Pub Date : 2021-04-06DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.3.5
Aji Gautama Putrada, Nur Ghaniaviyanto Ramadhan
Dynamic device pairing is a context-based zero-interaction method to pair end-devices in an IoT System based on Received Signal Strength Indicator (RSSI) values. But if RSSI detection is done in high level, the accuracy is troublesome due to poor sampling rates. This research proposes the Hidden Markov Model method to increase the performance of dynamic device pairing detection. This research implements an IoT system consisting an Access Point, an IoT End Device, an IoT Platform, and an IoT application and performs a comparison of two different methods to prove the concept. The results show that the precision of dynamic device pairing with HMM is better than without HMM and the value is 83,93%.
{"title":"A Proposed Hidden Markov Model Method for Dynamic Device Pairing on Internet of Things End-Devices","authors":"Aji Gautama Putrada, Nur Ghaniaviyanto Ramadhan","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.3.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.3.5","url":null,"abstract":"Dynamic device pairing is a context-based zero-interaction method to pair end-devices in an IoT System based on Received Signal Strength Indicator (RSSI) values. But if RSSI detection is done in high level, the accuracy is troublesome due to poor sampling rates. This research proposes the Hidden Markov Model method to increase the performance of dynamic device pairing detection. This research implements an IoT system consisting an Access Point, an IoT End Device, an IoT Platform, and an IoT application and performs a comparison of two different methods to prove the concept. The results show that the precision of dynamic device pairing with HMM is better than without HMM and the value is 83,93%.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"274-285"},"PeriodicalIF":0.6,"publicationDate":"2021-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41733283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-31DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.6
A. Mulyanto, W. Jatmiko, P. Mursanto, Purwono Prasetyawan, Rohmat Indra Borman
Intelligent transport systems (ITS) are a promising area of studies. One implementation of ITS are advanced driver assistance systems (ADAS), involving the problem of obstacle detection in traffic. This study evaluated the YOLOv4 model as a state-of-the-art CNN-based one-stage detector to recognize traffic obstacles. A new dataset is proposed containing traffic obstacles on Indonesian roads for ADAS to detect traffic obstacles that are unique to Indonesia, such as pedicabs, street vendors, and bus shelters, and are not included in existing datasets. This study established a traffic obstacle dataset containing eleven object classes: cars, buses, trucks, bicycles, motorcycles, pedestrians, pedicabs, trees, bus shelters, traffic signs, and street vendors, with 26,016 labeled instances in 7,789 images. A performance analysis of traffic obstacle detection on Indonesian roads using the dataset created in this study was conducted using the YOLOv4 method.
{"title":"A New Indonesian Traffic Obstacle Dataset and Performance Evaluation of YOLOv4 for ADAS","authors":"A. Mulyanto, W. Jatmiko, P. Mursanto, Purwono Prasetyawan, Rohmat Indra Borman","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.6","url":null,"abstract":"Intelligent transport systems (ITS) are a promising area of studies. One implementation of ITS are advanced driver assistance systems (ADAS), involving the problem of obstacle detection in traffic. This study evaluated the YOLOv4 model as a state-of-the-art CNN-based one-stage detector to recognize traffic obstacles. A new dataset is proposed containing traffic obstacles on Indonesian roads for ADAS to detect traffic obstacles that are unique to Indonesia, such as pedicabs, street vendors, and bus shelters, and are not included in existing datasets. This study established a traffic obstacle dataset containing eleven object classes: cars, buses, trucks, bicycles, motorcycles, pedestrians, pedicabs, trees, bus shelters, traffic signs, and street vendors, with 26,016 labeled instances in 7,789 images. A performance analysis of traffic obstacle detection on Indonesian roads using the dataset created in this study was conducted using the YOLOv4 method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"286-298"},"PeriodicalIF":0.6,"publicationDate":"2021-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48326453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-03-17DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.4
Jibrin Bala, H. Salau, I. J. Umoh, A. Onumanyi, Salawudeen A. Tijani, B. Yahaya
The segmentation of a single leaf from an image with overlapping leaves is an important step towards the realization of effective precision agricultural systems. A popular approach used for this segmentation task is the hybridization of the Chan-Vese model and the Sobel operator CV-SO. This hybridized approach is popular because of its simplicity and effectiveness in segmenting a single leaf of interest from a complex background of overlapping leaves. However, the manual threshold and parameter tuning procedure of the CV-SO algorithm often degrades its detection performance. In this paper, we address this problem by introducing a dynamic iterative model to determine the optimal parameters for the CV-SO algorithm, which we dubbed the Dynamic CV-SO (DCV-SO) algorithm. This is a new hybrid automatic segmentation technique that attempts to improve the detection performance of the original hybrid CV-SO algorithm by reducing its mean error rate. The results obtained via simulation indicate that the proposed method yielded a 1.23% reduction in the mean error rate against the original CV-SO method.
