the datacenters.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5346-5357"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48534318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Thing Based Smart Traffic Control Signal Using Solar Energy 基于物联网的太阳能智能交通控制信号
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9425
V. Kalpana, S. Shanthi, A. S. F. Britto, N. Prakash
Nowadays traffic congestion is major problem in all over the cities. The cities are renovated to “smart cities” by using Information and Communication Technologies (ICT). The IoT are playing a vital role in smart cities. This work proposes Internet of Thing (IoT) based smart traffic control signal using solar energy for smart cities. This signal is always coordinated with the emergency vehicle like ambulance to discover the signal and select the route where road traffic is dynamically controlled and the traffic violation vehicles are identified by traffic monitoring officers through internet. The traffic control signal lights are automatically controlled by Raspberry Pi controller with the help of IR sensor and RF signal. If any emergency vehicle will come nearby traffic control signal then the green signal shows for emergency vehicle and the remaining paths are shows as red signal.
如今,交通拥堵是各个城市的主要问题。通过使用信息和通信技术(ICT),这些城市被改造为“智能城市”。物联网在智能城市中发挥着至关重要的作用。这项工作提出了基于物联网(IoT)的智能交通控制信号,利用太阳能用于智能城市。该信号始终与救护车等应急车辆协调,发现信号并选择道路交通动态控制的路线,交通监控人员通过互联网识别交通违法车辆。交通控制信号灯由Raspberry Pi控制器在IR传感器和RF信号的帮助下自动控制。如果任何应急车辆靠近交通控制信号灯,则应急车辆显示绿色信号灯,其余路径显示红色信号灯。
{"title":"Internet of Thing Based Smart Traffic Control Signal Using Solar Energy","authors":"V. Kalpana, S. Shanthi, A. S. F. Britto, N. Prakash","doi":"10.1166/JCTN.2020.9425","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9425","url":null,"abstract":"Nowadays traffic congestion is major problem in all over the cities. The cities are renovated to “smart cities” by using Information and Communication Technologies (ICT). The IoT are playing a vital role in smart cities. This work proposes Internet of Thing (IoT) based smart\u0000 traffic control signal using solar energy for smart cities. This signal is always coordinated with the emergency vehicle like ambulance to discover the signal and select the route where road traffic is dynamically controlled and the traffic violation vehicles are identified by traffic monitoring\u0000 officers through internet. The traffic control signal lights are automatically controlled by Raspberry Pi controller with the help of IR sensor and RF signal. If any emergency vehicle will come nearby traffic control signal then the green signal shows for emergency vehicle and the remaining\u0000 paths are shows as red signal.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5334-5338"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46233585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pneumonia Detection Using Deep Learning Architectures 使用深度学习架构进行肺炎检测
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9450
Purohit Om Hemantkumar, R. Lodha, Meghna Bajoria, R. Sujatha
Pneumonia is an infection caused by bacteria and viruses. It can shift from mellow to serious cases. This disease causes severe damages to the lungs since they fill with fluids. This situation causes difficulty in breathing. It further prevents oxygen to reach the blood. Pneumonia is diagnosed with the help of a chest X-rays, which can also use in the diagnosis of diseases like emphysema, lung cancer, and tuberculosis. According to WHO (World Health Organization (WHO). 2001. Standardization of Interpretation of Chest Radiographs for the Diagnosis of Pneumonia in Children. p.4.), Chest X-rays, at present, is the best available method for detecting pneumonia. Feature extraction methods like DiscreteWavelet Transform (DWT),Wavelet Frame Transform (WFT), andWavelet Packet Transform (WPT) can be used followed by any classification algorithm. In this paper, models like Squeezenet, DenseNet, and Resnet34 have been used for image recognition. In our system, the medical images were taken from Kaggle database and were recorded using a suitable imaging system. The images retrieved were then considered for input for the system where the images go through the various phases of image processing like pre-processing, edge detection and feature extraction. Later, a variety of training models are applied to know which model offers the highest accuracy.
