Teaching Taxonomy and Content Management Systems (CMS) via Game-based Learning Approach [ Full-Text ]
Mazeyanti M Ariffin and Nazleeni Samiha Haron
Looking at potential of games for educational purpose, authors adopted game-based learning approach to teach Taxonomy and Content Management System (KMS) module in a private university in Malaysia. This paper discuss on the design of a game called ‘Creating a Hypermarket’ which was compared with a multimedia-based learning approach. An experimental study with 129 students was conducted with respect to knowledge retention and learning efficiency. The empirical result shows that the game increase student’s performance improve long-term learning results and lead to higher knowledge retention as compared to traditional learning approach.
——————————————————————————————————————————————————————————————————–
Designing knowledge map for a knowledge-based organization – an industrial case study [ Full-Text ]
Mazeyanti M Ariffin and Julita Ontol
When an organization wished to venture on any Knowledge Management (KM) initiative, it is critical for them know the available knowledge within the organization which in this case is called a knowledge map. Knowledge audit is conducted to obtain the knowledge inventory. An organization is able to propose a better business plan and strategy based on the knowledge inventory identified in knowledge audit. In this paper, authors discussed on the findings obtained from the knowledge audit conducted in Institution X. Skill/Will method, survey and unstructured interview is used to elicit the knowledge from the respondents. The outcome of this study is sets of maps such as knowledge inventory/knowledge map and social network map which later will be used as the basis of an enhancement of KM initiative in Institution X.
——————————————————————————————————————————————————————————————————–
Improved Scanning Methods to speed-up IEEE 802.11 Handoff [ Full-Text ]
Michael Finsterbusch, Thomas Möbert and Patrick Schmidt
The IEEE 802.11 wireless network adapters have one big weakness. They can just operate on one channel respectively on one frequency at the same time. Therefore a IEEE 802.11 station is not able to scan and communicate simultaneously. If a station scans its environment to e.g. prepare the roaming to another access point, it can’t receive frames from its associated access point. This paper presents a special scan method for IEEE 802.11 stations. The Sleep Scan improves the scan in a manner, that no packets get lost during the scan. It uses the IEEE 802.11 power save facility to signal the access point to buffer every frame for the scanning station some time. Consequently no packets get lost during scanning. A second variant of the Sleep Scan can not only prevent packet loss it also supports scanning during realtime communications.
——————————————————————————————————————————————————————————————————–
Malware detection using OWA measure [ Full-Text ]
M. Eskandari, B. Hosseini, S. Hashemi and A. Salajegheh
Threats from malwares are growing everyday hence new methods with higher performance and lower overloads for processing time and memory complexity making it possible to discover malicious activities in a faster and reliable manner based on static feature analysis instead of execution of frustrating dynamic analysis.the problem here is making a decision wether any operations are malicious or not hence, here we introduce a new method using OWA operator to make the process of decision making much realistic with maximum dispersion that is impressed by all factors of decision with least false positive and better detection rate in compare with previous mere analysis. OWA while showing maximum entropy over all possibility of occurance on the other hand scales down the dimension of decision and has efficient fusion of multiple features into one that reduces partial relations and magnifies the hidden but significant relations also causes pretty reduction in false detections while maintaing acceptable in true detections. The succeeding empirical results prove this claim.
——————————————————————————————————————————————————————————————————–
Comparison of Id3, Fuzzy Id3 and Probabilistic Id3 Algorithms in the Evaluation of Learning Achievements [ Full-Text ]
Semra ERPOLAT and Ersoy ÖZ
In inductive inference one of the widely used practical methods is learning with decision tree. The method is used at discrete structure objective function that is shown as the decision tree of the learning function. In this study ID3, fuzzy ID3 (F_ID3) and probabilistic fuzzy ID3 (PF_ID3) decision tree algorithms are used in a comparative manner for evaluation of learning achievements of students. For this purpose, test difficulty (high, middle, low), assignment time (long, average, short), and score (very good, good, average, bad, very bad) attributes are taken for the tests (A, B, C, D, E) which are applied to randomly selected students from determined classroom. According to the academic average students are classified as “success” and “fail” and from the obtained results it was observed that the algorithms with fuzzy and probabilistic structures given better results.
——————————————————————————————————————————————————————————————————–
A Study on Local Area Network Access Point Using Bluetooth Devices [ Full-Text ]
M. Sughasiny and R. Dhanapal
Purpose of this paper is to enable the user who possesses only a Bluetooth PC card, to receive network services (such as browsing the Web using a Web browser). These services will be provided to the user by another computer, also has a Bluetooth card and connected to the network via standard network card. The user moves around, which has some potential servers. Once, this would be close enough to one of them, can connect through automatically. This is fulfilling the client software, installed on the user’s computer and the server software, installed on a second computer, connected to the network.
