Design and Implementation of an Optimized Security Protocol for Wireless Sensor Networks [ Full-Text ]
Hasan Tahir, Muhammad Younus Javed and Ruhma Tahir
Wireless Sensor Networks have been designed for a broad range of domains. Each domain has its own attributes and characteristics. Many of the domains in which wireless sensor networks will be deployed are extremely hostile and the sensors themselves are prone to attack. Extensive research has been conducted in the field of security but when it comes to wireless sensor networks all conventional security mechanisms fail because conventional mechanisms have not been designed for resource constrained environments. In this paper the design and implementation of a security protocol for wireless sensor networks has been presented that provides high levels of security while consuming very little resources. The new protocol referred to as Optimized Security Protocol (OSP) has been designed specifically for wireless sensor networks and provides confidentiality, authentication and integrity in a single suite. OSP has been implemented using TinyOS and TinyViz which are specially designed for simulating the complex environment of wireless sensor networks.
——————————————————————————————————————————————————————————————————–
The Impact of Queue on Opportunistic based Cognitive Radio Networks [ Full-Text ]
Samira Homayouni and Seyed Ali Ghorashi
In cognitive radio systems which include primary and secondary networks, dynamic spectrum sharing methods are implemented in order to provide more spectrum access opportunities for secondary users without interference to the primary ones. In this paper, we investigate the impact of queuing secondary users on the cognitive radio system performance. Resource sharing process in the considered system is modeled by a two-dimensional Markov chain and performance metrics such as blocking and dropping probabilities, mean waiting time and channel utilization for different populations of secondary users are computed and compared. Both analytical and simulation results show that in the presence of queue, the dropping probability of secondary users decreases intensively with the cost of increasing secondary users’ blocking probabilities and mean waiting time.
——————————————————————————————————————————————————————————————————–
A Novel Design Evaluation of Low-Voltage RF front-end with VCO in 0.18-µm CMOS [ Full-Text ]
M. Sumathi and S. Malarvizhi
A low-voltage direct-conversion receiver front-end for 2.4GHz radio applications is presented. It consists of a low-noise amplifier (LNA), a down-conversion mixer and a voltage-controlled oscillator (VCO). The proposed LNA uses modified cascode structure in differential topology and mixer utilizes folded switching technique for supply voltage reduction. The VCO uses novel cross –coupling topology with high Q inductor. The design theory and performance evaluation done in TSMC 0.18-µm CMOS technology scale. The RF front-end achieves a voltage conversion gain of 13 dB and a noise figure of 7.9 dB. The designed 3.5GHz VCO has a phase noise of -95.19 dBc/Hz at 1MHz offset.
——————————————————————————————————————————————————————————————————–
Stereo image Transference and Retrieval over SMS [ Full-Text ]
Muhammad Fahad Khan and Saira Beg
Paper presents the way of transferring stereo images using SMS over GSM network. Generally, Stereo image is composed of two stereoscopic images in such way that gives three dimensional affect when viewed. GSM have two short messaging services, which can transfer images and sounds etc. Such services are known as; MMS (Multimedia Messaging Service) and EMS (Extended Messaging Service). EMS can send Predefined sounds, animation and images but have limitation that it does not support widely. MMS can send much higher contents than EMS but need 3G and other network capability in order to send large size data up to 1000 bytes. Other limitations are Portability, content adaption etc. Our major aim in this paper is to provide an alternative way of sending stereo images over SMS which is widely supported than EMS. We develop an application using J2ME Platform.
