Forthcoming and Online First Articles

International Journal of Information and Communication Technology

International Journal of Information and Communication Technology (IJICT)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Information and Communication Technology (41 papers in press)

Regular Issues

  • Information technologies of the Russian-Cuban GNSS service   Order a copy of this article
    by Ilia Bezrukov, Vladislav Yakovlev, Dmitry Marshalov, Yuri Bondarenko, Alexander Salnikov, Omar Pons Rodriguez 
    Abstract: We present the hardware and software implementation of the information technologies for the GNSS service of the Russian-Cuban co-located geodetic station. The service is equipped with geodetic and meteorological instruments with data acquisition and transmission systems and allows to conduct high-precision observations of the GPS and GLONASS global navigation satellite systems (GNSS) as well as meteorological measurements. The coordinates of the station are refined while processing GNSS observations and according to the change in coordinates, the movement of Cuban tectonic plates is estimated. Information technologies of the GNSS service is one of the key elements required for conducting regular automated geodetic and meteorological measurements. Information technologies is a group of computing and networking equipment that provides preliminary processing and transfer of observations to the data processing centre at the Institute of Applied Astronomy in St. Petersburg. It also allows the remote monitoring, control, and maintenance of GNSS service scientific instruments.
    Keywords: remote control and monitoring; virtual private network; VPN; informational security; GNSS service; geodesy; applied geophysics.
    DOI: 10.1504/IJICT.2022.10044510
     
  • Research on operational effectiveness of air and missile defence in maritime stronghold based on queuing theory   Order a copy of this article
    by Wenfei Zhao, Kenan Teng, Jian Chen, Yan Wang 
    Abstract: For the complexity and uncertainty of the enemy situation faced by the defence decision-making in the maritime stronghold, this study adopts the queuing theory to study the process of air and missile defence operations in the maritime stronghold, quantitatively analyses the state transfer probability of the stochastic service system for air and missile defence operations in the maritime stronghold, constructs a mixed system queuing model of multiple service stations arriving in batches, and gives the evaluation model of operational effectiveness for air and missile defence. Finally, the validity of the model and algorithm is verified by arithmetic simulation.
    Keywords: maritime stronghold; air and missile defence; queuing theory; operational effectiveness.
    DOI: 10.1504/IJICT.2022.10045080
     
  • Colossal pattern extraction using optimised length constraints based on differential evolutionary arithmetic optimisation algorithm   Order a copy of this article
    by T. Sreenivasula Reddy, R. Sathya, Mallikharjunarao Nuka 
    Abstract: Extracting large amounts of information and knowledge from a large database is a trivial task. Existing bulk item mining algorithms for an extensive database are systematic and mathematically expensive and cannot be used for large-scale mining with interruptions. In this paper, the problem of mining the colossal patterns (CPs) is solved by using optimised length constraints (LCs). First, we describe the minimum LC and maximum LC problems and connect them to the optimal LC by identifying the optimal threshold values. Here, the differential evolutionary arithmetic optimisation algorithm (DAOA) is used to find the optimal threshold values of the constraints and extract the colossal patterns. The effectiveness of the proposed algorithm is proven by various experiments using different biological datasets.
    Keywords: biological databases; colossal patterns; differential evolutionary arithmetic optimisation algorithm; DAOA; massive data itemset; optimised length constraints.
    DOI: 10.1504/IJICT.2022.10046129
     
  • Design of a new type of logistics handling robot based on STM32   Order a copy of this article
    by Xinliang Cheng, Jinyun Jiang, WanXin Fu, Shiyi Ying, Xiaoliang Jiang 
    Abstract: In order to improve the stability of the logistics handling robot and the accuracy of grasping logistics materials, this paper proposes a new type of logistics handling robot, which is designed by using the combination of PID closed-loop control algorithm and visual recognition technology. In the part of robot software, we use the PID closed-loop control algorithm to make real-time control of the robot, so that it can accurately patrol the line, and use the raspberry Pi call recognition algorithm (opencv) to complete the identification of two-dimensional code, bar code and logistics materials. In the structural part, we improved the five-degree-of-freedom articulated manipulator to realise three-dimensional grasping and ensure fast and accurate grasping and placing of logistics materials. In order to verify the performance of the robot, we design a mini logistics warehouse environment to simulate the real experimental scene. The experimental results show that the designed logistics handling robot can accurately locate and place logistics materials, and complete the handling task according to the task requirements.
    Keywords: logistics handling robot; PID; recognition; articulated manipulator; STM32; image.
    DOI: 10.1504/IJICT.2022.10045557
     
  • Assessment and insurance of cyber risks as tools for ensuring information security of an organisation (on the example of Russia)   Order a copy of this article
    by Dmitry R. Sergeev, Oksana N. Suslyakova, Gulnaz F. Galieva, Elena E. Kukina, Olga Yu. Frantsisko 
    Abstract: The purpose of the study is to reveal the specifics of cyber risks as a source of reducing the information security of organisation, as well as to develop a methodological approach to the formation of tools for managing cyber risks based on their assessment and insurance. The authors analysed the dynamics of the growth of cyber risks in relation to small, medium and large organisations, and also assessed the possible scale of damage from their occurrence in the global economy. The article offers a methodological approach to the analysis of risk factors that affect the amount of possible damage and the likelihood of cyber risk. The authors formed an algorithm for managing the organisation’s cyber risks based on their assessment. The analysis of advanced foreign experience allowed the authors to determine the directions of its adaptation in the process of modernisation and improvement of the mechanism of cyber risk insurance.
    Keywords: cyber risk; cyber incident; digital economy; cyber risk insurance; information security.
    DOI: 10.1504/IJICT.2022.10045738
     
