<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://www.w3.org/2005/Atom">
<title>2017</title>
<link href="https://reunir.unir.net/handle/123456789/11709" rel="alternate"/>
<subtitle/>
<id>https://reunir.unir.net/handle/123456789/11709</id>
<updated>2024-10-26T07:59:04Z</updated>
<dc:date>2024-10-26T07:59:04Z</dc:date>
<entry>
<title>IJIMAI Editor's Note - Vol. 4 Issue 6</title>
<link href="https://reunir.unir.net/handle/123456789/11838" rel="alternate"/>
<author>
<name>Verdú, Elena</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11838</id>
<updated>2021-09-13T11:30:41Z</updated>
<summary type="text">IJIMAI Editor's Note - Vol. 4 Issue 6
Verdú, Elena
The International Journal of Interactive Multimedia and Artificial Intelligence provides an interdisciplinary forum in which scientists and professionals can share their research results and report new advances on Artificial Intelligence and Interactive Multimedia techniques. The research works presented in this regular issue are based on various topics of interest, among which are included: nature inspired optimization algorithms, multi-agent systems, fast motion estimation, handwritten recognition, supervised and unsupervised machine learning methods, or web mining.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T11:30:41Z
No. of bitstreams: 1
ijimai20174_6_0_pdf_12161.pdf: 147971 bytes, checksum: c5a7d2b3e319393a8721eb48888c6806 (MD5); Made available in DSpace on 2021-09-13T11:30:41Z (GMT). No. of bitstreams: 1
ijimai20174_6_0_pdf_12161.pdf: 147971 bytes, checksum: c5a7d2b3e319393a8721eb48888c6806 (MD5)
</summary>
</entry>
<entry>
<title>A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People</title>
<link href="https://reunir.unir.net/handle/123456789/11837" rel="alternate"/>
<author>
<name>González-Crespo, Rubén</name>
</author>
<author>
<name>Pelayo García-Bustelo, B. Cristina</name>
</author>
<author>
<name>Verdú, Elena</name>
</author>
<author>
<name>Martínez, M A</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11837</id>
<updated>2023-11-02T12:23:38Z</updated>
<summary type="text">A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People
González-Crespo, Rubén; Pelayo García-Bustelo, B. Cristina; Verdú, Elena; Martínez, M A
Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T11:17:15Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_6_15_pdf_19885.pdf: 509388 bytes, checksum: bc6be8da5a02719f674e16c04bab1b44 (MD5); Made available in DSpace on 2021-09-13T11:17:15Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_6_15_pdf_19885.pdf: 509388 bytes, checksum: bc6be8da5a02719f674e16c04bab1b44 (MD5)
</summary>
</entry>
<entry>
<title>Design and Evaluation of a Short Version of the User Experience Questionnaire (UEQ-S)</title>
<link href="https://reunir.unir.net/handle/123456789/11836" rel="alternate"/>
<author>
<name>Schrepp, Martin</name>
</author>
<author>
<name>chewski, Jörg Thomas</name>
</author>
<author>
<name>Hinderks, Andreas</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11836</id>
<updated>2021-09-13T10:56:53Z</updated>
<summary type="text">Design and Evaluation of a Short Version of the User Experience Questionnaire (UEQ-S)
Schrepp, Martin; chewski, Jörg Thomas; Hinderks, Andreas
The user experience questionnaire (UEQ) is a widely used questionnaire to measure the subjective impression of users towards the user experience of products. The UEQ is a semantic differential with 26 items. Filling out the UEQ takes approximately 3-5 minutes, i.e. the UEQ is already reasonably efficient concerning the time required to answer all items. However, there exist several valid application scenarios, where filling out the entire UEQ appears impractical. This paper deals with the creation of an 8 item short version of the UEQ, which is optimized for these specific application scenarios. First validations of this short version are also described.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T10:56:52Z
No. of bitstreams: 1
ijimai20174_6_14_pdf_20309.pdf: 457030 bytes, checksum: bc76f2abf4aa050ebab15c606d08c73d (MD5); Made available in DSpace on 2021-09-13T10:56:52Z (GMT). No. of bitstreams: 1
ijimai20174_6_14_pdf_20309.pdf: 457030 bytes, checksum: bc76f2abf4aa050ebab15c606d08c73d (MD5)
</summary>
</entry>
<entry>
<title>Segmentation of Arabic Handwritten Documents into Text Lines using Watershed Transform</title>
<link href="https://reunir.unir.net/handle/123456789/11835" rel="alternate"/>
<author>
<name>Boulid, Youssef</name>
</author>
<author>
<name>Souhar, Abdelghani</name>
</author>
<author>
<name>Ouagague, Mly.</name>
</author>
<author>
<name>Ameur, E</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11835</id>
<updated>2021-09-13T10:51:23Z</updated>
<summary type="text">Segmentation of Arabic Handwritten Documents into Text Lines using Watershed Transform
Boulid, Youssef; Souhar, Abdelghani; Ouagague, Mly.; Ameur, E
A crucial task in character recognition systems is the segmentation of the document into text lines and especially if it is handwritten. When dealing with non-Latin document such as Arabic, the challenge becomes greater since in addition to the variability of writing, the presence of diacritical points and the high number of ascender and descender characters complicates more the process of the segmentation. To remedy with this complexity and even to make this difficulty an advantage since the focus is on the Arabic language which is semi-cursive in nature, a method based on the Watershed Transform technique is proposed. Tested on «Handwritten Arabic Proximity Datasets» a segmentation rate of 93% for a 95% of matching score is achieved.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T10:51:23Z
No. of bitstreams: 1
ijimai20174_6_13_pdf_11239.pdf: 1353036 bytes, checksum: ffcce3415d0c31442b4104c5c76f7780 (MD5); Made available in DSpace on 2021-09-13T10:51:23Z (GMT). No. of bitstreams: 1
ijimai20174_6_13_pdf_11239.pdf: 1353036 bytes, checksum: ffcce3415d0c31442b4104c5c76f7780 (MD5)
</summary>
</entry>
<entry>
<title>Smart Algorithms to Control a Variable Speed Wind Turbine</title>
<link href="https://reunir.unir.net/handle/123456789/11834" rel="alternate"/>
<author>
<name>Farhane, Nabil</name>
</author>
<author>
<name>Boumhidi, Ismail</name>
</author>
<author>
<name>Boumhidi, Jaouad</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11834</id>
<updated>2021-09-13T10:43:59Z</updated>
<summary type="text">Smart Algorithms to Control a Variable Speed Wind Turbine
Farhane, Nabil; Boumhidi, Ismail; Boumhidi, Jaouad
In this paper, a robust adaptive fuzzy neural network sliding mode (AFNNSM) control design is proposed to maximize the captured energy for a variable speed wind turbine and to minimize the efforts of the drive shaft. Fuzzy neural network (FNN) is used to improve the mathematical system model, by the prediction of model unknown function, which is used by the Sliding mode control approach (SMC) and enables a lower switching gain to be used despite the presence of large uncertainties. As a result, the used robust control action did not exhibit any chattering behavior. This FNN is trained on-line using the backpropagation algorithm (BP). The particle swarm optimization (PSO) algorithm is used in this study to optimize the learning rate of BP algorithm in order to improve the network performance in term of the speed of convergence. The stability is shown by the Lyapunov theory and the trajectory tracking errors converge to zero without any oscillatory behavior. Simulations illustrate the effectiveness of the designed method.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T10:43:59Z
No. of bitstreams: 1
ijimai20174_6_12_pdf_81478.pdf: 1496037 bytes, checksum: f1e3ef80abdee2cdabe29b7c46f95756 (MD5); Made available in DSpace on 2021-09-13T10:43:59Z (GMT). No. of bitstreams: 1
ijimai20174_6_12_pdf_81478.pdf: 1496037 bytes, checksum: f1e3ef80abdee2cdabe29b7c46f95756 (MD5)
</summary>
</entry>
<entry>
<title>Workforce Optimization for Bank Operation Centers: A Machine Learning Approach</title>
<link href="https://reunir.unir.net/handle/123456789/11833" rel="alternate"/>
<author>
<name>Serengil, Sefik Ilkin</name>
</author>
<author>
<name>Ozpinar, Alper</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11833</id>
<updated>2021-09-13T10:14:09Z</updated>
<summary type="text">Workforce Optimization for Bank Operation Centers: A Machine Learning Approach
Serengil, Sefik Ilkin; Ozpinar, Alper
Online Banking Systems evolved and improved in recent years with the use of mobile and online technologies, performing money transfer transactions on these channels can be done without delay and human interaction, however commercial customers still tend to transfer money on bank branches due to several concerns. Bank Operation Centers serve to reduce the operational workload of branches. Centralized management also offers personalized service by appointed expert employees in these centers. Inherently, workload volume of money transfer transactions changes dramatically in hours. Therefore, work-force should be planned instantly or early to save labor force and increase operational efficiency. This paper introduces a hybrid multi stage approach for workforce planning in bank operation centers by the application of supervised and unsu-pervised learning algorithms. Expected workload would be predicted as supervised learning whereas employees are clus-tered into different skill groups as unsupervised learning to match transactions and proper employees. Finally, workforce optimization is analyzed for proposed approach on production data.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T10:14:09Z
No. of bitstreams: 1
ijimai20174_6_11_pdf_19584.pdf: 815676 bytes, checksum: 43290b32a9ba0d1337a9b70ad38cf8d9 (MD5); Made available in DSpace on 2021-09-13T10:14:09Z (GMT). No. of bitstreams: 1
ijimai20174_6_11_pdf_19584.pdf: 815676 bytes, checksum: 43290b32a9ba0d1337a9b70ad38cf8d9 (MD5)
</summary>
</entry>
<entry>
<title>Supporting Multi-agent Coordination and Computational Collective Intelligence in Enterprise 2.0 Platform</title>
<link href="https://reunir.unir.net/handle/123456789/11832" rel="alternate"/>
<author>
<name>Taghezout, Noria</name>
</author>
<author>
<name>Reguieg, Seddik</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11832</id>
<updated>2021-09-13T10:08:53Z</updated>
<summary type="text">Supporting Multi-agent Coordination and Computational Collective Intelligence in Enterprise 2.0 Platform
Taghezout, Noria; Reguieg, Seddik
In this paper, we propose a novel approach utilizing a professional Social network (Pro Social Network) and a new coordination protocol (CordiNet). Our motivation behind this article is to convince Small and Medium Enterprises managers that current organizations have chosen to use Enterprise 2.0 tools because these latter have demonstrated remarkable innovation as well as successful collaboration and collective intelligence. The particularity of our work is that is allows employer to share diagnosis and fault repair procedures on the basis of some modeling agents. In fact, each enterprise is represented by a container of agents to ensure a secured and confidential information exchange between intra employers, and a central main container to connect all enterprises’ containers for a social information exchange. Enterprise’s container consists of a Checker Enterprise Agent (ChEA), a Coordinator Enterprise Agent (CoEA) and a Search Enterprise Agent (SeEA). Whereas the central main container comprises its proper agents such as Selection Agent (SA), and a Supervisor Agent (SuA). JADE platform is used to allow agents to communicate and collaborate. The FIPA-ACL performatives have been extended for this purpose. We conduct some experiments to demonstrate the feasibility of our approach.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T10:08:53Z
