Volume 3, Issue 1, January 2012
Stochastic Reward Nets Model for Time based Software Rejuvenation in Virtualized Environment |
Pages: 1-10 (10) | [Full Text] PDF (1432 K) |
Aye Myat Myat Paing and Ni Lar Thein |
University of Computer Studies, Yangon |
Abstract - Modern business has a 24x7 non-stop running and the availability of the business continuity for everything, from everywhere, at all time is a growing requirement. System outages are more often due to software fault, than hardware fault. Software availability is one of the weakest links in system availability. Several studies have reported that one of the causes of unplanned software outages is the software aging phenome-non. Server virtualization is becoming so reliable and cost effec-tive solutions for the availability of the business continuity. In virtualization environments, the hypervisor or virtual machine monitor (VMM) itself or virtual machines (VM) can fail with software failure. Software rejuvenation is one of the promising techniques assuring high availability of server virtualized system. To prevent system failures caused by software aging in both VM and VMM, software rejuvenation can be applied. The work presented in this paper aims to offer high availability against software aging of virtualized server system by providing both VM clustering software rejuvenation and VM migration based software rejuvenation analytic model using stochastic reward nets (SRN) for time based rejuvenation policy. Numerical exam-ples are presented to illustrate the applicability of the model. The numerical derivation results are validated with the evaluation results through SHARPE tool. |
Index Terms - Availability, Clustering, Software Aging, Software Rejuvenation, Stochastic Reward Nets and Virtualization |
Realistic Approach of Strange Number System from Unodecimal to Vigesimal |
Pages: 11-16 (6) | [Full Text] PDF (274 K) |
Debasis Das and U. A. Lanjewar |
VMV Commerce, JMT Arts & JJP Science College , Wardhaman Nagar, Nagpur, India |
Abstract - Presently in computer science and technology, number system is based on some traditional number system viz. decimal (base 10), binary (base-2), octal (base-8) and hexadecimal (base 16). The numbers in strange number system (SNS) are those numbers which are other than the numbers of traditional number system. Some of the strange numbers are unary, ternary, …, Nonary, ..., unodecimal, …, vigesimal, …, sexagesimal, etc. The strange numbers are not widely known or widely used as traditional numbers in computer science, but they have charms all their own. Today, the complexity of traditional number system is steadily increasing in computing. Due to this fact, strange number system is investigated for efficiently describing and implementing in digital systems. In computing the study of strange number system (SNS) will useful to all researchers. Their awareness and detailed explanation is necessary for understanding various digital aspects. In this paper we have elaborate the concepts of strange number system (SNS), needs, number representation, arithmetic operations and inter conversion with different bases, represented in tabulated form. This paper will also helpful for knowledge seekers to easy understanding and practicing of number systems as well as to memories them. |
Index Terms - Unodecimal, Duodecimal, Tridecimal, Quadrodecimal, Pentadecimal and Vigecimal |
Performance Modeling of Distributed Load Balancing Algorithm Using Neural Networks |
Pages: 17-22 (6) | [Full Text] PDF (409 K) |
Seyed Hossein Kamali, Maysam Hedayati, Reza Shakerian and Saber Ghasempour |
Islamic Azad University, Qazvin Branch, Qazvin, Iran Islamic Azad University, Ghaemshahr Branch, Ghaemshahr, Iran Department of Mathematics, Payame Noor University, Tehran, Iran |
Abstract - This paper presents a new approach that uses neural networks to predict the performance of a number of dynamic decentralized load balancing strategies. A distributed multicomputer system using any distributed load balancing strategy is represented by a unified analytical queu¬ing model. A large simulation data set is used to train a neural network using the back–propa¬gation learning algorithm based on gradient descent. The performance model using the predict¬ed data from the neural network produces the average response time of various load balancing algorithms under various system parameters. The validation and comparison with simulation data show that the neural network is very effective in predicting the performance of dynamic load balancing algorithms. Our work leads to interesting techniques for designing load balanc¬ing schemes (for large distributed systems) that are computationally very expensive to simulate. One of the important findings is that performance is affected least by the number of nodes and most by the number of links at each node in a large distributed system. |
Index Terms - Load Balancing, Neural Network, Multi-Computer System and Simulation |
Secured Secret Sharing over Single Path in VoIP with Consistent Data Transfer |
Pages: 23-27 (5) | [Full Text] PDF (496 K) |
K. Maheswari and M. Punithavalli |
Department of Computer Applications,
SNR SONS College, Coimbatore, India Dept. of Computer Applications, Sri Ramakrishna Engineering College, India |
