Documente Academic
Documente Profesional
Documente Cultură
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique ................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
IJCSBI.ORG
Abhilash Namdev
School of Computer Science and Engineering
VIT University, Vellore - 632014, India
E-mail: abhilash.namdev8@gmail.com
B.K. Tripathy
School of Computer Science and Engineering
VIT University, Vellore - 632014, India
E-mail: tripathybk@vit.ac.in
ABSTRACT
Our main interest is in dealing with the disadvantages of old clustering algorithms and
coming up with a method that can generate clusters which produce optimal results when
compared with previous approaches. Firstly, our focus is on analyzing the limitations of
most widely used clustering algorithm. Here we choose K means clustering algorithm for
the purpose. To provide the optimal results from the initial stage of algorithm we use firefly
algorithm. The bioinspired algorithm that generates optimal minimum or maximum values
based on certain parameters. To avoid the strictness on the boundary area in k means
algorithm, we choose Rough C means algorithm, which provide some flexibility during the
clustering process. Our proposed method provides most efficiency both in terms of time
and space. We used efficient data structures which help us to avoid waste of memory while
computation and also our algorithm utilizes maximum resources of the machine to make
the execution rate as fast as possible.
Keywords
Clustering, datasets, firefly, threads, k-means, rough c mean
IJCSBI.ORG
1. INTRODUCTION
The process of clustering is the organization of patterns into sensible
groups which helps us to find the similarities and dissimilarities among the
patterns and to derive conclusion about them. We can easily find such type
of grouping in the fields of medical science, geography, biology,
engineering and sociology. This process of grouping comes under the
unsupervised learning. The basic steps involve in this grouping task starts
with feature selection, and followed by proximity measures, clustering
criterion, clustering algorithm, then validation of results and interpretation
of results come under the process. There are many directions where cluster
analysis is in use, some of them are data reduction, hypothesis generation,
hypothesis testing and prediction based on cluster.
To understand the fundamentals of any clustering process, lets take
any dataset named X. Now k-clustering defines that the partition of dataset
X into k groups G1 , G2 ,...Gk such that the following conditions must be
satisfy
Gi ; i =
1, 2,...k
k
G i =X
i =1
Gi G j = ; i j i, j = 1, 2,...k
This type of clustering is sometimes called hard or crisp. The alternative
of above clustering are fuzzy and rough type of clustering, where element
from the dataset X can belong to more than one clusters. One of the most
popular and well known examples of hard clustering algorithmic scheme is
k means or c means algorithm. Here squared Euclidian distance is used to
find the dissimilarity among the elements of dataset. However, the results
of this version of algorithm highly depend on the order in which initial
centroids are chosen. (McCullock John, 2012) The main advantage of c-means
or k-means algorithm is its simplicity in computing the process. But k
means is not suitable for the categorical data i.e., it results well only with
continuous data valued.
Lingras proposed a clustering approach which was based on the
concept of rough set theory, known as Rough c means algorithm. This
algorithm describes the group by the value of its centroids as well as upper
and lower approximation. Rough c means algorithm solve the problem of k
means algorithm to some extent by allowing element to be the part of either
one cluster or between two clusters. Elements in the lower approximation
are considered to be completely belonging to that class of elements.
IJCSBI.ORG
The problem with both the above discussed algorithm is that they
both are sensitive to the initial cluster-centroids. Since initial centroids are
chosen randomly, many times the algorithm doesnt produce optimal
results. Therefore, in the proposed system, we have used firefly algorithm to
determine the values for the initial class centroids. Then these optimal
values are applied to rough c-means algorithm, which ultimately increase
the accuracy of cluster. The firefly algorithm is implemented on both these
clustering approaches and the results are comparatively analyzed. The idea
behind the firefly algorithm work around the flashing behavior of the
fireflies. Each firefly has its degree of attractiveness and intensity of light.
Based on these parameters the firefly is attracted toward other firefly in the
working space. On the basis of this brightness parameter, the firefly with
low brightness takes a moment towards the firefly high brightness value at
each of the iterations. And the values of this parameters update on usual
period. The best position of the firefly is selected after running for the
specific period of time. These optimal values are considered as the centroid
values for our algorithm.
The system is designed in java technology, which is one of the most
efficient and widely used high-level object oriented language of the world.
The implementation in java is very easy, manageable and understandable by
the programmer. To make the system efficient and flexible many dynamic
approaches has been adopted in the side of data structure. Data structures
are the arrangement of the data inside the computers memory. And
algorithm ultimately modifies this structure in various ways. Data structures
are chosen to make the system efficient in terms of both space and time;
Like Arraylist acts as dynamic array which can grow or shrink as per the
requirement. This ultimately avoids the wastage of memory as compared to
normal array concept, where size of the array is fixed in advance. Which
lead to the waste of memory when the part of memory doesnt even used
during the computations. Another measure adopted in order to utilize the
waste of time during the user interaction, which is the concept of
multithreading. Java provides the built in support for the multithreaded
programming. The multithreaded program contains more the one part that
can work simultaneously. (Singh Chaitanya, 2016) Multithreading provide
us the facility to write efficient program that utilize the maximum
processing power. Since Multithreading is important for interactive systems,
we have used it in our proposed system. To time spent by the user to
interact with the system, this time is in background utilize to run the basic
operations of clustering. The task performed in the background is usually
not dependent on the activity of user.
The system is tested over different datasets collected from the dataset
repository available on the internet. At the present stage all the dataset used
for the experiments are in the excel format, since Microsoft excel is the one
IJCSBI.ORG
which is most widely used for storing data across the world. The datasets
consist of the large scale and high dimensional data. The number of
instances and attributes of the datasets are varied from 5 to 5000 in
numbers.
2. REVIEW OF LITERATURE
In 1967, J.B MacQueen has first proposed the K means algorithm
(MacQueen, 1967), which is now the most widely used clustering algorithm
in the field of data mining. (Mathew et al, 2014a) have introduced the
concept of parallel clustering approach of K-means algorithm. They found
in (Mathew et al, 2014a) that average number of iterations the program
takes was lower than the old approaches. In (Swamy et al, 2015) it is
concluded that as the size of the data increases, the time taken by K-means
algorithms also increases with high rate. They (Swamy et al, 2015)
suggested the concept of parallel processing was introduced to decrease the
execution time during the clustering process. Then Yang (Yang, 2010) has
introduced the concept of firefly in 2008. According to them (Swamy et al,
2015) firefly algorithm is the swarm intelligence algorithm, inspired by
insects with their unique property of flashing. In (Raja et al, 2013) the
various randomization parameters are analyzed and the conclusion that the
value which is best suited on respective condition are provided. In (Lohrer
et al, 2013) it is suggested that firefly algorithm is a very efficient algorithm
that achieves optimal results when compared with Particle swarm
optimization (PSO). Also time taken to execute this algorithm is very less as
compared to other approaches. They (Lohrer et al, 2013) are still working
on the area to develop firefly on the hardware of system, which leads to
even lesser time as compared to current approach.
In (Zhang et al, 2006) the concept of dynamic load balancing is
introduced. They also suggested the use of parallel programming to
implement k means algorithm and step up the efficiency by using load
balancing between the core of the machine. They have adopted the strategy
of master/slave design model. (Karinor et al, 2015) tried two different
approaches for k means algorithm. One is for small scale dataset and other
is for large scale data using both serial and MapReduce implementation of
parallel algorithm. And concluded that with the increase in iterations of
algorithm, the computation overload also increases, i.e., they both are
directly proportional. In (Aamir et al, 2014) it is explained as how to use
parallel programming in java. This is the fact that if we want to enhance the
execution rate of our program then we must have to learn the concept of
parallel programming. They have explained very well as how parallel
programming tools and techniques are used in both shared and distributed
environment.
IJCSBI.ORG
(Chen et al, 2011) studied the performance issues of java program
using multithreading on multicore machine. They examined the tuning of
JVM in their research. To utilize the maximum benefits of multithreading
concept we must have to efficiently utilize the cache memory. Firefly
algorithm can give its best results only when the best parameters and
objective functions are selected. (MO et al, 2013) closely examined the
effect of each parameter in firefly algorithm. They suggested certain
guidelines in determining the values of these parameters. They used
different functions that test the effect on fireflies by parameter change.
Since proper start is important for K-means algorithm to achieve optimal
results, (Xu et al, 2014) have proposed K-means++ algorithm. This
algorithm increases the productivity of standard k means approach by using
Map reduce technique. They successfully tested their approach on both real
and synthetic data.
FIREFLY ALGORITHM
Inspired by the flashing property of fireflies, in (Yang, 2010) the firefly
algorithm is proposed. Every firefly is having its unique property with
respect to light and fitness. Attractiveness is directly proportional to light
intensity.
a. Fireflies are also known as agents and let x i be the position of the i th
firefly in d dimension.
b. Initial fitness values for all the fireflies can be set by using
D
F(X) = i=0 X 2 ; X xi
c. The distance rij between the two fireflies, say the i th and jth ones can
be calculated as
D
=rij (x
d =1
id x jd ) 2
IJCSBI.ORG
I (r ) = I 0 e d
2
3. PROPOSED METHOD
After studying the previous approaches, we got the first thing to
design good clustering algorithm is to select the optimal centroid values at
the start. Also we have seen that the firefly algorithm is best suited when
there is the need of optimal values. Hence, in our proposed method, we used
the firefly algorithm to get the optimal initial centroid values at the early
stage of the algorithm. To provide some sort of flexibility in the process of
clustering, we implemented firefly algorithm on Rough C Means
algorithms. Since we studied that K means algorithm is crisp or hard in the
boundary region, we tried some new approach which is not tested yet.
Rough C means algorithm allow the element to become the part of either
completely in one class or in between two classes. This approach is used to
make the clustering flexible.
Our proposed method is to implement Rough C means algorithm
and provide the optimal result to it by adding the firefly algorithm. The
results of this approach are tested on different set of data. The experiment
was performed on a dataset whose number of instances varies from 5 to
5000. Mostly the dataset used for the experiment is the real numbered data,
because it is quite easy to perform and handle real data for the purpose of
experiment. The dataset is collected from the online repository available on
the internet. The system is developed in JAVA technology because it is easy
to program and highly manageable as compared to other programming
language. (Oracle-Java-Documentation, 2015) The efficient data structures like
Arraylist and concept of multithreading is used that allow the system to
avoid wastage of time and space. The approach has been followed to make
the code run on multiple processors. This can make the system to run faster
than other approaches. The proposed method is then compared with existing
method in terms of execution time.
IJCSBI.ORG
3. Ask user to view his dataset
4. If yes, then display the dataset file
5. Call store() method, to store the data in temporary storage, to avoid
accidental modification
6. Call firefly() method to initialize the value of centroids
a. set the parameters , ,
b. calculate initial fitness values of each firefly I[i]
c. calculate distance between each two fireflies r[i][j]
d. if (I[i] < I[j])
e. then firefly i move toward firefly j
f. Update and fitness value I
g. Repeat until maxGen < noc
h. Sort the fireflies and select best positions
7. Calculate the minimum distance of element from centroid of cluster
8. Calculate next to minimum distance of element from another
centroid
9. Check if the difference between both the distances is less the
threshold
10. If yes, the element belongs to boundary
11. Else, Assign elements to respective cluster
12. Recalculate mean based of each cluster and boundary elements
13. Repeat from step 7 until new centroid values are not equal to old
centroid values
14. Display the final results by printing elements with respective cluster
15. Display, number of iterations algorithm took
IJCSBI.ORG
The figure clearly shows the interaction of User with the system.
User is allowed to ask for his required number of clusters and he can also
see his dataset on the console screen of the system. The diagram also
projects the interaction of system with the secondary storage. User has to
specify the address of his dataset in advance before performing clustering
operation. The data from the file is collected in some temporary storage, and
all the further operations are carried out from that data. This is done to avoid
the accidental modification on original dataset during the operation. At this
stage the system can only able to read the datasets from excel file. Since
most of the datasets use Microsoft excel to store and manage data, hence
our system in its early state is developed to work with only excel
worksheets.
4. EXPERIMENTAL RESULTS
We have implemented our proposed system in java technology,
because program in java is easy to manage. The execution of code is done
on Intel(R) core(TM) i3 CPU with 2.53 GHz processor, installed memory
(RAM) is 4.00 GB, while the system has 64-bit operating system (Windows
10).
Dataset description
Dataset 1: The voter dataset is used which has two attributes. The one
represents age and another represents sex of the candidate. It has 439
numbers of instances. The data in the file is of type integer. While the age
with value 1 represents female candidates and value 2 represents male
candidate. Data with NULL values are left blank which is ignored by the
algorithm.
Dataset 2: The weather dataset, which has 4 attributes named by city name,
Year, Lowest temperature and highest temperature. The dataset has 3000
IJCSBI.ORG
number of tuples or instances. The type of the data in the dataset is integer.
In this dataset Null values are treated as zero.
Dataset 3: The third dataset is also weather dataset but with different size.
Here the number of attributes is 9 named by order country, city, year, low T,
high T, warm, cold, and average. This dataset has 5000 instances. This is
the largest dataset we have tested on our system.
