-
Review Article
April 11, 2022
Yen Wen Chen* and BoHan Huang
DOI : 10.32474/CTCSA.2022.02.000136
View abstract
PDF
Full text
The main concept of metaverse is to connect augmented reality (AR) and virtual reality (VR) devices to achieve common share space for new applications and services. The existing internet of things (Iot) services shall support high interaction system architecture and techniques to respond to this application trend. Although the cloud computing based network services can support high and flexible computing and storage space, it still cannot satisfy the above real time interaction demand due to long transmission delay. The edge computing architecture is therefore proposed for task offloading requested by the clients to effectively utilize the computing resource provided by the edge server and save the energy of the client device. However, the communication and computing resource are limited and shall be properly arranged for tasks with diffe.....
ReadMore
-
Research Article
April 11, 2022
Yen Wen Chen* and BoHan Huang
DOI : 10.32474/CTCSA.2022.02.000136
View abstract
PDF
Full text
The main concept of metaverse is to connect augmented reality (AR) and virtual reality (VR) devices to achieve common share space for new applications and services. The existing internet of things (Iot) services shall support high interaction system architecture and techniques to respond to this application trend. Although the cloud computing based network services can support high and flexible computing and storage space, it still cannot satisfy the above real time interaction demand due to long transmission delay. The edge computing architecture is therefore proposed for task offloading requested by the clients to effectively utilize the computing resource provided by the edge server and save the energy of the client device. However, the communication and computing resource are limited and shall .....
ReadMore
-
Review Article
March 14, 2022
Andrew Herman and Atilla Ertan*
DOI : 10.32474/CTGH.2022.03.000167
View abstract
PDF
Full text
Despite remarkable progress for management of moderate-to-severe IBD patients, there are significant rates of primary non-response, loss of response, and/or adverse events thereby necessitating additional treatment options. Additionally, the burden of intravenous administration or subcutaneous injection of biologics accompanied by associated high cost necessitate the development of alternative treatments. In recent years, remarkable research has focused on the development of oral small molecule agents. Fortunately, the rapidly growing number of targeted therapies with oral small molecule agents offer the advantage of ease of administration with the durable effectiveness and no downside of immunogenicity with relatively more safety profile compared to the FDA approved biologic agents with relatively lower cost in the management of patient.....
ReadMore
-
Mini Review
February 14, 2022
Subhash Desai* and AV Nirmal
DOI : 10.32474/CTCSA.2022.02.000135
View abstract
PDF
Full text
Unsustainable patterns of production and consumption particularly in industrial countries are identified as the major causes of the continued deterioration of the global environment. The automotive industry is one of the main producers of industrial wastes affecting the natural environment. Automotive companies are in a difficult position to implement green supply chain management (GSCM). The number one barrier in the automotive sector is “market competition and uncertainty”. The second problem is “Lack of Implementing Green Practices”. Like these two barriers, cost implications, unawareness of customers, lack of corporate social responsibility, lack of globalization, lack of technical assistance from government have been identified as top-level barriers and lack of the government’s willingness to invest, reduced.....
ReadMore
-
Review Article
February 14, 2022
Gunnar Wolf and Jorge Luis Ortega Arjona*
DOI : 10.32474/CTCSA.2022.02.000134
View abstract
PDF
Full text
With an ever increasing proportion of Internet traffic being encrypted, the role of transitive trust models (TTMs) is each day more important. From the main two TTM models, this text focuses on the decentralized Web of Trust, mostly used for e-mail exchange and document processing. Several high-profile vulnerabilities have been found in the Open PGP key server network, the main WoT implementation, leading it to an existential crisis. This article presents the main identified threat, and sketches several possible ways forward......
ReadMore
-
Research Article
January 19, 2022
Hsien Sheng Hsiao and Wei Chen Liu*
DOI : 10.32474/CTCSA.2022.02.000133
View abstract
PDF
Full text
The COVID-19 pandemic has accelerated the digitization of education. Educators in different educational institutions began searching diverse online learning methods and tools in present materials, ensuring the quality of student learning. Open Educational Resources (OER) have been one of the significant trends of online learning platforms. During the pandemic, OER educators tried to reduce or eliminate tuition fees to raise students’ motivation of learning; however, it found that learners’ course completion rates turned lower than before as well as the instructor never updated the course and responded to student questions after the course was released. Recently, researchers have been searching for different ways to raise students learning motivation effectively, gamification is one of the popular methods. In this paper, the learning t.....
ReadMore
-
Review Article
December 16, 2021
Kamaljeet Singh* and AV Nirmal
DOI : 10.32474/CTCSA.2021.02.000132
View abstract
PDF
Full text
Silicon with finite resistivity behaves differently at RF frequencies compared to generic substrate considered as a good dielectric such as alumina, RT-Duroid, FR4. Lossy as well as good dielectric material can be characterized by complex permittivity. Silicon which is considered as the lossy substrate also have considerable amount of dissipative energy associated with the complex permittivity. Permittivity is the property of the dielectric which indicates capacitance or stored charges mathematically associated with the imaginary part. The loss tangent can be deduced with the current density which in turn depends on complex permittivity. Material permittivity relates with the physical phenomena and main contributors are ionic conduction, dipole friction, and dipolar relaxation, atomic and electronic polarization [1]. Real part of the comp.....