{"title":"Development of Hybrid Automatic Segmentation Technique of a Single Leaf from Overlapping Leaves Image","authors":"Jibrin Bala, H. Salau, I. J. Umoh, A. Onumanyi, Salawudeen A. Tijani, B. Yahaya","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.4","url":null,"abstract":"The segmentation of a single leaf from an image with overlapping leaves is an important step towards the realization of effective precision agricultural systems. A popular approach used for this segmentation task is the hybridization of the Chan-Vese model and the Sobel operator CV-SO. This hybridized approach is popular because of its simplicity and effectiveness in segmenting a single leaf of interest from a complex background of overlapping leaves. However, the manual threshold and parameter tuning procedure of the CV-SO algorithm often degrades its detection performance. In this paper, we address this problem by introducing a dynamic iterative model to determine the optimal parameters for the CV-SO algorithm, which we dubbed the Dynamic CV-SO (DCV-SO) algorithm. This is a new hybrid automatic segmentation technique that attempts to improve the detection performance of the original hybrid CV-SO algorithm by reducing its mean error rate. The results obtained via simulation indicate that the proposed method yielded a 1.23% reduction in the mean error rate against the original CV-SO method.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44696150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-23DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.3
Azhar A. Alsufyani, K. Almotairi
Spectral utilization is a major challenge in wireless ad hoc networks due in part to using limited network resources. For ad hoc networks, the bandwidth is shared among stations that can transmit data at any point in time. It  is important to maximize the throughput to enhance the network service. In this paper, we propose an adaptive multi-channel access with transmission opportunity protocol for multi-channel ad hoc networks, called AMCA-TXOP. For the purpose of coordination, the proposed protocol uses an adaptive common control channel over which the stations negotiate their channel selection based on the entire available bandwidth and then switch to the negotiated channel. AMCA-TXOP requires a single radio interface so that each station can listen to the control channel, which can overhear all agreements made by the other stations. This allows parallel transmission to multiple stations over various channels, prioritizing data traffic to achieve the quality-of-service requirements. The proposed approach can work with the 802.11ac protocol, which has expanded the bandwidth to 160 MHz by channel bonding. Simulations were conducted to demonstrate the throughput gains that can be achieved using the AMCA-TXOP protocol. Moreover, we compared our protocol with  the IEEE 802.11ac standard protocols.
{"title":"An Adaptive Common Control Channel MAC with Transmission Opportunity in IEEE 802.11ac","authors":"Azhar A. Alsufyani, K. Almotairi","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.3","url":null,"abstract":"Spectral utilization is a major challenge in wireless ad hoc networks due in part to using limited network resources. For ad hoc networks, the bandwidth is shared among stations that can transmit data at any point in time. It  is important to maximize the throughput to enhance the network service. In this paper, we propose an adaptive multi-channel access with transmission opportunity protocol for multi-channel ad hoc networks, called AMCA-TXOP. For the purpose of coordination, the proposed protocol uses an adaptive common control channel over which the stations negotiate their channel selection based on the entire available bandwidth and then switch to the negotiated channel. AMCA-TXOP requires a single radio interface so that each station can listen to the control channel, which can overhear all agreements made by the other stations. This allows parallel transmission to multiple stations over various channels, prioritizing data traffic to achieve the quality-of-service requirements. The proposed approach can work with the 802.11ac protocol, which has expanded the bandwidth to 160 MHz by channel bonding. Simulations were conducted to demonstrate the throughput gains that can be achieved using the AMCA-TXOP protocol. Moreover, we compared our protocol with  the IEEE 802.11ac standard protocols.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"240-256"},"PeriodicalIF":0.6,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48317949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-23DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.1
N. Thilakarathne
A pandemic is a contagious disease outbreak that happens over a large geographic area and affects a great portion of the population while new pathogens appear for which people have less immunity and no vaccines are available. The disease can spread from person to person in a very short time. Health workers are at greater risk of infection because of patients who are carriers. In the 21st century, where everyone is connected through digital technologies, information and communication technology (ICT) plays a critical role in improving healthcare for individuals and larger communities. ICT can be divided into a wide variety of application domains that signify its importance as a major technological paradigm. It is currently drawing large attention because of its potential to alleviate the burden on healthcare systems caused by the rise in chronic diseases, aging populations and pandemic situations. This study surveyed substantial knowledge on how effective ICT healthcare solutions can be used towards managing global pandemics. In order to make it more comprehensive, we also present a four-phase strategic framework that can be deployed to alleviate the strain on healthcare resources during a pandemic, which was derived from the reviewed literature. Further, we also discuss how ICT technologies can be used towards managing pandemic situations chronographically during the transformation from a simple disease outbreak into a global pandemic.
