Perception on Usage of Information Technology in Learning: A Literature Review [ Full-Text ]
Othman Ibrahim and Lam Wai Leong
Information technology (IT) seen as the backbone infrastructure driving the education and this has resulted in a tremendous grows of interest in the development of technology usage that increases the perception of learning world. The objective of this research study was to review of research on numerous IT perceptions on educational features in various area used for instructional purposes. A critical consideration of the technology education literature reviews, classifies journals as conceptual or empirical focus on instructional technology, information system in education or interactive online learning. Furthermore, the results indicated that educators perceived differences in the learners’ performance when technology is used than when it is not used. Moreover, irrespective of gender, educators have the perception that technology conduce in great extent of degree to the learner’s performance in totality. In this papers, it reviews journals dealing with aspects of information technology perception on learning that there is a several consistent themes which giving constructive suggestions for future research.
——————————————————————————————————————————————————————————————————–
Hilbert Curve Based Bucket Ordering for Global Illumination [ Full-Text ]
Yusuf Yavuz, Bulent Tugrul and Suleyman Tosun
The process of rendering a photorealistic image is an extremely compute intensive task and high quality images require great amount of time to create. In this paper, we evaluate the bucket rendering technique that uses the Hilbert curve approximation to sort and group the most correlated buckets in the frame buffer in an effort to decrease the rendering time. To increase the visual quality of the output images, we also included a multilevel dynamic anti-aliasing algorithm to our renderer to smooth the jagged edges caused by the bucket rendering. We implemented the proposed bucket ordering method on a system that uses photon mapping algorithm. We tested the effects of our method both on single processor and on parallel processors with three dimensional scene files to measure and analyze its performance.
——————————————————————————————————————————————————————————————————–
Two Approaches for Fuzzy Interpolation [ Full-Text ]
I. N. Askerzade Askerbeyli and Şahin Emrah Amrahov
In this work a generalized method of linear and cubic spline interpolation of fuzzy data is presented. Least square method (LSM) and geometric approach to the fuzzy numbers are used. Examples of application linear spline interpolation for parametric fuzzy numbers and cubic spline for triangular fuzzy numbers are presented
——————————————————————————————————————————————————————————————————–
Enhancing Quality of Data using Data Mining Method [ Full-Text ]
Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie and Mohammad Alishahi
Data is asset for companies and organizations. Because data and the information obtained from data analysis play an important role in decision making. The quality of data affects the quality of decisions and the incorrect data causes incorrect decision making. Recently, a great deal of researches has focused on enhancing data quality. It is infeasible or very difficult to improve quality of data through manual inspection. Because data quality is one of the complicated and non-structured concepts and data cleansing process can not be done without the help of professional domain experts, and detection of errors require a thorough knowledge in the related domain of the data. Therefore (semi-)automatic data cleansing methods is employed to find data errors and defects and solve them. Data mining methods are appropriate for enhancing different dimensions of data quality, since they are aimed at finding abnormal patterns in large volumes of dataset. In this paper, a new approach is presented to detect the errors inside the dataset using fuzzy association rules. Fuzzy association rules are used to build a model that is intended to capture the structure of the regarded data. Finally, Experimental results of the proposed approach show the effectiveness of the proposed method to find errors in datasets.
——————————————————————————————————————————————————————————————————–
A New Extension of the EAP-TLS Protocol based on Quantum Cryptography [ Full-Text ]
Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi
Quantum Cryptography or Quantum key distribution (QKD) is a new technique that allows the secure distribution of a bit string, used as a key in cryptographic protocols. It solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on quantum cryptography since it was noted that quantum computers could break public key cryptosystems based on number theory. Now, the research progress in this field allows the implementation of QKD outside laboratories and efforts are made to exploit this technology in the existing communication networks and so as to improve the performance and reliability of the implemented technologies. Due to the limited coverage area, the environment of wireless local area network (LAN) environment offers potentially a chance to let quantum key distribution (QKD) play a role in the wireless communication. In this paper, we explore the possibility of using QKD for wireless LAN; we propose a scheme for integrating quantum cryptography in the EAP-TLS protocol. This will contribute to enhance the security of the process of authentication. Also, we present an example to illustrate the feasibility of our scheme’s implementation.