ReadMore
-
Research Article
May 27, 2021
Biswa Sankar Das*
DOI : 10.32474/CIACR.2021.09.000318
View abstract
PDF
Full text
A total of 111no.of Germplasm of Millets with code no’s have been assembled through formal process of Collaborative programme experimented from 2017 -2020 Cropping season. The Germplasm has been evaluated for various Agronomic traits (biotic, abiotic, grain quality, etc.). The organisation, Watershed Support service & Activities Network (Wassan) with Odisha Millet Mission Project holds 111no.of Millet Germplasm collection with 108 no. of indigenous and 3 no. of rare types having information on important trait specific characters from the communities, community managed seed bank. The Present Paper highlights the assessment of Millet diversity assembled and conserved under Odisha Millet Mission Project & thrust areas identified for future conservation and utilization......
ReadMore
-
Research Article
December 02, 2020
Bhanu Prakash
DOI : 10.32474/CTCSA.2020.02.000131
View abstract
PDF
Full text
The usage of mobile devices has surpassed the usage of desktop computers. Even organizations are more committed to their projects and commercialization options based solely on mobile front-end performance. Mobile usage is growing rapidly. However, are there standard guidelines for building mobile sites? Is it possible to transform an already existing desktop site into a mobilefriendly site? This research answers these questions while transforming an existing user interface into a mobile- friendly site and offers detailed instructions for doing so. It presents standard guide- lines for future refactors, offers specific design guidelines for building such a design ground up and establishes how this can be a continuum for creating mobile-friendly designs......
ReadMore
-
Research Article
November 30, 2020
Zohre Ranjbar Mojaveri and Andras Farago
DOI : 10.32474/CTCSA.2020.02.000130
View abstract
PDF
Full text
Random graph models play an important role in describing networks with random structural features. The most classical model with the largest number of existing results is the Erd˝os-R´enyi random graph, in which the edges are chosen interdependently at random, with the same probability. In many real-life situations, however, the independence assumption is not realistic. We consider random graphs in which the edges are allowed to be dependent. In our model the edge dependence is quite general, we call it p-robust random graph. Our main result is that for any monotone graph property, the p-robust random graph has at least as high probability to have the property as an Erd˝os-R´enyi random graph with edge probability p. This is very useful, as it allows the adaptation of many results from Erd˝os-R´enyi random graphs to a non-independen.....
ReadMore
-
Review Article
November 23, 2020
Parhi Dayal R and Sat Chidananda
DOI : 10.32474/CTCSA.2020.02.000129
View abstract
PDF
Full text
In this paper application of average fuzzy inference technique has been analysed for navigation control of robotic agent. Also, the reviews of other AI techniques for control of robots are carried out. The robotic agent uses sensors to map the surroundings and take the decision with the help of Fuzzy AI technique to avoid obstacles. In this paper a novel averaging method has been deployed to optimize the results obtained from various fuzzy membership functions. Using the Average Fuzzy Inference technique robot navigates from start position to goal position avoiding obstacles while reaching the target. The simulation results agree with experimental results. The methodology can be used for various applications by the scientific communities to address various engineering problems......
ReadMore
-
Research Article
November 16, 2020
Ali EL KSIMI and Cherkaoui LEGHRIS
DOI : 10.32474/CTCSA.2020.02.000128
View abstract
PDF
Full text
As objects connected to the Internet multiply, it is likely that the stateless IPv6 autoconfiguration service will finally be used on a large scale. Autoconfiguration aims to reduce the efforts of integrating machines into the local network to connect them to the internet. It is based on the mechanism of neighbour discovery (NDP: Neighbour Discovery Protocol) and does not require any administrative management of the assigned addresses. In this sense, one of the methods used to generate an IPv6 address is based on the physical address of the machine. However, this has resulted in privacy issues for many users. The latter are concerned that it is possible to go back to the physical computer by analysing the packets. Several approaches are proposed in the literature. In this paper, we propose a new mechanism for generating an IPv6 address us.....
ReadMore
-
Review Article
November 02, 2020
Gajendra Sharma
DOI : 10.32474/CTCSA.2020.02.000127
View abstract
PDF
Full text
With the advancement of technology learning process have been more reachable and interactive like never before. Till the data many online learning platforms have been introduced. The platforms with constant improvisation in teaching-learning techniqu have been able to sustain. For improvisation there need constant analysis of the data and implement the suggested changes are required. The analysis of the educational data is using data mining techniques is called Educational data mining. EDM helps to discover the patterns of learning behavior hidden in the data sets. This research paper aimed to do a review of different other papers which were based on EDM in online learning environment. It has been seen that most paper used classification and clustering as their data mining technique. K-means clustering has been used as cluster analysis te.....
