Open Access. Powered by Scholars. Published by Universities.®

Systems and Communications Commons

Open Access. Powered by Scholars. Published by Universities.®

2,300 Full-Text Articles 3,313 Authors 1,139,168 Downloads 99 Institutions

All Articles in Systems and Communications

Faceted Search

2,300 full-text articles. Page 3 of 100.

Comparative Analysis Of Pvm And Mpi For The Development Of Physical Applications In Parallel And Distributed Systems, SRIKANTH. BETHU 2022 Department of Computer Science and Engineering, Holy Mary Institute of Technology and Science, Hyderabad, India

Comparative Analysis Of Pvm And Mpi For The Development Of Physical Applications In Parallel And Distributed Systems, Srikanth. Bethu

International Journal of Communication Networks and Security

This research is aimed to explore each of these two Parallel Virtual Machine (PVM) and Message Passing Interface(MPI) vehicles for DPP (Distributed Parallel Processing) considering capability, ease of use, and availability, and compares their distinguishing features and also explores programmer interface and their utilization for solving real world parallel processing applications. This work recommends a potential research issue, that is, to study the feasibility of creating a programming environment that allows access to the virtual machine features of PVM and the message passing features of MPI. PVM and MPI, two systems for programming clusters, are often compared. Each system ...


Extracting Accurate Data From Multiple Conflicting Information On Web Sources, AKSHATA ANGADI, KARUNA GULL, PADMASHRI DESAI 2022 Computer Science and Engineering Department, K.L.E.I.T.,India

Extracting Accurate Data From Multiple Conflicting Information On Web Sources, Akshata Angadi, Karuna Gull, Padmashri Desai

International Journal of Communication Networks and Security

For The World-Wide Web has become the most important information source for most of us. As different websites often provide conflicting information there is no guarantee for the correctness of the data. Among multiple conflict results, can we automatically identify which one is likely the true fact?, In this paper our experiments show that Fact finder, a supporter for user to resolve the problem, successfully finds true facts among conflicting information, and identifies Trust worthy websites better than the popular search engines. In our paper we give ratings based on two things- popularity or the hits & number of occurrences of ...


New Dynamic Query Optimization Technique In Relational Database Management Systems, N. SATYANARAYANA, SK. SHARFUDDIN, SK.JAN BHASHA 2022 Dept CSE/IT LITS Khammam, A. P INDIA.

New Dynamic Query Optimization Technique In Relational Database Management Systems, N. Satyanarayana, Sk. Sharfuddin, Sk.Jan Bhasha

International Journal of Communication Networks and Security

Query optimizer is an important component in the architecture of relational data base management system. This component is responsible for translating user submitted query into an efficient query evolution program which can be executed against the database. The present query evolution existing algorithm tries to find the best possible plan to execute a query with a minimum amount of time using mostly semi accurate statistical information (e.g. sizes of temporary relations, selectivity factors, and availability of resources). It is a static approach for generating optimal or close to optimal execution plan. Which in turn increases the execution cost of ...


Advanced Embedded Wireless Robot With Motion Detection System And Live Video / Audio Transmission, MA. WAJEED, K. VARUN KUMAR 2022 Sarada institute of technology &science, Khammam

Advanced Embedded Wireless Robot With Motion Detection System And Live Video / Audio Transmission, Ma. Wajeed, K. Varun Kumar

International Journal of Communication Networks and Security

This paper is to design and develop an intelligence robot to detect dangerous Gas/Smoke by using an 8 bit microcontroller. In our project the robot is designed to move automatically. The robot acts according to the command given by the program. It will move all the direction like forward, reverse, right and left. The Smoke sensing unit is available in robot mechanism. If particular Smoke is detected, robot will switch ON the Alarm Unit. The video and audio are monitored at the control unit. For transmitting audio and video, RF camera has been used.