——————————————————————————————————————————————————————————————————–
Efficient Data Scheduling in VANETs [ Full-Text ]
Vishal Kumar and Narottam Chand
This paper primarily focuses on scheduling the requests in an optimize manner. We address some challenges in vehicle roadside data access. We propose a priority based scheduling scheme called D* S/P to consider both service deadline and data size along with priority when making scheduling decisions. These requests are queued in different combinations of priorities to apply the scheduling algorithm. Once the combinations are applied, the request with the highest priority is served first. Simulation results show that the scheduling scheme performs better in comparison to other scheduling schemes. Further, the scheduling scheme is adaptive to different workload scenarios.
——————————————————————————————————————————————————————————————————–
Optical Character Recognition for Tamil using Tchebichef Moments [ Full-Text ]
C. V. Subbulakshmi, N. Malathi and S. Hemavathi
This paper deals with the Optical Character Recognition for Tamil (one of the Indian language) using Tchebichef Moments. It aims at recognizing the printed Tamil characters of fixed font and size with high accuracy. The document is scanned as a bmp image and the Tchebichef moments for each character (32×32) are calculated after the segmentation. The calculated moments of each character are checked for a match using the least-square-difference method, and corresponding UNICODE value is obtained as output, which can be used to transform the printed text into editable text. The Unicode outputs are then converted in to text by using the programming language Python.
——————————————————————————————————————————————————————————————————–
Comparative Simulation Study to Evaluate Performance Parameters for Multi-hop WRONs by OWns [ Full-Text ]
Asima Nisar
A comparison based on simulation study has been made by using OWns (Optical WDM network simulator) to investigate effects on three network performance parameters namely, average hop count, average packet delay, and link utilization with Exponential session traffic source while varying number of wavelengths (16, 32, 48, and 64) in WRONs (Wavelength Routed Optical networks) having 25, 50, and 100 nodes. It is observed that average hop count is independent of the number of wavelengths and gets its minimum with 100 nodes. Minimum average packet delay has been noted with lesser wavelength numbers and number of nodes. With greater wavelength numbers packet delay increases and this is not appreciated. A reciprocal relation is observed in between average packet delay and link utilization, as link is utilized as efficient, the delay would be minimized consequently. This simulation study with these findings would definitely help to understand the behavior of network performance parameters for WRONs.
——————————————————————————————————————————————————————————————————–
Applying Model Checking Technique for the Analysis of B92 Security [ Full-Text ]
Mohamed Elboukhari, Mostafa Azizi and Abdelmalek Azizi
Quantum Key Distribution (QKD) or Quantum Cryptography solves the key distribution problem by allowing the exchange of a cryptographic key between two remote parties with absolute security, guaranteed by the laws of quantum physics. Extensive studies have been undertaken on QKD when it was noted that quantum computers could break public key cryptosystems based on number theory. Now, the progress of research in this field allows the anticipation of Quantum Cryptography to be available outside of laboratories within the next few years. But despite this big progress of research, several challenges remain. For example, the task of how to test the apparatuses of QKD did not yet receive enough attention. These apparatuses become complex, heterogeneous and demand a big verification effort. We propose in this paper to study Quantum Cryptography protocols by applying the technique of probabilistic model checking. We use the model checker PRISM to analyze the security of B92 protocol and we are interested in the specific security property of eavesdropper’s information gain on the key derived from the implementation of this protocol. We show that this property is affected by the parameters of the quantum channel and the eavesdropper’s power.
——————————————————————————————————————————————————————————————————–
Back-Propagation on Horizontal-Vertical-Reconfigurable-Mesh [ Full-Text ]
Seyed Abolfazl Mousavi, Ali Moeini and Mohammad Reza Salehnamadi
The new adaptive approach demonstrates implementing Check-Boarding algorithm on HVRM at this article. First, Back-Propagation algorithm is summarized; second computational model used in basic Check-Boarding algorithm is explained and finally the Reconfigurable Mesh and new method are presented.