No. of bitstreams: 1
ijimai20174_6_10_pdf_13892.pdf: 2147249 bytes, checksum: d940e70e5881c9b47c6583531959eba7 (MD5); Made available in DSpace on 2021-09-13T10:08:53Z (GMT). No. of bitstreams: 1
ijimai20174_6_10_pdf_13892.pdf: 2147249 bytes, checksum: d940e70e5881c9b47c6583531959eba7 (MD5)
</summary>
</entry>
<entry>
<title>Combining Fuzzy AHP with GIS and Decision Rules for Industrial Site Selection</title>
<link href="https://reunir.unir.net/handle/123456789/11831" rel="alternate"/>
<author>
<name>Taibi, Aissa</name>
</author>
<author>
<name>Atmani, Baghdad</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11831</id>
<updated>2021-09-13T10:03:15Z</updated>
<summary type="text">Combining Fuzzy AHP with GIS and Decision Rules for Industrial Site Selection
Taibi, Aissa; Atmani, Baghdad
This study combines Fuzzy Analytic Hierarchy Process (FAHP), Geographic Information System (GIS) and Decision rules to provide decision makers with a ranking model for industrial sites in Algeria. A ranking of the suitable industrial areas is a crucial multi-criteria decision problem based on socio-economical and technical criteria as on environmental considerations. Fuzzy AHP is used for assessment of the candidate industrial sites by combining fuzzy set theory and analytic hierarchy process (AHP). The decision rule base serves as a filter that performs criteria pre-treatment involving a reduction of their numbers. GIS is used to overlay, generate criteria maps and for visualizing ranked zones on the map. The rank of a zone so obtained is an index that guides decision-makers to the best utilization of the zone in future.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-13T10:03:15Z
No. of bitstreams: 1
ijimai20174_6_9_pdf_25718.pdf: 2057289 bytes, checksum: 2cdd1ca51b0dd44f43624715f32ec2e2 (MD5); Made available in DSpace on 2021-09-13T10:03:15Z (GMT). No. of bitstreams: 1
ijimai20174_6_9_pdf_25718.pdf: 2057289 bytes, checksum: 2cdd1ca51b0dd44f43624715f32ec2e2 (MD5)
</summary>
</entry>
<entry>
<title>Anomaly based Intrusion Detection using Modified Fuzzy Clustering</title>
<link href="https://reunir.unir.net/handle/123456789/11826" rel="alternate"/>
<author>
<name>Harish, B S</name>
</author>
<author>
<name>Kumar, S V A</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11826</id>
<updated>2021-09-10T10:48:18Z</updated>
<summary type="text">Anomaly based Intrusion Detection using Modified Fuzzy Clustering
Harish, B S; Kumar, S V A
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information. As a result, Intrusion Detection System has become an indispensable component of computer security. The proposed method consists of three steps: Pre-Processing, Feature Selection and Clustering. In pre-processing step, the duplicate samples are eliminated from the sample set. Next, principal component analysis is adopted to select the most discriminative features. In clustering step, the network samples are clustered using Robust Spatial Kernel Fuzzy C-Means (RSKFCM) algorithm. RSKFCM is a variant of traditional Fuzzy C-Means which considers the neighbourhood membership information and uses kernel distance metric. To evaluate the proposed method, we conducted experiments on standard dataset and compared the results with state-of-the-art methods. We used cluster validity indices, accuracy and false positive rate as performance metrics. Experimental results inferred that, the proposed method achieves better results compared to other methods.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T10:48:18Z
No. of bitstreams: 1
ijimai20174_6_8_pdf_14933.pdf: 892561 bytes, checksum: 8609d74a869467482d52129a57756be0 (MD5); Made available in DSpace on 2021-09-10T10:48:18Z (GMT). No. of bitstreams: 1
ijimai20174_6_8_pdf_14933.pdf: 892561 bytes, checksum: 8609d74a869467482d52129a57756be0 (MD5)
</summary>
</entry>
<entry>
<title>Heuristics Considering UX and Quality Criteria for Heuristics</title>
<link href="https://reunir.unir.net/handle/123456789/11825" rel="alternate"/>
<author>
<name>Schön, Eva-Maria</name>
</author>
<author>
<name>Thomaschewski, Jörg</name>
</author>
<author>
<name>Bader, Frederik</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11825</id>
<updated>2023-06-26T10:15:19Z</updated>
<summary type="text">Heuristics Considering UX and Quality Criteria for Heuristics
Schön, Eva-Maria; Thomaschewski, Jörg; Bader, Frederik
Heuristic evaluation is a cheap tool with which one can take qualitative measures of a product’s usability. However, since the methodology was first presented, the User Experience (UX) has become more popular but the heuristics have remained the same. In this paper, we analyse the current state of heuristic evaluation in terms of heuristics for measuring the UX. To do so, we carried out a literature review. In addition, we had a look at different heuristics and mapped them with the UX dimensions of the User Experience Questionnaire (UEQ). Moreover, we proposed a quality model for heuristic evaluation and a list of quality criteria for heuristics.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T10:38:40Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_6_7_pdf_74071.pdf: 438337 bytes, checksum: ec06a6b8ded9a8a8adba84030672a4ba (MD5); Made available in DSpace on 2021-09-10T10:38:40Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_6_7_pdf_74071.pdf: 438337 bytes, checksum: ec06a6b8ded9a8a8adba84030672a4ba (MD5)
</summary>
</entry>
<entry>
<title>A Topic Modeling Guided Approach for Semantic Knowledge Discovery in e-Commerce</title>
<link href="https://reunir.unir.net/handle/123456789/11824" rel="alternate"/>
<author>
<name>Anoop, V S</name>
</author>
<author>
<name>Asharaf, S</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11824</id>
<updated>2021-09-10T10:03:40Z</updated>
<summary type="text">A Topic Modeling Guided Approach for Semantic Knowledge Discovery in e-Commerce
Anoop, V S; Asharaf, S
The task of mining large unstructured text archives, extracting useful patterns and then organizing them into a knowledgebase has attained a great attention due to its vast array of immediate applications in business. Businesses thus demand new and efficient algorithms for leveraging potentially useful patterns from heterogeneous data sources that produce huge volumes of unstructured data. Due to the ability to bring out hidden themes from large text repositories, topic modeling algorithms attained significant attention in the recent past. This paper proposes an efficient and scalable method which is guided by topic modeling for extracting concepts and relationships from e-commerce product descriptions and organizing them into knowledgebase. Semantic graphs can be generated from such a knowledgebase on which meaning aware product discovery experience can be built for potential buyers. Extensive experiments using proposed unsupervised algorithms with e-commerce product descriptions collected from open web shows that our proposed method outperforms some of the existing methods of leveraging concepts and relationships so that efficient knowledgebase construction is possible.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T10:03:40Z
No. of bitstreams: 1
ijimai20174_6_6_pdf_86078.pdf: 855397 bytes, checksum: 73bde5096266e8180b4adc9ba7893928 (MD5); Made available in DSpace on 2021-09-10T10:03:40Z (GMT). No. of bitstreams: 1
ijimai20174_6_6_pdf_86078.pdf: 855397 bytes, checksum: 73bde5096266e8180b4adc9ba7893928 (MD5)
</summary>
</entry>
<entry>
<title>N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents</title>
<link href="https://reunir.unir.net/handle/123456789/11823" rel="alternate"/>
<author>
<name>Bagga, Pallavi</name>
</author>
<author>
<name>Hans, Rahul</name>
</author>
<author>
<name>Sharma, Vipul</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11823</id>
<updated>2021-09-10T09:51:53Z</updated>
<summary type="text">N-grams Based Supervised Machine Learning Model for Mobile Agent Platform Protection against Unknown Malicious Mobile Agents
Bagga, Pallavi; Hans, Rahul; Sharma, Vipul
From many past years, the detection of unknown malicious mobile agents before they invade the Mobile Agent Platform has been the subject of much challenging activity. The ever-growing threat of malicious agents calls for techniques for automated malicious agent detection. In this context, the machine learning (ML) methods are acknowledged more effective than the Signature-based and Behavior-based detection methods. Therefore, in this paper, the prime contribution has been made to detect the unknown malicious mobile agents based on n-gram features and supervised ML approach, which has not been done so far in the sphere of the Mobile Agents System (MAS) security. To carry out the study, the n-grams ranging from 3 to 9 are extracted from a dataset containing 40 malicious and 40 non-malicious mobile agents. Subsequently, the classification is performed using different classifiers. A nested 5-fold cross validation scheme is employed in order to avoid the biasing in the selection of optimal parameters of classifier. The observations of extensive experiments demonstrate that the work done in this paper is suitable for the task of unknown malicious mobile agent detection in a Mobile Agent Environment, and also adds the ML in the interest list of researchers dealing with MAS security.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T09:51:53Z
No. of bitstreams: 1
ijimai20174_6_5_pdf_30833.pdf: 1429461 bytes, checksum: 45aa6e8dd850207a23654d5b48998143 (MD5); Made available in DSpace on 2021-09-10T09:51:53Z (GMT). No. of bitstreams: 1
ijimai20174_6_5_pdf_30833.pdf: 1429461 bytes, checksum: 45aa6e8dd850207a23654d5b48998143 (MD5)
</summary>
</entry>
<entry>
<title>Multi-agent Systems for Arabic Handwriting Recognition</title>
<link href="https://reunir.unir.net/handle/123456789/11822" rel="alternate"/>
<author>
<name>Boulid, Youssef</name>
</author>
<author>
<name>Souhar, Abdelghani</name>
</author>
<author>
<name>Elyoussfi Elkettani, Mohamed</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11822</id>
<updated>2021-09-10T09:42:40Z</updated>
<summary type="text">Multi-agent Systems for Arabic Handwriting Recognition
Boulid, Youssef; Souhar, Abdelghani; Elyoussfi Elkettani, Mohamed
This paper aims to give a presentation of the PhD defended by Boulid Youssef on December 26th, 2016 at University Ibn Tofail, entitled “Arabic handwritten recognition in an offline mode”. The adopted approach is realized under the multi agent paradigm. The dissertation was held in Faculty of Science Kénitra in a publicly open presentation. After the presentation, Boulid was awarded with the highest grade (Très honorable avec félicitations de jury).
