Papers by International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Science & Techniques (IJIST) , 2024
The International Journal of Information Science & Techniques (IJIST) focuses on information syst... more The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
This paper presents, an space efficient algorithm for linear time suffix array construction. The ... more This paper presents, an space efficient algorithm for linear time suffix array construction. The algorithm uses the techniques of divide-and-conquer, and recursion. What differentiates the proposed algorithm from the variable-length leftmost S-type (LMS) substrings is the efficient usage of the memory to construct the suffix array. The modified induced sorting algorithm for the variable-length LMS substrings uses efficient usage of the memory space than the existing variable length left most S-type(LMS) substrings algorithm.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2023
The International Journal of Information Science & Techniques (IJIST) focuses on information syst... more The International Journal of Information Science & Techniques (IJIST) focuses on information systems science and technology coercing multitude applications of information systems in business administration, social science, biosciences, and humanities education, library sciences management, depiction of data and structural illustration, big data analytics, information economics in real engineering and scientific problems.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech... more This paper is concerned with the development of Back-propagation Neural Network for Bangla Speech Recognition. In this paper, ten bangla digits were recorded from ten speakers and have been recognized. The features of these speech digits were extracted by the method of Mel Frequency Cepstral Coefficient (MFCC) analysis. The mfcc features of five speakers were used to train the network with Back propagation algorithm. The mfcc features of ten bangla digit speeches, from 0 to 9, of another five speakers were used to test the system. All the methods and algorithms used in this research were implemented using the features of Turbo C and C++ languages. From our investigation it is seen that the developed system can successfully encode and analyze the mfcc features of the speech signal to recognition. The developed system achieved recognition rate about 96.332% for known speakers (i.e., speaker dependent) and 92% for unknown speakers (i.e., speaker independent).
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
This paper gives an introduction on the IEEE 802.16 standard – WIMAX or Worldwide Interoperabilit... more This paper gives an introduction on the IEEE 802.16 standard – WIMAX or Worldwide Interoperability for Microwave Access. The different parts give details on the architectural specifications of WiMAX networks and also on the working principle of WiMAX networks including its services provided. It also provides brief descriptions on its salient features of this technology and how it benefits the networking industry. A brief outline of the basic building blocks or equipment of WiMAX architecture is also provided. This paper also evaluates the simulation performance of IEEE 802.16 OFDM PHY layer. The Stanford University Interim (SUI) channel model under varying parameters is selected for the wireless channel in the simulation. The performance measurements and analysis was done in simulation developed in MATLAB.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
OCR has been an active research area since last few decades. OCR performs the recognition of the ... more OCR has been an active research area since last few decades. OCR performs the recognition of the text in the scanned document image and converts it into editable form. The OCR process can have several stages like preprocessing, segmentation, recognition and post processing. The preprocessing stage is a crucial stage for the success of OCR, which mainly deals with noise removal. In the present paper, a modified technique for noise removal named as “K-Algorithm” has been proposed, which has two stages as filtering and binarization. The proposed technique shows improvised results in comparison to median filtering technique.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
The purpose of this paper is to examine how we can achieve a cashless society in Nigeria especial... more The purpose of this paper is to examine how we can achieve a cashless society in Nigeria especially given her infrastructure deficits. This study examines the cashless economic system so as to assess its feasibility in Nigeria with regards to timeless, preparedness and adequacy against the backdrop of our level of development both technologically and educationally. Nigeria has continued to evolve in different realms. The economy is being reformed, the institutions are being reshaped and laws are being re-examined so as to reposition the nation to take its rightful position in the international community. As a way of fasttracking the Nigerian economy so as to be among the first 20 world economies come 2020, Nigeria proposed 2012 for the adoption of the cashless economy system starting with Lagos State but could not realized its objective. The study used structured questionnaire as a means of data collection and the collected data were analyzed using simple percentage procedure. The results indicate that: majority of Nigerians are already aware of the policy and majority agree that the policy will help fight against corruption/money laundering and reduce the risk of carrying cash and can also foster economic growth. Major problems envisaged that can hinder the implementation of the policy are: cyber fraud, limited point of sales and numeracy illiteracy. Based on the findings some recommendations made are: the government should adopt a different strategy to educate the non-literate Nigerians about the cashless economy; and the Federal Government of Nigerian should establish a Cybercrime law.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST) , 2013
A different image fusion algorithm based on self organizing feature map is proposed in this paper... more A different image fusion algorithm based on self organizing feature map is proposed in this paper, aiming to produce quality images. Image Fusion is to integrate complementary and redundant information from multiple images of the same scene to create a single composite image that contains all the important features of the original images. The resulting fused image will thus be more suitable for human and machine perception or for further image processing tasks. The existing fusion techniques based on either direct operation on pixels or segments fail to produce fused images of the required quality and are mostly application based. The existing segmentation algorithms become complicated and time consuming when multiple images are to be fused. A new method of segmenting and fusion of gray scale images adopting Self organizing Feature Maps(SOM) is proposed in this paper. The Self Organizing Feature Maps is adopted to produce multiple slices of the source and reference images based on various combination of gray scale and can dynamically fused depending on the application. The proposed technique is adopted and analyzed for fusion of multiple images. The technique is robust in the sense that there will be no loss in information due to the property of Self Organizing Feature Maps; noise removal in the source images done during processing stage and fusion of multiple images is dynamically done to get the desired results. Experimental results demonstrate that, for the quality multifocus image fusion, the proposed method performs better than some popular image fusion methods in both subjective and objective qualities.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST) , 2013
