Browse Items (2150 total)
Sort by:
-
Multilevel Quantum Inspired Fractional Order Ant Colony Optimization for Automatic Clustering of Hyperspectral Images
Hyperspectral images contain a wide variety of information, varying from relatively large regions to smaller manmade buildings, roads and others. Automatic clustering of various regions in such images is a tedious task. A multilevel quantum inspired fractional order ant colony optimization algorithm is proposed in this paper for automatic clustering of hyperspectral images. Application of fractional order pheromone updation technique in the proposed algorithm produces more accurate results. Moreover, the quantum inspired version of the algorithm produces results faster than its classical counterpart. A new band fusion technique, applying principal component analysis and adaptive subspace decomposition, is successfully proposed for the pre-processing of hyperspectral images. Score Function is used as the fitness function and K-Harmonic Means is used to determine the clusters. The proposed algorithm is implemented on the Xuzhou HYSPEX dataset and compared with classical Ant Colony Optimization and fractional order Ant Colony Optimization algorithms. Furthermore, the performance of each method is validated by peak signal-to-noise ratio which clearly indicates better segmentation in the proposed algorithm. The Kruskal-Wallis test is also conducted along with box plot, which establishes that the proposed algorithm performs better when compared with other algorithms. 2020 IEEE. -
Blast resistance of steel plate shear walls designed for seismic loading
Since a blast loading or explosion can create nonlinear wave action and impact pressure on a structure, it necessary to construct a structure to resist blast loading as like other loads. In this study the nonlinear behaviour of a blast loading is simulated by calculating the pressure diagram with respect to time under the guidance of IS 4991-1968, code for "Criteria for Blast Resistant Design of Structures for Explosions above Ground". The study carried out for different charge weight (100kg TNT, 200kg TNT and 400kg TNT) and standoff distances of 20metre. Nonlinear behaviour of a Blast loading to steel structures with shear plates of thickness 6 mm, 8 mm and 10 mm are modelled in ETABS and the analysis is carried out to obtain base shear, story displacement, story deformation pattern, column forces, etc. Published under licence by IOP Publishing Ltd. -
Big Data Analytics Tools and Applications for Modern Business World
In the modern world, data is the unavoidable word. The digital environment in almost all our day to day life is linked with digital data. Effective data management is one of the important tasks. The gradual growth of technology in recent years, the generation of data has increased exponentially. Everything, ranging from sending a mail to simply browsing the internet generates data and this is collected and stored. This data has countless uses in various fields such as medicine, business, agriculture and marketing, but most of the time it goes unused. Business intelligence is a key factor in the current business world. Business growth is purely depending on technology. Technology is not only used in manufacturing it is applied to getting the customer. The data analytics is still in its earlier stages and has a long way to go before it yields favourable results. It is a good time as any to start working in this domain to utilize its prowess. This article has discussed the opportunities and growth of data analytics in the research domain. It can face soon when it reaches its advance stages. The big data is handling a larger amount of data in a conventional and non-conventional manner. Technology is playing a vital role to handle larger data from the database. This article is to discuss data analytics application in modern industry. In the technical perspective, big data Map-reduce is an advanced tool and for simulation part, R tool is used. 2020 IEEE. -
Markov analysis of unmanned cryogenic nitrogen plant with standby system
The unmanned cryogenic nitrogen plants operated by the industrial gas companies globally have their unique set of Reliability, Availability and Maintainability challenges. A generic reliability model of a typical unmanned cryogenic nitrogen plant is presented in this research work along with standby cryogenic storage System. The standby system is analysed for sensing and switching device as well as for load sharing system. The complexities of unmanned cryogenic nitrogen plant under repair with standby system are analysed using Markov method. A Markovian model has been developed for two different configurations: Configuration-1: Cryogenic nitrogen plant with gas and liquid production, nitrogen plant with only gas production and its dependence on the standby cryogenic storage system and to overall system reliability. Configuration-2: Considering cryogenic nitrogen plant is under repair and the standby system with external supply component under operation without failure and the system reliability of the configurations are solved by solving the set of differential equations and the solutions are presented in this paper. 2020 Author(s). -
Similarity Analysis for Citation Recommendation System using Binary Encoded Data
