Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934758
N. I. Hossain, Ali Reza Galib, Raihan Bin Mofidul, Dhiman Kumar Sarker
In developing countries, traditional access management systems ubiquitously use either keypad based password protection or radio frequency identification (RFID) card based protection. With the increased number of threats in recent years, these systems are becoming more vulnerable. If the password or the RFID card is somehow compromised, any unauthorized person can breach the system with ease. Considering and analyzing these issues, a cost-effective prototype of a vision based three-layer access management system with IoT connectivity was developed. In this paper, an access management system architecture is proposed based on the fusion of radio frequency identification, back propagation based face recognition and password protection. The system is also connected to a Node JS based web server. Whenever an access is granted or any unauthorized access is detected, an SMS and an email are sent to both the user and the system administrator. Data security is ensured by exploiting AES encryption on the system side and AES decryption on the server side. In case of face recognition, the access is granted if the achieved confidence level is over 80%.
{"title":"A Vision Based Three-Layer Access Management System with IoT Integration","authors":"N. I. Hossain, Ali Reza Galib, Raihan Bin Mofidul, Dhiman Kumar Sarker","doi":"10.1109/ICASERT.2019.8934758","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934758","url":null,"abstract":"In developing countries, traditional access management systems ubiquitously use either keypad based password protection or radio frequency identification (RFID) card based protection. With the increased number of threats in recent years, these systems are becoming more vulnerable. If the password or the RFID card is somehow compromised, any unauthorized person can breach the system with ease. Considering and analyzing these issues, a cost-effective prototype of a vision based three-layer access management system with IoT connectivity was developed. In this paper, an access management system architecture is proposed based on the fusion of radio frequency identification, back propagation based face recognition and password protection. The system is also connected to a Node JS based web server. Whenever an access is granted or any unauthorized access is detected, an SMS and an email are sent to both the user and the system administrator. Data security is ensured by exploiting AES encryption on the system side and AES decryption on the server side. In case of face recognition, the access is granted if the achieved confidence level is over 80%.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"28 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83749030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934629
Md. Sabir Hossain, M. Zubair, Mohammad Obaidur Rahman, Muhammad Kamrul Hossain Patwary, Md. Golam Sarwar Rajib
The ever-growing problem which is threatening the current mailing system is spam. Spam is nothing but an unsolicited bulk e-mail frequently sent in a financial nature which generates the need for creating an anti-spam filter. Amongst many spam filtering techniques, the most advanced method "Naïve Bayesian filtering" using the Support Vector Machine (SVM) have been implemented. Spammers are very careful about the filtering techniques. For that very reason, dynamic filtering is needed and the proposed method meets the demand. The algorithm splits the received email into tokens and uses Bayes' theorem of probability to calculate the probability of spam for each token to determine the total spam probability of the mail. Implementation of SVM instead of corpora is one of the added features of the algorithm. The most challenging feature was to take the words as well as whole sentences as input in the SVM as tokens and feature vectors. The inclusion of sentences in the dataset training has increased the accuracy of detecting spam and ham. Natural Language Tool Kit (NLTK) has been used as a useful language processing tool to tokenize the sentences and also to understand the meaning of the same types of sentences to some extent. As a test mail is being compared by word to word and also sentence to sentence from the training datasets to determine if the mail is spam or not, it will improve the performance of the filter. With some simple modifications, the filter can be used in both server and client end. The efficiency increases gradually with the increased number of email it processes.
