Published: Jun 28, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.302630
Volume 11
Adebayo Tolulope Adedugba, Olaleke O. Ogunnaike, Kingsley A. Adeyemo, Busola E. Kehinde, Gbenga Oke
Inventory optimality is an option of energy utilization proportionality that can lessen carbon emanations and maximize profitability. This study proposes an inventory management model in which the...
Show More
Inventory optimality is an option of energy utilization proportionality that can lessen carbon emanations and maximize profitability. This study proposes an inventory management model in which the stock volume is optimally decided to diminish energy per resource utilized in-other to reduce carbon emanations. This will likewise help in concluding renewal volume optimally. Consequently, the study utilized economic order quantity (EOQ) to decide inventory volumes in-other to decrease carbon emanations so as to augment profits of the inventory chain. Partial least square(PLS) was additionally utilized to examine the extent of inventory management frameworks on environmental sustainability. The study, therefore, shows its oddity and pertinency by utilizing economic order quantity(EOQ) and partial least square(PLS) to examine and optimize inventory respectively, as it gives a perspective of decreasing carbon emanations during inventory procedures.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Adedugba, Adebayo Tolulope, et al. "Inventory Management Sustainability: A Case of Carbon Emanation Reduction in Selected Ceramics Manufacturing Firms in Lagos State, Nigeria." IJSDA vol.11, no.1 2022: pp.1-14. http://doi.org/10.4018/IJSDA.302630
APA
Adedugba, A. T., Ogunnaike, O. O., Adeyemo, K. A., Kehinde, B. E., & Oke, G. (2022). Inventory Management Sustainability: A Case of Carbon Emanation Reduction in Selected Ceramics Manufacturing Firms in Lagos State, Nigeria. International Journal of System Dynamics Applications (IJSDA), 11(1), 1-14. http://doi.org/10.4018/IJSDA.302630
Chicago
Adedugba, Adebayo Tolulope, et al. "Inventory Management Sustainability: A Case of Carbon Emanation Reduction in Selected Ceramics Manufacturing Firms in Lagos State, Nigeria," International Journal of System Dynamics Applications (IJSDA) 11, no.1: 1-14. http://doi.org/10.4018/IJSDA.302630
Export Reference

Published: Nov 3, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.302631
Volume 11
Justice Kwame Appati, Winfred Yaokumah, Ebenezer Owusu, Paul Nii Tackie Ammah
One among a lot of public health concerns in rural and tropical areas is the human intestinal parasite. Traditionally, diagnosis of these parasites is by visual analysis of stool specimens, which is...
Show More
One among a lot of public health concerns in rural and tropical areas is the human intestinal parasite. Traditionally, diagnosis of these parasites is by visual analysis of stool specimens, which is usually tedious and time-consuming. In this study, the authors combine techniques in the Laplacian pyramid, Gabor filter, and wavelet to build a feature vector for the discrimination of intestinal worm in a low-resolution image captured with mobile devices. The dimension of the feature vector is reduced using principal component analysis, and the resultant vector is considered as input to the SVM classifier. The proposed framework was applied to the Makerere intestinal dataset. At its preliminary stage, the results demonstrate satisfactory classification with an accuracy rate of 65.22% with possible extension in future work.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Appati, Justice Kwame, et al. "Primary Mobile Image Analysis of Human Intestinal Worm Detection." IJSDA vol.11, no.1 2022: pp.1-16. http://doi.org/10.4018/IJSDA.302631
APA
Appati, J. K., Yaokumah, W., Owusu, E., & Ammah, P. N. (2022). Primary Mobile Image Analysis of Human Intestinal Worm Detection. International Journal of System Dynamics Applications (IJSDA), 11(1), 1-16. http://doi.org/10.4018/IJSDA.302631
Chicago
Appati, Justice Kwame, et al. "Primary Mobile Image Analysis of Human Intestinal Worm Detection," International Journal of System Dynamics Applications (IJSDA) 11, no.1: 1-16. http://doi.org/10.4018/IJSDA.302631
Export Reference

