Version-3 (Nov-Dec 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | PATH PLANNING TECHNIQUES FOR MOBILE ROBOT: A REVIEW |
Country | : | Nigeria |
Authors | : | T. A Badmos || P. O Omolaye || S. O Adio || M. N Suleiman |
: | 10.9790/0661-2006030106 |
Abstract: The ability of a mobile robot to plan its path, avoid obstacles and optimize in static as well as dynamic environments is the key task in the field of robotics, which tends to find the shortest, collision free, optimal path in the various scenes. In this paper, the robotic path planning strategy of mobile robots can be categorized as Classical and Intelligent Techniques. A detailed review made based on the several techniques presented especially by focusing on the various cluttered environments, their merits and demerits of each of these strategies. However, the main drawback arises from the classical techniques because of the complex issues compared to intelligent techniques.
[1]. Zhu, S. X. Yang. (2006) "A Neural Network Approach to Dynamic Task Assignment of Multi Robots", IEEE Transaction on Neural Networks, 17(5), 1278-1287.
[2]. Adamu, P.I, J. T. Jegede, H. I. Okagbue and P. E. Oguntunde. Shortest Path Planning Algorithm. A Particle Swarm Optimization (PSO) Approach. Proceedings of the World Congress on Engineering 2018 Vol I WCE 2018, July 4-6, 2018, London, U.K.
[3]. Ashleigh, S and Silvia, F (2010). A Cell Decomposition Approach to Cooperative Path Planning and Collision Avoidance via Disjunctive Programming. 49th IEEE Conference on Decision and Control. Hilton Atlanta Hotel, Atlanta, GA, USA
[4]. B.K. Patle, Anish Pandey, A. Jagadeesh, D.R. Parhi (2018). Path planning in uncertain environment by using firefly algorithm. https://doi.org/10.1016/j.dt.2018.06.004. www.elsevier.com/locate/dt
[5]. Badmos, T. A & P. O Omolaye. (2017). Fuzzy Logic Simulation of Key Performance Index in Telecommunication Activities. International Journal for Research in Applied Science & Engineering Technology (IJRASET). Vol. 6, Issue VIII, ISSN: 2321-9653..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Constrained Engineering DesignOptimization using Average Differential Evolution |
Country | : | Turkey |
Authors | : | BurhanettinDurmuş |
: | 10.9790/0661-2006030713 |
Abstract:The use of metaheuristics has a growing interest in solving constrained optimization problems due to the computational disadvantages of numerical methods. Metaheuristics are a powerful tool in reaching the global optimum. In this work, the Average Differential Evolution (ADE) algorithm, which is one of the newly proposed metaheuristics, has been adapted to the constrained engineering design problems. The ADE algorithm is a population-based approach with a high convergence rate. It uses a mutation operator with collective diversity in the production of candidates. The results show the robustness end effectiveness of the proposed algorithm compared to state-of-the-art algorithms in literature.
[1]. Cha J, Mayne R. Optimization with discrete variables via recursive quadratic programming. Journal of Mechanisms Transmissions
and Automation in Design. 1989;111(1):130-136
[2]. Fu J, Fenton R, Cleghorn W. A mixed integer discrete-continuous programming method and its applications to engineering design
optimization.Engineering Optimization. 1991;17(4):263-280
[3]. Sandgren E. Nonlinear integer and discrete programming in mechanical design optimization. ASME Journal of Mechanical Design.
1990;112(2):223-229
[4]. Coello, CAC. Use of a self-adaptive penalty approach for engineering optimization problems. Computers in Industry.
2000;41(2):113-127
[5]. Akay B,Karaboga D. Artificial bee colony algorithm for large-scale problems and engineering design optimization. Journal of
Intelligent Manufacturing.2012;23(4):1001-1014
- Citation
- Abstract
- Reference
- Full PDF
Abstract:The influential significance across individual vertices in a Wireless Network raises a concern for the effective evaluation for Centrality metrics. A graph-theoretical comparison between the behaviour of betweenness, closeness and harmonic centrality indices is conducted over a simple, dense wireless network. The authors propose an extended algorithm for harmonic centrality over wireless sensor networks. The inadequacy in the metrics obtained by betweenness and closeness indices are discussed in detail, showing the significance of harmonic centrality in leadership recognition across a network.