威胁当前邮件系统的日益严重的问题是垃圾邮件。垃圾邮件只不过是未经请求的大量电子邮件,经常以金融性质发送,因此需要创建反垃圾邮件过滤器。在众多垃圾邮件过滤技术中,使用支持向量机(SVM)的最先进的方法“Naïve贝叶斯过滤”已经实现。垃圾邮件发送者对过滤技术非常小心。因此,需要进行动态滤波,所提出的方法满足了这一要求。该算法将收到的电子邮件分成令牌,并利用贝叶斯概率定理计算每个令牌的垃圾邮件概率,从而确定该邮件的总垃圾邮件概率。支持向量机代替语料库的实现是该算法的附加特征之一。最具挑战性的特征是将单词和整个句子作为支持向量机的输入作为标记和特征向量。在数据集训练中加入句子提高了检测spam和ham的准确性。自然语言工具箱(Natural Language Tool Kit, NLTK)是一种有用的语言处理工具,用于对句子进行标记,并在一定程度上理解同类型句子的意义。由于测试邮件会从训练数据集中逐字逐句地进行比较,以确定邮件是否为垃圾邮件,这将提高过滤器的性能。通过一些简单的修改,过滤器可以在服务器端和客户端使用。效率随着它处理的电子邮件数量的增加而逐渐提高。
{"title":"A Modified Naïve Bayesian-based Spam Filter using Support Vector Machine","authors":"Md. Sabir Hossain, M. Zubair, Mohammad Obaidur Rahman, Muhammad Kamrul Hossain Patwary, Md. Golam Sarwar Rajib","doi":"10.1109/ICASERT.2019.8934629","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934629","url":null,"abstract":"The ever-growing problem which is threatening the current mailing system is spam. Spam is nothing but an unsolicited bulk e-mail frequently sent in a financial nature which generates the need for creating an anti-spam filter. Amongst many spam filtering techniques, the most advanced method \"Naïve Bayesian filtering\" using the Support Vector Machine (SVM) have been implemented. Spammers are very careful about the filtering techniques. For that very reason, dynamic filtering is needed and the proposed method meets the demand. The algorithm splits the received email into tokens and uses Bayes' theorem of probability to calculate the probability of spam for each token to determine the total spam probability of the mail. Implementation of SVM instead of corpora is one of the added features of the algorithm. The most challenging feature was to take the words as well as whole sentences as input in the SVM as tokens and feature vectors. The inclusion of sentences in the dataset training has increased the accuracy of detecting spam and ham. Natural Language Tool Kit (NLTK) has been used as a useful language processing tool to tokenize the sentences and also to understand the meaning of the same types of sentences to some extent. As a test mail is being compared by word to word and also sentence to sentence from the training datasets to determine if the mail is spam or not, it will improve the performance of the filter. With some simple modifications, the filter can be used in both server and client end. The efficiency increases gradually with the increased number of email it processes.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"30 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83320660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934553
Saiful Islam, Md. Ariful Islam Khan, Sanjida Tasnim Shorno, Sumonto Sarker, Md. Abu Bakar Siddik
The ongoing relentless innovation of technologies like Big data, cloud computing, virtual reality is creating the need for more secure, further reliable, more scalable ultra fast networks. For meeting these objectives Software Defined Networking (SDN) arises. Distinguished control plane and data plane have made SDN more dependable, fast, secure and increased its widespread acceptance. The crucial part of such a network is the controller which handles the flow control and makes the network more effective. So, for ensuring better performance of the network, selection of the right controller according to the need is imperative. Thus performance evaluation of available SDN controllers is a high-priority. Though there are many researches pursued on the performance analysis of SDN controllers in terms of wired network, there is a lack of studies involving controller efficiency in wireless network. In this paper we have examined the performance of some popular SDN controllers like Ryu, POX, ONOS and Floodlight in an emulated wireless network. Analysing the test results we have asserted our observation regarding the controller performance which can be of considerable importance while determining the right SDN controller for wireless network.
