|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
February 2016 | Vol. 84 No.1 |
Title: |
HIGH-LEVEL DESIGN FOR REAL TIME IMPLEMENTATION OF CSC ALGORITHM ON FPGA
USING MATLAB & SIMULINK SIMULATION |
Author: |
MOHAMMED ALAREQI , R.ELGOURI , A.ZEMMOURI1, L.HLOU |
Abstract: |
This paper presents a methodology for very high-level image processing design
and implementation real-time image processing applications on a re-configurable
logic platform field programmable get array. This methodology aims to improve
the design verification efficiency for such complex system. It presents a design
and develops for two colors space converters (RGB to YCbCr and YCbCr to RGB),
and application. The proposed technique was implemented using Xilinx System
Generator in MATLAB/SIMULINK environment on field programmable get array. To
improve the implementation time, Xilinx system generator software for generating
“hardware description language code” from a high-level MATLAB description has
been used. A field-programmable gate array, Provide a major alternative in
hardware platform scenario because of its reconfiguration character, marketing
speed and low price and it provides us a custom hardware platform where we can
design and develop the required algorithm and architecture by using different
built-in a custom logic, Digital signal processing cores and automatic “hardware
description language code” generation facility. A field-programmable gate array
offer high performance in terms of processing speed and high chip density, thus
suiting every conceivable application, whether small or high end, yet remaining
cost-effective. The objective is to have a converter, which will be useful for
number of applications due to the diversity of computers, Internet and a wide
variety of video devices, all using different color representations, is forcing
the digital designer today to convert between them. Performance of these design
implemented in FPGA card XUPV5-LX110T. |
Keywords: |
Color Space Converters (CSC), Field Programmable Get Array (FPGA), Xilinx System
Generator (XSG). |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
VISION BASED INSPECTION SYSTEM FOR MISSING FOOTPRINT DETECTION ON PRINTED
CIRCUIT BOARDS |
Author: |
MARZIEH MOGHARREBI, SHAHNORBANUN SAHRAN, MEI CHOO ANG, ANTON SATRIA
PRABUWONO |
Abstract: |
An automated visual inspection system is needed to inspect missing component
footprints on bare Printed Circuit Board (PCB). Missing component footprints on
the PCB will result in lack of electronic components. Since the surface of
electronic products is more compact and complex, the inspection task has become
more difficult in order to achieve the required quality of finished products.
The general aim of this research is to develop a real time automated visual
inspection system to identify missing footprints on PCB. The specific objectives
are: to implement production rules and Fuzzy logic techniques for quality
classification of footprints. An experimental setup for a real time AVIS which
consists of hardware and software frameworks has been developed. The hardware
framework included a web camera, four florescent lamps, a conveyor belt, and the
software framework included Image Processing System (IPS). The Region of
Interest (ROI) of the PCB would be transferred to IPS under suitable light and
specific speed of conveyor belt. The footprints are segmented based on their
coordination. Feature extraction will be accomplished to classify the
uncompleted footprints on PCBs. Ultimately, the production rule, Mamdani, and
Sugeno fuzzy classifiers are implemented to classify the footprints. The
experimental result confirmed that the proposed AVIS has a high accuracy rate. |
Keywords: |
Printed Circuit Board (PCB); Image Segmentation; Feature Extraction; Fuzzy
Logic; Automated Visual Inspection |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
RECOGNITION OF OTOLITHS HAVING A HIGH SHAPE SIMILARITY |
Author: |
EL HABOUZ YOUSSEF , ES-SAADY YOUSSEF, EL YASSA MOSTAFA, MAMMASS DRISS,
NOUBOUD FATHALLAH, CHALIFOUR ALAIN, MANCHIH KHALID |
Abstract: |
In recent years, several approaches have been proposed in the recognition of
fish species using the otolith shape. Some techniques give good recognition
results when otoliths have different forms, but when we have a high shape
similarity, the recognition is not completely successful. In order to ensure a
sustainable exploitation of fisheries resources, and help scientists to detect
the poor of certain demersal stocks in their countries, we present in this paper
a new approach for recognition of fish species by image analysis based on the
extraction of the median distance of otoliths contour. To show the efficiency of
the approach proposed, we have tested this approach on an otoliths database
which have a high similarity in external otolith form. This database of otoliths
is from Moroccan Atlantic Ocean and it contains 162 otoliths image of three
species of the genus Merluccius (Merluccius merluccius, Merluccius polli and
Merluccius senegalensis). The correct classification rate obtained was 96%. |
Keywords: |
Otoliths, Shape Analysis, High Shape Similarity, Pattern Recognition,
Classification. |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
SOLVING A MULTI-DEPOT INVENTORY ROUTING PROBLEM ARISING IN THE MOROCCAN
FOOD MARKET |
Author: |
JAMAL LMARIOUH, DRISS BOUAMI, ANOUAR JAMALI, ABDESLAM MOZHER |
Abstract: |
In this paper, a real-life distribution problem faced by a Moroccan food company
is solved. This problem is combining inventory and routing decisions.
