首页 > 最新文献

Journal of ICT Research and Applications最新文献

英文 中文
A Proposed Hidden Markov Model Method for Dynamic Device Pairing on Internet of Things End-Devices 物联网终端设备动态设备配对的隐马尔可夫模型方法
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-04-06 DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.3.5
Aji Gautama Putrada, Nur Ghaniaviyanto Ramadhan
Dynamic device pairing is a context-based zero-interaction method to pair end-devices in an IoT System based on Received Signal Strength Indicator (RSSI) values. But if RSSI detection is done in high level, the accuracy is troublesome due to poor sampling rates. This research proposes the Hidden Markov Model method to increase the performance of dynamic device pairing detection. This research implements an IoT system consisting an Access Point, an IoT End Device, an IoT Platform, and an IoT application and performs a comparison of two different methods to prove the concept. The results show that the precision of dynamic device pairing with HMM is better than without HMM and the value is 83,93%.
动态设备配对是一种基于上下文的零交互方法,用于基于接收信号强度指标(RSSI)值对物联网系统中的终端设备进行配对。但是,如果RSSI检测是在高水平下进行的,则由于采样率低,精度很麻烦。本研究提出了隐马尔可夫模型方法来提高动态设备配对检测的性能。本研究实现了一个由接入点、物联网终端设备、物联网平台和物联网应用程序组成的物联网系统,并对两种不同的方法进行了比较,以证明这一概念。结果表明,有HMM的动态设备配对精度优于无HMM的,其值为83,93%。
{"title":"A Proposed Hidden Markov Model Method for Dynamic Device Pairing on Internet of Things End-Devices","authors":"Aji Gautama Putrada, Nur Ghaniaviyanto Ramadhan","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.3.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.3.5","url":null,"abstract":"Dynamic device pairing is a context-based zero-interaction method to pair end-devices in an IoT System based on Received Signal Strength Indicator (RSSI) values. But if RSSI detection is done in high level, the accuracy is troublesome due to poor sampling rates. This research proposes the Hidden Markov Model method to increase the performance of dynamic device pairing detection. This research implements an IoT system consisting an Access Point, an IoT End Device, an IoT Platform, and an IoT application and performs a comparison of two different methods to prove the concept. The results show that the precision of dynamic device pairing with HMM is better than without HMM and the value is 83,93%.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"274-285"},"PeriodicalIF":0.6,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41733283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Indonesian Traffic Obstacle Dataset and Performance Evaluation of YOLOv4 for ADAS 一个新的印尼交通障碍数据集和用于ADAS的YOLOv4性能评估
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-03-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.6
A. Mulyanto, W. Jatmiko, P. Mursanto, Purwono Prasetyawan, Rohmat Indra Borman
Intelligent transport systems (ITS) are a promising area of studies. One implementation of ITS are advanced driver assistance systems (ADAS), involving the problem of obstacle detection in traffic. This study evaluated the YOLOv4 model as a state-of-the-art CNN-based one-stage detector to recognize traffic obstacles. A new dataset is proposed containing traffic obstacles on Indonesian roads for ADAS to detect traffic obstacles that are unique to Indonesia, such as pedicabs, street vendors, and bus shelters, and are not included in existing datasets. This study established a traffic obstacle dataset containing eleven object classes: cars, buses, trucks, bicycles, motorcycles, pedestrians, pedicabs, trees, bus shelters, traffic signs, and street vendors, with 26,016 labeled instances in 7,789 images. A performance analysis of traffic obstacle detection on Indonesian roads using the dataset created in this study was conducted using the YOLOv4 method.