肺炎是一种由细菌和病毒引起的感染。它可以从温和的转变为严重的病例。这种疾病对肺部造成严重损害,因为肺部充满液体。这种情况会导致呼吸困难。它进一步阻止氧气进入血液。肺炎是在胸部x光片的帮助下诊断出来的,它也可以用于诊断肺气肿、肺癌和肺结核等疾病。根据卫生组织(世界卫生组织)。2001. 儿童肺炎诊断胸片解释的标准化。目前,胸部x光片是检测肺炎的最佳方法。特征提取方法,如离散小波变换(DWT)、小波帧变换(WFT)和小波包变换(WPT),可以在任何分类算法之后使用。本文使用了Squeezenet、DenseNet和Resnet34等模型进行图像识别。在我们的系统中,医学图像取自Kaggle数据库,并使用合适的成像系统进行记录。然后将检索到的图像考虑为系统输入,其中图像经过预处理,边缘检测和特征提取等图像处理的各个阶段。然后,应用各种各样的训练模型来了解哪种模型的准确率最高。
{"title":"Pneumonia Detection Using Deep Learning Architectures","authors":"Purohit Om Hemantkumar, R. Lodha, Meghna Bajoria, R. Sujatha","doi":"10.1166/JCTN.2020.9450","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9450","url":null,"abstract":"Pneumonia is an infection caused by bacteria and viruses. It can shift from mellow to serious cases. This disease causes severe damages to the lungs since they fill with fluids. This situation causes difficulty in breathing. It further prevents oxygen to reach the blood. Pneumonia is\u0000 diagnosed with the help of a chest X-rays, which can also use in the diagnosis of diseases like emphysema, lung cancer, and tuberculosis. According to WHO (World Health Organization (WHO). 2001. Standardization of Interpretation of Chest Radiographs for the Diagnosis of Pneumonia in Children.\u0000 p.4.), Chest X-rays, at present, is the best available method for detecting pneumonia. Feature extraction methods like DiscreteWavelet Transform (DWT),Wavelet Frame Transform (WFT), andWavelet Packet Transform (WPT) can be used followed by any classification algorithm. In this paper, models\u0000 like Squeezenet, DenseNet, and Resnet34 have been used for image recognition. In our system, the medical images were taken from Kaggle database and were recorded using a suitable imaging system. The images retrieved were then considered for input for the system where the images go through\u0000 the various phases of image processing like pre-processing, edge detection and feature extraction. Later, a variety of training models are applied to know which model offers the highest accuracy.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5535-5542"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49055706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modified Data Storage and Replication Mechanism with Frequent Use-Case Based Indexing 基于频繁用例索引的改进数据存储和复制机制
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9413
P. Selvaraj, V. Kannan, Bruno Voisin
The real time applications demands high speed and reliable data access from the remote database. An effective logical data management strategy that handles simultaneous connections with better performance negotiation is inevitable. This work considers an e-health care application that proposes MongoDB based modified indexing and performance tuning methods. To cope with certain high frequency use case and its performance mandates, a flexible and efficient logical data management may be preferred. By analysing the data dependency, data decomposition concerns and the performance requirements of the specific use case of the medical application, a logical schema may be customized on an ala-carte basis. This work focused on the flexible logical data modeling schemes and its performance factors of the NoSql DB. The efficiency of unstructured data base management in storing and retrieving the e-health care data was analysed with a web based tool. To enable faster data retrieval and query processing over the distributed nodes, a Spark based storage engine was built on top of the MongoDB based data storage management. With Spark tool, the database has been made distributed as master–slave structures with suitable data replication mechanisms. In such distributed database the fail-over also implemented with the suitable replication mechanism. This work considered MongoDB based flexible schema modeling and Spark based distributed computation with multiple chunks of data. The flexible data modeling scheme with MongoDB with the on-demand Spark based computation framework was proposed. To facilitate the eventual consistency, scalability aspects of the e-health care applications, use case based indexing was proposed. With the effective data management, faster query processing the horizontal scalability has been increased. The overall efficiency and scalability of the proposed logical data management approach was analysed. Through the simulation studies, the proposed approach has been claimed to boost the performance of the bigdata based application to a considerable extent.
