首页 > 最新文献

Malaysian Journal of Computer Science最新文献

英文 中文
LOAD FREQUENCY CONTROL FOR AN ISOLATED HYBRID POWER SYSTEM WITH HYBRID CONTROL TECHNIQUE AND COMPARATIVE ANALYSIS WITH DIFFERENT CONTROL TECHNIQUES 用混合控制技术对隔离型混合电力系统进行负荷频率控制,并与不同控制技术进行比较分析
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.6
N. Kumar, V. Gandhi
This paper presents a hybrid isolated power system modeling and Load Frequency Controller (LFC) for different penetration levels of wind power generation. The system considered here consists of a conventional diesel generator, wind generator and energy storage system for a LFC. The purpose of the considered system is to suppress the frequency deviations (balancing the real power generation and demand). An inertia control is used to obtain the best possible gain of the wind system and Fuzzy Logic Control (FLC) is used to control the frequency of the hybrid system. The results are compared with different control techniques. The dynamic performance of the system is studied at different cases by changing the wind penetration level and also by increasing the load disturbances.
针对风力发电的不同渗透水平,提出了一种混合隔离电力系统建模和负载频率控制器(LFC)。这里考虑的系统包括一个传统的柴油发电机、风力发电机和LFC的储能系统。考虑系统的目的是抑制频率偏差(平衡实际发电量和需求)。采用惯性控制来获得风系统的最佳增益,采用模糊逻辑控制(FLC)来控制混合系统的频率。结果与不同的控制技术进行了比较。在不同情况下,通过改变风侵彻程度和增加负载扰动,研究了系统的动态性能。
{"title":"LOAD FREQUENCY CONTROL FOR AN ISOLATED HYBRID POWER SYSTEM WITH HYBRID CONTROL TECHNIQUE AND COMPARATIVE ANALYSIS WITH DIFFERENT CONTROL TECHNIQUES","authors":"N. Kumar, V. Gandhi","doi":"10.22452/mjcs.sp2020no1.6","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.6","url":null,"abstract":"This paper presents a hybrid isolated power system modeling and Load Frequency Controller (LFC) for different penetration levels of wind power generation. The system considered here consists of a conventional diesel generator, wind generator and energy storage system for a LFC. The purpose of the considered system is to suppress the frequency deviations (balancing the real power generation and demand). An inertia control is used to obtain the best possible gain of the wind system and Fuzzy Logic Control (FLC) is used to control the frequency of the hybrid system. The results are compared with different control techniques. The dynamic performance of the system is studied at different cases by changing the wind penetration level and also by increasing the load disturbances.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47939773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
AN ADAPTIVE HESITANT FUZZY SETS BASED GROUP RECOMMENDATION SYSTEM 基于自适应犹豫模糊集的群体推荐系统
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.9
R. Jayaraman, V. Subramaniyaswamy, Logesh Ravi
Accurate group movie recommendation systems are a need in society today. We find that people tend to watch movies in groups rather than by themselves. However, the groups of people that tend to watch movies together are very diverse. In the existing methods, the characteristics of individual users are simply aggregated to obtain the group’s attributes and most of the time useful data is not utilized. This can be improved upon by ensuring the utilization of all the data that we are presented with from the scenario. The method proposed in this paper is termed integrated as we weighed in the individual traits of each user in the group when predicting the group’s rating for a movie. We used the concept of Hesitant Fuzzy Sets (HFS) in order to keep track of the characteristics of each of the users individually. The method we proposed in this paper employs Matrix Factorisation (MF) based Collaborative Filtering (CF) along with hesitant fuzzy sets. The way we performed MF based CF for a group is that we found the factors first and then formed the groups. The ratings were then predicted for these groups. The groups we have considered are of three sizes - 3 users, 5 users, and 10 users.
