Volume 5 Issue 11- November 2015
Page | Title | Full Text |
---|---|---|
355-373 | Fuzzy Systems and Applications Evolutionary
Genetic Algorithms in the Aviation Industry Afreen Bhumgara Abstract
The objective of the research explored the development of Fuzzy Systems and Applications Evolutionary Genetic algorithms in the Aviation Industry, and their demonstrated capability of solving different sets of problem emanating from a wide range of application domains affecting the aviation industry. The research problem statement develop investigated the limitations of approximate reasoning use in cascaded genetic algorithms for automatically generate high performance fuzzy systems used in automated aviation flight control in hazardous flight conditions with using minimal fuzzy sets and rules. The research methodology consisted of qualitative and quantitative research designs through analysis of systematic peer reviewed scholarly journals in the field of Fuzzy Systems and Applications Evolutionary Genetic algorithms in the Aviation Industry, as well as an analysis a sample of relevant case studies. The researcher found out that Fuzzy Systems and Applications Evolutionary Genetic algorithms in the Aviation Industry can be design in a varied number of ways depending on the required shape of the membership functions and appropriate degrees of affinity, and a major limitation of fuzzy inference systems included the limitations concerning the balance between accuracy and interpretability. Therefore, Evolutionary neuro fuzzy inference systems and applications hybridize the approximate reasoning with learning capabilities of evolutionary algorithms and neural networks, which promotes aviation safety personnel capabilities, and aircraft performance. Future research should be devoted in real time planning, and therefore developments should consider more research into delays on airports, weather conditions, and other aviation events that compromise safety and performance such as aviation accidents and attacks. Keywords- Approximate Reasoning, Aviation Industry, Evolutionary Genetic Algorithms, Fuzzy Rule Sets, Fuzzy Systems, Hybridization, Membership Functions, Neuro Fuzzy Inference Systems, Safety Procedures |
Full Text PDF |
374-377 | A Survey - Security Challenges and Schemes on
Wireless Sensor Network Princy S, P.K. Sasikumar Abstract
Wireless sensor network (WSN) is one of the emerging technologies to attract the researchers with its research challenges and can be applied on various domains. Now a day WSN applications are used on environmental detection, monitoring system, medical system, military and industrial is monitoring for transforming human life to different aspects. Depending on the applications used on the WSN, Security is one of the greatest challenges in WSNs and it is the essential part before designing the WSNs. In this paper a survey is taken related to the security on the wireless sensor network (WSN). Keywords—WSN, security, challenges, survey |
Full Text PDF |
378-382 | High Quality Voice Morphing based on Residual
Prediction Technique Rohini S. Dhorje, P.R. Badadapure Abstract
Voice morphing is a technique for modifying asource speaker’s speech to sound as if it was spoken by some designated target speaker. One of the most recent models for voice conversion is the classical LPC analysis-synthesis model combined with GMM, which aims to separate information from excitation and vocal tract and to learn the transformation rules with statistical methods. However, it does not work well as it is supposed to be due to the inaccuracy of the extracted feature information as well as the overly-smoothed spectral converted by traditional GMM. In this paper, we propose a novel method to solve the problem which is based on the technique of the separation of glottal waveforms. Also, a new strategy to convert excitation information based on residual prediction technique is proposed. The final result shows that not only are the transformed vocal tract parameters matching the target one better, but also is the high quality of the synthesized speech preserved. Keywords—Morphing, GMM,Extraction, LPC, analysis, synthesis , Glottal Waveform Separation. |
Full Text PDF |
383-384 | Design Model for Two Server Password
Authentication Protocol Nishikant S. Burande, Kahate S.A Abstract
In this paper a two server password authentication protocol described. In the sense that two symmetric servers are used for the authentication purpose with making preliminary caution that if one server shut down due to some reason then another server should continue to provide the services to the client. Many protocols are established for the security in server. Client communicates to server through two different secure channels. The authentication information of client on server1 is kept with backup on server2 and vice versa. For avoiding the data redundancy the periodic backup facility is adopted in this system. In this way two server authentications with backup can be created. Keywords— PAKE, Diffie-Hellman, Elgamal Encryption |
Full Text PDF |
385-389 | A Paradigm Shift from Cloud to Fog Computing T.Venkat Narayana Rao , MD. Amer Khan, M.Maschendra ,M.Kiran Kumar Abstract
The computing scenario is shifting from cloud computing towards edge networking which is known as Fog computing. It is now becoming an important facilitator in upcoming internet of things applications. With the rapid increase in the number of internet connected devices, the increased demand of real-time, low-latency services is proving to be a challenge for the traditional cloud computing framework. Fog computing is observed to be an aerial compared to the traditional cloud. It is hierarchical distributed architecture. This computing ensures the low and predictable latency in the latency-sensitive of Internet of Things (IoT) applications such as the healthcare services which is primary objective of this computing. This paper focuses on architecture, policy manager involved in this novel computing technology and with its usage and applicabilty. Keywords: Fog device ,software defined network, internet of things, actuator, foglet , orchestration .
|
Full Text PDF |
390-394 | Big Data Analysis using Hadoop components like
Flume, MapReduce, Pig and Hive E. Laxmi Lydia,Dr. M.Ben Swarup Abstract
In enormous information world, Hadoop Distributed File System (HDFS) is extremely well known. It gives a system to putting away information in a conveyed situation furthermore has set of instruments to recover and prepare. These information set utilizing guide decrease idea. In this paper, an intensive examination has been conveyed to talk about that how enormous information investigation can be performed on information put away on Hadoop dispersed document framework utilizing Pig and Hive. Apache Pig and Hive are two undertakings which are layered on top of Hadoop, and give more elevated amount dialect to utilize Hadoop's MapReduce library. In this paper, as a matter of first importance, the fundamental ideas of MapReduce, Pig and Hive are presented and their performance comparison. Keywords: Hadoop Distributed File System, Pig, Hive, mapreduce, Framework
|
Full Text PDF |
395-398 | Cost-Effective Feature Selection For Person
Reidentification J.JenilaJiny and M.L Sworna Kokila Abstract
This paper proposes a feature-selection method that minimizes the data needed to represent the appearance of objects by learning the most appropriate feature set for the task person reidentification. The computational cost for feature extraction and the cost for storing the feature descriptor are considered jointly with feature performance to select cost-effective good features. This selection allows improving intercamera reidentification while reducing the bandwidth that is necessary to share data across the cameras. It also rank the selected features in the order of effectiveness for the task to enable a further reduction of the feature set by dropping the least effective features when application constraints require this adaptation and show that the proposed approach considerably reduces cost by selecting inexpensive features and improves re-identification performance.
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net