Pub Date : 2020-03-13DOI: 10.2174/2213275912666181207155334
Sandeep Kumar, A. Nayyar, Nhu Gia Nguyen, Rajani Kumari
Spider monkey optimization algorithm is recently developed natureinspired algorithm. It is based on fission-fusion social structure of spider monkeys. Perturbation rate is one of the important parameter of spider monkey optimization algorithm, which affects the convergence behavior of spider monkey optimization algorithm. Generally, perturbation rate is a linearly increasing function. However, due to the availability of non-linearity in different applications, a non-linear function may affect the performance of spider monkey optimization algorithm. This paper provides a detailed study on various perturbation techniques used in spider monkey optimization algorithm and recommends a novel alternative of hyperbolic spider monkey optimization algorithm. The new approach is named as hyperbolic Spider Monkey Optimization algorithm as the perturbation strategy inspired by hyperbolic growth function. The proposed algorithm is tested over a set of 23 CEC 2005 benchmark problems. The experimental outcomes illustrate that the hyperbolic spider monkey optimization algorithm effectively increase the reliability of spider monkey optimization algorithm in comparison to the considered approaches. The hyperbolic spider monkey optimization algorithm provides improved perturbation rate, desirable convergence precision, rapid convergence rate, and improved global search capability.
{"title":"Hyperbolic Spider Monkey Optimization Algorithm","authors":"Sandeep Kumar, A. Nayyar, Nhu Gia Nguyen, Rajani Kumari","doi":"10.2174/2213275912666181207155334","DOIUrl":"https://doi.org/10.2174/2213275912666181207155334","url":null,"abstract":"\u0000\u0000Spider monkey optimization algorithm is recently developed natureinspired\u0000algorithm. It is based on fission-fusion social structure of spider monkeys. Perturbation rate\u0000is one of the important parameter of spider monkey optimization algorithm, which affects the convergence\u0000behavior of spider monkey optimization algorithm. Generally, perturbation rate is a linearly\u0000increasing function. However, due to the availability of non-linearity in different applications, a\u0000non-linear function may affect the performance of spider monkey optimization algorithm.\u0000\u0000\u0000\u0000This paper provides a detailed study on various perturbation techniques used in spider\u0000monkey optimization algorithm and recommends a novel alternative of hyperbolic spider monkey\u0000optimization algorithm. The new approach is named as hyperbolic Spider Monkey Optimization algorithm\u0000as the perturbation strategy inspired by hyperbolic growth function.\u0000\u0000\u0000\u0000The proposed algorithm is tested over a set of 23 CEC 2005 benchmark problems.\u0000\u0000\u0000\u0000The experimental outcomes illustrate that the hyperbolic spider monkey optimization algorithm\u0000effectively increase the reliability of spider monkey optimization algorithm in comparison to\u0000the considered approaches.\u0000\u0000\u0000\u0000The hyperbolic spider monkey optimization algorithm provides improved perturbation\u0000rate, desirable convergence precision, rapid convergence rate, and improved global search capability.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124004861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-14DOI: 10.2174/2213275912666191114144935
M. R. Kumar, K. Arthi
Recently, segmentation of iris image is the most important process in a robust iris recognition system due to the images captured from non-cooperative environments which introduce occlusions, blur, specular reflections, and off-axis. However, several techniques are developed to overcome these drawbacks in the iris segmentation process; it is still a challenging task to localize the iris texture regions. In this research, an effective two-stage of iris segmentation technique is proposed in a non-cooperative environment. At first, modified Geodesic Active Contour-based level set segmentation with Particle Swarm Optimization (PSO) is employed for iris segmentation. In this, the PSO algorithm is used to minimize the energy of the gradient descent equation in a region-based level set segmentation algorithm. Then, the global threshold-based segmentation is employed for pupil region segmentation. The experiment considered two well-known databases such as UBIRIS.V1 and UBIRIS.V2. The simulation outcomes demonstrate that the proposed novel approach attained more accurate and robust iris segmentation under non-cooperative conditions. Also, the results of the modified Geodesic Active Contour-based level set segmentation with the PSO algorithm attained better results than the conventional segmentation techniques.