Keywords: Wireless Sensor Networks, Network Reliability, Centrality, Closeness, Betweenness, Harmonic-influence.
[1] D. Bhattacharyya, T.-H. Kim, and S. Pal, "A comparative study of wireless sensor networks and their routing protocols," in Sensors, 2010.
[2] D. Acemoglu, G. Como, F. Fagnani, and A. Ozdaglar, "Opinion fluctuations and disagreement in social networks," Math. Oper. Res., vol. 38, no. 1, pp. 1–27, Feb. 2013. [Online]. Available: http://dx.doi.org/10.1287/moor.1120.0570
[3] N. E. Friedkin, "Theoretical foundations for centrality measures," American Journal of Sociology, vol. 96, no. 6, pp. 1478–1504, 1991. [Online]. Available: https://doi.org/10.1086/229694
[4] M. Marchiori and V. Latora, "Harmony in the small-world," Physica A: Statistical Mechanics and its Applications, vol. 285, no. 3, pp. 539 – 546, 2000. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S0378437100003113
[5] A. Bavelas, "Communication Patterns in Task-Oriented Groups," Acoustical Society of America Journal, vol. 22, p. 725, 1950.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | IOT Based Coal Mine Safety Monitoring and Control Automation |
Country | : | India |
Authors | : | Bonala Ashwini || D.Ravi Kiran Babu |
: | 10.9790/0661-2006032126 |
Abstract: In this paper we are organizing an IoT (Internet of Things) screen, a safety efforts for excavators which is most basic in underground mining domains. In this undertaking, the system is build using particular sensors sort out subject to MEMS used to screen the surroundings parameters of underground mine place and drives each and every identified parameter/characteristics to/characteristics to ARM7 based Microcontroller Unit (MCU). The MCU unit is used to create an absolutely robotized surveying system with high exactness, smooth control and constancy. Exactly when an essential conditions is recognized caution is given by the structure and comparative estimations is passed on to webserver by beginning ESP8266 module subject to Wi-Fi correspondence. The recognized assortments in the characteristics are appeared on webserver page that makes less requesting for the underground control center to screen and to make major quick move to prevent genuine damage.
Index Terms: IoT, MCU, Wireless Sensors Network (WSN), MEMS, Wi-Fi, PC, Webserver
[1]. E. K. Stanek, "Mine Electrotechnology Research: The Past 17 Years", IEEE transactions on industry applications, vol. 24(5), pp 818-19, 1988.
[2]. S. Wei, L. Li-li, "Multi-parameter Monitoring System for Coal Mine based on Wireless Sensor Network Technology", Proc. International IEEE Conference on Industrial Mechatronics and Automation, pp 225-27, 2009.
[3]. Y.P. Zhang, G. X. Zheng, J. H. Sheng, "Radio Propagation at 900 MHz in Underground Coal Mines", IEEE transactions on antennas and propagation, vol.49(5), pp. 752-62, 2001.
[4]. S. Jin-ling, G. Heng-wei, S. Yu-jun, "Research on Transceiver System of WSN Based on V-MIMO Underground Coal Mines", Proc. International Conference on Communications and Mobile Computing, pp 374-378, 2010.
[5]. N. Chaamwe, W. Liu, H. Jiang, "Seismic Monitoring in Underground Mines: A case of Mufulira Mine in Zambia Using wireless Sensor Networks for Seismic Monitoring", Proc. IEEE international Conference on Electronics and Information Engineering, vol. 1(V1), pp 310-14, 2010.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Energy Efficient Dc Lighting Grid Using IOT |
Country | : | Turkey |
Authors | : | Peyyavula Ramya || M.Praveen Kumar |
: | 10.9790/0661-2006032732 |
Abstract: This paper highlights the benefits and possible drawbacks of a DC-based lighting infrastructure for powering Light Emitting Diode (LED)-lamps. It also evaluates the efforts needed for integrating the so called smart lighting and other sensor/actuator based control systems, and compares existing and emerging solutions. It reviews and discusses published work in this field with special focus on the intelligent DC-based infrastructure named EDISON that is primarily dedicated to lighting, but is applicable to building automation in general. The EDISON "PowerLAN" consists of a DC-based infrastructure that offers telecommunication abilities and can be applied to lighting..........