Abstract - Voice over Internet Protocol (VoIP) is a new fancy and up growing technology. A major change in telecommunication industry is VoIP. The transmission of Real time voice data is not as easy as ordinary text data. The real time voice transmission faces lot of difficulties. It suffers from packet loss, delay, quality and security. These factors will affects and degrade the performance and quality of a VoIP. This paper addresses the security and packet delivery ratio of a VoIP using modified secret sharing algorithm over a single path with reduced packet loss. The simulation results show that higher security is achieved in terms of route request, route reply, route error, delay, and packet delivery ratio. |
Index Terms - Packet Loss, Quality, Communication, Security and VoIP |
QoS Based on Ant Colony Routing for Wireless Sensor Networks |
Pages: 28-32 (5) | [Full Text] PDF (334 K) |
Belghachi Mohamed and Feham Mohammed |
STIC Laboratory, Faculty of Technology,
University of Tlemcen, Algeria Faculty of Science and Technology, University of Bechar, Algeria |
Abstract - The wireless sensor networks (WSNs) are composed of nodes communicating over a wireless media, without the need for physical infrastructure. In this type of topology, all nodes cooperate to ensure the proper management of the network (control, routing, ...). Fully distributed nature of such networks is the problem of performance (due to the calculation of routes) as well as problems related to the security of exchanges between nodes. In regard to performance due to packet routing, we distinguish protocols inspired by ant colonies that give in most cases, better results. In this paper we present a protocol based on an ant colony to calculate dynamic routes and a cooperation mechanism which allows better quality of service (QoS) management problem in WSNs. Thus, we proposed Qos_Aco a routing protocol based on Ants colony with QoS support requirements in WSNs. Our approach allows to found the path with the least delay (end to end), the more bandwidth, and the shortest number of hops for data transmission. |
Index Terms - WSN, Qos_Aco, Delay, Bandwidth and Number of Hops |
Network Intrusion Detection System Using KMP Pattern Matching Algorithm |
Pages: 33-36 (4) | [Full Text] PDF (273 K) |
B. Raju and B. Srinivas |
Kakatiya Institute of Technology and Science, Warangal |
Abstract - Intrusion detection technology can help the system to deal with network attacks extend the security management ability of the system manager and increase the integrality of information security foundation structure. Intrusion detection system (IDS) is a device (or application) that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Pattern matching algorithm is the core algorithm of intrusion detection system based on feature matching as well as an algorithm which is universally used in current intrusion detection equipment. An implementation of design intrusion detection system based on pattern matching algorithm is proposed in this paper. Apart from the intrusion detection system, the paper has given a detailed case study on different modules used for finding the Intrusion Detection System. |
Index Terms - Intrusion Detection, KMP Pattern Matching Algorithm and Data Acquisition Module |
Under Water Optical Wireless Communications Technology for Short and Very Short Ranges |
Pages: 37-48 (12) | [Full Text] PDF (769 K) |
Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed and Amina E. M. El-Nabawy |
Electronics and Electrical Communications Engineering Department, Faculty of Electronic Engineering, Menouf-32951, Menoufia University, Egypt |
Abstract - This paper has presented our interest in wireless underwater optical communications. Recent interest in ocean exploration has brought about a desire for developing wireless communication techniques in this challenging environment. Due to its high attenuation in water, a radio frequency (RF) carrier is not the optimum choice. Acoustic techniques have made tremendous progress in establishing wireless underwater links, but they are ultimately limited in bandwidth. In traditional communication systems, constructing a link budget is often relatively straight forward. In the case of underwater optical systems the variations in the optical properties of sea water lead to interesting problems when considering the feasibility and reliability of underwater optical links. The main focus of this paper is to construct an underwater link budget which includes the effects of scattering and absorption of realistic sea water. As well as we have developed the underwater optical wireless communication systems to have shorter ranges, that can provide higher bandwidth (up to several hundred Mbit/sec) communications by the assistant of exciting high brightness blue LED sources, and laser diodes suggest that high speed optical links can be viable for short range application. |
Index Terms - Underwater Wireless Communication, Optical Communication, Short Range, Very Short Range and Performance Evaluation |
A Novel Technique for Robust Image Segmentation |
Pages: 49-53 (5) | [Full Text] PDF (922 K) |
Amandeep Kaur and Pankaj Bhambri |
Guru Nanak Dev Engineering College, Ludhiana, India Department of Information Technology, Guru Nanak Dev Engineering College, Ludhiana, India |