Published: Aug 26, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.302632
Volume 11
Bharati Patel, Aakanksha Sharaff, Satish Verulkar
The statistical growth analysis of field crop has become a great challenge in agriculture. Analyzing the growth of crop through automation provides extensive significance to the farmers for getting...
Show More
The statistical growth analysis of field crop has become a great challenge in agriculture. Analyzing the growth of crop through automation provides extensive significance to the farmers for getting information about the problem arising in plants due to irregular growth monitoring. The idea behind this work is the importance of mapping with pixel-based clustering technique for growth analysis in terms of height calculation of rice crop (rice variety is MTU-1010). Height measurement plays a vital role in regular assessment for a healthy crop, and the approach proposed in this work achieves 97.58% accuracy of 14 sampled datasets taken from Indira Gandhi Agriculture University of Raipur, Chhattisgarh; a real-time dataset has been prepared. Proposed work is used for analyzing vertical as well as horizontal scaling technique. Vertical mapping provides the height of a single plant whereas horizontal mapping using k-means clustering provides an average height of the whole field. This work uses machine learning, and image processing techniques are used for this work.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Patel, Bharati, et al. "Statistical Growth Analysis of Rice Plants in Chhattisgarh Region Using Automated Pixel-Based Mapping Technique." IJSDA vol.11, no.1 2022: pp.1-20. http://doi.org/10.4018/IJSDA.302632
APA
Patel, B., Sharaff, A., & Verulkar, S. (2022). Statistical Growth Analysis of Rice Plants in Chhattisgarh Region Using Automated Pixel-Based Mapping Technique. International Journal of System Dynamics Applications (IJSDA), 11(1), 1-20. http://doi.org/10.4018/IJSDA.302632
Chicago
Patel, Bharati, Aakanksha Sharaff, and Satish Verulkar. "Statistical Growth Analysis of Rice Plants in Chhattisgarh Region Using Automated Pixel-Based Mapping Technique," International Journal of System Dynamics Applications (IJSDA) 11, no.1: 1-20. http://doi.org/10.4018/IJSDA.302632
Export Reference

Published: Sep 2, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.302633
Volume 11
Priti Srinivas Sajja, Rasendu Mishra
This paper focuses on using the cooperative neuro-fuzzy system for the effective and customised selection of entities from large and heterogeneous resources by presenting a general architecture. An...
Show More
This paper focuses on using the cooperative neuro-fuzzy system for the effective and customised selection of entities from large and heterogeneous resources by presenting a general architecture. An experiment is carried out with the fast-moving consumer goods to prove the utility of the architecture. It is observed that most consumers go for the frequent purchase of fast-moving consumer items. Further, various brands, costs, discounts, schemes, quantities, and reviews might make it challenging. Hence, such decisions need to be intelligent and practically feasible in terms of time and effort. The paper discusses neural networks to categorise the entities, type-1 & 2 fuzzy membership functions with rules, training sets, and graphical views of the fuzzy rules and the experiment details. Besides the generic approach and experiment, the paper also discusses the work done so far with their limitations and applications in other domains. At the end, the paper presents the limitations and possible future enhancements.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Sajja, Priti Srinivas, and Rasendu Mishra. "Effective Selection of Entities From Heterogeneous and Large Resources Using a Cooperative Neuro-Fuzzy System: A Case of Fast Moving Consumer Goods." IJSDA vol.11, no.1 2022: pp.1-17. http://doi.org/10.4018/IJSDA.302633
APA
Sajja, P. S. & Mishra, R. (2022). Effective Selection of Entities From Heterogeneous and Large Resources Using a Cooperative Neuro-Fuzzy System: A Case of Fast Moving Consumer Goods. International Journal of System Dynamics Applications (IJSDA), 11(1), 1-17. http://doi.org/10.4018/IJSDA.302633
Chicago
Sajja, Priti Srinivas, and Rasendu Mishra. "Effective Selection of Entities From Heterogeneous and Large Resources Using a Cooperative Neuro-Fuzzy System: A Case of Fast Moving Consumer Goods," International Journal of System Dynamics Applications (IJSDA) 11, no.1: 1-17. http://doi.org/10.4018/IJSDA.302633
Export Reference

Published: Sep 1, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.302634
Volume 11
Ratish Kumar, Rajiv Kumar, Madhav Ji Nigam
By the second decade of the 21st century, there has been a multi-faceted technological development in the field of networked control system (NCS). This progression in NCS has not only revealed its...
Show More
By the second decade of the 21st century, there has been a multi-faceted technological development in the field of networked control system (NCS). This progression in NCS has not only revealed its significant applications in various areas but has also unveiled various difficulties associated with it that hampered the operations of networked control system. Network-induced delays are issues that promote many other issues like packet dropout and brevity in bandwidth utilization. In this research article, network-induced delay has been curtailed by using the harmony between Smith predictor and Markov approach. The error estimation of the Smith predictor controller used for the simulation is carried out through a Markov approach which allows the control of the system to operate smoothly by optimizing the control signal. To implement the proposed method, the authors have simulated a third order system in Matlab/Simulink software.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Kumar, Ratish, et al. "Performance Accretion in Delay Compensation of Networked Control System Using Markov Approach-Based Randomness Estimation in Smith Predictor." IJSDA vol.11, no.1 2022: pp.1-17. http://doi.org/10.4018/IJSDA.302634
APA
Kumar, R., Kumar, R., & Nigam, M. J. (2022). Performance Accretion in Delay Compensation of Networked Control System Using Markov Approach-Based Randomness Estimation in Smith Predictor. International Journal of System Dynamics Applications (IJSDA), 11(1), 1-17. http://doi.org/10.4018/IJSDA.302634
Chicago
Kumar, Ratish, Rajiv Kumar, and Madhav Ji Nigam. "Performance Accretion in Delay Compensation of Networked Control System Using Markov Approach-Based Randomness Estimation in Smith Predictor," International Journal of System Dynamics Applications (IJSDA) 11, no.1: 1-17. http://doi.org/10.4018/IJSDA.302634
Export Reference