Vendor-managed inventory system is proposed to manage the company’s
distribution. Transportation and inventory costs are simultaneously minimized
which is known as the Inventory-Routing Problem (IRP). In our real-life problem,
several plants deliver a set of customers with several types of products which
can be defined as a multi-depot, multi-product and multi-vehicle IRP. A fleet of
homogeneous vehicles is used to deserve customers and the inventory costs are
paid at both the plant and at the customers. We propose a mixed integer linear
program for this problem. Computational tests were carried out in four real-life
instances which concern representative periods for the company. The results show
the effectiveness of our approach. |
Keywords: |
Inventory-Routing Problem; Vendor Managed Inventory; Multi-Depot; Multi-Vehicle;
Multi-Product |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
INTELLECTUAL PROPERTY (IP) MANAGEMENT AND MONITORING PROTOTYPE SYSTEM FOR
UNIVERSITY INNOVATION CENTRE |
Author: |
KAIRULANUAR AB KADIR, JUHANA SALIM |
Abstract: |
Knowledge is considered a principal economic asset for the knowledge economy in
which the management and protection of the knowledge assets are critical to an
organization strategy. The knowledge assets which exists in various
organizations including the education industry has to be protected through
efficient management of the intellectual property rights (IPR). Universities
around the world have realized that there is a need to improve the IPR
monitoring and management to respond to the internal and external expectations.
Research outcomes which are scattered in various faculties of the university can
be better managed through the use of information technology (IT) specifically
through an Intellectual Property (IP) management system. This paper highlights
the concepts for managing IP through an IPR management and monitoring framework.
This framework will serve as a guideline to enable efficient IPR management
tailored to the specific environment of the University’s Innovation Centre that
is responsible for managing IPR for the university. A semi-structured interview
was conducted to the IP management unit of the university innovation center to
understand the as-is scenario and challenges in managing IPR in the university.
Results of the interview were analysed and used as a basis to develop a
framework for the IP management and monitoring system. The framework comprises
of IP Awareness, IP Mining and IP Screening processes. In order to verify the
user’s acceptance of the framework, a think-aloud technique was used to validate
the concepts that was proposed in the framework through a prototype system.
Qualitative data analysis results indicated that the IP management and
monitoring framework and prototype system provides significant improvement to
the existing IP management issues and work practices. The framework was
carefully designed to enable relevant information pertaining to IP to be
acquired, stored, managed and deployed in a manner that is more efficient based
on effective information management concepts. |
Keywords: |
Intellectual Property, Intellectual Property Right, Intellectual Property
Management, Intellectual Property Monitoring, Knowledge Assets |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
NEW METHOD TO IMPROVING HYDROGEN PRODUCTION BY AN ADAPTIVE PHOTOVOLTAIC
SYSTEM AND P&O ALGORITHM |
Author: |
SANAE DAHBI , ABDELHAK AZIZ , NAIMA BENAZZI, MOHAMED ELHAFYANI |
Abstract: |
The idea of hydrogen production by water electrolysis from renewable sources is
one of the most obvious methods. It could not only lead to a significant
reduction in greenhouse gas emissions, but also to increase the security of
energy supply due to the method of clean storage. In this paper, we have
borrowed a new method for hydrogen production by adapting the electrolysis to a
photovoltaic (PV) source, in order to produce the maximum of hydrogen. The
electrolysis is considered as well as an electrical load connected to the
photovoltaic system via a DC/DC buck converter, having a system control tracking
of maximum power point MPPT P&O, which allows the maximization and control of
the power transferred to the electrolysis. Furthermore, this study shows that
the maximum hydrogen production is not related to the quantity of water to be
electrolyzed, but the need to control the water flow which enters electrolysis
according to variations of the power arising from weather changes. The overall
results show that for constant power, water flows are simulated by injecting
constant resistive loads. |
Keywords: |
Hydrogen, Electrolysis Of Water, Photovoltaic Systems, MPPT Control, P&O, DC-DC
Converter, Electric Charge, Water Flow |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
BROADCAST BY FLOODING IMPROVEMENT IN IEEE 802.11S BASED WIRELESS MESH NETWORKS |
Author: |
YOUSSEF SAADI, BOUCHAIB NASSEREDDINE, SOUFIANE JOUNAIDI |
Abstract: |
Network wide broadcasting in IEEE 802.11s based wireless mesh network provides a
considerable amount of broadcast traffic that may lead to the broadcast storm
problem and consequently degrade the network performance. Contention, collisions
and redundancy are features of the broadcast storm problem that may hinder the
transmission of unicast data packet if not a carefully designed scheme for
managing broadcast traffic is adopted. In this paper, we develop and enhance our
approach, namely Control of Broadcast Forwarding (CBF), which is a self-pruning
method using 2-hop neighborhood knowledge to make decision on forwarding or
filtering the received broadcast messages. We perform a deeply investigation
including a comparison between CBF and the most suitable broadcasting techniques
for wireless mesh networks according to various simulation environments.