{"title":"Performance Evaluation of SDN Controllers in Wireless Network","authors":"Saiful Islam, Md. Ariful Islam Khan, Sanjida Tasnim Shorno, Sumonto Sarker, Md. Abu Bakar Siddik","doi":"10.1109/ICASERT.2019.8934553","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934553","url":null,"abstract":"The ongoing relentless innovation of technologies like Big data, cloud computing, virtual reality is creating the need for more secure, further reliable, more scalable ultra fast networks. For meeting these objectives Software Defined Networking (SDN) arises. Distinguished control plane and data plane have made SDN more dependable, fast, secure and increased its widespread acceptance. The crucial part of such a network is the controller which handles the flow control and makes the network more effective. So, for ensuring better performance of the network, selection of the right controller according to the need is imperative. Thus performance evaluation of available SDN controllers is a high-priority. Though there are many researches pursued on the performance analysis of SDN controllers in terms of wired network, there is a lack of studies involving controller efficiency in wireless network. In this paper we have examined the performance of some popular SDN controllers like Ryu, POX, ONOS and Floodlight in an emulated wireless network. Analysing the test results we have asserted our observation regarding the controller performance which can be of considerable importance while determining the right SDN controller for wireless network.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"56 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83357022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934570
S. Sultana, Nazifa Akter, Rahat Hossain Faisal, Md. Mostafijur Rahman
Hazy image enhancement is one of the challenging fields in the area of image processing because the presence of haze reduces the visibility of outdoor images. In recent years, various algorithms have been introduced to remove haze. Most of the algorithms remove haze but hardly enhance the image with better contrast. In this paper, we have proposed an effective method for removing haze from the image. The main benefit of our method is that it dehazes image as well as preserves ramp edges providing better contrast of the image. The qualitative and quantitative comparison among few states of the art methods have been performed which show that our method gives better output images compared to those methods.
{"title":"Single Image Haze Removal with Nonlinear Complex Diffusion Process","authors":"S. Sultana, Nazifa Akter, Rahat Hossain Faisal, Md. Mostafijur Rahman","doi":"10.1109/ICASERT.2019.8934570","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934570","url":null,"abstract":"Hazy image enhancement is one of the challenging fields in the area of image processing because the presence of haze reduces the visibility of outdoor images. In recent years, various algorithms have been introduced to remove haze. Most of the algorithms remove haze but hardly enhance the image with better contrast. In this paper, we have proposed an effective method for removing haze from the image. The main benefit of our method is that it dehazes image as well as preserves ramp edges providing better contrast of the image. The qualitative and quantitative comparison among few states of the art methods have been performed which show that our method gives better output images compared to those methods.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"114 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83464541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934620
Tanjim Tarannum
The primary objective of this paper is to present the speed controlling method of a separately excited DC motor with Adaptive Neuro Fuzzy Inference System (ANFIS) based derivative controller. Efficient control of speed of DC motor has been achieved using by reducing undershoot, overshoot, peak-peak ripple and s-s (Steady-State) error by the proposed approach. A derivative controller has also been used to validate the performance improvement by comparison between the two methods. From the assessment, it clearly shows that, the suggested ANFIS D controller provides better performance including overshoot, undershoot, peak-peak ripple and s-s error reduction and hence improving the speed regulation technique of separately excited DC motor.
{"title":"Intelligent Speed Control of DC Motor using ANFIS D Controller","authors":"Tanjim Tarannum","doi":"10.1109/ICASERT.2019.8934620","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934620","url":null,"abstract":"The primary objective of this paper is to present the speed controlling method of a separately excited DC motor with Adaptive Neuro Fuzzy Inference System (ANFIS) based derivative controller. Efficient control of speed of DC motor has been achieved using by reducing undershoot, overshoot, peak-peak ripple and s-s (Steady-State) error by the proposed approach. A derivative controller has also been used to validate the performance improvement by comparison between the two methods. From the assessment, it clearly shows that, the suggested ANFIS D controller provides better performance including overshoot, undershoot, peak-peak ripple and s-s error reduction and hence improving the speed regulation technique of separately excited DC motor.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"43 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83305607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934595
Md. Farhan Sadique, Bishajit Kumar Biswas, S. M. Rafizul Haque
Content-based image retrieval is an application of retrieving similar images of a query image. In this paper, global and local features are used to describe the content of an image. Color, texture and shape features are used as global features and SURF, FAST and BRISK are used as local features to retrieve similar images from the database. Different similarity checking methods are also tested to find the best approach. Combined approach using global features (obtained by using modified gray-level co-occurrence matrix) and local features (obtained by using SURF and color moments) produce better accuracy than some existing methods. Here, local features are obtained around the blob points detected by SURF detector. SURF descriptor and color moments which are calculated within a region of size 6s (s is the scale of the image at which the blob point is detected) around the detected blob points are used for extracting local features. Color moments are used because SURF only works on grayscale images. Thus, local color information is achieved. This combination of global and local features result in better performance in term of accuracy compared to some current methods.
