ºÝºÝߣshows by User: ijitcs / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: ijitcs / Tue, 25 Feb 2025 09:38:21 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: ijitcs 3 rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) /slideshow/3-rd-international-conference-on-computer-science-engineering-and-artificial-intelligence-cseai-2025/276011293 cseai2025cfp1-250225093821-f9c52b05
3rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field]]>

3rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field]]>
Tue, 25 Feb 2025 09:38:21 GMT /slideshow/3-rd-international-conference-on-computer-science-engineering-and-artificial-intelligence-cseai-2025/276011293 ijitcs@slideshare.net(ijitcs) 3 rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) ijitcs 3rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cseai2025cfp1-250225093821-f9c52b05-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 3rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Science, Computer Engineering and AI. The Conference looks for significant contributions to all major fields of the Computer Science, Engineering and AI in theoretical, practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
3 rd International Conference on Computer Science, Engineering and Artificial Intelligence (CSEAI 2025) from ijitcs
]]>
5 0 https://cdn.slidesharecdn.com/ss_thumbnails/cseai2025cfp1-250225093821-f9c52b05-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-b5b8/275391045 2612ijitcs01-250205121945-6e3c06c0
International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Implementation & Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Preemptive, Round Robin Scheduling, &Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive & Non-preemptive Task, dynamic and static algorithms. Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com ]]>

International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Implementation & Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Preemptive, Round Robin Scheduling, &Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive & Non-preemptive Task, dynamic and static algorithms. Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com ]]>
Wed, 05 Feb 2025 12:19:45 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-b5b8/275391045 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Implementation & Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Preemptive, Round Robin Scheduling, &Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive & Non-preemptive Task, dynamic and static algorithms. Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs01-250205121945-6e3c06c0-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Implementation &amp; Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive &amp; Non Preemptive, Round Robin Scheduling, &amp;Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive &amp; Non-preemptive Task, dynamic and static algorithms. Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
7 0 https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs01-250205121945-6e3c06c0-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) /slideshow/14th-international-conference-on-advanced-information-technologies-and-applications-icaita-2025/275257113 icaita2025cfp-250130105336-8998fb4e
#informationtechnology #artificialintelligence #blockchain #machinelearning #cybersecurity #technology #BigData #CloudComputing #internetofthings #EdgeComputing #DigitalEthics #QuantumComputing #multimedia #simulation #database #networking #softcomputing #computerscience #Bioinformatics #datamining Submit Your Research Articles...!!! Welcome To ICAITA 2025 14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) May 17 ~ 18, 2025, Zurich, Switzerland Webpage URL: https://icaita2025.org/ Submission Deadline: February 01, 2025 Contact us: Here's where you can reach us: icaita@icaita2025.org (or) icaitaicaita@yahoo.com Submission URL: https://icaita2025.org/submission/index.php ]]>

#informationtechnology #artificialintelligence #blockchain #machinelearning #cybersecurity #technology #BigData #CloudComputing #internetofthings #EdgeComputing #DigitalEthics #QuantumComputing #multimedia #simulation #database #networking #softcomputing #computerscience #Bioinformatics #datamining Submit Your Research Articles...!!! Welcome To ICAITA 2025 14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) May 17 ~ 18, 2025, Zurich, Switzerland Webpage URL: https://icaita2025.org/ Submission Deadline: February 01, 2025 Contact us: Here's where you can reach us: icaita@icaita2025.org (or) icaitaicaita@yahoo.com Submission URL: https://icaita2025.org/submission/index.php ]]>
Thu, 30 Jan 2025 10:53:36 GMT /slideshow/14th-international-conference-on-advanced-information-technologies-and-applications-icaita-2025/275257113 ijitcs@slideshare.net(ijitcs) 14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) ijitcs #informationtechnology #artificialintelligence #blockchain #machinelearning #cybersecurity #technology #BigData #CloudComputing #internetofthings #EdgeComputing #DigitalEthics #QuantumComputing #multimedia #simulation #database #networking #softcomputing #computerscience #Bioinformatics #datamining Submit Your Research Articles...!!! Welcome To ICAITA 2025 14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) May 17 ~ 18, 2025, Zurich, Switzerland Webpage URL: https://icaita2025.org/ Submission Deadline: February 01, 2025 Contact us: Here's where you can reach us: icaita@icaita2025.org (or) icaitaicaita@yahoo.com Submission URL: https://icaita2025.org/submission/index.php <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/icaita2025cfp-250130105336-8998fb4e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> #informationtechnology #artificialintelligence #blockchain #machinelearning #cybersecurity #technology #BigData #CloudComputing #internetofthings #EdgeComputing #DigitalEthics #QuantumComputing #multimedia #simulation #database #networking #softcomputing #computerscience #Bioinformatics #datamining Submit Your Research Articles...!!! Welcome To ICAITA 2025 14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) May 17 ~ 18, 2025, Zurich, Switzerland Webpage URL: https://icaita2025.org/ Submission Deadline: February 01, 2025 Contact us: Here&#39;s where you can reach us: icaita@icaita2025.org (or) icaitaicaita@yahoo.com Submission URL: https://icaita2025.org/submission/index.php
14th International Conference on Advanced Information Technologies and Applications (ICAITA 2025) from ijitcs
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/icaita2025cfp-250130105336-8998fb4e-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
STUDYING THE IMPACT OF EGYPTIAN HOTELS’ WEBSITES MARKETING ON CUSTOMERS' E-SATISFACTION /slideshow/studying-the-impact-of-egyptian-hotels-websites-marketing-on-customers-e-satisfaction/275230197 7317ijitcs01-250129094503-75538b9e
The purpose of this research is to study the impact of Egyptian hotels’ websites marketing on customer e-satisfaction and how to achieve e-loyalty through focusing on e-satisfaction success factors (website information quality, system convenience, system safety, service quality, expectations and perceptions for hotel services and facilities, and intention to revisit). In this study, convenience sample was used in order to achieve the aim and objective of this study. A self-administered questionnaire with customers was designed as the research instrument for collecting primary data. This questionnaire included items pertaining to the customers’ demographic data, evaluating level of their E-satisfaction regarding Egyptian hotels’ websites marketing. Four hundred fifty forms were distributed in fifteen investigated hotels; thirty forms in each hotel; among them 430 forms valid for analysis (96%). The study focused on five star hotels. The findings revealed that the most of the customers were dissatisfied about websites marketing in the Egyptian hotels (i.e. dynamic contents, navigation, access, and security of sensitive information, payment options, and their Perceptions of services and facilities after visiting the hotel during stay). Also, most of the customers disagreed to revisit the hotel, and disagreed to suggest to friends and relatives to visit the hotel. Enhancing quality of the marketing websites in the hospitality business leads to sustaining hotel -customer relationship, customers E-satisfaction, E- loyalty, increasing the number of new customers and, improve the brand image of the Egyptian hotels, and consequently achieve profitability. ]]>