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T09:42:40Z
No. of bitstreams: 1
ijimai20174_6_4_pdf_18367.pdf: 254854 bytes, checksum: 5c3871677035a3a73992fdc60c8d8763 (MD5); Made available in DSpace on 2021-09-10T09:42:40Z (GMT). No. of bitstreams: 1
ijimai20174_6_4_pdf_18367.pdf: 254854 bytes, checksum: 5c3871677035a3a73992fdc60c8d8763 (MD5)
</summary>
</entry>
<entry>
<title>A Novel Hybrid Approach for Fast Block Based Motion Estimation</title>
<link href="https://reunir.unir.net/handle/123456789/11821" rel="alternate"/>
<author>
<name>Arora, Shaifali</name>
</author>
<author>
<name>Khanna, Kavita</name>
</author>
<author>
<name>Rajpal, Navin</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11821</id>
<updated>2021-09-10T09:03:57Z</updated>
<summary type="text">A Novel Hybrid Approach for Fast Block Based Motion Estimation
Arora, Shaifali; Khanna, Kavita; Rajpal, Navin
The current work presents a novel hybrid approach for motion estimation of various video sequences with a purpose to speed up the entire process without affecting the accuracy. The method integrates the dynamic Zero motion pre-judgment (ZMP) technique with Initial search centers (ISC) along with half way search termination and Small diamond search pattern. Calculation of the initial search centers has been shifted after the process of zero motion pre-judgment unlike most the previous approaches so that the search centers for stationary blocks need not be identified. Proper identification of ISC dismisses the need to use any fast block matching algorithm (BMA) to find the motion vectors (MV), rather a fixed search pattern such as small diamond search pattern is sufficient to use. Half way search termination has also been incorporated into the algorithm which helps in deciding whether the predicted ISC is the actual MV or not which further reduced the number of computations. Simulation results of the complete hybrid approach have been compared to other standard methods in the field. The method presented in the manuscript ensures better video quality with fewer computations.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T09:03:57Z
No. of bitstreams: 1
ijimai20174_6_3_pdf_76601.pdf: 1871630 bytes, checksum: ee27d175a812428bf1021e57fad48cc2 (MD5); Made available in DSpace on 2021-09-10T09:03:57Z (GMT). No. of bitstreams: 1
ijimai20174_6_3_pdf_76601.pdf: 1871630 bytes, checksum: ee27d175a812428bf1021e57fad48cc2 (MD5)
</summary>
</entry>
<entry>
<title>A Solution Generator Algorithm for Decision Making based Automated Negotiation in the Construction Domain</title>
<link href="https://reunir.unir.net/handle/123456789/11820" rel="alternate"/>
<author>
<name>Mahmoud, Moamin</name>
</author>
<author>
<name>Ahmad, Mohd Sharifuddin</name>
</author>
<author>
<name>Idrus, Arazi</name>
</author>
<author>
<name>Yahya, Azani</name>
</author>
<author>
<name>Husen, Hapsa</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11820</id>
<updated>2021-09-10T08:15:29Z</updated>
<summary type="text">A Solution Generator Algorithm for Decision Making based Automated Negotiation in the Construction Domain
Mahmoud, Moamin; Ahmad, Mohd Sharifuddin; Idrus, Arazi; Yahya, Azani; Husen, Hapsa
In this paper, we present our work-in-progress of a proposed framework for automated negotiation in the construction domain. The proposed framework enables software agents to conduct negotiations and autonomously make value-based decisions. The framework consists of three main components which are, solution generator algorithm, negotiation algorithm, and conflict resolution algorithm. This paper extends the discussion on the solution generator algorithm that enables software agents to generate solutions and rank them from 1st to nth solution for the negotiation stage of the operation. The solution generator algorithm consists of three steps which are, review solutions, rank solutions, and form ranked solutions. For validation purpose, we present a scenario that utilizes the proposed algorithm to rank solutions. The validation shows that the algorithm is promising, however, it also highlights the conflict between different parties that needs further negotiation action.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T08:15:29Z
No. of bitstreams: 1
ijimai20174_6_2_pdf_84357.pdf: 1197109 bytes, checksum: 4733f9742396fe97686c9256c5442711 (MD5); Made available in DSpace on 2021-09-10T08:15:29Z (GMT). No. of bitstreams: 1
ijimai20174_6_2_pdf_84357.pdf: 1197109 bytes, checksum: 4733f9742396fe97686c9256c5442711 (MD5)
</summary>
</entry>
<entry>
<title>Nature Inspired Range Based Wireless Sensor Node Localization Algorithms</title>
<link href="https://reunir.unir.net/handle/123456789/11819" rel="alternate"/>
<author>
<name>Arora, Sankalap</name>
</author>
<author>
<name>Kaur, Ranjit</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11819</id>
<updated>2021-09-10T07:48:11Z</updated>
<summary type="text">Nature Inspired Range Based Wireless Sensor Node Localization Algorithms
Arora, Sankalap; Kaur, Ranjit
Localization is one of the most important factors highly desirable for the performance of Wireless Sensor Network (WSN). Localization can be stated as the estimation of the location of the sensor nodes in sensor network. In the applications of WSN, the data gathered at sink node will be meaningless without localization information of the nodes. Due to size and complexity factors of the localization problem, it can be formulated as an optimization problem and thus can be approached with optimization algorithms. In this paper, the nature inspired algorithms are used and analyzed for an optimal estimation of the location of sensor nodes. The performance of the nature inspired algorithms viz. Flower pollination algorithm (FPA), Firefly algorithm (FA), Grey Wolf Optimization (GWO) and Particle Swarm Optimization (PSO) for localization in WSN is analyzed in terms of localization accuracy, number of localized nodes and computing time. The comparative analysis has shown that FPA is more proficient in determining&#13;
the coordinates of nodes by minimizing the localization error as compared to FA, PSO and GWO.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-10T07:48:10Z
No. of bitstreams: 1
ijimai20174_6_1_pdf_64773.pdf: 5349860 bytes, checksum: 3dd346a6f5c9dec7e98d980163d4170c (MD5); Made available in DSpace on 2021-09-10T07:48:11Z (GMT). No. of bitstreams: 1
ijimai20174_6_1_pdf_64773.pdf: 5349860 bytes, checksum: 3dd346a6f5c9dec7e98d980163d4170c (MD5)
</summary>
</entry>
<entry>
<title>Virtual Planning and Intraoperative Navigation in Craniomaxillofacial Surgery</title>
<link href="https://reunir.unir.net/handle/123456789/11792" rel="alternate"/>
<author>
<name>Cebrian Carretero, Jose Luis</name>
</author>
<author>
<name>Guiñales, Jorge</name>
</author>
<author>
<name>Burgueño García, Miguel</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11792</id>
<updated>2021-09-06T11:40:49Z</updated>
<summary type="text">Virtual Planning and Intraoperative Navigation in Craniomaxillofacial Surgery
Cebrian Carretero, Jose Luis; Guiñales, Jorge; Burgueño García, Miguel
Surgery planning assisted by computer represents one important example of the collaboration between surgeons and engineers. Virtual planning allows surgeons to pre-do the surgery by working over a virtual 3D model of the patient obtained through a computer tomography. Through surgical navigation, surgeons are helped while working with deep structures and can check if they are following accurately the surgical plan. These assistive tools are crucial in the field of facial reconstructive surgery. This paper describes two cases, one related to orbital fractures and another one related to oncological patients, showing the advantages that these tools provide, specifically when used for craniomaxillofacial surgery.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T11:40:49Z
No. of bitstreams: 1
ijimai20174_5_12_pdf_10848.pdf: 820447 bytes, checksum: 880ee80e4f70548f734c954ae242ab62 (MD5); Made available in DSpace on 2021-09-06T11:40:49Z (GMT). No. of bitstreams: 1
ijimai20174_5_12_pdf_10848.pdf: 820447 bytes, checksum: 880ee80e4f70548f734c954ae242ab62 (MD5)
</summary>
</entry>
<entry>
<title>Influence of Lymphocyte T CD4 Levels on the Neuropsychological Performance of Population Affected by HIV and with a Previous History of Substance Use</title>
<link href="https://reunir.unir.net/handle/123456789/11791" rel="alternate"/>
<author>
<name>Vázquez-Justo, Enrique</name>
</author>
<author>
<name>García-Torres, Amalia</name>
</author>
<author>
<name>Vergara-Moragues, Esperanza</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11791</id>
<updated>2023-03-09T15:48:27Z</updated>
<summary type="text">Influence of Lymphocyte T CD4 Levels on the Neuropsychological Performance of Population Affected by HIV and with a Previous History of Substance Use
Vázquez-Justo, Enrique; García-Torres, Amalia; Vergara-Moragues, Esperanza
The immunological markers help to know if there is a good recovery of the immunological system in patients infected with HIV. Among them, the lymphocyte T CD4 rate is the main indicator of the patient’s immunological state being used for staging HIV infection, evaluating the mortality or comorbidity risk and the vulnerability to certain oportunistic infections. However, its link with the presence of cognitive alterations is not clear. Therefore, the aim of this article is to study if lymphocyte T CD4 levels are connected with the neuropsychological performance of a group of people infected with HIV and with a previous history of substance use. The sample consisted of 80 seropositive males with a previous history of substance use. They were evaluated by means of a neuropsychological battery which assesses the most affected cognitive domains in HIV population. The results showed that the patients having a higher level of immunodeficiency (CD4 &lt;200/ mm3) have a poorer performance in terms of attention, visuomotor dexterity, visual memory, visual perception, auditory-verbal learning and inhibition. Therefore, our results show a realtion between the lymphocyte T CD4 rate and the neuropsychological performance in seropositive people with a previsous history of substance use.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T11:18:29Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_5_11_pdf_11000.pdf: 408431 bytes, checksum: 0318313c2142559347edb713c73c8ecc (MD5); Made available in DSpace on 2021-09-06T11:18:29Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_5_11_pdf_11000.pdf: 408431 bytes, checksum: 0318313c2142559347edb713c73c8ecc (MD5)
</summary>
</entry>
<entry>
<title>Comparison of Feedforward Network and Radial Basis Function to Detect Leukemia</title>
<link href="https://reunir.unir.net/handle/123456789/11790" rel="alternate"/>
<author>
<name>Bijalwan, Vishwanath</name>
</author>
<author>
<name>Balodhi, Meenu</name>
</author>
<author>
<name>Bagwari, Pragya</name>
</author>
<author>
<name>Saxena, Bhavya</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11790</id>
<updated>2021-09-06T11:13:36Z</updated>
<summary type="text">Comparison of Feedforward Network and Radial Basis Function to Detect Leukemia
Bijalwan, Vishwanath; Balodhi, Meenu; Bagwari, Pragya; Saxena, Bhavya
Leukemia is a fast growing cancer also called as blood cancer. It normally originates near bone marrow. The need for automatic leukemia detection system rises ever since the existing working methods include labor-intensive inspection of the blood marking as the initial step in the direction of diagnosis. This is very time consuming and also the correctness of the technique rest on the worker’s capability. This paper describes few image segmentation and feature extraction methods used for leukemia detection. Analyzing through images is very important as from images; diseases can be detected and diagnosed at earlier stage. From there, further actions like controlling, monitoring and prevention of diseases can be done. Images are used as they are cheap and do not require expensive testing and lab equipment. The system will focus on white blood cells disease, leukemia. Changes in features will be used as a classifier input.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T11:13:36Z
No. of bitstreams: 1
ijimai20174_5_10_pdf_10782.pdf: 473393 bytes, checksum: 477ecc52a0289460d3eda1637015ab77 (MD5); Made available in DSpace on 2021-09-06T11:13:36Z (GMT). No. of bitstreams: 1
ijimai20174_5_10_pdf_10782.pdf: 473393 bytes, checksum: 477ecc52a0289460d3eda1637015ab77 (MD5)
</summary>
</entry>
<entry>
<title>A Revision of Preventive Web-based Psychotherapies in Subjects at Risk of Mental Disorders</title>
<link href="https://reunir.unir.net/handle/123456789/11789" rel="alternate"/>
<author>
<name>Sánchez-Gutiérrez, Teresa</name>
</author>
<author>
<name>Barbeito, Sara</name>
</author>
<author>
<name>Calvo, Ana</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11789</id>
<updated>2023-04-20T14:10:11Z</updated>
<summary type="text">A Revision of Preventive Web-based Psychotherapies in Subjects at Risk of Mental Disorders
Sánchez-Gutiérrez, Teresa; Barbeito, Sara; Calvo, Ana
For the last years, the impulse of new technologies has overcome the traditional pathways of face-to-face clinical intervention and web-based psychological methodologies for intervention have started to gain success. This study aims to review the state-of-art about the effectiveness studies on preventive web- based interventions accomplished in samples of subjects at high risk for depressive, anxiety, eating behavior, problematic substance use symptoms and promotion of psychological well-being. Results showed that web-based psychological interventions for the prevention of mental disorders seemed to be effective for at risk individuals. Online health promotion in the general population was also effective to avoid the onset of clinical psychological circumstances. Future research should focus on personalized online intervention and on the evaluation of web-based engagement.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T10:58:29Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_5_9_pdf_14588.pdf: 365947 bytes, checksum: da787637c2959697525955c2c4939dcb (MD5); Made available in DSpace on 2021-09-06T10:58:29Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_5_9_pdf_14588.pdf: 365947 bytes, checksum: da787637c2959697525955c2c4939dcb (MD5)