实时应用程序要求从远程数据库进行高速可靠的数据访问。一种有效的逻辑数据管理策略是不可避免的,它可以通过更好的性能协商来处理同时的连接。这项工作考虑了一个电子医疗保健应用程序,该应用程序提出了基于MongoDB的修改索引和性能调优方法。为了应对某些高频用例及其性能要求,可能首选灵活高效的逻辑数据管理。通过分析医疗应用程序特定用例的数据依赖性、数据分解问题和性能要求,可以在点菜的基础上定制逻辑模式。本文重点研究了NoSql数据库灵活的逻辑数据建模方案及其性能因素。使用基于web的工具分析了非结构化数据库管理在存储和检索电子医疗保健数据方面的效率。为了在分布式节点上实现更快的数据检索和查询处理,在基于MongoDB的数据存储管理之上构建了一个基于Spark的存储引擎。使用Spark工具,数据库以主从结构的形式分布,并具有适当的数据复制机制。在这样的分布式数据库中,故障转移也通过适当的复制机制来实现。这项工作考虑了基于MongoDB的灵活模式建模和基于Spark的多数据块分布式计算。提出了一种基于需求Spark计算框架的灵活的MongoDB数据建模方案。为了促进电子医疗应用程序的最终一致性和可扩展性,提出了基于用例的索引。有了有效的数据管理,查询处理速度更快,横向可扩展性也得到了提高。分析了所提出的逻辑数据管理方法的总体效率和可扩展性。通过仿真研究,该方法在很大程度上提高了基于大数据的应用程序的性能。
{"title":"Modified Data Storage and Replication Mechanism with Frequent Use-Case Based Indexing","authors":"P. Selvaraj, V. Kannan, Bruno Voisin","doi":"10.1166/JCTN.2020.9413","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9413","url":null,"abstract":"The real time applications demands high speed and reliable data access from the remote database. An effective logical data management strategy that handles simultaneous connections with better performance negotiation is inevitable. This work considers an e-health care application that\u0000 proposes MongoDB based modified indexing and performance tuning methods. To cope with certain high frequency use case and its performance mandates, a flexible and efficient logical data management may be preferred. By analysing the data dependency, data decomposition concerns and the performance\u0000 requirements of the specific use case of the medical application, a logical schema may be customized on an ala-carte basis. This work focused on the flexible logical data modeling schemes and its performance factors of the NoSql DB. The efficiency of unstructured data base management in storing\u0000 and retrieving the e-health care data was analysed with a web based tool. To enable faster data retrieval and query processing over the distributed nodes, a Spark based storage engine was built on top of the MongoDB based data storage management. With Spark tool, the database has been made\u0000 distributed as master–slave structures with suitable data replication mechanisms. In such distributed database the fail-over also implemented with the suitable replication mechanism. This work considered MongoDB based flexible schema modeling and Spark based distributed computation with\u0000 multiple chunks of data. The flexible data modeling scheme with MongoDB with the on-demand Spark based computation framework was proposed. To facilitate the eventual consistency, scalability aspects of the e-health care applications, use case based indexing was proposed. With the effective\u0000 data management, faster query processing the horizontal scalability has been increased. The overall efficiency and scalability of the proposed logical data management approach was analysed. Through the simulation studies, the proposed approach has been claimed to boost the performance of the\u0000 bigdata based application to a considerable extent.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5229-5237"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49361864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network 无线网络中可信密钥管理协议(TKMP)的实现
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9415
R. Jayaprakash, B. Radha
The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS (Dynamic Load Balancing Privacy Path Selection) procedure. To lock the data from the malicious node, the Paillier Cryptosystem (PC) encrypts packets with homomorphic encryption. The trust score makes it easier to update routing information and improves network throughput. The experimental results show that the proposed TKMP method works better than the other Trust-ECC method.