The purpose of this research is to study the impact of Egyptian hotels’ websites marketing on customer e-satisfaction and how to achieve e-loyalty through focusing on e-satisfaction success factors (website information quality, system convenience, system safety, service quality, expectations and perceptions for hotel services and facilities, and intention to revisit). In this study, convenience sample was used in order to achieve the aim and objective of this study. A self-administered questionnaire with customers was designed as the research instrument for collecting primary data. This questionnaire included items pertaining to the customers’ demographic data, evaluating level of their E-satisfaction regarding Egyptian hotels’ websites marketing. Four hundred fifty forms were distributed in fifteen investigated hotels; thirty forms in each hotel; among them 430 forms valid for analysis (96%). The study focused on five star hotels. The findings revealed that the most of the customers were dissatisfied about websites marketing in the Egyptian hotels (i.e. dynamic contents, navigation, access, and security of sensitive information, payment options, and their Perceptions of services and facilities after visiting the hotel during stay). Also, most of the customers disagreed to revisit the hotel, and disagreed to suggest to friends and relatives to visit the hotel. Enhancing quality of the marketing websites in the hospitality business leads to sustaining hotel -customer relationship, customers E-satisfaction, E- loyalty, increasing the number of new customers and, improve the brand image of the Egyptian hotels, and consequently achieve profitability. ]]>
Wed, 29 Jan 2025 09:45:03 GMT /slideshow/studying-the-impact-of-egyptian-hotels-websites-marketing-on-customers-e-satisfaction/275230197 ijitcs@slideshare.net(ijitcs) STUDYING THE IMPACT OF EGYPTIAN HOTELS’ WEBSITES MARKETING ON CUSTOMERS' E-SATISFACTION ijitcs The purpose of this research is to study the impact of Egyptian hotels’ websites marketing on customer e-satisfaction and how to achieve e-loyalty through focusing on e-satisfaction success factors (website information quality, system convenience, system safety, service quality, expectations and perceptions for hotel services and facilities, and intention to revisit). In this study, convenience sample was used in order to achieve the aim and objective of this study. A self-administered questionnaire with customers was designed as the research instrument for collecting primary data. This questionnaire included items pertaining to the customers’ demographic data, evaluating level of their E-satisfaction regarding Egyptian hotels’ websites marketing. Four hundred fifty forms were distributed in fifteen investigated hotels; thirty forms in each hotel; among them 430 forms valid for analysis (96%). The study focused on five star hotels. The findings revealed that the most of the customers were dissatisfied about websites marketing in the Egyptian hotels (i.e. dynamic contents, navigation, access, and security of sensitive information, payment options, and their Perceptions of services and facilities after visiting the hotel during stay). Also, most of the customers disagreed to revisit the hotel, and disagreed to suggest to friends and relatives to visit the hotel. Enhancing quality of the marketing websites in the hospitality business leads to sustaining hotel -customer relationship, customers E-satisfaction, E- loyalty, increasing the number of new customers and, improve the brand image of the Egyptian hotels, and consequently achieve profitability. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/7317ijitcs01-250129094503-75538b9e-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The purpose of this research is to study the impact of Egyptian hotels’ websites marketing on customer e-satisfaction and how to achieve e-loyalty through focusing on e-satisfaction success factors (website information quality, system convenience, system safety, service quality, expectations and perceptions for hotel services and facilities, and intention to revisit). In this study, convenience sample was used in order to achieve the aim and objective of this study. A self-administered questionnaire with customers was designed as the research instrument for collecting primary data. This questionnaire included items pertaining to the customers’ demographic data, evaluating level of their E-satisfaction regarding Egyptian hotels’ websites marketing. Four hundred fifty forms were distributed in fifteen investigated hotels; thirty forms in each hotel; among them 430 forms valid for analysis (96%). The study focused on five star hotels. The findings revealed that the most of the customers were dissatisfied about websites marketing in the Egyptian hotels (i.e. dynamic contents, navigation, access, and security of sensitive information, payment options, and their Perceptions of services and facilities after visiting the hotel during stay). Also, most of the customers disagreed to revisit the hotel, and disagreed to suggest to friends and relatives to visit the hotel. Enhancing quality of the marketing websites in the hospitality business leads to sustaining hotel -customer relationship, customers E-satisfaction, E- loyalty, increasing the number of new customers and, improve the brand image of the Egyptian hotels, and consequently achieve profitability.
STUDYING THE IMPACT OF EGYPTIAN HOTELS’ WEBSITES MARKETING ON CUSTOMERS' E-SATISFACTION from ijitcs
]]>
3 0 https://cdn.slidesharecdn.com/ss_thumbnails/7317ijitcs01-250129094503-75538b9e-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Active Controller Design For Global Chaos Synchronization Of Hyperchaotic Bao And Hyperchaotic Xu Systems /slideshow/active-controller-design-for-global-chaos-synchronization-of-hyperchaotic-bao-and-hyperchaotic-xu-systems-805e/275044485 1211ijitcs01-250122100146-6736a24b
This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems. ]]>

This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems. ]]>
Wed, 22 Jan 2025 10:01:46 GMT /slideshow/active-controller-design-for-global-chaos-synchronization-of-hyperchaotic-bao-and-hyperchaotic-xu-systems-805e/275044485 ijitcs@slideshare.net(ijitcs) Active Controller Design For Global Chaos Synchronization Of Hyperchaotic Bao And Hyperchaotic Xu Systems ijitcs This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs01-250122100146-6736a24b-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems.
Active Controller Design For Global Chaos Synchronization Of Hyperchaotic Bao And Hyperchaotic Xu Systems from ijitcs
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs01-250122100146-6736a24b-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices /slideshow/integration-of-biometric-authentication-procedure-in-customer-oriented-payment-system-in-trusted-mobile-devices/274727964 1211ijitcs02-250108114406-3b2a3891
Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices Vibha Kaw Raina, Birla Institute of Technology, India Paper PDF Link : https://airccse.org/journal/ijitcs/papers/1211ijitcs02.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol1.html Web Page Link : https://airccse.org/journal/ijitcs/index.html Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com ABSTRACT Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are developed to serve various functions like storing sensitive information, accessing this information as well transacting this information through payment systems. In order to protect this information and mobile devices, a well defined authentication system is mandatory. Biometric authentication is much more safe and secure and very easy to use. In this paper we propose a multi modal biometric authentication procedure with respect to payment systems and integrate this model with our previous work. The aim of this paper is to integrate the proposed payment model with multi server authentication model for the purpose of maintaining security and accessing different servers (websites). The system providing resources to be accessed over the network often consists of many different servers through out the world. The distribution of the remote system hardware in different places makes the user access the resources more efficiently and conveniently. Keywords: M-payments, authentication, biometrics. ]]>

Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices Vibha Kaw Raina, Birla Institute of Technology, India Paper PDF Link : https://airccse.org/journal/ijitcs/papers/1211ijitcs02.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol1.html Web Page Link : https://airccse.org/journal/ijitcs/index.html Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com ABSTRACT Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are developed to serve various functions like storing sensitive information, accessing this information as well transacting this information through payment systems. In order to protect this information and mobile devices, a well defined authentication system is mandatory. Biometric authentication is much more safe and secure and very easy to use. In this paper we propose a multi modal biometric authentication procedure with respect to payment systems and integrate this model with our previous work. The aim of this paper is to integrate the proposed payment model with multi server authentication model for the purpose of maintaining security and accessing different servers (websites). The system providing resources to be accessed over the network often consists of many different servers through out the world. The distribution of the remote system hardware in different places makes the user access the resources more efficiently and conveniently. Keywords: M-payments, authentication, biometrics. ]]>
Wed, 08 Jan 2025 11:44:06 GMT /slideshow/integration-of-biometric-authentication-procedure-in-customer-oriented-payment-system-in-trusted-mobile-devices/274727964 ijitcs@slideshare.net(ijitcs) Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices ijitcs Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices Vibha Kaw Raina, Birla Institute of Technology, India Paper PDF Link : https://airccse.org/journal/ijitcs/papers/1211ijitcs02.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol1.html Web Page Link : https://airccse.org/journal/ijitcs/index.html Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com ABSTRACT Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are developed to serve various functions like storing sensitive information, accessing this information as well transacting this information through payment systems. In order to protect this information and mobile devices, a well defined authentication system is mandatory. Biometric authentication is much more safe and secure and very easy to use. In this paper we propose a multi modal biometric authentication procedure with respect to payment systems and integrate this model with our previous work. The aim of this paper is to integrate the proposed payment model with multi server authentication model for the purpose of maintaining security and accessing different servers (websites). The system providing resources to be accessed over the network often consists of many different servers through out the world. The distribution of the remote system hardware in different places makes the user access the resources more efficiently and conveniently. Keywords: M-payments, authentication, biometrics. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs02-250108114406-3b2a3891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices Vibha Kaw Raina, Birla Institute of Technology, India Paper PDF Link : https://airccse.org/journal/ijitcs/papers/1211ijitcs02.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol1.html Web Page Link : https://airccse.org/journal/ijitcs/index.html Paper submission link :https://airccse.com/submissioncs/home.html Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com ABSTRACT Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are developed to serve various functions like storing sensitive information, accessing this information as well transacting this information through payment systems. In order to protect this information and mobile devices, a well defined authentication system is mandatory. Biometric authentication is much more safe and secure and very easy to use. In this paper we propose a multi modal biometric authentication procedure with respect to payment systems and integrate this model with our previous work. The aim of this paper is to integrate the proposed payment model with multi server authentication model for the purpose of maintaining security and accessing different servers (websites). The system providing resources to be accessed over the network often consists of many different servers through out the world. The distribution of the remote system hardware in different places makes the user access the resources more efficiently and conveniently. Keywords: M-payments, authentication, biometrics.
Integration of Biometric authentication procedure in customer oriented payment system in trusted mobile devices from ijitcs
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs02-250108114406-3b2a3891-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ACTIVE CONTROLLER DESIGN FOR GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC BAO AND HYPERCHAOTIC XU SYSTEMS /slideshow/active-controller-design-for-global-chaos-synchronization-of-hyperchaotic-bao-and-hyperchaotic-xu-systems/274582658 1211ijitcs01-250102103513-2e9f1b36
This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems. ]]>

This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems. ]]>
Thu, 02 Jan 2025 10:35:13 GMT /slideshow/active-controller-design-for-global-chaos-synchronization-of-hyperchaotic-bao-and-hyperchaotic-xu-systems/274582658 ijitcs@slideshare.net(ijitcs) ACTIVE CONTROLLER DESIGN FOR GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC BAO AND HYPERCHAOTIC XU SYSTEMS ijitcs This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs01-250102103513-2e9f1b36-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This paper investigates the global chaos synchronization of identical hyperchaotic Bao systems (Bao and Liu, 2008), identical hyperchaotic Xu systems (Xu, Cai and Zheng, 2009) and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Active nonlinear control is the method adopted for the global chaos synchronization of the hyperchaotic systems addressed in this paper and the synchronization results have been established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active nonlinear control method is very effective and convenient to achieve global chaos synchronization of identical and non-identical hyperchaotic Bao and hyperchaotic Xu systems. Numerical simulations have been provided to demonstrate the effectiveness of the synchronization results for the hyperchaotic Cao and hyperchaotic Xu systems.
ACTIVE CONTROLLER DESIGN FOR GLOBAL CHAOS SYNCHRONIZATION OF HYPERCHAOTIC BAO AND HYPERCHAOTIC XU SYSTEMS from ijitcs
]]>
11 0 https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs01-250102103513-2e9f1b36-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) /slideshow/11th-international-conference-on-computer-science-information-technology-and-applications-csita-2025/274538023 csitacfp-241231113441-ab4c723c
Welcome to CSITA 2025! 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) March 22 ~ 23, 2025, Sydney, Australia https://csita2025.org/ Submission Deadline: January 04, 2025 Academia: CFP_11th_International_Conference_on_Computer_Science_Information_Technology_and_Applications_CSITA_2025 Contact Us Here's where you can reach us : csita@csita2025.org (or) csitaconfe@yahoo.com Submission URL: https://csita2025.org/submission/index.php #computerscience #programming #coding #technology #programmer #python #computer #developer #tech #coder #javascript #java #codinglife #html #code #softwaredeveloper #webdeveloper #software #cybersecurity #linux #computerengineering #webdevelopment #softwareengineer #machinelearning #hacking #engineering #datascience #css #programmers #pythonprogramming ]]>

Welcome to CSITA 2025! 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) March 22 ~ 23, 2025, Sydney, Australia https://csita2025.org/ Submission Deadline: January 04, 2025 Academia: CFP_11th_International_Conference_on_Computer_Science_Information_Technology_and_Applications_CSITA_2025 Contact Us Here's where you can reach us : csita@csita2025.org (or) csitaconfe@yahoo.com Submission URL: https://csita2025.org/submission/index.php #computerscience #programming #coding #technology #programmer #python #computer #developer #tech #coder #javascript #java #codinglife #html #code #softwaredeveloper #webdeveloper #software #cybersecurity #linux #computerengineering #webdevelopment #softwareengineer #machinelearning #hacking #engineering #datascience #css #programmers #pythonprogramming ]]>
Tue, 31 Dec 2024 11:34:41 GMT /slideshow/11th-international-conference-on-computer-science-information-technology-and-applications-csita-2025/274538023 ijitcs@slideshare.net(ijitcs) 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) ijitcs Welcome to CSITA 2025! 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) March 22 ~ 23, 2025, Sydney, Australia https://csita2025.org/ Submission Deadline: January 04, 2025 Academia: CFP_11th_International_Conference_on_Computer_Science_Information_Technology_and_Applications_CSITA_2025 Contact Us Here's where you can reach us : csita@csita2025.org (or) csitaconfe@yahoo.com Submission URL: https://csita2025.org/submission/index.php #computerscience #programming #coding #technology #programmer #python #computer #developer #tech #coder #javascript #java #codinglife #html #code #softwaredeveloper #webdeveloper #software #cybersecurity #linux #computerengineering #webdevelopment #softwareengineer #machinelearning #hacking #engineering #datascience #css #programmers #pythonprogramming <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/csitacfp-241231113441-ab4c723c-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Welcome to CSITA 2025! 11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) March 22 ~ 23, 2025, Sydney, Australia https://csita2025.org/ Submission Deadline: January 04, 2025 Academia: CFP_11th_International_Conference_on_Computer_Science_Information_Technology_and_Applications_CSITA_2025 Contact Us Here&#39;s where you can reach us : csita@csita2025.org (or) csitaconfe@yahoo.com Submission URL: https://csita2025.org/submission/index.php #computerscience #programming #coding #technology #programmer #python #computer #developer #tech #coder #javascript #java #codinglife #html #code #softwaredeveloper #webdeveloper #software #cybersecurity #linux #computerengineering #webdevelopment #softwareengineer #machinelearning #hacking #engineering #datascience #css #programmers #pythonprogramming
11th International Conference on Computer Science, Information Technology and Applications (CSITA 2025) from ijitcs
]]>
5 0 https://cdn.slidesharecdn.com/ss_thumbnails/csitacfp-241231113441-ab4c723c-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
11th International Conference on Data Mining and Applications (DMAP 2025) /slideshow/11th-international-conference-on-data-mining-and-applications-dmap-2025/274351082 dmap2025-241224093301-6359cd55
Submit Your Research Articles...!!! Welcome To DMAP 2025 #datascience #datamining #Applications #modeling #visualization #personalization #recommendation #dataminingsystems #Platforms #efficiency #Scalability #PrivacyProtection #EmbeddedSystems #softwareengineer #mining #miningtext #multimedia #semistructured #graphicdesigner #graphics #webseries 11th International Conference on Data Mining and Applications (DMAP 2025) March 22 ~ 23, 2025, Sydney, Australia Web page link : https://csita2025.org/dmap/index Submission Deadline : December 28, 2024 Contact us: dmap@csita2025.org (or) dmapconff@gmail.com Paper submission link :https://csita2025.org/submission/index.php WIKICFP Link: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=182919&copyownerid=170233 ]]>