Published: Sep 16, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.307566
Volume 11
Poonam Mittal, Monika Mangla, Nonita Sharma, Reena, Suneeta Satpathy, Sachi Nandan Mohanty
During this pandemic outbreak of COVID-19, the whole world is getting severely affected in respect of population health and economy. This novel virus has brought the whole world including the most...
Show More
During this pandemic outbreak of COVID-19, the whole world is getting severely affected in respect of population health and economy. This novel virus has brought the whole world including the most developed countries to a standstill in a very short span like never before. The prime reason for this unexpected outburst of COVID-19 is lack of effective medicine and lack of proper understanding of the influencing factors. Here, the authors aim to find the effect of epidemiological factors that influence its spread using a fuzzy approach. For the same, a total of nine factors have been considered which are classified into risk and preventive factors. This fuzzy model supports to understand and evaluate the impact of these factors on the spread of COVID-19. Also, the model establishes a basis for understanding the effect of risk factors on preventive factors and vice versa. It is worth mentioning that this is the first attempt to analyze the effect of clinical and epidemiological factors with respect to COVID-19 using a fuzzy approach.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Mittal, Poonam, et al. "Fuzzy Modelling of Clinical and Epidemiological Factors for COVID-19." IJSDA vol.11, no.1 2022: pp.1-16. http://doi.org/10.4018/IJSDA.307566
APA
Mittal, P., Mangla, M., Sharma, N., Reena, Satpathy, S., & Mohanty, S. N. (2022). Fuzzy Modelling of Clinical and Epidemiological Factors for COVID-19. International Journal of System Dynamics Applications (IJSDA), 11(1), 1-16. http://doi.org/10.4018/IJSDA.307566
Chicago
Mittal, Poonam, et al. "Fuzzy Modelling of Clinical and Epidemiological Factors for COVID-19," International Journal of System Dynamics Applications (IJSDA) 11, no.1: 1-16. http://doi.org/10.4018/IJSDA.307566
Export Reference

Published: Aug 11, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa1
Volume 11
Deepa Bura, Amit Choudhary
Software plays an important role in effective computing and communication of any services. It become crucial to identify some critical parts of the software that can lead to enhanced computing and...
Show More
Software plays an important role in effective computing and communication of any services. It become crucial to identify some critical parts of the software that can lead to enhanced computing and increases efficiency of the software. Dependency plays a significant role in finding relationship amongst classes and predicting change prone classes. This paper aims to enhance Behavioral Dependency by defining 6 types of dependencies amongst classes. These are (i) direct behavioral dependency (ii) indirect behavioral dependency (iii) internal behavioral dependency (iv) external behavioral dependency (v) indirect internal behavioral dependency and (vi) Indirect External Behavioral Dependency. Evaluating these dependencies, gives accurate results for the prediction of change prone classes. Further, paper compares proposed approach with existing methods.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Bura, Deepa, and Amit Choudhary. "Enhancing Behavioral Dependency for Effective Computing in Software." IJSDA vol.11, no.2 2022: pp.1-23. http://doi.org/10.4018/IJSDA.20220701.oa1
APA
Bura, D. & Choudhary, A. (2022). Enhancing Behavioral Dependency for Effective Computing in Software. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-23. http://doi.org/10.4018/IJSDA.20220701.oa1
Chicago
Bura, Deepa, and Amit Choudhary. "Enhancing Behavioral Dependency for Effective Computing in Software," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-23. http://doi.org/10.4018/IJSDA.20220701.oa1
Export Reference

Published: Jul 29, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa2
Volume 11
Abha Jain, Ankita Bansal
The need of the customers to be connected to the network at all times has led to the evolution of mobile technology. Operating systems play a vitol role when we talk of technology. Nowadays, Android...
Show More
The need of the customers to be connected to the network at all times has led to the evolution of mobile technology. Operating systems play a vitol role when we talk of technology. Nowadays, Android is one of the popularly used operating system in mobile phones. Authors have analysed three stable versions of Android, 6.0, 7.0 and 8.0. Incorporating a change in the version after it is released requires a lot of rework and thus huge amount of costs are incurred. In this paper, the aim is to reduce this rework by identifying certain parts of a version during early phase of development which need careful attention. Machine learning prediction models are developed to identify the parts which are more prone to changes. The accuracy of such models should be high as the developers heavily rely on them. The high dimensionality of the dataset may hamper the accuracy of the models. Thus, the authors explore four dimensionality reduction techniques, which are unexplored in the field of network and communication. The results concluded that the accuracy improves after reducing the features.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Jain, Abha, and Ankita Bansal. "Models for Efficient Utilization of Resources for Upgrading Android Mobile Technology." IJSDA vol.11, no.2 2022: pp.1-22. http://doi.org/10.4018/IJSDA.20220701.oa2
APA
Jain, A. & Bansal, A. (2022). Models for Efficient Utilization of Resources for Upgrading Android Mobile Technology. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-22. http://doi.org/10.4018/IJSDA.20220701.oa2
Chicago
Jain, Abha, and Ankita Bansal. "Models for Efficient Utilization of Resources for Upgrading Android Mobile Technology," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-22. http://doi.org/10.4018/IJSDA.20220701.oa2
Export Reference