ReadMore
-
Review Article
March 06, 2020
Wan Yeon Lee
DOI : 10.32474/CTCSA.2020.02.000126
View abstract
PDF
Full text
Blockchain and smart contract technologies were recently introduced. Due to their short histories, many issues have emerged but are not solved yet. In this article, we summarize the currently concentrated issues under developing with regards to smart contracts: vulnerability and cost optimization. We introduce other issues never considered but essential for successful commercialization of the smart contract technology. Also, we verify that the optimized code of smart contracts can significantly save transactions costs. Finally, we address that the cost-optimized design is affected by the platform type of blockchain systems. So, the vulnerability and cost analysis of smart contracts must consider the blockchain platform to be deployed......
ReadMore
-
Review Article
March 04, 2020
Farhan Alta F
DOI : 10.32474/CTCSA.2020.01.000125
View abstract
PDF
Full text
This research work figures out the permanence of downlink LTE (Long Term Evolution) applying System Level Simulator [1]. The outcomes retrieved are related to the sector throughput and BLER (Block Error Rate), the user throughput and the interrelated CQI (Channel Quality Indicator) while entire simulation process. The main focus is based on the throughput versus the UDO and Rb. The synopsis applied gone into two antenna pattern, two system bandwidths, three packet tabulating plans and various account of users in the cell. To encounter the users speed on the system permanence is additionally estimated. The radio situation and status is sculpted in aforementioned simulator depicting that the outcomes retrieved might be gone into as a first steps in confining an LTE network for markets. The system is modeled according to commercial aspects o.....
ReadMore
-
Review Article
December 17, 2019
Behzad Soleimani Neysiani* and Seyed Morteza Babamir
DOI : 10.32474/CTCSA.2019.01.000123
View abstract
PDF
Full text
Duplicate bug report detection (DBRD) is one of the significant problems of software triage systems, which receive end-user
bug reports. DBRD needs automation using artificial intelligence techniques like information retrieval, natural language processing,
text and data mining, and machine learning. There are two models of duplicate detection as follows: The first model uses machine
learning techniques to learn the features of duplication between pairs of bug reports.
The second model called IR-based that use a similarity metric like REP or BM25F to rank top-k bug reports that are similar to
a target bug report. The IR-based approach has identical behavior like the k-nearest neighborhood algorithm of machine learning.
This study reviews a decade of duplicate detection techniques and their pros and cons. Besides, the metrics of their.....
ReadMore
-
Research Article
November 22, 2019
Jims Marchang*, Jing Wang, Abayomi Otebolaku, Timi Enamamu, Daniel Porter and Benjamin Sanders
DOI : 10.32474/CTCSA.2019.01.000121
View abstract
PDF
Full text
The popularity of data storage in cloud servers is getting more and more favored in recent times. Its ease of storage, availability and synchronization of personalized cloud file storage using client applications made cloud storage more popular than ever. In cloud storage system, using a basic authentication method like username and password are still one of the most popular forms of authentication. However, the security ensure by such traditional authentication method is weak and vulnerable because the username and password can be compromised by intruders or the user account can be left open by forgetting to logoff in public computers, leading to exposure of information to unauthorized users and hackers. In recent years, using a two-factor authentication has become a trend throughout network-base.....
ReadMore
-
Review Article
November 05, 2019
Ian Pyle
DOI : 10.32474/CTCSA.2019.01.000120
View abstract
PDF
Full text
HUW was designed in 1965, to provide interactive facilities for computer users at A.E.R.E. Harwell, England. The paper explains the thinking behind the design decision underlying HUW, with their implications for users and for the performance of the system. It reflects on the consequences of these decisions for users and the establishment. HUW was retired in 1982.....
ReadMore
-
Research Article
September 13, 2019
Chi Tran*
DOI : 10.32474/CTCSA.2019.01.000118
View abstract
PDF
Full text
On the one hand, we recognize the real world using usually intuitive perceptions through physical experiments and intuitive perception processing based on binary philosophy. However, physical quantum phenomenon indicates that each photon transfers in the way not agreement with the soul of binary philosophy. That is to say that we cannot use intuitive perception based on binary philosophy to understand the quantum world of subatomic transmitted with the light speed. On the other hand, the simultaneous appearance of two intuitive perceptions: ‘being’ and ‘non-being’ at the same time in the human brain, according to Georg Wilhelm Friedrich Hegel (1770-1831), created a counterintuitive perception expressed by rather meta language, ‘being-nonbeing’ that goes beyond the boundaries of the description of a common language.....
ReadMore
-
Research Article
July 26, 2019
Morteza Kiadi, Qing Tan* and José R Villar
DOI : 10.32474/CTCSA.2019.01.000116
View abstract
PDF
Full text
Finding the shortest path to reach a destination in an indoor environment is so important that it is deemed as one of the fundamental and classical topics of Reinforcement Learning. Identifying the best path to reach a destination in a maze has been used as a testbed to learn and simulate Reinforcement Learning algorithms. In this paper, we developed a faster pathfinding model by optimization of the Markov decision-making process and tweaking the model’s hyper-parameters. The proposed method allows researchers to use the suggested optimized model in bigger state spaces. The presented results assist the researchers in this field to get a better idea of the Reinforcement Learning tenets and contributes to Reinforcement Learning community by making this topic more accessible. The problem we are going to solve it in the context of finding t.....
ReadMore