Keywords: DC-grid; lighting control; LED drivers; power line communication; OneM2M; IoT; wireless sensor networks; lighting; building automation; REST ful
[1]. 2030 Climate & Energy Framework | Climate Action. Available online: https://ec.europa.eu/clima/ policies/strategies/2030 (accessed on 25 July 2017).
[2]. Eurostat. Smarter, Greener, More Inclusive? Indicators to Support the Europe 2020 Strategy; Eurostat: Luxembourg, 2017; p. 196.
[3]. How Much Electricity Is Used for Lighting in the United States? FAQ. U.S. Energy Information Administration (EIA). Available online: https://www.eia.gov/tools/faqs/faq.cfm?id=99 (accessed on 25 July 2017).
[4]. Sedziwy, A.; Kotulski, L. Towards Highly Energy-Efficient Roadway Lighting. Energies 2016, 9, 263.
[5]. Weir, B. Driving the 21st century's lights. IEEE Spectr. 2012, 49, 42–47.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The increase use of cloud computing infrastructure has led to a security consciousness by users and cloud service providers to protect data available in the cloud from illegal users. Even though, different techniques have been proposed by different researchers, yet, more techniques are still proposed all in the quest to achieve better and flexible security techniques that will utilize less resource and minimize cost, because user pay as they go in the cloud. In this paper we proposed an improved multi-channel security technique in the cloud using image steganography and RSA algorithm. The proposed method was used to conceal the existence of data communication using the image........
Keywords: Cloud computing, Image steganography, RSA algorithm
[1]. L Yuhong, S Yan, R Jungwoo, R Syed, and V V athanasios, A survey of security and privacy challenge in cloud computing:
Solutions and Future Directions, Journal of Computing Science and Engineering, 9(3), 2015, 119-133.
[2]. B H Bhavani, and H S Guruprassad, Resource provisioning techniques in coud somputing environment: A survey, International
Journal in Computer Science and Communication Technology, 3(3), 2014, 395-401.
[3]. Deepika, and K Gurjeet, (2016). Review Paper on Enhancing Data security for Cloud Environment Cryptography and Technique,
International Journal of Engineering Applied Sciences and Technology, 2(1), 2016, 44-48.
[4]. J D Bokefedo, S A Ubale, and S V Pingale, Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role based Access Control Model, International Journal of Computer Applications, 118(12), 2015, 46-52.
[5]. R Patel Palak, and P Yask, Survey on Different Methods of ImageSteganography, International Journal of Innovative Research in Computer and Communication Engineering, 2(12), 2014, 7614-7618..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Car controlling one of the projects that get a lot of attention in this days. There are many challenges generated during implementation of system especially when the car connected with number of sensors and that mean there are send and receive between the car and the work station. In this work we will design a vehicle able to detect the dangerous environments that humans cannot reach it. This means that we can send commands to control the car and receiving data from the sensors. The robot car will measure the temperature and the amount of toxic gases and detect motions. Also it has a camera for online video transmitter to monitoring the environment and helping control the robot car from the work station. .
Keywords: Robot, Sensors, Arduino, Bluetooth
[1]. J. Defever B. Francis and T. Geerinck, "Mobile Robots with Shared Autonomy", Vrije Universiteit Brussel, Brussels, Belgium, 2004.
[2]. P. Kool, "Robotica", Vrije Universiteit Brussel, Brussels, Belgium, 2000.
[3]. Sheetal Gandotra, Bhawna Sharma, Shreeya Mahajan, Tsering Motup, Tahira Choudhary & Paras Thakur, "Bluetooth Controlled RC Car using Arduino", Imperial Journal of Interdisciplinary Research (IJIR) Vol-2, Issue 9, 2016.
[4]. https://www.direnc.net/.
[5]. https://www.eken.com/..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Data transmitted from sensors and actuators as part of the Internet of Things (IoT) infrastructure are stored either in database tables following relational schema and normalization forms or in schema less collections using JSON string or binary formulation. As data content in such repositories radically increases, the selection and use of the appropriate storage types are essential in terms of performance and robustness. Furthermore, taking into account the amount of database capacity and processing needed, as well as the exponential increase and use of IoT devices, storage and retrieval of sensory data are the main bottlenecks and set the boundary requirements for IoT services functionalities........