{"title":"Review on the Use of ICT Driven Solutions Towards Managing Global Pandemics","authors":"N. Thilakarathne","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.1","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.1","url":null,"abstract":"A pandemic is a contagious disease outbreak that happens over a large geographic area and affects a great portion of the population while new pathogens appear for which people have less immunity and no vaccines are available. The disease can spread from person to person in a very short time. Health workers are at greater risk of infection because of patients who are carriers. In the 21st century, where everyone is connected through digital technologies, information and communication technology (ICT) plays a critical role in improving healthcare for individuals and larger communities. ICT can be divided into a wide variety of application domains that signify its importance as a major technological paradigm. It is currently drawing large attention because of its potential to alleviate the burden on healthcare systems caused by the rise in chronic diseases, aging populations and pandemic situations. This study surveyed substantial knowledge on how effective ICT healthcare solutions can be used towards managing global pandemics. In order to make it more comprehensive, we also present a four-phase strategic framework that can be deployed to alleviate the strain on healthcare resources during a pandemic, which was derived from the reviewed literature. Further, we also discuss how ICT technologies can be used towards managing pandemic situations chronographically during the transformation from a simple disease outbreak into a global pandemic.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46541526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-02-23DOI: 10.5614/ITBJ.ICT.RES.APPL.2021.14.3.2
Ayu Nadia Taradhita, Ketut Gede Darma Putra
The rapid development of social media, added with the freedom of social media users to express their opinions, has influenced the spread of hate speech aimed at certain groups. Online based hate speech can be identified by the used of derogatory words in social media posts. Various studies on hate speech classification have been done, however, very few researches have been conducted on hate speech classification in the Indonesian language. This paper proposes a convolutional neural network method for classifying hate speech in tweets in the Indonesian language. Datasets for both the training and testing stages were collected from Twitter. The collected tweets were categorized into hate speech and non-hate speech. We used TF-IDF as the term weighting method for feature extraction. The most optimal training accuracy and validation accuracy gained were 90.85% and 88.34% at 45 epochs. For the testing stage, experiments were conducted with different amounts of testing data. The highest testing accuracy was 82.5%, achieved by the dataset with 50 tweets in each category.
{"title":"Hate Speech Classification in Indonesian Language Tweets by Using Convolutional Neural Network","authors":"Ayu Nadia Taradhita, Ketut Gede Darma Putra","doi":"10.5614/ITBJ.ICT.RES.APPL.2021.14.3.2","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2021.14.3.2","url":null,"abstract":"The rapid development of social media, added with the freedom of social media users to express their opinions, has influenced the spread of hate speech aimed at certain groups. Online based hate speech can be identified by the used of derogatory words in social media posts. Various studies on hate speech classification have been done, however, very few researches have been conducted on hate speech classification in the Indonesian language. This paper proposes a convolutional neural network method for classifying hate speech in tweets in the Indonesian language. Datasets for both the training and testing stages were collected from Twitter. The collected tweets were categorized into hate speech and non-hate speech. We used TF-IDF as the term weighting method for feature extraction. The most optimal training accuracy and validation accuracy gained were 90.85% and 88.34% at 45 epochs. For the testing stage, experiments were conducted with different amounts of testing data. The highest testing accuracy was 82.5%, achieved by the dataset with 50 tweets in each category.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"225-239"},"PeriodicalIF":0.6,"publicationDate":"2021-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70736798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.6
S. Hizal, A. Zengin
Quality of service (QoS) based routing protocols play a significant role in MANETs to maintain proper flow of data with efficient power consumption and without data loss. However, several network resource based technical challenges or issues are encountered in the design and implementation of QoS routing protocols that perform their routing function by considering the shortest route or the lowest cost. Furthermore, a secondary route is not reserved and alternative routes are not searched unless the established route is broken. The current structures of the state-of-the-art protocols for MANETs are not appropriate for today’s high bandwidth and mobility requirements. Therefore, research on new routing protocols is needed, considering energy level, coverage, location, speed, movement, and link stability instead of only shortest path and lowest cost. This paper summarizes the main characteristics of QoS-based routing protocols to facilitate researchers to design and select QoS-based routing protocols. In this study, a wide range of protocols with their characteristics were classified according to QoS routing strategy, routing information update mechanism, interaction between network and MAC layer, QoS constraints, QoS guarantee type and number of discovered routes. In addition, the protocols were compared in terms of properties, design features, challenges and QoS metrics.