Simulations results reveal that CBF achieves comparatively better performance in
term of average end to end delay and reachability. The only cost brought by CBF
is a slightly increase in overhead and consequently in the number of
retransmitting nodes. |
Keywords: |
Wireless Mesh Network, IEEE 802.11s, Flooding, Broadcasting Protocols, Broadcast
Storm |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
A PERCEPTUAL STUDY ON FACTORS OF MEDICAL DATA SECURITY IN INDIAN
ORGANIZATIONS |
Author: |
NIRMALYA CHAKRABORTY, DR. (MS) VANDNA SHARMA, DR. (MS) JAYANTHI RANJAN |
Abstract: |
Objective of the research: Risk management in the IT world is quite a complex,
multi faced activity, with a lot of relations with other complex activities
(Rainer et al, 1991; Bahli and Rivard, 2005). The purpose of the study is to
find out the major factors impacting medical data security in the Indian
organizations.
Current state of Research Area: Information security awareness is considered
very vital because of the fact that security techniques as well as procedures
are vulnerable to misuse and non-usage by the end users (see Ceraolo, 1996; and
Straub, 1990). Medical data too is a crucial element of the overall information
system of an organization. Any breach in the security of medical data may have
detrimental effects on the organizations. Straub and Welke (1998) have argued
that security breaches are far more regular and destructive than it is usually
though to be. This is mainly because of the fact that the managers are generally
not concerned with issues related to information security and unaware of the
nature of risk. Thus there exists an immediate need to secure medical data and
ensure its reliability and availability at the right time and to the right
person.
Methodology: For the quantitative study a survey has been conducted with the
help of a close ended questionnaire. The responses were collected from employees
of companies operating in the Healthcare, Telecom industry, and IT industry in
India. The questionnaire was circulated in the physical mode. Convenience
sampling was deployed in order to select the respondents. The validity of the
constructs was assessed by means of factor analysis. Descriptive as well as
inferential statistics like t-test, ANOVA have been used for obtaining the
desired results.
Conclusion : The study also highlighted that there are multiple constructs that
should be considered while measuring the overall information security within an
organization. These constructs or factors should be evaluated both individually
as well as collectively in order to make the information secure and reliable.
Limitations: One of the biggest limitations of the current study is that it is
confined to only three sectors namely Healthcare, Telecom & IT. Further we have
studied only one country i.e. India.
Scope for further Research: medical data management practices in advanced as
well as in emerging economies differ a lot. Such differences can be studied to
provide a comprehensive framework of medical data management. |
Keywords: |
Medical Data, Risk Analysis, Factor Analysis, Information Security. |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
A PROPOSAL FOR MITIGATION OF GRAY HOLE ATTACK IN WIRELESS MESH AD-HOC
NETWORKS USING S-DSDV |
Author: |
K.SUMANTH, DR.SRIDEVI GUTTA, DR. SYED UMAR, DR.K.KIRAN KUMAR, DR. MD ALI HUSSAIN |
Abstract: |
Wireless Mesh Networks have its desired features like Self-organization and
self-configuration it provides advantages for Wireless Mesh Networks like market
coverage, scalability, good reliability and low upfront cost. These networks
have an effective quality that they are ease of scalability with heterogeneous
multi-hop with very low cost. It is a mobile which is of connectionless-oriented
and vigorous traffic of the routed packets. These infrastructure network forms
the multi-hop transmission of data packets from peripherals and forms the
multiple chains of WLANS. In Wireless Mesh Networks, security is a limitation
and which can be overhead easily. Small analysis of this had explained in this
paper like security threats such as GRAY HOLE ATTACK [GHA] in DSDV routing
protocol. GHA is a special type of DOS attack which is similar to black hole
attack which will change the state to various states like selective packet
dropping is challenging one. With the effect of this GHA there will be impact on
various parameters like E2E delay, throughput etc., A variety of Gray Hole
attack solutions have been proposed in the literature. We surveyed and
identified different detection and mitigation techniques of Gray Hole attack and
explored a new concept that supports the network in various ways with detecting
malicious activities of any node in the network and which will increases the
network performance in parameters such as packet drop rate, throughput,
normalized routing overhead and PDR |
Keywords: |
MANETS, DSDV, Security Threats, Gray hole Attacks, Routing Protocols, SEAD, S-DSDV |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
SENTIMENT ANALYSIS SYSTEM AND CORRELATION ANALYSIS ON HOSPITALITY IN BALI |
Author: |
I GEDE SUARDIKA |
Abstract: |
Bali is one of the favorite tourist destinations for foreign visitors who are
currently experiencing over-capacity accommodation facilities. One way to
stabilize between positive and negative impacts is by improving tourism
marketing which can be done by increasing the number of rating and review on
online media. Review valence (positive or negative review) is one of the aspects
that affect consideration to a hotel guest. Classification to review valance can
be done with sentiment analysis. In this research, sentiment analysis to hotel
review is conducted by Naïve Bayes Method. The dataset used is reviews of some
hotel in some areas in Bali are selected based on its ranking on Tripadvisor.