  • Securing BYOD environment from social and mobility related threats: the case of Nigerian banking sector   Order a copy of this article
    by Lizzy Oluwatoyin Ofusori, Prabhakar Rontala Subramaniam 
    Abstract: Globally, bring your own device (BYOD) is gradually gaining popularity in work environments and businesses. The benefits of BYOD, which include increased productivity, flexibility, and efficiency, have necessitated all sectors to adopt this trend to maximise the benefits. The banking sector, in particular, has been at the forefront of the adoption of BYOD, and employees are now enjoying the benefits. However, despite BYOD benefits, security threats and privacy invasion have been a major concern for individuals and organisations. Ofusori et al. (2018) have classified these threats into technical, social and mobility threats. Thus, this paper investigates the influence of social and mobility threats as it relates to BYOD phenomenon in the banking sector. Data was collected from Nigerian bank employees, and the study found that there are overlapping threats due to the influence of social threats over mobility threats. This study addresses the overlap security threats.
    Keywords: security vulnerabilities; security measures; security practices; bring your own device; BYOD; mobile devices.
    DOI: 10.1504/IJICT.2022.10045832
     
  • Brain computer interface with EEG signals to improve feedback system in higher education based on augmentative and alternative communication   Order a copy of this article
    by Hua Sun, Hongxia Hou, Wenxia Song, Hongjuan Hu, Na Liu, Achyut Shankar 
    Abstract: A predictive brain-computer interface is a way to monitor EEG signals in humans currently under the experiment to understand the capability and get proper feedback about the digital education systems. The use of dynamically processed and collected data in a feedback system is unfeasible. Substantial processing delays are caused by a large volume of data utilised by the modern higher educational ideas. An artificial intelligence assisted brain-computer interface feedback system (AI-BCIFS) for ugmentative and alternative communication is proposed to improve feedback analysis based on the EEG signals. AI-BCIFS method is proposed to avoid an unwanted and improper understanding of feedback in the higher education systems. An expanded optimisation methodology is introduced based on the feedback analysis, and the enhanced seeking feedback protocol (ESFP) has been developed to describe automatic recognition and storage. The experimental studies show that AI-BCIFAC is preferable to the existing approaches in terms of accuracy.
    Keywords: brain-computer interface; BCI; higher education; signal; augmentation.
    DOI: 10.1504/IJICT.2022.10046137
     
  • Online education big data mining method based on association rules   Order a copy of this article
    by Na Zhang 
    Abstract: In order to solve the problems of slow mining speed, high noise and poor data correlation in the existing online education big data mining methods, an online education big data mining method based on association rules is designed. Firstly, the recursive distance of the big data centre is determined, and the online education big data is extracted according to the calculation of fuzzy membership. Secondly, the covariance matrix is used to remove the noise in online education big data and reduce the dimension. Finally, calculate the confidence and support of online education big data association rules, determine the association strength between online education big data in the set, and complete data mining. The experimental results show that the mining speed of this method is significantly improved, the longest time is no more than 4 s, and the data mining is highly correlated.
    Keywords: association rules; online education; big data; Euclidean distance; uniformity.
    DOI: 10.1504/IJICT.2022.10046114
     
  • Analysing the Algerian social movement through Twitter   Order a copy of this article
    by Meriem Laifa, Djamila Mohdeb, Mouhoub Belazzoug 
    Abstract: Technology has altered collective actions guidance resulting in a new regulatory frame for action. For the sake of being successful in a social movement, people plan and advertise in advance to encourage and gather greater participation to strengthen the influence of crowds. For this, social media offers exceptional opportunities to organise masses of people into actions with lower participation expenses, and to foster new repositories of information and actions that go beyond communities offline. While most contemporary social movements have been studied from different perspectives, the Algerian social movement (i.e., Hirak) was overlooked in the literature. This paper presents a distinctive foundation for understanding the Algerian Hirak through analysing Twitter data. The used approach is established mainly at the intersection of sociology and data analysis, with the intention to generate an improved discernment of this movement. Promising future research directions are also discussed in this paper.
    Keywords: social movements; social media; Algerian Hirak; natural language processing; Twitter; Algerian Social Movement.
    DOI: 10.1504/IJICT.2022.10046232
     
  • Received signal strength-based power map generation in a 2-D obstructed wireless sensor network   Order a copy of this article
    by Mrinmoy Sen, Indrajit Banerjee, Tuhina Samanta 
    Abstract: This paper analyses the effect of received signal strength (RSS) in efficient deployment, in presence of obstacles. We consider RSS based power values, so that x-y plane represents the spatial coordinates within a target field and z coordinates denote power values over the field. We plot the power values on the x-y coordinates, addressed as power map, having some peaks and falls: the peaks represent strong signals and the falls represent weak signals at the co-ordinates. It is intuitive that locations with strong signals are more suitable for communications. The falls in the power strength indicates that more sensor nodes are to be put for successful communications. We validate the proposed scheme via simulations as well as small-scale indoor and outdoor experiments with XBee sensor motes. We propose an algorithm to estimate the received power and analyse the estimated results with the results generated through the hardware test-bed.
    Keywords: noisy channel; node deployment; power map; channel frequency; obstructed network.
    DOI: 10.1504/IJICT.2022.10046848
     