In addition to the technology, we refer certain tools in the process of
development of the system. The program is developed in NetBeans IDE
8.0.2 because using NetBeans IDE is we can easily develop java desktop,
mobile and web applications. It provides fast and smart coding environment
for the developer. Another tool used for analyzing the outcomes and
comparing with proposed work is WEKA. The WEKA is the tool for
performing experiments with various algorithms from the data mining field.
It is an open source software. It provides various datasets of different size
for performing experiments. It also provides various visualization
techniques for better understanding the results like graphs, tree etc.
To make it easily understandable, we are presenting the screen of
outcomes produced while experimenting. Here we took the dataset with 5
instance and 2 attributes.
IJCSBI.ORG
There are certain parameters, which are very carefully selected from
previous researches. The sphere optimization function is adopted in firefly
algorithm, because it easy to implement and mostly used for research. The
other parameters like , , are put as constant values. Final results
collected after running on Rough C means algorithm
On each run, the system will show the elapsed time. For example,
the elapsed time of the above sample experiment is 16 milliseconds or 0.016
seconds. As given on the above results, the output of the algorithm appears
in two categories. One with the elements belongs to lower approximation of
the cluster and another with the element which are the part of boundary
region. The performance of the system is also measured on the CPU scale.
The number of cycles processor takes to execute the algorithm is also the
point of concern. The frequency of our machine is about 2.48 GHz. The
next chart taken during the time of execution, which primarily shows the
basic details about the machine include cache size, memory, core and speed
of processor. With the fundamental details, the chart clearly shows the
amount of CPU utilization during the time of execution. We have calculated
IJCSBI.ORG
97% of CPU utilization during the process of execution. The chart also
displays the number of processes as well as number of threads running on
the system.
The performance noted by task manage is shown below
The CPU usage in the above graph shows that processing power is
utilizes up to 97 %. As discussed early, the experiment is carried out on
different set of data collected from the repository available on Internet. The
readings of the experiment are shown below by the table. The datasets are
varied from different size in terms of both attribute and instances. The table
below shows the execution time of different datasets when size of the
dataset varies. And we found that as the size of the dataset increases, the
execution time also increases. The execution time is measured in
milliseconds. The first dataset covered in the table is same as the one shown
previously.
Table 1: Comparison of execution time
Dataset No. of No. of Execution time
attributes instances (milliseconds)
Sample 2 5 16
IJCSBI.ORG
The graph is plotted to understand the results with the mark. The
points covered in the graph are execution time, number of instances and
number of attributes. The execution time is measured with respect to
different number of attributes and instances.
5. CONCLUSIONS
We observed that although the K-means algorithm for clustering is
easy to implement and is the most widely used one, there are many
drawbacks in this algorithm which pulls it away from resulting optimal
output. Couple of main gaps in the algorithm are, first it is sensitive to the
selection of initial centers for its cluster and another, that it doesnt permit
any element to take a part of more than one cluster group. This motivated us
to design something to solve this problem. So, we used the firefly algorithm,
to get better start to the proposed clustering algorithm. After this we used
IJCSBI.ORG
the rough c-means algorithm instead of the K means clustering, which
provides more flexibility to the clustering phase by allowing elements to
belong to more than one cluster. Our proposed method is successfully tested
on datasets of different sizes. It is proposed to apply this approach by
replacing the rough c-means algorithm with other algorithms and perform
comparative analysis to find out the most suitable combination of firefly
algorithm with clustering algorithm in this direction.
REFERENCES
IJCSBI.ORG
Xu, Y. Qu, W. Li, Z. Min, G. Li, K. and Liu, Z. (2014). Efficient k-Means++
Approximation with MapReduce. IEEE Transactions on Parallel and Distributed Systems.
pp. 3135 3144..
Yang, X.S. (2010). Nature Inspired Metaheuristic Algorithms. Luniver Press. BA11 6TT.
UK.
Zhang, Y. Xiong, Z. Mao, J. and L, Ou. (2006). The Study of Parallel K-Means Algorithm.
Proceedings of the 6th World Congress on Intelligent Control and Automation. Dalian,
China, pp. 5868 5871
Singh, Chaitanya. (2016). Beginners Book for multithreading. [Online 1] available at:
http://beginnersbook.com/ 2013/03/multithreading-in-java/.
Oracle Java Documentation. (2015). Fork-join framework. [Online 2] available at:
https://docs.oracle.com/javase/tutorial/ essential/concurrency/ forkjoin.html.
McCullock, John.(2012). Implementation of K-means clustering. [Online 3] available at:
http://mnemstudio.org/ clustering-k-means-introduction.htm.
IJCSBI.ORG
P. Lakshmi Narayanamma
Assistant Professor, Department of MS,
VFSTR University
Guntur
K. Santhi Sri
Associate Professor, Department of IT
VFSTR University
Guntur
ABSTRACT
Internet of Things is the concoction of solely assured computing devices which are
embedded inside the accessible Internet Infrastructure. So, Internet of Things essentially is
connecting Embedded Systems toward Internet. Hence, before going to IoT, first
understand the concept of Embedded Systems. In this paper, first section describes about
Embedded Systems and their boards, importance of Arduino. Second section explains the
concept of basic architecture of IoT and devices of IoT. Third section consists of various
platforms of IoT in detail.
Keywords
IoT, internet, systems
1. INTRODUCTION
Embedded controllers like DEC Alpha, MIPS, SuperH and so on are the
spirit of Embedded systems. Mainly those make a distinction of embedded
controllers through Microprocessors is their interior memory of read and
write. Thus anyone be capable of developing light weight programs using
Embedded C or Assembly language among application resembling Keil and
blaze the application addicted to the hardware. This application keeps track
of runs on a loop [1][2]. The majority of the ES contains a solitary
application is blaze through numerous sequence of program instructions.
Hence, distinct users of Personal Computers, embedded controller devices
in an Embedded System run on a single application considerably. The users
IJCSBI.ORG
are able to attach numerous IO devices through these embedded controllers
are either I/O Mapped or Memory mapped. These easy components of
hardware devices include Printers, Key boards [3][5], LCD monitors and so
on. By using Analog to Digital convertor interfaces the user can attach
various sensors.
These strategies preserve the organize of high voltage, power and present
ranking strategies such as Bulbs using drive devices, motors, fans like
Relayoptocoupler etc. From simple DIY Robots to additional business
systems such as ovens, Washing Machines, Cars, AC Controllers, hand held
devices, Railway and Bus Bill printers Embedded System is throughout the
world[7][8].
IJCSBI.ORG
and devices of IoT. Third section consists of various platforms of IoT in
detail.
Embedded Systems are most attractive because the following are the some
factors such as autonomous, less cost, less space and less power etc.
Along with less space, apparently Embedded System takes very minute
space compared to other mini laptops.
Other factors like input and output devices cost and speed, consumption of
energy per instructions and so on.
IJCSBI.ORG
2.1. Common Embedded Boards for ES
These embedded boards are supported for various embedded controllers and
can be developed by standard software and hardware units. The following
table shows the various sample boards can be used for embedded system
applications [16].
Arduino is the truly evolved embedded kit by a DIY .It will give knowledge
to understand the boards of embedded systems also used in Internet of
Things [14]. This architecture is the combination of Atmel embedded
controller family through particular hardware towards a board which
contains built-in boot loader for plugs and run embedded applications. This
Arduino software helps to write, debug and burn applications into Arduino
through an IDE [16]. This IDE may get the serial data from the board
through serial communication. This software is common to embedded
systems and Internet of Things. Users can use communication devices such
as Bluetooth, CDMA, USB, Wi-Fi and so on. Embedded system can be
remotely reconfiguring one or more Embedded Systems as middle wares on
a remote terminal like computers, Laptops, Tablets and so on. As per
module unit control and Embedded System category will be checkered, it
IJCSBI.ORG
offers the support for easier managing of multifaceted System. Among
these strategy to persuade interoperability, ensure security and defend
privacy and possessions rights, the Internet of Things will starts to get total
potential particularly hold close decision making of data driven.
Internet of Things and its devices are mix with smart things and embedded
systems through internet with different IP addresses those were discover
and communicate. IoT are basically Embedded Systems and elegant
substance coupled to Internet with exceptional IP address which can be
naked and communicated on Internet. These comprise Sensors external
peripheral devices and actuators external peripheral devices.
1. Easy to use: These devices are successful innovative products for reality
of services and easy to use. Wearable devices are most waterproof products.
2. Better battery life: These devices can be able to work with less power and
contains greater life of battery.
3. Ecosystems: This app contains proper set of instructions to get the real
life examples.
IJCSBI.ORG
4. Data security: Physically assist the devices from others and assist as
information related things like secure mail applications, secure browsers
and secure clouds.
5. Managing hands free: These things manage in reality of applications
through phone.
IJCSBI.ORG
4. SOME PLATFORMS OF IOT
These platforms can be divided into two ways that are wearable and
embedded. Programmers develop their apps for wearable like Samsung
gear, peeble and make own platform for embedded solutions and build apps
for that platforms [6].
4.1 Wearable Platforms
Most powerful platform for mobile and wearable devices is Tizen. It makes
to build some solutions for this platform. Digital or smart watches are
familiar in daily life. These types of Android applications can be building
and tested in Eclipse environment. Another wearable platform is salesforce
through this the users can develop good applications. These can be
upgraded from peeble to googleglass.
4.2 Embedded Platforms
The best platform for embedded IoT is Arduino. In this platform users want
to set Android through Ethernet shield. These platforms work with serial
communications and develop smart applications with this.
4.2.1Raspberry Pi is perhaps the greatest thing to ensue in DIY Internet of
Things. Broad series of data drive applications such as domicile compact
disk servers, automations of home server; file server can be built with this
Pi. Pi has commonly used these IO pins like Arduino. But working of these
sensors is little much dreary in Pi.
4.2.2 Intel Edison is another IoT platform incorporated Wi-Fi and BLE. It
covers huge place of industries with seventy pin interface. It supports some
other platforms like node.js and Arduino.
4.2.3Intel Galileo is an extra platform by Intel which chains the Arduino
Uno. It is the first Arduino compatible device of Intel devices.
4.3 Cloud Platform for IoT
In the predictable vending machine the user wants to compress a button or
locate a coin to generate the procedure of fluid flow, which stops once
particular magnitude. At present how to integrate Google or Paypal hard
cash through the retailing contraption? How a client discovers the retailing
contraption as Website in conjunction through this place and then pays
online pro a glass of beverage. Formerly after successful payment client get
an access of token [13]. Client knows how to surpass the indication to the
contraption through NFC and bingo punter receives his/ her slurp. This is
for the most part proficient and vital logic to understand the Internet of
Things and various services such as online payment gateway. Different
hardware platforms reminiscent of implanted embark of the retailing
contraption and elegant things or objects, data such as GPS, Near Field
Communication towards this environment [12]. At present the user can be
able to mix payment through online into potion retailing contraption, and
IJCSBI.ORG
not deliberate for a district Washing Machine, payment services of toll gate
and data of ECG for medical diagnosis into cloud and various doctors may
view it and give their valuable suggestions about the state of patients.
All the above things are possible in cloud environment and to understand
the web and designing the applications towards the cloud. Various modules
like web of machines in M2M, M2O, any communication modules are
common and demand the data which is available for sharing and API s of
Cloud also help for this. The user can make a discovery of devices in web
and to allocate permanent IP address, manage routers and for various skills
of networking. The user can not have any knowledge to make the network
for Internet of Things.
Yaler is an enormous exemplar of what Services and Cloud is able to
convey to table. This provides alliance when a Service is to facilitate the
gadget is simply ascertain and commune on the network exclusive of a lot
hassle and takes much care on beneath security. Some of the following are
examples of these platforms [13]. Axeda provide Infrastructure for Machine
to Machine architecture. OpenIoT is free open source platform to provide
other services and different Sensing as a Service (Se aa S).Google also
previously combines the location services during the cloud. It knows how to
be extracted some devices and keep updates of status in Face book and
Twitter for other searching purposes. Hence, CloudAPI has a enormous
talent in IoT of all architecture levels from firmware to hardware to most
top level architectures.
5. CONCLUSION
6. REFERENCES
[1] J. A. Stankovic, "Research directions for the Internet of Things", IEEE Internet Things J., vol. 1,
no. 1, pp. 3-9, Feb. 2014.
[2] Laurence T. Yang, Hong Liu, Huansheng Ning, "Cyberentity Security in the Internet of Things",
Computer, vol. 46, no. , pp. 46-53, April 2013, doi:10.1109/MC.2013.74
[3] Steven Lanzisera, Andrew R. Weber, Anna Liao, Dominic Pajak, Alan K. Meier
Communicating power supplies: Bringing the internet to the ubiquitous energy gateways of
electronic devices, IEEE Internet Things J., vol. 1, no. 2, pp. 153160, Apr. 2014.
IJCSBI.ORG
[4] Yan Chen, Feng Han, Yu-Han Yang, Hang Ma, Yi Han, Chunxiao Jiang, Hung-Quoc Lai, David
Claffey, Zoltan Safar, and K. J. Ray Time-reversal wireless paradigm for green Internet of
Things: An overview, IEEE Internet Things J., vol. 1, no. 1, pp. 8198, Feb. 2014.
