Optical phase extraction algorithm based on the continuous wavelet and the Hilbert transforms [ Full-Text ]
Mustapha Bahich, Mohamed Afifi and Elmostafa Barj
In this paper we present an algorithm for optical phase evaluation based on the wavelet transform technique. The main advantage of this method is that it requires only one fringe pattern. This algorithm is based on the use of a ًsecond π/2 phase shifted fringe pattern where it is calculated via the Hilbert transform. To test its validity, the algorithm was used to demodulate a simulated fringe pattern giving the phase distribution with a good accuracy.
——————————————————————————————————————————————————————————————————–
An Ontology-based Context Aware System for Selective Dissemination of Information in a Digital Library [ Full-Text ]
Marisa R. De Giusti, Gonzalo L. Villarreal, Agustín Vosou and Juan P. Martínez
Users of Institutional Repositories and Digital Libraries are known by their needs for very specific information about one or more subjects. To characterize users profiles and offer them new documents and resources is one of the main challenges of today’s libraries. In this paper, a Selective Dissemination of Information service is described, which proposes an Ontology-based Context Aware system for identifying user’s context (research subjects, work team, areas of interest). This system enables librarians to broaden users profiles beyond the information that users have introduced by hand (such as institution, age and language). The system requires a context retrieval layer to capture user information and behavior, and an inference engine to support context inference from many information sources (selected documents and users’ queries).
——————————————————————————————————————————————————————————————————–
Contention Based Routing in Mobile Ad Hoc Networks with Multiple Copies [ Full-Text ]
E. Jenefa JebaJothi , V. Kavitha and T. Kavitha
Routing the packets efficiently in mobile ad hoc network does not have end to end paths. Multiple copies are forwarded from the source to the destination. To deal with such networks, researches introduced flooding based routing schemes which leads to high probability of delivery. But the flooding based routing schemes suffered with contention and large delays. Here the proposed protocol “Spray Select Focus”, sprays a few message copies into the network, neighbors receives a copy and by that relay nodes we are choosing the shortest route and then route that copy towards the destination. Previous works assumption is that there is no contention and dead ends. But we argue that contention and dead ends must be considered for finding efficiency in routing. So we are including a network which has contention and dead ends and we applied the proposed protocol. We can say that this protocol works well for the contention based network.
——————————————————————————————————————————————————————————————————–
Scalable Energy Efficient Location Aware Multicast Protocol for MANET (SEELAMP) [ Full-Text ]
Pariza Kamboj and A.K.Sharma
Multicast plays an important role in implementing the group communications in bandwidth scarce multihop mobile ad hoc networks. However, due to the dynamic topology of MANETs it is very difficult to build optimal multicast trees and maintaining group membership, making even more challenging to implement scalable and robust multicast in Mobile Ad hoc Networks (MANET). A scalable and energy efficient location aware multicast algorithm, called SEELAMP, for mobile ad hoc networks is presented in the paper that is based on creation of shared tree using the physical location of the nodes for the multicast sessions. It constructs a shared bi-directional multicast tree for its routing operations rather than a mesh, which helps in achieving more efficient multicast delivery. The algorithm uses the concept of small overlapped zones around each node for proactive topology maintenance with in the zone. Protocol depends on the location information obtained using a distributed location service, which effectively reduces the overheads for route searching and shared multicast tree maintenance. In this paper a new technique of local connectivity management is being proposed that attempts to improve the performance and reliability. It employs a preventive route reconfiguration to avoid the latency in case of link breakages and to prevent the network from splitting.
——————————————————————————————————————————————————————————————————–
Criticism of Knapsack Encryption Scheme [ Full-Text ]
Sattar J Aboud
In this paper, we analyze a knapsack schemes. The one is suggested by Su, which is relied on a new method entitled permutation combination method. We demonstrate that this permutation method is useless to the security of the scheme. Since the special super increasing construction, we can break this scheme employ the algorithm provided by Shamir scheme. Finally, we provide an enhanced version of Su scheme to avoid these attacks.