{"title":"Non-cooperative Iris Segmentation: A Two-stage Approach","authors":"M. R. Kumar, K. Arthi","doi":"10.2174/2213275912666191114144935","DOIUrl":"https://doi.org/10.2174/2213275912666191114144935","url":null,"abstract":"\u0000\u0000Recently, segmentation of iris image is the most important process in a robust iris recognition system due to the images captured from non-cooperative environments which introduce occlusions, blur, specular reflections, and off-axis. However, several techniques are developed to overcome these drawbacks in the iris segmentation process; it is still a challenging task to localize the iris texture regions. In this research, an effective two-stage of iris segmentation technique is proposed in a non-cooperative environment. At first, modified Geodesic Active Contour-based level set segmentation with Particle Swarm Optimization (PSO) is employed for iris segmentation. In this, the PSO algorithm is used to minimize the energy of the gradient descent equation in a region-based level set segmentation algorithm. Then, the global threshold-based segmentation is employed for pupil region segmentation. The experiment considered two well-known databases such as UBIRIS.V1 and UBIRIS.V2. The simulation outcomes demonstrate that the proposed novel approach attained more accurate and robust iris segmentation under non-cooperative conditions. Also, the results of the modified Geodesic Active Contour-based level set segmentation with the PSO algorithm attained better results than the conventional segmentation techniques.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-31DOI: 10.2174/221327591204190517082230
A. Nayyar, Sandeep Kumar, Nhu Gia Nguyen
{"title":"Advances in Swarm Intelligence and Machine Learning for Optimizing Problems in Image Processing and Data Analytics (Part 1)","authors":"A. Nayyar, Sandeep Kumar, Nhu Gia Nguyen","doi":"10.2174/221327591204190517082230","DOIUrl":"https://doi.org/10.2174/221327591204190517082230","url":null,"abstract":"","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128775593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-31DOI: 10.2174/2213275911666181120111342
Savita Ahlawat and Rahul Rishi
The data proliferation has been resulted in large-scale, high dimensional data and brings new challenges for feature selection in handwriting recognition problems. The practical challenges like the large variability and ambiguities present in the individual’s handwriting style demand an optimal feature selection algorithm that would be capable to enhance the recognition accuracy of handwriting recognition system with reduced training efforts and computational cost. This paper gives emphasis on the feature selection process and proposed a genetic algorithm based feature selection technique for handwritten digit recognition. A hybrid feature set of statistical and geometrical features is developed in order to get the effective feature set consist of local and global characteristics of sample digits. The method utilizes a genetic algorithm based feature selection for selecting best distinguishable features and k-nearest neighbour for evaluating the fitness of features of handwritten digit dataset. The experiments are carried out on standard The Chars74K handwritten digit dataset and reported a 66% reduction in the original feature set without sacrificing the recognition accuracy. The experiment results show the effectiveness of the proposed approach.
{"title":"A Genetic Algorithm Based Feature Selection for Handwritten Digit Recognition","authors":"Savita Ahlawat and Rahul Rishi","doi":"10.2174/2213275911666181120111342","DOIUrl":"https://doi.org/10.2174/2213275911666181120111342","url":null,"abstract":"\u0000\u0000The data proliferation has been resulted in large-scale, high dimensional data\u0000and brings new challenges for feature selection in handwriting recognition problems. The practical\u0000challenges like the large variability and ambiguities present in the individual’s handwriting style\u0000demand an optimal feature selection algorithm that would be capable to enhance the recognition accuracy\u0000of handwriting recognition system with reduced training efforts and computational cost.\u0000\u0000\u0000\u0000This paper gives emphasis on the feature selection process and proposed a genetic algorithm\u0000based feature selection technique for handwritten digit recognition.\u0000\u0000\u0000\u0000A hybrid feature set of statistical and geometrical features is developed in order to get the\u0000effective feature set consist of local and global characteristics of sample digits. The method utilizes a\u0000genetic algorithm based feature selection for selecting best distinguishable features and k-nearest\u0000neighbour for evaluating the fitness of features of handwritten digit dataset.\u0000\u0000\u0000\u0000The experiments are carried out on standard The Chars74K handwritten digit dataset and\u0000reported a 66% reduction in the original feature set without sacrificing the recognition accuracy.\u0000\u0000\u0000\u0000The experiment results show the effectiveness of the proposed approach.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-10-19DOI: 10.2174/2213275912666191019141453
Qingtao Wu, Zaihui Cao
Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.