{"title":"Research on Quality of Service Based Routing Protocols for Mobile Ad Hoc Networks","authors":"S. Hizal, A. Zengin","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.6","url":null,"abstract":"Quality of service (QoS) based routing protocols play a significant role in MANETs to maintain proper flow of data with efficient power consumption and without data loss. However, several network resource based technical challenges or issues are encountered in the design and implementation of QoS routing protocols that perform their routing function by considering the shortest route or the lowest cost. Furthermore, a secondary route is not reserved and alternative routes are not searched unless the established route is broken. The current structures of the state-of-the-art protocols for MANETs are not appropriate for today’s high bandwidth and mobility requirements. Therefore, research on new routing protocols is needed, considering energy level, coverage, location, speed, movement, and link stability instead of only shortest path and lowest cost. This paper summarizes the main characteristics of QoS-based routing protocols to facilitate researchers to design and select QoS-based routing protocols. In this study, a wide range of protocols with their characteristics were classified according to QoS routing strategy, routing information update mechanism, interaction between network and MAC layer, QoS constraints, QoS guarantee type and number of discovered routes. In addition, the protocols were compared in terms of properties, design features, challenges and QoS metrics.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"185-205"},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45112360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Buck-boost converters are widely used in the development of DC-DC converters. Several techniques and algorithms have been introduced to improve the transient response of buck-boost converters. However, due to the opposite trends of the output current change and the output voltage change, undershoot or overshoot in the output voltage still seems to be inevitable. In order to overcome this problem, a novel boost-buck converter architecture is proposed to build a fast transient response DC-DC converter. The converter consists of a cascaded configuration of the boost and buck stages. The boost stage converts the input voltage to the shared capacitor voltage and the buck stage supplies energy to the load by converting the shared capacitor voltage to the output voltage. By harnessing the energy stored in the shared capacitor, the transient response of the boost buck converter can be improved to 2 µs in a step-up load current change of 1 A with an output-voltage ripple of 15 mV.
{"title":"A Novel Boost-Buck Converter Architecture for Improving Transient Response and Output-Voltage Ripple","authors":"Freddy Kurniawan, Lasmadi Lasmadi, Okto Dinaryanto, Bambang Sudibya, Mohammad Ridlo Erdata Nasution","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.4","url":null,"abstract":"Buck-boost converters are widely used in the development of DC-DC converters. Several techniques and algorithms have been introduced to improve the transient response of buck-boost converters. However, due to the opposite trends of the output current change and the output voltage change, undershoot or overshoot in the output voltage still seems to be inevitable. In order to overcome this problem, a novel boost-buck converter architecture is proposed to build a fast transient response DC-DC converter. The converter consists of a cascaded configuration of the boost and buck stages. The boost stage converts the input voltage to the shared capacitor voltage and the buck stage supplies energy to the load by converting the shared capacitor voltage to the output voltage. By harnessing the energy stored in the shared capacitor, the transient response of the boost buck converter can be improved to 2 µs in a step-up load current change of 1 A with an output-voltage ripple of 15 mV.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43297516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-31DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.5
K. Lenin
. In this paper, the Stock Exchange Algorithm (SEA), the Product Demand-Availability (PDA) algorithm, and the Affluent and Penurious (AP) algorithm are proposed to solve the power loss reduction problem. In the SEA approach, selling and buying shares in the stock exchange was imitated to design the algorithm. Stockholders are classified as Privileged, Average or Weak based on their fitness value. The PDA optimization algorithm is based on the consumer demand and availability of a product in the market. The Affluent and Penurious algorithm mimics the social behavior of people. The gap parameter (G) is defined to indicate the growing gap between affluent and penurious people when affluent people increase their wealth. The proposed Stock Exchange Algorithm, Product Demand-Availability optimization algorithm and the Affluent and Penurious optimization algorithm were tested in the IEEE 30 bus system. Real power loss minimization, voltage deviation minimization, and voltage stability index enhancement were successfully attained.