[5] J. Yang and Z. Fei, Broadcasting with prediction and selective forwarding in vehicular
networks, Int. J. Distrib. Sensor Netw., vol. 2013, pp. 19, 2013.
[6] Tao Zhang, Helder Antunes, Siddhartha Aggarwal Defending connected vehicles against
malware: Challenges and a solution framework, IEEE Internet Things J., vol. 1, no. 1, pp. 10
21, Feb. 2014.
[7] Andrea Zanella, Nicola Bui, Angelo Castellani, Lorenzo Vangelista, Michele Zorzi Internet of
Things for smart cities, IEEE Internet Things J., vol. 1, no. 1, pp. 2232, Feb. 2014.
[8] Panagiotis Vlacheas, Raffaele Giaffreda,, Vera Stavroulaki, Andrey Somov and Abdur Rahim
Biswas, Klaus Moessner Enabling smart cities through a cognitive management framework for
the Internet of Things, IEEE Commun. Mag., vol. 51, no. 6, pp. 102111, Jun. 2013.
[9] Antonio M. Ortiz, Dina Hussein, Soochang Park, Son N. Han, Noel Crespi The cluster between
Internet of Things and social networks: Review and research challenges, IEEE Internet Things
J., vol. 1, no. 3, pp. 206215, Jun. 2014
[10] C. E. A. Mulligan and M. Olsson, Architectural implications of smart city business models: An
evolutionary perspective, IEEE Commun. Mag., vol. 51, no. 6, pp. 8085, Jun. 2013.
[11] ] N. Walravens and P. Ballon, Platform business models for smart cities: From control and
value to governance and public value, IEEE Commun. Mag., vol. 51, no. 6, pp. 7279, Jun.
2013.
[12] Stefan Foell, Gerd Kortuem, Reza Rawassizadeh, Marcus Handte, Umer Iqbal, Pedro Marrn
Micro-navigation for urban bus passengers: Using the Internet of Things to improve the public
transport experience, in Proc. 1st Int. Conf. IoT Urban Space (Urb-IoT), Rome, Italy, 2014, pp.
16.
[13] ] Marcus Handte, Eva Maria Muoz, Sara Izquierdo Crowd density estimation for public
transport vehicles, in Proc. Workshop Min. Urban Data (MUD) Joint Conf. EDBT/ICDT,
Athens, Greece, Mar. 2014, pp. 315322.
[14] Henrich C Phls, Vangelis Angelakis, Santiago Suppan, Kai Fischer, George Oikonomou, Elias
Z Tragos, Rodrigo Diaz Rodriguez, Theodoros Mouroutis RERUM: Building a reliable IoT
upon privacy- and security- enabled smart objects, in Proc. IEEE Wireless Commun. Netw.
Conf. Workshops (WCNCW), Apr. 2014, pp. 122127.
[15] L. Tan, Z. Zhu, F. Ge, and N. Xiong, Utility maximization resource allocation in wireless
networks: Methods and algorithms, IEEE Trans. Syst. Man Cybern. Syst., vol. 45, no. 7, pp.
10181034, Jul. 2015
[16] V. Angelakis, I. Avgouleas, N. Pappas, and D. Yuan, Flexible allocation of heterogeneous
resources to services on an IoT device, in Proc. IEEE Conf. Comput. Commun. Workshops
(INFOCOM), Apr. 2015, pp. 99 100.
IJCSBI.ORG
ABSTRACT
This study investigated the differences in the cognitive abilities, information literacy knowledge
and skills as well as information retrieval skills between students in public and private
universities in Nigeria. Multistage sampling technique was adopted. Two colleges, Natural
Sciences and Management Sciences were purposively selected from the Federal University of
Agriculture, Abeokuta (FUNAAB) while three schools, Basic and Applied Sciences,
Computing and Engineering and Babcock Business School were selected from Babcock
University. The colleges/schools were later stratified into six related departments/courses for
ease of comparison. Convenience sampling was used to select the total of 235 respondents that
participated in the study. Four hypotheses were tested. Result of the test of hypotheses showed
no significant difference in the cognitive abilities, information literacy knowledge and skills of
students in public and private universities. However, a significant difference was observed in
information retrieval skills of the students. Students of Babcock University, a private institution
had higher level of information retrieval skills than FUNAAB students, a public university. The
study recommends library and information professionals in public universities should be
encouraged by administrative heads of such institutions to periodically organize practical
workshops on information retrieval skills for students.
Keywords
Cognitive Abilities, Information Literacy, Information Retrieval, University, Nigeria.
1. INTRODUCTION
Information has obviously been an important part of human lives. Humans have
long been processors and users of information to help in their decision making
[1], a trend that has also been widely observed among students. However, the
various trends and level of information explosion, and the emergence of new
technologies [2] in the information society have made students to rely on
electronic resources found in the University libraries, technology centers and
IJCSBI.ORG
computer laboratories to meet their information needs. [3]. Hence, in order to
satisfy their information needs, students engage in information retrieval
activities.
Information retrieval basically involves retrieving documents that a user
perceives to be relevant his information need as expressed by his request [4].
According to Omuinu [5], such request which must have been defined might
not be a perfect expression of the users information need. In spite of this, the
user is still the only person who can tell the relevance of the document retrieved
to his information need [4]. The implication of this is that the relevance of a
document might be different for two users with identical requests. According to
Royal College of Nursing [6], steps to ensuring effective information retrieval
skills include: identifying where relevant information can be found; checking
the suitability of information sources to meet the information need; consults
with colleagues and information specialists to help identify other tools, such as
indexes, for accessing information; using appropriate information services to
retrieve information, among others.
For students to efficiently retrieve information, information literacy is
important [4,7]. Information literacy (IL) is the set of skills and knowledge that
enables us to find, evaluate and use the information we need, and at the same
time filter out the information we do not need [1]. With adequate Information
literacy skills, potential information users can successfully explore the
landscape of information with less stress especially in the era of information
explosion and society. According to Eisenberg [1], there are many information
literacy standards, some of these are the Big6 model [8], AASL/AECT IL
Standards [9] and ACRL IL Competency Standards for Higher Education [10].
In most cases, the relationship between some independent variables and
information retrieval skills are being interfered with users characteristics such
as cognitive abilities [11]. Some cognitive processes involved in information
retrieval include learning, comprehension and speed in spotting information.
These factors have a role to play in the effectiveness of users during a search
process [11].
IJCSBI.ORG
Public universities are generally funded by governments while private
universities rely heavily on tuition fees paid by students. Mazumber [21]
investigated the satisfaction of students with the quality of higher education in
public and private universities in Bangladesh. The study showed students from
private universities are more satisfied than those of public universities. A later
study comparing Bangladesh and USA however showed that while there is a
larger gap in student satisfaction in public universities compared to private
universities in Bangladesh, smaller gaps were observed between private and
public universities in USA. This indicates that there is no significant difference
in student satisfaction with public and private universities in USA [22]. An
earlier study carried out in Nigeria revealed that while there is no significant
difference in student entry requirement between public and private universities
in Nigeria, there is significant difference in resource availability, resource
utilization, governance, and students academic performance [23]. Moreover,
Fordjour et al [4] and Ilogho and Nkiko [24] linked students search difficulties
and poor academic performance in school to ignorance of information literacy
and retrieval skills. Hence, this study investigated and compared the following
in public and private universities:
2. RESEARCH METHODOLOGY
A survey research design was adopted for this study. The location of this study
is Ogun State, Nigeria. Ogun State was purposively selected for this study
because it has the highest number of tertiary institutions in Nigeria as shown on
IJCSBI.ORG
the list of universities in Nigeria on the website of National Universities
Commission (nuc.edu.ng). The study was carried out in two selected
universities. These are Federal University of Agriculture, Abeokuta (Public
university) and Babcock University (Private university). These universities
were purposively selected for two reasons, namely, accessibility to the
students population statistics and the fact that the two universities have some
departments in common as shown in Table 1.
Table 1a: Sampling Distribution - Federal University of Agriculture, Abeokuta
Colleges Departments Population Respondents
Per
Department
Natural Sciences Biochemistry 93 19
Computer Science 88 18
Microbiology 91 18
Science Accounting 22 4
Business Enterprise (Business 200 40
Administration)
Economics 103 21
Total 597 120
Source: Administrative Unit, Federal University of Agriculture, Abeokuta,
2014
Table 1b: Sampling Distribution - Babcock University
Schools Courses Population Respondents
Per Course
Basic and Applied Sciences Microbiology 45 9
Biochemistry 55 11
Computing and Engineering Computer Science 140 28
IJCSBI.ORG
with their academic activities. However, 400 level students were excluded from
this study because of their preparation for the examinations.
A multi-stage sampling technique was used to select respondents for the study.
Two colleges, Natural Sciences and Management Sciences were purposively
selected from the Federal University of Agriculture, Abeokuta while three
schools, Basic and Applied Sciences, Computing and Engineering and Babcock
Business School were selected from Babcock University. The colleges/schools
were later stratified into six related departments/courses which were
purposively selected from both institutions. This was done to ensure uniformity
across the departments.
The total population for the six selected departments/courses in both
universities is 1,250. Nwana [25] proposed that if a population is a few
hundreds, we need a sample of 20%. Hence, using a sample size of 20%, 120
and 130 respondents were selected from 300level undergraduates in Federal
University of Agriculture, Abeokuta and Babcock University, Ilishan-Remo,
Ogun State respectively (Table 1). Convenience sampling was however used to
select the 300 level students in the selected departments/courses that
participated in the study based on their accessibility, availability and readiness
to participate in the study.
IJCSBI.ORG
and Not Skilled (NS). The items in section C of Cognitive Abilities were
structured on 4 point rating scale of Strongly Agree (SA), Agree (A), Disagree
(D) and Strongly Disagree (SD) and the items in section D of Information
Retrieval Skills was structured on 5 point rating scale of Very Good (VG),
Good (G), Average (A) Poor (P) and Very Poor (VP). Respondents were
instructed on how to respond to the questionnaire.
Of the 250 questionnaire administered, 235 were returned, showing a return
rate of 94%. Frequency and percentage distributions as well as independent
sample t-test were used to analyse data collected with the questionnaire.
3. RESULTS
3.1 Demographic characteristics of respondents
Table 2 shows the socio-demographic characteristics of respondents.
Table 2: Demographic Data of the Respondents
VARIABLE MEASUREMENT FREQUENCY PERCENT (%)
GENDER MALE 123 52.3
FEMALE 112 47.7
AGE GROUP 16 20 122 51.9
21 25 102 43.4
26 30 7 3.0
31 35 2 0.9
36 40 1 0.4
41 45 1 0.4
RELIGION Christianity 202 86.0
Islam 33 14.0
MARITAL STATUS Married 8 3.4
Single 227 96.6
COLLEGES / SCHOOLS Basic and Applied Sciences 20 8.5
Computing and Engineering 28 11.9
Babcock Business School 78 33.2
College of Natural Sciences 55 23.4
College of Management Science 54 23.0
DEPARTMENTS/ Biochemistry 30 12.8
COURSES Microbiology 27 11.5
Computer Science 46 19.6
Business Administration 47 20.0
Accounting 31 13.2
Economics 54 23.0
RESPONDENT SCHOOL Babcock 126 53.6
FUNAAB 109 46.4
IJCSBI.ORG
Majority of the respondents were males (52.3%) while 47.7% were females.
More than 95% of the respondents were between 16-25 years. Almost all the
respondents were single (96.6%). Larger proportion (86.0%) of the respondents
practice Christianity, while 14% practice Islam religion. The distribution of
respondents by their faculty include 4.7% from College of Medicine, 3.8%
Basic and Applied Sciences, 11.9% Computer Science and Mathematics, 33.2%
Babcock Business School, 23.4% College of Natural Sciences and 23.0% from
College of Management Science.
IJCSBI.ORG
Using a search engine such as Google
to search for documents on The
depletion of the ozone layer and the Frequency 72 54 126 56 53 109
impact on health, one should best
use the words Percent 57.1 42.9 100.0 51.4 48.6 100.0
To diversify a search statement using Frequency 63 63 126 47 62 109
Boolean operators, which of the
following can be used Percent 50.0 50.0 100.0 43.1 56.9 100.0
In order to find more documents on
my topic I can include synonyms in
my search statement. To connect Frequency 85 41 126 65 44 109
those synonyms in my statement, I
use Percent 67.5 32.5 100.0 59.6 40.4 100.0
When one has found a book that is Frequency 81 45 126 81 28 109
right on his topic. Which section of
the book will he consult to find other
documents on the topic Percent 64.3 35.7 100.0 74.3 25.7 100.0
To find all documents about Frequency 47 79 126 36 73 109
Professor Wole Soyinka in the library
catalogue, one would do a search Percent 37.3 62.7 100.0 33.0 67.0 100.0
Some of the criteria used to evaluate Frequency 54 72 126 48 61 109
the quality of internet site are that Percent 42.9 57.1 100.0 44.0 56.0 100.0
Some of the criteria used to evaluate Frequency 73 53 126 72 37 109
the quality of print sources are Percent 57.9 42.1 100.0 66.1 33.9 100.0
Which of these is not a criterion used Frequency 73 53 126 69 40 109
to evaluate the quality of online
sources Percent 57.9 42.1 100.0 63.3 36.7 100.0
Which of the following best describes Frequency 75 51 126 57 52 109
articles published in a scholarly
journal Percent 59.5 40.5 100.0 52.3 47.7 100.0
Plagiarism is presenting the work of
others as though it were your own.