可信密钥管理协议(TKMP)提供了基于MANET集群的数据保护中最安全的通信技术之一。出于安全原因,TKMP是一个受信任的密钥,可以发送到通信集群中的所有节点。本文档介绍了可信密钥管理协议(TKMP)功能,以提高基于集群的无线网络上的安全通信质量。所提出的TKMP执行过程包括CBPPRS(基于集群的隐私保护路由选择)、LBCPR(基于负载平衡集群的隐私路由)和DLBPS(动态负载平衡隐私路径选择)过程。为了锁定来自恶意节点的数据,Paillier密码系统(PC)使用同态加密对数据包进行加密。信任分数使更新路由信息更加容易,并提高了网络吞吐量。实验结果表明,所提出的TKMP方法比其他信任ECC方法效果更好。
{"title":"An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network","authors":"R. Jayaprakash, B. Radha","doi":"10.1166/JCTN.2020.9415","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9415","url":null,"abstract":"The Trusted Key Management Protocol (TKMP) provides one of the most secure communication technologies in MANET cluster-based data protection. For security reasons, TKMP is a trusted key that can be sent to all nodes in the communication cluster. This document introduces the Trusted\u0000 Key Management Protocol (TKMP) feature to improve the quality of secure communications over a cluster-based wireless network. The proposed TKMP execution process includes CBPPRS (Cluster Based Privacy Preserving Routing Selection), LBCPR (Load Balancing Cluster Based Privacy Routing) and DLBPS\u0000 (Dynamic Load Balancing Privacy Path Selection) procedure. To lock the data from the malicious node, the Paillier Cryptosystem (PC) encrypts packets with homomorphic encryption. The trust score makes it easier to update routing information and improves network throughput. The experimental\u0000 results show that the proposed TKMP method works better than the other Trust-ECC method.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5243-5249"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47609736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things (IoT) Based Automated Calamity Avoidance System for Railway Sectors 基于物联网(IoT)的铁路部门自动化灾难规避系统
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9433
A. Ranjith, S. Vijayaragavan
Tanzania is the regional gateway for a number of landlocked neighboring countries. Zambia, Burundi, Malawi, Congo, Rwanda and Uganda all rely to certain extent on the countries transport network, linking them to the global network. Railways are found to be the most effective transport system in Tanzania after-road transport system and it is Critical to long-haul freight along the main transport corridors of Tanzania. Most of the operations at Tanzania Railway Sector are manual system. For instance closing and opening of the gates are not automatic resulting in calamities and delays in the train’s advent. An innovative method to enhance railway safety measures is proposed in this Paper. This research paper proposes mechanisms which operate automatically without any 600073 intervention. Internet of Things (IoT) can be used to increase different features of the rail system. Automation of railways can transform the current legacy approaches and help decrease the railway related accidents considerably. Many challenges are underscored and dealt with in the proposed research. To summate, this paper aims at enhancing rail safety, minimizing accidents at unmanned level crossings, introducing smart railway gates, preventing calamity, and incorporating digital transformation through the use of IoT.
坦桑尼亚是许多内陆邻国的区域门户。赞比亚、布隆迪、马拉维、刚果、卢旺达和乌干达都在一定程度上依赖这些国家的运输网络,将它们与全球网络联系起来。铁路是坦桑尼亚仅次于公路运输系统的最有效的运输系统,对坦桑尼亚主要运输走廊的长途货运至关重要。坦桑尼亚铁路部门的大部分运营都是手动系统。例如,车门的关闭和打开并不是自动的,这会导致灾难和列车延误。本文提出了一种加强铁路安全措施的创新方法。这篇研究论文提出了在没有任何600073干预的情况下自动运行的机制。物联网(IoT)可用于增加铁路系统的不同功能。铁路自动化可以改变目前遗留的方法,并有助于大幅减少与铁路相关的事故。拟议的研究强调并处理了许多挑战。总之,本文旨在加强铁路安全,最大限度地减少无人平交道口的事故,引入智能铁路闸门,预防灾难,并通过物联网实现数字化转型。
{"title":"Internet of Things (IoT) Based Automated Calamity Avoidance System for Railway Sectors","authors":"A. Ranjith, S. Vijayaragavan","doi":"10.1166/JCTN.2020.9433","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9433","url":null,"abstract":"Tanzania is the regional gateway for a number of landlocked neighboring countries. Zambia, Burundi, Malawi, Congo, Rwanda and Uganda all rely to certain extent on the countries transport network, linking them to the global network. Railways are found to be the most effective transport\u0000 system in Tanzania after-road transport system and it is Critical to long-haul freight along the main transport corridors of Tanzania. Most of the operations at Tanzania Railway Sector are manual system. For instance closing and opening of the gates are not automatic resulting in calamities\u0000 and delays in the train’s advent. An innovative method to enhance railway safety measures is proposed in this Paper. This research paper proposes mechanisms which operate automatically without any 600073 intervention. Internet of Things (IoT) can be used to increase different features\u0000 of the rail system. Automation of railways can transform the current legacy approaches and help decrease the railway related accidents considerably. Many challenges are underscored and dealt with in the proposed research. To summate, this paper aims at enhancing rail safety, minimizing accidents\u0000 at unmanned level crossings, introducing smart railway gates, preventing calamity, and incorporating digital transformation through the use of IoT.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5399-5408"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43322076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model 基于切片、标记化和加密的组合方法,利用TF-Sec模型保护云中的静态数据
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9421
N. Keerthana, Viji Vinod, Sudhakar Sengan
