Series-4 (May-June 2019)May-June 2019 Issue Statistics
Series-1 Series-2 Series-3 Series-4 Series-5 Series-6
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper reviews advances in understanding the role of visual impairments in reading failure with a focus on perceptual distortions (visual stress), magnocellular deficits, abnormal eye movements and increased visual neural noise. The neurobiological evidence suggests that the increased neural noise might be caused by disbalance of excitation and inhibition in the cortical networks or by the inability to exclude the neural noise due to impaired attentional mechanisms. Deficits in attentional processes are further discussed in the context of the causal link between reading disabilities and eye movements together with other potential sources of abnormal eye movements.The review accentuates on the complexity of the reading process and its impairments and the necessity to consider the involvement of variety of factors, like sensory, attentional, phonological, oculomotor and their interaction.
Keywords: reading difficulties, neural noise hypothesis, magnocellular deficits, eye movements, attention impairment, visual stress, development disorders.
[1] Adler-Grinberg, D., & Stark, L. (1978). Eye movement, scan paths, and dyslexia. American Journal of Optometry and Physiological Optics, 55, 557-570
[2] Bednarek, D. B., Tarnowski, A., & Grabowska, A. (2006). Latencies of stimulus-driven eye movements are shorter in dyslexic subjects. Brain and Cognition, 60(1), 64–69.
[3] Bellocchi,S., Muneaux, M., Bastien-Toniazzo, M., &Ducrot, S.(2013).I can read it in your eyes: what eye movements tell us about visuo-attentional processes in developmental dyslexia. Res.Dev.Disabil. 34,452–460.doi: 10.1016/j.ridd.2012.09.002
[4] Bigelow ER, McKenzie BE. (1985). Unstable ocular dominance and reading ability. Perception, 14,329-335.
[5] Biscaldi, M., Fischer, B., &Hartnegg, K. (2000). Voluntary saccadic control in dyslexia. Perception, 29(5), 509–521
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Notice boards are communication media used in many organizations, institutions or public places such as schools, shopping malls, churches, hospitals, bus and railway stations, to effectively display messages numerous individuals. The information content of a notice board especially the traditional type requiresmonitoring and also non-instantaneous updates aredone by designatedindividual on regular basis. With advent of mobile communication technology such as Bluetooth, Wi-Fi, which supports voice service in the form of call, SMS, MIME, and so on, a new horizon have been created, that fast track monitoring and update of information content on the notice boards. In this paper, a remote notice board that support both voice and sms is designed for smart message dissemination in Academic Institutionfocusing on Yaba College Technology as main user. The system was designed used using hardware components:Android Mobile phone, LED Display Strip, Bluetooth Module HC-05, Microcontroller........
Keywords: Smart, Mobile, Message, Dissemination, Remote, Voice, SMS, Android, Bluetooth, Wi-Fi, Wireless, notice board, Smartphone
[1]. Agarwal, R., Singh, S., Yadav, S., & Bansal, S. Android Phone Speech Recognition Sensed Voice Operated Notice Board Display. Ijarcce, 2017; 6(4), 206–211. https://doi.org/10.17148/ijarcce.2017.6439
[2]. Agbeyangi, A. O., Odiete, J. O., & Olatinwo, O. SMS-Based Automated E-Notice Board using Mobile Technology SMS-Based Automated E-Notice Board using Mobile Technology. 2017; 7(December), 53–60. https://doi.org/10.6636/IJEIE.201712.7(2).01
[3]. Amar Ingle, Ashotosh Thorat, Rohit Jagtap, R. K. G. GSM Based Digital Notice Board. International Journal of Informative &Futuristic Research, 2016; 3(7), 2392–2397.
[4]. Arulmuruganp, S., Anithap, S., Priyangap, A., & Sangeethapriyap, S. Smart Electronic Notice Board Using WI-FI. IJISET-International Journal of Innovative Science, Engineering & Technology, 2016; 3(11), 108–111. Retrieved from www.ijiset.com
[5]. Bahekar, T. S., Tanveer, A. M., Palaskar, U. S., & Waghmare, R. E.Android Based Voice Controlled E-Notice Board. 2017; 2(1), 186–188.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Knowledge Base System for Maize CropNutrients Deficiency Identification |
Country | : | Ethiopia |
Authors | : | Seid Ahmyaw || Mohammed Nuru |
: | 10.9790/0661-2103042126 |
Abstract: The Cereal crops maize is the common cultivated crops in Ethiopia low lands. Even though the crop is the livelihood of most of the farmer and needed to increase food production in grain, the desired agricultural productivity output in agricultural sector is very low. This is due to lack of technological and nutritional information, most of Experts cannot easily identify nutritional deficiency disorder and weak exchange of information between agricultural experts and farmers. Identifying those nutrient deficiency disorder at early stages enable to increase crops yields, fruit production and minimize frequent disease occurrence because of nutrient deficiency. Thus, there........