智能交通系统(ITS)是一个很有前途的研究领域。ITS的一个实现是高级驾驶员辅助系统(ADAS),涉及交通中的障碍物检测问题。本研究评估了YOLOv4模型作为一种最先进的基于CNN的一级检测器来识别交通障碍。提出了一个新的数据集,其中包含印尼道路上的交通障碍物,用于ADAS检测印尼特有的交通障碍,如三轮车、街头小贩和公交候车亭,但不包括在现有数据集中。本研究建立了一个交通障碍数据集,包含11个对象类别:汽车、公共汽车、卡车、自行车、摩托车、行人、三轮车、树木、候车亭、交通标志和街头小贩,7789张图像中有26016个标记实例。使用本研究中创建的数据集,使用YOLOv4方法对印度尼西亚道路上的交通障碍物检测进行了性能分析。
{"title":"A New Indonesian Traffic Obstacle Dataset and Performance Evaluation of YOLOv4 for ADAS","authors":"A. Mulyanto, W. Jatmiko, P. Mursanto, Purwono Prasetyawan, Rohmat Indra Borman","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.6","url":null,"abstract":"Intelligent transport systems (ITS) are a promising area of studies. One implementation of ITS are advanced driver assistance systems (ADAS), involving the problem of obstacle detection in traffic. This study evaluated the YOLOv4 model as a state-of-the-art CNN-based one-stage detector to recognize traffic obstacles. A new dataset is proposed containing traffic obstacles on Indonesian roads for ADAS to detect traffic obstacles that are unique to Indonesia, such as pedicabs, street vendors, and bus shelters, and are not included in existing datasets. This study established a traffic obstacle dataset containing eleven object classes: cars, buses, trucks, bicycles, motorcycles, pedestrians, pedicabs, trees, bus shelters, traffic signs, and street vendors, with 26,016 labeled instances in 7,789 images. A performance analysis of traffic obstacle detection on Indonesian roads using the dataset created in this study was conducted using the YOLOv4 method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"286-298"},"PeriodicalIF":0.6,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48326453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Development of Hybrid Automatic Segmentation Technique of a Single Leaf from Overlapping Leaves Image 重叠叶片图像中单个叶片的混合自动分割技术研究
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-03-17 DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.4
Jibrin Bala, H. Salau, I. J. Umoh, A. Onumanyi, Salawudeen A. Tijani, B. Yahaya
The segmentation of a single leaf from an image with overlapping leaves is an important step towards the realization of effective precision agricultural systems. A popular approach used for this segmentation task is the hybridization of the Chan-Vese model and the Sobel operator CV-SO. This hybridized approach is popular because of its simplicity and effectiveness in segmenting a single leaf of interest from a complex background of overlapping leaves. However, the manual threshold and parameter tuning procedure of the CV-SO algorithm often degrades its detection performance. In this paper, we address this problem by introducing a dynamic iterative model to determine the optimal parameters for the CV-SO algorithm, which we dubbed the Dynamic CV-SO (DCV-SO) algorithm. This is a new hybrid automatic segmentation technique that attempts to improve the detection performance of the original hybrid CV-SO algorithm by reducing its mean error rate. The results obtained via simulation indicate that the proposed method yielded a 1.23% reduction in the mean error rate against the original CV-SO method.
从具有重叠叶片的图像中分割单个叶片是实现有效的精确农业系统的重要一步。用于该分割任务的一种流行方法是Chan-Vese模型和Sobel算子CV-SO的混合。这种杂交方法很受欢迎,因为它在从重叠叶子的复杂背景中分割感兴趣的单个叶子方面简单有效。然而,CV-SO算法的手动阈值和参数调整过程往往会降低其检测性能。在本文中,我们通过引入动态迭代模型来确定CV-SO算法的最佳参数来解决这个问题,我们称之为动态CV-SO(DCV-SO)算法。这是一种新的混合自动分割技术,试图通过降低其平均误差率来提高原始混合CV-SO算法的检测性能。仿真结果表明,与原始CV-SO方法相比,该方法的平均误差率降低了1.23%。
{"title":"Development of Hybrid Automatic Segmentation Technique of a Single Leaf from Overlapping Leaves Image","authors":"Jibrin Bala, H. Salau, I. J. Umoh, A. Onumanyi, Salawudeen A. Tijani, B. Yahaya","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.4","url":null,"abstract":"The segmentation of a single leaf from an image with overlapping leaves is an important step towards the realization of effective precision agricultural systems. A popular approach used for this segmentation task is the hybridization of the Chan-Vese model and the Sobel operator CV-SO. This hybridized approach is popular because of its simplicity and effectiveness in segmenting a single leaf of interest from a complex background of overlapping leaves. However, the manual threshold and parameter tuning procedure of the CV-SO algorithm often degrades its detection performance. In this paper, we address this problem by introducing a dynamic iterative model to determine the optimal parameters for the CV-SO algorithm, which we dubbed the Dynamic CV-SO (DCV-SO) algorithm. This is a new hybrid automatic segmentation technique that attempts to improve the detection performance of the original hybrid CV-SO algorithm by reducing its mean error rate. The results obtained via simulation indicate that the proposed method yielded a 1.23% reduction in the mean error rate against the original CV-SO method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44696150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Adaptive Common Control Channel MAC with Transmission Opportunity in IEEE 802.11ac IEEE 802.11ac中具有传输机会的自适应公共控制信道MAC
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-02-23 DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.3