Citations are a crucial part of an academic dissertation, project or scientific work. The most time-consuming task for any scholar is to find suitable citations for any work. Thus, a convenient citation recommendation system provides completeness and fulfillment for citing the giants' works. Moreover, attaining high quality for any citation recommendation system is challenging as it should not only recommend relevant papers but also should match the context of the paper. An advanced algorithm SABED (Similarity Analysis using Binary Encoded Data) has been proposed that converts text metadata of the article like author name, doi of the paper, keywords, abstract and content of the paper into the binary format and is fired into the database. The binary formatted query fired fetches the accurate matches thereby increasing the accuracy of search probability and similarity analysis. This similarity analysis can be further used to provide recommendations to the users. The proposed system concentrates on the similarity of the content and hence the context of the papers is not taken into consideration. 2020 IEEE. -
Multiplier-free Realization of High throughout Transpose Form FIR Filter
This paper presents a multiplier-free realization of the block finite impulse response (FIR) filter in transpose form configuration using binary constant shifts method (BCSM). The proposed architecture is synthesized using Xilinx Vivado and Cadence RTL Encounter compiler for the area and power analysis and is compared with the existing works in the literature. The comparison highlights the advantages of the proposed architecture in terms of power, hardware complexity and throughput for realizing reconfigurable high throughput block FIR filters. 2020 IEEE. -
On some properties of partial dominating sets
A subset of the vertex set of a graph is a dominating set of the graph if that subset and all the adjacent vertices of that subset form the whole of the vertex set. In case, if a subset and all the adjacent vertices of that subset form part of the whole set, say, for 0 < p < 1, ptimes of the whole vertex set, we say it is a partial domination. In this paper, we explore some of the properties of partial dominating sets with respect to particular values of p. 2020 Author(s). -
Ideal co-secure domination in graphs
A set S ? V of a graph G = (V, E) is a co-secure dominating set if for every u ? S, there exists v ? V \ S such that uv ? E and (S \ {u}) ? {v} is a dominating set of G. The minimum cardinality of a co-secure dominating set of G is the co-secure domination number and is denoted by ?cs(G). In this paper we initiate the evaluation of a domination parameter known as the ideal co-secure domination and is defined as follows: A set D ? V is an ideal co-secure dominating set of a graph G = (V, E) if for every u ? D and for every v ? V \ D such that uv ? E, (D \ {u}) ? {v} is a dominating set of G. The minimum cardinality of an ideal co-secure dominating set of G is the ideal co-secure domination number and is denoted by ?ics(G). We look to determine the ideal co-secure domination number of some families of standard graphs and obtain sharp bounds. We also provide the conditions necessary for the trees to have ideal co-secure domination number equal to n - 2. 2020 Author(s). -
Synthesis of UWB Pulse Shaper for Efficient Pulse Propagation in Human Tissue
In this paper, a filter based pulse shaper is proposed for efficient Ultra-wideband (UWB) pulse transmission through human tissues. A bandpass Finite Impulse Response (FIR) filter is synthesized and its closed form expression for the impulse response coefficients is obtained. The filter shapes the basic UWB pulse, to closely fit the desired Federal Communication Commission (FCC) mask specifications, to achieve high spectral utilization efficiency. In this approach, the effects due to Gibb's phenomenon are minimized thereby resulting in lower dominant sidelobe of the resultant UWB pulse. The interference between adjacent pulses of the UWB data stream is minimized thus it allows shorter duration UWB pulses to be synthesized leading to higher data rate transmission compared to some techniques in literature. 2020 IEEE. -
Comprehensive Study on Sentiment Analysis: Types, Approaches, Recent Applications, Tools and APIs
Sentiment analysis can be considered a major application of machine learning, more particularly natural language processing (NLP). As there are varieties of applications, Sentiment analysis has gained a lot of attention and is one among the fastest growing research area in computer science. It is a type of data analysis which is observed from news reports, user reviews, feedbacks, social media updates etc. Responses are collected and analyzed by researchers. All sentiments can be classified into three categories-Positive, Negative and Neutral. The paper gives a detailed study of sentiment analysis. It explains the basics of sentiment analysis, its types, and different approaches of sentiment analysis. The recent tools and APIs along with various real world applications of sentiment analysis in various areas are also described briefly. 2020 IEEE. -
CPAODV: Classifying and Assigning 3 Level Preference to the Nodes in VANET Using AODV Based CBAODV Algorithm