准确的团体电影推荐系统是当今社会所需要的。我们发现人们倾向于成群结队地看电影,而不是自己看。然而,倾向于一起看电影的人群是非常多样化的。在现有的方法中,简单地对单个用户的特征进行聚合,得到群体的属性,很多时候没有利用有用的数据。这可以通过确保利用场景中呈现的所有数据来改进。本文提出的方法被称为综合方法,因为我们在预测该组对电影的评分时权衡了组中每个用户的个人特征。我们使用了犹豫模糊集(HFS)的概念来单独跟踪每个用户的特征。本文提出的方法采用基于矩阵分解(MF)的协同过滤(CF)和犹豫模糊集。我们对一组进行基于MF的CF的方法是,我们首先找到因素,然后形成组。然后预测这些群体的评分。我们考虑的组有三种大小——3个用户、5个用户和10个用户。
{"title":"AN ADAPTIVE HESITANT FUZZY SETS BASED GROUP RECOMMENDATION SYSTEM","authors":"R. Jayaraman, V. Subramaniyaswamy, Logesh Ravi","doi":"10.22452/mjcs.sp2020no1.9","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.9","url":null,"abstract":"Accurate group movie recommendation systems are a need in society today. We find that people tend to watch movies in groups rather than by themselves. However, the groups of people that tend to watch movies together are very diverse. In the existing methods, the characteristics of individual users are simply aggregated to obtain the group’s attributes and most of the time useful data is not utilized. This can be improved upon by ensuring the utilization of all the data that we are presented with from the scenario. The method proposed in this paper is termed integrated as we weighed in the individual traits of each user in the group when predicting the group’s rating for a movie. We used the concept of Hesitant Fuzzy Sets (HFS) in order to keep track of the characteristics of each of the users individually. The method we proposed in this paper employs Matrix Factorisation (MF) based Collaborative Filtering (CF) along with hesitant fuzzy sets. The way we performed MF based CF for a group is that we found the factors first and then formed the groups. The ratings were then predicted for these groups. The groups we have considered are of three sizes - 3 users, 5 users, and 10 users.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45479162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A V2I BASED APPROACH TO MULTICAST IN VEHICULAR NETWORKS 一种基于v2i的车载网络组播方法
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.7
R. Tomar, Hanumat G. Sastry, M. Prateek
The present research work proposes a novel approach for efficient information dissemination in Vehicular Networks using V2I based communication. This approach makes use of the V2I communication to establish the connectivity between the cloud server and the vehicle. The approach is focused on finding the utility of existing IoT protocols in the Vehicular Networks. The foundation of this work relies in the (Message Queue Telemetry Transport Protocol) MQTT protocol, IoT and IaaS. The paper presents the background technologies used in the work and propose the approach. The proposed approach has been experimentally tested and found significant results.
本研究提出了一种基于V2I通信的车载网络高效信息传播新方法。这种方法利用V2I通信在云服务器和车辆之间建立连接。该方法的重点是寻找现有物联网协议在车载网络中的效用。这项工作的基础依赖于(消息队列遥测传输协议)MQTT协议、IoT和IaaS。本文介绍了工作中用到的背景技术,并提出了实现方法。所提出的方法已经过实验测试,并取得了显著的结果。
{"title":"A V2I BASED APPROACH TO MULTICAST IN VEHICULAR NETWORKS","authors":"R. Tomar, Hanumat G. Sastry, M. Prateek","doi":"10.22452/mjcs.sp2020no1.7","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.7","url":null,"abstract":"The present research work proposes a novel approach for efficient information dissemination in Vehicular Networks using V2I based communication. This approach makes use of the V2I communication to establish the connectivity between the cloud server and the vehicle. The approach is focused on finding the utility of existing IoT protocols in the Vehicular Networks. The foundation of this work relies in the (Message Queue Telemetry Transport Protocol) MQTT protocol, IoT and IaaS. The paper presents the background technologies used in the work and propose the approach. The proposed approach has been experimentally tested and found significant results.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44889985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PREDICTION OF CYCLONE USING KALMAN SPATIO TEMPORAL AND TWO DIMENSIONAL DEEP LEARNING MODEL 基于卡尔曼时空和二维深度学习模型的气旋预报
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.3
K. Rajesh, V. Ramaswamy, K. Kannan
Cyclone Classification and Prediction models rely on large intensity based on the maximum speed of the wind, along with the classification of intensity. The computational constraints blended with the formation of those intensities, cyclone classification and prediction firmly depreciate the full range of optimal features required for classification and hence accurate representation is less possible. Keeping this point, our study inspects the potential of Spatio-temporal features using a machine learning algorithm as an alternative to the current study of cyclones. This method is called, Spatio-Temporal Kalman Momentum and Two Dimensional Deep Learning (SKM-2DDP) for cyclone classification and prediction. To start with, pre-processing is performed by applying the Kalman Momentum Conservation Filter mechanism based on the design of the Dvorak technique to obtain optimal estimates of state variables and reduce the computational burden involved to remove noise from input cyclone images. With the resultant denoised input cyclone images, Spatio Temporal Feature Extraction is performed. Features obtained from the inherent intrinsic properties of pre-processed cyclone images of several weather conditions result in successful classification. Followed by pre-processing, in this work, features constituting both pixel-wise intensities over time and the directional length are being considered. The dependency of autocorrelation with each pixel’s intensities over time and two temporal features are helped for coarse classification of weather conditions according to their visual effects. Finally, with the inherent intrinsic features extracted, a Two Dimensional Deep Learning model is utilized to foretell the cyclone intensity. Experimental evaluation of the proposed SKM-2DDP method is accomplished using images of cyclone dataset with many factors just as peak signal to noise ratio, prediction accuracy, prediction time and false-positive rate. Our own selves have considered with several cyclone images acquired from two different cyclone image datasets namely OCKHI_DEC2017 and VARDAH_DEC2016.