  • Which people are loyal followers of influencers? An exploratory study   Order a copy of this article
    by Javier A. Sánchez-Torres, Juan Sebastían Roldan-Gallego, Francisco-Javier Arroyo-Cañada, Ana María Argila-Irurita 
    Abstract: Influencers are tools implemented in digital marketing as a communication mechanism between the brand and its target; however, there are few studies that observe the relationship between the personality of the follower and their attitude towards the influencer. The objective of this study is to explore whether personality traits influence positive attitudes towards influencers. An empirical study was carried out in Spain and Colombia with a sample of 381 individuals and cause-effect relationships were analysed using the partial least squares methodology. The results show that extroversion and disordered personality traits are related to positive attitudes towards influencers and there could be some differences between genders, specifically men with a calm personality and women with a sympathetic personality
    Keywords: influencers; personality; followers; social network analysis; internet marketing; digital marketing; partial least squares methodology; extroversion; disordered personality; calm personality; sympathetic personality.
    DOI: 10.1504/IJICT.2022.10047160
     
  • A deep learning approach in brain-computer interaction for augmentative and alternative communication   Order a copy of this article
    by Yubin Liu 
    Abstract: The electroencephalography classification is the primary aspect of brain-computer systems. The changes there are two main concerns. Firstly, conventional approaches do not use multimodal knowledge to their fullest degree. Second, it is almost unlikely to obtain the rule-based EEG repositories as genetic information processing is complex, and metadata accuracy is expensive. In this sense, researchers suggest a new approach named deep learning-based brain-computer interaction (DLBCI) for augmentative and alternative communication to profound transfer learning to address these issues. Initially, these model perceptual activities based on EEG signals, using the EEG input images characterisation, which is intended to retain a standardised description of multimodal ECG signals. Secondly, this model develops a deep-scope transmission of knowledge through joint operations, including an opponent’s infrastructure and an incredibly unique transfer function. The proposed framework for EEG classification problems, such as strength and precision, has many economic benefits in experimentation.
    Keywords: deep learning; brain-computer interaction; augmentative and alternative communication; multimodal signal.
    DOI: 10.1504/IJICT.2022.10047467
     
  • A secure and integrated ontology-based fusion using multi-agent system   Order a copy of this article
    by Tarek Salah Sobh 
    Abstract: This study aims to handle ontology-based fusion and use multi-agent systems to obtain information fusion from multiple sources/sensors in a secure and integrated manner. Therefore, our objective is to produce a secure and integrated ontology-based fusion framework by using multi-agent. The agent system gets different props from using ontologies such as interoperability, reusability, and support. Here, fusion levels vary from the signal level that is low to the high knowledge level. Securing a multi-agent platform was introduced through a security system called 'SMASP'. The performance results show that the framework is almost idle while the user is composing the query. The workload is low on CPU and memory. This framework receives multiple data sources through cloudlet. Ontologies support a secure multi-agent system with different operations such as reasoner agents and query agents. Using the cloudlet architecture gives the flexibility to overcome intensive computing and sensitivity to latency.
    Keywords: information fusion; multiple data sources; integrated framework; ontology; reasoning; cloudlet; agent security.
    DOI: 10.1504/IJICT.2022.10048013
     
  • An efficient single unit for virtual-machine placement in cloud data centres   Order a copy of this article
    by Salam Ismaeel, Ali Miri, Ayman Al-Khazraji 
    Abstract: There are numerous energy minimisation plans are adopted in today’s data centres (DCs). The highest important ones are those that depend on switching off unused physical machines (PMs). This is usually done by optimal distribution and/or reallocating of virtual machines (VMs) on the selected servers. While maintaining the quality of service (QoS) to ensure the performance of a DC. In this work, a novel server machine condition index (MCI) has been proposed, which includes all resources related to servers available in the DC using a single unit. The MCI represents a dynamic tool to compare services, increase effectiveness, reflect PM adequation, and ensure the optimal management of heterogeneous DC resources. The MCI will be used to convert the multi-objective VM allocation optimisation problem into a single-objective problem. This work will identify the MCI components and the way that can be used as a cloud resource unit, and modified VMP algorithms.
    Keywords: power consumption; virtual-machine placement; cloud data centre; closed loop system; sustainable energy systems; task scheduling.
    DOI: 10.1504/IJICT.2022.10048372
     
  • Community detection of trajectory data for location-based facility recommendation system   Order a copy of this article
    by B.A. Sabarish, R. Karthi, T. Gireesh Kumar 
    Abstract: Trajectory contains spatial-data generated from traces of moving objects like people, animals, etc. Community generated from trajectories portrays common behaviour. Trajectory clustering based on community-detection involves region-graph generation and community-detection. In region-graph generation, Trajectories are projected to spatial grid to transform GPS representation into string representation. Sequential graph is generated from string representation. Edge-based similarity is calculated between trajectories to create an adjacency matrix representing relationship and represent entire region. In community-detection phase, region-graph is divided into communities using various algorithms and validated using modularity values. Based on analysis, Louvain, fast-greedy, leading-eigenvector, and edge-Betweenness algorithms provide the optimum modularity value for better community detection. Analysing the community can be used as a pre-processing step in identifying location for location-based services (LBS), including hotspots, delay-tolerant-networks, and mobile antenna placements for better coverage. Design and capacity planning of the network based on the size and pattern of the community improves quality of LBS.
    Keywords: trajectory; community; delay tolerant networks; quality of service; clustering; representation.
    DOI: 10.1504/IJICT.2022.10048405
     