Which of the following is an example Frequency 56 70 126 62 47 109
of plagiarism Percent 44.4 55.6 100.0 56.9 43.1 100.0
When one reads a work which one
wants to use for an assignment. He
may not cite the author of the work Frequency 101 25 126 84 25 109
when Percent 80.2 19.8 100.0 77.1 22.9 100.0
For understanding the need for information, a higher percentage of the students
in both Babcock (81.0%) and FUNAAB (75.2%) know when they need
information. Also, as high as 70.6% of Babcock students did not know the step
to take to determine whether the needed information exists or not compared to
IJCSBI.ORG
only 56.0% of FUNAAB students that failed the same question. On the other
hand, 76.1% of FUNAAB students did not know where to consult for most
current information about a topic compared to 58.7% of Babcock students who
failed the same question. Majority of the students in both Babcock (80.2%) and
FUNAAB (77.1%) failed the question when one reads a work which one wants
to use for an assignment, he may not cite the author of the work'.
Table 4 shows that 34.9% got below the pass mark of 40%, while a greater
number of the respondents (65.1%) got above 40% out of the 126 students in
Babcock University. Also, 28.4% got below 40% in Federal University of
Agriculture, Abeokuta, while 71.6% got above 40% out of the 109 students.
IJCSBI.ORG
Table 5: Descriptive of Information Literacy Skills of Students
Babcock FUNAAB
INFORMATION HS MS WS NS Mean S.D HS MS WS NS Mean S.D
Formulating question
base on my specific Frequency 46 72 7 1 3.31 0.574 51 46 10 2 3.34 0.723
information need Percent 36.5 57.1 5.6 0.8 46.8 42.2 9.2 1.8
Using several sources Frequency 45 62 15 3 39 53 15 2
to increase familiarity 3.19 0.737 3.18 0.735
with my topic Percent 36.0 49.6 12.0 2.4 35.8 48.6 13.8 1.8
Using the bibliography
or reference list on the Frequency 37 63 21 4 38 34 25 12
3.06 0.770 2.90 1.009
book to find other
documents on the topic Percent 29.6 50.4 16.8 3.2 34.9 31.2 22.9 11.0
Using encyclopedia to
understand a
background Frequency 48 43 29 5 3.07 0.881 46 31 18 14 3.00 1.054
information to a
particular topic Percent 38.4 34.4 23.2 4.0 42.2 28.4 16.5 12.9
Finding all the
documents about a
particular author in the Frequency 32 60 27 5 39 38 19 13
library catalogue, by
2.96 0.800 2.94 1.008
doing access points
search either by
author, title, subject or
keywords Percent 25.8 48.4 21.8 4.0 35.8 34.9 17.4 11.9
Using Google scholar Frequency 51 57 14 3 3.25 0.748 43 33 25 8 3.02 0.962
IJCSBI.ORG
as Google features to
find a research article
online Percent 40.8 45.6 11.2 2.4 39.4 30.3 22.9 7.4
Finding more
documents on my
topics online, by Frequency 45 42 29 9 29 42 25 13
combining synonyms in 2.98 0.942 2.80 0.970
my search by using the
Boolean operator
OR Percent 36.0 33.6 23.2 7.2 26.7 38.5 22.9 11.9
Narrowing my search
on a particular topic, Frequency 30 50 30 15 32 36 29 12
2.76 0.954 2.81 0.986
by using the Boolean
operator AND Percent 24.0 40.0 24.0 12.0 29.4 33.0 26.6 11.0
Removing unwanted
documents from my Frequency 34 41 27 23 27 37 30 15
search, by using the 2.69 1.066 2.70 0.995
Boolean operator
NOT Percent 27.2 32.8 21.6 18.4 24.8 33.9 27.5 13.8
Formulating right Frequency 44 61 15 5 39 37 28 5
keywords in searching 3.15 0.783 3.01 0.897
for information online Percent 35.2 48.8 12.0 4.0 35.8 33.9 25.7 4.6
Competently Frequency 27 65 27 5 30 47 22 10
evaluating information 2.92 0.771 2.89 0.916
no matter the source Percent 21.8 52.4 21.8 4.0 27.5 43.1 20.2 9.2
Evaluating print Frequency 39 58 25 3 26 47 23 13
sources based on its 3.06 0.780 2.79 0.944
criterion Percent 31.2 46.4 20.0 2.4 23.9 43.1 21.1 11.9
IJCSBI.ORG
Evaluating online Frequency 38 64 21 2 35 41 21 12
sources based on its 3.10 0.728 2.91 0.977
criterion Percent 30.4 51.2 16.8 1.6 32.1 37.6 19.3 11.0
Selecting materials and
summarizing them in Frequency 50 55 16 4 52 35 12 10
3.21 0.786 3.18 0.964
my own words for
personal use Percent 40.0 44.0 12.8 3.2 47.7 32.1 11.0 9.2
Preserving and storing Frequency 43 59 16 6 46 42 14 7
information for future 3.12 0.812 3.17 0.887
use Percent 34.7 47.6 12.9 4.8 42.2 38.5 12.8 6.5
Using acquired
information as a lead to Frequency 47 54 18 6 35 38 25 11
3.14 0.836 2.89 0.975
produce an article or
thesis Percent 37.6 43.2 14.4 4.8 32.1 34.9 22.9 10.1
Communicating and
presenting information Frequency 41 58 20 6 44 35 25 5
to others in 3.07 0.825 3.08 0.904
appropriate and usable
format Percent 32.8 46.4 16.0 4.8 40.4 32.1 22.9 4.6
Competently citing and
acknowledging other Frequency 46 54 21 4 31 47 20 11
3.14 0.807 2.90 0.932
peoples work that I
used Percent 36.8 43.2 16.8 3.2 28.4 43.1 18.4 10.1
Key: - HS Highly Skilled; MS Moderately Skilled; WS Weakly Skilled; NS Not Skilled
IJCSBI.ORG
Results in Table 5 show that generally Babcock students were only moderately
skilled in all the items used in measuring information literacy skills. However,
an exception was observed with Using encyclopedia to understand a
background information to a particular topic and Finding more documents on
my topics online, by combining synonyms in my search by using the Boolean
operator OR, where more students were highly skilled than moderately
skilled. In contrast, FUNAAB students were highly skilled in 9 of the 18 items
used to measure information literacy skills. The information literacy skills of
students in both schools can be considered satisfactory in view of the fact that
the lowest mean observed was 2.69 from Babcock University.
3.4 Cognitive abilities
The cognitive abilities of students in FUNAAB and Babcock University was
measured by their responses to the questions asked in this section which was
classified into strongly agree, agree, disagree and strongly disagree. The result
is presented in Table 6.
IJCSBI.ORG
Table 6: Descriptive of Cognitive Abilities of Students
IJCSBI.ORG
In both schools, most of the students only agreed to the items under cognitive
abilities. An exception was however observed in FUNAAB where many of the
respondents (42.2%) strongly agreed to the item, I find it easy to express my
ideas to people in writing (Table 6). It was surprising to observe that over 20%
of students in each school disagreed with the item My memory can contain a
lot of things and not forget them. Similarly, over 20% of FUNAAB students
disagreed with the items I find it easy to express my ideas to people orally
(20.2%) and I have the ability to automatically and fluently perform simple
mental processes (24.8%).
IJCSBI.ORG
Table 7: Descriptive of Information Retrieval Skills of Students
Babcock FUNAAB
Mean S.D
Mean S.D
INFORMATION VG G A P VP VG G A P VP
Definition of your needs Frequency 53 53 13 1 1 49 36 11 11 2
for research 4.29 0.758 4.09 1.059
Percent 42.1 42.1 10.2 0.8 0.8 45.0 33.0 10.1 10.1 1.8
Locating information in Frequency 35 63 21 2 4.08 0.726 33 43 14 16 3
3.80 1.112
e-resources. Percent 27.8 50.0 16.6 1.6 30.3 39.4 12.8 14.7 2.8
Selecting Frequency 35 56 26 3 1 33 33 21 13 9
articles/journals/books 4.00 0.827 3.62 1.260
with ease. Percent 27.8 44.4 20.6 2.4 0.8 30.3 30.3 19.3 11.9 8.2
Summarizing materials 3.98 0.940
Frequency 39 52 21 7 2 43 32 25 8 1 3.99 1.005
in your own words.
Percent 30.9 41.3 16.7 5.5 1.6 39.4 29.4 22.9 7.3 0.9
Understanding Frequency 31 58 26 4 2 28 32 23 12 14
terminologies used in 3.93 0.868 3.44 1.329
databases. Percent 24.6 46.0 20.6 3.2 1.6 25.7 29.4 21.1 11.0 12.8
Use of reference sources Frequency 26 54 24 13 4 30 31 19 16 13
3.70 1.030
to increase familiarity of 3.45 1.350
topics Percent 20.6 42.9 19.0 10.3 3.2 27.5 28.4 17.4 14.7 11.9
Use of mouse and Frequency 60 37 18 3 3 59 17 21 11 1
4.22 0.962 4.12 1.103
keyboard. Percent 47.6 29.4 14.3 2.4 2.4 54.1 15.6 19.3 10.1 0.9
Copying information
into your storage device Frequency 63 36 13 7 1 4.28 0.935 42 31 15 19 2
3.84 1.172
such as flash drive CD
ROM Percent 50.0 28.6 10.3 5.6 .8 38.5 28.4 13.8 17.4 1.8
Retrieving information Frequency 64 36 17 3 1 43 36 12 14 4
from internet 4.31 0.866 3.92 1.164
Percent 50.8 28.6 13.5 2.4 .8 39.4 33.0 11.0 12.8 3.7
Retrieving information Frequency 57 38 16 7 3 4.15 1.022 41 36 15 14 3 3.90 1.130
IJCSBI.ORG
from flash drive Percent 45.2 30.2 12.7 5.6 2.4 37.6 33.0 13.8 12.8 2.8
Retrieving information Frequency 55 39 20 5 2 4.16 0.957 37 35 22 12 3
3.83 1.101
from CD ROM Percent 43.7 31.0 15.9 4.0 1.6 33.9 32.1 20.2 11.0 2.8
Retrieving information Frequency 51 37 23 6 4 4.03 1.056 36 25 22 18 8
from articles/journals 3.58 1.300
Percent 40.5 29.4 18.3 4.8 3.2 33.0 22.9 20.2 16.5 7.3
Frequency 39 49 18 11 4 3.89 1.063 26 25 27 17 14
Scanning images. 3.29 1.335
Percent 31.0 38.9 14.3 8.7 3.2 23.9 22.9 24.8 15.6 12.8
Access of on-line Frequency 60 44 15 1 2 45 31 16 8 9
4.30 0.842
databases. 3.87 1.263
Percent 47.6 34.9 11.9 .8 1.6 41.3 28.4 14.7 7.3 8.3
Download files from Frequency 50 52 14 4 2 4.18 0.882 34 33 20 16 6
online databases. 3.67 1.218
Percent 39.7 41.3 11.1 3.2 1.6 31.2 30.3 18.3 14.7 5.5
Use of Boolean operators Frequency 24 41 40 11 6 3.54 1.061 22 25 29 20 13
(OR, AND, NOT). 3.21 1.292
Percent 19.0 32.5 31.7 8.7 4.8 20.2 22.9 26.6 18.3 11.9
Combining two terms to Frequency 25 52 27 14 4 3.66 1.035 25 31 17 24 12
retrieve information. 3.30 1.337
Percent 19.8 41.3 21.4 11.1 3.2 22.9 28.4 15.6 22.0 11.0
Use of truncation search Frequency 26 32 36 17 11 25 17 34 14 19
3.37 1.221
techniques ($, *, +) to 3.14 1.378
retrieve information. Percent 20.6 25.4 28.6 13.5 8.7 22.9 15.6 31.2 12.8 17.4
Use of search engines Frequency 64 36 11 7 4 4.22 1.049 56 19 11 21 2
such as Yahoo, Google,
3.97 1.251
Alta Visa and Google
scholar etc. Percent 50.8 28.6 8.7 5.6 3.2 51.4 17.4 10.1 19.3 1.8
IJCSBI.ORG
Table 7 shows that generally students in both universities have very good
information retrieval skills. On most of the items, more than 60% of students of
Babcock reported being good and very good. The exceptions were on the items,
Use of Boolean operators (OR, AND, NOT) and Use of truncation search
techniques ($, *, +) to retrieve information, which had 51.5 and 46%
respondents respectively. In contrast to the result from Babcock University,
FUNAAB had less than 60% respondents reportedly good and very good on the
following items, namely, Understanding terminologies used in databases
(55.1%)., Use of reference sources to increase familiarity of topics (55.9(%),
Retrieving information from articles/journals (55.9%), Scanning
images.(46.8%), Use of Boolean operators (OR, AND, NOT) (43.1%),
Combining two terms to retrieve information (51.3%) and Use of truncation
search techniques ($, *, +) to retrieve information (38.5%).