Abstract - Image segmentation is an important processing step in many image, video and computer vision applications. Automated segmentation of images has been considered an important intermediate processing task to extract semantic meaning from pixels. The sensitivity of segmentation solutions to image variations is measured by image resampling. For any learning algorithm, the problems of robustness towards small fluctuations in the data as well as the generalization of inferred solution to previous unseen instances of dataset from the chosen domain are highly relevant. Image segmentation as a learning problem requires inferring a robust partitioning of image patches with generalization to novel images of the same type. Shape information is included in the inference process to guide ambiguous groupings of color and texture features. Shape and similarity-based grouping information is combined into a semantic likelihood map in the framework of Bayesian statistics. |
Index Terms - Clustering, Image Segmentation, Mixture Models, Resampling and Shape Analysis |
Security in Unstructured Opportunistic Networks: Vague Communication and Counter Intelligence Functionality |
Pages: 54-61 (8) | [Full Text] PDF (376 K) |
K. Srihari Rao, Mrs. Lokeswari and J. Srikanth |
Department of CSE, Aurora Engineering College, Bhuvanagiri, AP, India |
Abstract - This paper focuses on presenting an end-to-end standard known as cloud which concentrates on assuring ambiguity and suppressive resistance for the semantic Opportunistic networks. The transmission of encrypted messages is necessary without the inclusion of the earlier sent messages thus shunning federalized infrastructure, all the while pledging efficiency without straight connection between hosts. Concealing individuality of participating hosts within groups of semantically close network can be accomplished by vagueness. A cryptographic standard assures counter intelligence by sheltering unidentified transmission between source querying host and the destination reserve provider. Even though the paper focuses on utilizing recovery potential of semantic Opportunistic networks, the framework considered is broad and applicable to any amorphous Opportunistic networks. The refuge characteristics of Cloud can be demonstrated via various attacks and also message overhead and retrieval efficiency of the standard can be revealed. |
Index Terms - Security, Networks, Vague Communication and Intelligence Functionality |
Neural Network Model Based Sleep down Power Control for Mobile Ad-hoc Network |
Pages: 62-65 (4) | [Full Text] PDF (230 K) |
Krishan Kumar |
MRIU, Faridabad, India |
Abstract - Power control is needed to exchange messages between any pair of neighboring nodes. Mobile ad-hoc network capacity is increasing by reducing the transmit power level of nodes in network. Transmit power control depends on the protocol from physical to transport layers, including the three important parameters like data transfer rate, switching time and energy consumption. This paper is focus on energy consumption by transmitter and receivers. Power is consumed by nodes during switching in mobile ad-hoc network. Neuron network model concept is based on simulation result. This concept is more helpful as compare to other algorithm to solve power control problem in mobile ad-hoc network. |
Index Terms - Power, Control, Energy, Protocol and Network |
Design and Implementation of Adder and Subtracter Experiments using Virtual Intelligent SoftLab |
Pages: 66-69 (4) | [Full Text] PDF (656 K) |
Bhaskar Y. Kathane and Pradeep B. Dahikar |
PCD ICSR, VMV College Campus, Wardhaman Nagar, Nagpur (MS), India Kamla Nehru Mahavidyalaya Sakkardara, Nagpur (MS), India |
Abstract - The scope of this paper includes study and implementation of Full Adder and Subtractor. A full-adder and Subtracter is composed with IC and virtual instruments. Along with the VIS model the designing, testing and debugging become easier. So, virtual Instruments are useful to design and implement the experiments. We use the binary code to represent numbers. In this research paper we have formulated how experiments on Full Adder and Subtracter are performed using the concept of virtual Intelligent SoftLab (VIS). Adder and Subtracter are constructed using the Virtual SoftLab and observed actual outputs. VIS helps us to create results using visual display. Software for conducting the experimentations in Adder and Subtracter has been developed which helps students to perform and practice the experiments. This will help students in understanding working of Adder and Subtracter. |
Index Terms - SoftLab, Adder, Subtracter, Virtual Instruments and VIS Model |
Emerging Trends in Wireless Multimedia Technologies: IRIS |
Pages: 70-73 (4) | [Full Text] PDF (362 K) |
S.Koteswari, P. John Paul, S. Indrani and S. Srikanth Chetlapalli |
Department of ECE
Andhra Pradesh, India Department of CSE, GATES Engineering College, Gooty, Ananthapur, Andhra Pradesh, India |