——————————————————————————————————————————————————————————————————–
Transaction Level Modeling of High Level DMA Controller [ Full-Text ]
R. Divya Praneetha, Y. Padma Sai and Paleti Lakshmi Kanth
Abstraction of the design is a powerful technique for the design and implementation of complex systems. It allows us to tackle complexity by first hiding unnecessary details and then working them out later. Hence, it is much essential to follow the design methodology that starts at a high-level of abstraction in the context of today’s increasingly complex system level design. Transaction level modeling is considered to be this new abstraction level. Transaction level modeling is a high-level approach of modeling digital systems where details of communication among modules are separated from the details of the implementation of the functional units or of the communication architecture. Direct Memory Access (DMA) is a feature of modern computers and micro processors that allows certain hardware subsystems within the computer to access system memory for reading and/or writing independently of the central processing unit. This paper discusses the modeling of DMA using TLM and compares the TLM modeling style of DMA with HDLs modeling.
——————————————————————————————————————————————————————————————————–
Survey on Autonomic Workload Management: Algorithms, Techniques and Models [ Full-Text ]
Basit Raza, Abdul Mateen, M M Awais and Muhammad Sher
In Database Management System (DBMS) and Data Warehouse (DW), workload is very important entity to be managed in a proper way and responsive way. Earlier the DBMS and DW workload has been managed automatically but with growing size of data and increase in numbers of users to handle workload automatically become difficult or impossible. Workload management has become challenge for the database community and vendors. It is challenge to identify the queries, which create problem and/or resource contention queries. Further how we can know before executing queries and take decision about suspending or to kill the problematic queries. This paper provides the basis and achievements about autonomic computing in workload management. We surveyed the literature of workload management in DBMSs and DWs and categorized into self-* characteristics. These self-* characteristics include self-inspection, self-Optimization self-Configuration, self-organization, self-Prediction and self-Adaptation. The survey provides comparative analyses and highlights the short comings of the previous workload management techniques, algorithms and models. Finally the surveyed literature is categorized on the basis of workload type and autonomic perspective.
——————————————————————————————————————————————————————————————————–
Architecture and Design of Web Application Framework: A Preliminary Review [ Full-Text ]
Mohd Razak Samingan and Wan Mohd Nasir Wan Kadir
Among the earliest issues to be solved regarding to web application (WA) architecture and design is the performance problem and business logic complexities due to some limitations in conventional CGI architecture. These issues arise when WA began to be used to provide services with a very high number of accesses by users and solve more complex problems such as large scale e-learning system, online banking, one-stop online shopping center, etc. Most of the solutions are not considering the complexity that also brought along with the new proposed architecture as long as the aforementioned issues can be solved. As WA evolved and used to solve more complex problems, the next phases of WA architecture and design research have going towards for more simplified design, further exploiting database technology maturity, and search for suitable aided-tools to facilitate on some aspects of WA development process. The research direction has also move towards on proposal for better insights on WA design via motivation or enforcement of particular design pattern and shows some awareness to the necessity for deep understanding on using technology appropriately as it was originally intended. Web application framework (WAF) that nowadays has been widely accepted for WA development has to be in tandem with the current research trends to provide better, profound and proven architecture-design inside the application.
——————————————————————————————————————————————————————————————————–
Simulation and Control of Distillation Process [ Full-Text ]
Asha Rani, Vijander Singh and J. R. P Gupta
The precise control of distillate quality is the objective of the present work and is achieved by controlling the temperature profile of the distillation process. The generic mathematical models of multicomponent distillation and reactive distillation processes are considered for simulation. The PID and fuzzy controllers are designed for both the processes. In case of multicomponent distillation process, the PID controller is designed with the help of Zeigler-Nichols tuning method and for reactive process the PID controller is designed using Tyreus-Luyben method. The PID controller is used to control the reboiler temperature of multicomponent distillation process. In case of reactive process the exothermic reaction takes place between the two feeds and the amount of heat generated depends upon the feed flow rate. Therefore the designed PID controller is used for controlling the feed flow rate which controls the temperature indirectly. The fuzzy controllers are designed for both the processes and are used for controlling the reboiler temperature and feed flow rate respectively. The results obtained from both the controllers are compared. It is observed from the results that the fuzzy controller performs better than the conventional PID controller.