  • Information integration method of English teaching resources based on artificial intelligence   Order a copy of this article
    by Jin Guo 
    Abstract: In this paper, an information integration method of English teaching resources based on artificial intelligence is proposed. The generalised fuzzy C-means clustering algorithm was used to construct the Arduino device image dataset, and the convolutional neural network model of Arduino device was designed. The image data input model in TFRecord format was designed, and multiple Arduino device resource feature maps were output through convolution, pooling and other operations to establish the English teaching resource library and complete the information integration of English teaching resources. The experimental results show that this method has fast convergence speed, with a recognition success rate of 96.7% and can improve the academic performance to more than 90 points, and the actual evaluation value of it in the 5th and 6th academic year is close to 1. Therefore, it can improve the information integration efficiency of English teaching resources and English performance.
    Keywords: artificial intelligence; English teaching; resource information integration; Arduino device; convolution neural network; clustering algorithm.
    DOI: 10.1504/IJICT.2022.10048588
     
  • Research on reversible information hiding in image encryption domain based on multilayer perceptron   Order a copy of this article
    by Zhiqiang Yue, Weijia Chai 
    Abstract: To solve the problems of large mean square error, low peak signal-to-noise (PSNR) ratio and low embedding rate of traditional methods, a reversible information hiding in image encryption domain based on multilayer perceptron is proposed. Image blocks are encrypted sequentially, and the encrypted information is embedded into the image to complete the construction of the image encryption domain. Reversible information in the image encryption domain is extracted, the weight of the extracted information is calculated by multilayer perceptron, and the sender and receiver models are built according to the calculation results. Reversible information hiding in the image encryption domain is realised by using these two models. Experimental results show that the maximum and minimum mean square error of the encrypted image and the original image are 0.254 and 0.482 respectively, the maximum and minimum PSNR ratio are 56dB and 50dB respectively, and embedding rate is always above 91%.
    Keywords: multilayer perceptron; images; encrypted domain; reversible information hiding; dimensionality reduction; sender model; receiver model.
    DOI: 10.1504/IJICT.2022.10049147
     
  • A key feature mining method of online teaching behavior based on k-kernel decomposition   Order a copy of this article
    by Wei Wang 
    Abstract: In view of the poor effect of online teaching behaviour key feature mining, an online teaching behaviour key feature mining method based on k-kernel decomposition is designed. Firstly, the adjacent data of the key features of network teaching behaviour are interpolated to determine the key features, and the singular distance function is normalised to complete the feature preprocessing; Then, the key characteristics of network teaching behaviour are transformed into weighted network, and the key characteristics are divided according to the centrality of nodes; Finally, the online behaviour feature k-kernel after classification is assigned, the feature k-kernel value index after assignment is calculated, the correlation of feature data is calculated, the probability of feature data belonging to k-clustering is determined, and the key feature mining of network teaching behaviour is completed. The results show that the mining effect of this method is good.
    Keywords: K-kernel decomposition; weighted network; online teaching behaviour; key feature mining.
    DOI: 10.1504/IJICT.2022.10049157
     
  • Improving college ideological and political education based on deep learning   Order a copy of this article
    by Youwu Zhang, Yongquan Yan, R. Lakshmana Kumar, Sapna Juneja 
    Abstract: The rapid development of information and technology results in the involvement of technology channels like communication devices, and simultaneously it acts as a vital part of life. It emerged as a significant concern in the student’s educational progress both physically and mentally. It is essential to maintain the teaching quality in the teaching field, and more concentration is needed for the college ideological political education. For successive enhancement, a novel multimedia assisted ideological and political education system using deep learning techniques (MIPE-DLT) is introduced. The model analyses the characteristics and the capability of higher education students in gathering information and realising the effects of propagating novelties in ideological and political education. The proper flow of protocols has been executed in implementing multimedia techniques towards ideological and political education. It bridges the gap efficiently with a higher accuracy rate and processing rate. Compared with previous techniques, the MIPE-DLT achieves a high-order performance ratio with a minimal delay rate.
    Keywords: multimedia; political; ideology; education; college learning; quality; teaching.
    DOI: 10.1504/IJICT.2022.10049249
     
  • A rapid elimination of communication signal interference in complex electromagnetic environment   Order a copy of this article
    by Cao Chai 
    Abstract: To solve the problems of low recognition accuracy, high noise amplitude and long time consuming of traditional methods, a rapid elimination method of communication signal interference in complex electromagnetic environment is studied. Short-time Fourier transform (STFT) algorithm is used to calculate the time spectrum of mixed signals in complex electromagnetic environment. According to frequency and amplitude characteristics, fuzzy minimum-maximum neural network (FMNN) is used to classify and identify the interference signals. According to the transverse filter, least mean square (LMS) algorithm is constructed to calculate the tap weight coefficient and filter coefficient, which is combined with the filter coefficient to separate the normal communication signal from the interference signal to achieve the rapid elimination of interference. Experimental results show that the maximum recognition accuracy of the proposed method is 97%, the signal noise amplitude is between 3 and 10dB, and the average time of interference elimination is 0.73s.
    Keywords: complex electromagnetic environment; communication signal; time spectrum; FMNN; LMS algorithm; low recognition accuracy; long time consuming.
    DOI: 10.1504/IJICT.2022.10050728
     
  • A secret sharing scheme based on integer decomposition and hexagonal structure   Order a copy of this article
    by Zender Rouia, Noui Lemnouar, Abdessemed Mohamed Rida 
    Abstract: Security is a major challenge in storage and transmission of digital data. Secret sharing scheme is a fundamental primitive used in multiparty computations, access control and key management, which is based here on two concepts, namely: hexagonal structure and integer decomposition. Use of hexagonal structure is common in biological modelling. For integer decomposition, the oldest known method is Fermat’s factorisation, while for the proposed decomposition, the factorisation uniqueness of positive integer into two factors is exploited. Experimental results obtained from the applied scheme to digital images reveal interesting properties; this scheme turns out to be lossless, ideal, flexible, extensible, and even can detect and identify cheater; in sum, it has a good security.
    Keywords: secret sharing; quasi-square decomposition; bio-inspired hexagonal structure; isoperimetry.
    DOI: 10.1504/IJICT.2022.10051892
     
