International Journal of Advances in Applied Sciences
International Journal of Advances in Applied Sciences (IJAAS) is a peer-reviewed and open access journal dedicated to publish significant research findings in the field of applied and theoretical sciences. The journal is designed to serve researchers, developers, professionals, graduate students and others interested in state-of-the art research activities in applied science areas, which cover topics including: chemistry, physics, materials, nanoscience and nanotechnology, mathematics, statistics, geology and earth sciences.
Articles
10 Documents
Search results for
, issue
"Vol 9, No 1: March 2020"
:
10 Documents
clear
Design and implementation of an effective web-based hybrid stemmer for Odia language
Gouranga Charan Jena;
Siddharth Swarup Rautaray
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1162.008 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp12-19
Stemmer is used for reducing inflectional or derived word to its stem. This technique involves removing the suffix or prefix affixed in a word. It can be used for information retrieval system to refine the overall execution of the retrieval process. This process is not equivalent to morphological analysis. This process only finds the stem of a word. This technique decreases the number of terms in information retrieval system. There are various techniques exists for stemming. In this paper, a new web-based stemmer has been proposed named as “Mula” for Odia Language. It uses the Hybrid approach (i.e. combination of brute force and suffix removal approach) for Odia language. The new born stemmer is both computationally faster and domain independent. The results are favourable and indicate that the proposed stemmer can be used effectively in Odia Information Retrieval systems. This stemmer also handles the problem of over-stemming and under-stemming in some extend.
Software defined network emulation with OpenFlow protocol
Tsehay Admassu Assegie
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (843.046 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp70-76
In software defined network the network infrastructure layer where the entire network devices, like switches and routers reside is connected with the separate controller layer with the help of standard called OpenFlow. The open flow standard enables different vendor devices like juniper, cisco and Huawei switch to connect to the controller or a software program. The software program controls and manages the network devices. Therefore, software defined network architecture makes the network flexible, cost effective and manageable, enables dynamic provisioning of bandwidth, dynamic scale out and dynamic scale in compared to the traditional network. In this study, the architectures and principles of software defined network is explored by emulating the software defined network employing a mininet.
Vehicle accident management and control system using MQTT
Sudha Senthilkumar;
K. Brindha;
Shashank Bhandari
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (987.889 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp1-11
The quick development of innovation has made our lives less demanding. Innovation has additionally expanded activity risks and street mishaps occur very often which cause tremendous death toll and damage to property on account of poor response from the people in charge of managing such incidents. The mishap recognition undertaking will give an ideal solution for this problem. An accelerometer or a Tilt Sensor can be used as part of an auto caution application with the goal that unsafe driving can be identified. It can be utilized as a crash or rollover finder of the vehicle amid and after a crash. With signals from a sensor, a serious situation because of an accident can be avoided or attended to at the earliest. At the point of time when a vehicle meets with an accident or an auto moves over, the tilt sensor recognizes the flag and promptly sends it to the microcontroller. The microcontroller sends the alarm message through the IoT Module including the location of the accident through the GPS Module to the police or control group by publishing it over the cloud. So, the crisis enable group can promptly follow the area through the GPS Module, subsequent to receiving and accepting the data. The area can likewise be seen on the Google maps. Vital move can be made if this data reaches the control group in time. This venture is valuable in recognizing the accident with the use of sensors. As a future execution, we can add a remote webcam to the current system in order to capture pictures of the scene of the accident.
Top-K search scheme on encrypted data in cloud
Katari Pushpa Rani;
L. Lakshmi;
Ch. Sabitha;
B. Dhana Lakshmi;
S. Sreeja
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (599.879 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp67-69
A Secure and Effective Multi-keyword Ranked Search Scheme on Encrypted Cloud Data. Cloud computing is providing people a very good knowledge on all the popular and relevant domains which they need in their daily life. For this, all the people who act as Data Owners must possess some knowledge on Cloud should be provided with more information so that it will help them to make the cloud maintenance and administration easy. And most important concern these days is privacy. Some sensitive data exposed in the cloud these days have security issues. So, sensitive information ought to be encrypted earlier before making the data externalized for confidentiality, which makes some keyword-based information retrieval methods outdated. But this has some other problems like the usage of this information becomes difficult and also all the ancient algorithms developed for performing search on these data are not so efficient now because of the encryption done to help data from breaches. In this project, we try to investigate the multi- keyword top-k search problem for encryption against privacy breaks and to establish an economical and secure resolution to the present drawback. we have a tendency to construct a special tree-based index structure and style a random traversal formula, which makes even identical question to supply totally different visiting ways on the index, and may additionally maintain the accuracy of queries unchanged below stronger privacy. For this purpose, we take the help of vector area models and TFIDF. The KNN set of rules are used to develop this approach.
A computer vision-based weed control system for low-land rice precision farming
Olayemi Mikail Olaniyi;
E. Daniya;
J. G. Kolo;
J. A. Bala;
A. E. Olanrewaju
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1228.133 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp51-61
Agricultural sector is one of the economic pillars of developing nations, because it provides means of boosting gross domestic profit. However, weeds pose a threat to food crop by competing with it for nutrients and undermining the profit to be made from it. The treatment of these weeds is necessary, but at minimal impact on the actual food crop. Herbicide usage is one major means of weed control, owning to the expensive and labour-intensive nature of hand weeding. Recently, the need for site specific spraying has been on the rise because of health concerns which have been raised on the effect of herbicides on food crops and the effect on the environment. Most research on the field focuses on accurately identifying the weeds whilst neglecting the weed control. In this research, we apply fuzzy logic-based expert system to control how herbicide is sprayed on low-land rice in order to reduce excessive herbicide usage. The system supplies the control with weed density (Box size) and confidence level. The values of both are then passed to the fuzzy logic control for spray decision. The Sugeno as well as Mamdani models were tested using generated values for detected weed box size and confidence levels of the computer vision. The mean absolute error obtained was 0.9 for both, and 0.3 and 0.2 respectively, for the mean square error. The error shows how accurate the system can be and with low error value, it shows that the system implementation is capable of providing control for spraying of herbicides which in turn will yield more returns for low-land rice farmers.