Submit Your Research Articles...!!! Welcome To DMAP 2025 #datascience #datamining #Applications #modeling #visualization #personalization #recommendation #dataminingsystems #Platforms #efficiency #Scalability #PrivacyProtection #EmbeddedSystems #softwareengineer #mining #miningtext #multimedia #semistructured #graphicdesigner #graphics #webseries 11th International Conference on Data Mining and Applications (DMAP 2025) March 22 ~ 23, 2025, Sydney, Australia Web page link : https://csita2025.org/dmap/index Submission Deadline : December 28, 2024 Contact us: dmap@csita2025.org (or) dmapconff@gmail.com Paper submission link :https://csita2025.org/submission/index.php WIKICFP Link: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=182919&copyownerid=170233 ]]>
Tue, 24 Dec 2024 09:33:01 GMT /slideshow/11th-international-conference-on-data-mining-and-applications-dmap-2025/274351082 ijitcs@slideshare.net(ijitcs) 11th International Conference on Data Mining and Applications (DMAP 2025) ijitcs Submit Your Research Articles...!!! Welcome To DMAP 2025 #datascience #datamining #Applications #modeling #visualization #personalization #recommendation #dataminingsystems #Platforms #efficiency #Scalability #PrivacyProtection #EmbeddedSystems #softwareengineer #mining #miningtext #multimedia #semistructured #graphicdesigner #graphics #webseries 11th International Conference on Data Mining and Applications (DMAP 2025) March 22 ~ 23, 2025, Sydney, Australia Web page link : https://csita2025.org/dmap/index Submission Deadline : December 28, 2024 Contact us: dmap@csita2025.org (or) dmapconff@gmail.com Paper submission link :https://csita2025.org/submission/index.php WIKICFP Link: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=182919&copyownerid=170233 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dmap2025-241224093301-6359cd55-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Submit Your Research Articles...!!! Welcome To DMAP 2025 #datascience #datamining #Applications #modeling #visualization #personalization #recommendation #dataminingsystems #Platforms #efficiency #Scalability #PrivacyProtection #EmbeddedSystems #softwareengineer #mining #miningtext #multimedia #semistructured #graphicdesigner #graphics #webseries 11th International Conference on Data Mining and Applications (DMAP 2025) March 22 ~ 23, 2025, Sydney, Australia Web page link : https://csita2025.org/dmap/index Submission Deadline : December 28, 2024 Contact us: dmap@csita2025.org (or) dmapconff@gmail.com Paper submission link :https://csita2025.org/submission/index.php WIKICFP Link: http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=182919&amp;copyownerid=170233
11th International Conference on Data Mining and Applications (DMAP 2025) from ijitcs
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/dmap2025-241224093301-6359cd55-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS /slideshow/android-untrusted-detection-with-permission-based-scoring-analysis-7475/274204483 8418ijitcs01-241219055328-5fd2d760
Android Untrusted Detection with Permission Based Scoring Analysis Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines Paper PDF Link: https://aircconline.com/ijitcs/V8N4/8418ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol8.html Web page :https://airccse.org/journal/ijitca/ijitca.html ABSTRACT Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. The study is about implementation of detecting untrusted on android applications, which would be the basis of all future development regarding malware detection. The smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, the permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android application, in this paper, the framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and determine if the installed application is untrusted or not. Our result show that, in a collection of 26 untrusted application, the framework is able to correct and determine the application's behavior consistently and efficiently. KEYWORDS permission, permission scoring-based, malware Android phone, Security, Internet, malware ]]>

Android Untrusted Detection with Permission Based Scoring Analysis Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines Paper PDF Link: https://aircconline.com/ijitcs/V8N4/8418ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol8.html Web page :https://airccse.org/journal/ijitca/ijitca.html ABSTRACT Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. The study is about implementation of detecting untrusted on android applications, which would be the basis of all future development regarding malware detection. The smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, the permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android application, in this paper, the framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and determine if the installed application is untrusted or not. Our result show that, in a collection of 26 untrusted application, the framework is able to correct and determine the application's behavior consistently and efficiently. KEYWORDS permission, permission scoring-based, malware Android phone, Security, Internet, malware ]]>
Thu, 19 Dec 2024 05:53:28 GMT /slideshow/android-untrusted-detection-with-permission-based-scoring-analysis-7475/274204483 ijitcs@slideshare.net(ijitcs) ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS ijitcs Android Untrusted Detection with Permission Based Scoring Analysis Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines Paper PDF Link: https://aircconline.com/ijitcs/V8N4/8418ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol8.html Web page :https://airccse.org/journal/ijitca/ijitca.html ABSTRACT Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. The study is about implementation of detecting untrusted on android applications, which would be the basis of all future development regarding malware detection. The smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, the permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android application, in this paper, the framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and determine if the installed application is untrusted or not. Our result show that, in a collection of 26 untrusted application, the framework is able to correct and determine the application's behavior consistently and efficiently. KEYWORDS permission, permission scoring-based, malware Android phone, Security, Internet, malware <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/8418ijitcs01-241219055328-5fd2d760-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Android Untrusted Detection with Permission Based Scoring Analysis Jackelou Sulapas Mapa, Saint Joseph Institute of Technology, Philippines Paper PDF Link: https://aircconline.com/ijitcs/V8N4/8418ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol8.html Web page :https://airccse.org/journal/ijitca/ijitca.html ABSTRACT Android smart phone is one of the fast growing mobile phones and because of these it the one of the most preferred target of malware developer. Malware apps can penetrate the device and gain privileges in which it can perform malicious activities such reading user contact, misusing of private information such as sending SMS and can harm user by exploiting the users private data which is stored in the device. The study is about implementation of detecting untrusted on android applications, which would be the basis of all future development regarding malware detection. The smartphone users worldwide are not aware of the permissions as the basis of all malicious activities that could possibly operate in an android system and may steal personal and private information. Android operating system is an open system in which users are allowed to install application from any unsafe sites. However permission mechanism of and android system is not enough to guarantee the invulnerability of the application that can harm the user. In this paper, the permission scoring-based analysis that will scrutinized the installed permission and allows user to increase the efficiency of Android permission to inform user about the risk of the installed Android application, in this paper, the framework that would classify the level of sensitivity of the permission access by the application. The framework uses a formula that will calculate the sensitivity level of the permission and determine if the installed application is untrusted or not. Our result show that, in a collection of 26 untrusted application, the framework is able to correct and determine the application&#39;s behavior consistently and efficiently. KEYWORDS permission, permission scoring-based, malware Android phone, Security, Internet, malware
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS from ijitcs
]]>
12 0 https://cdn.slidesharecdn.com/ss_thumbnails/8418ijitcs01-241219055328-5fd2d760-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
6th International Conference on Machine Learning and Soft Computing (MLSC 2025) /slideshow/6th-international-conference-on-machine-learning-and-soft-computing-mlsc-2025/274141203 mlsc2025-241217082059-bf2fb403
#softcomputing #datascience #dataprivacy #datamining #FuzzyLogic #intelligence #machinelearning #microsoftexcel #nanotechnology #imagesetchallenge #telecommunications #knowledge #cluster #artificialintelligence #internetofthings #machinelearning #cybersecurity #computervision #robotics #quantumtechnology #humancomputerinteraction #naturallanguageprocessing #DeepLearning #BigData #analytics #computerarchitecture #DistributedComputing #ubiquitouscomputing #DigitalImageProcessing #agumentedreality #automation #HighPerformanceComputing #virtualrealityworld #algorithms #bioinformatics #database #datamining #embedded #software #informationtechnology #softwareengineer #networking #communication Call For Papers..!! 6th International Conference on Machine Learning and Soft Computing (MLSC 2025) Web page URL:https://acsty2025.org/mlsc/index Submission URL: https://acsty2025.org/submission/index.php Submission Deadline: December 21, 2024 SUBMIT NOW..!! Contact Us: : mlsc@acsty2025.org or mlsc.conf@yahoo.com Paper Submission Link : https://acsty2025.org/submission/index.php ]]>