气旋分类和预测模型依赖于基于最大风速的大强度,以及强度分类。计算约束与这些强度的形成、气旋分类和预测相结合,大大削弱了分类所需的所有最佳特征,因此准确表示是不可能的。保持这一点,我们的研究使用机器学习算法来检查时空特征的潜力,作为当前气旋研究的替代方案。这种方法被称为时空卡尔曼动量和二维深度学习(SKM-2DDP),用于气旋分类和预测。首先,通过应用基于德沃夏克技术设计的卡尔曼动量守恒滤波器机制进行预处理,以获得状态变量的最佳估计,并减少从输入气旋图像中去除噪声所涉及的计算负担。利用所得到的去噪输入气旋图像,进行时空特征提取。从几种天气条件的预处理气旋图像的固有特性中获得的特征导致了成功的分类。然后是预处理,在这项工作中,考虑了构成随时间变化的像素强度和方向长度的特征。自相关与每个像素的强度随时间的依赖性和两个时间特征有助于根据天气条件的视觉效果对其进行粗略分类。最后,通过提取固有的内在特征,利用二维深度学习模型预测气旋强度。利用气旋数据集的图像,结合峰值信噪比、预测精度、预测时间和假阳性率等因素,对所提出的SKM-2DDP方法进行了实验评估。我们自己已经考虑了从两个不同的气旋图像数据集(即OCKHI_DEC2017和VARDAH_DEC2016)中获得的几个气旋图像。
{"title":"PREDICTION OF CYCLONE USING KALMAN SPATIO TEMPORAL AND TWO DIMENSIONAL DEEP LEARNING MODEL","authors":"K. Rajesh, V. Ramaswamy, K. Kannan","doi":"10.22452/mjcs.sp2020no1.3","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.3","url":null,"abstract":"Cyclone Classification and Prediction models rely on large intensity based on the maximum speed of the wind, along with the classification of intensity. The computational constraints blended with the formation of those intensities, cyclone classification and prediction firmly depreciate the full range of optimal features required for classification and hence accurate representation is less possible. Keeping this point, our study inspects the potential of Spatio-temporal features using a machine learning algorithm as an alternative to the current study of cyclones. This method is called, Spatio-Temporal Kalman Momentum and Two Dimensional Deep Learning (SKM-2DDP) for cyclone classification and prediction. To start with, pre-processing is performed by applying the Kalman Momentum Conservation Filter mechanism based on the design of the Dvorak technique to obtain optimal estimates of state variables and reduce the computational burden involved to remove noise from input cyclone images. With the resultant denoised input cyclone images, Spatio Temporal Feature Extraction is performed. Features obtained from the inherent intrinsic properties of pre-processed cyclone images of several weather conditions result in successful classification. Followed by pre-processing, in this work, features constituting both pixel-wise intensities over time and the directional length are being considered. The dependency of autocorrelation with each pixel’s intensities over time and two temporal features are helped for coarse classification of weather conditions according to their visual effects. Finally, with the inherent intrinsic features extracted, a Two Dimensional Deep Learning model is utilized to foretell the cyclone intensity. Experimental evaluation of the proposed SKM-2DDP method is accomplished using images of cyclone dataset with many factors just as peak signal to noise ratio, prediction accuracy, prediction time and false-positive rate. Our own selves have considered with several cyclone images acquired from two different cyclone image datasets namely OCKHI_DEC2017 and VARDAH_DEC2016.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48817325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BIOMETRIC BASED THREE-FACTOR MUTUAL AUTHENTICATION SCHEME FOR ELECTRONIC PAYMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY 基于生物特征的椭圆曲线密码电子支付系统三因素相互认证方案
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.4
M. D, S. N
Electronic payment system plays a vital role in e-commerce and other financial transactions with ever-increasing acceptance of smart device based applications. To ensure secure transactions, various authentication schemes have been proposed in recent times. But existing password and smart card-based traditional e-payment systems have some limitations and also raises security concerns. However, they consume more energy and are not feasible for the e-payment system as it consists of resource constraint devices like mobile devices. Furthermore, it is prone to security issues if the password is guessed or smart card is stolen. Thus to enhance the security and to reduce the computational cost, biometric authentication based payment protocol using elliptic curve cryptography is proposed. Since biometric features are unique and also cannot be stolen or reproduced. The proposed system resists various security attacks like impersonation attack, replay attack, session key agreement, man-in-the-middle attack, and user anonymity. Furthermore, it reduces computational and communication costs when compared to other protocols as it exploits ECC. Thus the proposed authentication protocol is convenient for the electronic payment system. A simulation tool, AVISPA is utilized to verify the security of designed payment protocol and BAN logic for formal security analysis.