Published: Oct 8, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa3
Volume 11
Deena Nath Gupta, Rajendra Kumar
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints....
Show More
IoT devices are having many constraints related to computation power and memory etc. Many existing cryptographic algorithms of security could not work with IoT devices because of these constraints. Since the sensors are used in large amount to collect the relevant data in an IoT environment, and different sensor devices transmit these data as useful information, the first thing needs to be secure is the identity of devices. The second most important thing is the reliable information transmission between a sensor node and a sink node. While designing the cryptographic method in the IoT environment, programmers need to keep in mind the power limitation of the constraint devices. Mutual authentication between devices and encryption-decryption of messages need some sort of secure key. In the proposed cryptographic environment, there will be a hierarchical clustering, and devices will get registered by the authentication center at the time they enter the cluster. The devices will get mutually authenticated before initiating any conversation and will have to follow the public key protocol.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gupta, Deena Nath, and Rajendra Kumar. "Multi-Layer and Clustering-Based Security Implementation for an IoT Environment." IJSDA vol.11, no.2 2022: pp.1-21. http://doi.org/10.4018/IJSDA.20220701.oa3
APA
Gupta, D. N. & Kumar, R. (2022). Multi-Layer and Clustering-Based Security Implementation for an IoT Environment. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-21. http://doi.org/10.4018/IJSDA.20220701.oa3
Chicago
Gupta, Deena Nath, and Rajendra Kumar. "Multi-Layer and Clustering-Based Security Implementation for an IoT Environment," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-21. http://doi.org/10.4018/IJSDA.20220701.oa3
Export Reference

Published: Aug 26, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa4
Volume 11
Shailja Gupta, Manpreet Kaur, Sachin Lakra
In the recent times transfer learning models have known to exhibited good results in the area of text classification for question-answering, summarization, next word prediction but these learning...
Show More
In the recent times transfer learning models have known to exhibited good results in the area of text classification for question-answering, summarization, next word prediction but these learning models have not been extensively used for the problem of hate speech detection yet. We anticipate that these networks may give better results in another task of text classification i.e. hate speech detection. This paper introduces a novel method of hate speech detection based on the concept of attention networks using the BERT attention model. We have conducted exhaustive experiments and evaluation over publicly available datasets using various evaluation metrics (precision, recall and F1 score). We show that our model outperforms all the state-of-the-art methods by almost 4%. We have also discussed in detail the technical challenges faced during the implementation of the proposed model.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Gupta, Shailja, et al. "BERT-BU12 Hate Speech Detection Using Bidirectional Encoder-Decoder." IJSDA vol.11, no.2 2022: pp.1-16. http://doi.org/10.4018/IJSDA.20220701.oa4
APA
Gupta, S., Kaur, M., & Lakra, S. (2022). BERT-BU12 Hate Speech Detection Using Bidirectional Encoder-Decoder. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-16. http://doi.org/10.4018/IJSDA.20220701.oa4
Chicago
Gupta, Shailja, Manpreet Kaur, and Sachin Lakra. "BERT-BU12 Hate Speech Detection Using Bidirectional Encoder-Decoder," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-16. http://doi.org/10.4018/IJSDA.20220701.oa4
Export Reference

Published: Aug 11, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa5
Volume 11
Ravindra Kumar Singh, Harsh Kumar Verma
Twitter has gained a significant prevalence among the users across the numerous domains, in the majority of the countries, and among different age groups. It servers a real-time micro-blogging...
Show More
Twitter has gained a significant prevalence among the users across the numerous domains, in the majority of the countries, and among different age groups. It servers a real-time micro-blogging service for communication and opinion sharing. Twitter is sharing its data for research and study purposes by exposing open APIs that make it the most suitable source of data for social media analytics. Applying data mining and machine learning techniques on tweets is gaining more and more interest. The most prominent enigma in social media analytics is to automatically identify and rank influencers. This research is aimed to detect the user's topics of interest in social media and rank them based on specific topics, domains, etc. Few hybrid parameters are also distinguished in this research based on the post's content, post’s metadata, user’s profile, and user's network feature to capture different aspects of being influential and used in the ranking algorithm. Results concluded that the proposed approach is well effective in both the classification and ranking of individuals in a cluster.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Singh, Ravindra Kumar, and Harsh Kumar Verma. "User Activity Classification and Domain-Wise Ranking Through Social Interactions." IJSDA vol.11, no.2 2022: pp.1-15. http://doi.org/10.4018/IJSDA.20220701.oa5
APA
Singh, R. K. & Verma, H. K. (2022). User Activity Classification and Domain-Wise Ranking Through Social Interactions. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-15. http://doi.org/10.4018/IJSDA.20220701.oa5
Chicago
Singh, Ravindra Kumar, and Harsh Kumar Verma. "User Activity Classification and Domain-Wise Ranking Through Social Interactions," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-15. http://doi.org/10.4018/IJSDA.20220701.oa5
Export Reference