——————————————————————————————————————————————————————————————————–
Sensors Lifetime Enhancement Techniques in Wireless Sensor Networks – A Survey [ Full-Text ]
Sami Halawani and Abdul Waheed Khan
Wireless Sensor Networks are basically used for gathering information needed by smart environments but they are particularly useful in unattended situations where terrain, climate and other environmental constraints may hinder in the deployment of wired/conventional networks. Unlike traditional networks, these sensor networks do not have a continuous power supply at their disposal. Rather the individual sensors are battery operated and the lifetime of the individual sensors and thus the overall network depend heavily on duty cycle of these sensors. Analysis on WSNs shows that communication module is the main part which consumes most of the sensor energy and that is why energy conservation is the major optimization goal. Since routing protocols and MAC protocols directly access the communication module therefore the design of protocols in these two domains should take into account the energy conservation goal. In this paper, we discuss different state-of-the-art protocols both in MAC and routing domains that have been proposed for WSNs to achieve the overall goal of prolonging the network lifetime. The routing protocols in WSNs are generally categorized into three groups – data centric, hierarchical and location-based but we focus on only the first two categories because location-based routing protocols generally require a prior knowledge about sensors location which most of the times is not available due to random deployment of the sensors. We then discuss how schedule-based and contention-based MAC protocols can contribute to achieve optimal utilization of the limited energy resource by avoiding or reducing the chances of collisions and thus the need for retransmission.
——————————————————————————————————————————————————————————————————–
A Study on Potential of Integrating Multimodal Interaction into Musical Conducting Education [ Full-Text ]
Gilbert Phuah Leong Siang, Nor Azman Ismail and Pang Yee Yong
With the rapid development of computer technology, computer music has begun to appear in the laboratory. Many potential utility of computer music is gradually increasing. The purpose of this paper is attempted to analyze the possibility of integrating multimodal interaction such as vision-based hand gesture and speech interaction into musical conducting education. To achieve this purpose, this paper is focus on discuss some related research and the traditional musical conducting education. To do so, six musical conductors had been interviewed to share their musical conducting learning/ teaching experience. These interviews had been analyzed in this paper to show the syllabus and the focus of musical conducting education for beginners.
——————————————————————————————————————————————————————————————————–
A Prioritized Access Point Algorithm for 802.11b Networks in a Lossy Environment [ Full-Text ]
A. N. Omara, Sherine M. Abd El-Kader, Hussein S. Eissa and S. El-Ramly
In recent years, WLAN technology has been gaining popularity around the world with its sub standard 802.11b receiving major deployments in many indoor and outdoor environments. In this article we investigate the performance of IEEE 802.11b infrastructure networks in the lossless and lossy environments by means of a simulation study. Also, this study shows how the FIFO discipline of the 802.11b MAC affects on the global performance when at least one channel is under the influence of the bursty errors. Furthermore, this paper proposes a channel aware backoff algorithm for the Access Point (AP) to prioritize its transmissions and to accelerate the transmissions in the poor radio channels to enhance the performance of the real time applications. The final results of this simulation study showed that the proposed algorithm is able to enhance the throughput and the delay in lossy environment by an average of 49% and 83% respectively.
——————————————————————————————————————————————————————————————————–
Democracy, essential element of the electronic government [ Full-Text ]
Bostan I.
This paper emphasizes a determinant aim of identifying different approaches, as comparing to the education and democracy ways specific to e-government system. Introducing the information technology should offer the possibility by which reform processes of the government should become more efficient, transparent and much more public for the citizens; in this way, their ability of participating directly to government activities should prove the carrying out of a democratic and free frame. One of the essential issues of such phenomenon is that of proving that adopting the information and communication technology programs to government process or electronic government depends upon a series of external factors, such as the level of state’s development, the cultural level, the frame of developing the structures of central and local public authority, criteria that differentiate the applicability of such system, to various countries. This difference is especially seen as comparing to the East states of European Union. Information systems can be applied in order to allow the citizens to monitor and coordinate the providing of local services; such exchanges have created trust and the feeling of influence, encouraging the participation to political life. Carrying into effect the new informational technologies, aiming to issuing, informing and to participation of citizens to political life, will model the concept of democracy within a new frame.
——————————————————————————————————————————————————————————————————–
A Route Optimization technique for registered and unregistered CN’s in NEMO [ Full-Text ]
M. Dinakaran and P. Balasubramanie
As the demand of, requesting the Internet without any disturbance by the mobile users of any network is increasing the IETF started working on Network Mobility (NEMO). Maintaining the session of all the nodes in mobile network with its home network and external nodes can be provided by the basic Network Mobility support protocol. It provides mobility at IP level to complete networks, allowing a Mobile Network to change its point of attachment to the Internet, while maintaining the ongoing sessions of the nodes of the network. The Mobile Router (MR) manages the mobility even though the nodes don’t know the status of mobility. This article discusses few basic concepts and limitations of NEMO protocol and proposes two ways to optimize the NEMO routing technique for registered and unregistered Correspondent Nodes (CN) of the Mobile Network Node (MNN).