——————————————————————————————————————————————————————————————————–
A Comparative Agglomerative Hierarchical Clustering Method to Cluster Implemented Course [ Full-Text ]
Rahmat Widia Sembiring, Jasni Mohamad Zain and Abdullah Embong
There are many clustering methods, such as hierarchical clustering method. Most of the approaches to the clustering of variables encountered in the literature are of hierarchical type. The great majority of hierarchical approaches to the clustering of variables are of agglomerative nature. The agglomerative hierarchical approach to clustering starts with each observation as its own cluster and then continually groups the observations into increasingly larger groups. Higher Learning Institution (HLI) provides training to introduce final-year students to the real working environment. In this research will use Euclidean single linkage and complete linkage. MATLAB and HCE 3.5 software will used to train data and cluster course implemented during industrial training. This study indicates that different method will create a different number of clusters.
——————————————————————————————————————————————————————————————————–
Implementing Mobile Virtual Network Operations in Bangladesh [ Full-Text ]
Md. Whaiduzzaman and Mahfuzul Hoque Bhuiyan
Infact, a full MVNO consists of a Home Location Register (HLR), Mobile Switching Centre (MSC), Authentication Centre (AUC), and Equipment Identity Register (EIR) and associated signaling capabilities. In this Paper we analyzes how the MVNO market has changed and what opportunities ,network operators and potentials are likely to face.We implement to plan the model of MVNO in Bangladesh and we are working with the GSM technology like GP, Warid, and Banglalink operator in our country. We also design the MVNO network coverage and named it NEXT ZEN TELECOM. We setup the decoder based on array design NEXT-ZEN numbering plan. This project presents different sectors related to implementation of MVNO in Bangladesh.
——————————————————————————————————————————————————————————————————–
Study on Mobile Virtual Network Operations [ Full-Text ]
Md. Whaiduzzaman and Mahmudur Rahman
In this paper, Mobile Virtual Network operation has been introduced. A full MVNO consists of a Home Location Register (HLR), Mobile Switching Centre (MSC), Authentication Centre (AUC), and Equipment Identity Register (EIR) and associated signaling capabilities.We analyze the MVNO sector from two perspectives: the factors including the consumer, industry, regulation and technology characteristics and successful MVNOs in various organization for Economic Cooperation and Development markets.The trend of how the MVNO market has changed and what opportunities ,network operators and potential MVNO are likely to face. Different sectors related to implementation of MVNO are working with the GSM technology and the feasibility study of implementation of MVNO in the present world.
——————————————————————————————————————————————————————————————————–
Image Retrieval from Web [ Full-Text ]
Tripti Bhatiyani
In past recent years there has been much growth in the field of digital imaging technologies and hence popularity of digital images is increasing very fast. But the task of obtaining images from the Internet which meet user’s requirement is not a trivial task. Images were initially retrieved on the basis of textual information supplied through various sources e.g. URL, filename, surrounding text, alt text etc. But all the images on the web are not annotated properly and still results obtained on this basis were not always satisfactory. Imprecise annotation, perception subjectivity and requirement of much time and labor in annotation paved the way for content based image retrieval.
——————————————————————————————————————————————————————————————————–
Conceptual Model for Cellular Network Dependent Location Estimation (CNDLE) for Trains in Indian Scenario [ Full-Text ]
A. Gupta and S. Tapaswi
Location estimation which uses mobile network as its skeletal framework has been a major subject of research and has drawn considerable attention in the field of wireless communication. The major problems with Indian Railway are increase in the frequency of accidents and the lack of punctuality. This is primarily due to the lack of a proper estimation of the train’s position at a given time. Although, the use of Global Positioning System (GPS) is a convenient way to estimate such location, it suffers from some well known problems. During a train journey, many people carry cell phones which receive intermittent control signals from the base stations. Using this fact, we propose a model for locating a train using the existing framework of cellular network; thereby obviating the requirement of any additional infrastructure. Such estimation is made possible in a scenario where the train speeds are moderate such that control signals can be exchanged periodically between the mobile and the base station.
——————————————————————————————————————————————————————————————————–
A novel approach of NC and DC code acquisition in MIMO assisted DS-CDMA wireless channel [ Full-Text ]
Sathish Kumar and K. R. Shankar Kumar
This paper is a novel approach of Noncoherent (NC) and Differentially Coherent (DC)code acquisition scheme in MIMO assisted Direct Sequence spread spectrum DS -CDMA wireless system when communicated over uncorrelated Raleigh channel. Most of the modulation schemes try to minimize the bandwidth of the signal , but this paper presents the application of DS-CDMA and compares the performance of full chip and half chip rate signal in four systems namely SISO and MIMO with full chip rate and SISO and MIMO with half chip rate respectively. The simulation is done using mat lab tool box and the results show that DC performance is superior than NC in both full chip and half chip. Also it is shown that half chip performance is better than full chip in both DC and NC code acquisition methods.