{"title":"Unsupervised Content-Based Image Retrieval Technique Using Global and Local Features","authors":"Md. Farhan Sadique, Bishajit Kumar Biswas, S. M. Rafizul Haque","doi":"10.1109/ICASERT.2019.8934595","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934595","url":null,"abstract":"Content-based image retrieval is an application of retrieving similar images of a query image. In this paper, global and local features are used to describe the content of an image. Color, texture and shape features are used as global features and SURF, FAST and BRISK are used as local features to retrieve similar images from the database. Different similarity checking methods are also tested to find the best approach. Combined approach using global features (obtained by using modified gray-level co-occurrence matrix) and local features (obtained by using SURF and color moments) produce better accuracy than some existing methods. Here, local features are obtained around the blob points detected by SURF detector. SURF descriptor and color moments which are calculated within a region of size 6s (s is the scale of the image at which the blob point is detected) around the detected blob points are used for extracting local features. Color moments are used because SURF only works on grayscale images. Thus, local color information is achieved. This combination of global and local features result in better performance in term of accuracy compared to some current methods.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"77 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83309092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934471
Tanusree Debi, Assaduzaman
Internet of Things (IoT) is the network of the huge number of resource-personated nodes whose main feature is the reliable communication and fast data exchange among devices in any network topology. In the upcoming world of internet, proper selection of desire or appropriate destination node and finding the optimized path from the huge number of the activated nodes is a very important task. Here many nodes are available in one or more hop distance and each node has various network parameters in the IoT world, so the selection of best path and nodes is quite complex. For this reason, we need to develop an algorithm to find out the best path towards the destination node considering significant network parameters. This paper proposes a general algorithm considering any network topology for discovering the path towards the destination node from the source node and give a solution to the contradiction which may arise if there is more than one consonant path. The proposed algorithm considers the node property of all node for calculating the behavior value, path influence behavior value and finally discover the optimized path from source node to destination node. The proposed algorithm is also evaluated by simulation to determine the impact of parameters in path determination.
物联网(Internet of Things, IoT)是由大量资源节点组成的网络,其主要特点是在任何网络拓扑结构下,设备之间都能进行可靠的通信和快速的数据交换。在即将到来的互联网世界中,正确选择理想或合适的目标节点,并从大量的激活节点中找到最优路径是一项非常重要的任务。在物联网世界中,在一个或多个跳距中有许多节点可用,并且每个节点具有各种网络参数,因此最佳路径和节点的选择非常复杂。因此,我们需要开发一种算法,在考虑重要网络参数的情况下,找出到达目的节点的最佳路径。本文提出了一种考虑任何网络拓扑的从源节点到目的节点的路径的通用算法,并给出了一种解决路径存在多条一致时可能产生的矛盾的方法。该算法考虑所有节点的节点属性来计算行为值、路径影响行为值,最终发现从源节点到目的节点的最优路径。通过仿真对算法进行了评估,以确定参数对路径确定的影响。
{"title":"Path and Partner Selection in Unstructured Resource-Constrained Environments Based on Node Psychology in the Context of IoT","authors":"Tanusree Debi, Assaduzaman","doi":"10.1109/ICASERT.2019.8934471","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934471","url":null,"abstract":"Internet of Things (IoT) is the network of the huge number of resource-personated nodes whose main feature is the reliable communication and fast data exchange among devices in any network topology. In the upcoming world of internet, proper selection of desire or appropriate destination node and finding the optimized path from the huge number of the activated nodes is a very important task. Here many nodes are available in one or more hop distance and each node has various network parameters in the IoT world, so the selection of best path and nodes is quite complex. For this reason, we need to develop an algorithm to find out the best path towards the destination node considering significant network parameters. This paper proposes a general algorithm considering any network topology for discovering the path towards the destination node from the source node and give a solution to the contradiction which may arise if there is more than one consonant path. The proposed algorithm considers the node property of all node for calculating the behavior value, path influence behavior value and finally discover the optimized path from source node to destination node. The proposed algorithm is also evaluated by simulation to determine the impact of parameters in path determination.