Vehicles communicate with nearby vehicles to share high routing and traffic information in Vehicular Ad hoc Networks (VANETs) environment. Congestion and Delay in the transmission may occur due to the density of the nodes in the network. Traffic condition depends on the vehicles in Rural and Urban environment. Increase or Decrease in vehicles speed makes significant network changes when compared to the MANET environment. Road Side Terminals (RSTs) plays a major role in bridging the connection between the sender and the receiver nodes. The traditional AODV algorithm performs better when there are shortest path and link lifetime between the nodes in VANET. Giving 3 Level Preference to the nodes as High Preference (HP), Average Preference (AP) and Less Preference (LP) gives chances to nodes that have High Preference when compared to Less Preference. CPAODV model is proposed by implementing Classifying and giving preference to the RREQ to mitigate latency to the nodes. RST sends RREQ wisely based on the early model of Route Discovery stage itself. NS2 Simulator is used to analyze the strength of the proposed algorithm using QoS metrics like Throughput, Packet Delivery Ratio and End to End delay. This proposed CPAODV method performs better when compared to traditional AODV and CBAODV algorithm. 2020, Springer Nature Switzerland AG. -
Differences in perceptions of employees towards knowledge management strategies in selected information technology companies in Bangalore
In older days, knowledge was passed verbally from one person to another. The industrial revolution changed the scenario and the emergence of factories and industries paved the need for systematic knowledge and it became more and more specialized as time passed. Since then, there has been an exponential growth in scientific and practical knowledge. In the twenty-first century, this process has taken rapid speed due to the improvements in information and communication technologies. Employees of the organizations have a varied opinion towards practicing knowledge management strategies in an organization. Some employees consider knowledge management as an opportunity and a few others like a burden. This article focuses on identifying and analyzing the differences in perceptions of employees towards knowledge management strategies in selected Information Technology companies in Bangalore. 2020 American Institute of Physics Inc.. All rights reserved. -
Rough Set Based Ant-Lion Optimizer for Feature Selection
As the area of computational intelligence evolves, the dimensionality of any sort of data gets expanded. To solve this issue, Rough Set Theory (RST) has been successfully used for finding reducts as it requires only supplied data and no additional information. This paper investigates a novel search strategy for minimal attribute reduction based on rough sets and Ant Lion Optimization (ALO). ALO is a nature-inspired algorithm that mimics the hunting mechanism of ant lions, and this is inspired to find the minimum reducts. Datasets from the UCI repository are used in this paper. The experimental results show that the features selected by the proposed method are well classified with reasonable accuracy. 2020 IEEE. -
A Revised Study of Stability Issues in Mobile Ad-Hoc Networks
Adhoc or short live network has developed tremendously in the recent time, which can work without any access point or mobile towers. That means it is an infrastructure less network. Mobile Ad-hoc Networks can be referred as MANETs. The locations can be changed, and it can discover the path dynamically. In other words, the nodes move dynamically leading to the update of the topology, frequent change in topology, optimization of routing and fading the interference of multiuser are few issues connected with MANETs that affects the efficiency of the data transfer. The purpose of this survey is to reveal the various types of mechanisms which can be used to resolve the problem of routing performance related issues in MANETs. This paper also presents the classification of link stability, route repair and stable path algorithms in tabular format. 2020, Springer Nature Switzerland AG. -
Sustainability Concepts in the Design of Tall Structures
Construction industry is a rapid growing industry with various new technologies coming into practice. Sustainability concept is also a call for the present generation as many natural resources are getting exhausted. Thus the new era of development of Tall Structures with respect to Sustainability concept is being studied by concentrating on the Structural systems that can be adopted for construction of the same. In the present study we have considered two different 3D RC frame structural systems i.e., normal Beam-Column structural system and Outrigger structural system. The following two systems were modelled in ETABS 15.2 software in seismic zone V with three different heights that is 150m (50 storeys), 240m (80 storeys) and 300m (100 storeys). Response spectrum analysis is carried out considering Earthquake forces and the results are tabulated for maximum storey displacement and maximum storey drift. Then finally the structural system which is sustainable in construction of Tall structures is identified. 2020, Springer Nature Switzerland AG. -
Improved Crypto Algorithm for High-Speed Internet of Things (IoT) Applications
Modern technologies focus on integrated systems based on the Internet of Things (IoT). IoT based devices are unified with various levels of high-speed internet communication, computation process, secure authentication and privacy policies. One of the significant demands of present IoT is focused on its secure high-speed communication. However, traditional authentication and secure communication find it very difficult to manage the current need for IoT applications. Therefore, the need for such a reliable high-speed IoT scheme must be addressed. This proposed title introduces an enhanced version of the Rijndael Cryptographic Algorithm (Advanced Encryption Standard AES) to obtain fast-speed IoT-based application transmission. Pipeline-based AES technique promises for the high-speed crypto process, and this secure algorithm targeted to fast-speed Field Programmable Gate Array (FPGA) hardware. Thus, high-speed AES crypto algorithms, along with FPGA hardware, will improve the efficiency of future IoT design. Our proposed method also shows the tradeoff between High-Speed communications along with various FPGA platforms. 2020, Springer Nature Switzerland AG. -