Published: Oct 8, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220701.oa6
Volume 11
Aruna Malik, Rajeev Kumar
Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently...
Show More
Nowadays, Reversible Data Hiding (RDH) is used extensively in information sensitive communication domains to protect the integrity of hidden data and the cover medium. However, most of the recently proposed RDH methods lack robustness. Robust RDH methods are required to protect the hidden data from security attacks at the time of communication between the sender and receiver. In this paper, we propose a Robust RDH scheme using IPVO based pairwise embedding. The proposed scheme is designed to prevent unintentional modifications caused to the secret data by JPEG compression. The cover image is decomposed into two planes namely HSB plane and LSB plane. As JPEG compression most likely modifies the LSBs of the cover image during compression, it is best not to hide the secret data into LSB planes. So, the proposed method utilizes a pairwise embedding to embed secret data into HSB plane of the cover image. High fidelity improved pixel value ordering (IPVO) based pairwise embedding ensures that the embedding performance of the proposed method is improved.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Malik, Aruna, and Rajeev Kumar. "Robust RDH Technique Using Sorting and IPVO-Based Pairwise PEE for Secure Communication." IJSDA vol.11, no.2 2022: pp.1-17. http://doi.org/10.4018/IJSDA.20220701.oa6
APA
Malik, A. & Kumar, R. (2022). Robust RDH Technique Using Sorting and IPVO-Based Pairwise PEE for Secure Communication. International Journal of System Dynamics Applications (IJSDA), 11(2), 1-17. http://doi.org/10.4018/IJSDA.20220701.oa6
Chicago
Malik, Aruna, and Rajeev Kumar. "Robust RDH Technique Using Sorting and IPVO-Based Pairwise PEE for Secure Communication," International Journal of System Dynamics Applications (IJSDA) 11, no.2: 1-17. http://doi.org/10.4018/IJSDA.20220701.oa6
Export Reference

Published: Oct 1, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.287113
Volume 11
Anwar E. Ibrahim, Salah Abdel-Mageid, Nadra Nada, Marwa A. Elshahed
Biometrics is an interesting study due to the incredible progress in security. Electrocardiogram (ECG) signal analysis is an active research area for diagnoses. Various techniques have been proposed...
Show More
Biometrics is an interesting study due to the incredible progress in security. Electrocardiogram (ECG) signal analysis is an active research area for diagnoses. Various techniques have been proposed in human identification system based on ECG. This work investigates in ECG as a biometric trait which based on uniqueness represented by physiological and geometrical of ECG signal of person.In this paper, a proposed non-fiducial identification system is presented with comparative study using Radial Basis Functions (RBF) neural network, Back Propagation (BP) neural network and Support Vector Machine (SVM) as classification methods. The Discrete Wavelet Transform method is applied to extract features from the ECG signal. The experimental results show that the proposed scheme achieves high identification rate compared to the existing techniques. Furthermore, the two classifiers RBF and BP are integrated to achieve higher rate of human identification.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Ibrahim, Anwar E., et al. "Human Identification Using Electrocardiogram Signal as a Biometric Trait." IJSDA vol.11, no.3 2022: pp.1-17. http://doi.org/10.4018/IJSDA.287113
APA
Ibrahim, A. E., Abdel-Mageid, S., Nada, N., & Elshahed, M. A. (2022). Human Identification Using Electrocardiogram Signal as a Biometric Trait. International Journal of System Dynamics Applications (IJSDA), 11(3), 1-17. http://doi.org/10.4018/IJSDA.287113
Chicago
Ibrahim, Anwar E., et al. "Human Identification Using Electrocardiogram Signal as a Biometric Trait," International Journal of System Dynamics Applications (IJSDA) 11, no.3: 1-17. http://doi.org/10.4018/IJSDA.287113
Export Reference