Development Of Scada Like Application Using Arduino With .Net Interface, RITIKA RAJ, S.A. ANNADATE 2022 Department of Electronics & Communication Engg., MGM’s Jawaharlal Nehru Engineering College, Dr.BAMU, Aurangabad(MS), India

Development Of Scada Like Application Using Arduino With .Net Interface, Ritika Raj, S.A. Annadate

International Journal of Communication Networks and Security

Nowadays SCADA systems are used for Home automation, Greenhouse automation, E-agriculture etc. Basically these SCADA applications include Level Monitoring, Light & Climate Control, Security & Surveillance, control and manage spatially separated utility sites and Control of Shutters & Doors and so on. With the arrival of new hardware and software technologies here a system is proposed which can perform the similar SCADA applications at lower cost and lower maintenances. This paper proposes a viable solution for SCADA like applications which include Water level monitoring, Oil level monitoring & Displacement control by using a microcontroller board and .NET interfacing. This system can not only perform ...


A Study Of Advanced Encryption Tools For Data Security, SHRIKANT G. JADHAV, GURUPRASAD B. CHOUNSTE 2022 Department of computer science, Yeshwant Mahavidyalaya, Nanded, Maharashtra, India

A Study Of Advanced Encryption Tools For Data Security, Shrikant G. Jadhav, Guruprasad B. Chounste

International Journal of Communication Networks and Security

With the rapid growth and uses of internet, the task of protection of data and information is become a key challenge to the user as well as security experts. In the era of e-commerce, online shopping, online banking information security is a vital issue. Information may be hacked, stolen and misused. To overcome these issues, encryption tools can be useful. Wide range for encryption tools are available that provide the facilities to the user to secure the information. This paper highlights some of these tools with their features.


Color Image Quantization Using Gdbscan, KUMAR RAHUL, SUMAN KUMAR BHATTACHARYA, ROHIT AGRAWAL 2022 Computer Science and Engineering Department, Indian School of Mines, Dhanbad, Jharkhand-826004, India

Color Image Quantization Using Gdbscan, Kumar Rahul, Suman Kumar Bhattacharya, Rohit Agrawal

International Journal of Communication Networks and Security

Color image quantization is the most widely used techniques in the field of image compression. DBSCAN is a density based data clustering technique. However DBSCAN is widely used for data clustering but not very popular for color image quantization due to some of issues associated with it. One of the problems associated with DBSCAN is that it becomes expensive when used on whole image data and also the noise points been unmapped. In this paper we are proposing a new color image quantization scheme which overcomes these problems. Our proposed algorithm is GDBSCAN (Grid Based DBSCAN) where we first decompose ...


An Intelligent Optimization Technique For Manet Using Genetic Algorithm, SUJEET MORE, UMARFAROOQUE JAHAGIRDAR 2022 Department of CSE, Visvesvaraya Technological University, Belgaum, Karnataka

An Intelligent Optimization Technique For Manet Using Genetic Algorithm, Sujeet More, Umarfarooque Jahagirdar

International Journal of Communication Networks and Security

In wireless communication, Mobile Ad Hoc network (MANET) is a group of mobile nodes that are dynamically and randomly located in such a way that the wireless link among nodes are often change due to MANET dynamic features. In this MANET environment, if a device wants to connect to Internet, it must establish a communication with an Internet Gateway. The performance of system is evaluated using simulation. In this paper we propose approximated solutions and new algorithm that helps in QoS routing which can be adaptive, flexible, and intelligent.


Real-Time Multi-Patient Monitoring System Using Arm And Wireless Sensor Network, B. SIRISHA, T. SRADDHA, K. VIJAYANAND 2022 Dept of C.S.E, M.V.S.R. Engineering College

Real-Time Multi-Patient Monitoring System Using Arm And Wireless Sensor Network, B. Sirisha, T. Sraddha, K. Vijayanand

International Journal of Communication Networks and Security

Mobile Multi patient monitoring device has become increasingly important in Hospital wards to record real-time data during normal activity for better treatment. However, the current quality and reliability have not been satisfactory due to the size, weight, distance of coverage and also high power consumption. This paper provides a solution for enhancing the reliability, flexibility by improving the performance and power management of the real-time multi-patient monitoring system (MPMS). In the current proposed system the patient health is continuously monitored by the MPMS and the acquired data is transmitted to a centralized ARM server using Wireless Sensor Networks. A ZigBee ...


Improved Kernel Fuzzy Adaptive Threshold Algorithm On Level Set Method For Image Segmentation, TARA. SAIKUMAR, S. AMIT, Y. DINESH 2022 Dept of ECE, CMR Technical Campus, Hyderabad, India.

