GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Sciencedomain International ; 2021
    In:  Journal of Advances in Mathematics and Computer Science ( 2021-09-22), p. 27-43
    In: Journal of Advances in Mathematics and Computer Science, Sciencedomain International, ( 2021-09-22), p. 27-43
    Abstract: Transmission errors are commonplace in communication systems. Wireless sensor networks like many other communication systems are susceptible to various forms of errors arising from sheer noise, heat and interference in sensor circuitry and from other forms of distortions. Research efforts in WSN have attempted to guarantee reliable and accurate data transmission from a target environment in the midst of these unwanted exposures. Many techniques have appeared and employed over the years to deal with the issue of transmission errors in communication systems. In this paper we present a new approach for single and multiple error control in WSN relying on the inherent fault tolerant feature of the Redundant Residue Number System. As an off shoot of Residue Number System, RRNS's fault tolerant capabilities help in building robust systems required for reliable data transmission in WSN systems. The Chinese Remainder Theorem and the Manhattan Distance Heuristics are used during the integer recovery process when detecting and correcting error digit(s) in a transmitted data. The proposed method performs considerably better in terms of data retrieval time than similar approaches by needing a smaller number of iterations to recover an originally transmitted data from its erroneous form. The approach in this work is also less computationally intensive compared to recent techniques during the error correction steps. Evidence of utility of the technique is illustrated in numerical examples.
    Type of Medium: Online Resource
    ISSN: 2456-9968
    Language: Unknown
    Publisher: Sciencedomain International
    Publication Date: 2021
    detail.hit.zdb_id: 3146750-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Foundation of Computer Science ; 2020
    In:  International Journal of Computer Applications Vol. 177, No. 45 ( 2020-03-17), p. 6-21
    In: International Journal of Computer Applications, Foundation of Computer Science, Vol. 177, No. 45 ( 2020-03-17), p. 6-21
    Type of Medium: Online Resource
    ISSN: 0975-8887
    Language: Unknown
    Publisher: Foundation of Computer Science
    Publication Date: 2020
    detail.hit.zdb_id: 2548770-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    The Research Publication ; 2021
    In:  Asian Journal of Engineering and Applied Technology Vol. 10, No. 2 ( 2021-11-05), p. 19-24
    In: Asian Journal of Engineering and Applied Technology, The Research Publication, Vol. 10, No. 2 ( 2021-11-05), p. 19-24
    Abstract: Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travels over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art schemes.
    Type of Medium: Online Resource
    ISSN: 2249-068X
    URL: Issue
    Language: Unknown
    Publisher: The Research Publication
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Sciencedomain International ; 2022
    In:  Asian Journal of Research in Computer Science ( 2022-10-20), p. 46-65
    In: Asian Journal of Research in Computer Science, Sciencedomain International, ( 2022-10-20), p. 46-65
    Abstract: This study harnesses the useful number properties of the residue number system (RNS) to minimise energy consumption in a wireless sensor network. In a traditional cluster-based wireless sensor network, large bit representations of aggregated packets are transmitted to the base station. However, large bit patterns of packets are slower compared to smaller bits. The proposed approach splits aggregated data into a pre-specified number of transmission channels using a moduli set. Cheap energy cost routes from the cluster heads are computed to deliver the chunked aggregated data to the base station. Forward and reverse converters are proposed to encode data into RNS and decode the RNS data that reaches the base station. MATLAB simulation is used to implement the proposed data splitting method and to evaluate network performance. The experimental results suggest that the proposed method is more effective at minimising transmission energy when compared with traditional approaches in which complete packets are transmitted.
    Type of Medium: Online Resource
    ISSN: 2581-8260
    Language: Unknown
    Publisher: Sciencedomain International
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Earthline Publishers ; 2021
    In:  Earthline Journal of Mathematical Sciences
    In: Earthline Journal of Mathematical Sciences, Earthline Publishers
    Abstract: Extending the lifetime of a wireless sensor network is vital in ensuring continuous monitoring functions in a target environment. Many techniques have appeared that seek to achieve such prolonged sensing gains. Clustering and improved selection of cluster heads play essential roles in the performance of sensor network functions. Cluster head in a hierarchical arrangement is responsible for transmitting aggregated data from member nodes to a base station for further user-specific data processing and analysis. Minimising the quick dissipation of cluster heads energy requires a careful choice of network factors when selecting a cluster head to prolong the lifetime of a wireless sensor network. In this work, we propose a multi-criteria cluster head selection technique to extend the sensing lifetime of a heterogeneous wireless sensor network. The proposed protocol incorporates residual energy, distance, and node density in selecting a cluster head. Each factor is assigned a weight using the Rank Order Centroid based on its relative importance. Several simulation tests using MATLAB 7.5.0 (R2007b) reveal improved network lifetime and other network performance indicators, including stability and throughput, compared with popular protocols such as LEACH and the SEP. The proposed scheme will be beneficial in applications requiring reliable and stable data sensing and transmission functions.