Review of several hotels in several areas in Bali are selected based on its
ranking on Tripadvisor is used as dataset. A web-based system is built to
perform sentiment analysis. Tests conducted to determine the level of
classification accuracy. Correlation analyzes were conducted to determine
whether there is a relationship between ratings with the classification results.
Sentiment Analysis System can be built using the PHP programming language, MySQL
database, and Naïve Bayes classifier algorithm with average accuracy level is
81%. Correlation analysis proved the hypothesis that the lower rating of the
hotel on the TripAdvisor website, the greater percentage of negative sentiment.
Results of tests of significance of the correlation coefficient indicates that
the data and coefficients obtained in the sample used in this study can be
generalized to the population. |
Keywords: |
Sentiment Analysis System; Hotel Reviews; Correlation Analysis |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
VELOCITY INTEGRATION BASED PIPELINE MAINTENANCE USING WSN |
Author: |
ABDULAZIZ S. ALMAZYAD, QIANG MA |
Abstract: |
Pipeline is used worldwide daily to transfer liquid. This process covers large
area and may pass through inhospitable environment and face many accidents such
as leakage causing lose of resources and may cause hazards. It is necessary to
monitor the pipeline system in order to prevent the waste from leakage, and at
the same time to calculate the accurate location of the leakage so that it will
be easy to maintain under the hot weather especially in desert. Thus we propose
this new algorithm called Velocity Integration Method (VIM) for locating of the
leakage. This method is easy to implement with lower cost and with high accuracy
comparing to other approaches currently exist. |
Keywords: |
Pipeline, Leakage, Solar Unit, Velocity Integration Method (VIM), Trapezoidal
Area Method |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
AVGSIM: RELEVANCE MEASUREMENT ON MASSIVE DATA IN HETEROGENEOUS NETWORKS |
Author: |
DING XIAO, XIAOFENG MENG, YITONG LI, CHUAN SHI, BIN WU |
Abstract: |
Heterogeneous information network includes multiple types of objects and
multiple types of links. Compared with Homogeneous information network which
only contains objects of the same type, heterogeneous information network has
more abundant semantic information. Heterogeneous information network is very
common in our daily life, such as social networks. Similarity search in
heterogeneous information network can mine more precise and accurate knowledge.
However, real social networks such as Sina Microblog and Facebook have a huge
amount of data, which significantly increases the difficulty of similarity
search. Unfortunately, many existing methods can only measure similarities
between objects of the same type, moreover, the limitation of computing memory
size results in quite limited measurable data amount, thus they can't be
actually applied to real relation networks. In this paper, we propose a novel
measure, called AvgSim, which can measure similarity between objects at the ends
of any searching path in heterogeneous information networks. In addition, we
apply parallel computing method in the realization of AvgSim in order to enable
the handle of massive data and the application in real networks. Experiments on
real datasets verify the effectiveness and efficiency of this novel algorithm. |
Keywords: |
Heterogeneous Information Network, Similarity Search, Random Walk, MapReduce |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
IDENTIFICATION OF A PRODUCTION SYSTEM USING HAMMERSTEIN-WIENER AND NARX
MODELS |
Author: |
HICHAM FOURAIJI, BAHLOUL BENSASSI |
Abstract: |
In this paper we present a new approach to modeling dynamic production systems
with discrete flow. This method is based on the automatic knowledge domain, in
order to build a mathematical model that accurately formalizes the behavior of
the studied system. The approach adopted for this study is the parametric
identification of nonlinear systems (Hammerstein-Wiener system and NARX model).