Keywords: Decision Tree, Knowledge Base, Nutrient Deficiency
[1]. Y. Abera and S. Kassa, "Status of Soil Micronutrients in Ethiopian Soils: A Review".
[2]. K. Belay and D. Abebaw, "Challenges facing agricultural extension agents: A Case Study from South-western Ethiopia," African development review, vol. 16, pp. 139-168, 2004.
[3]. T. Amede, T. Belachew and E. Geta, "Reversing the degradation of arable land in the Ethiopian Highlands," Managing Africa's Soils; no. 23, 2001.
[4]. C. S. Krishnamoorthy and S. Rajeev, Artificial intelligence and expert systems for engineers, vol. 11, CRC press, 1996.
[5]. N. Mack, "Qualitative research methods: A data collector's field guide," 2005.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Investigation of the structures within the Chad basin, Nigeria, was carried out using high resolution aeromagnetic data. The study area is bounded by latitude 12oN to 13.5oNand longitude 12.5oE to 14oE. It is covered by nine high resolution total magnetic intensity data sheets covering a total area of 27,255 square kilometers.The result from the Vertical derivatives shows that the major magnetic features (like faults and fractures) delineated were oriented in the NE-SW direction. It also shows different rock types which might be granite intrusion or basaltic intrusion. Isolated anomalies with high amplitude, for example at the edge of Zari is a large body with high amplitude and it has...........
Keywords: Aeromagnetic Data, lineaments (faults, fractures and discontinuities), Structures,lithological boundaries.
[1]. Avbovbo, A.A. Ayoola, E. O. and Osahon, S.A. (1986). Depositional and structural styles in Chad basin of Northeastern Nigeria. Bull Amer. Asso. Pet. Geol. 70, 121, (1787-1798).
[2]. Awoyemi, M.O., Arogundade, A.B., Falade, S.C., Ariyibi, E.O., Hammed, O.S., Alao, O.A., and Onyedim, G.C. (2016). Investigation of basement fault propagation in Chad Basin of Nigeria using High Resolution Aeromagnetic data. Arab Journal of Geoscience 9: 453.
[3]. Burke, K.C., Dessauvaagie, T.F.J. and Whiteman, A.J., (1972): Geological History of the Benue Valley and Adjacent Areas. In African Geology (Edited by Dessauvagie T.F.J and Whiteman A.J) eds. Ibadan University press, Ibadan. (187-205).
[4]. Barbosa, V.C.F., Silva, J.B.C., and Medeiros, W.E., (1999). Stability analysis and improvement of structural index estimation in Euler deconvolution: Geophysics, 64, 48-60.
[5]. Genik, G.J., (1992). Regional Framework, structural and petroleum aspects of right basins in Niger, Chad and Central African Republic (CAR). Tecnophysics 213, (169-85).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Information Organization and Knowledge Inference from Sensor Database for Smart Wear |
Country | : | Ethiopia |
Authors | : | KindieAlebachew |
: | 10.9790/0661-2103043741 |
Abstract: Sensor data base has found increasing applications in health care domain. A broad variety of Intensive Care Unit (ICU) applications uses sensors such as ECG, EEG, blood pressure monitors, respiratory monitors, and a broad assortment of other sensors from where huge amount of physiological signals/data is generated.The main research challenge is how to handle and organize those physiological data with an intention of tracking the status of the patient and providing time critical service data to the patient's smartphone for emergency precautions.The mass and velocity of such data tend to big-data complications and the knowledge inferences from such data need to be performed in a time-critical manner.In this paper, we discuss the physiological data organization approaches in order to provide........
Keywords: Sensor Database, Smart Wear, Knowledge Inference, Physiological Data, Thing To People
[1]. Mishra, N., Lin, C. C., & Chang, H. T. (2014). Cognitive inference device for activity supervision in the elderly. The Scientific World Journal, 2014.