。本文提出了Stock Exchange Algorithm (SEA)、Product Demand-Availability (PDA)算法和Affluent and Penurious (AP)算法来解决功耗降低问题。在SEA方法中,模拟在证券交易所买卖股票来设计算法。根据股东的适应度值,将其分为特权股东、普通股东和弱势股东。PDA优化算法基于消费者需求和产品在市场上的可用性。富裕和贫穷算法模拟人们的社会行为。定义差距参数(G),表示当富人的财富增加时,富人和穷人之间的差距越来越大。本文提出的证券交易算法、产品需求-可用性优化算法和富裕与贫穷优化算法在ieee30总线系统上进行了测试。成功地实现了实际功率损耗最小化、电压偏差最小化和电压稳定指标的提高。
{"title":"Real Power Loss Reduction and Voltage Stability Enhancement by Stock Exchange, Product Demand-Availability, Affluent and Penurious Algorithms","authors":"K. Lenin","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.5","url":null,"abstract":". In this paper, the Stock Exchange Algorithm (SEA), the Product Demand-Availability (PDA) algorithm, and the Affluent and Penurious (AP) algorithm are proposed to solve the power loss reduction problem. In the SEA approach, selling and buying shares in the stock exchange was imitated to design the algorithm. Stockholders are classified as Privileged, Average or Weak based on their fitness value. The PDA optimization algorithm is based on the consumer demand and availability of a product in the market. The Affluent and Penurious algorithm mimics the social behavior of people. The gap parameter (G) is defined to indicate the growing gap between affluent and penurious people when affluent people increase their wealth. The proposed Stock Exchange Algorithm, Product Demand-Availability optimization algorithm and the Affluent and Penurious optimization algorithm were tested in the IEEE 30 bus system. Real power loss minimization, voltage deviation minimization, and voltage stability index enhancement were successfully attained.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47165515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-12-28DOI: 10.5614/ITBJ.ICT.RES.APPL.2020.14.2.3
F. A. Salman, Khitam Abdulnabi Salman
Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold’s cat map) that meet the general security requirements of image transmission. First the image is encrypted using Arnold’s cat map, which shuffles the image pixels. 3D logistic map is applied to the encrypted image for transformation and permutation purposes. Then the XOR operation for the encrypted image and a chaotic sequence key are used to provide more security after the pixel values have been changed. The performance of the proposed security method was evaluated using MATLAB by analyzing the correlation between adjacent pixels, histogram analysis, and entropy information. The simulation results showed that the proposed method is robust and resilient. It can achieve an average of 7.99 for entropy information, 99.6% for NPCR, and 33.77 % for UCAI.   Â
信息安全是各种通信领域、多媒体框架、医学成像和军事通信的一个重要方面。然而,它们中的大多数都会遇到鲁棒性或安全性不足等问题。最近,利用混沌技术实现信息安全的方法越来越受欢迎,因为它们提供遍历和随机生成的密钥。本文介绍了两种混沌图(3D logistic图和arnold s cat图)的组合,满足了图像传输的一般安全要求。首先,使用arnold的cat映射对图像进行加密,该映射会打乱图像像素。将三维逻辑映射应用于加密图像进行变换和排列。然后对加密后的图像进行异或操作,并使用混沌序列密钥在像素值发生变化后提供更高的安全性。通过分析相邻像素之间的相关性、直方图分析和熵信息,利用MATLAB对所提安全方法的性能进行了评价。仿真结果表明,该方法具有鲁棒性和弹性。平均熵值为7.99,NPCR为99.6%,UCAI为33.77%。Â Â Â Â
{"title":"Enhanced Image Encryption Using Two Chaotic Maps","authors":"F. A. Salman, Khitam Abdulnabi Salman","doi":"10.5614/ITBJ.ICT.RES.APPL.2020.14.2.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2020.14.2.3","url":null,"abstract":"Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold’s cat map) that meet the general security requirements of image transmission. First the image is encrypted using Arnold’s cat map, which shuffles the image pixels. 3D logistic map is applied to the encrypted image for transformation and permutation purposes. Then the XOR operation for the encrypted image and a chaotic sequence key are used to provide more security after the pixel values have been changed. The performance of the proposed security method was evaluated using MATLAB by analyzing the correlation between adjacent pixels, histogram analysis, and entropy information. The simulation results showed that the proposed method is robust and resilient. It can achieve an average of 7.99 for entropy information, 99.6% for NPCR, and 33.77 % for UCAI.   Â","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"14 1","pages":"134-148"},"PeriodicalIF":0.6,"publicationDate":"2020-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45246162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}