    Type of Medium: Online Resource
    ISSN: 2581-8147
    Language: English
    Publisher: Earthline Publishers
    Publication Date: 2021
    detail.hit.zdb_id: 3005240-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    IJournals Publications ; 2022
    In:  International Journal of Software & Hardware Research in Engineering Vol. 10, No. 1 ( 2022-01-15)
    In: International Journal of Software & Hardware Research in Engineering, IJournals Publications, Vol. 10, No. 1 ( 2022-01-15)
    Type of Medium: Online Resource
    ISSN: 2347-4890
    Language: Unknown
    Publisher: IJournals Publications
    Publication Date: 2022
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Earthline Publishers ; 2021
    In:  Earthline Journal of Mathematical Sciences
    In: Earthline Journal of Mathematical Sciences, Earthline Publishers
    Abstract: Recent researches have revealed the capability of Machine Learning (ML) techniques to effectively detect fraud in electronic banking transactions since they have the potential to detect new and unknown intrusions. A major challenge in the application of ML to fraud detection is the presence of highly imbalanced data sets. In many available datasets, majority of transactions are genuine with an extremely small percentage of fraudulent ones. Designing an accurate and efficient fraud detection system that is low on false positives but detects fraudulent activity effectively is a significant challenge for researchers. In this paper, a framework based on Hidden Markov Models (HMM), modified Density Based Spatial Clustering of Applications with Noise (DBSCAN) and Synthetic Minority Oversampling Technique Techniques (SMOTE) is proposed to effectively detect fraud in a highly imbalanced electronic banking dataset. The various transaction types, transaction amounts and the frequency of transactions are taken into consideration by the proposed model to enable effective detection. With different number of hidden states for the proposed HMMs, simulations are performed for four (4) different approaches and their performances compared using precision, recall rate and F1-Score as the evaluation metrics. The study revealed that, our proposed approach is able to detect fraudulent transactions more effectively with reasonably low number of false positives.
    Type of Medium: Online Resource
    ISSN: 2581-8147
    Language: English
    Publisher: Earthline Publishers
    Publication Date: 2021
    detail.hit.zdb_id: 3005240-3
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Sciencedomain International ; 2021
    In:  Asian Journal of Research in Computer Science ( 2021-06-25), p. 63-73
    In: Asian Journal of Research in Computer Science, Sciencedomain International, ( 2021-06-25), p. 63-73
    Abstract: Hidden Markov Models (HMMs) have become increasingly popular in the last several years due to the fact that, the models are very rich in mathematical structure and hence can form the theoretical basis for use in a wide range of applications. Various algorithms have been proposed in literature for optimizing the parameters of these models to make them applicable in real-life. However, the performance of these algorithms has remained computationally challenging largely due to slow/premature convergence and their sensitivity to preliminary estimates. In this paper, a hybrid algorithm comprising the Particle Swarm Optimization (PSO), Baum-Welch (BW), and Genetic Algorithms (GA) is proposed and implemented for optimizing the parameters of HMMs. The algorithm not only overcomes the shortcomings of the slow convergence speed of the PSO but also helps the BW escape from local optimal solution whilst improving the performance of GA despite the increase in the search space. Detailed experimental results demonstrates the effectiveness of our proposed approach when compared to other techniques available in literature.
    Type of Medium: Online Resource
    ISSN: 2581-8260
    Language: Unknown
    Publisher: Sciencedomain International
    Publication Date: 2021
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Society for Makers, Artist, Researchers and Technologists ; 2023
    In:  Journal of Mathematical Sciences & Computational Mathematics Vol. 4, No. 3 ( 2023-04-03), p. 98-120
    In: Journal of Mathematical Sciences & Computational Mathematics, Society for Makers, Artist, Researchers and Technologists, Vol. 4, No. 3 ( 2023-04-03), p. 98-120
    Abstract: Based on prior interactions between users and service items, recommendation systems have developed into practical tools for filtering and obtaining vital data. These systems are often used in a range of commercial industries, including e-commerce, tourism, social networking, and academic research. Collaborative filtering, content-based filtering, and hybrid recommender systems are the three main categories of recommender systems. Collaborative filtering recommender systems, which presume that users would be interested in products that users similar to them have highly rated, take into consideration users' tastes (in terms of item preferences). Content-based filtering recommender systems base their recommendations on the textual content of a product, using the assumption that customers would prefer items that are similar to those they have previously enjoyed. In a hybrid recommender system, two techniques are combined. These systems struggle with scalability, data sparsity, and cold starts, which leads to low-accuracy prediction and coverage. In this study, we proposed a unique recommendation method and applied the sigmoid function to the Jaccard similarity index. In our proposed method, which included the rating significance of items, we used the sigmoid function on the Jaccard similarity index to evaluate the asymmetry relationship between users. The similarity between the target user and his or her neighbours is then assessed using the asymmetric association and rating significance. Several cuttingedge similarity metrics are evaluated using experiments on three real-world data sets. The results show that the new similarity model performs better than the baseline models in terms of diversity and prediction accuracy.
    Type of Medium: Online Resource
    ISSN: 2688-8300
    Language: English
    Publisher: Society for Makers, Artist, Researchers and Technologists
    Publication Date: 2023
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Foundation of Computer Science ; 2019
    In:  International Journal of Computer Applications Vol. 177, No. 17 ( 2019-11-15), p. 26-29
    In: International Journal of Computer Applications, Foundation of Computer Science, Vol. 177, No. 17 ( 2019-11-15), p. 26-29
    Type of Medium: Online Resource
    ISSN: 0975-8887
    Language: Unknown
    Publisher: Foundation of Computer Science
    Publication Date: 2019
    detail.hit.zdb_id: 2548770-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...