Test of Hypotheses
This section contains the results of the independent sample T-test used to test
the 4 hypotheses. The level of significance was set to 5%. Thus, if the p-value
is less than 0.05, the null hypothesis is rejected; but if p is greater than 0.05, the
null hypothesis is not rejected. The results for Hypotheses 1-4 are presented in
Table 8.
Hypothesis One
H0: There is no significant difference in the information knowledge of students
in Federal University of Agriculture, Abeokuta and Babcock University.
H1: There is a significant difference in the information knowledge of students
in Federal University of Agriculture, Abeokuta and Babcock University.
The result from Table 8 shows that at a significant level of 0.05, p=0.851 is not
statistically significant. Hence the null hypothesis is not rejected. This implies
that significant differences do not exist between students from Babcock and
FUNAAB universities in terms of information literacy knowledge.
IJCSBI.ORG
Table 8: Independent Samples Test result for Hypotheses 1-4
Lower Upper
Equal variances assumed 3.084 0.080 -0.188 233 0.851 -0.386 2.051 -4.426 3.655
Information literacy
knowledge
Equal variances not assumed -0.189 232.645 0.850 -0.386 2.035 -4.395 3.624
Equal variances assumed 1.839 0.176 1.119 230 0.264 0.53010 0.47381 -0.40347 1.46366
Information Literacy skill
Equal variances not assumed 1.108 213.397 0.269 0.53010 0.47841 -0.41291 1.47310
Equal variances assumed 1.052 0.306 1.522 232 0.129 0.69556 0.45709 -0.20501 1.59613
Cognitive Abilities
Equal variances not assumed 1.516 223.676 0.131 0.69556 0.45884 -0.20863 1.59975
Equal variances assumed 33.638 0.000 3.086 232 0.002 5.46613 1.77119 1.97645 8.95581
Information Retrieval
Equal variances not assumed 3.016 190.944 0.003 5.46613 1.81233 1.89137 9.04089
IJCSBI.ORG
Hypothesis Two
H0: There is no significant difference in the information literacy skills of
students in Federal University of Agriculture, Abeokuta and Babcock
University.
H1: There is a significant difference in the information literacy skills of
students in Federal University of Agriculture, Abeokuta and Babcock
University.
From Table 8, at a significant level of 0.05, p=0.264 is not statistically
significant. Hence the null hypothesis is not rejected. This implies that
significant differences do not exist between students from Babcock and
FUNAAB universities in terms of information literacy skills.
Hypothesis Three
H0: There is no significant difference in the cognitive abilities of students in
Federal University of Agriculture, Abeokuta and Babcock University.
H1: There is a significant difference in the cognitive abilities of students in
Federal University of Agriculture, Abeokuta and Babcock University.
As seen from Table 8, p=0.129 is not statistically significant. Hence the null
hypothesis is not rejected. This implies that significant differences do not
exist between students from Babcock and FUNAAB universities in terms of
cognitive abilities.
Hypothesis Four
H0: There is no significant difference in the information retrieval skills of
students in Federal University of Agriculture, Abeokuta and Babcock
University.
H1: There is a significant difference in the information retrieval skills of
students in Federal University of Agriculture, Abeokuta and Babcock
University.
The result from Table 8 shows that at a significant level of 0.05, p=0.02 is
statistically significant. Looking at the Group Statistics in Table 9, we can
see that Babcock students had higher level of information retrieval skills
than FUNAAB students.
IJCSBI.ORG
Hence, this study found that Babcock students had statistically significantly
higher information retrieval skills (75.5111.16) compared to FUNAAB
students (70.0515.79) and the null hypothesis was rejected.
4. DISCUSSION OF FINDINGS
Babcock and FUNAAB undergraduate students possessed information
literacy knowledge to a reasonable extent. They understand when and why
they need information and are generally able to locate and evaluate such
information. However, there is no significant difference in the information
literacy knowledge of Babcock and FUNAAB students. On the surface,
information literacy skills level seemed higher among FUNAAB students
based on the number of items the students reported being highly skilled as
compared to Babcock where many of the students were only moderately
skilled on the items. However, this seeming difference was not statistically
significant. According to Newton [26], information literacy knowledge
deals with knowing: when you have a need for information; the resources
available to you; how to find information and the need to evaluate results.
In addition, Ojedokun [27] also noted that information literacy skills in all
disciplines requires an individual to be able to define a problem; initiate a
plan to find information; locate and access resources; use the information;
synthesize information; and carry out some form of evaluation. Students of
both institutions could be considered generally not below average in their
level of information literacy skills. This can also be said about the cognitive
abilities of the students and the study revealed that cognitive abilities were
not statistically different between students of both schools.
Findings however revealed that there is a significant difference in
the information retrieval skills of students in both universities, as students of
Babcock University had higher level of information retrieval skills
compared to FUNAAB students. It is not a surprise that Babcock students
had higher information retrieval skills than FUNAAB students. A similar
finding was previously reported by Quadri, Adetimirin and Idowu [28]. The
authors investigated the availability and utilization of electronic resources
by students of Babcock and Redeemers universities, Ogun State, Nigeria.
Among other findings, the authors noted that lack of ICT skills as a barrier
to the use of electronic resources was more peculiar to respondents in
Redeemers University than Babcock. The fact that students of Babcock
University, a private university had higher information retrieval skills than
FUNAAB, a public university also agrees with a similar finding by Ojo and
Akande [29]. The study examined students access, usage and awareness of
electronic information resources at the University College Hospital (UCH),
Ibadan, Nigeria, and reported low level of usage of electronic resources by
students in this public university due to lack of information retrieval skills.
IJCSBI.ORG
Low level of information retrieval skills among students of FUNAAB might
not be unconnected with the generally known scarce resources in most
public universities due to under-funding by governments. It is a known fact
that resources for public universities have continuously been inadequate
despite growing desire for university education by students. Many facilities
in these public universities are dilapidated. On the other hand, some private
universities have state-of-the-art facilities such as well-furnished
classrooms, standard laboratories, well-equipped libraries, technologies
used in teaching and learning which are incomparable to those in most
public universities.
5. CONCLUSION
This study has shown that although significant differences do not exist in
the information literacy skills and cognitive abilities of students in Babcock
and FUNAAB, there is a significant difference in their information retrieval
skills. Babcock students had a higher level of information retrieval than
FUNAAB students. This study and other related studies are quick to
attribute this finding and others to the poor level of funding of public
universities by government. The reality however, is that this situation might
not change in the very near future. Hence, rather than endlessly waiting for
a time when government would be able to adequately fund public
universities, library and information professionals in public universities can
in their own little ways help out. Administrative heads of public universities
should encourage library and information professionals to periodically
organize practical workshops on information retrieval with the aim of
improving students information retrieval skills so that students can obtain
the needed information to solve their information need. A limitation of this
study is that only two universities in Ogun State were used due to
availability of students population statistics and the fact that they have
related courses. This may however affect the generalization of the findings.
Hence, further studies can be geographically expanded to include
universities located in other states in Nigeria.
REFERENCES
[1] Eisenberg, M. B. (2008). Information Literacy: Essential Skills for the Information
Age, DESIDOC Journal of Library & Information Technology, 28 (2), 39-47.
[2] Ekenna, M. & Mabawonku, I. (2013). Information retrieval skills and use of library
electronic resources by university undergraduates in Nigeria. Information and
Knowledge Management, 3(9), 6-14. Retrieved from
http://www.iiste.org/Journals/index.php/IKM/article/viewFile/7510/7748
[3] Ajiboye, B. A., Oyedipe, W. J. & Alawiye, M. K. (2013). Use of information retrieval
tools by the postgraduate students of selected universities in South Western Nigeria.
Information and Knowledge Management, 3(5), 53-59.
IJCSBI.ORG
[4] Fordjour, R., Badu, E. E. & Adjei, E. (2010). The prospects and challenges of
information retrieval by university students: A case study of Post Graduate Students of
the University of Ghana, Legon. Paper presented at the Joint 3rd African Association
of Agricultural Economists (AAAE) and 48th Agricultural Economists Association of
South Africa (AEASA) Conference, Cape Town, South Africa, from 19-23 September,
2010.
[5] Omiunu, O. G. (2014). Conceptualizing information need: A phenomenological study.
Journal of Library and Information Sciences, 2 (2), 29-54.
[6] Royal College of Nursing. (2011). Finding, using and managing information: Nursing,
midwifery, health and social care information literacy competences. London: Royal
College of Nursing. Retrieved from
http://www.rcn.org.uk/__data/assets/pdf_file/0007/357019/003847.pdf
[7] Jegede, P.O. & Owolabi, J. (2005). Effects of professional status, subject discipline
and computer attitudes among Teacher educators in Nigerian Colleges of Education.
Information Technology Journal 4(2), 158-162
[8] Eisenberg, M. & Berkowitz, R. (1990). Information problem solving: The Big Six
Skills approach to library and information skills instruction. Norwood, NJ: Ablex
Publishing Corporation.
[9] American Library Association and Association for Educational Communications and
Technology (1998). Information power: Building partnerships for learning. American
Library Association, Chicago.
[10] Association of College and Research Libraries (2000). Information literacy
competency standards for higher education. American Library Association, Chicago,
2000. Retrieved from http://www.ala.org/acrl/ilcomstan.html.
[11] Al-Maskari, A. & Sanderson, M. (2010). A review of factors influencing user
satisfaction in information retrieval. Journal of the American Society for Information
Science and Technology, 61(5), 859-868.
[12] Seneviratne, T.M. & Wickramasinghe, V.M. (2010). Information literacy skills of
undergraduates of University of Moratuwa. Journal of the University Librarians
Association of Sri Lanka. 14 (1), 15-30.
[13] Thirion, P. & Pochet, B. (2009). Information literacy in students entering higher
education in the French Speaking Community of Belgium: Lessons learned from an
evaluation. IFLA Journal 35(2), 152170.
[14] Kim, K.S. & Allen, B. (2002). Cognitive and task influences on Web searching
behavior. Journal of the American Society for Information Science and Technology, 53
(2), 109-119.
[15] Palmquist, R. A. & Kim, K. S. (2000). Cognitive style and on-line database search
experience as predictors of Web search performance. Journal of the American Society
for Information Science, 51 (6), 558-566.
[16] Bilal, D., Sarangthem, S. & Bachir, I. (2008). Towards a model of children's
information seeking behavior in using digital libraries. In: Proceedings of the second
international symposium on Information interaction in context, London, United
Kingdom. ACM, New York, pp. 145-151.
[17] Herring, J. E. (2010). School students, information retrieval and transfer. Library and
Information Research, 34 (107). Retrieved from http://www.cilipjournals.org.uk/lir
[18] Kuhlthau, C. (2004). Seeking meaning: A process approach to library and information
services. 2nd ed., Westport CT.: Libraries Unlimited.
IJCSBI.ORG
[19] Meyers, E.M., Nathan, L.P. & Saxton, M.L. (2006). Barriers to information seeking in
school libraries: Conflicts in perceptions and practice. Information Research, 12(2),
Retrieved from http://www.informationr.net/ir/12-2/paper295.html
[20] Schedl, M., Flexer, A. & Urbano, J. (2013). The neglected user in Music information
retrieval research. Journal of Intelligent Information Systems, 41(3), 523-539.
[21] Mazumder, Q.H. (2013). Student satisfaction in private and public universities in
Bangladesh International Journal of Evaluation and Research in Education, 2(2), 78-
84
[22] Mazumder, Q.H. (2014). Analysis of quality in public and private universities in
Bangladesh and USA. International Journal of Evaluation and Research in Education,
3(2), 99-108
[23] Obadara, O.E. (2012). Comparative analysis of public and private universities
administration in Nigeria. Journal of Social Sciences 32(3), 357-363
[24] Ilogho, J.E. & Nkiko, C. (2014). Information literacy search skills of students in five
selected private universities in Ogun State, Nigeria: A Survey. Library Philosophy and
Practice (e-journal). Paper 1040. Retrieved from
http://digitalcommons.unl.edu/libphilprac/1040
[25] Nwana, O.C. (1981). Introduction to education research for student teachers. Ibadan:
Heinemann Educational Books Nwana, O.C. (1981). Introduction to education
research for student teachers. Ibadan: Heinemann Educational Books
[26] Newton, A. (2005). What is information literacy? Retrieved from
http://www.ldu.leeds.ac.uk/news/events/documents/informationliteracy.pdf
[27] Ojedokun, A. A. (2007). Information literacy for tertiary education students in Africa.
Ibadan: Third World Information Services Limited.
[28] Quadri, G.O., Adetimirin, A.E. & Idowu, O.A. (2014). A study of availability and
utilization of library electronic resources by undergraduate students in private
universities in Ogun State, Nigeria. International Journal of Library and Information
Science 6(2), 28-34
[29] Ojo, R. A. & Akande, S. O. (2005). Students access, usage and awareness of electronic
information resources at the University College Hospital, University of Ibadan,
Nigeria. Lagos Journal of Library and Information Science 3(1), 16 24.