Simplified down sampling factor based modified SVPWM technique for cascaded inverter fed induction motor drive
Ravi Kumar Bhukya;
P. Satish Kumar
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2658.633 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp20-26
This paper presents a rivew, investigation and performance analysis of novel down samples factor based modified space vector PWM is called clamping SVPWM technique for cascaded Multilevel Invereter fed to Induction motor drive. In this paper the reference sine wave generated as in case of conventional off set injected SVPWM technique is modified by down sampling factor the reference wave by order of 10. The performance analyses of this modulation strategies are analyzed by apply for five level, seven level, nine level and eleven level inverter. The performance analysis of cascaded inverter interms of line voltage, stator current, speed, torque and total harmonic distortion. The results are depicting that PD PWM is more effective among the four proposed PWM technique. It is observed that the CSV Pulse width modulation ensures excellent, close to optimized pulse distribution results compared to SPWM technique and also 11-level inverter beter performance in case of low THD and better foundemental output voltages comapared to 5, 7, 9-level inverter. The proposed technique has been simulated using MATLAB/SIMULINK software. This proposed technique can be applied to N-level multilevel Inverter also.
Trilateration based localization method using mobile anchor in wireless sensor networks
M.G. Kavitha;
Vinoth Kumar Kalimuthu;
T. Jayasankar
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (358.388 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp34-42
Localization in wireless sensor networks (WSNs) is essential in many applications like target tracking, military applications and environmental monitoring. Anchors which are equipped with global positioning system (GPS) facility are useful for finding the location information of nodes. These anchor nodes may be static or dynamic in nature. In this paper, we propose mobile anchors assisted localization algorithm based on regular hexagons in two-dimensional WSNs. We draw a conclusion that the number of anchor nodes greatly affect the performance of localization in a WSN. An optimal number of anchor nodes significantly reduces the localization error of unknown nodes and also guarantees that unknown nodes can obtain high localization accuracy. Because of the mobility of anchor nodes high volume of sensing region is covered with less period of time and hence the coverage ratio of the proposed algorithm increases. Number of communications also decreases for the reason that the system contains loge (n) number of anchor nodes which leads to less energy consumption at nodes. Simulation results show that our LUMAT algorithm significantly outperforms the localization method containing single anchor node in the network. Movement trajectories of mobile anchors should be designed dynamically or partially according to the observable environment or deployment situations to make full use of real-time information during localization. This is the future research issue in the area of mobile anchor assisted localization algorithm.
An efficient quantum multiverse optimization algorithm for solving optimization problems
Samira Sarvari;
Nor Fazlida Mohd. Sani;
Zurina Mohd Hanapi;
Mohd Taufik Abdullah
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (858.782 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp27-33
Due to the recent trend of technologies to use the network-based systems, detecting them from threats become a crucial issue. Detecting unknown or modified attacks is one of the recent challenges in the field of intrusion detection system (IDS). In this research, a new algorithm called quantum multiverse optimization (QMVO) is investigated and combined with an artificial neural network (ANN) to develop advanced detection approaches for an IDS. QMVO algorithm depends on adopting a quantum representation of the quantum interference and operators in the multiverse optimization to obtain the optimal solution. The QMVO algorithm determining the neural network weights based on the kernel function, which can improve the accuracy and then optimize the training part of the artificial neural network. It is demonstrated 99.98% accuracy with experimental results that the proposed QMVO is significantly improved optimization compared with multiverse optimizer (MVO) algorithms.
Intrusions detection using optimized support vector machine
Mehdi Moukhafi;
Khalid El Yassini;
Bri Seddik
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1007.916 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp62-66
Computer network technologies are evolving fast and the development of internet technology is more quickly, people more aware of the importance of the network security. Network security is main issue of computing because the number attacks are continuously increasing. For these reasons, intrusion detection systems (IDSs) have emerged as a group of methods that combats the unauthorized use of a network’s resources. Recent advances in information technology, specially in data mining, have produced a wide variety of machine learning methods, which can be integrated into an IDS. This study proposes a new method of intrusion detection that uses support vector machine optimizing optimizing by a genetic algorithm. to improve the efficiency of detecting known and unknown attacks, we used a Particle Swarm Optimization algorithm to select the most influential features for learning the classification model.
An immune memory and negative selection to visualizing clinical pathways from electronic health record data
Mouna Berquedich;
Oulaid Kamach;
Malek Masmoudi;
Laurent Deshayes
International Journal of Advances in Applied Sciences Vol 9, No 1: March 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (865.779 KB)
|
DOI: 10.11591/ijaas.v9.i1.pp43-50
Clinical pathways indicate the applicable treatment order of interventions. In this paper we propose a data-driven methodology to extract common clinical pathways from patient-centric Electronic Health Record data (EHR). The analysis of patient's, can lead to better regarding pathologies. The proposed algorithmic methodology consists to designing a system of control and analysis of patient records based on an analogy between the elements of the new EHRs and the biological immune systems. The detection of patient profiles ensured by biclustering Matrix. We rely on biological immunity to develop a set of models for structuring knowledge extracted from EHR and to make pathway analysis decisions. A specific analysis of the functional data leds to the detection of several types of patients who share the same EHR information. This methodology demonstrates its ability to simultaneously processing data, and is able to providing information for understanding and identifying the path of patients as well as predicting the path of future patients.