</summary>
</entry>
<entry>
<title>Diagnosis of Malignant Melanoma of Skin Cancer Types</title>
<link href="https://reunir.unir.net/handle/123456789/11788" rel="alternate"/>
<author>
<name>Alasadi, Abbas Hassin</name>
</author>
<author>
<name>Alsafy, Baidaa</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11788</id>
<updated>2021-09-06T10:50:21Z</updated>
<summary type="text">Diagnosis of Malignant Melanoma of Skin Cancer Types
Alasadi, Abbas Hassin; Alsafy, Baidaa
Malignant melanoma is a kind of skin cancer that begins in melanocytes. It can influence on the skin only, or it may expand to the bones and organs. It is less common, but more serious and aggressive than other types of skin cancer. Malignant Melanoma can happen anywhere on the skin, but it is widespread in certain locations such as the legs in women, the back and chest in men, the face, the neck, mouth, eyes, and genitals. In this paper, a proposed algorithm is designed for diagnosing malignant melanoma types by using digital image processing techniques. The algorithm consists of four steps: preprocessing, separation, features extraction, and diagnosis. A neural network (NN) used to diagnosis malignant melanoma types. The total accuracy of the neural network was 100% for training and 93% for testing. The evaluation of the algorithm is done by using sensitivity, specificity, and accuracy. The sensitivity of NN in diagnosing malignant melanoma types was 95.6%, while the specificity was 92.2% and the accuracy was 93.9%. The experimental results are acceptable.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T10:50:21Z
No. of bitstreams: 1
ijimai20174_5_8_pdf_89993.pdf: 1034684 bytes, checksum: 9329f73e3f37b6721b688b3fc500299c (MD5); Made available in DSpace on 2021-09-06T10:50:21Z (GMT). No. of bitstreams: 1
ijimai20174_5_8_pdf_89993.pdf: 1034684 bytes, checksum: 9329f73e3f37b6721b688b3fc500299c (MD5)
</summary>
</entry>
<entry>
<title>Brain Computer Interface for Micro-controller Driven Robot Based on Emotiv Sensors</title>
<link href="https://reunir.unir.net/handle/123456789/11787" rel="alternate"/>
<author>
<name>Asawa, Krishna</name>
</author>
<author>
<name>Gargava, Parth</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11787</id>
<updated>2021-09-06T10:29:42Z</updated>
<summary type="text">Brain Computer Interface for Micro-controller Driven Robot Based on Emotiv Sensors
Asawa, Krishna; Gargava, Parth
A Brain Computer Interface (BCI) is developed to navigate a micro-controller based robot using Emotiv sensors. The BCI system has a pipeline of 5 stages- signal acquisition, pre-processing, feature extraction, classification and CUDA inter- facing. It shall aid in serving a prototype for physical movement of neurological patients who are unable to control or operate on their muscular movements. All stages of the pipeline are designed to process bodily actions like eye blinks to command navigation of the robot. This prototype works on features learning and classification centric techniques using support vector machine. The suggested pipeline, ensures successful navigation of a robot in four directions in real time with accuracy of 93 percent.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T10:29:42Z
No. of bitstreams: 1
ijimai20174_5_7_pdf_15281.pdf: 382642 bytes, checksum: db4209eb609820684284ad3d36af1bbb (MD5); Made available in DSpace on 2021-09-06T10:29:42Z (GMT). No. of bitstreams: 1
ijimai20174_5_7_pdf_15281.pdf: 382642 bytes, checksum: db4209eb609820684284ad3d36af1bbb (MD5)
</summary>
</entry>
<entry>
<title>Selecting Statistical Characteristics of Brain Signals to Detect Epileptic Seizures using Discrete Wavelet Transform and Perceptron Neural Network</title>
<link href="https://reunir.unir.net/handle/123456789/11786" rel="alternate"/>
<author>
<name>Esmaeilpour, Mansour</name>
</author>
<author>
<name>Abbasi, Rezvan</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11786</id>
<updated>2021-09-06T10:21:55Z</updated>
<summary type="text">Selecting Statistical Characteristics of Brain Signals to Detect Epileptic Seizures using Discrete Wavelet Transform and Perceptron Neural Network
Esmaeilpour, Mansour; Abbasi, Rezvan
Electroencephalogram signals (EEG) have always been used in medical diagnosis. Evaluation of the statistical characteristics of EEG signals is actually the foundation of all brain signal processing methods. Since the correct prediction of disease status is of utmost importance, the goal is to use those models that have minimum error and maximum reliability. In anautomatic epileptic seizure detection system, we should be able to distinguish between EEG signals before, during and after seizure. Extracting useful characteristics from EEG data can greatly increase the classification accuracy. In this new approach, we first parse EEG signals to sub-bands in different categories with the help of discrete wavelet transform(DWT) and then we derive statistical characteristics such as maximum, minimum, average and standard deviation for each sub-band. A multilayer perceptron (MLP)neural network was used to assess the different scenarios of healthy and seizure among the collected signal sets. In order to assess the success and effectiveness of the proposed method, the confusion matrix was used and its accuracy was achieved98.33 percent. Due to the limitations and obstacles in analyzing EEG signals, the proposed method can greatly help professionals experimentally and visually in the classification and diagnosis of epileptic seizures.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T10:21:55Z
No. of bitstreams: 1
ijimai20174_5_6_pdf_12024.pdf: 1856037 bytes, checksum: f270cd3180ae7d780c3f2fe4ed7f02f3 (MD5); Made available in DSpace on 2021-09-06T10:21:55Z (GMT). No. of bitstreams: 1
ijimai20174_5_6_pdf_12024.pdf: 1856037 bytes, checksum: f270cd3180ae7d780c3f2fe4ed7f02f3 (MD5)
</summary>
</entry>
<entry>
<title>Masticatory System Biomechanical Photoelastic Simulation fot the Comparision of the Conventional and Uni-Lock Systems in Mandibular Osteosynthesis</title>
<link href="https://reunir.unir.net/handle/123456789/11785" rel="alternate"/>
<author>
<name>Cebrian Carretero, Jose Luis</name>
</author>
<author>
<name>Carrascal Morillo, María Teresa</name>
</author>
<author>
<name>Vincent Fraile, Germán</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11785</id>
<updated>2021-09-06T09:59:00Z</updated>
<summary type="text">Masticatory System Biomechanical Photoelastic Simulation fot the Comparision of the Conventional and Uni-Lock Systems in Mandibular Osteosynthesis
Cebrian Carretero, Jose Luis; Carrascal Morillo, María Teresa; Vincent Fraile, Germán
The biomechanical consequences of the interaction between titanium trauma plates and screws and the fractured mandible are still a matter of investigation. The mathematical and biomechanical models that have been developed show limitations and the experimental studies are not able to reproduce muscle forces and internal stress distributions in the bone-implant interface and mandibular structure. In the present article we show a static simulator of the masticatory system to demonstrate in epoxy resin mandibular models, by means of 3D (three-dimensional) photoelasticity, the stress distribution using different osteosynthesis methods in the mandibular angle fractures. The results showed that the simulator and 3D photoelasticity were a useful method to study interactions between bone and osteosynthesis materials. The “Lock” systems can be considered the most favourable method due to their stress distribution in the epoxy resin mandible. 3D photoelasticity in epoxy resin models is a useful method to evaluate stress distribution for biomechanical studies. Regarding to mandibular osteosynthesis, “lock” plates offer the most favourable stress distribution due to being less aggressive to the bone
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T09:59:00Z
No. of bitstreams: 1
ijimai20174_5_5_pdf_31565.pdf: 1098548 bytes, checksum: 66a87d3f8f0f38c91118b597bc46aa0a (MD5); Made available in DSpace on 2021-09-06T09:59:00Z (GMT). No. of bitstreams: 1
ijimai20174_5_5_pdf_31565.pdf: 1098548 bytes, checksum: 66a87d3f8f0f38c91118b597bc46aa0a (MD5)
</summary>
</entry>
<entry>
<title>Contour Detection of Mammogram Masses Using ChanVese Model and B-Spline Approximation</title>
<link href="https://reunir.unir.net/handle/123456789/11784" rel="alternate"/>
<author>
<name>Youssef, Youssef Ben</name>
</author>
<author>
<name>El Abdelmounim, hassane</name>
</author>
<author>
<name>Lamnii, Abdellah</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11784</id>
<updated>2021-09-06T09:36:20Z</updated>
<summary type="text">Contour Detection of Mammogram Masses Using ChanVese Model and B-Spline Approximation
Youssef, Youssef Ben; El Abdelmounim, hassane; Lamnii, Abdellah
ChanVese model segmentation has been applied for contour detection of mass region in mammogram in our previous work. Available information of the desired object contour is used, in this paper, for B-spline approximation. The mass region boundary (contour) is thereafter approximated by a B-spline curve. This approach allows synthesizing the shape of the suspected mass appearing in the mammogram. Experimental results show the accurateness of mass region contour in mammograms using B-spline approximation.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T09:36:20Z
No. of bitstreams: 1
ijimai20174_5_4_pdf_17629.pdf: 445945 bytes, checksum: f613634a22df96d931dd324f8c843f9a (MD5); Made available in DSpace on 2021-09-06T09:36:20Z (GMT). No. of bitstreams: 1
ijimai20174_5_4_pdf_17629.pdf: 445945 bytes, checksum: f613634a22df96d931dd324f8c843f9a (MD5)
</summary>
</entry>
<entry>
<title>The Combination of Mammography and MRI for Diagnosing Breast Cancer Using Fuzzy NN and SVM</title>
<link href="https://reunir.unir.net/handle/123456789/11783" rel="alternate"/>
<author>
<name>Esmaeilpour, Mansour</name>
</author>
<author>
<name>Gohariyan, Elham</name>
</author>
<author>
<name>Shirmohammadi, Mohammad Mehdi</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11783</id>
<updated>2021-09-06T09:14:10Z</updated>
<summary type="text">The Combination of Mammography and MRI for Diagnosing Breast Cancer Using Fuzzy NN and SVM
Esmaeilpour, Mansour; Gohariyan, Elham; Shirmohammadi, Mohammad Mehdi
Breast cancer is one of the common cancers among women so that early diagnosing of it can effectively help its treatment in this study, considering combination of Mammography and MRI pictures, we will try to recognize glands in existing pictures which identify all around of gland complete and precisely and separate it completely. In this method using artificial intelligence algorithm such as Affine transformation, Gabor filter, neural network, and support vector machine, image analysis will be carried out. The accuracy of proposed method is 98.14. In this work a special framework is presented which simplifies cancer diagnosis. The algorithm of proposed method is tested on z16 images. High speed and lack of human error are the most important factors in proposed intelligent system.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T09:14:10Z
No. of bitstreams: 1
ijimai20174_5_3_pdf_18248.pdf: 963291 bytes, checksum: d0b6e3d2a34a55c062a7031684d754cb (MD5); Made available in DSpace on 2021-09-06T09:14:10Z (GMT). No. of bitstreams: 1
ijimai20174_5_3_pdf_18248.pdf: 963291 bytes, checksum: d0b6e3d2a34a55c062a7031684d754cb (MD5)
</summary>
</entry>
<entry>
<title>Detection of Lung Nodules on Medical Images by the Use of Fractal Segmentation</title>
<link href="https://reunir.unir.net/handle/123456789/11782" rel="alternate"/>
<author>
<name>Rezaie, Afsaneh Abdollahzadeh</name>
</author>
<author>
<name>Habiboghli, Ali</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11782</id>
<updated>2021-09-06T09:01:36Z</updated>
<summary type="text">Detection of Lung Nodules on Medical Images by the Use of Fractal Segmentation
Rezaie, Afsaneh Abdollahzadeh; Habiboghli, Ali
In the present paper, a method for the detection of malignant and benign tumors on the CT scan images has been proposed. In the proposed method, firstly the area of interest in which the tumor may exist is selected on the original image and by the use of image segmentation and determination of the image’s threshold limit, the tumor’s area is specified and then edge detection filters are used for detection of the tumor’s edge. After detection of area and by calculating the fractal dimensions with less percent of errors and better resolution, the areas where contain the tumor are determined. The images used in the proposed method have been extracted from cancer imaging archive database that is made available for public. Compared to other methods, our proposed method recognizes successfully benign and malignant tumors in all cases that have been clinically approved and belong to the database.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T09:01:36Z
No. of bitstreams: 1
ijimai20174_5_2_pdf_65326.pdf: 695612 bytes, checksum: 11006db3211ec94a20264c13bf2a514e (MD5); Made available in DSpace on 2021-09-06T09:01:36Z (GMT). No. of bitstreams: 1
ijimai20174_5_2_pdf_65326.pdf: 695612 bytes, checksum: 11006db3211ec94a20264c13bf2a514e (MD5)
</summary>
</entry>
<entry>
<title>Difusion-Weighted MRI: from Brownian Motion to Head&amp;Neck Tumor Characterization</title>
<link href="https://reunir.unir.net/handle/123456789/11781" rel="alternate"/>
<author>
<name>Utrilla Contreras, Cristina</name>
</author>
<author>
<name>Buitrago Sánchez, Nelson Mauricio</name>
</author>
<author>
<name>Graessner, Joachim</name>