——————————————————————————————————————————————————————————————————–
An Energy Efficient Multicast Routing Protocol Exploiting MGS Clustering Method in Mobile Ad-hoc Networks [ Full-Text ]
Md. Mosaddek Khan and Md. Mamun-or-Rashid
The Routing Approaches in Mobile Ad-hoc Network have almost entered the saturated arena. But still there are available options of perfection in this meadow. In the routing approach it is difficult to find any proposal which can successfully mingle clustering, geographic information and multicasting technique. The task of improving the clustering techniques is one of the fields which is under rated as a research topic for further improvement of routing. Clustering based MANET routing protocols, which are popular in terms of efficiency, simplicity and usability mostly use circular based clustering techniques. And the election of cluster head is done through the use conventional approaches. This particular paper is mainly focused to launch a new-fangled routing protocol through which it is possible to use the surroundings defined above. It exploits multicast rather than using unicast and broadcast with some remarkable improvements. This approach also try to fix the existing typical problems reside in multicast approach. Another important aspect of this paper is to provide a cluster head selection algorithm which can effectively maintain the clusters and provides more stability. The clustering idea is useful for geographically related nodes effectively in different turf of routing. To maintain the clusters and their stability, it provides a new idea to select cluster head within the cluster, also the election of secondary cluster head for avoiding further election immediately after the unavailability of primary cluster head. Finally we provide an efficient way of multicast forwarding by utilizing the geometric angular direction. We have evaluated our proposed routing (MGS-Route) in network simulator (ns-2.34) and it outperforms the existing proposals.
——————————————————————————————————————————————————————————————————–
Timing and Code Size Optimization on Achieving Full Parallelism in Uniform Nested Loops [ Full-Text ]
Y. Elloumi, M. Akil and M. H. Bedoui
Multidimensional Retiming is one of the most important optimization techniques to improve timing parameters of nested loops. It consists in exploring the iterative and recursive structures of loops to redistribute computation nodes on cycle periods, and thus to achieve full parallelism. However, this technique introduces a large overhead in a loop generation due to the loop transformation. The provided solutions are generally characterized by an important cycle number and a great code size. It represents the most limiting factors while implementing them in embedded systems. In this paper, we present a new Multidimensional Retiming technique, called “Optimal Multidimensional Retiming” (OMDR). It reveals the timing and data dependency characteristics of nodes, to minimize the overhead. The experimental results show that the average improvement on the execution time of the nested loops by our technique is 19.31% compared to the experiments provided by an existent Multidimensional Retiming Technique. The average code size is reduced by 43.53% compared to previous experiments.
——————————————————————————————————————————————————————————————————–
Dynamic Fuzzy Knowledge Representation via Adaptive Fuzzy Higher Order Petri Nets [ Full-Text ]
M. Amin and D. Shebl
Knowledge in expert system is vague and updated or modified frequently, expert systems are fuzzy and dynamic systems. Suitable models for them should be adaptable, i.e., the models must have ability to adjust themselves according to the changes of the systems. However, fuzzy Petri nets (FPN’s) and fuzzy higher order Petri nets (FHOPN’s) as a modeling formalisms are not adaptable according to the changes of the weights. This is mainly due to the fixed weights. In this paper, we propose the formal description of adaptive fuzzy higher order Petri net (AFHOPN) that takes into account the changes of the weights of the arcs in the fuzzy reasoning process. AFHOPN has the learning ability, but it does not need to transfer into the neural networks. We show how AFHOPN can be used for representing the fuzzy rules of a dynamic rule-based system. Then, we develop a fuzzy reasoning algorithm and an algorithm for updating the weights. Finally, we give the algebraic forms of the state equation and the stability analysis of the proposed model.