  • Research on fast mining algorithm for multi-feature fuzzy association data based on compressed matrix   Order a copy of this article
    by Yibing Han, Zhanlei Shang 
    Abstract: In order to overcome the low mining accuracy and efficiency of traditional multi-feature fuzzy association data mining algorithms, a new fast multi-feature fuzzy association data mining algorithm based on compressed matrix is proposed in this paper. The compressed matrix structure is used to compress the fuzzy correlation data and generate the learning and training module. The average weighting method is used to extract fuzzy features, and the rule information of association data is integrated according to the mining mechanism to obtain the weighted confidence of association rules of fuzzy data. After data weighting, the optimal solution of fuzzy association rules is finally obtained, and the fast mining of fuzzy association data is completed. The experimental results show that the algorithm has accurate data mining effect, the execution speed of the algorithm is fast, and the maximum mining time is only 5.7 s.
    Keywords: compression matrix; data support degree; membership degree; association rules; data mining.
    DOI: 10.1504/IJICT.2022.10051960
     
  • Cost-effective cryptographic architecture in quantum dot cellular automata for secured nano-communication   Order a copy of this article
    by S. Senthilnathan, S. Kumaravel 
    Abstract: Quantum dot cellular automata (QCA) provide rapid computational efficiency, high density and low power consumption, which is an alternative for CMOS technology. In digital world, cryptography is an important feature to protect digital data. To ensure the data protection in nano-communication, a QCA-based cryptographic architecture is proposed in this article. In the proposed design, the encryption and decryption is done with the help of random keys which is produced by the pseudo random number generator (PRNG). In this paper, architectural component of cryptographic architecture includes XOR block, 1 to 4 de-multiplexer and PRNG, which are realised using QCA. Finally, an integration of the individual components through clock zone-based crossover, lead to the generation of a novel cryptographic architecture. This design achieves low cost compared to the existing literature, as it uses minimum number of majority gate and inverters with clock zone-based crossover.
    Keywords: quantum dot cellular automata; QCA; clock zone-based crossover; CZBC; cryptographic architecture; pseudo random number generator; PRNG; demultiplexer; nano-router.
    DOI: 10.1504/IJICT.2022.10051962
     
  • Diabetic retinopathy detection using curvelet and retina analyser   Order a copy of this article
    by Manas Saha, Biswa Nath Chatterji 
    Abstract: The diabetic retinopathy (DR) is a clinical disorder of retina caused due to diabetes mellitus. This work presents an automated detection of DR images using curvelet and retina analyser. Like Fourier transform, curvelet is a mathematical transform. It is deployed here to trace the directional field of the curve singularities of the retina images. This helps to segment the retinal vasculature of the fundus images. The change in retinal morphology like length, diameter, tortuosity due to the ophthalmoscopic changes are computed by retina analyser. Feedforward neural network (FNN) is implemented to detect DR images with sensitivity: 79%, specificity: 94% and accuracy: 88% which is better than the contemporary works. The proposed system is a smart integration of three modules - curvelet, retina analyser and FNN. It is simple, less time consuming and easily implementable. In future the same system can be extended to detect exact stage of DR.
    Keywords: diabetic retinopathy; retinal vasculature; tortuosity; optic fundus; single layer perceptron.
    DOI: 10.1504/IJICT.2022.10052060
     
  • Study on enterprise financial information management system based on big data analysis.   Order a copy of this article
    by Li Zhang 
    Abstract: In order to improve the accuracy of enterprise financial information management and reduce management time, this paper proposes to design an intelligent enterprise financial information management system. Stm32f103zet6 single chip microcomputer was selected in this hardware, and TC1782 is the main controller; in the software, this system login module, authority management module, financial subject information module and financial database module are designed; in the financial information database management module, the confidence of data is determined with the help of big data analysis method, and the effective financial information data is defined through the fuzzy theory in big data analysis to complete this design. The comparison shows that the proposed system can increase this accuracy of financial data management, and the data processing time is short.
    Keywords: big data analysis; financial information; Stm32f103zet6; Tc1782 microcontroller; authority management module; financial information database management module.
    DOI: 10.1504/IJICT.2022.10052061
     
  • Research on accurate estimation of energy consumption of new energy vehicles based on improved Kalman filter   Order a copy of this article
    by Fangling Zhang 
    Abstract: Because the previous traditional methods have a series of obstacles in data acquisition, such as low accuracy, large error and long calculation time, an accurate estimation method of energy consumption of new energy vehicles based on improved Kalman filter is proposed. Taking TC275 chip as the core, a set of energy vehicle energy consumption data acquisition architecture is designed to filter the collected data. After changing the estimation calculation method, finally, the latest consumption estimates result is obtained by using the Kalman filter. The result is 88%, the maximum is 93%, the average energy consumption estimation error rate is 6.8%, and the estimation time fluctuates between 0.3 s and 0.7 s.
    Keywords: improved Kalman filtering; new energy vehicles; accurate energy consumption estimation; data acquisition architecture; filtering.
    DOI: 10.1504/IJICT.2022.10052062
     
