Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/01722018
Juhyun Lee, Jihyun Park, Suneung Ahn
— In designing a preventive maintenance policy, considering only either system reliability or cost may not ensure sustainable system operation because the biased design of a PM policy can result in high maintenance cost and short system life. A PM policy should thus be designed considering a trade-off between system reliability and maintenance costs. PM actions in condition-based maintenance policies are commonly performed at a fixed reliability threshold, which is set high to prevent severe breakdowns. However, it may be difficult to establish cost-effectiveness of a model when the reliability threshold is constrained to be fixed. In this study, a cost-effective PM policy based on a reliability threshold that decreases as the frequency of PM actions increases, is developed, which considers a fixed cumulative hazard threshold while keeping the reliability above an acceptable level. The developed policy was analyzed in two cases; one where the cumulative hazard threshold and one where the predetermined minimum reliability were given as the condition variable, respectively. The results were compared to the model of the fixed reliability threshold, which showed that the proposed PM model led to a lower expected maintenance cost and longer system lifespan. Finally, sensitivity analyses of the condition variables and the maintenance costs were conducted.
{"title":"Cumulative Hazard Intensity Based on Sequential Preventive Maintenance Strategy for Ensuring Minimum Reliability","authors":"Juhyun Lee, Jihyun Park, Suneung Ahn","doi":"10.30534/ijccn/2018/01722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/01722018","url":null,"abstract":"— In designing a preventive maintenance policy, considering only either system reliability or cost may not ensure sustainable system operation because the biased design of a PM policy can result in high maintenance cost and short system life. A PM policy should thus be designed considering a trade-off between system reliability and maintenance costs. PM actions in condition-based maintenance policies are commonly performed at a fixed reliability threshold, which is set high to prevent severe breakdowns. However, it may be difficult to establish cost-effectiveness of a model when the reliability threshold is constrained to be fixed. In this study, a cost-effective PM policy based on a reliability threshold that decreases as the frequency of PM actions increases, is developed, which considers a fixed cumulative hazard threshold while keeping the reliability above an acceptable level. The developed policy was analyzed in two cases; one where the cumulative hazard threshold and one where the predetermined minimum reliability were given as the condition variable, respectively. The results were compared to the model of the fixed reliability threshold, which showed that the proposed PM model led to a lower expected maintenance cost and longer system lifespan. Finally, sensitivity analyses of the condition variables and the maintenance costs were conducted.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128572081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/08722018
Ewit
{"title":"A Wireless Early Prediction System of Cardiac Arrest through fog enabled IoT","authors":"Ewit","doi":"10.30534/ijccn/2018/08722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/08722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/12722018
Ewit
{"title":"Identification of Types of Leukemia Influenced Cells and it's Classification","authors":"Ewit","doi":"10.30534/ijccn/2018/12722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/12722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115980962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/39722018
Ewit
{"title":"TWO CLOUD SECURE DATABASE FOR NUMERIC RANGE SQL QUERIES WITH PRIVACY PRESERVING","authors":"Ewit","doi":"10.30534/IJCCN/2018/39722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/39722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/51722018
Ewit
1. ABSTRACT Software quality is taken into account to be of nice importance within the space of software system engineering and development. so as to extend the potency and also the quality of software system modules, software system defect prediction is employed to spot defect prone modules and this helps in achieving high software system responsibility. Software fault prediction is usually a posh space of analysis and software system practitioners and researchers have applied various ways that to predict wherever the fault is probably going to occur within the software system module and their variable degrees of success. These prediction studies ends up in fault prediction models and it permits software system personnel to target the defect free software system code, thereby leading to software system quality improvement and using the higher utility of the resources. During this Paper style Approach for software system Defect Prediction is adopted.
{"title":"SOFTWARE PREDICTIVE CLASSIFICATION USING RELATIONAL ASSOCIATION RULES AND NAIVE BAYES APPROACH","authors":"Ewit","doi":"10.30534/ijccn/2018/51722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/51722018","url":null,"abstract":"1. ABSTRACT Software quality is taken into account to be of nice importance within the space of software system engineering and development. so as to extend the potency and also the quality of software system modules, software system defect prediction is employed to spot defect prone modules and this helps in achieving high software system responsibility. Software fault prediction is usually a posh space of analysis and software system practitioners and researchers have applied various ways that to predict wherever the fault is probably going to occur within the software system module and their variable degrees of success. These prediction studies ends up in fault prediction models and it permits software system personnel to target the defect free software system code, thereby leading to software system quality improvement and using the higher utility of the resources. During this Paper style Approach for software system Defect Prediction is adopted.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125878735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/53722018
Ewit
{"title":"An Approach to Optimized Genetic based Clustering Algorithm in Mobile Ad hoc Network","authors":"Ewit","doi":"10.30534/ijccn/2018/53722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/53722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133786602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/54722018
Ewit
This project is to find out the human being survival in War field and during natural disaster like earthquake. The project consists of a robot with an IR based human radiation sensor, which picks up signals from human radiations and gives a signal output. Whenever any human being comes in the vicinity of the system the IR system gives a signal. The movement of the robot can be controlled through an RF transmitter. The Robot can be controlled through mobile withWiFi.