——————————————————————————————————————————————————————————————————–
Image Segmentation by Using Thershod Techniques [ Full-Text ]
Salem Saleh Al-amri, N.V. Kalyankar and Khamitkar S.D
This paper attempts to undertake the study of segmentation image techniques by using five threshold methods as Mean method, P-tile method, Histogram Dependent Technique (HDT), Edge Maximization Technique (EMT) and visual Technique and they are compared with one another so as to choose the best technique for threshold segmentation techniques image. These techniques applied on three satellite images to choose base guesses for threshold segmentation image.
——————————————————————————————————————————————————————————————————–
Software Effort Estimation using Radial Basis and Generalized Regression Neural Networks [ Full-Text ]
Prasad Reddy P.V.G.D, Sudha K.R, Rama Sree P and Ramesh S.N.S.V.S.C
Software development effort estimation is one of the most major activities in software project management. A number of models have been proposed to construct a relationship between software size and effort; however we still have problems for effort estimation. This is because project data, available in the initial stages of project is often incomplete, inconsistent, uncertain and unclear. The need for accurate effort estimation in software industry is still a challenge. Artificial Neural Network models are more suitable in such situations. The present paper is concerned with developing software effort estimation models based on artificial neural networks. The models are designed to improve the performance of the network that suits to the COCOMO Model. Artificial Neural Network models are created using Radial Basis and Generalized Regression. A case study based on the COCOMO81 database compares the proposed neural network models with the Intermediate COCOMO. The results were analyzed using five different criterions MMRE, MARE, VARE, Mean BRE and Prediction. It is observed that the Radial Basis Neural Network provided better results
——————————————————————————————————————————————————————————————————–
Molecular Programming Pseudo-code Representation to Molecular Electronics [ Full-Text ]
Manas Ranjan Pradhan and E.G.Rajan
This research paper is proposing the idea of pseudo code representation to molecular programming used in designing molecular electronics devices. Already the schematic representation of logical gates like AND, OR, NOT etc.from molecular diodes or resonant tunneling diode are available. This paper is setting a generic pseudo code model so that various logic gates can be formulated. These molecular diodes have designed from organic molecules or Bio-molecules. Our focus is on to give a scenario of molecular computation through molecular programming. We have restricted our study to molecular rectifying diode and logic device as AND gate from organic molecules only.
——————————————————————————————————————————————————————————————————–
A Novel Method for Intrusion Detection System to Enhance Security in Ad hoc Network [ Full-Text ]
Himani Bathla and Kanika Lakhani
The notion of an ad hoc network is a new paradigm that allows mobile hosts (nodes) to communicate without relying on a predefined infrastructure to keep the network connected. Most nodes are assumed to be mobile and communication is assumed to be wireless. The mobility of nodes in an ad-hoc network means that both the population and the topology of the network are highly dynamic. It is very difficult to design a once-for-all intrusion detection system. A secure protocol should atleast include mechanisms against known attack types. In addition, it should provide a scheme to easily add new security features in the future. The paper includes the detailed description of Proposed Intrusion Detection System based on Local Reputation Scheme. The proposed System also includes concept of Redemption and Fading these are mechanism that allow nodes previously considered malicious to become a part of the network again. The simulation of the proposed system is to be done using NS-2 simulator.
——————————————————————————————————————————————————————————————————–
A Soft Computing Model for Physicians’ Decision Process [ Full-Text ]
Siddharths Sankar Biswas
In this paper the author presents a kind of Soft Computing Technique, mainly an application of fuzzy set theory of Prof. Zadeh [16], on a problem of Medical Experts Systems. The choosen problem is on design of a physician’s decision model which can take crisp as well as fuzzy data as input, unlike the traditional models. The author presents a mathematical model based on fuzzy set theory for physician aided evaluation of a complete representation of information emanating from the initial interview including patient past history, present symptoms, and signs observed upon physical examination and results of clinical and diagnostic tests.
——————————————————————————————————————————————————————————————————–
Dissertations Repository System Using Context Module [ Full-Text ]
Ali K.Hmood, M.A.Zaidan, Hamdan.O.Alanazi, Rami Alnaqeib and Yahya Al-Nabhani
Without a doubt, the electronic learning makes education quite flexible. Nowadays, all organizations and institutions are trying to avoid Monotony and the delay and inertia. As well the universities should be improving their systems continually to achieve success. Whereas, the students need to access the dissertations in the library. In this paper we will present Dissertations Repository System Using Context Module to allow the students to benefit the dissertations which is in the library flexibly.