  • A data tamper-proof method of cloud computing platform based on blockchain   Order a copy of this article
    by Dongying Gao, Renjie Su, Helin Zhang, Jie Fu, Hang Zhang 
    Abstract: In order to solve the problems existing in traditional methods such as low tamper-proof success rate, high tamper-proof time and high resource occupation, a data tamper-proof method of cloud computing platform based on blockchain is designed. The differences of data features are obtained according to the number of data spatial dimensions to determine the importance of data features. According to the importance of data features, on the basis of cloud computing platform data denoising processing, the data feature set is constructed to complete feature extraction. Combined with the result of feature extraction, blockchain is used to construct block structure, and the tamper-proof algorithm of cloud computing platform data is designed to ensure the data security of cloud computing platform. The experimental results show that the tamper-proof method designed has a high success rate, low tamper-proof time, low resource occupation, and good practical application effect.
    Keywords: blockchain; cloud computing; data tamper-proofing; platform data; realtime.
    DOI: 10.1504/IJICT.2022.10052225
     
  • Study on detection of attacking nodes in power communication network based on non-parametric CUSUM algorithm   Order a copy of this article
    by Mengxiang Liang, Wenlong Yao, Changqi Wei 
    Abstract: In order to improve the detection accuracy and time-consuming of traditional attack node detection methods, the paper proposes a new method for power communication network attack node detection based on non-parametric CUSUM algorithm. First, according to the similarity evaluation results, the suspicious nodes in the power communication network are collectively processed. Secondly, in order to make the node sequence meet the calculation requirements of the non-parametric CUSUM algorithm, the node sequence is preprocessed. Finally, the non-parametric CUSUM algorithm is used to calculate the threshold of the attacking node detection, and the attacking node decision function is constructed to complete the detection of the attacking node. Through experimental verification, it is found that the detection method proposed in this study can effectively detect attacking nodes, the detection accuracy is basically maintained above 95%, and the maximum detection time does not exceed 4 s.
    Keywords: non-parametric CUSUM algorithm; power communication network; attack node detection.
    DOI: 10.1504/IJICT.2022.10052226
     
  • Multi-link similar data mining and cleaning method based on Bayesian algorithm   Order a copy of this article
    by Kaiku Wang, Congkuan Huang, Yang Yang 
    Abstract: Aiming at the problem of low precision and large cleaning error in multi-link similar data mining, a multi-link similar data mining cleaning method based on Bayesian algorithm is proposed in this paper. On the basis of extracting multi-link data, the data is preprocessed and the similarity between the data is calculated. The data with high similarity is input into the Bayesian network, and the data cleaning process is completed according to the maximum likelihood value of the data. Experimental results show that the mining accuracy of the proposed method for similar data can reach 98.51%, and the cleaning error is about 1.22%, indicating that the proposed method can more effectively complete the mining and cleaning of similar data in multi-links.
    Keywords: Bayesian algorithm; multi-link similar data; data mining; directed graph; maximum likelihood.
    DOI: 10.1504/IJICT.2022.10052404
     
  • A Huffman based short message service compression technique using adjacent distance array   Order a copy of this article
    by Pranta Sarker, Mir Lutfur Rahman 
    Abstract: The short message service (SMS) is a wireless medium of transmission that allows you to send brief text messages. Cell phone devices have an uttermost SMS capacity of 1,120 bits in the traditional system. Moreover, the conventional SMS employs seven bits for each character, allowing the highest 160 characters for an SMS text message to be transmitted. This research demonstrated that an SMS message could contain more than 200 characters by representing around five bits each, introducing a data structure, namely, adjacent distance array (ADA) using the Huffman principle. Allowing the concept of lossless data compression technique, the proposed method of the research generates character’s codeword utilising the standard Huffman. However, the ADA encodes the message by putting the ASCII value distances of all characters, and decoding performs by avoiding the whole Huffman tree traverse, which is the pivotal contribution of the research to develop an effective SMS compression technique for personal digital assistants (PDAs). The encoding and decoding processes have been discussed and contrasted with the conventional SMS text message system, where our proposed ADA technique performs outstandingly better from every aspect discovered after evaluating all outcomes.
    Keywords: data compression; SMS compression; Huffman coding; data structure; adjacent distance array; ADA.
    DOI: 10.1504/IJICT.2022.10052558
     
  • Fuzzy-based weighted fair queue scheduling technique for internet of things networks   Order a copy of this article
    by Harpreet Kaur, Manoj Kumar, Sukhpreet Kaur Sidhu, Sukhwinder Singh Sran 
    Abstract: In an IoT enabled network, a variety of devices are interconnected to each other and communicate by using ultra low power communication technology known as time slotted channel hopping mechanism. To transmit information accurately, efficiently and in collision free manner, a scheduling window is implemented for the devices deployed in the network. The priority scheduling is one of the solutions implemented recently in which nodes have high priority to transmit data first. Such algorithms can block low priority communication channels indefinitely that may leave some events unreported. In order to achieve fairness, efficiency in scheduling, we used fuzzy-based weighted fair queue scheduling algorithm. So, the fuzzy-based weighted fair queue scheduling suppresses the unfairness in the scheduling mechanism for communication paths having little information. The weighted fair queue scheduling algorithm belongs to a class of scheduling algorithms that are used in network schedulers. To implement this algorithm and compare the performance with the existing technique, the MATLAB platform is used. The results reveal the improvements in network throughput, end-to-end delay, energy consumption rate, network lifetime, congestion rate and packet loss ratio as compared to existing work in the similar scenarios.
    Keywords: fair queue scheduling; priority scheduling; data transmissions; fuzzy logic; sensors.
    DOI: 10.1504/IJICT.2022.10052800
     