Abstract - In the emerging trends in wireless multimedia services and technologies, the term biometrics is gaining increasing attention in these days. Security systems, having realized the value of biometrics. Specially biometrics are used for two basic purposes to verify or identify users. The use of fingerprints, facial characteristics and other biometrics for identification is becoming more common. The paper overviews best of Biometric application for security management. The acquisition of biometric data introduces human research and privacy concerns that must be addressed by the organizations. Iris recognition has received increasing attention in recent years. The uniqueness and randomness of human iris patterns enable us to use it as quicker, easier and highly reliable forms of automatic human identification, where in the human iris serves as a type of biological passport, PIN or password. This paper tells about how the iris recognition system works and how it is a reliable approach to human identification. Iris recognition system comprises of iris image acquisition, image processing, feature extraction and pattern matching. This paper also focuses on how Iris is the best Biometric feature for identity Management. |
Index Terms - Biometrics, Iris Recognition, Fingerprint and Wireless Multimedia |
Distribution of Nodes on Square Method for Wireless Sensor Networks |
Pages: 74-77 (4) | [Full Text] PDF (277 K) |
N. Pushpalatha and B. Anuradha |
Department of ECE, AITS, Tirupathi, India Department of ECE, S.V. University College of Engineering, Tirupathi, India |
Abstract - This paper focuses on distribution of nodes on square method for wireless sensor networks by using multi-dimensional scaling algorithm for position estimation. Nowadays Wireless networking is used to meet a variety of needs. Smart environments represent the next evolutionary development step in buildings, utilities, industrial, scientific, medical, home, shipboard, and military and transportation systems automation. Like any organism, the smart environment relies first and foremost the sensory data from the real world. In this paper it is propose a distributed algorithm that produces a large number of nodes are placed in the Squaring method for an arbitrary sensor network, with no constraints on communication model. Its correctness in 2D and further extends it to senor networks developed on 3D open and closed surfaces are done. Our simulation results show that the proposed algorithms can tolerate distance measurement errors, and thus work well under practical sensor network settings and effectively promote the performance a range of applications that depend square. |
Index Terms - Wireless Sensor Networks, Local Positioning, MDS Algorithm and Square Method |
Proposed GIS model for Natural Resources Development and Environment Management |
Pages: 78-81 (4) | [Full Text] PDF (252 K) |
N. S. Goje and U. A. Lanjewar |
Institute of Management & Research, Kamptee, Nagpur, India Institute of Computer Studies & Research, VMV Commerce, JMT Arts & JJP Science College, Wardhaman Nagar, Nagpur-India |
Abstract - A convenient way to define a Geographical Information System (GIS) is to say that it is a set of computer tools capable of storing, manipulating, analyzing and retrieving geographic information. Several questions arise from this definition. What exactly is geographic information; and what is meant by the sentence 'storing, manipulating and analyzing and retrieving geographic information'? Both these questions are the cause of much discussion and research in the GIS society. This paper will touch upon the first question, and will discuss thoroughly an approach for GIS model for Natural Resources Development and Environment Management. In this context GIS model can be regarded as a subset of 'manipulating and analyzing geographic data'. In this paper we proposed a GIS model which contributed in Natural Resources Development and Environment Management. |
Index Terms - Geographic Information System, Natural Resources Development, Environment Management, Image Processing, Data Warehouse, Operation Source Data and OLAP Tool |
Performance Analysis of Optimized FEC Based on IEEE 802.16d |
Pages: 82-85 (4) | [Full Text] PDF (402 K) |
Neha and Abhijeet Kumar |
Electronics and Communication Department, M. M. Engineering College, M. M. University, India |
Abstract - WiMAX is one of the most promising IEEE 802.16 standards. This paper carries out a study of IEEE 802.16d OFDM layer and mainly concentrates on the Forward Error Correction (FEC) based on IEEE 802.16 standard. Forward error correction coding is a system of error control for data transmission. FEC is accomplished by adding redundancy to the transmitted information using a predetermined algorithm. It may improve the reliability of transmitted data. I will verify this result through MATLAB (Version 7.8). |
Index Terms - WiMAX, IEEE 802.16, SUI and OFDM |
A Learning Nested Block Approach to Web Pages |
Pages: 86-93 (8) | [Full Text] PDF (430 K) |
U. Vinod Kumar, Shaik Yacoob, Sudam Sekhar Panda and Ch. Rajaramesh |
Regency Institute of Technology, Yanam |
