643 research outputs found

    ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks

    Get PDF
    One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmission and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization

    Vehicle Classification Algorithm using Size and Shape

    Get PDF
    Automatic classification of vehicles into different classes based on their sizes and shapes is very useful for traffic control and toll collection process. Effective intelligent transportation system that incorporates vehicle classification technique is needed in many cities to prevent road accident and traffic congestion caused by illegal movement of vehicles. This work presents method of getting structural information from detected vehicle images and then uses it to classify vehicles into different classes. The technique involves extraction of contour features from vehicle images side view using morphological operations. The extracted features were combined and used to generate feature vector that serve as input data to vehicle classification algorithm based on Euclidean distance measure. Impressive result was achieved from the proposed vehicle classification method

    Aborigines-Migrant Settlers Crisis and Reconstruction Efforts in two Yoruba Communities in South Western Nigeria

    Get PDF
    Communities coexist for several reasons. Many traditional Yoruba communities are not an exemption as quite a number of communities were brought together partially based on the need to fight against a common enemy as well as prevent invasion. Ile-Ife and Modakeke-Ife are two neighbouring communities demonstrating such historicalbackground. The communities have co-existed peaceful for several decades, shared many things in common including cases of intermarriages until they started having communal clashes. The crisis have caused significant changes to the existing social relations between the two communities, resulting in widespread breakdown of law and order, destruction of lives and properties as well as homelessness and dispossession of farmlands. Despite the intensity of the crisis and the overwhelming odds, the communities have remained as neighbours. What are the sources of the communities’ resilience amidst the disaster? Forty Seven in-depth interviews were held with twogroups of adults (youths and the elderly) on gender basis who are residents in the two communities. Findings revealed that informal social network and some formal community institutions were the most significant factors enhancing participants’ resilience during and after the crisis. However, the study also disturbingly revealed thatthere is still bitterness centring on farm land rights within the community, and partisan politics have undermined previous efforts at addressing the issue. The study concludes that disrupted social networks could erode community cohesion and political factorshave the potential to further diminish resilience against crisis in the future

    ANCAEE: A novel clustering algorithm for energy efficiency in wireless sensor networks

    Get PDF
    One of the major constraints of wireless sensor networks is limited energy available to sensor nodes because of the small size of the batteries they use as source of power. Clustering is one of the routing techniques that have been using to minimize sensor nodes’ energy consumption during operation. In this paper, A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks (ANCAEE) has been proposed. The algorithm achieves good performance in terms of minimizing energy consumption during data transmis-sion and energy consumptions are distributed uniformly among all nodes. ANCAEE uses a new method of clusters formation and election of cluster heads. The algorithm ensures that a node transmits its data to the cluster head with a single hop transmission and cluster heads forward their data to the base station with multi-hop transmissions. Simulation results show that our approach consumes less energy and effectively extends network utilization

    A dependable model for attaining maximum authetication security procedure in a grid based environment

    Get PDF
    Grid computing is an emergent computing innovation which offers endless access to computing infrastructure across various organizations (academia and industry). Since this technology allows aggregation of various computer systems for usage by different users to run applications, the information stored on it which may be sensitive and private, remains vulnerable. According to related research on the attribute based access control for grid computing there is no adequate and appropriate security mechanism to authorize and authenticate users before accessing information on a grid system. The issue of security in grid technology has not been fully addressed even though it is a precondition for optimizing grid usability. Having realized the paucity of security guarantees, this research work focuses on developing a model for securing data and applications deployed on a grid on the basis of double identity authentication and public key. The implementation of the model has undoubtedly guaranteed the security of sensitive information on a grid vis-α-vis strict adherence to security policies and protocols

    Evaluating SMS parsing using automated testing software

    Get PDF
    Mobile phones are ubiquitous with millions of users acquiring them every day for personal, business and social usage or communication. Its enormous pervasiveness has created a great advantage for its use as a technological tool applicable to overcome the challenges of information dissemination regarding burning issues, advertisement, and health related matters. Short message services (SMS), an integral functional part of cell phones, can be turned into a major tool for accessing databases of information on HIV/AIDS as appreciable percentage of the youth embrace the technology. The common features by the users of the unique language are the un-grammatical structure, convenience of spelling, homophony of words and alphanumeric mix up of the arrangement of words. This proves it to be difficult to serve as query in the search engine architecture. In this work SMS query was used for information accessing in Frequently Asked Question FAQ system under a specified medical domain. Finally, when the developed system was measured in terms of proximity to the answer retrieved remarkable results were observed

    Design and Construction of Sheabutter Extraction Machine for Rural Areas In The Developing Countries

    Get PDF
    Both industrial and domestic applications of oils/fats have necessitated lipids research and the best method of extraction. The design and construction of the sheabutter extractor was made with the view of improving the nutrients in sheabutter. The construction was made within the available local raw materials.· The extractor- which is portable and manually operated, is meant to serve r-ur-al areas in the developing countries. The sheabutter extractor was tested and was found to be sa tis factory

    Context-Aware Stemming algorithm for semantically related root words

    Get PDF
    There is a growing interest in the use of context-awareness as a technique for developing pervasive computing applications that are flexible and adaptable for users. In this context, however, information retrieval (IR) is often defined in terms of location and delivery of documents to a user to satisfy their information need. In most cases, morphological variants of words have similar semantic interpretations and can be considered as equivalent for the purpose of IR applications. Consequently, document indexing will also be more meaningful if semantically related root words are used instead of stems. The popular Porter’s stemmer was studied with the aim to produce intelligible stems. In this paper, we propose Context-Aware Stemming (CAS) algorithm, which is a modified version of the extensively used Porter’s stemmer. Considering only generated meaningful stemming words as the stemmer output, the results show that the modified algorithm significantly reduces the error rate of Porter’s algorithm from 76.7% to 6.7% without compromising the efficacy of Porter’s algorithm

    UDCA: Energy optimization in wireless sensor networks using uniform distributed clustering algorithms

    Get PDF
    Transceivers are the major energy consumption in a Wireless Sensor Network which is made of low-power, small in size, low cost and multi-functional nodes. These sensor nodes are operated by batteries which put significant constraint to the energy available to them. Each sensor node collects sensed data and forwards it to a single processing centre called the base station which uses all reported data to detect an event or determine the changes in an environment. In present study, we propose energy optimization in Wireless Sensor Networks (WSNs) using uniform distributed clustering algorithms. One of the algorithms distributes cluster heads uniformly in each cluster and each non-cluster head transmit its data to the cluster heads with short distance which reduces the communication distance of each node. Thus, minimizes the energy consumption of sensor nodes. The second algorithm generates cluster heads in hierarchical form in order to transmit the aggregate data to the base station. It was observed that there is increase in energy savings as we move from bottom up in the hierarchy. Both UDCA protocol and Low Energy Adaptive Cluster Hierarchy protocol (LEACH) were simulated. The simulation results show significant reduction in energy consumption of sensor nodes and cluster heads are more uniformly distributed among all nodes in UDCA compare with LEACH and extend the wireless sensor networks lifetime

    Development Of An SMS Based Alert Systemusing Object Oriented Design Concept

    Get PDF
    An automated lecture alert management system has been developed using java programming concept knownfor its portability. This backend system was interfaced with the GSM network through USB port of a PC and GSM modem. The desktop SMS application was developed using C# programming language. It generates updates and reminder from a time schedule stored in a database thereby making the system a time triggered application
    • …
    corecore