The production system studied will be considered as a black box, which means
that the inputs and outputs data of the system will be used to identify the
internal system parameters. |
Keywords: |
Production System, Hammerstein-Wiener Model, NARX Model, Parametric
Identification |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
MODEL OF AN ADAPTATION AND INTERFACING SOA MIDDLEWARE FOR THE INFORMATION
SYSTEMS INTEROPERABILITY |
Author: |
KHALIFA MANSOURI, BOUCHAÎB RIYAMI, MOHAMED YOUSSFI, OMAR BOUATTANE |
Abstract: |
Today, the IT becomes the key pillar for effective structural and organizational
management. All the scenarios related to the activity, the communication and the
management of current businesses are made of information systems (IS). Besides,
the need of companies cooperation converge them to exchange and communicate
information about their information systems. This interconnection faces many
complex challenges especially when it comes to real-time exchange or mergence of
all or parts of IS connected. The aim of the model driven engineering (MDE) and
the model driven architecture (MDA) is to bring good solutions to
interoperability challenges between companies and organizations IS. They offer
several significant improvements in the development of complex systems and
enable to focus on abstract goals independent of technical platform. Moreover,
service-oriented architecture (SOA) has established for some time as a good
methodology for encapsulation of the complexities of the various components of
IT as services, to implement major motivations such as: business alignment,
technology neutrality and automation of business processes. In this paper, we
propose a middleware layer composed of services, according to the SOA
architecture for the interoperability of IS. It is composed of several
transformation, integration, homogenization and adaptation services. |
Keywords: |
Interoperability, Middleware Layer, Information System’s Adaptation, BPMN, BPEL,
Reverse Engineering, ATL, BDD Anthology. |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
THE RESTORATION OF DEFOCUS IMAGES WITH LINEAR CHANGE DEFOCUS RADIUS |
Author: |
LUOYU ZHOU |
Abstract: |
T A novel approach is proposed to restore the defocus image with the linear
change defocus radius. Firstly, by studying the space-invariant defocus blurring
model, the space-variant defocus blurring model with the linear change defocus
radius is obtained. Then, a nonlinear coordinate transforms for blurred image is
used to convert the space-variant images blurring into space-invariant blurring
images, which is easier restored. The experimental results demonstrate the
restoration image has more details and fewer ringing. The restoration effect of
the proposed method reveals its practicability in the space-variant defocus
image restoration. |
Keywords: |
Defocus Image, Linear Change Defocus Radius, Space-Variant Blurring, Nonlinear
Coordinate Transforms |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
SOFTWARE APPLICATION DESIGN AND 3D MODELING FOR EVACUATION OF PEOPLE FROM
EDUCATIONAL INSTITUTION |
Author: |
E.N. AMIRGALIYEV, А.U. KALIZHANOVA, A. KH. KOZBAKOVA, G.B. KASHAGANOVA, ZH.S.
AITKULOV, O.V. ZHIRNOVA |
Abstract: |
Evacuation is one of people protection means. Evacuation of people from
dangerous areas. The urgency of the evacuation as a way to protect the
population in war and peace times over recent years, has not decreased, but
increased. The practice of modern life suggests that the population is
increasingly exposed to the dangers of natural disasters, accidents and
catastrophes in industry and transport. The article is devoted to the design of
software applications and 3D modeling for the evacuation of people in case of
emergency. The article deals with the general provisions on evacuation and the
main components of the designed application software and modeling. |
Keywords: |
CASE Means, Design, Evacuation, Software, Software Design, Use Case, Game
Engine. |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
Title: |
REASONING ON STARVATION IN AODV USING ABSTRACT STATE MACHINES |
Author: |
ALESSANDRO BIANCHI, SEBASTIANO PIZZUTILO, GENNARO VESSIO |
Abstract: |
Abstract State Machines (ASMs) are very helpful in analyzing critical and
complex systems, but they lack of inherent, domain-independent characterizations
of computationally interesting properties. Our long-term research aims at
providing an ASM-based characterization of the starvation-freedom property. To
this end, in the present paper the Ad-hoc On-demand Distance Vector (AODV)
routing protocol for Mobile Ad-hoc NETworks (MANETs) is modeled through ASMs,
and starvation is studied. This experience suggests us to focus on vulnerable
rules as the key issue that drives the risk of starvation within the ASM
framework. |
Keywords: |
Abstract State Machines, Verification, Starvation, MANETs, AODV |
Source: |
Journal of Theoretical and Applied Information Technology
10th February 2016 -- Vol. 8. No. 1 -- 2016 |
Full
Text |
|
|
|