——————————————————————————————————————————————————————————————————–
Service Oriented Architecture – Technologies, Approaches for Integration and Automation of Legacy system in Heterogeneous Environment using Reusability technique [ Full-Text ]
S. Latha and Antony Selvadoss Thanamani
Legacy systems Integration in heterogeneous environment is one of the most pressing issues for organizations. The continuous emergence of new technologies such as Service Oriented Architectures is robust, scalable, and maintainable. Service Oriented Architecture (SOA) can be implemented using various technologies and approaches. For legacy integration Web service is best suitable method for implementing Service Oriented Architecture. SOA legacy system modernization projects have induced a lot of researchers to address the full modernization project life cycle starting from architecture reconstruction, code analysis, modernization strategy selection etc. There are lot of challenges that legacy system has to face during modernization. More over there are a lot of characteristics that has to be decided before framing the framework for modernization. This theory helps us to understand the approaches and technologies available in SOA framework to come up with a framework/architecture for modernizing the legacy system which is robust, scalable and secured.
——————————————————————————————————————————————————————————————————–
A Survey on DDoS Attacks in Web- Referral Mechanism and Solution for Mitigation [ Full-Text ]
V. Govindasamy , V. Akila and E. Gayathri
Distributed Denial of Service threats has become the real threat to the security of the Internet. In the critical application areas, the information transmission must be kept secret and confidentiality should be ensured. Such applications are space research, military applications and online transactions. A web referral mechanism will defend against attacks by granting privilege URL to legitimate clients, thereby ensuring protection against such attacks. This paper analyzes the security measures adopted in the web referral mechanism and presents a survey of the existing trace back mechanisms and mitigation techniques. This paper aims at providing solution for the drawbacks in the current techniques.
——————————————————————————————————————————————————————————————————–
Secure Wireless Network System against Malicious Rogue Threats [ Full-Text ]
Yogendra Kumar Jain, Neha Mehra and Geetika Silakari
With the expanse of the Internet and the increased reliance on computer networking technology for everyday business, the need to protect electronic data and communication from malicious attack has become increasingly critical. This thesis addresses the rogue system problem, a significant threat in modern networks. A rogue system is a device installed within a network without the authorization or knowledge of network administrators, which is typically engaged in unauthorized activities. These systems pose a major threat to network data and resources, potentially resulting in the exposure of sensitive information or network performance degradation. This thesis presents analysis and solutions for rogue system threats within a cooperative distributed network environment and within various types of wireless environments. In addition, a tool is presented which enables high speed network packet logging, for the purpose of rogue system detection, using inexpensive equipment in a scalable distributed storage infrastructure. Also the development of a secure communication protocol which protects a distributed network from potential rogue system attacks while enabling the implementation of bandwidth conservation techniques for efficiency. An important enhancement of a standard wireless communication protocol is for the purpose of preventing both insider and outsider rogue eavesdropping attacks. A novel packet payload slicing technique for the purpose of detecting rogue wireless access points within a corporate network environment. Analyses of the potential of host-based rogue wireless man-in the middle attack detection. The development of a tool for high speed traffic analysis is to aid in rogue system detection. Rogue system threats will continue to grow as networks become more complex and new attack techniques evolve to better evade detection. The future direction of this work includes applying these techniques to newly identified threats for the purpose of gauging the effectiveness of the proposed methods and to aid in discovering new means of defending against rogue system attacks. In addition, rogue threats in less traditional types of network environments, such as peer-to-peer and personal area networks, will be addressed in order to provide protection from all means of electronic rogue system attacks.
——————————————————————————————————————————————————————————————————–
Mobile Database Transaction Using Mobile Agents [ Full-Text ]
A.Priya, R. Dhanapal and T. P. Vijayalakshmi
Mobile agents are programs that can move through a network under their own control, mi- grating from host to host and interacting with other agents and resources on each. In mobile database systems, new features such as mobility, disconnection, heterogeneity, self-command and distribution make traditional transaction processing schemes such as query processing technology, transaction management technology and data distribution technology no longer suited. To solve this problem, a new mobile database model based on agent was proposed. And transaction processing process based on this model was set forth. The model can shield the heterogeneous among all members, and made them transparent so as to bring great conveniences to the entering of heterogeneous members. The introduction of mobile agent contributes to decomposition of long-lived transaction, as to complete query optimization of mobile database.
——————————————————————————————————————————————————————————————————–
A Novel Approach to Credit Card Fraud Detection Model [ Full-Text ]
V. Dheepa, R. Dhanapal and D. Remigious
Along with the great increase in credit card transactions, credit card fraud has become increasingly rampant in recent years. In Modern day the fraud is one of the major causes of great financial losses, not only for merchants, individual clients are also affected. In this paper, clustering and outlier detection techniques are used to find the fraudulent activities. In the first phase, clustering is used to partition the data. In the second phase two different outlier detection algorithms are used in the partitions separately for finding the outliers. Finally, the outliers are combined and fraudulent cases are found.