IJCSBI.ORG
ABSTRACT
Risk assessment is one of the projects important issues and by applying fuzzy method,
subsidence possibility can be investigated. In this paper, subsidence has been examined
using fuzzy method and investigating 81 and then 6000 soil samples in order to obtain
subsidence possibility of soils those which have these features. Results of fuzzy rules in this
dissertation have been analyzed about tunnel vault height, the height of the soil, modulus as
well as density which can be used in applicable matters. According to the results obtained
from this study deformation modulus has the greatest impact on subsidence so that when it
is less than 100, soil is not usable more. The higher the slag soil is, the more subsidence is
so that from a height of 6 m, the retaining structures must be used. The higher the tunnel
vault is, the more the subsidence is and the more the soil density is increasing, subsidence is
also increasing. When deformation modulus becomes 100, fuzzy digit is reducing and it
stands between 3.8 and 4.2. When slag soil height is increasing, subsidence is more likely
to go up. When tunnel vault is from 1 to 4, fuzzy digit stands from 0 to 2.5 and when slag
soil density stands between 2200 and 2400, fuzzy digit is between 5 and 6. Risk assessment
carried out in fuzzy logic indicates that whenever slag soil height, slag soil density and
tunnel vault is increasing, subsidence rate is also going up and whenever deformation
modulus is decreasing, subsidence rate is increasing.
Keywords
Tunnel, Horseshoe, Fuzzy logic, Subsidence.
1. INTRODUCTION
Tunnel projects are always along with high percentage of risks due to
uncertainties related to them. Accurate and proper management of these
risks and predicting them is reducing their possibility or negative
consequences. In a global scrolling about tunnel projects, 30 to 50 percent
increase in time and costs has been reported due too partial and fault
management. Risk assessment has been one of the fundamental bases of risk
management and anticipating risk will offer a great aid to the experts to
cover risk better. The main aim of risk assessment is to measure risk based
IJCSBI.ORG
on various indices such as effect of occurrence. Risk anticipation especially
in civil projects can prevent from financial consequences. Predicting cases
such as tunnel vault impact, soil density and soil subsidence rate are the
cases that predicting them is very important not only in theoretical view, but
also in scientific and logical view. On the other hand, there are many
algorithms which can take risk prediction into consideration. Fuzzy method
is one of them which can appropriately predict risks by forming learning
networks. Hence, in this paper we have approached prognosticating rate of
soil subsidence using various variables such as modulus vault, density, and
soil height and so on. It is expected that by performing this study, rate of
subsidence is anticipated and also rules affecting on subsidence are obtained
which can be considerably helpful with accurate comprehension of risks and
how they are occurred [1].
2. Literature review
Najjar and Zaman (1993) have proposed a numerical method based on Non-
linear finite elements for a mine in Oklahoma. They have tried different
percentage of adhesion and elasticity for linear and non-linear condition of
soil and have come to this conclusion that decrease in adhesion of soil and
also elasticity modulus will cause reduction in soil linear behavior [2].
Selby (1999) has modeled some tunnel in England using finite element
method. In his analysis, 2 techniques of linear elastic and Varangian finite
difference have been applied. Eventually, he compared these 2 methods with
theoretical results and came to this conclusion that subsidence estimation in
ground surface by aforementioned methods will cause subsidence to be
shallower and wider than the real prediction rate [3].
Want et al (2000) offered surface ground curve caused by soft ground
tunneling using Modified Gaussian model which has been carried out based
on FLAC software and finite difference method and then generalized
subsidence equations derived from one tunnel to two parallel tunnels [4].
Pachen and Brasinga (2003) in a report related to drilling two tunnels with a
diameter of 5.6 m and a length of 4.2 km by savers in Rotterdam,
Netherland in the sand ground showed that elastic solution is ensured.
Calculations of this report have been done using Plaxis software and
Centrifuges model [5].
Glossop et al (1976) have carried out some researches about short-term
subsidence s in Balfast tunnel in 2 different times. Respective tunnel has 2.7
m diameter and it is in 4.8 depth and soil feature is saturated silt. They
arrived to this conclusion that subsidence s derived from soil consolidation
IJCSBI.ORG
over the time form considerable part of the total soil subsidence derived
from tunnel [6].
Etol et al (1986) have done researches in the context of soil subsidence
derived from tunnel drilling. In these papers, subsidence s derived from
tunneling have been categorized into two parts, short-term subsidence s and
long-term ones. Short-term subsidence s is those which are happening by
tunnel drilling and long-term subsidence s are occurring caused by impacts
such as consolidation in saturated environment around tunnel. In this study,
they showed that soil long-term subsidence impact is transparently clear in
subsidence depth curve and cause short-term depth subsidence curve to be
wider and shallower and might cause damages in surrounding areas and
surface structures. These researchers have found 2 factors affecting on
accelerating consolidation phenomenon in underground water drainage from
the tunnel and water drainage from slots created inside the soil around
tunnel. Both factors are causing to create very powerful drainage areas
around tunnel and to cause accelerating consolidation in the soil [7].
Krisha et al (1999) has done some researches about tunnel drilling in
consolidation clay soil. They showed that by tunnel drilling in soft adhesive
grounds, subsidence in surrounding soils by consolidation includes a
considerable percentage of total soil subsidence. They have used 3-D
consolidation in their studies. Krisha showed that permeability coefficient is
the main factor of the pore water pressure control. He also showed that the
soil lateral coefficient at rest (K) determines the excess pore pressure
distribution form around the tunnel. Plus, pore water pressure and the time
that is disappeared is dependent on soil surrounding layers and permeability
of area around the tunnel and also tunnel position [8].
Chou and Bodet (2001) have done a number of researches about soil
subsidence in several cases of tunnel drilling in saturated clay soil. This
dissertation has been applied in plane strain condition. Researchers have
achieved the following results based on analyses done in undetermined
condition:
1- The main parameter in determining subsidence rate is the gap with
allowable displacement.
2- The most displacements have been happened at a distance of about 4
to 5 times the radius around the tunnel.
3- Vertical displacement of the layer under the tunnel about twice the
tunnel diameter from the tunnel center is equal to zero. Of course, in
the condition that there is a layer of stone under the tunnel, vertical
displacement would be zero.
IJCSBI.ORG
4- Horizontal displacement in the area around the tunnel compared to
vertical displacement is trivial.
Huang and Zhang (2004) have considered calculating long-term subsidence
in soft ground in Shanghai metro tunnels into account and investigated
impact of excavation during coating for tunnels on ground subsidence
expansion and compared this subsidence s to numerical modeling by finite
difference method and have found out the following results:
1- Tunnel manufacturing methodology has a very crucial effect on
tunnels long-term subsidence in clay soils or grounds.
2- Tunnels long-term subsidence in Shanghai metro is too much.
3. Fuzzy Logic
In 1965, Professor Lotfi Zade has published a paper entitled Fuzzy set in
control and information journal. In this paper, what have been called <<
ambiguity >> or << multi-valued >> by Bertrand Russell, John Albion, Max
Black and others was named Fuzzy. Fuzzy set was introduced with an
example of human tallness set. This case was the first set introduced by
Lotfi Zade. Fuzzy digits are a fuzzy subset of the real numbers which
proposes a spectrum of confidence interval of opinions and beliefs. [9]
x a1
a a a1 x aM
M
A A ( x)
1
x a2 aM x a2
aM a2
a ,a
In aforementioned relation, 1 2 is an abutment interval and M
(a ,1) is
the top point,
Triangular numbers are mostly used in applications such as (Fuzzy
controllers, management, commercial and financial affairs, social science
decision making). They have a membership function which includes 2 linear
sections Al (left) and Ar (right) and in the top, they are connected in (a M ,1)
which causes graphic display and operation of triangular numbers is very
easy. [9]
IJCSBI.ORG
Calculative operation with triangular numbers:
Fuzzy number sum:
and
A2 (a1( 2) , aM( 2) , a2( 2) ) is also a triangular number.
A1 A2 (a1(1) , aM(1) , a2(1) ) + A2 (a1( 2) , aM( 2) , a2( 2) )
(a1(1) a1( 2) , aM(1) aM( 2) , a2(1) a2( 2) )
Multiplying a triangular number into a real number:
Multiplying a triangular number, An into a real number r is also a triangular
number:
Ar rA r (a1 , aM , a2 ) (ra1 , ra M , ra 2 )
Dividing a triangular number by a real number:
1
This process is defined as multiplying A into r , provided that r 0.
Therefore, this relation shows that: [10]
A 1 a a a
(a1 , a M , a2 ) 1 , M , 2
r r r r r
Defuzzification:
Since, in most of the time, we are forced to defuzzificate to eventually
obtain answer and compared two fuzzy numbers, the following relation is
often used in defuzzification [11].
T=(L+2M+U)/4
IJCSBI.ORG
4. METHODOLOGY
4.1 determining variables
In this section, research variables have been introduced. In this dissertation,
4 variables have been employed which have been displayed in table 1: [9]
Table 1: Research variables
Subsidence possibility (Summit)
High Average Low Variables
High ]53[ Average Low Size of slag soil
]53[ 7 to 4 ]53[ 12 to 1
12 to 7 4 to1 (m)
Low ]25[ Average High Density of slag soil
]25[ 2400 to 2200 ]25[ 2600 to 2000
2200 to 2000 2600 to 2400 (kg/m^3)
High Average Low Deformation
]53[ ]53[ ]53[ modulus
18 10 3 to 1000 510 4 to 1810 3 5 10 4 to 8 10 4 80000 to 1000
(kpa)
High Average Low Size of horseshoe
]53[ ]53[ ]53[ vault
13 to 10 10 to 5 5 to 2 13 to 2
(m)
IJCSBI.ORG
IJCSBI.ORG
are dependent on reasoning, decision-making and human perception. [13]
Choosing an appropriate method and view for modeling a system is entirely
depending on complexity of that system and it has reverse relationship with
the extent of our knowledge or perception from that system.
Fuzzy logic toolbox consists of a set of fuzzy functions in the form of
MATLAB calculative environment. This toolbox provides facilities to infer
fuzzy systems in the MATLAB framework. Also, in regard with simulation
of fuzzy systems, there is a possibility to integrate them in Simulink
Software framework. You can use functions related to this toolbox in other
applications (for example in C programing). This toolbox exploits a Graphic
User Interface to aid user, but if you wish, you can relative functions in
MATLAB.
In this dissertation, Fuzarith Function from MATLAB toolbox is used which
means applying mathematic in fuzzy in which zmf function indicates low
amount and smf indicates high amount and trimf expresses average value.
[14]
5. Discussion
A) Results of theoretical examination of soil sample experiments
81 soil samples have been examined using theoretical method. In figure 1,
subsidence of 81 soil samples has been depicted, for example studied soil
samples in the case of 10 first theoretical methods have been calculated in
table 2.
IJCSBI.ORG
9 3 2500 100 12 1/4423
10 3 2300 700 4 0/0236
For example, in the first sampling, as it is observed in table 3, when slag soil
size is equal to 3 meters and slag soil density is equal to 2500 kg/ M and
deformation modulus is 700 Kpa and horseshoe vault size is equal to
4meters, subsidence rate will be 0.0256 cm.
As it is seen in table 3, in the case of the forth study, when slag soil size is
equal to 3 meters and slag soil density is equal to 2500 kg/ M and
deformation modulus is 150 Kpa and horseshoe vault size is equal to
4meters, subsidence rate will be 0.1197 cm. This value compared with 3
first samples due to lowering vault size to 4 meters and changing
deformation modulus from 700 Kpa to 150 Kpa, subsidence rate compared
to two first cases is more and compared to the third sample is less which
indicates importance of deformation modulus parameter.
Changes in subsidence rate about all studies have been depicted in figure 2.
IJCSBI.ORG
IJCSBI.ORG
In figure 5, impact of tunnel vault on soil subsidence in the tunnel has been
investigated. It can be concluded from fig 5 that the wider the tunnel vault
is, the more the subsidence is.
IJCSBI.ORG
In figure 7, effect of slag soil density parameter on soil subsidence in the
tunnel has been examined. It can be concluded from fig 7 that the higher the
slag soil density is, the more the subsidence is.
IJCSBI.ORG
IJCSBI.ORG
IJCSBI.ORG
In the figure 10, as it is clear from table 5, in above chart red color
indicates slag soil density and yellow color indicates horseshoe vault and
blue color shows slag soil size and green indicates deformation modulus and
black color represents fuzzy results.
Thus, if slag soil size is average, slag soil density is high and deformation
modulus is high and horseshoe vault size is average, as a result, subsidence
is between 0 and 6. Due to this issue that subsidence rate in theoretical
method is 0.01 and when it is transformed to fuzzy value, this value is
reduced to 0 or 6, shows that when this value is changed to fuzzy value, soil
subsidence is investigated with higher risk possible percentage.
IJCSBI.ORG
In the figure 11, as it is clear from table 6, in above chart red color
indicates slag soil density and yellow color indicates horseshoe vault and
blue color shows slag soil size and green indicates deformation modulus and
black color represents fuzzy results.