Azhar A. Alsufyani, K. Almotairi
Spectral utilization is a major challenge in wireless ad hoc networks due in part to using limited network resources. For ad hoc networks, the bandwidth is shared among stations that can transmit data at any point in time. It  is important to maximize the throughput to enhance the network service. In this paper, we propose an adaptive multi-channel access with transmission opportunity protocol for multi-channel ad hoc networks, called AMCA-TXOP. For the purpose of coordination, the proposed protocol uses an adaptive common control channel over which the stations negotiate their channel selection based on the entire available bandwidth and then switch to the negotiated channel. AMCA-TXOP requires a single radio interface so that each station can listen to the control channel, which can overhear all agreements made by the other stations. This allows parallel transmission to multiple stations over various channels, prioritizing data traffic to achieve the quality-of-service requirements. The proposed approach can work with the 802.11ac protocol, which has expanded the bandwidth to 160 MHz by channel bonding. Simulations were conducted to demonstrate the throughput gains that can be achieved using the AMCA-TXOP protocol. Moreover, we compared our protocol with  the IEEE 802.11ac standard protocols.
频谱利用是无线自组织网络的主要挑战,部分原因是使用有限的网络资源。对于自组织网络,带宽在可以在任何时间点传输数据的站点之间共享。通过最大化吞吐量来增强网络服务Â是非常重要的。本文提出了一种适用于多通道自组织网络的具有传输机会的自适应多通道接入协议AMCA-TXOP。为了协调的目的,所提出的协议使用一个自适应的公共控制信道,在这个信道上,站点根据整个可用带宽协商它们的信道选择,然后切换到协商好的信道。AMCA-TXOP需要一个单一的无线电接口,以便每个电台都可以收听控制频道,该频道可以偷听其他电台达成的所有协议。这允许通过各种通道并行传输到多个站点,优先处理数据流量以达到服务质量要求。该方法可用于802.11ac协议,该协议通过信道绑定将带宽扩展到160 MHz。通过仿真验证了AMCA-TXOP协议所带来的吞吐量增益。此外,我们将我们的协议与Â IEEE 802.11ac标准协议进行了比较。
{"title":"An Adaptive Common Control Channel MAC with Transmission Opportunity in IEEE 802.11ac","authors":"Azhar A. Alsufyani, K. Almotairi","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.3","url":null,"abstract":"Spectral utilization is a major challenge in wireless ad hoc networks due in part to using limited network resources. For ad hoc networks, the bandwidth is shared among stations that can transmit data at any point in time. It  is important to maximize the throughput to enhance the network service. In this paper, we propose an adaptive multi-channel access with transmission opportunity protocol for multi-channel ad hoc networks, called AMCA-TXOP. For the purpose of coordination, the proposed protocol uses an adaptive common control channel over which the stations negotiate their channel selection based on the entire available bandwidth and then switch to the negotiated channel. AMCA-TXOP requires a single radio interface so that each station can listen to the control channel, which can overhear all agreements made by the other stations. This allows parallel transmission to multiple stations over various channels, prioritizing data traffic to achieve the quality-of-service requirements. The proposed approach can work with the 802.11ac protocol, which has expanded the bandwidth to 160 MHz by channel bonding. Simulations were conducted to demonstrate the throughput gains that can be achieved using the AMCA-TXOP protocol. Moreover, we compared our protocol with  the IEEE 802.11ac standard protocols.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"240-256"},"PeriodicalIF":0.6,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48317949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on the Use of ICT Driven Solutions Towards Managing Global Pandemics 利用信息和通信技术驱动的解决方案管理全球流行病的审查
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-02-23 DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.1
N. Thilakarathne
A pandemic is a contagious disease outbreak that happens over a large geographic area and affects a great portion of the population while new pathogens appear for which people have less immunity and no vaccines are available. The disease can spread from person to person in a very short time. Health workers are at greater risk of infection because of patients who are carriers. In the 21st century, where everyone is connected through digital technologies, information and communication technology (ICT) plays a critical role in improving healthcare for individuals and larger communities. ICT can be divided into a wide variety of application domains that signify its importance as a major technological paradigm. It is currently drawing large attention because of its potential to alleviate the burden on healthcare systems caused by the rise in chronic diseases, aging populations and pandemic situations. This study surveyed substantial knowledge on how effective ICT healthcare solutions can be used towards managing global pandemics. In order to make it more comprehensive, we also present a four-phase strategic framework that can be deployed to alleviate the strain on healthcare resources during a pandemic, which was derived from the reviewed literature. Further, we also discuss how ICT technologies can be used towards managing pandemic situations chronographically during the transformation from a simple disease outbreak into a global pandemic.