#softcomputing #datascience #dataprivacy #datamining #FuzzyLogic #intelligence #machinelearning #microsoftexcel #nanotechnology #imagesetchallenge #telecommunications #knowledge #cluster #artificialintelligence #internetofthings #machinelearning #cybersecurity #computervision #robotics #quantumtechnology #humancomputerinteraction #naturallanguageprocessing #DeepLearning #BigData #analytics #computerarchitecture #DistributedComputing #ubiquitouscomputing #DigitalImageProcessing #agumentedreality #automation #HighPerformanceComputing #virtualrealityworld #algorithms #bioinformatics #database #datamining #embedded #software #informationtechnology #softwareengineer #networking #communication Call For Papers..!! 6th International Conference on Machine Learning and Soft Computing (MLSC 2025) Web page URL:https://acsty2025.org/mlsc/index Submission URL: https://acsty2025.org/submission/index.php Submission Deadline: December 21, 2024 SUBMIT NOW..!! Contact Us: : mlsc@acsty2025.org or mlsc.conf@yahoo.com Paper Submission Link : https://acsty2025.org/submission/index.php ]]>
Tue, 17 Dec 2024 08:20:59 GMT /slideshow/6th-international-conference-on-machine-learning-and-soft-computing-mlsc-2025/274141203 ijitcs@slideshare.net(ijitcs) 6th International Conference on Machine Learning and Soft Computing (MLSC 2025) ijitcs #softcomputing #datascience #dataprivacy #datamining #FuzzyLogic #intelligence #machinelearning #microsoftexcel #nanotechnology #imagesetchallenge #telecommunications #knowledge #cluster #artificialintelligence #internetofthings #machinelearning #cybersecurity #computervision #robotics #quantumtechnology #humancomputerinteraction #naturallanguageprocessing #DeepLearning #BigData #analytics #computerarchitecture #DistributedComputing #ubiquitouscomputing #DigitalImageProcessing #agumentedreality #automation #HighPerformanceComputing #virtualrealityworld #algorithms #bioinformatics #database #datamining #embedded #software #informationtechnology #softwareengineer #networking #communication Call For Papers..!! 6th International Conference on Machine Learning and Soft Computing (MLSC 2025) Web page URL:https://acsty2025.org/mlsc/index Submission URL: https://acsty2025.org/submission/index.php Submission Deadline: December 21, 2024 SUBMIT NOW..!! Contact Us: : mlsc@acsty2025.org or mlsc.conf@yahoo.com Paper Submission Link : https://acsty2025.org/submission/index.php <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mlsc2025-241217082059-bf2fb403-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> #softcomputing #datascience #dataprivacy #datamining #FuzzyLogic #intelligence #machinelearning #microsoftexcel #nanotechnology #imagesetchallenge #telecommunications #knowledge #cluster #artificialintelligence #internetofthings #machinelearning #cybersecurity #computervision #robotics #quantumtechnology #humancomputerinteraction #naturallanguageprocessing #DeepLearning #BigData #analytics #computerarchitecture #DistributedComputing #ubiquitouscomputing #DigitalImageProcessing #agumentedreality #automation #HighPerformanceComputing #virtualrealityworld #algorithms #bioinformatics #database #datamining #embedded #software #informationtechnology #softwareengineer #networking #communication Call For Papers..!! 6th International Conference on Machine Learning and Soft Computing (MLSC 2025) Web page URL:https://acsty2025.org/mlsc/index Submission URL: https://acsty2025.org/submission/index.php Submission Deadline: December 21, 2024 SUBMIT NOW..!! Contact Us: : mlsc@acsty2025.org or mlsc.conf@yahoo.com Paper Submission Link : https://acsty2025.org/submission/index.php
6th International Conference on Machine Learning and Soft Computing (MLSC 2025) from ijitcs
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/mlsc2025-241217082059-bf2fb403-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH /slideshow/mobile-cloud-computing-applied-to-healthcare-approach-f6e0/273828271 6516ijitcs01-241204100247-d3edb022
In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and services is one of the vast data approaches that can be adapted to mobile cloud computing. This work proposes a framework of a global healthcare computing based combining both mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security. ]]>

In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and services is one of the vast data approaches that can be adapted to mobile cloud computing. This work proposes a framework of a global healthcare computing based combining both mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security. ]]>
Wed, 04 Dec 2024 10:02:47 GMT /slideshow/mobile-cloud-computing-applied-to-healthcare-approach-f6e0/273828271 ijitcs@slideshare.net(ijitcs) MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH ijitcs In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and services is one of the vast data approaches that can be adapted to mobile cloud computing. This work proposes a framework of a global healthcare computing based combining both mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/6516ijitcs01-241204100247-d3edb022-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In the past few years it was clear that mobile cloud computing was established via integrating both mobile computing and cloud computing to be add in both storage space and processing speed. Integrating healthcare applications and services is one of the vast data approaches that can be adapted to mobile cloud computing. This work proposes a framework of a global healthcare computing based combining both mobile computing and cloud computing. This approach leads to integrate all of the required services and overcoming the barriers through facilitating both privacy and security.
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH from ijitcs
]]>
12 0 https://cdn.slidesharecdn.com/ss_thumbnails/6516ijitcs01-241204100247-d3edb022-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-0e61/273464435 13223ijitcs01-241120105425-c6cb0e33
Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India Web Page URL: https://airccse.org/journal/ijitcs/index.html Current Issue Link: https://airccse.org/journal/ijitcs/vol13.html Paper PDF URL :https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing ]]>

Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India Web Page URL: https://airccse.org/journal/ijitcs/index.html Current Issue Link: https://airccse.org/journal/ijitcs/vol13.html Paper PDF URL :https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing ]]>
Wed, 20 Nov 2024 10:54:25 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-0e61/273464435 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India Web Page URL: https://airccse.org/journal/ijitcs/index.html Current Issue Link: https://airccse.org/journal/ijitcs/vol13.html Paper PDF URL :https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/13223ijitcs01-241120105425-c6cb0e33-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India Web Page URL: https://airccse.org/journal/ijitcs/index.html Current Issue Link: https://airccse.org/journal/ijitcs/vol13.html Paper PDF URL :https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
14 0 https://cdn.slidesharecdn.com/ss_thumbnails/13223ijitcs01-241120105425-c6cb0e33-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
6th International Conference on Cloud and Internet of Things (ICCIoT 2025) /slideshow/6th-international-conference-on-cloud-and-internet-of-things-icciot-2025/273428723 icciot2025cfp1-241119095819-2aa66a83
#clouds #internetofthings #cloudcomputing #infrastructure #management #security #BigData #architecture #cloudstorage #connectivity #networking #datastorage #programming #deployment #opensource #technology #innovation #DevOps #cloudservices #informationtechnology #dataprotection #CloudSecurity #virtualization #computerscience #engineering #artficialintelligence #machinelearning #datascience #IoTSecurity #dataprivacy Submit Your Research Articles...!!! Welcome To ICCIoT 2025 6th International Conference on Cloud and Internet of Things (ICCIoT 2025) January 25 ~ 26, 2025, Copenhagen, Denmark Webpage URL: https://ccseit2025.org/icciot/index Submission Deadline: November 23, 2024 Contact us: Here's where you can reach us: icciot@ccseit2025.org (or) icciotconf@gmail.com Submission URL: https://ccseit2025.org/submission/index ]]>

#clouds #internetofthings #cloudcomputing #infrastructure #management #security #BigData #architecture #cloudstorage #connectivity #networking #datastorage #programming #deployment #opensource #technology #innovation #DevOps #cloudservices #informationtechnology #dataprotection #CloudSecurity #virtualization #computerscience #engineering #artficialintelligence #machinelearning #datascience #IoTSecurity #dataprivacy Submit Your Research Articles...!!! Welcome To ICCIoT 2025 6th International Conference on Cloud and Internet of Things (ICCIoT 2025) January 25 ~ 26, 2025, Copenhagen, Denmark Webpage URL: https://ccseit2025.org/icciot/index Submission Deadline: November 23, 2024 Contact us: Here's where you can reach us: icciot@ccseit2025.org (or) icciotconf@gmail.com Submission URL: https://ccseit2025.org/submission/index ]]>
Tue, 19 Nov 2024 09:58:19 GMT /slideshow/6th-international-conference-on-cloud-and-internet-of-things-icciot-2025/273428723 ijitcs@slideshare.net(ijitcs) 6th International Conference on Cloud and Internet of Things (ICCIoT 2025) ijitcs #clouds #internetofthings #cloudcomputing #infrastructure #management #security #BigData #architecture #cloudstorage #connectivity #networking #datastorage #programming #deployment #opensource #technology #innovation #DevOps #cloudservices #informationtechnology #dataprotection #CloudSecurity #virtualization #computerscience #engineering #artficialintelligence #machinelearning #datascience #IoTSecurity #dataprivacy Submit Your Research Articles...!!! Welcome To ICCIoT 2025 6th International Conference on Cloud and Internet of Things (ICCIoT 2025) January 25 ~ 26, 2025, Copenhagen, Denmark Webpage URL: https://ccseit2025.org/icciot/index Submission Deadline: November 23, 2024 Contact us: Here's where you can reach us: icciot@ccseit2025.org (or) icciotconf@gmail.com Submission URL: https://ccseit2025.org/submission/index <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/icciot2025cfp1-241119095819-2aa66a83-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> #clouds #internetofthings #cloudcomputing #infrastructure #management #security #BigData #architecture #cloudstorage #connectivity #networking #datastorage #programming #deployment #opensource #technology #innovation #DevOps #cloudservices #informationtechnology #dataprotection #CloudSecurity #virtualization #computerscience #engineering #artficialintelligence #machinelearning #datascience #IoTSecurity #dataprivacy Submit Your Research Articles...!!! Welcome To ICCIoT 2025 6th International Conference on Cloud and Internet of Things (ICCIoT 2025) January 25 ~ 26, 2025, Copenhagen, Denmark Webpage URL: https://ccseit2025.org/icciot/index Submission Deadline: November 23, 2024 Contact us: Here&#39;s where you can reach us: icciot@ccseit2025.org (or) icciotconf@gmail.com Submission URL: https://ccseit2025.org/submission/index
6th International Conference on Cloud and Internet of Things (ICCIoT 2025) from ijitcs
]]>
8 0 https://cdn.slidesharecdn.com/ss_thumbnails/icciot2025cfp1-241119095819-2aa66a83-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Low Power CMOS Full Adder Design with 12 Transistors /slideshow/low-power-cmos-full-adder-design-with-12-transistors/273268702 2612ijitcs02-241113094405-ba9a8f64
In present work two new designs for single bit full adders have been presented using three transistors XOR gates. Adder having twelve transistors shows power consumption of 1274µW with maximum output delay of 0.2049ns. Power consumption and maximum output delay shows variation [1274 - 141.77] µW & [0.2049 – 0.4167] ns with varying supply voltage from [3.3 - 1.8] V. Further, reverse body bias technique for power reduction has been applied to adder. Adder with reverse body bias shows power consumption variations of [1270 - 1067.60] µW with varying NMOS reverse bias from [0.0 to - 2.0] V. Delay of adder shows variations [0.2049 - 0.2316] ns with reverse bias variation [0.0 to 2.0] V. Simulations have been carried out at different supply voltage with increasing reverse biased applied to NMOS transistor and results shows improvements in power consumption of adder. A comparison with earlier reported circuits have been presented and proposed circuit’s shows less power dissipation. ]]>

In present work two new designs for single bit full adders have been presented using three transistors XOR gates. Adder having twelve transistors shows power consumption of 1274µW with maximum output delay of 0.2049ns. Power consumption and maximum output delay shows variation [1274 - 141.77] µW & [0.2049 – 0.4167] ns with varying supply voltage from [3.3 - 1.8] V. Further, reverse body bias technique for power reduction has been applied to adder. Adder with reverse body bias shows power consumption variations of [1270 - 1067.60] µW with varying NMOS reverse bias from [0.0 to - 2.0] V. Delay of adder shows variations [0.2049 - 0.2316] ns with reverse bias variation [0.0 to 2.0] V. Simulations have been carried out at different supply voltage with increasing reverse biased applied to NMOS transistor and results shows improvements in power consumption of adder. A comparison with earlier reported circuits have been presented and proposed circuit’s shows less power dissipation. ]]>
Wed, 13 Nov 2024 09:44:04 GMT /slideshow/low-power-cmos-full-adder-design-with-12-transistors/273268702 ijitcs@slideshare.net(ijitcs) Low Power CMOS Full Adder Design with 12 Transistors ijitcs In present work two new designs for single bit full adders have been presented using three transistors XOR gates. Adder having twelve transistors shows power consumption of 1274µW with maximum output delay of 0.2049ns. Power consumption and maximum output delay shows variation [1274 - 141.77] µW & [0.2049 – 0.4167] ns with varying supply voltage from [3.3 - 1.8] V. Further, reverse body bias technique for power reduction has been applied to adder. Adder with reverse body bias shows power consumption variations of [1270 - 1067.60] µW with varying NMOS reverse bias from [0.0 to - 2.0] V. Delay of adder shows variations [0.2049 - 0.2316] ns with reverse bias variation [0.0 to 2.0] V. Simulations have been carried out at different supply voltage with increasing reverse biased applied to NMOS transistor and results shows improvements in power consumption of adder. A comparison with earlier reported circuits have been presented and proposed circuit’s shows less power dissipation. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs02-241113094405-ba9a8f64-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In present work two new designs for single bit full adders have been presented using three transistors XOR gates. Adder having twelve transistors shows power consumption of 1274µW with maximum output delay of 0.2049ns. Power consumption and maximum output delay shows variation [1274 - 141.77] µW &amp; [0.2049 – 0.4167] ns with varying supply voltage from [3.3 - 1.8] V. Further, reverse body bias technique for power reduction has been applied to adder. Adder with reverse body bias shows power consumption variations of [1270 - 1067.60] µW with varying NMOS reverse bias from [0.0 to - 2.0] V. Delay of adder shows variations [0.2049 - 0.2316] ns with reverse bias variation [0.0 to 2.0] V. Simulations have been carried out at different supply voltage with increasing reverse biased applied to NMOS transistor and results shows improvements in power consumption of adder. A comparison with earlier reported circuits have been presented and proposed circuit’s shows less power dissipation.
Low Power CMOS Full Adder Design with 12 Transistors from ijitcs
]]>
5 0 https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs02-241113094405-ba9a8f64-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-a1fe/273065321 1211ijitcs01-241106092145-eb78bf54
International Journal of Information Technology Convergence and services (IJITCS) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology Convergence and services. The journal focuses on all technical and practical aspects of ITC & S. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Information Technology Convergence and services, and establishing new collaborations in these areas. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services. ]]>