</author>
<author>
<name>García Raya, Pilar</name>
</author>
<author>
<name>Marin Aguilera, Begoña</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11781</id>
<updated>2021-09-06T08:20:12Z</updated>
<summary type="text">Difusion-Weighted MRI: from Brownian Motion to Head&amp;Neck Tumor Characterization
Utrilla Contreras, Cristina; Buitrago Sánchez, Nelson Mauricio; Graessner, Joachim; García Raya, Pilar; Marin Aguilera, Begoña
This paper describes basic physics as well as clinical applications of diffusion-weighted magnetic resonance imaging. This is a technique that provides complementary information to conventional imaging sequences and it is applied in the field of oncologic imaging. This paper focuses on its specific application in head and neck, mainly in cancer patients, for characterization of primary tumors, and also for monitoring and predicting treatment response after chemotherapy or radiation therapy. Last, although diffusion-weighted imaging is shown to add value in several areas by being part of the multi-parametric magnetic resonance imaging approach, there are some unsolved challenges, which are proposed as future work.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T08:20:12Z
No. of bitstreams: 1
ijimai20174_5_1_pdf_76297.pdf: 2676778 bytes, checksum: cf31a69e09ed2ebd24c205d9a6a402cd (MD5); Made available in DSpace on 2021-09-06T08:20:12Z (GMT). No. of bitstreams: 1
ijimai20174_5_1_pdf_76297.pdf: 2676778 bytes, checksum: cf31a69e09ed2ebd24c205d9a6a402cd (MD5)
</summary>
</entry>
<entry>
<title>IJIMAI Editor's Note - Vol. 4 Issue 5</title>
<link href="https://reunir.unir.net/handle/123456789/11780" rel="alternate"/>
<author>
<name>Cebrian Carretero, Jose Luis</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11780</id>
<updated>2021-09-06T07:51:11Z</updated>
<summary type="text">IJIMAI Editor's Note - Vol. 4 Issue 5
Cebrian Carretero, Jose Luis
Although Medicine has always been considered a Health Science, today it is not possible to obviate its relationship with other disciplines as Humanities and Basic Sciences. Doctors from everywhere and everyday work with the most sophisticated technology are trying to make their profession more accurate and precise, taking in consideration, at the same time, the human part of their daily labour. In this volume of the Journal, we will try to explore the relation between different medical specialities, basic science and engineering. In fact, modern Medicine requires the participation of these professionals who are involved with doctors in multidisciplinary teams. In this sense, Medical Engineering, is a new degree that is offered in a vast number of Universities along the world. This relationship between Medicine and Sciences can be found in any medical speciality so that, our aim in this volume, is to show different examples of doctors working together with other scientifics in any area of Medical sciences.The volume consists on twelve papers. Each paper explores a particular area of this multidisciplinary approach.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-06T07:51:11Z
No. of bitstreams: 1
ijimai20174_5_0_pdf_10979.pdf: 107565 bytes, checksum: 734a030c3e6030ccaec14e2a06369738 (MD5); Made available in DSpace on 2021-09-06T07:51:11Z (GMT). No. of bitstreams: 1
ijimai20174_5_0_pdf_10979.pdf: 107565 bytes, checksum: 734a030c3e6030ccaec14e2a06369738 (MD5)
</summary>
</entry>
<entry>
<title>IJIMAI Editor's Note - Vol. 4 Issue 4</title>
<link href="https://reunir.unir.net/handle/123456789/11766" rel="alternate"/>
<author>
<name>González-Crespo, Rubén</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11766</id>
<updated>2021-09-01T09:22:59Z</updated>
<summary type="text">IJIMAI Editor's Note - Vol. 4 Issue 4
González-Crespo, Rubén
The research works presented in this issue are based on various topics of interest, among which are included: Radar Clutter, Radar Detectors Performance, Butterfly Optimization Algorithm, Artificial Bee Colony, Evolutionary strategy, Fractal Coding, User Experience, Handwritten Arabic Character Recognition, Feature Extraction, Embedded Hidden Markov Models, Artificial Immune System, Hopfield Neural Network, Browsers, Multimedia, MoCap and Animations.&#13;
The International Journal of Interactive Multimedia and Artificial Intelligence provides an interdisciplinary forum in which scientists and professionals can share their research results and report new advances on Artificial Intelligence and Interactive Multimedia techniques.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-01T09:22:59Z
No. of bitstreams: 1
ijimai20174_4_0_pdf_21297.pdf: 136392 bytes, checksum: 09a117c5edcf5d5f60455017fdeeb1d0 (MD5); Made available in DSpace on 2021-09-01T09:22:59Z (GMT). No. of bitstreams: 1
ijimai20174_4_0_pdf_21297.pdf: 136392 bytes, checksum: 09a117c5edcf5d5f60455017fdeeb1d0 (MD5)
</summary>
</entry>
<entry>
<title>Electronic Health Record in Bolivia and ICT: A Perspective for Latin America</title>
<link href="https://reunir.unir.net/handle/123456789/11765" rel="alternate"/>
<author>
<name>Gil, Eugenio</name>
</author>
<author>
<name>Medinaceli Díaz, Karina</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11765</id>
<updated>2021-09-01T09:15:09Z</updated>
<summary type="text">Electronic Health Record in Bolivia and ICT: A Perspective for Latin America
Gil, Eugenio; Medinaceli Díaz, Karina
The emergence of new technologies in society through its application to many areas and very diverse realities is a clear element in the time in which we live. The health sector has been unable to escape this reality and has been renovated many of its traditional structures with new options brought by the application of information technology and communication (ICT) in areas such as management and hospital administration. This paper focuses on analyzing from the point of view of medical diagnosis the importance of electronic medical records as a unifying element of the information essential for this type of diagnosis, and the use of artificial intelligence techniques in this field. To this end the current situation of electronic medical records is analyzed in a country like Bolivia exhaustively analyzing three of the most important health centers. Is used for this unstructured interview experts on the subject reflect the current status of electronic medical records from the point of view of protection of the right to privacy of individuals and will serve as a model for development, not only in Bolivia but also in other Latin American countries.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-01T09:15:09Z
No. of bitstreams: 1
ijimai20174_4_12_pdf_10368.pdf: 708446 bytes, checksum: 51063803031283f60fe20acc4d555473 (MD5); Made available in DSpace on 2021-09-01T09:15:09Z (GMT). No. of bitstreams: 1
ijimai20174_4_12_pdf_10368.pdf: 708446 bytes, checksum: 51063803031283f60fe20acc4d555473 (MD5)
</summary>
</entry>
<entry>
<title>Distributed Search Systems with Self-Adaptive Organizational Setups</title>
<link href="https://reunir.unir.net/handle/123456789/11764" rel="alternate"/>
<author>
<name>Wall, Friederike</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11764</id>
<updated>2021-09-01T08:25:43Z</updated>
<summary type="text">Distributed Search Systems with Self-Adaptive Organizational Setups
Wall, Friederike
This paper studies the effects of learning-induced alterations of distributed search systems’ organizations. In particular, scenarios where alterations of the search-systems’ organizational setup are based on a form of reinforcement learning are compared to scenarios where the organizational setup is kept constant and to scenarios where the setup is changed randomly. The results indicate that learning-induced alterations may lead to high levels of performance combined with high levels of efficiency in terms of reorganization-effort. However, the results also suggest that the complexity of the underlying search problem together with the aspiration level (which drives positive or negative reinforcement) considerably shapes the effects of learning.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-01T08:25:43Z
No. of bitstreams: 1
ijimai20174_4_11_pdf_14655.pdf: 2163734 bytes, checksum: 0dd5c562734cd510fab6695a21118aa3 (MD5); Made available in DSpace on 2021-09-01T08:25:43Z (GMT). No. of bitstreams: 1
ijimai20174_4_11_pdf_14655.pdf: 2163734 bytes, checksum: 0dd5c562734cd510fab6695a21118aa3 (MD5)
</summary>
</entry>
<entry>
<title>Simple MoCap System for Home Usage</title>
<link href="https://reunir.unir.net/handle/123456789/11763" rel="alternate"/>
<author>
<name>Magdin, Martin</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11763</id>
<updated>2021-09-01T07:53:56Z</updated>
<summary type="text">Simple MoCap System for Home Usage
Magdin, Martin
Nowadays many MoCap systems exist. Generating 3D facial animation of characters is currently realized by using the motion capture data (MoCap data), which is obtained by tracking the facial markers from an actor/actress. In general it is a professional solution that is sophisticated and costly. This paper presents a solution with a system that is inexpensive. We propose a new easy-to-use system for home usage, through which we are making character animation. In its implementation we paid attention to the elimination of errors from the previous solutions. In this paper the authors describe the method how motion capture characters on a treadmill and as well as an own Java application that processes the video for its further use in Cinema 4D. This paper describes the implementation of this technology of sensing in a way so that the animated character authentically imitated human movement on a treadmill.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-01T07:53:56Z
No. of bitstreams: 1
ijimai20174_4_10_pdf_20085.pdf: 1323395 bytes, checksum: c0b805954cd5d60e06ef1e0d28967eb4 (MD5); Made available in DSpace on 2021-09-01T07:53:56Z (GMT). No. of bitstreams: 1
ijimai20174_4_10_pdf_20085.pdf: 1323395 bytes, checksum: c0b805954cd5d60e06ef1e0d28967eb4 (MD5)
</summary>
</entry>
<entry>
<title>Exploring the Relevance of Search Engines: An Overview of Google as a Case Study</title>
<link href="https://reunir.unir.net/handle/123456789/11762" rel="alternate"/>
<author>
<name>Gaona-García, Paulo Alonso</name>
</author>
<author>
<name>Montenegro-Marin, Carlos Enrique</name>
</author>
<author>
<name>Beltrán-Alfonso, Ricardo</name>
</author>
<author>
<name>Torres-Tautiva, Andres</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11762</id>
<updated>2021-09-02T06:35:39Z</updated>
<summary type="text">Exploring the Relevance of Search Engines: An Overview of Google as a Case Study
Gaona-García, Paulo Alonso; Montenegro-Marin, Carlos Enrique; Beltrán-Alfonso, Ricardo; Torres-Tautiva, Andres
The huge amount of data on the Internet and the diverse list of strategies used to try to link this information with relevant searches through Linked Data have generated a revolution in data treatment and its representation. Nevertheless, the conventional search engines like Google are kept as strategies with good reception to do search processes. The following article presents a study of the development and evolution of search engines, more specifically, to analyze the relevance of findings based on the number of results displayed in paging systems with Google as a case study. Finally, it is intended to contribute to indexing criteria in search results, based on an approach to Semantic Web as a stage in the evolution of the Web.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-01T07:35:15Z
No. of bitstreams: 1
ijimai20174_4_9_pdf_20273.pdf: 997606 bytes, checksum: 45b3ccecea9408667a0fbc3290693e04 (MD5); Made available in DSpace on 2021-09-01T07:35:15Z (GMT). No. of bitstreams: 1
ijimai20174_4_9_pdf_20273.pdf: 997606 bytes, checksum: 45b3ccecea9408667a0fbc3290693e04 (MD5)
</summary>
</entry>
<entry>
<title>Robust Artificial Immune System in the Hopfield network for Maximum k-Satisfiability</title>
<link href="https://reunir.unir.net/handle/123456789/11761" rel="alternate"/>
<author>
<name>Bin Mohd Kasihmuddin, Mohd Shareduwan</name>
</author>
<author>
<name>Bin Mansor, Mohd Asyraf</name>
</author>
<author>
<name>Sathasivam, Saratha</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11761</id>
<updated>2021-09-01T07:26:43Z</updated>
<summary type="text">Robust Artificial Immune System in the Hopfield network for Maximum k-Satisfiability
Bin Mohd Kasihmuddin, Mohd Shareduwan; Bin Mansor, Mohd Asyraf; Sathasivam, Saratha
Artificial Immune System (AIS) algorithm is a novel and vibrant computational paradigm, enthused by the biological immune system. Over the last few years, the artificial immune system has been sprouting to solve numerous computational and combinatorial optimization problems. In this paper, we introduce the restricted MAX-kSAT as a constraint optimization problem that can be solved by a robust computational technique. Hence, we will implement the artificial immune system algorithm incorporated with the Hopfield neural network to solve the restricted MAX-kSAT problem. The proposed paradigm will be compared with the traditional method, Brute force search algorithm integrated with Hopfield neural network. The results demonstrate that the artificial immune system integrated with Hopfield network outperforms the conventional Hopfield network in solving restricted MAX-kSAT. All in all, the result has provided a concrete evidence of the effectiveness of our proposed paradigm to be applied in other constraint optimization problem. The work presented here has many profound implications for future studies to counter the variety of satisfiability problem.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-09-01T07:26:43Z
No. of bitstreams: 1
ijimai20174_4_8_pdf_92087.pdf: 879559 bytes, checksum: 6abe6d4ff7fc8d59886dfd6a78da9047 (MD5); Made available in DSpace on 2021-09-01T07:26:43Z (GMT). No. of bitstreams: 1
ijimai20174_4_8_pdf_92087.pdf: 879559 bytes, checksum: 6abe6d4ff7fc8d59886dfd6a78da9047 (MD5)