——————————————————————————————————————————————————————————————————–
Object Oriented Caching Mechanism for Efficient Computing over Web [ Full-Text ]
Pushpa R. Suri and Harmunish Taneja
One of the major inventions of the 1990s is the World Wide Web (WWW). Since its advent in 1991, the Web has evolved as global interconnection of individual networks operated and used by both public and private sectors. Its origin can be traced back when Internet was the tool to interconnect laboratories busy in government research. WWW has been exponentially expanding reaching every remote corner of the earth. The web is not alone to expand; the rising load on the typical web server accompanies it. This rapid extension comes as a package of facilities and limitations. The major problem is of growing network traffic leading to congestion. It can be relaxed if requested documents are cached. From the user’s point of view, the response time for the query should be low as if independent of increased web content demands. Caching is the most ubiquitous mechanism in modern information computing over web for improving application performance and scalability. Conventional web based caching mechanism prove deficient when it comes to shared information access. Added functionality and flexibility are the major attractions of object oriented technology. Object oriented framework reduces the response time and complexity of computation. In this paper object oriented caching mechanism is proposed that promises flexibility and effectiveness in web.
——————————————————————————————————————————————————————————————————–
An Efficient Detection of Outliers and Hubs Using Minimum Spanning Tree [ Full-Text ]
T. Karthikeyan, S. John Peter and S. Chidambaranathan
In data mining detection of anomalous pattern in data is more interesting than detecting inliers. Minimum Spanning Tree based Clustering is an important task for the discovery of underlying structures in graph. Many algorithms find clusters by maximizing the number of intra-cluster edges. While such algorithms find useful and interesting structures, they tend to fail to identify and isolate two kinds of vertices that play special roles – vertices that bridge clusters (hubs) and vertices that are marginally connected to clusters (outliers). In this paper, we model hubs as high-degree nodes having high average weight value. Identifying hubs is useful for applications such as viral marketing and epidemiology since hubs are responsible for spreading ideas and disease. In contrast, outliers have little or no influence, and many may be isolated as noise in the data. In this paper we propose an efficient algorithm for detecting outliers and hubs in graph.
——————————————————————————————————————————————————————————————————–
Bangla Oral-Nasal Vowel Pairs: Acoustic Categorization and Comparative Study of Feature Extraction Methods [ Full-Text ]
Shahina Haque and Tomio Takara
Acoustic feature extraction of Bangla oral-nasal vowel pairs were done by pole-zero cepstral and all pole Linear Predictive Coding (LPC) method. It is observed that (1) Bangla nasal vowel space shrinks and shifts towards front with respect to it’s oral vowel space (2) For Bangla nasal vowels, cepstral method extracts more spectral details including spectral zeros than the all pole LPC method. Comparative study shows that although both the method extracts similar speech parameters for each vowel but cepstral method is more appropriate than LPC method as far as the nasal vowels are concerned.
——————————————————————————————————————————————————————————————————–
A Multi-path Misbehaviour Aware Routing Scheme for Mobile Ad Hoc Networks [ Full-Text ]
Bhushan M. Manjre and Veena A. Gulhane
In a MANET, Node misbehavior is any such behavior that proves harmful to co-operative environment of MANET. Many schemes have been recently proposed for the detection and avoidance of misbehaving nodes, but still there are many issues like false detection due to network layer factors, packet dropping, and packet delaying which are yet to be addressed completely. To mitigate these problems, a novel multi-path routing protocol is proposed herewith that aims at finding reliable and secure routes for data communication before transmitting data packets over the same. Since routes are verified for security and reliability at the beginning of data transmission, hence probability of packet loss/delay misbehavior is minimized.It also implements behavior check mechanism over failure routes to point out the culprit node, checks whether it is misbehaving due to some network layer factors or it is intentionally programmed to do so. If it is intentionally misbehaving, then only it is avoided for future routes, otherwise not. Hence, false detection due to low energy and buffer overflow is avoided and the loyal node is given chance of reintroduction into the network again. Due to this, the network performance is optimized in terms of security and reliability. The proposed protocol, when compared with AOMDV protocol, shows improvement in terms of network throughput and reduction in end to end delay.