  • Interactive decision support system with machine intelligence for augmentative communication   Order a copy of this article
    by Ruiwei Chen, C.B. Sivaparthipan 
    Abstract: Many augmentative communication technologies help physically challenged people to communicate with others in the present world. Augmentative communication system integrates components that include symbols, strategies, and aids that enhance communication abilities. Augmentative communication technology’s significant challenge for physically challenged people is the lack of speech expression and depression. Interactive decision support system integrated machine intelligence framework (DSS-MIF) supports augmentative communication proposed to express the physically challenged expression and depression. DSS has multiple sensors, which monitor the heartbeat rate, vocal cord vibration, body temperature, and muscle contraction. The related data are calibrated using MIF, in which the expression of the person is recognised. Based on the DSS-MIF output, physically challenged people could express themselves to others using the augmentative communication system. The experimental analysis shows that the proposed DDS-MIF for augmentative communication improves performance rate to 98.66% and shows physically challenged people’s expression effectively.
    Keywords: augmentative communication; machine intelligence; decision support; multiple sensors.
    DOI: 10.1504/IJICT.2023.10056637
     
  • Investigating the effect of TEC variability on a dual-band GNSS receiver’s geographic location using carrier phase measurement   Order a copy of this article
    by Udaya Kumar Sahoo, Bijayananda Patnaik, Srinivasarao Chintagunta, Shyam Sundar Kundu, Shiv Prasad Aggarwal 
    Abstract: Satellite navigation is affected significantly by the ionospheric plasma bubbles and characterised using total electron content (TEC) of the ionosphere. To determine TEC, Global Navigation Satellite System (GNSS) based method has been prevailed. In this work, dual-band multi-constellation GNSS receivers were used to acquire the navigation signal of a satellite constellation in carrier phase mode. An experimental study was conducted in north-eastern tropical zone of India to correlate the position error of the dual-band GNSS receiver with the variability of TEC in the ionosphere. The study shows that the concentration of TEC in the ionosphere fluctuates throughout the day, viz., the peak value of TEC during morning, noon-time, and evening is 30.43 TECU, 65.37 TECU, and 28.32 TECU, respectively. At the TEC variability of 23.913 TECU during the September equinox, position accuracy of dual-band GNSS receiver was affected by 13.8477 cm, 3.3950 cm, and 4.9583 cm in latitude, longitude, and altitude, respectively.
    Keywords: TEC variability; ionospheric perturbation; dual-band GNSS receiver; positioning accuracy; geospatial measurement.
    DOI: 10.1504/IJICT.2023.10056906
     
  • Fusion deep capsule-network based facial expression recognition   Order a copy of this article
    by Yilihamu YaErmaimaiti, Guohang Zhuang, Tusongjiang Kari 
    Abstract: Facial expression recognition plays a crucial role in many automated system applications such as human-computer interaction, multi-modal emotion analysis, and medical assistance. Recognising facial expressions accurately is challenging. The existing facial expression recognition methods are limited in exploring the correlation between features, and most of them ignore the significance of feature relationship to FER. In this article, we propose a neural network FDC for facial expression identification. The main purpose is to design a deep capsule neural network that is a fusion of multi-layer convolutional neural network and capsule neural network. In the light-layer network, we have added an attention mechanism based on LPB, and the loss function of the FDC network is constructed. The main purpose is: 1) consider the influence of feature relationship on facial expression recognition; 2) use a designed attention mechanism to capture the important local information in facial features; 3) balance overall loss. Our method can achieve 97.93%, 92.86% and 98.57% recognition accuracy for RaFD, KDEF and CK+, respectively, which is more accurate than most state-of-the-art techniques while maintaining real-time performance, which is a great improvement compared to current public facial expression recognition methods.
    Keywords: facial expression; capsule network; attention mechanism; loss function; facial expression recognition.
    DOI: 10.1504/IJICT.2023.10059350
     
  • Algorithm for interference filtering of Wi-Fi gesture recognition   Order a copy of this article
    by Wei Han, Jing Yu 
    Abstract: Nowadays with the continuous improvement of computer technology, human-computer interaction becomes more and more important in people's life. Among them, gesture, as an intuitive human language, has become an important way of human-computer interaction. Meanwhile, an important branch of mobile network, WLAN has gradually developed into an irreplaceable technology in indoor communication. This paper is based on the relevant knowledge of the wireless channel state information (CSI), put forward under the environment of Wi-Fi, with the help of fertility carrier amplitude information provided by the CSI for fine-grained gesture recognition. Because of interference, a gesture recognition system based on Wi-Fi accuracy and robustness is used to ascend; therefore, this paper proposes a Wi-Fi gesture recognition interference filter algorithm using Butterworth low-pass filter and principal component analysis (PCA), combining the CSI of raw data denoising processing and filtering CSI noise in the raw data. On the basis of the recognition and machine learning, the results verify the robustness and accuracy of the algorithm.
    Keywords: channel state information; CSI; noise and interference filtering; gesture; recognition; machine learning.
    DOI: 10.1504/IJICT.2022.10045471
     
  • Prediction method of tourism destination selection behaviour based on nearest neighbour decision tree   Order a copy of this article
    by Qun Shang 
    Abstract: Aiming at the problems of large feature extraction error and poor prediction accuracy in tourism destination selection behaviour prediction method, a tourism destination selection behaviour prediction method based on nearest neighbour decision tree is proposed. With the help of bilinear function, the abstract tourism destination selection behaviour feature data is linearised, the freedom of linear feature data is limited, and the tourism feature is extracted through the scoring matrix. Set the characteristic data matrix, fix the characteristic data in a specific area, and determine the data weight through the cosine similarity algorithm. According to the nearest neighbour algorithm, the maximum attribute value of the selection behaviour data is determined, the tourism destination selection behaviour prediction decision tree is constructed, and the selection error is corrected with the help of the correction function to complete the behaviour prediction. The results show that the accuracy of the proposed method is 97%.
    Keywords: nearest neighbour decision tree; tourist destinations; select behaviour prediction; correction function; maximum attribute value.
    DOI: 10.1504/IJICT.2022.10052406
     