随着基于智能设备的应用越来越被接受,电子支付系统在电子商务和其他金融交易中发挥着至关重要的作用。为了确保安全的交易,近年来提出了各种身份验证方案。但现有的基于密码和智能卡的传统电子支付系统存在一些局限性,也引发了安全问题。然而,它们消耗更多的能量,对于电子支付系统来说是不可行的,因为它由移动设备等资源约束设备组成。此外,如果密码被猜测或智能卡被盗,它很容易出现安全问题。为了提高安全性和降低计算成本,提出了一种基于椭圆曲线密码的生物特征认证支付协议。由于生物特征是唯一的,也不能被窃取或复制。所提出的系统可以抵御各种安全攻击,如模拟攻击、重放攻击、会话密钥协商、中间人攻击和用户匿名。此外,与其他协议相比,它利用ECC降低了计算和通信成本。因此,所提出的认证协议对于电子支付系统是方便的。利用模拟工具AVISPA验证了所设计的支付协议的安全性,并对BAN逻辑进行了形式化安全分析。
{"title":"BIOMETRIC BASED THREE-FACTOR MUTUAL AUTHENTICATION SCHEME FOR ELECTRONIC PAYMENT SYSTEM USING ELLIPTIC CURVE CRYPTOGRAPHY","authors":"M. D, S. N","doi":"10.22452/mjcs.sp2020no1.4","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.4","url":null,"abstract":"Electronic payment system plays a vital role in e-commerce and other financial transactions with ever-increasing acceptance of smart device based applications. To ensure secure transactions, various authentication schemes have been proposed in recent times. But existing password and smart card-based traditional e-payment systems have some limitations and also raises security concerns. However, they consume more energy and are not feasible for the e-payment system as it consists of resource constraint devices like mobile devices. Furthermore, it is prone to security issues if the password is guessed or smart card is stolen. Thus to enhance the security and to reduce the computational cost, biometric authentication based payment protocol using elliptic curve cryptography is proposed. Since biometric features are unique and also cannot be stolen or reproduced. The proposed system resists various security attacks like impersonation attack, replay attack, session key agreement, man-in-the-middle attack, and user anonymity. Furthermore, it reduces computational and communication costs when compared to other protocols as it exploits ECC. Thus the proposed authentication protocol is convenient for the electronic payment system. A simulation tool, AVISPA is utilized to verify the security of designed payment protocol and BAN logic for formal security analysis.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43330060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WEB BASED DATABASE SECURITY IN INTERNET OF THINGS USING FULLY HOMOMORPHIC ENCRYPTION AND DISCRETE BEE COLONY OPTIMIZATION 基于全同态加密和离散蜂群优化的物联网Web数据库安全
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.1
Samuel Raj Samuel Raj, M. V. Prakash, T. Prince, K. Shankar, Vijayakumar Varadarajan, Fredi Nonyelu
Web applications are utilized on an extensive scale across the globe and it handles sensitive individual information of users. Structured Query Language (SQL) Data Inference (DI) and injection are procedures that abuse a security defenselessness occurring in the database layer of an application. This research article focuses on website page database security with the help of optimization and encryption methods for Web of Things Environments. Initially, the selected queries in webpage application are injected as per Discrete Bee Colony Optimization (DBCO) procedure. After the Proxy filtering, the injection prevention model is utilized, the injected data with various queries of different special characters are utilized. At long last, the attack gets detected depending on the user query with the assistance of query tree mechanism. Besides, an effective Fully Homomorphic Encryption (FHE) encryption is proposed in the study. From the implementation results, it is to be noted that the proposed method achieved 93.56% security level for the prevented webpage implication-based databases. The effect on the businesses must be comprehended to decrease the risk involved in SQL and DI injection assaults.