Thus, if slag soil size is high, slag soil density is low and deformation
modulus is low and horseshoe vault size is average, as a result, subsidence is
between 3.7 and 4.2. Due to this issue that subsidence rate in theoretical
method is 0.07 and when it is transformed to fuzzy value, this value is
reduced to 3.7 or 4.2, shows that when this value is changed to fuzzy value,
soil subsidence is investigated with higher risk possible percentage.
IJCSBI.ORG
In the figure 12, as it is clear from table 7, in above chart red color
indicates slag soil density and yellow color indicates horseshoe vault and
blue color shows slag soil size and green indicates deformation modulus and
black color represents fuzzy results.
So, if slag soil size is average, slag soil density is low and deformation
modulus is average and horseshoe vault size is high, as a result, subsidence
is between 1.5 and 6. Due to this issue that subsidence rate in theoretical
method is 0.95 and when it is transformed to fuzzy value, this value is
reduced to 1.5 or 6, shows that when this value is changed to fuzzy value,
soil subsidence is investigated with higher risk possible percentage.
IJCSBI.ORG
In the figure 13, as it is clear from table 8, in above chart red color
indicates slag soil density and yellow color indicates horseshoe vault and
blue color shows slag soil size and green indicates deformation modulus and
black color represents fuzzy results.
Therefore, if slag soil size is low, slag soil density is average and
deformation modulus is high and horseshoe vault size is average, as a result,
subsidence is between 0 and 6. Due to this issue that subsidence rate in
theoretical method is 0.09 and when it is transformed to fuzzy value, this
value is reduced to 0 or 0.09, shows that when this value is changed to fuzzy
value, soil subsidence is investigated with higher risk possible percentage.
6. CONCLUSIONS
In this research, we have considered risk assessment in constructing
horseshoe vault tunnels. Accordingly, variables affecting on soil subsidence
have been examined by determining appropriate criteria and tunnel risk
analysis was done over 81 samples. Thus, the following applicable results
can be observed in this dissertation:
1) Deformation modulus has the highest effect on soil subsidence,
whatever the numerical value of the deformation modulus is low;
IJCSBI.ORG
subsidence value is increasing so that when it is lessen to 100 Kpa,
soil is not more useable.
2) The higher the slag soil height is, the more the subsidence is so that
from the height 6 meters, retaining wall and structures have to
applied.
3) The higher the slag soil density is, the more the subsidence is.
4) The higher the tunnel vault is, the more the subsidence is so that
from the height 8 meters, especial strategies have to be taken.
5) In fuzzy logic also, the less the deformation modulus is, subsidence
rate is increased by higher risk possibility. When deformation
modulus is 100 Kpa, fuzzy number is also decreasing and will stand
between 3.8 and 4.2.
6) In fuzzy logic, the higher the slag soil is, subsidence rate is increased
by higher risk possibility. When slag soil height is between 8 and 12
meters, its fuzzy number is also between 0 and 3.
7) In fuzzy logic, the more the slag soil density is, subsidence rate is
increased by higher risk possibility. When slag soil density is
between 2200 and 2400 kg/m3, fuzzy number is between 5 and 6.
8) In fuzzy logic, the wider the tunnel vault is, subsidence is increased
by higher risk possibility. When tunnel vault is between 1 and 4 m,
fuzzy number stands between 0 and 2.5.
9) Risk assessment carried out by fuzzy method shows that in the
subsidence rate results, slag soil height, slag soil density and tunnel
vault is increased. Subsidence rate is also increasing and the lower
the deformation modulus is, the higher the subsidence is.
REFERENCES
[1] Stump, G.S. and Allen, C.T., Vermeer Manufacturing Company, 1998. Apparatus and
method for detecting an underground structure. U.S. Patent 5,819,859.
[2] Najjar, Y. and Zaman, M., 1993. Surface subsidence prediction by nonlinear finite-
element analysis. Journal of geotechnical engineering, 119(11), pp.1790-1804.
[3] Selby, A.R., 1999. Tunnelling in soilsground movements, and damage to buildings in
Working ton, UK. Geotechnical & Geological Engineering, 17(3-4), pp.351-371.
IJCSBI.ORG
encompassing hydrogeology, environmental geology and the applied geosciences.
Engineering Geology, 81(2), pp.99-130.
[6] Reilly, C.C. and Orr, T., 2011, May. MICROTUNNELLINGRECENT EXPERIENCE
IN IRELAND. In Proceedings of 29th International NO-DIG Conference, Berlin (pp. 1-10).
[7] Thrush, P.W., 1968. A Dictionary of Mining, Mineral and Related Terms.
[8] Swoboda, G. and Abu-Krisha, A., 1999. Three-dimensional numerical modelling for
TBM tunnelling in consolidated clay. Tunnelling and Underground Space Technology,
14(3), pp.327-333.
[9] Kirytopoulos, K., Konstandinidou, M., Nivolianitou, Z. and Kazaras, K., 2014.
Embedding the human factor in road tunnel risk analysis. Process Safety and
Environmental Protection, 92(4), pp.329-337.
[10] Ardeshir, A., Amiri, M., Ghasemi, Y. and Errington, M., 2014. Risk assessment of
construction projects for water conveyance tunnels using fuzzy fault tree analysis.
INTERNATIONAL JOURNAL OF CIVIL ENGINEERING, 12(4 A), pp.396-412.
]11[ Abdelgawad, M., Fayek, A.R. and Martinez, F., 2010. Quantitative assessment of
horizontal directional drilling project risk using fuzzy fault tree analysis. In Proc., 2010
Construction Res. Congress (pp. 1274-1283). Reston, VA: ASCE.
]12[ Markowski, A.S. and Mannan, M.S., 2008. Fuzzy risk matrix. Journal of hazardous
materials, 159(1), pp.152-157.
]13[ Garimella, S.V. and Sobhan, C.B., 2001. Recent advances in the modeling and
applications of nonconventional heat pipes. Advances in Heat Transfer, 35, pp.249-308.
]14[ Tan, Y. and Li, M., 2011. Measured performance of a 26 m deep top-down excavation
in downtown Shanghai. Canadian Geotechnical Journal, 48(5), pp.704-719.
IJCSBI.ORG
ABSTRACT
The sophisticated modus operandi of modern day criminals has necessitated the
development of modern policing initiatives that are centered on Criminal Intelligence. As a
law enforcement strategy, criminal intelligence has altered the policing pattern by
reinforcing the traditional approaches of investigating. Although the use of advanced
information systems has become necessary in the profiling and prediction of crime threats,
their full potential has not been realised. The purpose of this qualitative research was to
evaluate the adoption of deductive databases in augmenting criminal intelligence in
Zimbabwe. The major data collection instruments were document review and semi-
structured interviews. The study established that ZRP has been yet to adopt deductive
database technology. All the systems that are currently being used rely only on data stored
in the database. There is no inference of new facts from the databases. In order to augment
criminal intelligence, the study recommends that ZRP should adopt a deductive database
technology for empowering decision makers and achieving strategic intent. The identified
application areas of deductive databases can bring about improved service delivery system
coupled with effective decision making at all levels of planning.
Keywords
Deductive database, evaluating deductive database, adoption of deductive database,
criminal intelligence, Augmenting Criminal Intelligence
1. INTRODUCTION
The organisation of crime have transformed rapidly in the 21st century.
According to Pascual (2015), modern day criminals have arisen and grown
faster than the law enforcement agencies. Their sophisticated modus
operandi has necessitated the development of modern policing initiatives
that are centered on Criminal Intelligence (CI) (Milliken and Shaw 2012).
As a law enforcement strategy, criminal intelligence has altered the policing
pattern by reinforcing the traditional approaches of investigating the crime.
The thrust is to prevent crimes from being committed rather than solely
depend on reacting to their commission. Decision makers should be able to
have CI information at their disposal at any time for them to make informed
IJCSBI.ORG
decisions to proactively deal with crimes and criminal activities (Moreto
2015).
Law enforcement agencies have many data stores about crime and criminal
activities. Collected information about crimes and criminal activities can
allow new information or criminal intelligence to be derived that is useful in
law enforcement for crime detection and prevention. As emphasised by
Shen et al. (2014), information stored in database can provide CI if certain
rules and extrapolations are applied. However, these data stores are not
being utilised for CI at ZRP. Therefore, it can be argued that a deductive
database may play an important role in police organisation to improve the
quality of law enforcement. Intrinsically, ZRP as a law enforcement agent
can implement deductive databases to allow informed decision making and
IJCSBI.ORG
help them to conduct informed deployments of both material and human
resources in fighting crime.
IJCSBI.ORG
the amount of storage space on the database. In the context of the ZRP,
these rules can be specified declaratively, which, when compiled and
maintained by the DBMS can determine when and where offences and
criminal activities are likely to take place. Therefore, it can be concluded
that a deductive database is grounded on database storage and the logic to
derive information so that rules can be evaluated against facts to answer
emerging queries (Jha 2014).
IJCSBI.ORG
intelligence, deductive databases should facilitate the exploration of
avenues of information gained during collection so that it can be converted
to intelligence. In order to achieve this, appropriate information software
applications and analysis tools should be used. These may include Crime
Pattern Analysis, General Profile Analysis, Offender Group Analysis,
Specific Profile Analysis, and Investigations Analysis.
IJCSBI.ORG
prevention are identified as broad objectives for any crime prevention
strategy (Wojnicki 2014). Crime analysis acts as an aid to crime prevention
by facilitating information dissemination prior to any deployment plan.
Information that can be used for deployment purposes and crime prevention
activities cannot be generated from explicitly data capture alone but data
inferences. Therefore, its capability to make derivatives among various
relations during execution makes it an important design in crime analysis.
5. METHODOLOGY
Reflecting the adoption of information systems requires a rigorous research.
A qualitative approach was used to evaluate the adoption of deductive
database technology in augmenting criminal intelligence in Zimbabwe.
Qualitative research provides an in-depth study to the problem. The major
data collection instruments were document review and semi-structured
interviews Terrell (2012). This was made to ascertain whether ZRP has
adopted a deductive database management system or not. Document
reviewed included systems documentation and database design. The
participants chosen for interviews were system developers and
administrators. These participants were chosen purposefully because they
were assumed to be having adequate knowledge on the status and the
performance of the ZRPs database systems.
IJCSBI.ORG
7. CONCEPTUAL MODEL FOR DEDUCTIVE DATA BASE
The sequence of the conceptual model is that each police station submits
queries to any site. The query analyser that is located on the user site
determines whether the query can be answered by the local site or it should
be processed by the other sites. If the use of other sites is required, then the
partaking sites must communicate. But, if sub-queries are not answered at
the local site, they will be performed like autonomous queries. The closing
operation which may include JOIN and PROJECTION is executed by the
initiating site based on the rules defined in the database in conjunction with
tabling, fixpoint computation and dependency graph features for implicit
data representation. However, there is need for remote processing if the
IJCSBI.ORG
police station initiating the query cannot communicate with the central
police station.
To spell out the idea of implicit data representation, lets consider the
following example. Suppose we have a deductive database that contains the
following:
James is a suspect for armed robbery of motor vehicle
Jamess modus operand is use of firearm
IF x is a suspect for armed robbery AND x uses y to robbery THEN
x is an armed robber.
In addition to the two facts, a deductive database can also contain the rule
that specifies the armed robber relationship between a pair of entities. The
database can prove the statement James is an armed robber by making the
following substitution in the rule: x = James and y = firearm. Since
some associations many have multiple correlations, many rules can be
added in the database to map these multiple associations. Furthermore, the
algorithm must allow new associations to be added in the database as the
need arises so that relevant deductions can be achieved. This deduction of
facts from existing stored data can be applied by ZRP in the implementation
of autonomous robots, criminal intelligence system and crime cases
reporting system.
8. CONCLUSION
The research in deductive databases have produced plausible theoretical
foundations that have been supported by greater prototype implementations.
However, their applications in the industry have been insignificant,
especially in law enforcement agencies. Therefore, this study established
that there are many areas in ZRP that can make use of deductive database
systems to improve the quality of law enforcement. The organisation need
not to rely on stored data only, but make use of new facts that can be
derived from the data. The identified application areas of deductive
databases can bring about improved quality law enforcement coupled with
effective decision making at all levels of planning. In order to augment
criminal intelligence, ZRP need to implement the proposed model of
deductive database.
9. ACKNOWLEDGMENTS
The research would want to acknowledge ZRP members who contributed to
the success of this research by providing relevant information.
REFERENCES
Arvidsson, V., Holmstrm, J. & Lyytinen, K., 2014. A multi-dimensional view of strategic
information system implementation and use. Journal of Strategic Information
Systems, 23(1), pp.4561.
IJCSBI.ORG
Byrne, J. & Marx, G., 2011. Technological Innovations in Crime Prevention and Policing .
A Review of the Research on Implementation and Impact. , Journal of technology
and Innovation 4(20), pp.1740.
Cohen, W.W., 2016. TensorLog: A Differentiable Deductive Database. , (Nips). 29th
Conference on Neural Information Processing Systems (NIPS 2016), Barcelona,
Spain
Fernando, S., 2015. Improving the Deductive System DES with Persistence by Using SQL
DBMS s. , Electronic Proceedings in Theoretical Computer Science 173(12),
pp.100114.