大流行是一种发生在大地理区域并影响很大一部分人口的传染病爆发,而新的病原体出现时,人们的免疫力较低,也没有疫苗。这种疾病可以在很短的时间内在人与人之间传播。由于患者是携带者,卫生工作者感染的风险更大。在21世纪,每个人都通过数字技术连接在一起,信息和通信技术在改善个人和更大社区的医疗保健方面发挥着关键作用。信息和通信技术可分为各种各样的应用领域,这表明它作为一种主要技术范式的重要性。它目前正引起人们的广泛关注,因为它有可能减轻慢性病、人口老龄化和疫情对医疗系统造成的负担。这项研究调查了如何使用有效的信息和通信技术医疗解决方案来管理全球流行病的大量知识。为了使其更加全面,我们还提出了一个四阶段战略框架,该框架可用于缓解疫情期间医疗资源的压力,该框架来源于综述的文献。此外,我们还讨论了在从简单的疾病爆发转变为全球大流行期间,如何利用信息和通信技术按时间顺序管理大流行情况。
{"title":"Review on the Use of ICT Driven Solutions Towards Managing Global Pandemics","authors":"N. Thilakarathne","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.1","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.1","url":null,"abstract":"A pandemic is a contagious disease outbreak that happens over a large geographic area and affects a great portion of the population while new pathogens appear for which people have less immunity and no vaccines are available. The disease can spread from person to person in a very short time. Health workers are at greater risk of infection because of patients who are carriers. In the 21st century, where everyone is connected through digital technologies, information and communication technology (ICT) plays a critical role in improving healthcare for individuals and larger communities. ICT can be divided into a wide variety of application domains that signify its importance as a major technological paradigm. It is currently drawing large attention because of its potential to alleviate the burden on healthcare systems caused by the rise in chronic diseases, aging populations and pandemic situations. This study surveyed substantial knowledge on how effective ICT healthcare solutions can be used towards managing global pandemics. In order to make it more comprehensive, we also present a four-phase strategic framework that can be deployed to alleviate the strain on healthcare resources during a pandemic, which was derived from the reviewed literature. Further, we also discuss how ICT technologies can be used towards managing pandemic situations chronographically during the transformation from a simple disease outbreak into a global pandemic.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46541526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Hate Speech Classification in Indonesian Language Tweets by Using Convolutional Neural Network 基于卷积神经网络的印尼语推文仇恨言论分类
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-02-23 DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.2
Ayu Nadia Taradhita, Ketut Gede Darma Putra
The rapid development of social media, added with the freedom of social media users to express their opinions, has influenced the spread of hate speech aimed at certain groups. Online based hate speech can be identified by the used of derogatory words in social media posts. Various studies on hate speech classification have been done, however, very few researches have been conducted on hate speech classification in the Indonesian language. This paper proposes a convolutional neural network method for classifying hate speech in tweets in the Indonesian language. Datasets for both the training and testing stages were collected from Twitter. The collected tweets were categorized into hate speech and non-hate speech. We used TF-IDF as the term weighting method for feature extraction. The most optimal training accuracy and validation accuracy gained were 90.85% and 88.34% at 45 epochs. For the testing stage, experiments were conducted with different amounts of testing data. The highest testing accuracy was 82.5%, achieved by the dataset with 50 tweets in each category.