Classification is widely used technique in the data mining domain, where scalability and efficien... more Classification is widely used technique in the data mining domain, where scalability and efficiency are the immediate problems in classification algorithms for large databases. We suggest improvements to the existing C4.5 decision tree algorithm. In this paper attribute oriented induction (AOI) and relevance analysis are incorporated with concept hierarchy’s knowledge and HeightBalancePriority algorithm for construction of decision tree along with Multi level mining. The assignment of priorities to attributes is done by evaluating information entropy, at different levels of abstraction for building decision tree using HeightBalancePriority algorithm. Modified DMQL queries are used to understand and explore the shortcomings of the decision trees generated by C4.5 classifier for education dataset and the results are compared with the proposed approach.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
In this paper, a microcontroller-based temperature monitoring and logging system suitable for use... more In this paper, a microcontroller-based temperature monitoring and logging system suitable for use in hospitals was designed and constructed. The features include ability to monitor a patient’s temperature on a continuous basis while displaying the instant result on a Liquid Crystal Display (LCD) device. The temperature monitored is logged in a memory device, Electrically Erasable Programmable Read Only Memory (EEPROM), located in the system at every 10 minutes interval and can be interfaced with a computer using USB or RS232 UART device. An ATmega16 AVR is used as the heart of the control and coordination of all the activities of the individual modules. It allowed a doctor at location from the patient to keep track of his patient’s condition while attending to other issues.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2013
Binary sensor arrays have many applications for detecting and tracking the location of an object.... more Binary sensor arrays have many applications for detecting and tracking the location of an object. Many considerations factoring into the optimal design for such a system, including the accuracy of location, the extent of the sensor coverage, and the number and size of the sensors used. In this paper, we frame the problem by providing several definitions for sensor coverage and spatial probability for the general case, with special attention to sensor arrays in one dimension as a simplification for the purpose of clarity. We then propose a metric for measuring the overall the utility of a given set of choices that may be used in any algorithm for seeking an optimal outcome by maximizing this utility. Finally, we perform a numerical analysis of several variations of the the proposed metric, again in one dimensions, to illustrate its fitness for the task.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
Classification is widely used technique in the data mining domain, where scalability and efficien... more Classification is widely used technique in the data mining domain, where scalability and efficiency are the immediate problems in classification algorithms for large databases. We suggest improvements to the existing C4.5 decision tree algorithm. In this paper attribute oriented induction (AOI) and relevance analysis are incorporated with concept hierarchy’s knowledge and HeightBalancePriority algorithm for construction of decision tree along with Multi level mining. The assignment of priorities to attributes is done by evaluating information entropy, at different levels of abstraction for building decision tree using HeightBalancePriority algorithm. Modified DMQL queries are used to understand and explore the shortcomings of the decision trees generated by C4.5 classifier for education dataset and the results are compared with the proposed approach.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
A different image fusion algorithm based on self organizing feature map is proposed in this paper... more A different image fusion algorithm based on self organizing feature map is proposed in this paper, aiming to produce quality images. Image Fusion is to integrate complementary and redundant information from multiple images of the same scene to create a single composite image that contains all the important features of the original images. The resulting fused image will thus be more suitable for human and machine perception or for further image processing tasks. The existing fusion techniques based on either direct operation on pixels or segments fail to produce fused images of the required quality and are mostly application based. The existing segmentation algorithms become complicated and time consuming when multiple images are to be fused. A new method of segmenting and fusion of gray scale images adopting Self organizing Feature Maps(SOM) is proposed in this paper. The Self Organizing Feature Maps is adopted to produce multiple slices of the source and reference images based on various combination of gray scale and can dynamically fused depending on the application. The proposed technique is adopted and analyzed for fusion of multiple images. The technique is robust in the sense that there will be no loss in information due to the property of Self Organizing Feature Maps; noise removal in the source images done during processing stage and fusion of multiple images is dynamically done to get the desired results. Experimental results demonstrate that, for the quality multifocus image fusion, the proposed method performs better than some popular image fusion methods in both subjective and objective qualities.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
In this paper, a new modified system for equal power division is implemented with the help of rec... more In this paper, a new modified system for equal power division is implemented with the help of rectangular micro strip patch antenna, Gysel power divider and leakage cancellation circuit. Today’s world power division plays an important role in wireless application areas such as base stations, antenna arrays, handheld devices etc., Here micro strip patch antenna is implemented with FR4 as a substrate material due to its benefits such as low loss and low fabrication cost while the ground material is aluminium due to its conductivity. For a good system, the return loss should be highly desirable and insertion loss should be low. Our proposed system is designed with a combination of micro strip patch antenna, leakage cancellation circuit and Gysel power divider produces equal power division with low loss such as insertion loss is measured as -39.291dB, return loss as -16.11dB and leakage cancellation as 6dB which was designed and simulated in Agilent Advanced Design System software (2009).