Data in the Cloud, which applies to data as a cloud service provider (CSP), transmits stores, or manages it. The company will enforce the same definition of data usage while the data is resident within the enterprise and thus extend the required cryptographic security criteria to data collected, exchanged, or handled by CSP. The CSP Service Level Agreements cannot override the cryptographic access measures. When the data is transferred securely to CSP, it can be securely collected, distributed, and interpreted. Data at the rest position applies to data as it is processed internally in organized and in the unstructured ways like databases and file cabinets. The Data at the Rest example includes the use of cryptography for preserving the integrity of valuable data when processed. For cloud services, computing takes multiple forms from recording units, repositories, and many unstructured items. This paper presents a secure model for Data at rest. The TF-Sec model suggested is planned for use with Slicing, Tokenization, and Encryption. The model encrypts the given cloud data using AES 256 encryption, and then the encrypted block is sliced into the chunks of data fragments using HD-Slicer. Then it applies tokenization algorithm TKNZ to each chunk of data, applies erasure coding technique to tokens, applies the data dispersion technique to scramble encrypted data fragments, and allocates to storage nodes of the multiple CSP. In taking the above steps, this study aims to resolve the cloud security problems found and to guarantee the confidentiality of their data to cloud users due to encryption of data fragments would be of little benefit to a CSP.
云中数据,作为云服务提供商(CSP)应用于数据,传输、存储或管理数据。当数据驻留在企业内时,该公司将强制执行相同的数据使用定义,从而将所需的加密安全标准扩展到CSP收集、交换或处理的数据。CSP服务级别协议无法覆盖加密访问措施。当数据安全地传输到CSP时,就可以安全地收集、分发和解释数据。静止位置的数据适用于以有组织和非结构化方式(如数据库和文件柜)在内部处理的数据。休息时的数据示例包括在处理时使用密码学来保持有价值数据的完整性。对于云服务,计算采用多种形式,包括记录单元、存储库和许多非结构化项目。本文提出了一个静态数据的安全模型。所提出的TF-Sec模型计划用于切片、令牌化和加密。该模型使用AES256加密对给定的云数据进行加密,然后使用HD Slicer将加密的块分割成数据片段块。然后,它将标记化算法TKNZ应用于每个数据块,将擦除编码技术应用于标记,将数据分散技术应用于加密的数据片段,并分配给多个CSP的存储节点。在采取上述步骤的过程中,本研究旨在解决发现的云安全问题,并保证其数据对云用户的机密性,因为数据片段的加密对CSP几乎没有好处。
{"title":"Slicing, Tokenization, and Encryption Based Combinational Approach to Protect Data-at-Rest in Cloud Using TF-Sec Model","authors":"N. Keerthana, Viji Vinod, Sudhakar Sengan","doi":"10.1166/JCTN.2020.9421","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9421","url":null,"abstract":"Data in the Cloud, which applies to data as a cloud service provider (CSP), transmits stores, or manages it. The company will enforce the same definition of data usage while the data is resident within the enterprise and thus extend the required cryptographic security criteria to data\u0000 collected, exchanged, or handled by CSP. The CSP Service Level Agreements cannot override the cryptographic access measures. When the data is transferred securely to CSP, it can be securely collected, distributed, and interpreted. Data at the rest position applies to data as it is processed\u0000 internally in organized and in the unstructured ways like databases and file cabinets. The Data at the Rest example includes the use of cryptography for preserving the integrity of valuable data when processed. For cloud services, computing takes multiple forms from recording units, repositories,\u0000 and many unstructured items. This paper presents a secure model for Data at rest. The TF-Sec model suggested is planned for use with Slicing, Tokenization, and Encryption. The model encrypts the given cloud data using AES 256 encryption, and then the encrypted block is sliced into the chunks\u0000 of data fragments using HD-Slicer. Then it applies tokenization algorithm TKNZ to each chunk of data, applies erasure coding technique to tokens, applies the data dispersion technique to scramble encrypted data fragments, and allocates to storage nodes of the multiple CSP. In taking the above\u0000 steps, this study aims to resolve the cloud security problems found and to guarantee the confidentiality of their data to cloud users due to encryption of data fragments would be of little benefit to a CSP.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5296-5306"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43531499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Internet of Thing in Smart Manufacturing Industry 智能制造行业物联网分析
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9444
M. Dharmalingam, B. Umarani, R. Shankar, K. Kumar
The IoT (Internet of Thing) envisage is the unified interlinking to the fake space and the physical planet. This offers an encouraging chance to build influential facilities and services provided by the applications for industrial production. This article offers an overview of major research problems that need to be adopted and the latest developments in that field of IoT-aided industrial production. Initially, the core technologies of IoT like Big information, Cloud computer, Wireless antenna Network, and Radio Incidence Identification has been described. Then certain key research problems of IoT-aided industrial production has been described in accordance with architecture, implementation and enterprise model, data collection and handling, reduction of latency with state-of-theart reviews, user-centric pervasive environment, dynamic service composition, and model-based decision-making. At last, some possible application fields of IoT in the industrial sector have been described.