[1] Aboutorabi S., Rezapour M., Moradi, M., and Ghadiri, N., "Performance evaluation of SQL and MongoDB databases for big e-commerce data ", In proc. of CSICSSE conf., DOI: 10.1109/CSICSSE.2015.7369245, 2015
[2] Afolabi A. O. and Ajayi A. O., Performance Evaluation of a database Management System, Journal of Engineering and Applied Sciences Vol. 3 (2): 155-160, 2008, ISSN: 1816-949X, 2008
[3] Al-Qerem, A. Performance Evaluation of Transaction Processing in Mobile Data Base Systems, International Journal of Database Management Systems (IJDMS) vol. 6 (2), ISSN: 0975-5985, 2014
[4] Berg K., Seymour T., and Coel R., History of Databases. International Journal of Management and Information Services, Vol. 17,No. 1, DOI: 10.19030/ijmis.v17i1.7587, 2013
[5] Damodaran D. B., Salim S. and Vargese M. V., Performance evaluation of MySQL and MongoDB databases, International Journal of Cybernetics & Informatics IJCI, Vol. 5, No. 2, ISSN:2320-8430, 2016.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In the current e-world, mostly all the transactions and the business are taking place through e-mails. Now a day, e-mail has become a powerful tool for communication as it saves a lot of time, paper and cost. But, due to social networks sites and advertiser most of the e-mails are containing unwanted information i.e. called spam. The spam e-mails may contain text of any languages.[3] On the web there are some documents that contain Indian language which may be a spam e-mail. As there are various languages available in India it is a challenging task to identify the spam e-mail due to its linguistic variance and language barriers. As I have reviewed so many research papers on E-mail Spam Categorization, I found that there are so many classifiers available for all the Indian Language, but there is no document classifier available for Hindi language. So in my research I am going to focus on document classifier for Hindi Spam E-Mail Categorization.
Keywords: Hindi Language, Naïve Bayes (NB), Document Categorization, Support Vector Machines (SVM) and K-NN (K – Nearest Neighbors).
[1]. Lin SH, Chen M C, Ho JM, Huang YM. ACIRD: Intelligent Internet document organization and retrieval. IEEE Transactions on Knowledge and Data Engineering. 2002; 14(3):599–614. https://doi.org/10.1109/ TKDE.2002.1000345
[2]. Lee LH, Isa D. automatically computed document dependent weighting factor facility for Naïve Bayes classification. Expert Systems with Applications, 2010; 37(12):8471–8. https://doi.org/10.1016/j.eswa.2010.05.030
[3]. Zhang H. The Optimality of Naive Bayes. Barr V, Markov Z, editors. FLAIRS Conference; AAAI Press; 2004.
[4]. Patil JJ, Bogiri N. Automatic text categorization Marathi documents. International Journal of Advance Research in Computer Science and Management Studies. 2015; 3(3):280–7. https://doi.org/10.1109/icesa.2015.7503438
[5]. Patil M, Game P. Comparison of Marathi text classifiers. ACEEE International Journal on Information Technology. 2014; 4(1):11–22..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on the Data Transmission in Networking |
Country | : | India |
Authors | : | Dr.Surender Singh |
: | 10.9790/0661-2006035961 |
Abstract: Computer Network has extraordinary impact on improving the proficiency of the communication system and application prerequisites throughout our life. So as to set up transmission way with development attributes and improve the proficiency of information transmission in Computer Network, the enhanced clustering routing protocol dependent on node position utilizing the base separation routing rivalry instrument was proposed in this paper. This clustering routing protocol gives full thought to the situation of replacement nodes and the transmission course regarding clustering and routing way choice. The current paper highlights the data transmission in networking.
Keywords: Data, Transmission, Network.