Web应用程序在全球范围内被广泛使用,它处理用户的敏感个人信息。结构化查询语言(SQL)数据推理(DI)和注入是滥用应用程序数据库层中发生的安全防御能力的过程。本文借助物联网环境的优化和加密方法,重点研究网站页面数据库的安全性。最初,在网页应用程序中选择的查询是按照离散蜂群优化(DBCO)过程注入的。在代理过滤之后,利用注入防止模型,利用具有不同特殊字符的各种查询的注入数据。最后,在查询树机制的辅助下,根据用户查询来检测攻击。此外,本文还提出了一种有效的全同态加密算法。从实现结果来看,值得注意的是,对于被阻止的基于网页含义的数据库,所提出的方法实现了93.56%的安全级别。必须理解对业务的影响,以降低SQL和DI注入攻击所涉及的风险。
{"title":"WEB BASED DATABASE SECURITY IN INTERNET OF THINGS USING FULLY HOMOMORPHIC ENCRYPTION AND DISCRETE BEE COLONY OPTIMIZATION","authors":"Samuel Raj Samuel Raj, M. V. Prakash, T. Prince, K. Shankar, Vijayakumar Varadarajan, Fredi Nonyelu","doi":"10.22452/mjcs.sp2020no1.1","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.1","url":null,"abstract":"Web applications are utilized on an extensive scale across the globe and it handles sensitive individual information of users. Structured Query Language (SQL) Data Inference (DI) and injection are procedures that abuse a security defenselessness occurring in the database layer of an application. This research article focuses on website page database security with the help of optimization and encryption methods for Web of Things Environments. Initially, the selected queries in webpage application are injected as per Discrete Bee Colony Optimization (DBCO) procedure. After the Proxy filtering, the injection prevention model is utilized, the injected data with various queries of different special characters are utilized. At long last, the attack gets detected depending on the user query with the assistance of query tree mechanism. Besides, an effective Fully Homomorphic Encryption (FHE) encryption is proposed in the study. From the implementation results, it is to be noted that the proposed method achieved 93.56% security level for the prevented webpage implication-based databases. The effect on the businesses must be comprehended to decrease the risk involved in SQL and DI injection assaults.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43620407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
POWER CONDITIONING OF SOLAR PHOTO VOLTAIC, BATTERY WITH FUEL CELL UNDER DYNAMIC SWITCHING OF LOADS 负载动态切换条件下太阳能光伏、燃料电池的功率调节
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-27 DOI: 10.22452/mjcs.sp2020no1.2
Ravi Dharavah, I. J. Raglend
The renewable sources integration with the DC micro grid is playing vital role in the current distribution system for providing the necessary clean power. The available of abundant renewable sources can be integrated through the DC link medium. The intermittent nature of renewable sources and dynamic switching of loads affects the quality of supply and DC link voltage respectively. It may fails to supply the power continuously. Reliability of power supply can be achieved with the use of integration of storage system. Here, the solar photovoltaic (SPV) array is fed with battery storage, fuel cell through the DC link medium. Utilizing SPV array maximum power is tracked using intelligent controller based maximum power point tracking (MPPT) technique. The battery storage with the DC link integration made through the bi-directional DC-DC converter with the help of the battery charge controller. Fuel cell is used as a base source and it’s fed with the DC link system. Finally, the simulation of SPV array, battery storage with fuel cell integration is performed under dynamic switching of loads. The variations in the source and switching of load performance are simulated in the MATLAB/Simulation software.