——————————————————————————————————————————————————————————————————–
Integration Test Order For C++ Applications [ Full-Text ]
Priti Agarwal, Sangeeta Sabharwal and Parneeta Dhaliwal
This paper presents an improvement to the existing strategy for finding test order during integration testing of C++ applications. Our strategy is an integration of two existing strategies aimed at finding test order of object-oriented applications. The first one was proposed was Malloy and is based on parameterized cost model that assigns weights to different edge type and then breaks the cycle by removing edge with the minimum weight. The second one was proposed by Abdurazik and is based on assigning weights to both nodes and edges. The weights were based on the quantitative measure of coupling and cycle to weight ratio was used for selecting a victim edge for removal. This paper builds upon the approach that was laid in a previous paper by the authors and which combines some principles of both the strategies and addresses some of their shortcomings. Some new dependencies that may exist between classes in a C++ application are also included in this paper. We also present a tool Class Test Ordering System developed to automate the whole strategy.
——————————————————————————————————————————————————————————————————–
Selection of optimal assembly method using Multi-Dimensions Decision-Making model [ Full-Text ]
B. Vijaya Ramnath, R. Kesavan and C. Elanchezhian
With globalization, broadening of the market place and increasing competition, customers are placing greater demands on manufacturers to increase quality, flexibility, on time delivery of product and less cost. So, companies must develop and maintain a high degree of coherence among competitive priorities, order winning criteria and improvement activity. Thus, the manufacturing managers are making an attempt to transform their organization by adopting familiar and beneficial management philosophies like Lean Manufacturing, Total Quality Management, Agile Manufacturing, Cellular Manufacturing and Just in Time manufacturing. The main objective of this paper is to propose a suitable assembly method for a leading automotive industry. Presently they are following Traditional Assembly Method (TAM). It consumes more production lead time, more Work in Process inventory, less over all equipment effectiveness, less utilization of man power. In order to reduce the above mentioned wastes, Lean Kitting assembly Method (LKM) is suggested by some production managers. Another group of managers suggested Just in Time assembly Method (JTM) production system. Hence, a Multi-Dimensions Decision-Making model namely Analytical Hierarchy Process (AHP) is applied to select the optimal assembly method suitable for the alternator assembly line.
——————————————————————————————————————————————————————————————————–
Intelligent Transport Scheduling [ Full-Text ]
Ourida Saidi ben Boubaker and Amine Farhat
Constraint Satisfaction represents a great modeling formalism for complex problems in the areas of Artificial Intelligence and Computer science. A constraint satisfaction problem (CSP) is defined by a set of variables and a set of constraints which translate all the rules and obligations having to be satisfied by the solutions, each variable has a well defined domain area. CSP has several applications in many real life fields. Therefore, researchers have worked on CSP and have developed several solving algorithms and have enlarged the scope of application of CSP formalism. Among the interesting areas of application of CSP, figure transport and scheduling problems. In this article, we addressed the problem of resources scheduling in a transport context, which consists in optimal resource assigning in order to accomplish transport duties, called also tour services. Resources are Transport equipments, Drivers and Time. We have modeled this problem as a CSP, and then we have implemented a resolving web based system with two algorithms: Generate & Test and Backtracking. Our work has been strongly appreciated by domain experts.
——————————————————————————————————————————————————————————————————–
Prototyping Approach to Neuro-Fuzzy Speed Control of Trapezoidal Brushless DC Motor [ Full-Text ]
G. MadhusudhanaRao, B. Sampath Kumar and I. Narasimhaswamy
This paper involves the Neuro-fuzzy logic controlling of trapezoidal brushless DC (BLDC) motor with rapid control method. A trapezoidal BLDC motor has a trapezoidal flux distribution and is supplied by square wave voltages or quasi-square wave currents. A neuro-fuzzy controller is developed by using MATLAB Fuzzy-Logic Toolbox and NN tool box then it is inserted into the Simulink model. This model is directly communicated with a DSP through DS2201 dSPACE digital signal kit. PWM pulses are produced on the simulation model and DSP C program is directly developed through dSPACE system. It is shown that, neuro-fuzzy controller is successfully controlling the motor and, the model based programming of DSPs is very simple and versatile comparing with that of conventional method.