{"title":"Research on Video Encryption and Privacy Protection in Cloud Monitoring System Based on H.264","authors":"Qingtao Wu, Zaihui Cao","doi":"10.2174/2213275912666191019141453","DOIUrl":"https://doi.org/10.2174/2213275912666191019141453","url":null,"abstract":"\u0000\u0000Cloud monitoring technology is an important maintenance and management tool for cloud platforms.Cloud monitoring system is a kind of network monitoring service, monitoring technology and monitoring platform based on Internet. At present, the monitoring system is changed from the local monitoring to cloud monitoring, with the flexibility and convenience improved, but also exposed more security issues. Cloud video may be intercepted or changed in the transmission process. Most of the existing encryption algorithms have defects in real-time and security. Aiming at the current security problems of cloud video surveillance, this paper proposes a new video encryption algorithm based on H.264 standard. By using the advanced FMO mechanism, the related macro blocks can be driven into different Slice. The encryption algorithm proposed in this paper can encrypt the whole video content by encrypting the FMO sub images. The method has high real-time performance, and the encryption process can be executed in parallel with the coding process. The algorithm can also be combined with traditional scrambling algorithm, further improve the video encryption effect. The algorithm selects the encrypted part of the video data, which reducing the amount of data to be encrypted. Thus reducing the computational complexity of the encryption system, with faster encryption speed, improve real-time and security, suitable for transfer through mobile multimedia and wireless multimedia network.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129647697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-23DOI: 10.2174/2213275912666190823103344
A. Dwivedi, A. Sharma, Rakesh Kumar
The endeavor of this observational examination is to build up another exploration structure that clarifies the consumer mentality toward the Internet of Things (IoT) benefit through the Wireless Sensor Network (WSN). WSN should be associated with the Internet because of its assortment of uses as well as their significance. There are a few difficulties along with the issues inside coordinating WSN and IoT. Since a wide-reaching WSN is to be fully migrating into the Internet as an important part of IoT, it is important to think about different safety questions that come with IoT, such as the observation of bad attacks. Sensors or sensor fix things may organization straight to exchange between each other using various protocol. A have trust is making out as an important part to put forward arguments for a complex made distribution sensor networks in IoT against bad net-work point attacks, since trust setup mechanisms can bracing combination among distributed computing and communication entities, facilitate the detection of unprincipled entities, and assist the decision-making process of different protocols. In this paper, in view of inside and out comprehension of trust foundation process and quantitative examination among trust foundation techniques, we present trust and notoriety show TRM-IoT to authorize the participation between things in a system of IoT dependent on their practices. In this model the internet of thing (IOT) system to pledge with misbehaving nodes whose status are non deterministic. This paper also presents an overview of trust management model in IOT.The accuracy, robustness, and lightness of the proposed model is approved through a wide arrangement of recreations.