——————————————————————————————————————————————————————————————————–
A probing algorithm with Adaptive Workload Load Balancing capabilities for heterogeneous clusters
[ Full-Text ]
S. Kontogiannis and A. Karakos
This paper presents an adaptive load balancing algorithm, called AWLB for cluster based web systems. This algorithm maintains agents both at the web cluster and web servers in order to adapt its balancing decisions accordingly. AWLB algorithm also maintains its own protocol specification for signalling purposes among web switch and cluster nodes and also utilizes other protocols such as SNMP and ICMP for its balancing process. Performance gains are shown from tests of AWLB against known balancing Least Connections (LC) and Least Loaded (LL) algorithms used by web-farms. Finally, CPU performance tests at the web switch show both advantages and drawbacks of complicated but accurate adaptive decisions over less accurate but misbalancing policies.
——————————————————————————————————————————————————————————————————–
Mapping Approach of ITIL Service Management Processes to ISO/IEC 27001 Controls [ Full-Text ]
Razieh Sheikhpour and Nasser Modiri
Information security plays an important role in protecting the assets of an organization. A number of best practice frameworks exist to help organizations assess their security risks and implement appropriate security controls. Integration of security best practices like ISO/IEC 27001 into service management best practices processes like ITIL enables the organization to lower the overall cost of maintaining acceptable security levels, effectively manage risks and reduce overall risk levels. ITIL provides a framework of best practice guidances for information technology service management. ISO/IEC 27001 is a set of guidelines, which can be used by an organization to design, deploy and maintain information security management system. From an ITIL perspective, most of the security controls identified in ISO/IEC 27001 are already part of service management. This paper describes mapping of ITIL service management processes to controls of ISO/IEC 27001.
——————————————————————————————————————————————————————————————————–
Development of an Ontology to Assist the Modeling of an Accident Scenario: Application on Railroad Transport [ Full-Text ]
Ahmed Maalel, Habib Hadj Mabrouk, Lassad Mejri and Henda Hajjami Ben Ghezela
In a world where communication and information sharing are at the heart of our business, the terminology needs are most pressing. It has become imperative to identify the terms used and defined in a consensual and coherent way while preserving linguistic diversity. To streamline and strengthen the process of acquisition, representation and exploitation of a scenario of train accidents, it is necessary to harmonize and standardize the terminology used by players in the security field. The research aims to significantly improve analytical activities and operations of the various safety studies, by tracking the error in system, hardware, software and human. This paper presents the contribution of ontology to modeling scenario for rail accidents through a knowledge model based on a generic ontology and domain ontology. After a detailed presentation of the state of the art material, this article presents the first results of the developed model.
——————————————————————————————————————————————————————————————————–
Home Automation Disaster Management System via SMS and GSM [ Full-Text ]
Nadia Shaheen, Aihab Khan, Malik Sikander Hayat Khiyal and Qaiser Javed
The paper presents working of disaster management system and realizes the monitoring of home security systems such as fire, gas leakage, smoke, electric short circuit.The system is implemented connecting Global system for mobile communication (GSM) modem with personal computer (PC) through serial cable via Attention (AT) commands set. The proposed system is intended to measure or sense the threshold value of different parameters like pressure or temperature level and sends it to preconfigured cell number via GSM modem. The main purpose of the paper is to design a cost effective, cheap and secure system which sends an alert Short Message Service (SMS) when the value of pressure or temperature level exceeds the limit. Most commonly used tools such as cellular phones and wireless GSM modem have become very effective techniques and can be opted more efficiently for controlling the above mentioned situations remotely independent of geographical locations. The main focus is to send SMS to preconfigured cell number and triggering an alarm whenever an alarming situation is occurred. The user can in turn respond to the event by sending command to overcome the situation. It is concluded that the proposed technique results in safer syatem and it strengthens the security concerns of home by proposing a cost effective solution.