物联网(Internet of Thing)设想的是虚拟空间和物理星球的统一互联。这为建立工业生产应用程序提供的有影响力的设施和服务提供了一个令人鼓舞的机会。本文概述了物联网辅助工业生产领域需要采用的主要研究问题以及该领域的最新进展。初步阐述了物联网的大信息、云计算机、无线天线网络、无线射频识别等核心技术。然后,从物联网辅助工业生产的体系结构、实现与企业模型、数据采集与处理、基于状态评审的延迟降低、以用户为中心的普及环境、动态服务组合、基于模型的决策等方面阐述了物联网辅助工业生产的若干关键研究问题。最后,对物联网在工业领域的应用前景进行了展望。
{"title":"Analysis of Internet of Thing in Smart Manufacturing Industry","authors":"M. Dharmalingam, B. Umarani, R. Shankar, K. Kumar","doi":"10.1166/JCTN.2020.9444","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9444","url":null,"abstract":"The IoT (Internet of Thing) envisage is the unified interlinking to the fake space and the physical planet. This offers an encouraging chance to build influential facilities and services provided by the applications for industrial production. This article offers an overview of major\u0000 research problems that need to be adopted and the latest developments in that field of IoT-aided industrial production. Initially, the core technologies of IoT like Big information, Cloud computer, Wireless antenna Network, and Radio Incidence Identification has been described. Then certain\u0000 key research problems of IoT-aided industrial production has been described in accordance with architecture, implementation and enterprise model, data collection and handling, reduction of latency with state-of-theart reviews, user-centric pervasive environment, dynamic service composition,\u0000 and model-based decision-making. At last, some possible application fields of IoT in the industrial sector have been described.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5495-5502"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46134113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TCHCN: Trust Computation for Hierarchical Clustering Network to Improve Network Lifetime in Wireless Sensor Network 基于层次聚类网络的信任计算提高无线传感器网络的生存期
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9446
P. Manasa, K. Shaila, K. Venugopal
Network Lifetime of sensor node plays a fundamental role in Wireless Sensor Networks, since they drain out energy during the communication. The hierarchical networks assist in hindering energy loss by exchanging the information at various levels. The Hierarchical levels formed avoid overburdening of single level cluster zones and helps the network to retain energy of cluster level heads. Malicious attack disturbs the regular functionality of a routing algorithm and deviates QoS performance in the network. The existing LEACH-Mobile protocol adopts low energy clustering techniques but, falls short in providing security of the network when there is malicious attack. The proposed Trust Computation for Hierarchical Clustering Network protocol proves itself to be trustworthy by having various trust measuring metrics. It enhances the lifetime by adopting low energy hierarchical protocol and shows improvement of 12% in terms of energy consumption.