Published: Oct 8, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.287114
Volume 11
Eissa Jaber Alreshidi
Securing vehicles, especially against theft, has become a significant concern. Smart antitheft solutions have emerged to provide better protection. However, most existing smart vehicle antitheft...
Show More
Securing vehicles, especially against theft, has become a significant concern. Smart antitheft solutions have emerged to provide better protection. However, most existing smart vehicle antitheft solutions use (GSM) and (GPS) technologies to track stolen vehicles and these technologies are not sufficiently efficient in tracking vehicles in real-time. Hence, there is a need to optimise solutions to incorporate new technologies such as Internet of Things (IoT), Fog Computing (FC), and Face Recognition (FR) technologies. This paper introduces the new concept of Fog Computing to existing tracking systems and presents the design and the development of the Internet of Things (IoT) Cloud-based vehicle anti-theft system to pinpoint the exact location of the stolen vehicle in real-time. The proposed system extends the existing tracking systems to include advanced features influenced by advanced computing technologies such as Fog, Cloud, IoT and FR. Furthermore, it sheds light on the benefits of using FC combined with Cloud Computing (CC) to provide a more accurate and reliable tracking system.
Content Forthcoming
Add to Your Personal Library: Article Published: Sep 28, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.287115
Volume 11
Meng-Hsuan Fu, An-Shyang Lee
Ballots are often hold for fair decisions such as party theme selecting, however, the existing traditional ballot has some problems involving amount of human resources, cost of places, equipment...
Show More
Ballots are often hold for fair decisions such as party theme selecting, however, the existing traditional ballot has some problems involving amount of human resources, cost of places, equipment, time and traffic, and repeated procedures. In order to solve the issues aforementioned, a ballot blockchain system is designed and implemented based on the smart contract of Ethereum. It is designed on the core blockchain technologies of the decentralized ledger technology, using a secure hash algorithm, anonymous user, incorruptible data, and adopting a public blockchain. The ballot blockchain system is implemented based on the MetaMask verification and the Remix interface development environment. The smart contract plays the role of the decision-maker for controlling ballot activities instead of numerous human tasks. All ballot transactions are recorded in the ballot blockchain permanently when the ballot completed. The aim of the ballot blockchain system is to achieve a fair, less time-consuming, secured, and transparent environment.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Fu, Meng-Hsuan, and An-Shyang Lee. "Ballot Blockchain System Design and Development on Ethereum Platform." IJSDA vol.11, no.3 2022: pp.1-12. http://doi.org/10.4018/IJSDA.287115
APA
Fu, M. & Lee, A. (2022). Ballot Blockchain System Design and Development on Ethereum Platform. International Journal of System Dynamics Applications (IJSDA), 11(3), 1-12. http://doi.org/10.4018/IJSDA.287115
Chicago
Fu, Meng-Hsuan, and An-Shyang Lee. "Ballot Blockchain System Design and Development on Ethereum Platform," International Journal of System Dynamics Applications (IJSDA) 11, no.3: 1-12. http://doi.org/10.4018/IJSDA.287115
Export Reference

Published: Oct 15, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220901.oa1
Volume 11
Priya Bhaskar Pandharbale, Sachi Nandan Mohanty, Alok Kumar Jagadev
Normally web services are classified originate in on the quality of service, wherever the term quality is not absolute and it is a relative term. The quality of web services is measured or derived...
Show More
Normally web services are classified originate in on the quality of service, wherever the term quality is not absolute and it is a relative term. The quality of web services is measured or derived using various parameters like reliability, scalability, flexibility, availability, etc. However, the limitation of these methods is that they are producing similar web services in recommendation lists some times. To address this research problem, the novel improved the Clustering-based web service recommendation method is proposed in this project. This approach is mainly dealing to produce diversity in the results of web service recommendation. In this method, functional interest, QoS preference, and diversity features are combined to produce the unique recommendation list of web services to end-users. To produce the unique recommendation results, we proposed a vary web service classify order that is clustering-based on web services' functional relevance such as non-useful pertinence, recorded client intrigue importance, potential client intrigue significance, etc.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Pandharbale, Priya Bhaskar, et al. "Novel Clustering-Based Web Service Recommendation Framework." IJSDA vol.11, no.5 2022: pp.1-15. http://doi.org/10.4018/IJSDA.20220901.oa1
APA
Pandharbale, P. B., Mohanty, S. N., & Jagadev, A. K. (2022). Novel Clustering-Based Web Service Recommendation Framework. International Journal of System Dynamics Applications (IJSDA), 11(5), 1-15. http://doi.org/10.4018/IJSDA.20220901.oa1
Chicago
Pandharbale, Priya Bhaskar, Sachi Nandan Mohanty, and Alok Kumar Jagadev. "Novel Clustering-Based Web Service Recommendation Framework," International Journal of System Dynamics Applications (IJSDA) 11, no.5: 1-15. http://doi.org/10.4018/IJSDA.20220901.oa1
Export Reference

Published: Aug 25, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20220901.oa2
Volume 11
Peter Oluwatosin Oyekola, Kamalakanta Muduli, Tochukwu Cyril Ngene, Shoeb Ahmed Syed
This study is focussed on the design and modelling of a low-cost ventilator design which can be developed using locally sourced materials in Nigeria. This is meant to aid in the Country’s fight...
Show More
This study is focussed on the design and modelling of a low-cost ventilator design which can be developed using locally sourced materials in Nigeria. This is meant to aid in the Country’s fight against the current COVID-19 pandemic where there is a shortage of ventilators. The ventilator design in this research was based on a mechanical AMBU bag compression principle using the Volume-Control Ventilation(VCV) mode which will eliminate the need for manual compression which can be tedious and uncontrolled. The design is powered by an electric motor with variable speed and tidal volume control. It also features an alarm which alerts medical personnel of unstable conditions in the system parameters. This prototype shows that the mechanical compression systems is a viable and more economical option which provides the essential features required in the standard existing technologies.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Oyekola, Peter Oluwatosin, et al. "COVID-19 Ventilator: A Variable Compression Model." IJSDA vol.11, no.5 2022: pp.1-12. http://doi.org/10.4018/IJSDA.20220901.oa2
APA
Oyekola, P. O., Muduli, K., Ngene, T. C., & Syed, S. A. (2022). COVID-19 Ventilator: A Variable Compression Model. International Journal of System Dynamics Applications (IJSDA), 11(5), 1-12. http://doi.org/10.4018/IJSDA.20220901.oa2
Chicago
Oyekola, Peter Oluwatosin, et al. "COVID-19 Ventilator: A Variable Compression Model," International Journal of System Dynamics Applications (IJSDA) 11, no.5: 1-12. http://doi.org/10.4018/IJSDA.20220901.oa2
Export Reference