{"title":"ALIVE HUMAN DETECTION USING PIR SENSORS","authors":"Ewit","doi":"10.30534/IJCCN/2018/54722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/54722018","url":null,"abstract":"This project is to find out the human being survival in War field and during natural disaster like earthquake. The project consists of a robot with an IR based human radiation sensor, which picks up signals from human radiations and gives a signal output. Whenever any human being comes in the vicinity of the system the IR system gives a signal. The movement of the robot can be controlled through an RF transmitter. The Robot can be controlled through mobile withWiFi.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129746199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/40722018
Syeda Sheeba Tabassum, Dr. Arun Biradar
The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.
{"title":"Evaluation of Web Security Mechanisms Using Vulnerabilities and Attack Injection","authors":"Syeda Sheeba Tabassum, Dr. Arun Biradar","doi":"10.30534/ijccn/2018/40722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/40722018","url":null,"abstract":"The methodology is based on the idea that injecting realistic vulnerabilities in a web application and attacking them automatically can be used to support the assessment of existing security mechanisms and tools in custom setup scenarios. To provide true to life results, the proposed vulnerability and attack injection methodology relies on the study of a large number of vulnerabilities in real web applications. In addition to the generic methodology, the paper describes the implementation of the Vulnerability & Attack Injector Tool (VAIT) that allows the automation of the entire process. We used this tool to run a set of experiments that demonstrate the feasibility and the effectiveness of the proposed methodology. The experiments include the evaluation of coverage and false positives of an intrusion detection system for SQL Injection attacks and the assessment of the effectiveness of two top commercial web application vulnerability scanners. Results show that the injection of vulnerabilities and attacks is indeed an effective way to evaluate security mechanisms and to point out not only their weaknesses but also ways for their improvement.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/IJCCN/2018/50722018
Ewit
RFID generally encompasses any wireless (or partially wireless) communication that allows for remote retrieval of information associated with a particular commodity, product, component, or other item. In RFID environments, each suitable item is tagged with an RFID tag that includes and (actively or passively) transmits one or more pieces of information including, for example, a unique identifier and such. These pieces of information are requested or retrieved by an RFID reader. Moreover, the RFID often must be manually docked or interfaced with a port such that the collected RFID information can be processed. In many circumstances, RFID technology allows the two devices (the tag and reader) to communicate with one another while not maintaining a line-of-sight in various weather conditions. Extensive research has been carried out on vision based automatic identification technology that recognizes images codes using smart phones to provide various services that can recognize the authenticity of any product We are using Multiplexing and De multiplexing algorithm for recognizing QR code image using smart phones to provide various services that can recognize the authenticity of any product.
{"title":"SMART SHOPPING USING QR CODE AND RFID SYSTEM","authors":"Ewit","doi":"10.30534/IJCCN/2018/50722018","DOIUrl":"https://doi.org/10.30534/IJCCN/2018/50722018","url":null,"abstract":"RFID generally encompasses any wireless (or partially wireless) communication that allows for remote retrieval of information associated with a particular commodity, product, component, or other item. In RFID environments, each suitable item is tagged with an RFID tag that includes and (actively or passively) transmits one or more pieces of information including, for example, a unique identifier and such. These pieces of information are requested or retrieved by an RFID reader. Moreover, the RFID often must be manually docked or interfaced with a port such that the collected RFID information can be processed. In many circumstances, RFID technology allows the two devices (the tag and reader) to communicate with one another while not maintaining a line-of-sight in various weather conditions. Extensive research has been carried out on vision based automatic identification technology that recognizes images codes using smart phones to provide various services that can recognize the authenticity of any product We are using Multiplexing and De multiplexing algorithm for recognizing QR code image using smart phones to provide various services that can recognize the authenticity of any product.","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"33 Pt 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124631935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-15DOI: 10.30534/ijccn/2018/13722018
Ewit
{"title":"Palm vein recognition scheme based on an adaptive Gabor filter","authors":"Ewit","doi":"10.30534/ijccn/2018/13722018","DOIUrl":"https://doi.org/10.30534/ijccn/2018/13722018","url":null,"abstract":"","PeriodicalId":313852,"journal":{"name":"International Journal of Computing, Communications and Networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}