——————————————————————————————————————————————————————————————————–
Internet Banking System Prototype [ Full-Text ]
Rami Alnaqeib, Hamdan.O.Alanazi, Hamid.A.Jalab, M.A.Zaidan and Ali K.Hmood
Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.
——————————————————————————————————————————————————————————————————–
On the Module of Internet Banking System [ Full-Text ]
Hamdan.O.Alanazi, Rami Alnaqeib, Ali K.Hmood, M.A.Zaidan and Yahya Al-Nabhani
Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is used for the Internet Banking System.
——————————————————————————————————————————————————————————————————–
Scope of cloud computing for SMEs in India [ Full-Text ]
Monika Sharma, Ashwani Mehra, Haresh Jola, Anand Kumar, Madhvendra Misra and Vijayshri Tiwari
Cloud computing is a set of services that provide infrastructure resources using internet media and data storage on a third party server. SMEs are said to be the lifeblood of any vibrant economy. They are known to be the silent drivers of a nation’s economy. SMEs of India are one of the most aggressive adopters of ERP Packages. Most of the Indian SMEs have adopted the traditional ERP Systems and have incurred a heavy cost while implementing these systems. This paper presents the cost savings and reduction in the level of difficulty in adopting a cloud computing Service (CCS) enabled ERP system. For the study, IT people from 30 North Indian SMEs were interviewed. In the cloud computing environment the SMEs will not have to own the infrastructure so they can abstain from any capital expenditure and instead they can utilize the resources as a service and pay as per their usage. We consider the results of the paper to be supportive to our proposed research concept.
——————————————————————————————————————————————————————————————————–
Classification of LULC Change Detection using Remotely Sensed Data for Coimbatore City, Tamilnadu, India [ Full-Text ]
Y.Babykalpana and K.ThanushKodi
Maps are used to describe far-off places . It is an aid for navigation and military strategies. Mapping of the lands are important and the mapping work is based on (i). Natural resource management & development (ii). Information technology ,(iii). Environmental development ,(iv). Facility management and (v). e-governance. The Landuse / Landcover system espoused by almost all Organisations and scientists, engineers and remote sensing community who are involved in mapping of earth surface features, is a system which is derived from the united States Geological Survey (USGS) LULC classification system. The application of RS and GIS involves influential of homogeneous zones, drift analysis of land use integration of new area changes or change detection etc.,National Remote Sensing Agency(NRSA) Govt. of India has devised a generalized LULC classification system respect to the Indian conditions based on the various categories of Earth surface features , resolution of available satellite data, capabilities of sensors and present and future applications. The profusion information of the earth surface offered by the high resolution satellite images for remote sensing applications. Using change detection methodologies to extract the target changes in the areas from high resolution images and rapidly updates geodatabase information processing.Traditionally, classification approaches have focused on per-pixel technologies. Pixels within areas assumed to be automatically homogeneous are analyzed independently. These new sources of high spatial resolution image will increase the amount of information attainable on land cover. Significance is that the data can be acquired by our eyes and the energy can be analyzed. But satellites are capable of collecting data beyond the visible band also However, the traditional method of change detection are not suitable for high resolution remote sensing images. To overcome the limitations of traditional pixel-level change detection of high resolution remote sensing images, based on georeferencing and analysis method, this paper presents a unsullied way of multi-scale amalgamation for the high resolution remote sensing images change detection. Experiment shows that this method has a stronger advantage than the traditional pixel-level method of high resolution remote sensing image change detection.
Energy Efficient Multi-Level Clustering To Prolong The Lifetime of Wireless Sensor Networks [ Full-Text ]
Surender Soni and Narottam Chand
Clustering in wireless sensor networks (WSNs) is an important technique to ease topology management and routing. Clustering provides an effective method for prolonging lifetime of a WSN. This paper proposes energy efficient multi-level clustering schemes for wireless sensor networks. Wireless sensor nodes are extremely energy constrained with a limited transmission range. Due to large area of deployment, the network needs to have a multi-level clustering protocol that will enable far-off nodes to communicate with the base station. Simulation is used to analyze the proposed protocols and compare their performance with existing protocol EEMC. Simulation results demonstrate that our proposed protocols are effective in prolonging the network lifetime.