International Journal of Information Technology Convergence and services (IJITCS) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology Convergence and services. The journal focuses on all technical and practical aspects of ITC & S. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Information Technology Convergence and services, and establishing new collaborations in these areas. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services. ]]>
Wed, 06 Nov 2024 09:21:45 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-a1fe/273065321 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs International Journal of Information Technology Convergence and services (IJITCS) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology Convergence and services. The journal focuses on all technical and practical aspects of ITC & S. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Information Technology Convergence and services, and establishing new collaborations in these areas. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs01-241106092145-eb78bf54-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> International Journal of Information Technology Convergence and services (IJITCS) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology Convergence and services. The journal focuses on all technical and practical aspects of ITC &amp; S. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Information Technology Convergence and services, and establishing new collaborations in these areas. Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Information Technology Convergence and services.
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
2 0 https://cdn.slidesharecdn.com/ss_thumbnails/1211ijitcs01-241106092145-eb78bf54-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-47e9/272654304 13223ijitcs01-241023081701-cb3a36ee
Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing Current Issue Link:https://airccse.org/journal/ijitcs/vol13.html Paper PDF Link: https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf Web Page Link:https://airccse.org/journal/ijitcs/index.html Submission Link:https://airccse.com/submissioncs/home.html ]]>

Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing Current Issue Link:https://airccse.org/journal/ijitcs/vol13.html Paper PDF Link: https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf Web Page Link:https://airccse.org/journal/ijitcs/index.html Submission Link:https://airccse.com/submissioncs/home.html ]]>
Wed, 23 Oct 2024 08:17:00 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-47e9/272654304 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing Current Issue Link:https://airccse.org/journal/ijitcs/vol13.html Paper PDF Link: https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf Web Page Link:https://airccse.org/journal/ijitcs/index.html Submission Link:https://airccse.com/submissioncs/home.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/13223ijitcs01-241023081701-cb3a36ee-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Application of Various Deep Learning Models for Automatic Traffic Violation Detection using Edge Computing Ramakanthkumar P, Chethan S, Pavithra H ,Prajwal K , Nehal Chakravarthy M D, Shivaraj B Karegera, RV College of Engineering, India ABSTRACT A rapid growth in the population and economic growth has resulted in an increasing number of vehicles on road every year. Traffic congestion is a big problem in every metropolitan city. To reach their destination faster and to avoid traffic, some people are violating traffic rules and regulations. Violation of traffic rules puts everyone in danger. Maintaining traffic rules manually has become difficult over the time due to the rapid increase in the population. This alarming situation has be taken care of at the earliest. To overcome this, we need a real-time violation detection system to help maintain the traffic rules. The approach is to detect traffic violations in real-time using edge computing, which reduces the time to detect. Different machine learning models and algorithms were applied to detect traffic violations like traveling without a helmet, line crossing, parking violation detection, violating the one-way rule etc. The model implemented gave an accuracy of around 85%, due to memory constraints of the edge device in this case NVIDIA Jetson Nano, as the fps is quite low. KEYWORDS Traffic violation detection, Jetson Nano, MobileNet , YOLO, edge computing Current Issue Link:https://airccse.org/journal/ijitcs/vol13.html Paper PDF Link: https://aircconline.com/ijitcs/V13N2/13223ijitcs01.pdf Web Page Link:https://airccse.org/journal/ijitcs/index.html Submission Link:https://airccse.com/submissioncs/home.html
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/13223ijitcs01-241023081701-cb3a36ee-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-9ba9/272592569 ijitcs-cfp-241021055237-0cd1dee5
Call for papers ....!!! #Information Technology #Convergence #services #Advanced IT Bio #Bioinformatics #Medical Engineering #Cloud computing #Convergence in Information Technology Security #Digital convergence #Electronic Commerce International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Submission Deadline : October 27, 2024 Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html ]]>

Call for papers ....!!! #Information Technology #Convergence #services #Advanced IT Bio #Bioinformatics #Medical Engineering #Cloud computing #Convergence in Information Technology Security #Digital convergence #Electronic Commerce International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Submission Deadline : October 27, 2024 Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html ]]>
Mon, 21 Oct 2024 05:52:37 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-9ba9/272592569 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs Call for papers ....!!! #Information Technology #Convergence #services #Advanced IT Bio #Bioinformatics #Medical Engineering #Cloud computing #Convergence in Information Technology Security #Digital convergence #Electronic Commerce International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Submission Deadline : October 27, 2024 Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/ijitcs-cfp-241021055237-0cd1dee5-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Call for papers ....!!! #Information Technology #Convergence #services #Advanced IT Bio #Bioinformatics #Medical Engineering #Cloud computing #Convergence in Information Technology Security #Digital convergence #Electronic Commerce International Journal of Information Technology Convergence and services (IJITCS) ISSN : 2231 - 153X (Online) ; 2231 - 1939 (Print) https://airccse.org/journal/ijitcs/index.html Submission Deadline : October 27, 2024 Contact us:ijitcsjournal33@gmail.com (or) ijitcs@aircconline.com Paper submission link :https://airccse.com/submissioncs/home.html
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
7 0 https://cdn.slidesharecdn.com/ss_thumbnails/ijitcs-cfp-241021055237-0cd1dee5-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-03cd/272452541 2612ijitcs01-241016050740-bef8d0bb
Implementation & Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Preemptive, Round Robin Scheduling, &Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive & Non-preemptive Task, dynamic and static algorithms Paper Pdf Link : https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol2.html Web Page Link: https://airccse.org/journal/ijitcs/index.html ]]>

