Journal of Computational and Theoretical Nanoscience
Latest Publications


TOTAL DOCUMENTS

8339
(FIVE YEARS 1764)

H-INDEX

42
(FIVE YEARS 6)

Published By American Scientific Publishers

1546-1963, 1546-1955

2021 ◽  
Vol 18 (4) ◽  
pp. 1287-1293
Author(s):  
M. P. Haripriya ◽  
P. Venkadesh

The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.


2021 ◽  
Vol 18 (4) ◽  
pp. 1275-1281
Author(s):  
R. Sudha ◽  
G. Indirani ◽  
S. Selvamuthukumaran

Resource management is a significant task of scheduling and allocating resources to applications to meet the required Quality of Service (QoS) limitations by the minimization of overhead with an effective resource utilization. This paper presents a Fog-enabled Cloud computing resource management model for smart homes by the Improved Grey Wolf Optimization Strategy. Besides, Kernel Support Vector Machine (KSVM) model is applied for series forecasting of time and also of processing load of a distributed server and determine the proper resources which should be allocated for the optimization of the service response time. The presented IGWO-KSVM model has been simulated under several aspects and the outcome exhibited the outstanding performance of the presented model.


2021 ◽  
Vol 18 (4) ◽  
pp. 1294-1299
Author(s):  
Jen Jacob ◽  
Rohan Senanayake

This investigated research work and the final decisions were arrived from the specific dynamical analysis of three different new and innovate underground interchange buildings planned and executing currently at Doha and Al khor situated at Qatar is presented. A supplementary study was carried out for an identical two-tier swapping building technique and the approach and outcome have been reported in this research article. The examination of dissimilar ventilation and air-conditioning stratagems has been done initially. The prime objective is to find the efficient and effectual design to invent and so as to uphold to get an attention of pollutant contaminant and thermal temperatures under the modelled and designed values, by investing very low cost even in the operating level. The systematic CFD modelling of dissimilar stratagems was done and the numerical and simulated results are shown in this work. The same has again merged with a dynamical Computational Fluid Dynamics (CFD) coding to reach the optimum result. This was done with the coordination with buses circulation and with the sources of heat and disbursed pollution. The concluding optimal result succeeded is grounded on a substantial partitioning which is connecting between the island area and berth locale. The efficacy of the multifarious design strategies and probable predictions are presented in the conclusions. In order to manage a fire crisis situation, it is primary to check about the planning of the fire and flames struggling measures which comprises of automatic freshening like ventilation along with arrangements of curtains, and explain the smoke sectors which would be able to manage with a fire crisis condition. The main results accessible are temperature fields, concentration of smoke and visibility.


2021 ◽  
Vol 18 (4) ◽  
pp. 1251-1255
Author(s):  
M. Malathi ◽  
P. Sinthia

The main objective of the research work is to recognize the rust of the substance with the help of Image Processing. The recognition of the rust portion of an image is carried out by quantizing of image in matrix form. The quantization process helps to perform the fundamental operation on image and also helps to identify the desired oxidation portion of an image. The corrosion portion was identified through the threshold operation, edge detection and segmentation. Threshold value assists to describe the types of the rust. Further the abrupt modification of colour in the images was captured by the edge detection method. Consequently partitioning of an image find the colour changes in the oxidized image. The corrosion portion was recognized by combining the edge recognition and partitioning process. Finally recommended methods provide the 98% accuracy to detect the rust.


2021 ◽  
Vol 18 (4) ◽  
pp. 1186-1193
Author(s):  
J. N. V. R. Swarup Kumar ◽  
D. Suresh

The efficient message routing is highly challenging in terms of low power and lossy networks (loT) for transmission of data with overhead and delay. The protocols used for routing need to be designed such that they should be working efficiently. Efficiency in calculated in terms of energy and delivery of packets. RPL protocol is also designed with the aim of making these two parameters efficient. Even then it contains drawbacks. Trickle algorithm is designed with a goal to reduce the drawbacks in RPL. Trickle algorithm is used in RPL protocols for creation of routes between nodes in the network with different intervals. Unfortunately, there exists some more downsides for the trickle algorithm, which made design of several algorithms inorder to analyse different drawbacks. In this paper, on analysing different types of trickle algorithms and locating the drawback in every algorithm, a novel algorithm is designed which helps in reduction of the drawbacks that are found. The description of this algorithm along with the simulation results done using Cooja 3.0 simulator is also discussed in this paper. The Simulation of the algorithm that is newly designed is done by assuming a network with different count of nodes and comparing the results with the previously introduced Trickle algorithms.


2021 ◽  
Vol 18 (4) ◽  
pp. 1321-1326
Author(s):  
N. Bhuvaneswary ◽  
S. Prabu ◽  
K. Tamilselvan ◽  
K. G. Parthiban

A new strategy for quick multiplication of two numbers is introduced. Inputs are separated into segments, and one segment is replaced by two with zeros interlocking in each alternative segments. With zero carries between segments the product are computed, within the time needed to multiply the short partitions and add the partial sums. The multiplication of two numbers generated and adds that product to an accumulator by multiply accumulate operation (MAC unit). This operation is performed within the MAC unit. MAC is an advanced co-processor that plays a vital role in FFT, DFT, etc. The MAC unit is utilized for additional execution and its input is given to the proposed multiplier that provides a trivial speed increment over the array multiplier designs. This paper is utilized to design speed enhanced multiply Accumulate Unit by an Interlaced Partition Multiplier. This new multiplier design simulation is optimized with existing method.