社交媒体的快速发展,加上社交媒体用户表达意见的自由,影响了针对某些群体的仇恨言论的传播。基于网络的仇恨言论可以通过在社交媒体帖子中使用贬义词来识别。关于仇恨言论分类的研究有很多,但是对印尼语仇恨言论分类的研究却很少。本文提出了一种基于卷积神经网络的印尼语推文仇恨言论分类方法。训练和测试阶段的数据集都是从Twitter上收集的。收集到的推文被分为仇恨言论和非仇恨言论。我们使用TF-IDF作为术语加权方法进行特征提取。在45次训练时获得的最优训练准确率为90.85%,验证准确率为88.34%。在测试阶段,使用不同数量的测试数据进行实验。最高的测试准确率为82.5%,每个类别中有50条推文。
{"title":"Hate Speech Classification in Indonesian Language Tweets by Using Convolutional Neural Network","authors":"Ayu Nadia Taradhita, Ketut Gede Darma Putra","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.2","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.2","url":null,"abstract":"The rapid development of social media, added with the freedom of social media users to express their opinions, has influenced the spread of hate speech aimed at certain groups. Online based hate speech can be identified by the used of derogatory words in social media posts. Various studies on hate speech classification have been done, however, very few researches have been conducted on hate speech classification in the Indonesian language. This paper proposes a convolutional neural network method for classifying hate speech in tweets in the Indonesian language. Datasets for both the training and testing stages were collected from Twitter. The collected tweets were categorized into hate speech and non-hate speech. We used TF-IDF as the term weighting method for feature extraction. The most optimal training accuracy and validation accuracy gained were 90.85% and 88.34% at 45 epochs. For the testing stage, experiments were conducted with different amounts of testing data. The highest testing accuracy was 82.5%, achieved by the dataset with 50 tweets in each category.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"225-239"},"PeriodicalIF":0.6,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70736798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Research on Quality of Service Based Routing Protocols for Mobile Ad Hoc Networks 基于服务质量的移动自组网路由协议研究
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.6
S. Hizal, A. Zengin
Quality of service (QoS) based routing protocols play a significant role in MANETs to maintain proper flow of data with efficient power consumption and without data loss. However, several network resource based technical challenges or issues are encountered in the design and implementation of QoS routing protocols that perform their routing function by considering the shortest route or the lowest cost. Furthermore, a secondary route is not reserved and alternative routes are not searched unless the established route is broken. The current structures of the state-of-the-art protocols for MANETs are not appropriate for today’s high bandwidth and mobility requirements. Therefore, research on new routing protocols is needed, considering energy level, coverage, location, speed, movement, and link stability instead of only shortest path and lowest cost. This paper summarizes the main characteristics of QoS-based routing protocols to facilitate researchers to design and select QoS-based routing protocols. In this study, a wide range of protocols with their characteristics were classified according to QoS routing strategy, routing information update mechanism, interaction between network and MAC layer, QoS constraints, QoS guarantee type and number of discovered routes. In addition, the protocols were compared in terms of properties, design features, challenges and QoS metrics.
基于服务质量(QoS)的路由协议在MANET中发挥着重要作用,以保持具有高效功耗和无数据丢失的适当数据流。然而,在QoS路由协议的设计和实现中遇到了一些基于网络资源的技术挑战或问题,QoS路由协议通过考虑最短路由或最低成本来执行其路由功能。此外,不保留次要路线,并且除非已建立的路线被破坏,否则不搜索替代路线。最先进的MANET协议的当前结构不适合今天的™s的高带宽和移动性要求。因此,需要研究新的路由协议,考虑能量水平、覆盖范围、位置、速度、移动和链路稳定性,而不仅仅是最短路径和最低成本。本文总结了基于QoS的路由协议的主要特点,以便于研究人员设计和选择基于QoS的路由器协议。在本研究中,根据QoS路由策略、路由信息更新机制、网络与MAC层之间的交互、QoS约束、QoS保证类型和发现的路由数量,对各种协议及其特性进行了分类。此外,还从性能、设计特点、挑战和QoS指标等方面对协议进行了比较。
{"title":"Research on Quality of Service Based Routing Protocols for Mobile Ad Hoc Networks","authors":"S. Hizal, A. Zengin","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.6","url":null,"abstract":"Quality of service (QoS) based routing protocols play a significant role in MANETs to maintain proper flow of data with efficient power consumption and without data loss. However, several network resource based technical challenges or issues are encountered in the design and implementation of QoS routing protocols that perform their routing function by considering the shortest route or the lowest cost. Furthermore, a secondary route is not reserved and alternative routes are not searched unless the established route is broken. The current structures of the state-of-the-art protocols for MANETs are not appropriate for today’s high bandwidth and mobility requirements. Therefore, research on new routing protocols is needed, considering energy level, coverage, location, speed, movement, and link stability instead of only shortest path and lowest cost. This paper summarizes the main characteristics of QoS-based routing protocols to facilitate researchers to design and select QoS-based routing protocols. In this study, a wide range of protocols with their characteristics were classified according to QoS routing strategy, routing information update mechanism, interaction between network and MAC layer, QoS constraints, QoS guarantee type and number of discovered routes. In addition, the protocols were compared in terms of properties, design features, challenges and QoS metrics.