</summary>
</entry>
<entry>
<title>A Depth Video-based Human Detection and Activity Recognition using Multi-features and Embedded Hidden Markov Models for Health Care Monitoring Systems</title>
<link href="https://reunir.unir.net/handle/123456789/11756" rel="alternate"/>
<author>
<name>Jalal, Ahmad</name>
</author>
<author>
<name>Kamal, Shaharyar</name>
</author>
<author>
<name>Kim, Daijin</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11756</id>
<updated>2021-08-30T09:57:59Z</updated>
<summary type="text">A Depth Video-based Human Detection and Activity Recognition using Multi-features and Embedded Hidden Markov Models for Health Care Monitoring Systems
Jalal, Ahmad; Kamal, Shaharyar; Kim, Daijin
Increase in number of elderly people who are living independently needs especial care in the form of healthcare monitoring systems. Recent advancements in depth video technologies have made human activity recognition (HAR) realizable for elderly healthcare applications. In this paper, a depth video-based novel method for HAR is presented using robust multi-features and embedded Hidden Markov Models (HMMs) to recognize daily life activities of elderly people living alone in indoor environment such as smart homes. In the proposed HAR framework, initially, depth maps are analyzed by temporal motion identification method to segment human silhouettes from noisy background and compute depth silhouette area for each activity to track human movements in a scene. Several representative features, including invariant, multi-view differentiation and spatiotemporal body joints features were fused together to explore gradient orientation change, intensity differentiation, temporal variation and local motion of specific body parts. Then, these features are processed by the dynamics of their respective class and learned, modeled, trained and recognized with specific embedded HMM having active feature values. Furthermore, we construct a new online human activity dataset by a depth sensor to evaluate the proposed features. Our experiments on three depth datasets demonstrated that the proposed multi-features are efficient and robust over the state of the art features for human action and activity recognition.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-30T09:57:59Z
No. of bitstreams: 1
ijimai20174_4_7_pdf_14110.pdf: 1636117 bytes, checksum: f04c6ead3ff8b03e8a3170838932db5d (MD5); Made available in DSpace on 2021-08-30T09:57:59Z (GMT). No. of bitstreams: 1
ijimai20174_4_7_pdf_14110.pdf: 1636117 bytes, checksum: f04c6ead3ff8b03e8a3170838932db5d (MD5)
</summary>
</entry>
<entry>
<title>Handwritten Character Recognition Based on the Specificity and the Singularity of the Arabic Language</title>
<link href="https://reunir.unir.net/handle/123456789/11755" rel="alternate"/>
<author>
<name>Boulid, Youssef</name>
</author>
<author>
<name>Souhar, Abdelghani</name>
</author>
<author>
<name>Elyoussfi Elkettani, Mohamed</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11755</id>
<updated>2021-08-30T09:40:28Z</updated>
<summary type="text">Handwritten Character Recognition Based on the Specificity and the Singularity of the Arabic Language
Boulid, Youssef; Souhar, Abdelghani; Elyoussfi Elkettani, Mohamed
A good Arabic handwritten recognition system must consider the characteristics of Arabic letters which can be explicit such as the presence of diacritics or implicit such as the baseline information (a virtual line on which cursive text are aligned and/join). In order to find an adequate method of features extraction, we have taken into consideration the nature of the Arabic characters. The paper investigate two methods based on two different visions: one describes the image in terms of the distribution of pixels, and the other describes it in terms of local patterns. Spatial Distribution of Pixels (SDP) is used according to the first vision; whereas Local Binary Patterns (LBP) are used for the second one. Tested on the Arabic portion of the Isolated Farsi Handwritten Character Database (IFHCDB) and using neural networks as a classifier, SDP achieve a recognition rate around 94% while LBP achieve a recognition rate of about 96%.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-30T09:40:28Z
No. of bitstreams: 1
ijimai20174_4_6_pdf_26575.pdf: 2120039 bytes, checksum: 41a5c999103b8f0a5c30c313e02f503a (MD5); Made available in DSpace on 2021-08-30T09:40:28Z (GMT). No. of bitstreams: 1
ijimai20174_4_6_pdf_26575.pdf: 2120039 bytes, checksum: 41a5c999103b8f0a5c30c313e02f503a (MD5)
</summary>
</entry>
<entry>
<title>Construction of a Benchmark for the User Experience Questionnaire (UEQ)</title>
<link href="https://reunir.unir.net/handle/123456789/11754" rel="alternate"/>
<author>
<name>Schrepp, Martin</name>
</author>
<author>
<name>Thomaschewski, Jörg</name>
</author>
<author>
<name>Hinderks, Andreas</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11754</id>
<updated>2023-06-26T09:28:03Z</updated>
<summary type="text">Construction of a Benchmark for the User Experience Questionnaire (UEQ)
Schrepp, Martin; Thomaschewski, Jörg; Hinderks, Andreas
Questionnaires are a cheap and highly efficient tool for achieving a quantitative measure of a product’s user experience (UX). However, it is not always easy to decide, if a questionnaire result can really show whether a product satisfies this quality aspect. So a benchmark is useful. It allows comparing the results of one product to a large set of other products. In this paper we describe a benchmark for the User Experience Questionnaire (UEQ), a widely used evaluation tool for interactive products. We also describe how the benchmark can be applied to the quality assurance process for concrete projects.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-30T08:57:55Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_4_5_pdf_94297.pdf: 816087 bytes, checksum: eb41ed08fbc7ba9cbdd397f9ca996b41 (MD5); Made available in DSpace on 2021-08-30T08:57:55Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_4_5_pdf_94297.pdf: 816087 bytes, checksum: eb41ed08fbc7ba9cbdd397f9ca996b41 (MD5)
</summary>
</entry>
<entry>
<title>Modified Three-Step Search Block Matching Motion Estimation and Weighted Finite Automata based Fractal Video Compression</title>
<link href="https://reunir.unir.net/handle/123456789/11753" rel="alternate"/>
<author>
<name>Kamble, Shailesh</name>
</author>
<author>
<name>Thakur, Nileshsingh</name>
</author>
<author>
<name>Bajaj, Preeti</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11753</id>
<updated>2021-08-30T08:08:59Z</updated>
<summary type="text">Modified Three-Step Search Block Matching Motion Estimation and Weighted Finite Automata based Fractal Video Compression
Kamble, Shailesh; Thakur, Nileshsingh; Bajaj, Preeti
The major challenge with fractal image/video coding technique is that, it requires more encoding time. Therefore, how to reduce the encoding time is the research component remains in the fractal coding. Block matching motion estimation algorithms are used, to reduce the computations performed in the process of encoding. The objective of the proposed work is to develop an approach for video coding using modified three step search (MTSS) block matching algorithm and weighted finite automata (WFA) coding with a specific focus on reducing the encoding time. The MTSS block matching algorithm are used for computing motion vectors between the two frames i.e. displacement of pixels and WFA is used for the coding as it behaves like the Fractal Coding (FC). WFA represents an image (frame or motion compensated prediction error) based on the idea of fractal that the image has self-similarity in itself. The self-similarity is sought from the symmetry of an image, so the encoding algorithm divides an image into multi-levels of quad-tree segmentations and creates an automaton from the sub-images. The proposed MTSS block matching algorithm is based on the combination of rectangular and hexagonal search pattern and compared with the existing New Three-Step Search (NTSS), Three-Step Search (TSS), and Efficient Three-Step Search (ETSS) block matching estimation algorithm. The performance of the proposed MTSS block matching algorithm is evaluated on the basis of performance evaluation parameters i.e. mean absolute difference (MAD) and average search points required per frame. Mean of absolute difference (MAD) distortion function is used as the block distortion measure (BDM). Finally, developed approaches namely, MTSS and WFA, MTSS and FC, and Plane FC (applied on every frame) are compared with each other. The experimentations are carried out on the standard uncompressed video databases, namely, akiyo, bus, mobile, suzie, traffic, football, soccer, ice etc. Developed approaches are compared on the basis of performance evaluation parameters, namely, encoding time, decoding time, compression ratio and Peak Signal to Noise Ratio (PSNR). The video compression using MTSS and WFA coding performs better than MTSS and fractal coding, and frame by frame fractal coding in terms of achieving reduced encoding time and better quality of video.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-30T08:08:58Z
No. of bitstreams: 1
ijimai20174_4_4_pdf_24716.pdf: 2654890 bytes, checksum: 09f25512e539637b268c528d4d25831a (MD5); Made available in DSpace on 2021-08-30T08:08:58Z (GMT). No. of bitstreams: 1
ijimai20174_4_4_pdf_24716.pdf: 2654890 bytes, checksum: 09f25512e539637b268c528d4d25831a (MD5)
</summary>
</entry>
<entry>
<title>A Solution to the N-Queens Problem Using Biogeography-Based Optimization</title>
<link href="https://reunir.unir.net/handle/123456789/11744" rel="alternate"/>
<author>
<name>Habiboghli, Ali</name>
</author>
<author>
<name>Jalali, Tayebeh</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11744</id>
<updated>2021-08-26T12:31:22Z</updated>
<summary type="text">A Solution to the N-Queens Problem Using Biogeography-Based Optimization
Habiboghli, Ali; Jalali, Tayebeh
Biogeography-based Optimization (BBO) is a global optimization algorithm based on population, governed by mathematics of biogeography, and dealing with geographical distribution of biological organisms. The BBO algorithm was used in the present study to provide a solution for the N-queens problem. The performance of the proposed algorithm has been evaluated in terms of the quality of the obtained results, cost function, and execution time. Furthermore, the results of this algorithm were compared against those of genetic and particle swarm algorithms.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-26T12:31:22Z
No. of bitstreams: 1
ijimai20174_4_3_pdf_22761.pdf: 865721 bytes, checksum: 2e7b7ce8732b9d0b13050789489be65f (MD5); Made available in DSpace on 2021-08-26T12:31:22Z (GMT). No. of bitstreams: 1
ijimai20174_4_3_pdf_22761.pdf: 865721 bytes, checksum: 2e7b7ce8732b9d0b13050789489be65f (MD5)
</summary>
</entry>
<entry>
<title>An Effective Hybrid Butterfly Optimization Algorithm with Artificial Bee Colony for Numerical Optimization</title>
<link href="https://reunir.unir.net/handle/123456789/11743" rel="alternate"/>
<author>
<name>Arora, Sankalap</name>
</author>
<author>
<name>Singh, Satvir</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11743</id>
<updated>2021-09-02T06:37:46Z</updated>
<summary type="text">An Effective Hybrid Butterfly Optimization Algorithm with Artificial Bee Colony for Numerical Optimization
Arora, Sankalap; Singh, Satvir
In this paper, a new hybrid optimization algorithm&#13;
which combines the standard Butterfly Optimization Algorithm&#13;
(BOA) with Artificial Bee Colony (ABC) algorithm is proposed.&#13;
The proposed algorithm used the advantages of both the algorithms&#13;
in order to balance the trade-off between exploration and&#13;
exploitation. Experiments have been conducted on the proposed&#13;
algorithm using ten benchmark problems having a broad range&#13;
of dimensions and diverse complexities. The simulation results&#13;
demonstrate that the convergence speed and accuracy of the&#13;
proposed algorithm in finding optimal solutions is significantly&#13;
better than BOA and ABC.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-26T12:09:10Z
No. of bitstreams: 1
ijimai20174_4_2_pdf_16914.pdf: 1855596 bytes, checksum: 61f04bbd0ce67d809c13ab724dc52518 (MD5); Made available in DSpace on 2021-08-26T12:09:10Z (GMT). No. of bitstreams: 1
ijimai20174_4_2_pdf_16914.pdf: 1855596 bytes, checksum: 61f04bbd0ce67d809c13ab724dc52518 (MD5)
</summary>
</entry>
<entry>
<title>CA-CFAR Adjustment Factor Correction with a priori Knowledge of the Clutter Distribution Shape Parameter</title>
<link href="https://reunir.unir.net/handle/123456789/11742" rel="alternate"/>
<author>
<name>Machado-Fernández, José Raúl</name>
</author>
<author>
<name>Bacallao-Vidal, Jesús Concepción</name>
</author>
<author>
<name>Torres Martinez, Shirley</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11742</id>
<updated>2021-08-26T11:59:27Z</updated>
<summary type="text">CA-CFAR Adjustment Factor Correction with a priori Knowledge of the Clutter Distribution Shape Parameter
Machado-Fernández, José Raúl; Bacallao-Vidal, Jesús Concepción; Torres Martinez, Shirley
Oceanic and coastal radars operation is affected because the targets information is received mixed with and undesired contribution called sea clutter. Specifically, the popular CA-CFAR processor is incapable of maintaining its design false alarm probability when facing clutter with statistical variations. In opposition to the classic alternative suggesting the use of a fixed adjustment factor, the authors propose a modification of the CA- CFAR scheme where the factor is constantly corrected according on the background signal statistical changes. Mathematically translated as a variation in the shape parameter of the clutter distribution, the background signal changes were simulated through the Weibull, Log-Normal and K distributions, deriving expressions which allow choosing an appropriate factor for each possible statistical state. The investigation contributes to the improvement of radar detection by suggesting the application of an adaptive scheme which assumes the clutter shape parameter is known a priori. The offered mathematical expressions are valid for three false alarm probabilities and several windows sizes, covering also a wide range of clutter conditions.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-26T11:59:27Z