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
The Flow of packets inside an IP networks can be effectively controlled by appropriate traffic en... more The Flow of packets inside an IP networks can be effectively controlled by appropriate traffic engineering. Today’s internet routing mainly concentrates on controlling the ingress and egress traffic which occurs through border routers. There are different ways by which we can control the traffic between autonomous systems. In most cases redistribution communities are used for the control over traffic engineering. In this paper we focus on alternative approaches like Multi Protocol Label Switching (MPLS) and Ambient Networks, through which there can be an effective control over traffic engineering. Ambient Networks are designed to solve switching problems between heterogeneous networks.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
Named entity recognition (NER) is one of the applications of Natural Language Processing and is r... more Named entity recognition (NER) is one of the applications of Natural Language Processing and is regarded as the subtask of information retrieval. NER is the process to detect Named Entities (NEs) in a document and to categorize them into certain Named entity classes such as the name of organization, person, location, sport, river, city, country, quantity etc. In English, we have accomplished lot of work related to NER. But, at present, still we have not been able to achieve much of the success pertaining to NER in the Indian languages. The following paper discusses about NER, the various approaches of NER, Performance Metrics, the challenges in NER in the Indian languages and finally some of the results that have been achieved by performing NER in Hindi by aggregating approaches such as Rule based heuristics and Hidden Markov Model (HMM).
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
Speech signal is modelled using the average energy of the signal in the zerocrossing intervals. V... more Speech signal is modelled using the average energy of the signal in the zerocrossing intervals. Variation of these energies in the zerocrossing interval of the signal is studied and the distribution of this parameter through out the signal is evaluated. It is observed that the distribution patterns are similar for repeated utterances of the same vowels and varies from vowel to vowel. Credibility of the proposed parameter is verified over five Malayalam (one of the most popular Indian language) vowels using multilayer feed forward artificial neural network based recognition system. The performance of the system using additive white Gaussian noise corrupted speech is also studied for different SNR levels. From the experimental results it is evident that the average energy information in the zerocrossing intervals and its distributions can be effectively utilised for vowel phone classification and recognition.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are ... more Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are surely an indispensable part of human life .The trend of sharing images of various kinds for example typical technical figures, modern exceptional masterpiece from an artist, photos from the recent picnic to hill station etc, on the internet is spreading like a viral. There is a mandatory requirement for checking the privacy and security of our personal digital images before making them public via the internet. There is always a threat of our original images being illegally reproduced or distributed elsewhere. To prevent the misuse and protect the copyrights, an efficient solution has been given that can withstand many attacks. This paper aims at encoding of the host image prior to watermark embedding for enhancing the security. The fast and effective full counter propagation neural network helps in the successful watermark embedding without deteriorating the image perception. Earlier techniques embedded the watermark in the image itself but is has been observed that synapses of neural network provide a better platform for reducing the distortion and increasing the message capacity.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
Cryptography is the study of mathematical techniques related to aspects of information security s... more Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Bookmarks Related papers MentionsView impact
International Journal of Information Sciences and Techniques (IJIST), 2012
Considering information entropy (IE), HLA surface expression (SE) regulation phenomenon is consid... more Considering information entropy (IE), HLA surface expression (SE) regulation phenomenon is considered as information propagation channel with an amount of distortion. HLA gene SE is considered as sink regulated by the inducible transcription factors (TFs) (source). Previous work with a certain number of bin size, IEs for source and receiver is computed and computation of mutual information characterizes the dependencies of HLA gene SE on some certain TFs in different cells types of hematopoietic system under the condition of leukemia. Though in recent time information theory is utilized for different biological knowledge generation and different rules are available in those specific domains of biomedical areas; however, no such attempt is made regarding gene expression regulation, hence no such rule is available. In this work, IE calculation with varying bin size considering the number of bins is approximately half of the sample size of an attribute also confirms the previous inferences.
Bookmarks Related papers MentionsView impact
Uploads
Papers by International Journal of Information Sciences and Techniques (IJIST)
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
This journal provides a forum that impacts the development of engineering, education, technology management, information theories and application validation. It also acts as a path to exchange novel and innovative ideas about Information systems science and technology.
In this paper, AES has been implemented with single processor. Then the result has been compared with parallel implementations of AES with 2 varying different parameters such as key size, number of rounds and extended key size, and show how parallel implementation of the AES offers better performance yet flexible enough for cryptographic algorithms.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.