Informatica : Journal of Applied Machines Electrical Electronics Computer Science and Communication Systems
Latest Publications


TOTAL DOCUMENTS

10
(FIVE YEARS 10)

H-INDEX

0
(FIVE YEARS 0)

Published By Digital Intelligentsia Consultancy Services

2582-841x

Author(s):  
Mary Harin Fernandez F ◽  

In this paper, Sequential Topic Patterns (STPs) technique is used to formulate the issues of User-aware Rare Sequential Topic Patterns (URSTPs) mining in Internet document soure. The Sequential Subject Pattern (STP) is used to define and track Internet users' customised and abnormal behaviours. In certain real - world contexts, STP is incorporated, such as tracking of irregular user behaviours. A set of algorithms are used in three stages to overcome innovative mining issues: first, pre-processing to retrieve probabilistic topics and define sessions for various users. Second, using pattern-growth, generating all the STP candidates with (predicted) support factors for each user. Third, by doing user-aware rarity evaluation on derived STPs, choosing URSTPs.


Author(s):  
Mary Harin Fernandez F ◽  
◽  
Ramya S ◽  
Revathy V ◽  
◽  
...  

A trust-based recommendation model is regularized with user trust and item ratings called TrustSVD. Trust networks are large-world networks where many users are socially linked, suggesting the assumption of trust in recommendation systems. An item rating downloaded from the OSN Server can be viewed by the user. If the information is accessible on the server, all the adjacent devices are enabled and a peer to peer mode of communication is initiated. User reviews from a graphical forum are shown. It focuses on the rating prediction role in the current framework and has shown that integrating user social confidence data will boost the output of recommendations. The strategy builds on the SVD++ state-of-the-art model. The data sparsity and cold start issues are resolved in the friend of friend recommendation model used. The mining method generates the user's overall rating in graphical representations and illustrates the overall rating. This model increases the utility of data by exchanging neighborhoods to protect security and privacy issues. One of the most common techniques for implementing a recommendation scheme is Collaborative filtering (CF).


Author(s):  
Noraldeen B. Mohammed Wasel ◽  
◽  
Maan M. Abdulwahid

The Utilization of SCADA with PLC system has gained wide interest by several researchers. Currently, in the field of workstation and factories, which require performing the remote access connection or in the situation that regular access cannot be performed. The aim of such accessing is to perform data transfer between different equipment and stations. As a result, this paper presents and demonstrate the methodologies for handling the wireless based signal transfer for SCADA based application. Such configuration would be carried out based on the use of Wincc software and by using and creating a smart server for handling the issue of connecting HMI screen with SCADA component. The steps for performing the basic configuration has been clarified in detail in this work.


Author(s):  
A Vijaya Kumar ◽  

The billions of users all over the world are spending online social network, such as Twitter, Facebook, Tumbler and LinkedIn. The flaws in this social media may indications to abuse user’s information and execute an attack of identity cloning. In this work mainly focuses, a new method for hiding data to hide precise details in profile pictures to learn botnets and fake profiles. In this paper, presents an ordering and investigation of recognition mechanisms of genetic copy attacks on online network of social, purely established on attribute likeness, friend network likeness, and profile inquiry for a time interval and record of Internet Protocol sequences. This work, proposals an algorithm for transform discrete wavelet for hiding the data. So, the system can prevent the replica attacks and offer the whole user data privacy protective. Similarly, when users upload the profile image or photos it would be first watermarked and then updated. Java static watermarking systems and algorithms is been used for watermarking procedure. Here tracking any fake users updating the same profile picture given easier and tracking their IP address also became easier. Also, our system raises certain features which can be investigated to the users through process of registration. Thus, providing secure authentication. Hence avoiding clone attacks in social media became easier.


Author(s):  
Noorulden Basil Mohamadwasel ◽  
◽  
Mohammed Ahmed Abdala ◽  

WiMAX- Worldwide Interoperability for Microwave Access-is an innovation standard for long-separation extend remote systems that incorporate both portable WiMAX 802.16e and fixed WiMAX 802.16d associations. WiMAX hardware exists in two essential structures base stations, WiMAX base station can give an inclusion region to an exceptionally enormous zone up to a span of 6 miles, WiMAX Receiver is likewise called client premise gear like a collector hub in Antenna. Right now, Istanbul colleges are associated with utilizing WiMAX innovation that improves the system bit rate and inclusion zone. Explicit qualities for WiMAX parameters have been picked that improve the greater part of the WiMAX organize parameters, for example, the general system delay, Packet End-to-End Delay, Throughput, Load, Traffic handset, and Packet Delay Variation. In Istanbul, specialized college hub has explicit parameters, for example, in cell sweep 3km and bearer recurrence 3 GHz and Channel Bandwidth 4.5 MHZ and the quantity of subcarriers 1024 and different colleges that not quite the same as college to college this relying upon the number of parameters which every college is diverse in parameters however it has a similar receiving wire increase and transmission power.