——————————————————————————————————————————————————————————————————–
Rank Optimization and Query Recommendation in Search Engines using Web Log Mining Techniques [ Full-Text ]
Neelam Duhan and A. K. Sharma
Query Logs are important information repositories, which record user activities on the search results. The mining of these logs can improve the performance of search engines. Search engines generally return long lists of ranked pages, finding the desired information content from which is typical on the user end and therefore, search result optimization techniques come into play. The proposed system based on learning from query logs predicts user information needs and reduces the seek time of the user within the search result list. To achieve this, the method first mines the logs using a novel similarity function to perform query clustering and then discovers the sequential order of clicked URLs in each cluster using the modified version of an existing Sequential Pattern Mining algorithm. Finally, search result list is optimized by re-ranking the pages using the discovered sequential patterns. The proposed system proves to be efficient as the user desired relevant pages occupy their places earlier in the result list and thus reducing the search space. The paper also presents a query recommendation scheme towards better information retrieval.
——————————————————————————————————————————————————————————————————–
A Study On Protein Sequence Clustering with OPTICS [ Full-Text ]
P. Usha Madhuri and S. P. Rajagopalan
Protein sequence clustering has been widely used as a part of the analysis of protein structure and function. In most cases single link or graph-based clustering algorithms have been applied. Clustering of proteins using SEQOPTICS (sequence clustering with OPTICS), which is based on OPTICS (Ordering Points To Identify the Clustering Structure),is an attractive approach due to its emphasis on visualization of results and support for interactive work such as choosing parameters. Ordering Points To Identify the Clustering Structure can be implemented for Visualization of the sequence clustering structure. The system was evaluated by comparison with other existing methods.
——————————————————————————————————————————————————————————————————–
Computation of Semantic Similarity among Cross Ontological Concepts for Biomedical Domain [ Full-Text ]
K. Saruladha, G. Aghila, and A. Bhuvaneswary
Based on Amos Tversky psychological contrast model this paper proposes a corpus independent information content based similarity computation method to assess similarity between biomedical concepts belonging to multiple ontology’s. Ontologies have been widely used in many domains including database integration, bioinformatics, and the Semantic Web to facilitate the sharing of heterogeneous information. Semantic similarity techniques are becoming important components in most intelligent knowledge-based and semantic information retrieval (SIR) systems. This paper discusses the limitations of existing semantic similarity methods for computing similarity between concepts of a single ontology and concepts belonging to different ontologies. The proposed approach exploits informativeness of concepts as a factor for computing the amount of specific and shared features between the concepts. Identifying the Most Common Specific Abstraction between concepts belonging to different ontologies is a challenge and we proposed a methodology to identify the MCSA by forming a virtual root which connects the root concepts of the considered ontologies. The proposed idea is tested using MESH and SNOMED-CT biomedical ontology.
——————————————————————————————————————————————————————————————————–
A Novel Approach for QoS in MANET [ Full-Text ]
P. K. Suri, M. K. Soni, and Parul Tomar
A Mobile Ad-Hoc network (MANET) is a self organising network of nodes connected through wireless links. With the increase in popularity of wireless network and various applications running over those networks, it is necessary to provide the quality in terms of bandwidth and delay for the real time applications such as audio and video in MANET. Providing QoS in MANET is a difficult task as they have random and dynamic topology. A few set of existing QoS models like CEDAR, QAODV, FQMM etc have been proposed for MANET, but none of them has been able to satisfy the bandwidth and delay constraints together. Therefore, In this paper, a protocol called “A Novel Approach for QoS in MANET(NQM)” has been proposed for providing the best suited route in accordance with the network traffic and QoS parameters.
——————————————————————————————————————————————————————————————————–
Objective Performance Evaluation of Feature Based Video Fusion [ Full-Text ]
Anjali Malviya and S. G. Bhirud
An objective fusion measure should extract all the perceptually important information that exists in the input images and measure the ability of the fusion process to transfer as accurately as possible this information into the output image. Most fusion evaluation algorithms dealing with still image fusion explicitly aim at achieving optimal accuracy of representing spatial information, from the inputs in the fused image. This does not preclude their use in video fusion as they can be applied to each multi-sensor frame independently. This paper deals with the objective evaluation of multi-sensor video fusion. For this purpose an established static image fusion evaluation framework, based on only edge information and not regional information, is used. The metric reflects the quality of visual information obtained from the fusion of input images and we use it to compare the performance of the feature-level video fusion with pixel-level video fusion algorithms.