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"185-205"},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45112360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Boost-Buck Converter Architecture for Improving Transient Response and Output-Voltage Ripple 一种改进暂态响应和输出电压纹波的新型升压变换器结构
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.4
Freddy Kurniawan, Lasmadi Lasmadi, Okto Dinaryanto, Bambang Sudibya, Mohammad Ridlo Erdata Nasution
Buck-boost converters are widely used in the development of DC-DC converters. Several techniques and algorithms have been introduced to improve the transient response of buck-boost converters. However, due to the opposite trends of the output current change and the output voltage change, undershoot or overshoot in the output voltage still seems to be inevitable. In order to overcome this problem, a novel boost-buck converter architecture is proposed to build a fast transient response DC-DC converter. The converter consists of a cascaded configuration of the boost and buck stages. The boost stage converts the input voltage to the shared capacitor voltage and the buck stage supplies energy to the load by converting the shared capacitor voltage to the output voltage. By harnessing the energy stored in the shared capacitor, the transient response of the boost buck converter can be improved to 2 µs in a step-up load current change of 1 A with an output-voltage ripple of 15 mV.
降压-升压变换器广泛应用于DC-DC变换器的开发中。已经引入了几种技术和算法来改善降压-升压转换器的瞬态响应。然而,由于输出电流变化和输出电压变化的相反趋势,输出电压中的下冲或过冲似乎仍然是不可避免的。为了克服这一问题,提出了一种新的升压-降压转换器结构,以构建快速瞬态响应的DC-DC转换器。该转换器由升压级和降压级的级联配置组成。升压级将输入电压转换为共享电容电压,降压级通过将共享电容电压转换为输出电压向负载提供能量。通过利用共享电容器中存储的能量,升压-降压转换器的瞬态响应可以在1A的升压负载电流变化中提高到2µs,输出电压纹波为15mV。
{"title":"A Novel Boost-Buck Converter Architecture for Improving Transient Response and Output-Voltage Ripple","authors":"Freddy Kurniawan, Lasmadi Lasmadi, Okto Dinaryanto, Bambang Sudibya, Mohammad Ridlo Erdata Nasution","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.4","url":null,"abstract":"Buck-boost converters are widely used in the development of DC-DC converters. Several techniques and algorithms have been introduced to improve the transient response of buck-boost converters. However, due to the opposite trends of the output current change and the output voltage change, undershoot or overshoot in the output voltage still seems to be inevitable. In order to overcome this problem, a novel boost-buck converter architecture is proposed to build a fast transient response DC-DC converter. The converter consists of a cascaded configuration of the boost and buck stages. The boost stage converts the input voltage to the shared capacitor voltage and the buck stage supplies energy to the load by converting the shared capacitor voltage to the output voltage. By harnessing the energy stored in the shared capacitor, the transient response of the boost buck converter can be improved to 2 µs in a step-up load current change of 1 A with an output-voltage ripple of 15 mV.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43297516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Power Loss Reduction and Voltage Stability Enhancement by Stock Exchange, Product Demand-Availability, Affluent and Penurious Algorithms 证券交易所降低实际电力损耗和提高电压稳定性、产品需求可用性、富裕和富裕算法
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-31 DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.5
K. Lenin
. In this paper, the Stock Exchange Algorithm (SEA), the Product Demand-Availability (PDA) algorithm, and the Affluent and Penurious (AP) algorithm are proposed to solve the power loss reduction problem. In the SEA approach, selling and buying shares in the stock exchange was imitated to design the algorithm. Stockholders are classified as Privileged, Average or Weak based on their fitness value. The PDA optimization algorithm is based on the consumer demand and availability of a product in the market. The Affluent and Penurious algorithm mimics the social behavior of people. The gap parameter (G) is defined to indicate the growing gap between affluent and penurious people when affluent people increase their wealth. The proposed Stock Exchange Algorithm, Product Demand-Availability optimization algorithm and the Affluent and Penurious optimization algorithm were tested in the IEEE 30 bus system. Real power loss minimization, voltage deviation minimization, and voltage stability index enhancement were successfully attained.