Author(s):  
Maan M Abdulwahid ◽  
◽  
Noraldeen B Mohammed Wasel ◽  

Millimeter wave (mmWave) has been known to be the most promising technology for the future of wireless communication. It uses directional antenna for both transmitters and receivers to minimize its higher attenuation characteristics. Different localization approaches take the advantages of these directionality features in mmWave frequencies for different indoor environment. As a result, understanding the best position for AP's implementation has a huge effect on enhancing certain areas of network activity, maintenance, and coverage. In addition, establish the behavioral features of the wireless network. For localization purposes, the most used method was based on calculations of obtained signal intensity (RSS), which is commonly used in the wireless network. As well as it can be easily accessed from different operating systems. In this paper, we proposed an optimal AP localization algorithm based on RSS measurement obtained from different received points and by using mmWave bands of 28 and 39 GHz. This algorithm works as a complementary to the results obtained from 3D Ray tracing model based wireless InSite software. Four AP locations per each selected mmWave band have been included for algorithm investigation. Results obtained illustrate utility in selecting the appropriate position for the implementation of AP and based on the estimation of various parameters by the algorithm presented. The effects of different building materials and frequency sensitivity materials on signal propagation have been considered with specifying the optimum location for deploying AP. In addition, in this article, a channel characterized based on path losses was obtained for each AP position in each mmWave band as a validation of the algorithm's selection of the optimum location.


Author(s):  
Maan M Abdulwahid ◽  

The consideration of using a SCADA system has gained wide interest in the recent year. Especially when it comes to workstations and factories. One of the most interesting features was the SCADA system based on motor speed control. Therefore, this document introduced the design and implementation of the engine speed control model system. The proposed model was designed using PLC (Programmable Logical Controller) to be the most advanced automated control system. That is used in the production of electricity and the automation of the distribution for the quality of the energy. As a result, our proposed system is designed to control the station extensions and remote control of other systems or other stations where orders and instructions are transferred accurately and at great speed in addition to the details of the systems whether the speed of rotation devices and hence could achieve higher reliability and efficient system.


Author(s):  
Sharon Zhou ◽  
◽  
Alexandra Luccioni ◽  
Gautier Cosne ◽  
Michael S Bernstein ◽  
...  

With success on controlled tasks, deep generative models are being increasingly applied to humanitarian applications . In this paper, we focus on the evaluation of a conditional generative model that illustrates the consequences of climate change-induced flooding to encourage public interest and awareness on the issue. Because metrics for comparing the realism of different modes in a conditional generative model do not exist, we propose several automated and human-based methods for evaluation. To do this, we adapt several existing metrics and assess the automated metrics against gold standard human evaluation. We find that using Fréchet Inception Distance with embeddings from an intermediary Inception-v3 layer that precedes the auxiliary classifier produces results most correlated with human realism. While insufficient alone to establish a human-correlated automatic evaluation metric, we believe this work begins to bridge the gap between human and automated generative evaluation procedures, and to generate more realistic images of the future consequences of climate change.


Author(s):  
P Vijayaraghavan ◽  
◽  
M Joe Nelson ◽  
R Prasanna ◽  
M.K. Raghavendran ◽  
...  

The quality of the captured images was enhanced by some of the first digital video and image processing applications, but as the power of computers expanded, so did the number of applications where video and image processing could make a difference. Video and image processing are used in many different applications nowadays. To provide authenticity to a video several video processing software’s are used. Video tampering detection is the one of the important Security applications. Video processing software is also used to eliminate specific moving foreground from a video. But algorithms which were proposed earlier find it difficult when it comes to a video with complex background. So, in this paper an attempt is made to overcome those problem, the video foreground elimination is done by using a novel forgery detection algorithm. It is found that this method is effective when compared to the other algorithms.


Author(s):  
Maan M. Abdulwahid ◽  
◽  
Noraldeen B. Mohammed Wasel

Recently, SCADA system has been widely deployed in several stations and performing different purposes by connecting it with different hardware components and terminals. As a result, in this paper, it has been designed and proposed a model for water tank level-based detection for the scenarios of station that contains several tanks. The proposed model has shown a significant in performance and enhance the response of the tank management with both cases of tank filling and discharging.


Sign in / Sign up

Export Citation Format

Share Document