Greeling, K.Y., 2013. Autonomous robots in law enforcement: future legal and ethical
issues. Carbondale: Southern Illinois University
Grobler, P.M. et al., 2013. Preparing South Africa for Cyber Crime and Cyber Defense. ,
Systemics, Cybernetics And Informatics 11(7), pp.3241.
Jha, A.K., An Introduction To Deductive. , International Journal of Advanced Computer
Technology, pp.3336.
Mashiloane, N.P., 2014. The Use Of Intelligence Led Policing In Crime University Of
South Africa , (September).
Moreto, W.D., 2015. Introducing intelligence led conservation: bridging crime and
conservation science. Crime Science. Available at:
"http://dx.doi.org/10.1186/s40163-015-0030-9.
Pascual, D.S., 2015. Analysis of Criminal Intelligence from a Criminological Perspective:
The Future of the Fight against Organized Crime 1. , Journal of Law and Criminal
Justice, 3(1), pp.4048.
Senz-prez, F., DES: A Deductive Database System.
Shen, G. et al., 2014. Research on the Rules of Mapping from Relational Model to OWL,
International Journal of Engineering and Technology 5 (6), pp. 4735-4740
Smith, T. et al., 2014. Definition and Types of Crime Analysis. , International Association
of Crime Analyst,2 (10), pp 1-8
Terrell, S.R., 2012. Mixed-Methods Research Methodologies. The Qualitative Report,
17(1), pp.25680.
Wojnicki, I., 2014. Extending relational database , Computer Science 6 (October), pp.95
112.
IJCSBI.ORG
ABSTRACT
The problem of finding shortest path in a network has been studied by many researchers
over the years. Most of the research works have proposed algorithms for finding the
shortest route in a network. This work serves dual purpose; it not only aims to gain the
high-level familiarity with availability of petrol pumps in the residential areas in Anand
district, but also suggest the shortest route to reach a petrol pump from any location. The
initial target areas for this analysis are the residential areas around Anand in Gujarat.
Quantum GIS has been used to perform analysis of petrol pump reachability from a random
place in Anand to a nearest located petrol pump and to identify the shortest path between
the two locations. Results of comparison confirm the feasibility and robustness of proposed
methodology which shows its potential application in real road networks.
Keywords
shortest path, reachability analysis, GIS, transportation, road networks
1. INTRODUCTION
Modes of transportation have added speed and efficiency to our daily life.
Transportation plays a significant role in todays world by removing the
distance barrier. It would not be boasting if transportation is said to be the
lifeline of everyone. An efficient transport system helps in increasing
productivity and in enhancing competitiveness of the economy of a country.
In todays world where life has become very fast, people have become more
dependent on the modes of transportation. Cars and bikes have not only
become necessity, but also one of the items of luxury. We have become so
much dependent on our vehicles for moving from one place to another that
it happens at times that the petrol tank of our vehicles are almost dying of
hunger and we do not realize that it needs refilling. At such occasions,
everyone would be interested to know the nearest possible petrol pump to
fulfill his immediate requirement.
India has one of the largest connectivity in terms of road networks in the
world. Although the roads have been in existence since ancient times, the
usage of these roads has recently been increased. The aim of this paper is to
IJCSBI.ORG
design a system which can be applied to any type of road network with the
intention of providing globally optimal path from one location to another. It
also has parallel processing ability by which the available paths are
practically compared on the basis of their distance and the one with the
shortest distance is displayed.
Geographic Information Systems (GIS) technology has recently seen
development in the areas of network and transportation analysis and has
become a preferred practice in many application areas. A fundamental
problem in network analysis surrounds around computation of shortest paths
between any two randomly chosen locations within a network. GIS has been
used in past by many researchers in network analysis. Comber et al.
analyzed green space access in an English city using a network analysis in
GIS [4], Kyushik & Seunghyun [10] analyzed pedestrian accessibility to
urban parks using the network analysis method of GIS. Dean [5] proposed
to find optimal routes for networks of harvest site access roads using GIS-
based techniques.
Pijanowski et al. [13] used a variety of social, political, and environmental
factors to forecast land use changes using Land Transformation Model
(LTM), which couples geographic information systems (GIS) with artificial
neural networks (ANNs). Liu & Zhu [11] presented an integrated GIS
approach to accessibility analysis, which provides a general framework for
integrated use of GIS, travel impedance measurement tools and accessibility
measures to support the accessibility analysis process. As far as finding
shortest path is concerned, there are several algorithms to solve the shortest
path problem by using genetic algorithms such as the Munemotos
algorithm [12], Inagakis algorithm [9], and Changs algorithm [1].
Munemoto uses variable length chromosomes and Inagaki uses fixed length
chromosomes in their algorithms. Zhang et al. [16] proposed a parameter-
free minimal resource neural network framework for solving a wide range
of single-source shortest path problems for various graph types.
Guernic & Girard [3] have carried out algorithmic reachability analysis of
continuous-time linear systems with constrained initial states and inputs.
Lee et al. [14] identified to classify villages according to their spatial
centralities, considering rural amenity resources, for integrated tourism
management. Hong & Murray [7] compared vector and raster approaches
for identifying obstacle-avoiding shortest paths/routes. Empirical
assessment is carried out for a number of planning applications, highlighting
representational issues, computational requirements and resulting path
efficiency. In a similar work by Hong et al. [8] a spatial filtering method
IJCSBI.ORG
2. METHODOLOGY
Calculating the shortest distance between two points in a network is one of
the most common problems on a road network which are addressed recently
by many researchers [2, 5, 9, 13, 15]. The strength of the suggested
methodology lies in the fact that it does not depend on any constrained
parameters to find the shortest path. It can be practically applied to any road
within any network to find the shortest path among two randomly chosen
points.
The Road Graph plugin of QGIS has been used to as a tool to define the
shortest path based on distance by calculating cumulative cost length,
between two points in a network. The data of petrol pumps is considered as
point shape file while that of Anand roads as polyline shape file. The
experiments have been conducted on vector data which initiates by
importing the shape files in QGIS environment. Two points on any polyline
layer over the road network can be considered to calculate shortest path
between them supposing one as source and other as destination. The
optimization on the path can be performed based on length or on travel
IJCSBI.ORG
time. Some of the important parameters which are required to be set are
listed in Table 1.
Table 1. Units and Values set for Experimentation
Sr.
Parameter Units and Values
No.
1. Time Hour
2. Distance Kilometer
3. Topology Tolerance 10 meter
4. Direction default
5. Speed Limit 40 km/hr. and 60 km/hr.
Figure 1a: Geo-referenced Map of Anand Figure 1b: Anand District with Talukas
District
IJCSBI.ORG
IJCSBI.ORG
Figure 3a: Time and Distance to Travel from Point A to Bakrol, V.V. Nagar Petrol
Pump
Time and distance as calculated using Google maps is shown in figure
3b.
Figure 3b: Time and Distance to Travel from Point A to Bakrol, V.V. Nagar
Petrol Pump using Google Maps
Case 2: Time taken to travel from point A to Karamsad Petrol Pump
with Longitude and Latitude pair of (72.9091, 22.5399) at speed of 60
km/hr. is shown in figure 4a:
IJCSBI.ORG
Figure 4a: Time and Distance to Travel from Point A to Karamsad Petrol Pump
Time and distance as calculated using Google maps is shown in figure
4b.
Figure 4b: Time and Distance to Travel from Point A to Karamsad Petrol Pump using
Google Maps
Case 3: Time taken to travel from point A to Anand Petrol Pump with
Longitude and Latitude pair of (72.9278, 22.5638) at speed of 60 km/hr.
is shown in figure 5a:
IJCSBI.ORG
Figure 5a: Time and Distance to Travel from Point A to Anand Petrol Pump
Time and distance as calculated using Google maps is shown in figure
5b.
Figure 5b: Time and Distance to Travel from Point A to Anand Petrol Pump using
Google Maps
IJCSBI.ORG
Figure 6: Time and Distance to Travel from V.V.Nagar Petrol Pump to Karamsad
Petrol Pump
IJCSBI.ORG
Figure 7: Time and Distance to Travel from V.V.Nagar Petrol Pump to Anand Petrol
Pump
3. EXPERIMENTAL RESULTS
In order to provide solution to the basic queries discussed in above sections,
the paper first systematically examines some of the key scenarios which
show requirement of petrol pumps. It then attempts to explore the need of
more petrol pumps in the district due to unavailability of sufficient number
existing in that area. These requirements are supported by some practical
indicators to characterize the serving capability of existing petrol pumps in
Anand district. Figure 8 depicts the road network to show the connectivity
of Anand district. QGIS Road Graph plugin is used to find the shortest
distance between two points on the road network. The relationship between
road type and speed limit are studied in an effort to better understand their
IJCSBI.ORG
Some selection attribute queries were run over the road network to specify
the speed limits on the attribute road_type as shown in figure 9. The roads
are also classified in various categories based on the speed limit set for the
vehicles moving on the respective roads.
IJCSBI.ORG
have to take different types of roads. The significance of setting these speed
limits is realized while calculating the time required to reach nearest petrol
pump from specific location going via these roads.
Table 4: Speed Limits for Different Road Types
Road Type Speed Limit
Trunk 80km/hr
Primary 70km/hr
Secondary 60km/hr
Motorway 60km/hr
Tertiary 40km/hr
Residential 30km/hr
Service 20km/hr
motorway_link 20km/hr
A comparative analysis is performed with the results shown by Google
maps to point out the variation in shortest path calculated by proposed
method as shown in table 5.
4. Conclusion
An efficient method for finding the shortest path is presented for suggesting
the optimal distance and minimum time required to move from one location
to another in a road graph network. The suggested method helps in locating
the available petrol pumps in the given radius standing at a specific location
and finding the shortest and the fastest way to get from that location to the
nearest petrol pump in Anand district chosen as a sample. The same method
can be applied to any location on the map.
IJCSBI.ORG
REFERENCES
Ahn, C.W. and Ramakrishnal, R.S., A Genetic Algorithm for Shortest Path Routing
Problem and the Sizing of Populations, IEEE Transactions on Evolutionary
Computation, 2002, pp. 566-579.
Beardwood, J., Halton, J.H. and Hammersley, J.M., The shortest path through many
points, Mathematical Proceedings of the Cambridge Philosophical Society, 55, 4,
2008, pp. 299327.
Colas Le Guernic, Antoine Girard, Reachability analysis of linear systems using support
functions, Nonlinear Analysis: Hybrid Systems, 4, 2, 2010, pp.250-262.
Comber A., Brunsdon C., Green E., Using a GIS-based network analysis to determine
urban greenspace accessibility for different ethnic and religious groups, Landscape
and Urban Planning, 86, 1, 2008, pp. 103-114.
Dean D.J., Finding optimal routes for networks of harvest site access roads using GIS-
based techniques, Canadian Journal of Forest Research, 27, 1, 1997, pp. 11-22.
Goldberg A.V., Harrelson C., Computing the shortest path: A search meets graph theory,
In Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete
algorithms, Society for Industrial and Applied Mathematics, Philadelphia, PA,
USA, 2005, pp. 156-165.
Hong, I. and Murray, A. T., Assessing Raster GIS Approximation for Euclidean Shortest
Path Routing, Trans. in GIS, 20, 2016, pp. 570584.
Hong, I., Murray, A. T. and Wolf, L. J., Spatial Filtering for Identifying a Shortest Path
Around Obstacles, Geogr Anal, 48, 2016, pp. 176190.
Inagaki J., Haseyama M. and Kitajima H., A genetic algorithm for determining multiple
routes and its applications, Proc. IEEE International Symposium on Circuits and
Systems, 6, 1999, pp. 137-140.
Kyushik Oh, Seunghyun J., Assessing the spatial distribution of urban parks using GIS,
Landscape and Urban Planning, 82(12), 2007, pp. 25-32.
Liu, S. and Zhu, X., An Integrated GIS Approach to Accessibility Analysis. Transactions in
GIS, 8, 2004, pp. 4562.
Munemoto M., Takai Y. and Sato, Y., A migration scheme for the genetic adaptive routing
algorithm, Proc. IEEE Int. Symp. Circuits and Systems, 1999, pp. 137-140.
Pijanowski B.C., Brown D.G., Shellito B.A., Manik G.A., Using neural networks and GIS
to forecast land use changes: a Land Transformation Model, Computers,
Environment and Urban Systems, 26, 6, 2002, pp. 553-575.
Sang-Hyun Lee, Jin-Yong Choi, Seung-Hwan Yoo, Yun-Gyeong Oh, Evaluating spatial
centrality for integrated tourism management in rural areas using GIS and network
analysis, Tourism Management, 34, 2013, pp. 14-24.
Zhan B.F., Charles E. N., Shortest Path Algorithms: An Evaluation Using Real Road
Networks, Transportation Science, 32, 1, 1998, pp. 65-73.
Zhang J., Zhao X. and He X., A Minimum Resource Neural Network Framework for
Solving Multi-constraint Shortest Path Problems, Neural Networks and Learning
Systems IEEE Transactions on, 25, 2014, pp. 1566-1582.