——————————————————————————————————————————————————————————————————–
Impact of Facebook on Social Network Security [ Full-Text ]
Pradeep Kumar Puram and Aditya Krishna Haas Rayaprolu
Facebook has become an important part of the average netizen’s daily routine. In fact is is now deeply knit within the social fabric of our society. This applies to almost all the countries acorss the world, in which Facebook has made its presence felt. This paper attempts to examine some of the risks assoiciated with Facebook and how it impacts the concept of social network security. The paper gives an overview about the policies of Facebook and how they are affecting the usage of the website by millions of people around the world. The paper also attempts to take a glimpse into the future of the social networking behemoth and how it would impact the social scene.
——————————————————————————————————————————————————————————————————–
Techno-Evaluation and Empirical Study of Virtual Private Networks Using Simulation [ Full-Text ]
Rahul Malhotra and Rajneesh Narula
A virtual-private network is a computer network is a computer network that uses public telecommunication infrastructure such as internet to provide secure internet access to remote offices or individual users. The aim of using virtual private networks is to avoid an expensive system of owned or leased lines. It encapsulates encrypted data transfer between two or more networked devices which are on same private network using ISDN/PSTN. Routing is the main technical issue performed by tunneling protocols. Virtual Private Networks are configured at routers and permit safe communication through an unsafe environment. Virtual Private Network creates a tunnel, a logical group of routers to provide a safe path to data to reach the destination. A tunnel provides private traffic to be sent through public path. IT Guru Network Planner OPNET accelerates Virtual Private Network deployments and ensures optimal performance of Virtual Private Network based applications.
——————————————————————————————————————————————————————————————————–
A Comparison of Lightweight Databases in Mobile Systems [ Full-Text ]
F. Tavakkoli, A. Andalib, A. Shahbahrami and R. Ebrahimi Atani
This paper tries to investigate some DBMS that are specially designed or optimized for mobile systems. This investigation emphasizes on some fundamental factors that in fact are the most significant features and parameters of DBMSs. First, it describes the necessity of applying LightWeight DBMS , which are briefly called LW in this paper. Then, it introduces each DBMS and explains its characteristics and finally, presents a general comparison by a table. It should be mentioned, that according to the variety of DBMSs and fast increased popularity and attraction of the Open Source, this paper studies in this scope in order to demonstrate a palpable comparison.
——————————————————————————————————————————————————————————————————–
Designing Passive Filters for Harmonic Reduction in a Noisy System Based on Wavelet Transform Compared to Traditional Method [ Full-Text ]
Hamid Rahimi Esfahani and Farshad Kiyoumarsi
In this paper, among different methods of signal processing, wavelet transform is chosen due to its advantages over other methods. To show wavelet transform capabilities, first an HVDC system which has noise on its output current is simulated. In the first step noise is removed by applying discrete wavelet transform. In the next steps, harmonic problem is resolved thorough appropriate passive filters. In this paper, we suppose that not only low order harmonics exist in the output current, but also high order ones. The results indicate that we can obtain a good passive filter design for harmonic reduction by decomposing a signal into its harmonic components via applying discrete wavelet transform. For more confirmation of this method, the scalogram of wavelet coefficients is presented. At the end, to compare this method with traditional one, the figures of traditional method for passive filter designing is presented.
——————————————————————————————————————————————————————————————————–
A Novel Task Allocation Technique, Based on Developer’s Expertise [ Full-Text ]
Junaid Tariq and Saif-ur-Rehman Khan
No matter what type of product you are developing, it may be decomposed into many small manageable pieces know as tasks in computer science field. However the management of these large numbers of tasks is very critical and complex, which if not managed properly, will delay the overall project. Ultimately it may exceed the planned project cost. Similarly task allocation is another crucial challenge that may divert your project from success to failure if not handled carefully and wisely. In this paper, we present an efficient way to manage tasks and their allocation based on the available expertise known as task-to-developer (TTD) mapping. The case study result shows significant reduction in task management.