传感器节点的网络寿命在无线传感器网络中起着至关重要的作用,因为它们在通信过程中消耗着能量。分层网络通过在不同层次上交换信息来防止能量损失。形成的层次结构避免了单层次集群区域的过重负担,有助于网络保留集群层次头部的能量。恶意攻击会干扰路由算法的正常功能,使网络中的QoS性能出现偏差。现有的LEACH-Mobile协议采用低能量聚类技术,但在存在恶意攻击时无法提供网络的安全性。本文提出的基于层次聚类网络协议的信任计算方法通过多种信任度量指标证明了其可信任性。采用低能耗分层协议,提高了系统的寿命,能耗降低了12%。
{"title":"TCHCN: Trust Computation for Hierarchical Clustering Network to Improve Network Lifetime in Wireless Sensor Network","authors":"P. Manasa, K. Shaila, K. Venugopal","doi":"10.1166/JCTN.2020.9446","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9446","url":null,"abstract":"Network Lifetime of sensor node plays a fundamental role in Wireless Sensor Networks, since they drain out energy during the communication. The hierarchical networks assist in hindering energy loss by exchanging the information at various levels. The Hierarchical levels formed avoid\u0000 overburdening of single level cluster zones and helps the network to retain energy of cluster level heads. Malicious attack disturbs the regular functionality of a routing algorithm and deviates QoS performance in the network. The existing LEACH-Mobile protocol adopts low energy clustering\u0000 techniques but, falls short in providing security of the network when there is malicious attack. The proposed Trust Computation for Hierarchical Clustering Network protocol proves itself to be trustworthy by having various trust measuring metrics. It enhances the lifetime by adopting low energy\u0000 hierarchical protocol and shows improvement of 12% in terms of energy consumption.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5509-5515"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44616309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Child Infant Mortality Analysis for Efficient Public Health Development 有效公共卫生发展的实时母婴死亡率分析
Q3 Chemistry Pub Date : 2020-12-01 DOI: 10.1166/JCTN.2020.9419
K. Sudha, G. Venkatesan
The problem of child health management and development has been well studied. There are number of methods available for the problem of child health development but suffers to achieve higher performance. To improve the performance, an efficient real time child infant mortality analysis for improved health development using multi feature covariance measure (MFCM). The method maintains number of data records of various child and infants from the age of 1 month to 15 years. For each child or infant, the method maintains continuous records of their health diagnosis. Using the data maintained, the method identifies and groups them according to the cause of death. Using the cluster generated, the method estimates health factor influence (HFI) for different features. Based on the value of HFI, a set of features which has higher HFI are selected and used to generate analysis. Further the method generates a prediction result on the future mortality and the reasons. The method improves the performance of mortality prediction and increases the accuracy also.
儿童健康管理和发展问题已经得到了很好的研究。有许多方法可用于解决儿童健康发展问题,但难以达到更高的效果。为了提高性能,使用多特征协方差测度(MFCM)对改善健康发展进行了有效的实时母婴死亡率分析。该方法保存了从1个月到15岁的各种儿童和婴儿的大量数据记录。对于每个儿童或婴儿,该方法保持其健康诊断的连续记录。该方法利用保存的数据,根据死亡原因对其进行识别和分组。使用生成的聚类,该方法估计不同特征的健康因素影响(HFI)。基于HFI的值,选择一组具有较高HFI的特征,并将其用于生成分析。此外,该方法生成关于未来死亡率和原因的预测结果。该方法提高了死亡率预测的性能,也提高了预测的准确性。
{"title":"Real Time Child Infant Mortality Analysis for Efficient Public Health Development","authors":"K. Sudha, G. Venkatesan","doi":"10.1166/JCTN.2020.9419","DOIUrl":"https://doi.org/10.1166/JCTN.2020.9419","url":null,"abstract":"The problem of child health management and development has been well studied. There are number of methods available for the problem of child health development but suffers to achieve higher performance. To improve the performance, an efficient real time child infant mortality analysis\u0000 for improved health development using multi feature covariance measure (MFCM). The method maintains number of data records of various child and infants from the age of 1 month to 15 years. For each child or infant, the method maintains continuous records of their health diagnosis. Using the\u0000 data maintained, the method identifies and groups them according to the cause of death. Using the cluster generated, the method estimates health factor influence (HFI) for different features. Based on the value of HFI, a set of features which has higher HFI are selected and used to generate\u0000 analysis. Further the method generates a prediction result on the future mortality and the reasons. The method improves the performance of mortality prediction and increases the accuracy also.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5270-5278"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43293232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computational and Theoretical Nanoscience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1