Published: Jun 10, 2022
Converted to Gold OA:
DOI: 10.4018/IJSDA.302665
Volume 11
T. Venkata Lakshmi, M. Kamaraju
An innovative technology named FinFET (Fin Field Effect Transistor) has been developed to offer better transistor circuit design and to compensate the necessity of superior storage system (SS). As...
Show More
An innovative technology named FinFET (Fin Field Effect Transistor) has been developed to offer better transistor circuit design and to compensate the necessity of superior storage system (SS). As gate loses control over the channel, CMOS devices faces some major issues like increase in manufacturing cost, less reliability and yield, increase of ON current, short channel effects (SCEs), increase in leakage currents etc. However, it is necessary for the memory to have less power dissipation, short access time and low leakage current. The traditional design of SRAM (Static RAM) using CMOS technology represents severe performance degradation due to its higher power dissipation and leakage current. Thus, a Nano-scaled device named FinFET is introduced for designing SRAM since it has three dimensional design of the gate. FinFET has been used to improve the overall performance and has been chosen as a transistor of choice because it is not affected by SCEs. In this work, we have reviewed various FinFET based SRAM cells, performance metrics and the comparison over different technologies.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Lakshmi, T. Venkata, and M. Kamaraju. "A Review on SRAM Memory Design Using FinFET Technology." IJSDA vol.11, no.6 2022: pp.1-21. http://doi.org/10.4018/IJSDA.302665
APA
Lakshmi, T. V. & Kamaraju, M. (2022). A Review on SRAM Memory Design Using FinFET Technology. International Journal of System Dynamics Applications (IJSDA), 11(6), 1-21. http://doi.org/10.4018/IJSDA.302665
Chicago
Lakshmi, T. Venkata, and M. Kamaraju. "A Review on SRAM Memory Design Using FinFET Technology," International Journal of System Dynamics Applications (IJSDA) 11, no.6: 1-21. http://doi.org/10.4018/IJSDA.302665
Export Reference

Published: Sep 22, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20221101.oa1
Volume 11
Venkat Pankaj Lahari Molleti, Rama Sudha Kashibhatla, Vijaya Santhi Rajamahanthi
Maximum power point tracking(MPPT) control is an indispensable aspect of photovoltaic(PV) systems. Many MPPT techniques including a few based on soft-computing have been employed earlier. The...
Show More
Maximum power point tracking(MPPT) control is an indispensable aspect of photovoltaic(PV) systems. Many MPPT techniques including a few based on soft-computing have been employed earlier. The soft-computing techniques include fuzzy-FSMs (Finite State Machines)which are integration of fuzzy logic (FL) into states or transitions of FSMs which are used for control and modeling of real-time systems. However, FSMs pose certain disadvantages as compared to its advanced variant called ‘statecharts’. In this work, statecharts with abstraction layers are proposed for MPPT control of PV system. An abstract-statechart MPPT(ASM) controller is developed and is verified with PV system using co-simulation. A C++ based FL MPPT program is also developed, which is independent of any predefined and simulation-only functions. A conceptual estimation of execution time of such a FL MPPT program is presented and compared with the execution times delivered by proposed ASM controller. It can be observed that the ASM controller gives accurate, fast tracking speeds, along with the advantage of abstraction.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Molleti, Venkat Pankaj Lahari, et al. "MPPT Control of Photovoltaic Systems Using Statechart With Abstraction and Its Comparison With Fuzzy Logic." IJSDA vol.11, no.6 2022: pp.1-14. http://doi.org/10.4018/IJSDA.20221101.oa1
APA
Molleti, V. P., Kashibhatla, R. S., & Rajamahanthi, V. S. (2022). MPPT Control of Photovoltaic Systems Using Statechart With Abstraction and Its Comparison With Fuzzy Logic. International Journal of System Dynamics Applications (IJSDA), 11(6), 1-14. http://doi.org/10.4018/IJSDA.20221101.oa1
Chicago
Molleti, Venkat Pankaj Lahari, Rama Sudha Kashibhatla, and Vijaya Santhi Rajamahanthi. "MPPT Control of Photovoltaic Systems Using Statechart With Abstraction and Its Comparison With Fuzzy Logic," International Journal of System Dynamics Applications (IJSDA) 11, no.6: 1-14. http://doi.org/10.4018/IJSDA.20221101.oa1
Export Reference