{"title":"Dynamic Trust Management Model for the Internet of Things and Smart Sensors: The Challenges and Applications","authors":"A. Dwivedi, A. Sharma, Rakesh Kumar","doi":"10.2174/2213275912666190823103344","DOIUrl":"https://doi.org/10.2174/2213275912666190823103344","url":null,"abstract":"\u0000\u0000The endeavor of this observational examination is to build up another exploration structure that clarifies the consumer mentality toward the Internet of Things (IoT) benefit through the Wireless Sensor Network (WSN). WSN should be associated with the Internet because of its assortment of uses as well as their significance. There are a few difficulties along with the issues inside coordinating WSN and IoT. Since a wide-reaching WSN is to be fully migrating into the Internet as an important part of IoT, it is important to think about different safety questions that come with IoT, such as the observation of bad attacks. Sensors or sensor fix things may organization straight to exchange between each other using various protocol. A have trust is making out as an important part to put forward arguments for a complex made distribution sensor networks in IoT against bad net-work point attacks, since trust setup mechanisms can bracing combination among distributed computing and communication entities, facilitate the detection of unprincipled entities, and assist the decision-making process of different protocols. In this paper, in view of inside and out comprehension of trust foundation process and quantitative examination among trust foundation techniques, we present trust and notoriety show TRM-IoT to authorize the participation between things in a system of IoT dependent on their practices. In this model the internet of thing (IOT) system to pledge with misbehaving nodes whose status are non deterministic. This paper also presents an overview of trust management model in IOT.The accuracy, robustness, and lightness of the proposed model is approved through a wide arrangement of recreations.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129040315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-23DOI: 10.2174/2213275912666190823113524
Bhawna Suri, Pijush Kanti Dutta Pramanik, Shweta Taneja
The abundant use of personal vehicles has raised the challenge of parking the vehicle in crowded places such as shopping malls. To help the driver with efficient and troublefree parking, a smart and innovative parking assistance system is required. In addition to discussing the basics of smart parking, Internet of Things (IoT), Cloud computing, and Fog computing, this chapter proposes an IoT-based smart parking system for shopping malls. To process the IoT data, a hybrid Fog architecture is adopted in order to reduce the latency, where the Fog nodes are connected across the hierarchy. The advantages of this auxiliary connection are discussed critically by comparing with other Fog architectures (hierarchical and P2P). An algorithm is defined to support the proposed architecture and is implemented on two real- world use-cases having requirements of identifying the nearest free car parking slot. The implementation is simulated for a single mall scenario as well as for a campus with multiple malls with parking areas spread across them. The simulation results have proved that our proposed architecture shows lower latency as compared to the traditional smart parking systems that use Cloud architecture. The hybrid Fog architecture minimizes communication latency significantly. Hence, the proposed architecture can suitably be applied for other IoT-based real-time applications.
{"title":"A Hybrid Fog Architecture: Improving the Efficiency in IoT-Based Smart Parking Systems","authors":"Bhawna Suri, Pijush Kanti Dutta Pramanik, Shweta Taneja","doi":"10.2174/2213275912666190823113524","DOIUrl":"https://doi.org/10.2174/2213275912666190823113524","url":null,"abstract":"\u0000\u0000The abundant use of personal vehicles has raised the challenge of parking\u0000the vehicle in crowded places such as shopping malls. To help the driver with efficient and troublefree\u0000parking, a smart and innovative parking assistance system is required. In addition to discussing\u0000the basics of smart parking, Internet of Things (IoT), Cloud computing, and Fog computing,\u0000this chapter proposes an IoT-based smart parking system for shopping malls.\u0000\u0000\u0000\u0000To process the IoT data, a hybrid Fog architecture is adopted in order to reduce the latency,\u0000where the Fog nodes are connected across the hierarchy. The advantages of this auxiliary\u0000connection are discussed critically by comparing with other Fog architectures (hierarchical and\u0000P2P). An algorithm is defined to support the proposed architecture and is implemented on two real-\u0000world use-cases having requirements of identifying the nearest free car parking slot. The implementation\u0000is simulated for a single mall scenario as well as for a campus with multiple malls with\u0000parking areas spread across them.\u0000\u0000\u0000\u0000The simulation results have proved that our proposed architecture shows lower latency as\u0000compared to the traditional smart parking systems that use Cloud architecture.\u0000\u0000\u0000\u0000The hybrid Fog architecture minimizes communication latency significantly. Hence,\u0000the proposed architecture can suitably be applied for other IoT-based real-time applications.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134037909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-22DOI: 10.2174/2213275912666190822113039
Jasraj Meena, M. Vardhan
Cloud computing is used to deliver IT resources over the internet. Due to the popularity of cloud computing, nowadays, most of the scientific workflows are shifted towards this environment. Many algorithms have been proposed in the literature to schedule scientific workflows in the cloud, but their execution cost is very high as they are not meeting the user-defined deadline constraint. This paper focuses on satisfying the user-defined deadline of a scientific workflow while minimizing the total execution cost. So, to achieve this, we proposed a Cost-Effective under Deadline (CEuD) constraint workflow scheduling algorithm. The proposed CEuD algorithm considers all the essential features of the Cloud and resolves the major issues such as performance variation and acquisition delay. We compared the proposed CEuD algorithm with the existing literature algorithms for scientific workflows (i.e., Montage, Epigenomics, and CyberShake) and obtained better results for minimizing the overall execution cost of the workflow while satisfying the user-defined deadline.