。本文提出了Stock Exchange Algorithm (SEA)、Product Demand-Availability (PDA)算法和Affluent and Penurious (AP)算法来解决功耗降低问题。在SEA方法中,模拟在证券交易所买卖股票来设计算法。根据股东的适应度值,将其分为特权股东、普通股东和弱势股东。PDA优化算法基于消费者需求和产品在市场上的可用性。富裕和贫穷算法模拟人们的社会行为。定义差距参数(G),表示当富人的财富增加时,富人和穷人之间的差距越来越大。本文提出的证券交易算法、产品需求-可用性优化算法和富裕与贫穷优化算法在ieee30总线系统上进行了测试。成功地实现了实际功率损耗最小化、电压偏差最小化和电压稳定指标的提高。
{"title":"Real Power Loss Reduction and Voltage Stability Enhancement by Stock Exchange, Product Demand-Availability, Affluent and Penurious Algorithms","authors":"K. Lenin","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.5","url":null,"abstract":". In this paper, the Stock Exchange Algorithm (SEA), the Product Demand-Availability (PDA) algorithm, and the Affluent and Penurious (AP) algorithm are proposed to solve the power loss reduction problem. In the SEA approach, selling and buying shares in the stock exchange was imitated to design the algorithm. Stockholders are classified as Privileged, Average or Weak based on their fitness value. The PDA optimization algorithm is based on the consumer demand and availability of a product in the market. The Affluent and Penurious algorithm mimics the social behavior of people. The gap parameter (G) is defined to indicate the growing gap between affluent and penurious people when affluent people increase their wealth. The proposed Stock Exchange Algorithm, Product Demand-Availability optimization algorithm and the Affluent and Penurious optimization algorithm were tested in the IEEE 30 bus system. Real power loss minimization, voltage deviation minimization, and voltage stability index enhancement were successfully attained.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47165515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Image Encryption Using Two Chaotic Maps 利用两个混沌映射增强图像加密
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-12-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.3
F. A. Salman, Khitam Abdulnabi Salman
Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold’s cat map) that meet the general security requirements of image transmission. First the image is encrypted using Arnold’s cat map, which shuffles the image pixels. 3D logistic map is applied to the encrypted image for transformation and permutation purposes. Then the XOR operation for the encrypted image and a chaotic sequence key are used to provide more security after the pixel values have been changed. The performance of the proposed security method was evaluated using MATLAB by analyzing the correlation between adjacent pixels, histogram analysis, and entropy information. The simulation results showed that the proposed method is robust and resilient. It can achieve an average of 7.99 for entropy information, 99.6% for NPCR, and 33.77 % for UCAI.     Â
信息安全是各种通信领域、多媒体框架、医学成像和军事通信的一个重要方面。然而,它们中的大多数都会遇到鲁棒性或安全性不足等问题。最近,利用混沌技术实现信息安全的方法越来越受欢迎,因为它们提供遍历和随机生成的密钥。本文介绍了两种混沌图(3D logistic图和arnold s cat图)的组合,满足了图像传输的一般安全要求。首先,使用arnold的cat映射对图像进行加密,该映射会打乱图像像素。将三维逻辑映射应用于加密图像进行变换和排列。然后对加密后的图像进行异或操作,并使用混沌序列密钥在像素值发生变化后提供更高的安全性。通过分析相邻像素之间的相关性、直方图分析和熵信息,利用MATLAB对所提安全方法的性能进行了评价。仿真结果表明,该方法具有鲁棒性和弹性。平均熵值为7.99,NPCR为99.6%,UCAI为33.77%。     Â
{"title":"Enhanced Image Encryption Using Two Chaotic Maps","authors":"F. A. Salman, Khitam Abdulnabi Salman","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.3","url":null,"abstract":"Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold’s cat map) that meet the general security requirements of image transmission. First the image is encrypted using Arnold’s cat map, which shuffles the image pixels. 3D logistic map is applied to the encrypted image for transformation and permutation purposes. Then the XOR operation for the encrypted image and a chaotic sequence key are used to provide more security after the pixel values have been changed. The performance of the proposed security method was evaluated using MATLAB by analyzing the correlation between adjacent pixels, histogram analysis, and entropy information. The simulation results showed that the proposed method is robust and resilient. It can achieve an average of 7.99 for entropy information, 99.6% for NPCR, and 33.77 % for UCAI.     Â","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"134-148"},"PeriodicalIF":0.6,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45246162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of ICT Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1