Volume 5, Issue 7, July 2014

A New Hybrid Model for Predicting Change Prone Class in Object Oriented Software
Pages: 1-6 (6) | [Full Text] PDF (400K)
Deepa Godara and R.K. Singh
Computer Science Engineering, Uttarakhand Technical University, Dehradun, India
Electronic and Communication Engineering, Uttarakhand Technical University, Dehradun, India

Abstract -
In the field of software engineering, during the development and maintenance of software, the information on the classes which are more prone to be changed is very useful. Developers can make more flexible software by modifying the part of classes which are more sensitive to changes.The incessant changes effected in software every day have assumed such an alarming proportion causing untold and unimagined paradoxes that it is highly essential to initiate instant and immediate steps to balance this blitz. It does not mean that no endeavor has been made in the bye-gone era to tackle the issue. In fact, several methods to solve this dilemma were introduced in the past by predicting the changes in the software. To handle this problem with an eye on good prediction accuracy, a new hybrid model is introduced in our paper. Our proposed model combines features such as behavioral dependency generated from UML diagrams, execution time and trace events generated from source code to predict change prone class. The rationale behind this approach is that in a well designed software system feature enhancement or corrective maintenance should affect a limited amount of existing code.
 Index Terms - UMl Diagrams, Change Prone Class and Behavioral Dependency
Comparative Study on 4G/LTE Cryptographic Algorithms Based on Different Factors
Pages: 7-10 (4) | [Full Text] PDF (546K)
Alyaa Ghanim Sulaiman and Imad Fakhri Al Shaikhli
Department of Information System KICT, International Islamic University Malaysia, Kuala Lumpur, Malaysia
Department of Computer Science KICT, International Islamic University Malaysia, Kuala Lumpur, Malaysia

Abstract -
Recently, (LTE) Long Term Evolution appeared as a robust technology to meet (4G) Fourth Generation cellular networks requirements. Apparently, there are three sets of cryptographic algorithms that work on LTE technology and each set based on core algorithm. Therefore, in this paper we are focusing on reviewing the three sets of the LTE cryptographic algorithms and their core algorithms and then comparing them based on different factors in order to understand their cons and pros and provide valuable information about LTE security.
 Index Terms - LTE, 4G, Cryptography and Algorithm
Timing Control Mechanism to Enhance Resource Allocation for Long-Reach OFDMA-PON based on TSDBA
Pages: 11-15 (5) | [Full Text] PDF (K)
Kazi Shafiqul Alam, Md. Abdullah Al Mamun and Arshad M. Chowdhury
Department of EECS, North South University, Bangladesh

Abstract -
The research initiatives addressed in this paper are geared towards improving the performance of Orthogonal Frequency Division Multiple Access (OFDMA) based Long-Reach Passive Optical Network (LR-PON) through the Dynamic Time & Sub-carrier Allocation (DTSA) protocol which is supported by the E.U. FP7 project ACCORDANCE. In particular, the aim of the research undertaken is to enhance resource allocation by controlling the timing issue offered by Two-State Dynamic Bandwidth Allocation (TSDBA) by means of providing subscribers to fulfill associated bandwidth requirements on demand. By analyzing the limitation of DTSA protocol, our aim is to provide a variety of desirable characteristics, such as increased aggregate bandwidth and scalability, enhanced resource alloaction flexibility, longer reach, lower equipment cost/complexity, minimizing overhead delay and ensure increased network throughput.
 Index Terms - Orthogonal Frequency Division Multiple Access (OFDMA), Passive Optical Network (PON), Long-reach Passive Optical Network (LR-PON), Time Division Multiple Access (TDMA), Wavelength Division Multiplexing (WDM), Dynamic Time & Sub-carrier Allocation (DTSA) and Two-State Dydnamic Bandwidth Allocation (TSDBA)
Crosstalk Reduction Algorithms codes in Multiplexer/Demultiplexer Based Array Waveguide Grating in Dense Wavelength Division Multiplexing
Pages: 16-21 (6) | [Full Text] PDF (461K)
S. Elfaki and A. Abdel Kareem
School of Electronic, Collage of Engineering, Sudan University of Science & Technology (SUST), Sudan

Abstract -
This paper proposes an algorithms codes whereby a multiplexer/demultiplexer formed of cascaded AWG stages results in total channel accumulated crosstalk reduction which allows for more DWDM channel count. Assuming the transmittance in linear units for each cascade stage, and that each stage has a Gaussian spectral response envelope, obtained an equations of two-stage and three-stage were transformed into Matlab programs these programs transferred into an algorithms steps in order to be used by any other program languages.
 Index Terms - Accumulated Crosstalk, Dens Wavelength Division Multiplexer, Transmittance and Array Waveguide Grating
Fuzzy Logic Based Developed Distributed Energy-Efficient Clustering (DDEEC) Algorithm for Optimizing Energy Management in Heterogeneous WSNs
Pages: 22-28 (7) | [Full Text] PDF (K)
Anu Rathee, Indu Kashyap and Kavita Choudhary
Computer Science Department Jagannath University
Computer Science Department, Manav Rachna International University

Abstract -
Network lifetime can be improved by proficient clustering algorithms in heterogeneous wireless sensor networks. Coordination through cluster head selection provides efficient data aggregation that reduces communication overhead in the network. In this paper, we propose a fuzzy logic approach based DDEEC clustering algorithm which aims to prolong the lifetime of nodes in heterogeneous WSNs. We compare this algorithm with the PSO based DDEEC algorithm and original DDEEC algorithm according to the parameters of first node dies at different rounds and energy-efficiency metrics. The efficiency of proposed optimized fuzzy algorithm is proved by the Matlab experimental results. Simulation results exhibits that the proposed algorithm has higher energy efficiency and can improve life span of a node and data delivery at the base station over its comparatives.
 Index Terms - Heterogeneous WSN, Cluster Head, Fuzzy Logic, DDEEC, Energy Conservation and Network Lifetime
Text Feature Weighting for Summarization of Documents Bahasa Indonesia by Using Binary Logistic Regression Algorithm
Pages: 29-33 (5) | [Full Text] PDF (445K)
Aristoteles, Widiarti and Eko Dwi Wibowo
Department of Computer Science, University of Lampung, Indonesia
Department of Mathematics, University of Lampung, Indonesia

Abstract -
The research was conducted the text feature weighting on Indonesian text by using binary logistic regression algorithms. Features of the text using text features eleven [1]. Eleven text features used are sentence position, positive keyword negative keywords, similarity between sentences, sentences that resemble the title sentence, sentences containing names of entities, sentences that contain numeric data, length of sentence, the connection between sentences, the sum of the weight of the connection between sentences, and sentence semantics. The purpose of this research was to conduct the optimization of summarization text by using binary logistic regression algorithm and the influence of the eleven features text by using binary logistic regression algorithms. Binary logistic regression algorithm used in compression rate 30%. The results of this research show the accuracy of compaction on the 30% compression rate amount 91.1% and on ”positive keyword (f2)” can represent the eleven text features to perform compaction of text.
 Index Terms - Binary Logistic Regression Algorithm, Compression Rate and Text Features