可再生能源与直流微电网的整合在当前的配电系统中发挥着至关重要的作用,以提供必要的清洁电力。丰富的可再生能源的可用性可以通过直流链路介质整合。可再生能源的间歇性和负荷的动态切换分别影响供电质量和直流电压质量。可能无法持续供电。采用一体化的存储系统,可以提高供电的可靠性。在这里,太阳能光伏(SPV)阵列是用蓄电池储能,燃料电池通过直流链路介质进行馈电。利用SPV阵列的最大功率,采用基于智能控制器的最大功率点跟踪(MPPT)技术进行跟踪。在电池充电控制器的帮助下,通过双向DC-DC变换器将电池存储与直流链路集成。燃料电池作为基极电源,由直流供电系统供电。最后,对负载动态切换下的SPV阵列、电池储能和燃料电池集成进行了仿真。在MATLAB/Simulation软件中模拟了负载源和切换性能的变化。
{"title":"POWER CONDITIONING OF SOLAR PHOTO VOLTAIC, BATTERY WITH FUEL CELL UNDER DYNAMIC SWITCHING OF LOADS","authors":"Ravi Dharavah, I. J. Raglend","doi":"10.22452/mjcs.sp2020no1.2","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.2","url":null,"abstract":"The renewable sources integration with the DC micro grid is playing vital role in the current distribution system for providing the necessary clean power. The available of abundant renewable sources can be integrated through the DC link medium. The intermittent nature of renewable sources and dynamic switching of loads affects the quality of supply and DC link voltage respectively. It may fails to supply the power continuously. Reliability of power supply can be achieved with the use of integration of storage system. Here, the solar photovoltaic (SPV) array is fed with battery storage, fuel cell through the DC link medium. Utilizing SPV array maximum power is tracked using intelligent controller based maximum power point tracking (MPPT) technique. The battery storage with the DC link integration made through the bi-directional DC-DC converter with the help of the battery charge controller. Fuel cell is used as a base source and it’s fed with the DC link system. Finally, the simulation of SPV array, battery storage with fuel cell integration is performed under dynamic switching of loads. The variations in the source and switching of load performance are simulated in the MATLAB/Simulation software.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41764012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLUSTERING AND INDEXING OF MULTIPLE DOCUMENTS USING FEATURE EXTRACTION THROUGH APACHE HADOOP ON BIG DATA 基于apachehadoop的大数据特征提取对多个文档的聚类和索引
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-26 DOI: 10.22452/mjcs.sp2020no1.8
E. Lydia, G. J. Moses, Vijayakumar Varadarajan, Fredi Nonyelu, A. Maseleno, E. Perumal, K. Shankar
Bigdata is a challenging field in data processing since the information is retrieved from various search engines through internet. A number of large organizations, that use document clustering,fails in arranging the documents sequentially in their machines. Across the globe, advanced technologyhas contributed to the high speed internet access. But the consequences of useful yet unorganized information in machine files seemto be confused in the retrieval process. Manual ordering of files has its own complications. In this paper, application software like Apache Lucene and Hadoop have taken a lead towards text mining for indexing and parallel implementation of document clustering. In organizations, it identifies the structure of the text data in computer files and its arrangement from files to folders, folders to subfolders, and to higher folders. A deeper analysis of document clustering was performed by considering various efficient algorithms like LSI, SVD and was compared with the newly proposed updated model of Non-Negative Matrix Factorization. The parallel implementation of hadoopdevelopedautomatic clusters for similar documents. MapReduce framework enforced its approach using K-means algorithm for all the incoming documents. The final clusters were automatically organized in folders using Apache Lucene in machines. This model was tested by considering the dataset of Newsgroup20 text documents. Thus this paper determines the implementation of large scale documents using parallel performance of MapReduce and Lucenethat generate automatic arrangement of documents, which reduces the computational time and improves the quick retrieval of documents in any scenario.