No. of bitstreams: 1
ijimai20174_4_1_pdf_69507.pdf: 957739 bytes, checksum: 13c49f7fe5ae6e09039492fe600bbbd6 (MD5); Made available in DSpace on 2021-08-26T11:59:27Z (GMT). No. of bitstreams: 1
ijimai20174_4_1_pdf_69507.pdf: 957739 bytes, checksum: 13c49f7fe5ae6e09039492fe600bbbd6 (MD5)
</summary>
</entry>
<entry>
<title>Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing</title>
<link href="https://reunir.unir.net/handle/123456789/11735" rel="alternate"/>
<author>
<name>Saidi, Abdelali</name>
</author>
<author>
<name>Bendriss, Elmehdi</name>
</author>
<author>
<name>Kartit, Ali</name>
</author>
<author>
<name>El Marraki, Mohamed</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11735</id>
<updated>2021-08-25T11:28:39Z</updated>
<summary type="text">Techniques to Detect DoS and DDoS Attacks and an Introduction of a Mobile Agent System to Enhance it in Cloud Computing
Saidi, Abdelali; Bendriss, Elmehdi; Kartit, Ali; El Marraki, Mohamed
Security in cloud computing is the ultimate question that every potential user studies before adopting it. Among the important points that the provider must ensure is that the Cloud will be available anytime the consumer tries to access it. Generally, the Cloud is accessible via the Internet, what makes it subject to a large variety of attacks. Today, the most striking cyber-attacks are the flooding DoS and its variant DDoS. This type of attacks aims to break down the availability of a service to its legitimate clients. In this paper, we underline the most used techniques to stand up against DoS flooading attacks in the Cloud.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T11:28:39Z
No. of bitstreams: 1
ijimai20174_3_12_pdf_18434.pdf: 424695 bytes, checksum: 80619174bcf2b426a578ebe1cea358e9 (MD5); Made available in DSpace on 2021-08-25T11:28:39Z (GMT). No. of bitstreams: 1
ijimai20174_3_12_pdf_18434.pdf: 424695 bytes, checksum: 80619174bcf2b426a578ebe1cea358e9 (MD5)
</summary>
</entry>
<entry>
<title>Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment</title>
<link href="https://reunir.unir.net/handle/123456789/11734" rel="alternate"/>
<author>
<name>Toumi, Hicham</name>
</author>
<author>
<name>Marzak, Bouchra</name>
</author>
<author>
<name>Talea, Amal</name>
</author>
<author>
<name>Eddaoui, Ahmed</name>
</author>
<author>
<name>Talea, Mohamed</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11734</id>
<updated>2021-08-25T11:03:57Z</updated>
<summary type="text">Use Trust Management Framework to Achieve Effective Security Mechanisms in Cloud Environment
Toumi, Hicham; Marzak, Bouchra; Talea, Amal; Eddaoui, Ahmed; Talea, Mohamed
Cloud Computing is an Internet based Computing where virtual shared servers provide software, infrastructure, platform and other resources to the customer on pay-as-you-use basis. Cloud Computing is increasingly becoming popular as many enterprise applications and data are moving into cloud platforms. However, with the enormous use of Cloud, the probability of occurring intrusion also increases. There is a major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To address this issue, a security solution is proposed in this paper. We provide a collaborative framework between our Hybrid Intrusion Detection System (Hy-IDS) based on Mobile Agents and virtual firewalls. Therefore, our hybrid intrusion detection system consists of three types of IDS namely IDS-C, IDS-Cr and IDS-M, which are dispatched over three layer of cloud computing. In the first layer, we use IDS-C over our framework to collect, analyze and detect malicious data using Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures using IDS-Cr, which is based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). Finally, through an IDS-M placed in the third layer, the new signatures will be used to update the database NIDS belonging to IDS-Cr, then the database to NIDS belonging of IDS-Cr the cluster neighboring and also their IDS-C. Hardware firewall is unable to control communication between virtual machines on the same hypervisor. Moreover, they are blind to virtual traffic. Mostly, they are deployed at Virtual Machine Monitor- level (VMM) under Cloud provider’s control. Equally, the mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. With this technique, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. By this type of close-loop control, the collaborative network security management framework can identify and address new distributed attacks more quickly and effectively.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T11:03:57Z
No. of bitstreams: 1
ijimai20174_3_11_pdf_15245.pdf: 582327 bytes, checksum: 455f95d6419a11d6f17fbdc31c3ac6e3 (MD5); Made available in DSpace on 2021-08-25T11:03:57Z (GMT). No. of bitstreams: 1
ijimai20174_3_11_pdf_15245.pdf: 582327 bytes, checksum: 455f95d6419a11d6f17fbdc31c3ac6e3 (MD5)
</summary>
</entry>
<entry>
<title>A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers</title>
<link href="https://reunir.unir.net/handle/123456789/11733" rel="alternate"/>
<author>
<name>Talbi, Jamal</name>
</author>
<author>
<name>Haqiq, Abdelkrim</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11733</id>
<updated>2021-08-25T10:45:34Z</updated>
<summary type="text">A MAS-Based Cloud Service Brokering System to Respond Security Needs of Cloud Customers
Talbi, Jamal; Haqiq, Abdelkrim
Cloud computing is becoming a key factor in computer science and an important technology for many organizations to deliver different types of services. The companies which provide services to customers are called as cloud service providers. The cloud users (CUs) increase and require secure, reliable and trustworthy cloud service providers (CSPs) from the market. So, it’s a challenge for a new customer to choose the highly secure provider. This paper presents a cloud service brokering system in order to analyze and rank the secured cloud service provider among the available providers list. This model uses an autonomous and flexible agent in multi-agent system (MASs) that have an intelligent behavior and suitable tools for helping the brokering system to assess the security risks for the group of cloud providers which make decision of the more secured provider and justify the business needs of users in terms of security and reliability.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T10:45:34Z
No. of bitstreams: 1
ijimai20174_3_10_pdf_18425.pdf: 514212 bytes, checksum: d119adcda0e3154776289465b4abf421 (MD5); Made available in DSpace on 2021-08-25T10:45:34Z (GMT). No. of bitstreams: 1
ijimai20174_3_10_pdf_18425.pdf: 514212 bytes, checksum: d119adcda0e3154776289465b4abf421 (MD5)
</summary>
</entry>
<entry>
<title>Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems</title>
<link href="https://reunir.unir.net/handle/123456789/11732" rel="alternate"/>
<author>
<name>Achbarou, Omar</name>
</author>
<author>
<name>El kiram, My Ahmed</name>
</author>
<author>
<name>El Bouanani, Salim</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11732</id>
<updated>2021-08-25T10:26:57Z</updated>
<summary type="text">Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems
Achbarou, Omar; El kiram, My Ahmed; El Bouanani, Salim
Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T10:26:57Z
No. of bitstreams: 1
ijimai20174_3_9_pdf_60303.pdf: 695166 bytes, checksum: 410cca118f02b28b0ed757db4843a535 (MD5); Made available in DSpace on 2021-08-25T10:26:57Z (GMT). No. of bitstreams: 1
ijimai20174_3_9_pdf_60303.pdf: 695166 bytes, checksum: 410cca118f02b28b0ed757db4843a535 (MD5)
</summary>
</entry>
<entry>
<title>Analysis of Security Mechanisms Based on Clusters IoT Environments</title>
<link href="https://reunir.unir.net/handle/123456789/11731" rel="alternate"/>
<author>
<name>Montenegro-Marin, Carlos Enrique</name>
</author>
<author>
<name>Gaona-García, Paulo Alonso</name>
</author>
<author>
<name>Prieto, Juan David</name>
</author>
<author>
<name>Nieto Acevedo, Yuri Vanessa</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11731</id>
<updated>2021-08-25T08:59:45Z</updated>
<summary type="text">Analysis of Security Mechanisms Based on Clusters IoT Environments
Montenegro-Marin, Carlos Enrique; Gaona-García, Paulo Alonso; Prieto, Juan David; Nieto Acevedo, Yuri Vanessa
Internet of things is based on sensors, communication networks and intelligence that manages the entire process and the generated data. Sensors are the senses of systems, because of this, they can be used in large quantities. Sensors must have low power consumption and cost, small size and great flexibility for its use in all circumstances. Therefore, the security of these network devices, data sensors and other devices, is a major concern as it grows rapidly in terms of nodes interconnected via sensor data. This paper presents an analysis from a systematic review point of view of articles on Internet of Things (IoT), security aspects specifically at privacy level and control access in this type of environment. Finally, it presents an analysis of security issues that must be addressed, from different clusters and identified areas within the fields of application of this technology.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-25T08:59:45Z
No. of bitstreams: 1
ijimai20174_3_8_pdf_20224.pdf: 545586 bytes, checksum: e893e697bb6a2e05e4455d1da03f0c68 (MD5); Made available in DSpace on 2021-08-25T08:59:45Z (GMT). No. of bitstreams: 1
ijimai20174_3_8_pdf_20224.pdf: 545586 bytes, checksum: e893e697bb6a2e05e4455d1da03f0c68 (MD5)
</summary>
</entry>
<entry>
<title>Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems</title>
<link href="https://reunir.unir.net/handle/123456789/11719" rel="alternate"/>
<author>
<name>Pan, Yao</name>
</author>
<author>
<name>White, Jules</name>
</author>
<author>
<name>Schmidt, Douglas</name>
</author>
<author>
<name>Elhabashy, Ahmad</name>
</author>
<author>
<name>Sturm, Logan</name>
</author>
<author>
<name>Camelio, Jaime</name>
</author>
<author>
<name>Williams, Christopher</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11719</id>
<updated>2021-08-19T12:36:05Z</updated>
<summary type="text">Taxonomies for Reasoning About Cyber-physical Attacks in IoT-based Manufacturing Systems
Pan, Yao; White, Jules; Schmidt, Douglas; Elhabashy, Ahmad; Sturm, Logan; Camelio, Jaime; Williams, Christopher
The Internet of Things (IoT) has transformed many aspects of modern manufacturing, from design to production to quality control. In particular, IoT and digital manufacturing technologies have substantially accelerated product development- cycles and manufacturers can now create products of a complexity and precision not heretofore possible. New threats to supply chain security have arisen from connecting machines to the Internet and introducing complex IoT-based systems controlling manufacturing processes. By attacking these IoT-based manufacturing systems and tampering with digital files, attackers can manipulate physical characteristics of parts and change the dimensions, shapes, or mechanical properties of the parts, which can result in parts that fail in the field. These defects increase manufacturing costs and allow silent problems to occur only under certain loads that can threaten safety and/or lives. To understand potential dangers and protect manufacturing system safety, this paper presents two taxonomies: one for classifying cyber-physical attacks against manufacturing processes and another for quality control measures for counteracting these attacks. We systematically identify and classify possible cyber-physical attacks and connect the attacks with variations in manufacturing processes and quality control measures. Our taxonomies also provide a scheme for linking emerging IoT-based manufacturing system vulnerabilities to possible attacks and quality control measures.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T12:36:05Z
No. of bitstreams: 1
ijimai20174_3_7_pdf_53997.pdf: 2228524 bytes, checksum: a307ab650960548be2a91cb5462ecf59 (MD5); Made available in DSpace on 2021-08-19T12:36:05Z (GMT). No. of bitstreams: 1
ijimai20174_3_7_pdf_53997.pdf: 2228524 bytes, checksum: a307ab650960548be2a91cb5462ecf59 (MD5)
</summary>
</entry>
<entry>
<title>Migrating C/C++ Software to Mobile Platforms in the ADM Context</title>
<link href="https://reunir.unir.net/handle/123456789/11718" rel="alternate"/>
<author>
<name>Martinez, Liliana</name>
</author>
<author>
<name>Pereira, Claudia</name>
</author>
<author>
<name>Favre, Liliana</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11718</id>
<updated>2021-08-19T12:00:49Z</updated>
<summary type="text">Migrating C/C++ Software to Mobile Platforms in the ADM Context
Martinez, Liliana; Pereira, Claudia; Favre, Liliana
Software technology is constantly evolving and therefore the development of applications requires adapting software components and applications in order to be aligned to new paradigms such as Pervasive Computing, Cloud Computing and Internet of Things. In particular, many desktop software components need to be migrated to mobile technologies. This migration faces many challenges due to the proliferation of different mobile platforms. Developers usually make applications tailored for each type of device expending time and effort. As a result, new programming languages are emerging to integrate the native behaviors of the different platforms targeted in development projects. In this direction, the Haxe language allows writing mobile applications that target all major mobile platforms. Novel technical frameworks for information integration and tool interoperability such as Architecture-Driven Modernization (ADM) proposed by the Object Management Group (OMG) can help to manage a huge diversity of mobile technologies. The Architecture-Driven Modernization Task Force (ADMTF) was formed to create specifications and promote industry consensus on the modernization of existing applications. In this work, we propose a migration process from C/C++ software to different mobile platforms that integrates ADM standards with Haxe. We exemplify the different steps of the process with a simple case study, the migration of “the Set of Mandelbrot” C++ application. The proposal was validated in Eclipse Modeling Framework considering that some of its tools and run-time environments are aligned with ADM standards.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T12:00:49Z