2021 ◽  
Vol 18 (4) ◽  
pp. 1327-1330
Author(s):  
S. Manjula ◽  
R. Karthikeyan ◽  
S. Karthick ◽  
N. Logesh ◽  
M. Logeshkumar

An optimized high gain low power low noise amplifier (LNA) is presented using 90 nm CMOS process at 2.4 GHz frequency for Zigbee applications. For achieving desired design specifications, the LNA is optimized by particle swarm optimization (PSO). The PSO is successfully implemented for optimizing noise figure (NF) when satisfying all the design specifications such as gain, power dissipation, linearity and stability. PSO algorithm is developed in MATLAB to optimize the LNA parameters. The LNA with optimized parameters is simulated using Advanced Design System (ADS) Simulator. The LNA with optimized parameters produces 21.470 dB of voltage gain, 1.031 dB of noise figure at 1.02 mW power consumption with 1.2 V supply voltage. The comparison of designed LNA with and without PSO proves that the optimization improves the LNA results while satisfying all the design constraints.


2021 ◽  
Vol 18 (4) ◽  
pp. 1221-1226
Author(s):  
Durai Pandurangan ◽  
R. Saravana Kumar ◽  
Lukas Gebremariam ◽  
L. Arulmurugan ◽  
S. Tamilselvan

Insufficient and poor lightning conditions affect the quality of videos and images captured by the camcorders. The low quality images decrease the performances of computer vision systems in smart traffic, video surveillance, and other imaging systems applications. In this paper, combined gray level transformation technique is proposed to enhance the less quality of illuminated images. This technique is composed of log transformation, power law transformation and adaptive histogram equalization process to improve the low light illumination image estimated using HIS color model. Finally, the enhanced illumination image is blended with original reflectance image to get enhanced color image. This paper shows that the proposed algorithm on various weakly illuminated images is enhanced better and has taken reduced computation time than previous image processing techniques.


2021 ◽  
Vol 18 (4) ◽  
pp. 1331-1335
Author(s):  
Anil Roy Dubey ◽  
B. Balaji

In the digital world, it’s somewhat difficult to manage the expectations of the present customers especially E-Commerce Shoppers who are often challenging and pushed to keep up with what is anticipated to them. Numerous E-shoppers are under pressure to locate and approach to convey an offline in-store ride to the online store ride of higher level interaction with their customers. Experts have cited that all kinds of powers are clearly in the fingers of customers and that their never ever change their behaviors, this leads to force them to approach various online shops portals to adapt. Online shopping comes to be greatly empowered, the E-shoppers expectations from retailers to vendors and are developing a rapid shift in their behavior with an emphasis on pace and convenience. Shopper’s interest spans have become shorter, with 50 percent of shoppers leaping from one retailer website to another, earlier they making an enduring purchase. In addition, greater than eighty percent of shoppers are taking their shopping experience in both online as well as offline. A retailer’s internet site is one of the key places where customers go to search about their dream product’s records and pricing. The demand for the quick shipping of products purchased and handy services, such as click on online and collect in store, as properly as seamless returns have led to groups developing easy, no-fuss fee options. Research indicates that primary shops will continue to offer higher approaches to gather products purchased online from their stores, as a way of appealing to customers and supplying larger convenience. Based on these prevailing conditions a study was performed on E-Commerce components impacting consumer’s online purchasing conducted on the United Arab Emirates (UAE). Major portions of primary data collection were done via the questionnaires method and by means of emails in two predominant cities of UAE (Sharjah, Abu Dhabi). Cost, time saving (shipping), maintaining customers private details in a secured manner and comfort while do shopping were recognized as vital elements and this leads to assured buying conduct of online shopping. The www is to remodel in the region of populace where communal networked group impact and leads to online shopping.


2021 ◽  
Vol 18 (4) ◽  
pp. 1239-1242
Author(s):  
N. Nandhagopal ◽  
S. Navaneethan ◽  
V. Nivedita ◽  
A. Parimala ◽  
Dinesh Valluru

The pupil detection system plays a vital role in ophthalmology diagnosis equipments because pupil has a center place of human eye to locate the exact position. To identify the exact human eye pupil region in near infrared (NIR) images, this work proposes the Center of gravity method and its real time FPGA hardware implementation. The proposed work involves global threshold method to segment the pupil region from human eye and the bright spot suppression process removes the light reflections on the pupil due to the IR (Infra red) rays then the morphology dilation process removes unnecessary black pixels other than pupil region on the image. Finally, center of gravity (COG) method provides the exact pupil center coordinate and radius of the human eye. CASIA IRIS V4 and UBIRIS iris database images used in this work and achieved 90-95% of recognition rate.


Sign in / Sign up

Export Citation Format

Share Document