Improved Kernel Fuzzy Adaptive Threshold Algorithm On Level Set Method For Image Segmentation, Tara. Saikumar, S. Amit, Y. Dinesh

International Journal of Communication Networks and Security

Using thresholding method to segment an image, a fixed threshold is not suitable if the background is rough Here, we propose a new adaptive thresholding method using level set theory. The method requires only one parameter to be selected and the adaptive threshold surface can be found automatically from the original image. An adaptive thresholding scheme using adaptive tracking and morphological filtering. The Improved Kernel fuzzy c-means (IKFCM) was used to generate an initial contour curve which overcomes leaking at the boundary during the curve propagation. IKFCM algorithm computes the fuzzy membership values for each pixel. On the basis of ...


Face Recognition By Linear Discriminant Analysis, SUMAN KUMAR BHATTACHARYYA, KUMAR RAHUL 2022 Computer Science and Engineering Department, Indian School of Mines, Dhanbad, Jharkhand-826004, India

Face Recognition By Linear Discriminant Analysis, Suman Kumar Bhattacharyya, Kumar Rahul

International Journal of Communication Networks and Security

Linear Discriminant Analysis (LDA) has been successfully applied to face recognition which is based on a linear projection from the image space to a low dimensional space by maximizing the between class scatter and minimizing the within-class scatter. LDA allows objective evaluation of the significance of visual information in different features of the face for identifying the human face. The LDA also provides us with a small set of features that carry the most relevant information for classification purposes. LDA method overcomes the limitation of Principle Component Analysis method by applying the linear discriminant criterion. This criterion tries to maximize ...


Security Concerns On Machine Learning Solutions For 6g Networks In Mmwave Beam Prediction, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal 2022 Old Dominion University

Security Concerns On Machine Learning Solutions For 6g Networks In Mmwave Beam Prediction, Ferhat Ozgur Catak, Murat Kuzlu, Evren Catak, Umit Cali, Devrim Unal

Engineering Technology Faculty Publications

6G – sixth generation – is the latest cellular technology currently under development for wireless communication systems. In recent years, machine learning (ML) algorithms have been applied widely in various fields, such as healthcare, transportation, energy, autonomous cars, and many more. Those algorithms have also been used in communication technologies to improve the system performance in terms of frequency spectrum usage, latency, and security. With the rapid developments of ML techniques, especially deep learning (DL), it is critical to consider the security concern when applying the algorithms. While ML algorithms offer significant advantages for 6G networks, security concerns on artificial intelligence (AI ...


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion 2022 Penn State Dickinson Law

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review

No abstract provided.


Smart Kettlebell, Cole Russell, Patrick Davis, Ryan Deboer, Isaac Stecker 2022 The University of Akron

Smart Kettlebell, Cole Russell, Patrick Davis, Ryan Deboer, Isaac Stecker

Williams Honors College, Honors Research Projects

The purpose of design team 08’s senior design project is to create and implement a workout device that will be able to calculate the caloric expenditure, repetitions, and length of a workout. Once the duration of a workout is completed, the user metrics will be communicated from the kettlebell system to a user application via Bluetooth. The caloric expenditure will be used using the data that is provided from the accelerometer. The duration of the workout will be controlled using a push button that is connected to the kettlebell system that will allow for the start and stop of ...


Energy-Efficient Dynamic Directional Modulation With Electrically Small Antennas, Adam Narbudowicz, Abel Zandamela, Nicola Marchetti, Max Ammann 2022 Trinity College Dublin, Ireland

Energy-Efficient Dynamic Directional Modulation With Electrically Small Antennas, Adam Narbudowicz, Abel Zandamela, Nicola Marchetti, Max Ammann

Articles

This letter proposes a compact and energy-efficient directional modulation scheme for small and power constrained devices (e.g., Internet of Things wireless sensors). The scheme uses a uniform circular array of monopole antennas, with a single radiofrequency chain and antenna active at a time. The antennas can be located in close proximity, offering significant size reduction. Furthermore, the schemewas demonstrated to operate successfully with an array of 0.6 λ diameter. The system does not generate additional artificial noise, limiting interference to other systems. Finally, the antenna switching sequence can be randomly generated and without fine-tuned synchronization with the transmitter.