[2]. Suryadevara, N. K., & Mukhopadhyay, S. C. (2012). Wireless sensor network based home monitoring system for wellness determination of elderly. Sensors Journal, IEEE, 12(6), 1965-1972.
[3]. Suryadevara, N. K., Gaddam, A., Mukhopadhyay, S. C., & Rayudu, R. K. (2011, November). Wellness determination of inhabitant based on daily activity behaviour in real-time monitoring using Sensor Networks. In Sensing Technology (ICST), 2011 Fifth International Conference on (pp. 474-481). IEEE.
[4]. Mishra, N., Lin, C. C., & Chang, H. T. (2015). A cognitive adopted framework for IoT big-data management and knowledge discovery prospective. International Journal of Distributed Sensor Networks, 11(10), 718390.
[5]. Mishra, N., Lin, C. C., & Chang, H. T. (2014, December). A cognitive oriented framework for IoT big-data management prospective. In Communication Problem-Solving (ICCP), 2014 IEEE International Conference on (pp. 124-127). IEEE
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Compared to the past security of networked systems has become a critical universal issue that influences individuals, enterprises and governments. The rate of attacks against networked systems has increased melodramatically, and the strategies used by the attackers are continuing to evolve. For example, the privacy of important information, security of stored data platforms, availability of knowledge etc. Depending on these problems, cyber terrorism is one of the most important issues in today's world. Cyber terror, which caused a lot of problems to individuals and institutions, has reached a level that could threaten public and country security by various groups such as criminal organizations, professional persons and cyber activists. Intrusion detection is one of the solutions against these attacks. A free and effective approach for designing Intrusion Detection Systems (IDS) is Machine Learning. In this study, deep learning and support vector machine (SVM) algorithms were used to detect port scan attempts based on the new CICIDS2017 dataset
Keywords: IDS, SVM, CICIDS2017, Cyber Terror, Deep Learning
[1]. P. A. A. Resende and A. C. Drummond, "Adaptive anomaly-based intrusion detection system using genetic algorithm and profiling," Security and Privacy, vol. 1, no. 4, p. e36, 2018.
[2]. Vijayan and, R.; Devaraj, D.; Kannapiran, B. Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. Comput. Secur. 2018, 77, 304–314.
[3]. Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the Fourth International Conference on Information Systems Security and Privacy, ICISSP, Funchal, Madeira, Portugal, 22–24 January 2018.
[4]. Lee, C.H.; Su, Y.Y.; Lin, Y.C.; Lee, S.J. Machine learning based network intrusion detection. In Proceedings of the 2017 2nd IEEE International Conference on Computational Intelligence and Applications (ICCIA), Beijing, China, 8–11 September 2017; pp. 79–83.
[5]. Abdulhammed, R.; Faezipour, M.; Elleithy, K. Intrusion Detection in Self organizing Network: A Survey. In Intrusion Detection and Prevention for Mobile Ecosystems; Kambourakis, G., Shabtai, A., Kolias, C., Damopoulos, D., Eds.; CRC Press Taylor & Francis Group: New York, NY, USA, 2017; Chapter 13, pp. 393–449..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Hybrid Feature Extraction Method for Network Intrusion Detection System |
Country | : | India |
Authors | : | K.NandhaKumar || Dr.S.Sukumaran |
: | 10.9790/0661-2103044755 |
Abstract: Intrusion Detection System (IDS) is one of the important and useful technologies that used to monitor systems or networks. Several researchers have performed feature extraction methods to improve the performance of IDS for detecting network traffic and malicious attacks. Different input features will change the detection performance dramatically when using IDS. The classification process could be prolonged when using high-dimensional features in a large number of network traffic. Recently, feature representation and application of several classifiers became a keen interest for researchers to develop a new strategy to improve the classification performance.......
Keywords:Feature Extraction, Intrusion Detection System (IDS), Machine Learning, Principal Component Analysis (PCA), Sparse Auto-encoder (SA).
[1]. John McHugh, Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Transactions on Information and System Security, 3(4), 2000, 262-294.
[2]. P. Ravi Kiran Varma, V. Valli Kumari, and S. Srinivas Kumar, A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective, Progress in Computing, Analytics and Networking, Singapore, 785-793, 2018.
[3]. Ngoc Tu Pham, Ernest Foo, Suriadi Suriadi, Helen Jeffrey and Hassan Fareed M Lahza, Improving performance of intrusion detection system using ensemble methods and feature selection, 2018.