{"title":"Cost-effective Heuristic Workflow Scheduling Algorithm in Cloud Under Deadline Constraint","authors":"Jasraj Meena, M. Vardhan","doi":"10.2174/2213275912666190822113039","DOIUrl":"https://doi.org/10.2174/2213275912666190822113039","url":null,"abstract":"\u0000\u0000 Cloud computing is used to deliver IT resources over the internet. Due to\u0000the popularity of cloud computing, nowadays, most of the scientific workflows are shifted towards\u0000this environment. Many algorithms have been proposed in the literature to schedule scientific workflows\u0000in the cloud, but their execution cost is very high as they are not meeting the user-defined\u0000deadline constraint.\u0000\u0000\u0000\u0000This paper focuses on satisfying the user-defined deadline of a scientific workflow while minimizing\u0000the total execution cost.\u0000\u0000\u0000\u0000 So, to achieve this, we proposed a Cost-Effective under Deadline (CEuD) constraint\u0000workflow scheduling algorithm.\u0000\u0000\u0000\u0000The proposed CEuD algorithm considers all the essential features of the Cloud and resolves\u0000the major issues such as performance variation and acquisition delay.\u0000\u0000\u0000\u0000We compared the proposed CEuD algorithm with the existing literature algorithms for\u0000scientific workflows (i.e., Montage, Epigenomics, and CyberShake) and obtained better results for\u0000minimizing the overall execution cost of the workflow while satisfying the user-defined deadline.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129877322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.2174/2213275911666181010114221
Ravishanker, A. K. Luhach, Sykam V Narendra Kumar, R. Poonia
In today’s world it is highly difficult to manage the smart things and fulfill the communication needs without the Internet as it provides ultimate means for human to human (H2H) communication. The ‘things’ could be entities or devices that contribute for the communication. But to enhance and improve such smart communication among the things that involves nonhuman intervention, there is a need to add few more smart capabilities to the Internet. As the world of Internet is on its way of transformation into a new smart world called ‘Internet of Things’ (IoT) where the things should possess the ability of sensing, communication and control to let the things exchange information without complete intervention of humans to provide advanced and qualitative services, which is possible with the help of protocols. This paper discusses how the transition could be started and being progressed in wired and wireless systems, and how it changes the traditional means of communication among different devices and humans into a smart way. Transition here refers to how isolated things are being intermingled with each other to generate a smart protocol communication. The aim of such transition is to improve the efficiency, flexibility, adaptability and interoperability. This paper also explores various factors that contribute to IoT.