Abstract - Content of the web page is the textual and graphical information that related to the topic of the page, which is the focus of web data mining and information retrieval. For web pages, the page content is the target of word-segmentation and indexing for search engine, corpus collection of news, reviews, blogs, etc. for knowledge management researches. Extracting content of the web pages correctly and efficiently improves the accuracy of following analysis for it significantly reduces the noise in the pages, and also alleviates the workload of indexing and segmentation. In this works, no uniform approach or model is presented to measure the importance of different nested portions in web pages. Through a user study, we found that people do have a consistent view about the importance of blocks in web pages. In this paper, we investigate how to find a model to automatically assign importance values to nested blocks in a web page. We define the block importance estimation as a learning problem. First, we use the VIPS (Vision-based Page Segmentation) algorithm to partition a web page and block in the webpage into semantic blocks with a hierarchy structure. Then spatial features (such as position, size) and content features (such as the number of images and links) are extracted to construct a feature vector for each block and nested blocks. . Based on analyzing the features of the pages, this approach could effectively extract contents from web pages. Experiments show good results comparing to related works. |
Index Terms - Block Importance Model, page Segmentation, Web Mining and Classification |
Performance Analysis of Induction Motor Using Artificial Intelligent Techniques |
Pages: 94-100 (7) | [Full Text] PDF (590 K) |
Vivek Dutt and Rohtash Dhiman |
Electrical Engineering Department, D.C.R.U.S.T, Murthal, Sonepat-Haryana, India |
Abstract - In this paper, we have demonstrated the performance of induction motor (IM) using artificial intelligent techniques: neural networks (NN) and fuzzy logic control. A simulation model using Matlab software is designed to get the performance analysis of induction motor (IM)in the form of speed and stator currents using direct torque control method. This simulink-model consists of induction motor with a switching table on the basis of direct torque control method. All the results are analyzed with the help of simulink-model designed which shows that these intelligent techniques applied on the direct torque control method, give effective and optimized performance of induction motor. It has been found that artificial neural networks and fuzzy logic are best optimization techniques for controlling the performance of induction motor as compared to direct torque control method alonely. |
Index Terms - ANN, DTC, Fuzzy Logic Control, Induction Motor, Switching Table and Space Vector Modulation (SVM) |
Design a Secure Multiparty Computation System for Privacy Preserving Data Mining |
Pages: 101-105 (5) | [Full Text] PDF (251 K) |
R. Sugumar, C. Jayakumar and A. Rengarajan |
Department of IT, R.M.D. Engineering College, Chennai, Tamilnadu, India Department of CSE, R.M.K.Engineering College, Chennai, Tamilnadu, India Department of IT, Sree Sastha Institute of Engineering and Technology, Chennai, Tamilnadu, India |
Abstract - Privacy-preserving data mining considers the problem of running data mining algorithms on confidential data that is not supposed to be revealed|even to the party running the algorithm. The aim of a secure multiparty computation task is for the participating parties to securely compute some function of their distributed and private inputs.Privacy is one of the most important properties of an information system must satisfy, in which systems the need to share in-formation among different, not trusted entities, the protection of sensible information has a relevant role. Thus privacy is becoming an increasingly important issue in many data mining applications. For that privacy secure distributed computation, which was done as part of a larger body of research in the theory of cryptography, has achieved re-markable results. These results were shown using generic constructions that can be applied to any function that has an efficient representation as a circuit. A relatively new trend shows that classical access control techniques are not sufficient to guarantee privacy when data mining techniques are used in a malicious way. Privacy preserving data mining algorithms have been recently introduced with the aim of preventing the discovery of sensible information. In this paper we will describe the implementation of cryptography in that data mining for privacy preserving. |
Index Terms - Privacy Preserving, Cryptography, Distributed Data Mining and Secure Multiparty Computation |
Naive Bayesian Classification Approach in Healthcare Applications |
Pages: 106-112 (7) | [Full Text] PDF (507 K) |
R. Bhuvaneswari and K. Kalaiselvi |
Department Of CSE,
Saveetha Engineering College Chennai, India |
Abstract - In data mining, classification is a form of data analysis that can be used to extract models describing important data classes. Two of the well known algorithms used in data mining classification are Backpropagation Neural Network (BNN) and Naïve Bayesian (NB). Bayesian approaches are a fundamentally important DM technique. Given the probability distribution, Bayes classifier can provably achieve the optimal result. Bayesian method is based on the probability theory. Bayes Rule is applied here to calculate the posterior from the prior and the likelihood, because the later two is generally easier to be calculated from a probability model. Statistics provide a strong fundamental background for quantification and evaluation of results. However, algorithms based on statistics need to be modified and scaled before they are applied to data mining. |
Index Terms - Decision Support Systems, Naive Bayesian Classification (NBC) and Health Care |