——————————————————————————————————————————————————————————————————–
Region Based Color Histogram Features for Efficient Web Image Retrieval [ Full-Text ]
Umesh K.K and Suresha
In this paper, we present a method for region based color histogram features for efficient web image retrieval for searching similar images in the Web. Our searching algorithm makes use of color histogram features of the query image and database images. The features of these are condensed into small “signatures” for each image. The signature is stored in the database for retrieving the similar images. In the retrieval phase, we used region-to-region based distance measure metric to retrieve the similar images. In our approach, it accommodates to store large number of images using the computed signature. It requires less storage to store in the database for storing the signature. The main advantage of this approach is fast enough to be performed on a database of 20,000 images. In this paper, mainly we are focusing on retrieve similar images without considering the basic properties of the size, shape, texture etc., of the image. The retrieval system speed can be improved by using color histogram feature techniques.
——————————————————————————————————————————————————————————————————–
Reproduction Operator Evaluation for CFG Induction Using Genetic Algorithm [ Full-Text ]
Nitin S. Choubey and Madan U. Kharat
These Grammar Induction (or Grammar Inference or Language Learning) is the process of learning of a grammar from training data of the positive and negative strings of the language. Genetic algorithms are amongst the techniques which provide successful result for the grammar induction. The paper discusses an extended approach of using stochastic mutation scheme based on Adaptive Genetic Algorithm for the induction of the grammar for a set of four different languages and its comparison with other reproduction operators. The algorithm produces successive generations of individuals, computing their “fitness value” at each step and selecting the best of them when the termination condition is reached. The paper deals with the issues in implementation of the algorithm, chromosome representation and evaluation, selection and replacement strategy, and the genetic operators for crossover and mutation. The model has been implemented, and the results obtained for the set of four languages with comparison over three crossovers and stochastic mutation scheme along with other three mutation operators are presented.
——————————————————————————————————————————————————————————————————–
Adaptive Based Controller for Three Phase UPQC as Solution for Power Quality Improvement in Sensitive Load [ Full-Text ]
P.Jenopaul, T.Ruban Deva Prakash, I. Jacob Raglend and R. Priyadarsini
This paper has proposed a new efficient control system for unified power quality conditioner that makes it possible to reduce the voltage fluctuations like sag and swell conditions, as well as current and voltage harmonics isolation in distribution systems. The UPQC which can be used at the PCC for improving power quality is modeled and simulated using proposed control strategy and the performance is compared by applying it to a distribution system with UPQC and without UPQC. Performance of this UPQC has been evaluated with a typical industrial load with realistic parameters supplied by a polluted distribution network. Dynamic model of the UPQC is developed in the MATLAB/SIMULINK environment and the simulation results demonstrating the power quality improvement in the system are presented for different supply and load conditions.
——————————————————————————————————————————————————————————————————–
Mobile Agent Security and Key Management Technique [ Full-Text ]
V. Sreekanth, S. Ramchandram and A. Govardhana
Mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. The fact that hosts have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. The cryptographic key generation and distribution mechanism strongly holds the success of the mobile agent security systems. The agents and hosts are mutually distrusting each other, but they trust the third parties. In this paper, this property is exploited for the secure way of generating and distributing the keys using service oriented architecture.
——————————————————————————————————————————————————————————————————–
Efficient Mapping of Heuristic Packet Classifier on Network Processor based Router to enhance QoS for Multimedia Applications [ Full-Text ]
R. Avudaiammal and P. Seethalakshmi
Packet classification is an important function performed by network devices such as edge router, firewalls and intrusion detection systems to provide QoS and network security. With its complexity, the exponential growth of link speed and diversified services offered by the Internet, Packet classification is becoming a major bottleneck in the router performance. Traditional router performs this classification using Application Specific Integrated Circuits (ASICs), which suffers from lack of flexibility. Powerful Embedded Network Processor (NPs) a flexible and cost efficient network appliance has been introduced by many companies that can be an alternative to implement the packet classification at nearly link speed. The objective of this paper is to design and implement a new low complexity packet classification algorithm of heuristic type named Trie based Tuple Space Search (TTSS) and to efficiently map this Packet classifier component on Network Processor based router. The performance is evaluated using Intel’s IXP2400 NP Simulator. The results demonstrate that, TTSS outperforms the other heuristic packet classification algorithms. Parallel mapping of TTSS on Network processor based router gives better performance than its pipelined mapping which is more suitable to enhance QoS for multimedia applications.