No. of bitstreams: 1
ijimai20174_3_6_pdf_64266.pdf: 1297721 bytes, checksum: 160f133fe6d0512742abe6ea1479d3dc (MD5); Made available in DSpace on 2021-08-19T12:00:49Z (GMT). No. of bitstreams: 1
ijimai20174_3_6_pdf_64266.pdf: 1297721 bytes, checksum: 160f133fe6d0512742abe6ea1479d3dc (MD5)
</summary>
</entry>
<entry>
<title>Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT</title>
<link href="https://reunir.unir.net/handle/123456789/11717" rel="alternate"/>
<author>
<name>Solanki, Vijender Kumar</name>
</author>
<author>
<name>Venkaesan, M</name>
</author>
<author>
<name>Katiyar, Somesh</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11717</id>
<updated>2021-08-19T11:27:41Z</updated>
<summary type="text">Conceptual Model for Smart Cities: Irrigation and Highway Lamps using IoT
Solanki, Vijender Kumar; Venkaesan, M; Katiyar, Somesh
Keeping in mind the need to preserve energy as well as utilize the available at its best the need was felt to develop a module that would be able to sort out the problem where resources such as water and electricity were wasted, in urban as well as rural area. Resource (electricity) was wasted as beside the point operation of Highway &amp; High Mast Lamp; while wastage of water followed by improper trends and methodologies imparted for watering of city park, road side plantation and highway plantation. Thus as per Energy survey statistics of a City (Lucknow, India) it was found that major portion of resources (water and electricity) were being wasted due to negligent activities of officials who were in charge of resource management. So to facilitate energy saving trends and to completely modernize it to autonomous system, module below is proposed which incorporates modern technological peripheral and has its base ingrained in IoT (Internet of Things) which when put into consideration would result in large scale resource and energy saving.This developed module incorporates the peripherals such as Arduino, Texas Instruments ultra low power kits etc. in accordance with software technology including Lab View which help to monitor as well as control the various operation from the base station, located far away from the site. Lab View Interface interacts with all the module located at various city parks, subways and highway lighting modules. Later below in several section a detailed pattern and application frame has been put up.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T11:27:41Z
No. of bitstreams: 1
ijimai20174_3_5_pdf_17263.pdf: 754383 bytes, checksum: dc63671370052c38dc8d0b3dc17dcd25 (MD5); Made available in DSpace on 2021-08-19T11:27:41Z (GMT). No. of bitstreams: 1
ijimai20174_3_5_pdf_17263.pdf: 754383 bytes, checksum: dc63671370052c38dc8d0b3dc17dcd25 (MD5)
</summary>
</entry>
<entry>
<title>Performance Evaluation of AODV Routing Protocol in VANET with NS2</title>
<link href="https://reunir.unir.net/handle/123456789/11716" rel="alternate"/>
<author>
<name>Rathi, Divya</name>
</author>
<author>
<name>Welekar, Rashmi</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11716</id>
<updated>2021-08-19T10:46:54Z</updated>
<summary type="text">Performance Evaluation of AODV Routing Protocol in VANET with NS2
Rathi, Divya; Welekar, Rashmi
In intelligent transportation systems, the collaboration between vehicles and the road side units is essential to bring these systems to realization. The emerging Vehicular Ad Hoc Network (VANET) is becoming more and more important as it provides intelligent transportation application, comfort, safety, entertainment for people in vehicles. In order to provide stable routes and to get good performance in VANET, there is a need of proper routing protocols must be designed. In this paper, we are working with the very well-known ad-hoc on-demand distance vector (AODV) routing protocol. The existing Routing protocol AODV-L which is based on the Link expiration time is extended to propose a more reliable AODV-AD which is based on multichannel MAC protocol. For the performance evaluation of routing protocols, a simulation tool ‘NS2’ has been used. Simulation results show that the proposed AODV-AD protocol can achieves better performances in forms of high Route stability, Packet Delivery ratio and packet loss rate than traditional AODV-L and traditional AODV.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T10:46:54Z
No. of bitstreams: 1
ijimai20174_3_4_pdf_60277.pdf: 644997 bytes, checksum: e03050ebe8ba07cdbd9fda3b09d3ae21 (MD5); Made available in DSpace on 2021-08-19T10:46:54Z (GMT). No. of bitstreams: 1
ijimai20174_3_4_pdf_60277.pdf: 644997 bytes, checksum: e03050ebe8ba07cdbd9fda3b09d3ae21 (MD5)
</summary>
</entry>
<entry>
<title>An IoT Based Predictive Connected Car Maintenance Approach</title>
<link href="https://reunir.unir.net/handle/123456789/11715" rel="alternate"/>
<author>
<name>Solanki, Vijender Kumar</name>
</author>
<author>
<name>Dhall, Rohit</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11715</id>
<updated>2021-08-19T09:39:38Z</updated>
<summary type="text">An IoT Based Predictive Connected Car Maintenance Approach
Solanki, Vijender Kumar; Dhall, Rohit
Internet of Things (IoT) is fast emerging and becoming an almost basic necessity in general life. The concepts of using technology in our daily life is not new, but with the advancements in technology, the impact of technology in daily activities of a person can be seen in almost all the aspects of life. Today, all aspects of our daily life, be it health of a person, his location, movement, etc. can be monitored and analyzed using information captured from various connected devices. This paper discusses one such use case, which can be implemented by the automobile industry, using technological advancements in the areas of IoT and Analytics. ‘Connected Car’ is a terminology, often associated with cars and other passenger vehicles, which are capable of internet connectivity and sharing of various kinds of data with backend applications. The data being shared can be about the location and speed of the car, status of various parts/lubricants of the car, and if the car needs urgent service or not. Once data are transmitted to the backend services, various workflows can be created to take necessary actions, e.g. scheduling a service with the car service provider, or if large numbers of care are in the same location, then the traffic management system can take necessary action. ’Connected cars’ can also communicate with each other, and can send alerts to each other in certain scenarios like possible crash etc. This paper talks about how the concept of ‘connected cars’ can be used to perform ‘predictive car maintenance’. It also discusses how certain technology components, i.e., Eclipse Mosquito and Eclipse Paho can be used to implement a predictive connected car use case.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T09:39:38Z
No. of bitstreams: 1
ijimai20174_3_3_pdf_12469.pdf: 1749944 bytes, checksum: a97a1cce138bc42de1309c519b43184a (MD5); Made available in DSpace on 2021-08-19T09:39:38Z (GMT). No. of bitstreams: 1
ijimai20174_3_3_pdf_12469.pdf: 1749944 bytes, checksum: a97a1cce138bc42de1309c519b43184a (MD5)
</summary>
</entry>
<entry>
<title>An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network</title>
<link href="https://reunir.unir.net/handle/123456789/11714" rel="alternate"/>
<author>
<name>Punetha, Deepak</name>
</author>
<author>
<name>Bahuguna, Yogita</name>
</author>
<author>
<name>Verma, Pooja</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11714</id>
<updated>2021-08-19T09:33:38Z</updated>
<summary type="text">An analytic Study of the Key Factors Influencing the Design and Routing Techniques of a Wireless Sensor Network
Punetha, Deepak; Bahuguna, Yogita; Verma, Pooja
A wireless sensor network contains various nodes having certain sensing, processing &amp; communication capabilities. Actually they are multifunctional battery operated nodes called motes. These motes are small in size &amp; battery constrained. They are operated by a power source. A wireless sensor network consists of a huge number of tiny sensor nodes which are deployed either randomly or according to some predefined distribution. The sensors nodes in a sensor network are cooperative among themselves having self-organizing ability. This ensures that a wireless network serves a wide variety of applications. Few of them are weather monitoring, health, security &amp; military etc. As their applications are wide, this requires that sensors in a sensor network must play their role very efficiently. But, as discussed above, the sensor nodes have energy limitation. This limitation leads failure of nodes after certain round of communication. So, a sensor network suffers with sensors having energy limitations. Beside this, sensor nodes in a sensor network must fulfill connectivity &amp; coverage requirements. In this paper, we have discussed various issues affecting the design of a wireless sensor network. This provides the readers various research issues in designing a wireless sensor network.
Submitted by Susana Figueroa Navarro (susana.figueroa.n@unir.net) on 2021-08-19T09:33:38Z
No. of bitstreams: 1
ijimai20174_3_2_pdf_19641.pdf: 685669 bytes, checksum: 4ae65293a62857a1617c571a1d0c374a (MD5); Made available in DSpace on 2021-08-19T09:33:38Z (GMT). No. of bitstreams: 1
ijimai20174_3_2_pdf_19641.pdf: 685669 bytes, checksum: 4ae65293a62857a1617c571a1d0c374a (MD5)
</summary>
</entry>
<entry>
<title>A review about Smart Objects, Sensors, and Actuators</title>
<link href="https://reunir.unir.net/handle/123456789/11713" rel="alternate"/>
<author>
<name>González García, Cristian</name>
</author>
<author>
<name>Meana-Llorián, Daniel</name>
</author>
<author>
<name>Pelayo García-Bustelo, B. Cristina</name>
</author>
<author>
<name>Cueva-Lovelle, Juan Manuel</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11713</id>
<updated>2023-11-02T12:22:21Z</updated>
<summary type="text">A review about Smart Objects, Sensors, and Actuators
González García, Cristian; Meana-Llorián, Daniel; Pelayo García-Bustelo, B. Cristina; Cueva-Lovelle, Juan Manuel
Smart Objects and the Internet of Things are two ideas which describe the future, walk together, and complement each other. Thus, the interconnection among objects can make them more intelligent or expand their intelligence to unsuspected limits. This could be achieved with a new network that interconnects each object around the world. However, to achieve this goal, the objects need a network that supports heterogeneous and ubiquitous objects, a network where exists more traffic among objects than among humans, but supporting for both types. For these reasons, both concepts are very close. Cities, houses, cars, machines, or any another object that can sense, respond, work, or make easier the lives of their owner. This is a part of the future, an immediate future. Notwithstanding, first of all, there are to resolve a series of problems. The most important problem is the heterogeneity of objects. This article is going to show a theoretical frame and the related work about Smart Object. The article will explain what are Smart Objects, doing emphasis in their difference with Not- Smart Objects. After, we will present one of the different object classification system, in our opinion, the most complete.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2021-08-19T08:39:57Z&#13;
No. of bitstreams: 1&#13;
ijimai20174_3_1_pdf_15525.pdf: 429222 bytes, checksum: 17a5ecca66ee772722b067a54ca1dcf9 (MD5); Made available in DSpace on 2021-08-19T08:39:57Z (GMT). No. of bitstreams: 1&#13;
ijimai20174_3_1_pdf_15525.pdf: 429222 bytes, checksum: 17a5ecca66ee772722b067a54ca1dcf9 (MD5)
</summary>
</entry>
<entry>
<title>IJIMAI Editor's Note - Vol. 4 Issue 3</title>
<link href="https://reunir.unir.net/handle/123456789/11712" rel="alternate"/>
<author>
<name>García-Díaz, Vicente</name>
</author>
<id>https://reunir.unir.net/handle/123456789/11712</id>
<updated>2021-08-19T08:13:18Z</updated>
<summary type="text">IJIMAI Editor's Note - Vol. 4 Issue 3
García-Díaz, Vicente
The Internet of Things is the networks of physical devices, embedded with electronics, software, sensors, actuators and security and connectivity mechanisms that enables them to collect and exchange data. It is a very important research topic nowadays in which many scientific papers are focusing on its bases.&#13;
This Special Issue tries to show some of the latest researches related to IoT with special emphasis on the basic components of IoT, some of the major applications in which researchers and practitioners are working and especially in aspects related to security, one of the main areas of research related to IoT, with a special emphasis on cloud-based systems. Next, I present a summary of the works that are included in this special issue.
Submitted by Administrador Re-UNIR Re-UNIR (reunir@unir.net) on 2021-08-19T08:13:17Z
No. of bitstreams: 1
ijimai20174_3_0_pdf_20281.pdf: 129462 bytes, checksum: ce7330eed4a1912a329674ddbe406445 (MD5); Made available in DSpace on 2021-08-19T08:13:17Z (GMT). No. of bitstreams: 1
ijimai20174_3_0_pdf_20281.pdf: 129462 bytes, checksum: ce7330eed4a1912a329674ddbe406445 (MD5)
</summary>
</entry>
</feed>