  • A wireless sensor network node redeployment method based on improved leapfrog algorithm   Order a copy of this article
    by Bin Zhang, Xinhua Wang 
    Abstract: In order to overcome the problems of large errors and low average coverage of nodes in traditional node redeployment methods, a node redeployment method based on improved frog jump algorithm is designed in this paper. The output node path of wireless sensor network is determined by constructing the distribution node deployment model. Then the leapfrog algorithm is improved by introducing virtual force algorithm, and the physical model of node deployment area is established, so as to optimise the node deployment process by using gravity and repulsion force and redeploy static and dynamic nodes. Experiments show that the minimum node redeployment error of this method is only 0.01. When the energy of some nodes is exhausted, it still has relatively good coverage quality performance, and the average coverage rate reaches 75%, which proves that it not only ensures the network coverage quality, but also reduces the number of working nodes.
    Keywords: improved leapfrog algorithm; wireless sensor network; node redeployment; node path.
    DOI: 10.1504/IJICT.2022.10047449
     
  • Study on improved personalised music recommendation method based on label information and recurrent neural network   Order a copy of this article
    by Yali Zhang 
    Abstract: In order to improve the problems of low accuracy and the time-consuming period of traditional personalised music recommendation methods, a personalised music recommendation method based on label information and a recurrent neural network is proposed in this paper. Firstly, the music label information is extracted, and the music label information is clustered according to the label similarity. Secondly, the music label information clustering results are decomposed by tensor, and all tensor decomposition data are fused to generate the target user recommendation list. Finally, the recurrent neural network is used to select personalised music from the user recommendation list and recommend it to users. The simulation results show that the accuracy of personalised music recommendation is always more than 93%, and the recommendation time is always less than 0.6 s.
    Keywords: label information; recurrent neural network; individualisation; music recommendation; similarity calculation; tensor decomposition.
    DOI: 10.1504/IJICT.2022.10052403
     
  • Study on a method for capturing basketball player's layup motion based on grey level co-occurrence matrix   Order a copy of this article
    by Luojing Wang 
    Abstract: In the process of basketball players' layup motion capture, the image blur leads to high layup motion capture error. Therefore, a basketball player layup motion capture method based on grey level co-occurrence matrix is proposed. The hue, saturation and brightness components of basketball player's layup action image are unified greyed, and the fuzzy information in the image is transformed into different greyscale information. The Pearson correlation coefficient is used to analyse the correlation between each component after greying, and the grey information of fuzzy image is filtered by establishing grey co-occurrence matrix. By analysing the change of positioning coordinates of basketball players' layup action in three-dimensional space, the core area of action capture is determined, and the key point position capture results are aggregated to realise the capture of basketball players' layup action. The results show that the accuracy of the proposed method can reach 97.14%.
    Keywords: grey level co-occurrence matrix; motion capture; grey processing; Pearson correlation coefficient; blur image; positioning coordinates.
    DOI: 10.1504/IJICT.2022.10047495
     
  • A PRI estimation and signal deinterleaving method based on density-based clustering   Order a copy of this article
    by Lei Wang, Zhiyong Zhang, Tianyu Li, Tianhe Zhang 
    Abstract: In the existing statistics-based PRI estimation method, it is difficult to improve the PRI estimation accuracy due to the contradiction between the width of the statistical interval and the PRI extraction accuracy. In order to improve the accuracy of PRI estimation, a radar signal PRI estimation and deinterleaving method based on the density-based clustering is proposed in this paper. The dense area of the time of arrival (TOA) difference sequence near the true PRI value is extracted out by density-based clustering. The intra-class mean value is taken as the PRI estimation value and the intra-class point dispersion interval length as the PRI jitter amplitude. Combined with the sequence searching method with dynamic tolerance, the pulse sequence with a large number of pulses and small PRI jitter is preferentially extracted, which can improve the accuracy of signal deinterleaving. The simulation results show that the proposed method can significantly improve the accuracy of PRI estimation and the success rate of signal deinterleaving in the case of PRI jitter and false pulse interference.
    Keywords: radar emitters; radar signals; pulse repetition interval; PRI; PRI estimation; signal deinterleaving; density-based clustering; DBSCAN; time of arrival; TOA; PRI jitter.
    DOI: 10.1504/IJICT.2022.10044511
     
  • Classification of existing mobile cross-platform approaches and proposal of decision support criteria   Order a copy of this article
    by Ayoub Korchi, Mohamed Karim Khachouch, Younes Lakhrissi, Nisrine El Marzouki, Aniss Moumen, Mohammed El Mohajir 
    Abstract: The smartphone market has known an exponential growth since 2007, with the apparition of the first Apple phone. Nowadays, developing an application that targets all existing mobile platforms, becomes a tedious task for developers, due to the diversity of mobile platforms, their tools. For that, cross-platform approach with its various sub-approaches has shown its strength in reducing project's cost and time respecting the slogan 'develop once and deploy everywhere'. This paper aims to compare the mobile app development's approaches and suggests a decisional framework to choose the adequate one to get an application respecting the client's need with a low cost and time. This framework's criteria have a huge impact on the eventual cost, time, and success of an application building. If developers fail to match the demands of an app with the right development approach, it can turn their project into a certain failure.
    Keywords: OS comparative study; mobile cross-platform; MDE; MDA.
    DOI: 10.1504/IJICT.2024.10060618