——————————————————————————————————————————————————————————————————–
A comparison algorithm to check LTSA Layer 1 and SCORM compliance in e-Learning sites [ Full-Text ]
S. Sengupta, S. Pal and N. Banerjee
The success of e-Learning is largely dependent on the impact of its multimedia aided learning content on the learner over the hyper media. The e-Learning portals with different proportion of multimedia elements have different impact on the learner, as there is lack of standardization. The Learning Technology System Architecture (LTSA) Layer 1 deals with the effect of environment on the learner. From an information technology perspective it specifies learner interaction from the environment to the learner via multimedia content. Sharable Content Object Reference Model (SCROM) is a collection of standards and specifications for content of web-based e-learning and specifies how JavaScript API can be used to integrate content development. In this paper an examination is made on the design features of interactive multimedia components of the learning packages by creating an algorithm which will give a comparative study of multimedia component used by different learning packages. The resultant graph as output helps us to analysis to what extent any LMS compliance LTSA layer 1 and SCORM specification.
——————————————————————————————————————————————————————————————————–
A Novel Separation Approach of Seismic Profile by Windowing and Interpolation Techniques [ Full-Text ]
Moilim Amir, Abdellah Adib, Benayad Nsiri and Driss Aboutajdine
The objective of seismic data processing is to improve the geologist’s interpretation. So far, multitude of different approaches has been applied, each having its advantages and limits. Numerous of them tend to separate the waves by using transformations to represent the signal into an optimized form. Hereafter, we show the possibility to separate seismic data by applying a window to each trace of the seismic profile. So, an automatic window construction method, based on the adaptive Gaussian Kernel function, is used to seek the waves positions and window size. We note that after separation, especially for the traces that present waves overlapping, the waves are not well extracted as usual in the majority of the existing separation techniques. To overcome this limitation, we propose to correct the resulting profile by an interpolation based technique that exhibits excellent performances. Tests with synthetic data are carried out and the obtained results are rather satisfactory demonstrating the effectiveness of the proposed method.
——————————————————————————————————————————————————————————————————–
Spectral Efficiency and BER Performance Analysis of an IEEE 802.16 Standard WiMAX Physical Layer using Adaptive Modulation and Coding under AWGN and Fading Channels [ Full-Text ]
Md. Anamul Islam and Md. Mobarak Hossain
IEEE 802.16 is the standard defining the Worldwide Interoperability for Microwave Access (WiMAX) for Metropolitan Area Network (MAN). WiMAX has recently being considered by Internet Service Providers (ISPs) as an attractive alternative to leasing lines from current ISPs or the deployment of new fiber networks. This is mainly the case since WiMAX is more flexible and much cheaper than other possible solutions. This paper incorporates the model building of the WiMAX Physical layer using MATLAB simulation. This model is a useful tool for BER and spectral efficiency analysis through the WiMAX Physical layer using Adaptive Modulation and Coding (AMC) under AWGN and frequency flat fading (Rayleigh and Rician) channels at 100Hz Doppler frequency. To analysis the performances, synthetically generated data is communicated through the proposed system with 256 OFDM symbols using 16 and 64-QAM digital modulation schemes besides 1/2, 2/3 and 3/4 -rated FEC technique concatenated with Cyclic Redundancy Check and Convolution Coding (CRC-CC). Computer simulation results of BER and spectral efficiency demonstrate that the system’s performance is highly dependent on channel conditions and can be optimized by AMC technique. With the implementation of AMC technique 64QAM with ¾ rated coding display lower BER under AWGN and Ricain channels whilst 16QAM (CRC-CC-2/3) indicates lower BER over Rayleigh channel condition. Moreover, 16QAM with 2/3 rated coding combats very effective spectrum efficiency under all mobile environments.
——————————————————————————————————————————————————————————————————–
Fault Tolerant Embedded System Co-design [ Full-Text ]
Anil Kumar and Shampa Chakraverty
In this paper we develop a Co-design methodology for generating gracefully degrading multiprocessor architectures that fulfill the dual objectives of achieving real-time performance as well as ensuring high levels of system availability at acceptable cost.