Published: Sep 22, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20221101.oa2
Volume 11
Priti Srinivas Sajja
The domain of fashion design evolves continuously and is highly personalised, demanding intelligent and customised recommendation. The traditional artificial intelligence-based systems offer...
Show More
The domain of fashion design evolves continuously and is highly personalised, demanding intelligent and customised recommendation. The traditional artificial intelligence-based systems offer solutions based on stored knowledge; hence they can be quickly obsolete and require high effort. To meet the fashion designers’ needs and provide tailor-made recommendations effectively, a hybrid genetic-fuzzy system is proposed with interactive fitness functions. The system is based on generic hybrid architecture using fuzzy logic and genetic algorithm, which can be used to evolve various products in different domains and tested with interactive fuzzy fitness functions. The design of the generic architecture meets the research gap identified through an in-depth literature survey. To prove the utility of the architecture, an experiment is carried out showing encoding scheme, genetic operators, fuzzy membership functions, and fuzzy rules. The results are also discussed, along with the comparison, advantages, applications, and possible future enhancements.
Content Forthcoming
Add to Your Personal Library: Article Published: Sep 24, 2021
Converted to Gold OA:
DOI: 10.4018/IJSDA.20221101.oa3
Volume 11
Srikanth M. V., V. V. K. D. V. Prasad, K. Satya Prasad
In this article an effort is made to identify brain tumor disease such as neoplastic, cerebrovascular, Alzheimer's, lethal, sarcoma diseases by successful fusion of images from magnetic resonance...
Show More
In this article an effort is made to identify brain tumor disease such as neoplastic, cerebrovascular, Alzheimer's, lethal, sarcoma diseases by successful fusion of images from magnetic resonance imaging (MRI) and computed tomography (CT). Two images are fused in three steps: The two images are independently segmented by hybrid combination of Particle swam optimization (PSO), Genetic algorithm and Symbiotic Organisms Search (SOS) named as hGAPSO-SOS by maximizing 2-dimensional Renyi entropy. Image thresholding with 2-D histogram is stronger in the segmentation than 1-D histogram. Remove the segmented regions with Scale Invariant Feature Transform (SIFT) algorithm. Also after image rotation and scaling, the SIFT algorithm is excellent at removing the features. The fusion laws are eventually rendered on the basis of type-2 blurry interval (IT2FL), where ambiguity effects are reduced unlike type-1. The uniqueness of the proposed study is evaluated on specific data collection of benchmark Image fusion and has proven stronger in all criteria of scale.
Content Forthcoming
Add to Your Personal Library: Article
Cite Article
Cite Article
MLA
Srikanth M. V., et al. "A 2D Histogram-Based Image Thresholding Using Hybrid Algorithms for Brain Image Fusion." IJSDA vol.11, no.6 2022: pp.1-24. http://doi.org/10.4018/IJSDA.20221101.oa3
APA
Srikanth M. V., Prasad, V. V., & Prasad, K. S. (2022). A 2D Histogram-Based Image Thresholding Using Hybrid Algorithms for Brain Image Fusion. International Journal of System Dynamics Applications (IJSDA), 11(6), 1-24. http://doi.org/10.4018/IJSDA.20221101.oa3
Chicago
Srikanth M. V., V. V. K. D. V. Prasad, and K. Satya Prasad. "A 2D Histogram-Based Image Thresholding Using Hybrid Algorithms for Brain Image Fusion," International Journal of System Dynamics Applications (IJSDA) 11, no.6: 1-24. http://doi.org/10.4018/IJSDA.20221101.oa3
Export Reference

IGI Global Open Access Collection provides all of IGI Global’s open access content in one convenient location and user-friendly interface
that can easily searched or integrated into library discovery systems.
Browse IGI Global Open
Access Collection
All inquiries regarding IJSDA should be directed to the attention of:
Submission-Related InquiriesProf. Ahmad Taher Azar
Editor-in-Chief
International Journal of System Dynamics Applications (IJSDA)
E-mails:
aazar@igi-global.com
Author Services Inquiries
For inquiries involving pre-submission concerns, please contact the Journal Development Division:
journaleditor@igi-global.comOpen Access Inquiries
For inquiries involving publishing costs, APCs, etc., please contact the Open Access Division:
openaccessadmin@igi-global.comProduction-Related Inquiries
For inquiries involving accepted manuscripts currently in production or post-production, please contact the Journal Production Division:
journalproofing@igi-global.comRights and Permissions Inquiries
For inquiries involving permissions, rights, and reuse, please contact the Intellectual Property & Contracts Division:
contracts@igi-global.comPublication-Related Inquiries
For inquiries involving journal publishing, please contact the Acquisitions Division:
acquisition@igi-global.comDiscoverability Inquiries
For inquiries involving sharing, promoting, and indexing of manuscripts, please contact the Citation Metrics & Indexing Division:
indexing@igi-global.com Editorial Office
701 E. Chocolate Ave.
Hershey, PA 17033, USA
717-533-8845 x100