Measurement Of Orientation And Distance Change Using Circularly Polarized Uwb Signals, Janusz Przewocki, Max Ammann, Adam Narbudowicz 2022 University of Gdansk

Measurement Of Orientation And Distance Change Using Circularly Polarized Uwb Signals, Janusz Przewocki, Max Ammann, Adam Narbudowicz

Articles

The article proposes methodology to use circularly polarized (CP) ultra-wideband (UWB) signals for simultaneous measurement of orientation and distance changes between transmitter and receiver. The proposed technique uses the rotational Doppler effect on CP pulsed communication. The amplitude of a CP signal is immune to polarization misalignment in the presence of rotation; however, the phase is subjected to a frequency-invariant shift proportional to the rotation angle. This significantly distorts the pulse shape in the time domain and can be used for the measurement of the rotated angle. By combining the technique with the well-known localization capability of UWB systems, one ...


Rss-Based Indoor Localization System With Single Base Station, Samir Salem Al-Bawri, Mohammad Tariqul Islam, Mandeep Jit Singh, Mohd Faizal Jamlos, Adam Narbudowicz, Max Ammann, Dominique M.M.P. Schreurs 2022 Universiti Kebangsaan Malaysia

Rss-Based Indoor Localization System With Single Base Station, Samir Salem Al-Bawri, Mohammad Tariqul Islam, Mandeep Jit Singh, Mohd Faizal Jamlos, Adam Narbudowicz, Max Ammann, Dominique M.M.P. Schreurs

Articles

The paper proposes an Indoor Localization System (ILS) which uses only one fixed Base Station (BS) with simple non-reconfigurable antennas. The proposed algorithm measures Received Signal Strength (RSS) and maps it to the location in the room by estimating signal strength of a direct line of sight (LOS) signal and signal of the first order reflection from the wall. The algorithm is evaluated through both simulations and empirical measurements in a furnished open space office, sampling 21 different locations in the room. It is demonstrated the system can identify user’s real-time location with a maximum estimation error below 0 ...


Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz 2022 Dartmouth College

Detecting The Presence Of Electronic Devices In Smart Homes Using Harmonic Radar, Beatrice Perez, Gregory Mazzaro, Timothy J. Pierson, David Kotz

Dartmouth Scholarship

Data about users is collected constantly by phones, cameras, Internet websites, and others. The advent of so-called ‘Smart Things' now enable ever-more sensitive data to be collected inside that most private of spaces: the home. The first step in helping users regain control of their information (inside their home) is to alert them to the presence of potentially unwanted electronics. In this paper, we present a system that could help homeowners (or home dwellers) find electronic devices in their living space. Specifically, we demonstrate the use of harmonic radars (sometimes called nonlinear junction detectors), which have also been used in ...


Data-Enabled Distribution Grid Management, Zohreh Sadat Hosseini 2022 University of Denver

Data-Enabled Distribution Grid Management, Zohreh Sadat Hosseini

Electronic Theses and Dissertations

In 2020, U.S. electric utilities installed more than 94 million advanced meters, which brought the percentage of residential customers equipped with smart meters to 75%. This significant investment allows collecting extensive customer data at the distribution level, however, the data are not currently leveraged effectively to help with system operations. This dissertation aims to use the smart meters’ data to improve the grid’s reliability, stability, and controllability by solving two of the most challenging problems at the distribution level, namely distribution network phase identification and outage identification.

Distribution networks have typically been the least observable and most dynamic ...


Autonomous Wildfire Detection System, Matthew Pyle, Nick Garrett 2022 The University of Akron

Autonomous Wildfire Detection System, Matthew Pyle, Nick Garrett

Williams Honors College, Honors Research Projects

According to the National Fire Protection Association Journal, federal wildfire suppression costs in the United States have risen from an annual average of about $425 million from 1985 to 1999 up to $1.6 billion from 2000 to 2019. On average, more than 200,000 acres in the United States are burned per year due to wildfires, with more than 700,000 acres burned in 2020 alone. With the risk of wildfire ever rising, there is a need for better early detection of remote wildfires, as existing methods often include long delays like satellites or rely on human lookout towers ...


Digital Commons powered by bepress