Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Bulletin of Electrical Engineering and Informatics

Effective crop categorization using wavelet transform based optimized long short-term memory technique Pompapathi, Manasani; Khaleelahmed, Shaik; Jawarneh, Malik; Naved, Mohd; Awasthy, Mohan; Srinivas Kumar, Seepuram; Omarov, Batyrkhan; Raghuvanshi, Abhishek
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.7748

Abstract

Effective crop categorization is important for keeping track of how crops grow and how much they produce in the future. Gathering crop data on categories, regions, and space distribution in a timely and accurate way could give a scientifically sound reason for changes to the way crops are organized. Polarimetric synthetic aperture radar dataset provides sufficient information for accurate crop categorization. It is essential to classify crops in order to successfully. This article presents wavelet transform (WT) based optimizedlong short-term memory (LSTM) deep learning (DL) for effective crop categorization. Image denoising is performed by WT. Denoising algorithms for images attempt to find a middle ground between totally removing all of the image’s noise and preserving essential, signal-free components of the picture in their original state. After denoising of images, crop image classification is achieved by LSTM and support vector machine (SVM) algorithm. LSTM has achieved 99.5% accuracy.
Chaotic grey wolf optimization based framework for efficient task scheduling in cloud fog computing J., Shreyas; S. Kharat, Reena; N. Phursule, Rajesh; Bhujanga Rao Madamanchi, Venkata; S. Rakshe, Dhananjay; Gupta, Gaurav; Jawarneh, Malik; F., Sammy; Raghuvanshi, Abhishek
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8098

Abstract

Task scheduling is an essential component of any cloud computing architecture that seeks to cater to the requirements of its users in the most effective manner possible. It is essential in the process of assigning resources to new jobs while simultaneously optimising performance. Effective job scheduling is the only method by which it is possible to achieve the essential goals of any cloud computing architecture, including high performance, high profit, high utilisation, scalability, provision efficiency, and economy. This article gives a framework based on chaotic grey wolf optimization (CGWO) for efficiently scheduling tasks in cloud fog computing. Task scheduling is done with CGWO, ant colony optimization (ACO), and min-max algorithms. CloudSim is used to implement task scheduling algorithms. Makespan time required by CGWO algorithm for 500 tasks is 73.27 seconds. CGWO is taking minimum resources to accomplish the tasks in comparison to ACO and min-max methods. Response time of CGWO is also 3745.2 seconds. CGWO is performing better in terms of Makespan time, response time and resource utilization among the methods used in the experimental work.
Elliptic curve cryptography based light weight technique for information security Alshar’e, Marwan; Alzu’bi, Sharf; Al-Haraizah, Ahed; Alkhazaleh, Hamzah Ali; Jawarneh, Malik; Al Nasar, Mohammad Rustom
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8587

Abstract

Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange and digital signature authentication. Next, we will implement asymmetric cryptographic algorithms and evaluate their efficiency. Elliptic curve elgamal algorithms are implemented for encryption and decryption of data. Elliptic curve Diffie-Hellman key exchange is used for sharing keys. Experimental results have shown that ECC needs small size keys to provide similar security. ECC takes less time in key generation, encryption and decryption of plain text. Time taken by ECC to generate a 2,048 bit long key is 1,653 milliseconds in comparison to 4,258 millisecond taken by Rivest-Shamir-Adleman (RSA) technique.