Harnessing technology for mitigating water woes in the city of Bengaluru
Industrialization has caused most of the world's environmental problems like climate change, water security issues, biodiversity issues among others. Water-related issues like water scarcity, lack of water quality, water sanitation issues, lack of proper water resources management are some of them. Urbanization, population increase, pollution has led to an increase in water demand. Water being the elixir of life, is essential for the day-to-day living of an individual. The Fourth Industrial Revolution technologies like AI, IoT, Blockchain, Machine Learning have the capability of bringing solutions to these issues. The current study focuses on the water woes of Bengaluru, a fast-growing urban city, due to its migrating population. The woes are also due to the irresponsible behaviour of builders converting lakes into real estate infrastructure leading to clogged drains, excess sewage creation and flooding. A huge mismatch between demand and supply of water is created due to these issues. Before the city hits the Day Zero - no water day, it is significant to set up water infrastructure along with technology implementation which will help resolve this burning issue at the earliest. Published under licence by IOP Publishing Ltd. -
An Approach to Introduce Mobile Application Development for Teaching and Learning by Adapting Allans Dual Coding Theory
This paper reveals around methodology that could be powerful to teach mobile applications in a class by including a decent utilization of innovative technology alongside a system. Appraisal instruments within the cloud were utilized to encourage this sort of methodology toward teaching application development. The new methodology is executed by teaching in the lab with desktops or in the classroom with students laptops. It adapted Allans dual code Theory. The adequacy of this methodology is obvious through an examination of outcomes. 2020, Springer Nature Switzerland AG. -
Internet of things based metaheuristic reliability centered maintenance of distribution transformers
The transformer is a vital component of the power system. Continuous stress on the transformer due to overload, transient and faults will lead to physical damages. The isolation of the transformer causes significant revenue loss and inconvenience to the consumers at the distribution level. This invites the need to achieve a reliable power supply to the consumers and to perform maintenance activity appropriately. Optimized and predictive maintenance strategies are evolved to improve power availability for consumers. The model considers dispersive generation at the customer end, namely solar photovoltaics standalone system, diesel generation, and vehicle to load capabilities. Incipient or critical status of transformers' functional parameters are observed through the transformer terminal unit and sent to the internet of things platform. The remote processing unit acquires the information from all the distribution transformer and generates the optimized and reliability-centered maintenance schedule. In the proposed work, new reliability indices concerning the consumer dispersive generation are defined. The maximization of the reliability problem is solved using the coconut tree optimization technique. The highest reliability of power supply to the consumer and maintenance schedule are obtained. Economic facet of the estimated maintenance schedule exhibit benefit for both utility and consumer as it encapsulate time of use tariff. The heuristic dataset is used to synthesize the trained model by the machine learning algorithm and future maintenance schedule is predicted. The comparative study is made for the outcome of time-based optimized and predicted maintenance schedules against reliability. 2020 Institute of Physics Publishing. All rights reserved. -
A structured approach to implementing Robotic Process Automation in HR
Technological innovations are changing the industrial landscape. As technology transforms the world, the HR function needs to focus on embracing automation and other technologies that promise efficiency, service effectiveness and cost savings. Deployment of robotic process automation (RPA) can help (a) to offer better service to employees and managers (b) ensure compliance of HR processes with standards and regulations (c) facilitate rapid initiation and completion of HR processes (d) enhance efficiencies by digitizing data and auditing process data (e) improve HR productivity and cost savings by automating manual and repetitive tasks. A robust and structured approach needs to be in place to identify HR processes that can be automated using the RPA approach. In this paper the authors (a) suggest a four step approach - validation, assessment, evaluation and classification - to analyze processes and verify their suitability for automation using RPA (b) identify HR processes that has relevance for the RPA approach within the broad areas of HR Strategy, Talent Acquisition, Talent Development & Performance Management, Compensation & Benefits, HR Operations and Employee Relations (c) recommend a process for mapping HR RPA propensity. A case study is also presented for greater clarity on adoption of RPA in HR processes. Published under licence by IOP Publishing Ltd.