Implementation & Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Preemptive, Round Robin Scheduling, &Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive & Non-preemptive Task, dynamic and static algorithms Paper Pdf Link : https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol2.html Web Page Link: https://airccse.org/journal/ijitcs/index.html ]]>
Wed, 16 Oct 2024 05:07:40 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-03cd/272452541 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs Implementation & Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive & Non Preemptive, Round Robin Scheduling, &Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive & Non-preemptive Task, dynamic and static algorithms Paper Pdf Link : https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol2.html Web Page Link: https://airccse.org/journal/ijitcs/index.html <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs01-241016050740-bef8d0bb-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Implementation &amp; Performance Analysis of Real Time Scheduling Algorithms for Three Industrial Embedded Applications (IEA) Vishal Vora1 and Ajay Somkuwar2, 1A.I.T.S, India and 2M.A.N.I.T, India ABSTRACT It is essential necessity of embedded system to generate response or output within deadline. Various Scheduling algorithms are used for this purpose to enhance performance, accuracy and security of embedded system applications. These algorithms are either fixed or dynamic type, which are designed for various constraints. Real time scheduling algorithms are mainly depending on type of task i.e. either periodic or aperiodic or sporadic. Some real time scheduling algorithms like Pre-emptive &amp; Non Preemptive, Round Robin Scheduling, &amp;Time Slicing are few of the favourites for various embedded applications. The type of task and accordingly type of scheduling algorithm used for various applications out of which 3 are discussed in this paper as case studies and they are Watch making, Conveyor belts and chair manufacturing. KEYWORDS Real Time Scheduling, Deadline, Preemptive &amp; Non-preemptive Task, dynamic and static algorithms Paper Pdf Link : https://airccse.org/journal/ijitcs/papers/2612ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol2.html Web Page Link: https://airccse.org/journal/ijitcs/index.html
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
10 0 https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs01-241016050740-bef8d0bb-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
International Journal of Information Technology Convergence and services (IJITCS) /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-cb6e/272288335 11621ijitcs01-241009082304-82179711
Simulating Attention Disorder in Autistic Patients based on a Computational Model with Neural Networks Reinforcement Learning Approach Seyedeh Samaneh Seyedi1 and Abolfazl Darroudi2, 1Alzahra University, Iran, 2Allameh Tabatabai University, Iran Paper Pdf Link :https://aircconline.com/ijitcs/V11N6/11621ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol11.html ABSTRACT Autism is an advanced neurological disease that affect communication and social behaviors, including attention -one of the fundamental skills to learn about the world around us. Autistic people have difficulty moving their attention from one point to another fluently. Due to the high prevalence of autism and its increasing progression, and the need to address common disorders in patients, this study aimed to implement and simulate a computational model for attention deficit disorder in autistic patients using MATLAB. This computational model has three components: context-sensitive reinforcement learning, contextual processing, and automation that can teach a shift-shift task automatically. At first, the model functions like normal people, but its performance gets closer to autistic people after changing a single parameter. This study demonstrates that even a simple computational model can be used for normal and abnormal developmental cases using a neural network reinforcement learning approach and provide valuable insights into autism. KEYWORDS Autism Spectrum Disorder (ASD), Attention Deficit, Shift Attention Task, Computational Model, Reinforcement Learning. ]]>

Simulating Attention Disorder in Autistic Patients based on a Computational Model with Neural Networks Reinforcement Learning Approach Seyedeh Samaneh Seyedi1 and Abolfazl Darroudi2, 1Alzahra University, Iran, 2Allameh Tabatabai University, Iran Paper Pdf Link :https://aircconline.com/ijitcs/V11N6/11621ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol11.html ABSTRACT Autism is an advanced neurological disease that affect communication and social behaviors, including attention -one of the fundamental skills to learn about the world around us. Autistic people have difficulty moving their attention from one point to another fluently. Due to the high prevalence of autism and its increasing progression, and the need to address common disorders in patients, this study aimed to implement and simulate a computational model for attention deficit disorder in autistic patients using MATLAB. This computational model has three components: context-sensitive reinforcement learning, contextual processing, and automation that can teach a shift-shift task automatically. At first, the model functions like normal people, but its performance gets closer to autistic people after changing a single parameter. This study demonstrates that even a simple computational model can be used for normal and abnormal developmental cases using a neural network reinforcement learning approach and provide valuable insights into autism. KEYWORDS Autism Spectrum Disorder (ASD), Attention Deficit, Shift Attention Task, Computational Model, Reinforcement Learning. ]]>
Wed, 09 Oct 2024 08:23:04 GMT /slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-cb6e/272288335 ijitcs@slideshare.net(ijitcs) International Journal of Information Technology Convergence and services (IJITCS) ijitcs Simulating Attention Disorder in Autistic Patients based on a Computational Model with Neural Networks Reinforcement Learning Approach Seyedeh Samaneh Seyedi1 and Abolfazl Darroudi2, 1Alzahra University, Iran, 2Allameh Tabatabai University, Iran Paper Pdf Link :https://aircconline.com/ijitcs/V11N6/11621ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol11.html ABSTRACT Autism is an advanced neurological disease that affect communication and social behaviors, including attention -one of the fundamental skills to learn about the world around us. Autistic people have difficulty moving their attention from one point to another fluently. Due to the high prevalence of autism and its increasing progression, and the need to address common disorders in patients, this study aimed to implement and simulate a computational model for attention deficit disorder in autistic patients using MATLAB. This computational model has three components: context-sensitive reinforcement learning, contextual processing, and automation that can teach a shift-shift task automatically. At first, the model functions like normal people, but its performance gets closer to autistic people after changing a single parameter. This study demonstrates that even a simple computational model can be used for normal and abnormal developmental cases using a neural network reinforcement learning approach and provide valuable insights into autism. KEYWORDS Autism Spectrum Disorder (ASD), Attention Deficit, Shift Attention Task, Computational Model, Reinforcement Learning. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/11621ijitcs01-241009082304-82179711-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Simulating Attention Disorder in Autistic Patients based on a Computational Model with Neural Networks Reinforcement Learning Approach Seyedeh Samaneh Seyedi1 and Abolfazl Darroudi2, 1Alzahra University, Iran, 2Allameh Tabatabai University, Iran Paper Pdf Link :https://aircconline.com/ijitcs/V11N6/11621ijitcs01.pdf Current Issue Link : https://airccse.org/journal/ijitcs/vol11.html ABSTRACT Autism is an advanced neurological disease that affect communication and social behaviors, including attention -one of the fundamental skills to learn about the world around us. Autistic people have difficulty moving their attention from one point to another fluently. Due to the high prevalence of autism and its increasing progression, and the need to address common disorders in patients, this study aimed to implement and simulate a computational model for attention deficit disorder in autistic patients using MATLAB. This computational model has three components: context-sensitive reinforcement learning, contextual processing, and automation that can teach a shift-shift task automatically. At first, the model functions like normal people, but its performance gets closer to autistic people after changing a single parameter. This study demonstrates that even a simple computational model can be used for normal and abnormal developmental cases using a neural network reinforcement learning approach and provide valuable insights into autism. KEYWORDS Autism Spectrum Disorder (ASD), Attention Deficit, Shift Attention Task, Computational Model, Reinforcement Learning.
International Journal of Information Technology Convergence and services (IJITCS) from ijitcs
]]>
9 0 https://cdn.slidesharecdn.com/ss_thumbnails/11621ijitcs01-241009082304-82179711-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/cseai2025cfp1-250225093821-f9c52b05-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/3-rd-international-conference-on-computer-science-engineering-and-artificial-intelligence-cseai-2025/276011293 3 rd International Con... https://cdn.slidesharecdn.com/ss_thumbnails/2612ijitcs01-250205121945-6e3c06c0-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/international-journal-of-information-technology-convergence-and-services-ijitcs-b5b8/275391045 International Journal ... https://cdn.slidesharecdn.com/ss_thumbnails/icaita2025cfp-250130105336-8998fb4e-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/14th-international-conference-on-advanced-information-technologies-and-applications-icaita-2025/275257113 14th International Con...