大数据是数据处理中一个具有挑战性的领域,因为信息是通过互联网从各种搜索引擎中检索的。许多使用文档集群的大型组织无法在其机器中按顺序排列文档。在全球范围内,先进的技术为高速互联网接入做出了贡献。但是,在检索过程中,机器文件中有用但无组织的信息的后果似乎是混淆的。手动排序文件有其自身的复杂性。在本文中,像ApacheLucene和Hadoop这样的应用软件已经率先实现了文本挖掘,用于索引和文档集群的并行实现。在组织中,它标识计算机文件中文本数据的结构及其从文件到文件夹、从文件夹到子文件夹以及到更高文件夹的排列。通过考虑LSI、SVD等各种有效算法,对文档聚类进行了更深入的分析,并与新提出的非负矩阵分解模型进行了比较。hadoop的并行实现为类似文档开发了自动集群。MapReduce框架使用K-means算法对所有传入文档强制执行其方法。最后的集群在机器中使用ApacheLucene自动组织在文件夹中。该模型通过考虑Newsgroup20文本文档的数据集进行了测试。因此,本文确定了使用MapReduce和Lucenthat的并行性能来实现大规模文档的自动排列,这减少了计算时间,提高了在任何场景下对文档的快速检索。
{"title":"CLUSTERING AND INDEXING OF MULTIPLE DOCUMENTS USING FEATURE EXTRACTION THROUGH APACHE HADOOP ON BIG DATA","authors":"E. Lydia, G. J. Moses, Vijayakumar Varadarajan, Fredi Nonyelu, A. Maseleno, E. Perumal, K. Shankar","doi":"10.22452/mjcs.sp2020no1.8","DOIUrl":"https://doi.org/10.22452/mjcs.sp2020no1.8","url":null,"abstract":"Bigdata is a challenging field in data processing since the information is retrieved from various search engines through internet. A number of large organizations, that use document clustering,fails in arranging the documents sequentially in their machines. Across the globe, advanced technologyhas contributed to the high speed internet access. But the consequences of useful yet unorganized information in machine files seemto be confused in the retrieval process. Manual ordering of files has its own complications. In this paper, application software like Apache Lucene and Hadoop have taken a lead towards text mining for indexing and parallel implementation of document clustering. In organizations, it identifies the structure of the text data in computer files and its arrangement from files to folders, folders to subfolders, and to higher folders. A deeper analysis of document clustering was performed by considering various efficient algorithms like LSI, SVD and was compared with the newly proposed updated model of Non-Negative Matrix Factorization. The parallel implementation of hadoopdevelopedautomatic clusters for similar documents. MapReduce framework enforced its approach using K-means algorithm for all the incoming documents. The final clusters were automatically organized in folders using Apache Lucene in machines. This model was tested by considering the dataset of Newsgroup20 text documents. Thus this paper determines the implementation of large scale documents using parallel performance of MapReduce and Lucenethat generate automatic arrangement of documents, which reduces the computational time and improves the quick retrieval of documents in any scenario.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44570074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FOG ANALYTICS - A SURVEY 雾分析——一项调查
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-11-26 DOI: 10.22452/MJCS.SP2020NO1.10
C. Prabhu, Tony Jan, M. Prasad, Vijayakumar Varadarajan
Fog computing has emerged as an essential alternative to the cloud. Fog computing is the future as it is nearer to the edge where actually the IOT devices and sensors are located. A Fog Server or Fog Node is located near to the IOT devices, connecting directly (wired or wireless) to them. The Fog Server has a functionality of fast accessibility to the data arising out of IOT devices or sensors, as against cloud server which may be located in data centers (near core Network Centers) located far away from the edge resulting in extreme delays in network transmission and latency, especially when the data is large volume as stream (or ‘Big Data’) arising out of IOT devices or sensors including cameras, etc. Real time response after completing the necessary Analytics on the data generated by IOT devices and sensors becomes critically essential for meeting the real time response requirements of critical applications such as in health care and transportation. What are the relevant techniques for Fog Analytics? In this paper we provide a brief survey of Fog Analytics techniques in stream data analytics, machine learning, deep learning techniques and also game theoretical adversarial learning.