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"11 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78844018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934908
Md. Mizanur Rahman, Sanjoy Kumar Sana, M. Hasan, S. Kamal, Thajid Ibna Rouf Uday, Junaed Jahin
In this modern world, we are developing the most innovative scientific solutions, where the robotics and embedded field also experienced an immense growth. Automation and robotics are widely used for solving many major problems that are part of our life. Robotics systems already make life easier. In critical situations such as natural disasters, robots can be utilized instead of humans to avoid more casualties. In this research, we focus on our garments industry to automate the warehouse management using robotics system. The problem is handling heavyweight objects which are to be kept in a storeroom and preparing them to be shipped. As a solution, we introduce the multi-robot system to pick up and drop those heavy objects to the designated point(s). The whole system is designed to locate objects at some point and pick them up based upon their need. The proposed system aims to contribute to the above mentioned applications using a proposed model to control a warehouse using the robot.
{"title":"A Prototype of Heavyweight Carrying Robot for Garments Industry in Bangladesh","authors":"Md. Mizanur Rahman, Sanjoy Kumar Sana, M. Hasan, S. Kamal, Thajid Ibna Rouf Uday, Junaed Jahin","doi":"10.1109/ICASERT.2019.8934908","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934908","url":null,"abstract":"In this modern world, we are developing the most innovative scientific solutions, where the robotics and embedded field also experienced an immense growth. Automation and robotics are widely used for solving many major problems that are part of our life. Robotics systems already make life easier. In critical situations such as natural disasters, robots can be utilized instead of humans to avoid more casualties. In this research, we focus on our garments industry to automate the warehouse management using robotics system. The problem is handling heavyweight objects which are to be kept in a storeroom and preparing them to be shipped. As a solution, we introduce the multi-robot system to pick up and drop those heavy objects to the designated point(s). The whole system is designed to locate objects at some point and pick them up based upon their need. The proposed system aims to contribute to the above mentioned applications using a proposed model to control a warehouse using the robot.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"251 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76790807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-05-01DOI: 10.1109/ICASERT.2019.8934644
Kamrun Nahar Runa, M. Hossen, Shuvashis Saha
Ethernet passive optical network (EPON) offers large bandwidth that requires less power consumption. The EPON systems require dynamic bandwidth allocation (DBA) algorithm to share a medium for different users with fairness and quality of services. In energy efficient DBA (EE-DBA) algorithm, the optical network units (ONUs) enter the power saving mode in lower traffic condition. However, the main limitation of the existing EE-DBA algorithm is that it requires to keep optical line terminal (OLT) in active state for all the time. That is why some energy is wasted in the OLT side. For mitigating the excess energy consumption by the OLT, we propose a sleep-based DBA (SB-DBA) algorithm for EPON system. In the SB-DBA scheme, both the OLT and ONUs enter into the power-saving mode for reducing overall energy consumption in the network. Simulations are used to evaluate the performance of the SB-DBA scheme. Comparative analysis of simulated results proves that the energy consumption of the proposed SB-DBA scheme is less than the existing EE-DBA scheme with similar end-to-end packet delay.