[1]. EACOMM Corporation Embedded Systems Division. Wireless Data Transmission over GSM Short Message Service (2013)
[2]. Anhoj, J., Moldrup, C.: Feasibility of Collecting Diary Data from Asthma Patients through Mobile Phones and SMS. Journal of Medical Internet Research (2015)
[3]. Bettstetter, C., Vogel, H., Eberspacher, J.: GSM Phase 2+ General Packet Radio Service: Architecture, Protocols, and Air Interface. IEEE Communications Surveys (2016)
[4]. Brasche, G., Walke, B.: Concepts, Services, and Protocols of the New GSM Phase 2+ General Packet Radio Service. IEEE Communications Magazine (2017)
[5]. Brown, J., Shipman, B., Vetter, R.: SMS: The Short Message Service. Computer (2017)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancing Shadow Area Using RGB Color Space |
Country | : | India |
Authors | : | Ipsita Samal || Subhramshu Sekhar Panda |
: | 10.9790/0661-2006036268 |
Abstract:Shadow detection and removal from color images is invariably significant for image processing.
Existing methods use illuminant invariant methods to detect and minimize shadow which is computationally
expensive. RGB color space based shadow removal method is existing one which blurs shadow edges. The
performance of this existing method mainly depends on structuring element. To overcome all disadvantages, this
paper is aimed to utilize RGB color space with modified structuring element. The effect of shadow is decreased
on pixel while increasing values of 3 color channels of pixel using modified approach. Experiment results show
that proposed system is computationally inexpensive and can robustly remove shadow from complex images.
Keywords: Enhancing Shadow Area, RGB Color space, Shadow Detection, Shadow Removal, Shadow mask
[1]. Li Xu Feihu Qi Renjie Jiang (2006), "Shadow Removal from a Single Image", IEEE Sixth International Conference on Intelligent
Systems Design and Applications,. ISDA '06, Vol. 2, pp.1049-1054.
[2]. Ruiqi Guo Qieyun Dai Derek Hoiem (2011), "Single-Image Shadow Detection and Removal using Paired Regions", 2011 IEEE
Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2033-2040.
[3]. Yael Shor Dani Lischinski (2008), "The Shadow Meets the Mask: Pyramid-Based Shadow Removal", Computer Graphics Forum,
Volume 27, Number 2, pp577–586.
[4]. Haijian Ma Qiming Qin Xinyi Shen, (2008), "Shadow Segmentation And Compensation In High Resolution SatelliteImages",IEEE
International conference on Geoscience and Remote Sensing Symposium, Vol. 2, pp: 1036-1039
[5]. G. D. Finlayson, M. S. Drew, and C. Lu. (2009), "Entropy minimization for shadow removal", IJCV,85(1):35 –57,
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In this paper we examine the management of human resources in public administration in The Republic
of Srpska, with special emphasis on the staff training. Since the process of training staff is very long and complex
and there are a lot of different areas of knowledge that staff in public administration should be competent in, here
we focus only on a segment of knowledge concerning office (administrative) operations. Office management
involves the tasks in the public administration required to register, follow the progress of work and provide the
essential functions of the public administration organisation. We will look at the knowledge required to properly
understand office work, planning, the start and finish of work according to the agreed schedule and to the
satisfaction of the users and service providers. We will use the latest tools, knowledge bases, ontologies and the
Semantic Web to demonstrate that management and staff training may be conducted more efficiently. In order to
update the knowledge base we will use Protégé-OWL editor......
Keywords:- knowledge bases, ontologies, training staff, office management, software tools
[1]. K. Klarin, "Ontologija i razvoj informacijskog sustava u javnoj upravi," CASE 23, Zagreb, 2011.
[2]. W. N. Borst, "Construction of Engineering Ontologies for Knowledge Sharing and Reuse," Centre for Telematica and Information
Technology, University of Twenty, Enschede, The Netherlands, 1997.
[3]. Paunović L., Uticaj ontologija na funkcionalnost Web-a, INFOTEH-JAHORINA, Vol. 11, March 2012.
[4]. B. Smith, C. Welty, "Ontologies: Towards a New Synthesis," FOIS'01, October 17-19, 2001, Ogunquit, Maine, USA, 2001.
[5]. Radivojević M., Concept for Advanced Electronic, Mobile and Intelligent Government Services, International Journal of Managerial
Studies and Research (IJMSR) Volume – 1, Issue-3, H.No: 8-3-229/A/7, 2013.