{"title":"Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition Towards IoT","authors":"Ravishanker, A. K. Luhach, Sykam V Narendra Kumar, R. Poonia","doi":"10.2174/2213275911666181010114221","DOIUrl":"https://doi.org/10.2174/2213275911666181010114221","url":null,"abstract":"\u0000\u0000In today’s world it is highly difficult to manage the smart things and fulfill\u0000the communication needs without the Internet as it provides ultimate means for human to human\u0000(H2H) communication. The ‘things’ could be entities or devices that contribute for the communication.\u0000But to enhance and improve such smart communication among the things that involves nonhuman\u0000intervention, there is a need to add few more smart capabilities to the Internet. As the world\u0000of Internet is on its way of transformation into a new smart world called ‘Internet of Things’ (IoT)\u0000where the things should possess the ability of sensing, communication and control to let the things\u0000exchange information without complete intervention of humans to provide advanced and qualitative\u0000services, which is possible with the help of protocols.\u0000\u0000\u0000\u0000This paper discusses how the transition could be started and being progressed in wired\u0000and wireless systems, and how it changes the traditional means of communication among different\u0000devices and humans into a smart way.\u0000\u0000\u0000\u0000Transition here refers to how isolated things are being intermingled with each other to\u0000generate a smart protocol communication.\u0000\u0000\u0000\u0000 The aim of such transition is to improve the efficiency, flexibility, adaptability\u0000and interoperability. This paper also explores various factors that contribute to IoT.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133756506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.2174/2213275912666190819104221
Anup Das, M. Mandal
The design of efficient and fast controller for controlling the process parameter is always a challenging work to the control system designer. The main objective of this article is to design a secure chaos based controller by synchronizing two chaotic systems. The initial values of the chaotic systems are considered as the set value and initial process value of the physical parameter to be controlled. The proposed design of the controlled is done by synchronizing two-dimensional chaotic Henon map through nonlinear control method. One map is taken as a driver system and its initial value is considered as the set value of a specific process of a given system. On the other hand, another identical map is taken as the driven system and its initial value is the initial process value of the given process control system. Both the chaotic map become synchronized via nonlinear control law. The accumulation of error until synchronization is achieved which is converted into a suitable signal to operate the final control element to enhance or decrease the initial process value towards the set value. This self-repetitive process will achieve the control of the process parameter. In experiment we have observer that the error signal becomes zero after a small time interval (in simulation it takes only few iteration) and the accumulated error remain fixed in a steady value. This error is responsible to maintain the process value to the set value. The entire process has been implemented in hardware environment by using microcontroller ATMEGA 16 and also in the Proteus simulation software. The controller is very fast because the algorithm of nonlinear control law for synchronization is very fast. Since the controller is designed in chaotic regime so it is secure.
{"title":"Chaos-Based Controlled System Using Discrete Map","authors":"Anup Das, M. Mandal","doi":"10.2174/2213275912666190819104221","DOIUrl":"https://doi.org/10.2174/2213275912666190819104221","url":null,"abstract":"\u0000\u0000The design of efficient and fast controller for controlling the process parameter\u0000is always a challenging work to the control system designer. The main objective of this article\u0000is to design a secure chaos based controller by synchronizing two chaotic systems. The initial\u0000values of the chaotic systems are considered as the set value and initial process value of the physical\u0000parameter to be controlled.\u0000\u0000\u0000\u0000The proposed design of the controlled is done by synchronizing two-dimensional chaotic\u0000Henon map through nonlinear control method. One map is taken as a driver system and its initial\u0000value is considered as the set value of a specific process of a given system. On the other hand, another\u0000identical map is taken as the driven system and its initial value is the initial process value of\u0000the given process control system. Both the chaotic map become synchronized via nonlinear control\u0000law. The accumulation of error until synchronization is achieved which is converted into a suitable\u0000signal to operate the final control element to enhance or decrease the initial process value towards\u0000the set value. This self-repetitive process will achieve the control of the process parameter.\u0000\u0000\u0000\u0000In experiment we have observer that the error signal becomes zero after a small time interval\u0000(in simulation it takes only few iteration) and the accumulated error remain fixed in a steady\u0000value. This error is responsible to maintain the process value to the set value. The entire process has\u0000been implemented in hardware environment by using microcontroller ATMEGA 16 and also in the\u0000Proteus simulation software.\u0000\u0000\u0000\u0000The controller is very fast because the algorithm of nonlinear control law for synchronization\u0000is very fast. Since the controller is designed in chaotic regime so it is secure.\u0000","PeriodicalId":226658,"journal":{"name":"Recent Patents on Computer Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126976190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}