雾计算已经成为云的一种重要替代方案。雾计算是未来的趋势,因为它更接近物联网设备和传感器的实际位置。雾服务器或雾节点位于IOT设备附近,直接(有线或无线)连接到这些设备。雾服务器具有快速访问由物联网设备或传感器产生的数据的功能,而云服务器可能位于远离边缘的数据中心(靠近核心网络中心),导致网络传输和延迟的极端延迟,尤其是当物联网设备或传感器(包括摄像头等)产生的大量数据流(或“大数据”)时。在完成对物联网设备和传感器生成的数据的必要分析后,实时响应对于满足医疗保健和交通等关键应用的实时响应要求至关重要。雾分析的相关技术是什么?在本文中,我们简要介绍了流数据分析、机器学习、深度学习技术以及博弈论对抗性学习中的Fog Analytics技术。
{"title":"FOG ANALYTICS - A SURVEY","authors":"C. Prabhu, Tony Jan, M. Prasad, Vijayakumar Varadarajan","doi":"10.22452/MJCS.SP2020NO1.10","DOIUrl":"https://doi.org/10.22452/MJCS.SP2020NO1.10","url":null,"abstract":"Fog computing has emerged as an essential alternative to the cloud. Fog computing is the future as it is nearer to the edge where actually the IOT devices and sensors are located. A Fog Server or Fog Node is located near to the IOT devices, connecting directly (wired or wireless) to them. The Fog Server has a functionality of fast accessibility to the data arising out of IOT devices or sensors, as against cloud server which may be located in data centers (near core Network Centers) located far away from the edge resulting in extreme delays in network transmission and latency, especially when the data is large volume as stream (or ‘Big Data’) arising out of IOT devices or sensors including cameras, etc. Real time response after completing the necessary Analytics on the data generated by IOT devices and sensors becomes critically essential for meeting the real time response requirements of critical applications such as in health care and transportation. What are the relevant techniques for Fog Analytics? In this paper we provide a brief survey of Fog Analytics techniques in stream data analytics, machine learning, deep learning techniques and also game theoretical adversarial learning.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49174813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VISUALIZATION WITH VOCABULARY TRACKING FOR ARABIC WORD RECOGNITION AND READING COMPREHENSION 可视化与词汇跟踪阿拉伯语单词识别和阅读理解
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2020-10-30 DOI: 10.22452/mjcs.vol33no4.6
Raja-Jamilah Raja-Yusof, Zulkifli Mohd Yusoff, Glenn Hardaker
Comprehending text is the aim of reading; however, there is the phenomenon of non-Arabic speakers in Malaysia reading the Qur’an, written in Arabic, without comprehension. Word recognition (WR) theory, through word frequency effect (WFE) and word superiority effect (WSE), are used as a basis to achieve reading comprehension (RC) of the Qur'an. The Eye of Qur'an (EoQu) interface was developed, to visualise word occurrences and word morphology. This is achieved through parallel plot and word segmentation visualization. EoQu can track a user’s personal vocabulary with a presentation of percentage and word position in the Qur’an. Consequently, users know their ability to recognize Arabic words in relation to the whole Qur’an to achieve RC. An experimental study was set up with 90 Malaysian participants, starting with a pre-test, followed by a stratified sampling to divide participants into control and experimental groups (who used EoQu) for the post-test. Results showed evidence of improvement in WR based on scores and time taken to complete the Arabic Word Recognition Test.
理解文本是阅读的目的;然而,在马来西亚,非阿拉伯语使用者在阅读用阿拉伯语写成的《古兰经》时却无法理解。单词识别理论通过单词频率效应(WFE)和单词优势效应(WSE)作为实现《古兰经》阅读理解的基础。古兰经之眼(EoQu)界面被开发出来,用于可视化单词的出现和单词的形态。这是通过平行绘图和分词可视化实现的。EoQu可以通过在古兰经中的百分比和单词位置来跟踪用户的个人词汇。因此,用户知道他们识别与整个《古兰经》相关的阿拉伯语单词的能力,以实现RC。对90名马来西亚参与者进行了一项实验研究,从预测试开始,然后进行分层抽样,将参与者分为对照组和实验组(使用EoQu)进行后测试。结果显示,根据完成阿拉伯语单词识别测试的分数和时间,WR有改善的证据。
{"title":"VISUALIZATION WITH VOCABULARY TRACKING FOR ARABIC WORD RECOGNITION AND READING COMPREHENSION","authors":"Raja-Jamilah Raja-Yusof, Zulkifli Mohd Yusoff, Glenn Hardaker","doi":"10.22452/mjcs.vol33no4.6","DOIUrl":"https://doi.org/10.22452/mjcs.vol33no4.6","url":null,"abstract":"Comprehending text is the aim of reading; however, there is the phenomenon of non-Arabic speakers in Malaysia reading the Qur’an, written in Arabic, without comprehension. Word recognition (WR) theory, through word frequency effect (WFE) and word superiority effect (WSE), are used as a basis to achieve reading comprehension (RC) of the Qur'an. The Eye of Qur'an (EoQu) interface was developed, to visualise word occurrences and word morphology. This is achieved through parallel plot and word segmentation visualization. EoQu can track a user’s personal vocabulary with a presentation of percentage and word position in the Qur’an. Consequently, users know their ability to recognize Arabic words in relation to the whole Qur’an to achieve RC. An experimental study was set up with 90 Malaysian participants, starting with a pre-test, followed by a stratified sampling to divide participants into control and experimental groups (who used EoQu) for the post-test. Results showed evidence of improvement in WR based on scores and time taken to complete the Arabic Word Recognition Test.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2020-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48433311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Malaysian Journal of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1