[4]. Kadurin A, Aliper A, Kazennov A, Mamoshina P, Vanhaelen Q, Khrabrov K and Zhavoronkov A, The cornucopia of meaningful leads: Applying deep adversarial autoencoders for new molecule development in oncology, 8(7), 2017, 10883-10890.
[5]. Rui Zhao, Ruqiang Yan, Zhenghua Chen, Kezhi Mao, Peng Wang, and Robert X. Gao, Deep learning and its applications to machine health monitoring: A survey, 14(8), 2016..
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Reliability is major concern of any system. Network infrastructure design is no exception. While designing and analyzing a Local area network, reliability issue needs to be addressed carefully. Since a LAN constitutes different components, failure of any component could lead to service unavailability for end users. Thus, overall reliability of a given system relies on the reliability of connected devices. However, system reliability cannot be improved to the expected level with components having better reliability only. Having redundant devices at each layer or stage of network infrastructure is fundamental to improve the overall network reliability. Therefore, this paper presents the use of branch and bound algorithmic approach with bounding functions to calculate optimal possible reliability of three-tier local area network architecture with a limited amount of budget as a constraint for an organization.
Keywords: Reliability Design, Reliability problem, branch and bound, three-tier LAN design
[1]. M.O. Ball et al., Eds., Handbooks in OR & MS, 4 (Elsevier Science B.V, 1995). (7)
[2]. Hsieh, Yi-Chih, Ta-Cheng Chen, and Dennis L. Bricker. Genetic algorithms for reliability design problems, Elsevier Microelectronics Reliability, 38.10 (1998): 1599-1605.
[3]. Dr. R. Mohanty, Design and Analysis of Algorithms, (VEER SURENDRA SAI UNIVERSITY OF TECHNOLOGY, BURLA SAMBALPUR, ODISHA, INDIA – 768018
[4]. Lad, Bhupesh K., Makarand S. Kulkarni, and Krishna B. Misra, Optimal reliability design of a system, Handbook of Performability Engineering. Springer, London, 2008. 499-519.
[5]. Luedtke, James, A branch-and-cut decomposition algorithm for solving chance-constrained mathematical programs with finite support, Mathematical Programming-Springer 146.1-2 (2014): 219-244.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Research outputs of academics from the developing world, Africa, in particular, have been lowly rated as a result of doubts placed on works from this region because of unavailability of state of the art research tools. This has made it extremely difficult for such researchers to publish their research in reputable journals. Some researchers desire to use HPCs to simulate, analyze or predict with their experimental data, but unfortunately, it is either their laptops do not have such powerful processing abilities or they do not have the necessary software to perform such tasks. This research work is aimed at ameliorating the challenges faced by researchers in higher education institutions, who would want to perform experiments on powerful virtual e-infrastructures like the cloud computing platforms...........
[1]. Collins N.Udanor, Stephen O Aneke & Cynthia U Obillo. Implementing Cloud Computing Storage In Nigerian Tertiary Institutions, Proceedings of the iSTEAMS Multidisciplinary Cross-Border Conference University of Ghana, Legon, Accra, Ghana - October, 2018 [2]. Nwobodo I. (2015). A Comparison of Cloud Computing Platforms. International Conference on Circuits and Systems (CAS 2015). https://www.researchgate.net/publication/282323121_A_Comparison_of_Cloud_Computing_Platform. [3]. Lynn T., Hunt G., Corcoran D., Morrison J. and Healy (2015). A Comparative Study of Current Open-source Infrastructure as a Service Frameworks. 5th International Conference on Cloud Computing and Services Science (CLOSER 2015), pp 95-104www.scitepress.org/Papers/2015/54233/54233.pdf.
[4]. Caron E., Toch L., Rouzaud-Cornaba J. (2013). Comparison on OpenStack and Open-Nebula performance to improve multi-Cloud architecture on cosmological simulation use case. [Research Report] RR-8421, INRIA. pp.23. <hal-00916908>.https://hal.inria.fr/hal-00916908/document.
[5]. Parák, B., Šustr, Z., Kimle, M., Fernández, P., García, Á., Sachtouris, S. and Muñoz, V. (2016). "Evolution of the Open Cloud Computing Interface. Proceedings of the 6th International Conference on Cloud Computing and Services Science (CLOSER 2016)" - Volume 2, pages 339-346 http://www.scitepress.org/Papers/2016/59341/59341.pdf...