{"title":"Sleep-based DBA Algorithm for Energy Efficiency by End Points Collaboration in EPON","authors":"Kamrun Nahar Runa, M. Hossen, Shuvashis Saha","doi":"10.1109/ICASERT.2019.8934644","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934644","url":null,"abstract":"Ethernet passive optical network (EPON) offers large bandwidth that requires less power consumption. The EPON systems require dynamic bandwidth allocation (DBA) algorithm to share a medium for different users with fairness and quality of services. In energy efficient DBA (EE-DBA) algorithm, the optical network units (ONUs) enter the power saving mode in lower traffic condition. However, the main limitation of the existing EE-DBA algorithm is that it requires to keep optical line terminal (OLT) in active state for all the time. That is why some energy is wasted in the OLT side. For mitigating the excess energy consumption by the OLT, we propose a sleep-based DBA (SB-DBA) algorithm for EPON system. In the SB-DBA scheme, both the OLT and ONUs enter into the power-saving mode for reducing overall energy consumption in the network. Simulations are used to evaluate the performance of the SB-DBA scheme. Comparative analysis of simulated results proves that the energy consumption of the proposed SB-DBA scheme is less than the existing EE-DBA scheme with similar end-to-end packet delay.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"28 6 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84102734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, like the English and other languages, Bangla also plays a significant role to strengthen the web repository. The storing rate of Bangla information is augmented day-by-day. Because of the numerous documents in the World Wide Web, it is very difficult for a user to retrieve the desired information. Furthermore, finding the useful documents tends to be more time spending as well as an annoying job. These demands emerge to develop an Information Retrieval (IR) system to document ranking for Bangla language. In this paper, we have built such a retrieval system where users can find their needed documents which correspond to their own query strings throughout the ranking index. Although a lot of works have been done for English and other languages to rank the documents, unfortunately, we have found a very negligible amount of contributions in Bangla Language. Many methods such as – Boolean model, Maximal Marginal Relevance (MMR), Portfolio Theory (PR), Quantum Probability Ranking Principle (QPRP), Query Directed Clustering (QDC), Vector-based TFIDF and so on, have been proposed to implement the document ranking system. Here, we have applied a new approach, called Latent Semantic Indexing (LSI) to do the same task for Bangla documents. LSI uses the mathematical method called Singular Value Decomposition (SVD). After that, we have applied the cosine similarity to rank all the documents. We believe that the performance result of our proposed system has reached the trustworthy level.
{"title":"Information Retrieval System in Bangla Document Ranking using Latent Semantic Indexing","authors":"Md. Nesarul Hoque, Rabiul Islam, Md. Sajidul Karim","doi":"10.1109/ICASERT.2019.8934837","DOIUrl":"https://doi.org/10.1109/ICASERT.2019.8934837","url":null,"abstract":"Nowadays, like the English and other languages, Bangla also plays a significant role to strengthen the web repository. The storing rate of Bangla information is augmented day-by-day. Because of the numerous documents in the World Wide Web, it is very difficult for a user to retrieve the desired information. Furthermore, finding the useful documents tends to be more time spending as well as an annoying job. These demands emerge to develop an Information Retrieval (IR) system to document ranking for Bangla language. In this paper, we have built such a retrieval system where users can find their needed documents which correspond to their own query strings throughout the ranking index. Although a lot of works have been done for English and other languages to rank the documents, unfortunately, we have found a very negligible amount of contributions in Bangla Language. Many methods such as – Boolean model, Maximal Marginal Relevance (MMR), Portfolio Theory (PR), Quantum Probability Ranking Principle (QPRP), Query Directed Clustering (QDC), Vector-based TFIDF and so on, have been proposed to implement the document ranking system. Here, we have applied a new approach, called Latent Semantic Indexing (LSI) to do the same task for Bangla documents. LSI uses the mathematical method called Singular Value Decomposition (SVD). After that, we have applied the cosine similarity to rank all the documents. We believe that the performance result of our proposed system has reached the trustworthy level.","PeriodicalId":6613,"journal":{"name":"2019 1st International Conference on Advances in Science, Engineering and Robotics Technology (ICASERT)","volume":"35 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84686373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}