|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
May 2016 | Vol. 87 No.3 |
Title: |
AFRICAN BUFFALO OPTIMIZATION AND THE RANDOM-IZED INSERTION ALGORITHM FOR THE
ASYMMETRIC TRAVELLING SALESMANS PROBLEMS |
Author: |
JULIUS BENEOLUCHI ODILI1, MOHD NIZAM MOHMAD KAHAR, A. NORAZIAH, ESTHER ABIODUN
ODILI |
Abstract: |
This paper presents a comparative study of the African Buffalo Optimization
algorithm and the Random-ized Insertion Algorithm to solving the asymmetric
Travelling Salesman’s Problem with the overall objec-tive of determining a
better method to solving the asymmetric Travelling Salesmans Problem instances.
Our interest in the asymmetric Travelling Salesmans Problem (ATSP) is borne out
of the fact that most practical daily-life problems are asymmetric rather than
symmetric. The choice of the Random Insertion Algorithm as a comparative
algorithm was informed by our desire to investigate the general belief among the
scientific community that Heuristics being mostly problem-dependent algorithms
are more efficient that metaheuristics that are usually general-purpose
algorithms. Moreover, both the metaheuristic, the African Buffalo Optimization
and the Heuristic, Randomized Insertion Algorithms hold some of the best results
in literature in solving the ATSP. Similarly, both methods employ different
search techniques in attempting solutions to the ATSP: while the African Buffalo
Optimization uses the modified Karp-Steele technique, the Randomized Insertion
employs random insertion mechanism. After investigating all the 19 benchmark
ATSP datasets available in TSPLIB, it was discovered that the Randomized
Insertion Algorithm achieves slightly better result to the problems but the
African Buffalo Optimization is much faster. |
Keywords: |
Heuristics, Metaheuristics, Asymmetric Travelling Salesmans Problem, Randomized
Insertion Algorithm, African Buffalo Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
A FEEDBACK BASED PREDICTION MODEL FOR REAL-TIME WORKLOAD IN A CLOUD |
Author: |
BABAK ESMAEILPOUR GHOUCHANI, AZIZOL ABDULLAH, NOR ASILA WATI ABDUL HAMID, AMIR
RIZAAN ABDUL RAHMAN |
Abstract: |
Most of the distributed systems such as a cloud environment have a
nondeterministic structure, and it would cause a serious problem to perform
tasks with a time limit. Therefore, many prediction models and performance
analyzes being used in the cloud to determine environment for users.
Nevertheless, most of these models have a single objective for optimal resource
absorption. Which means, they considered just one objective, such as a time
limit and other issues are overlooked. In this paper, we proposed a novel model
in Cloud to determine environment for the real-time workload. We applied a
multi-objective model to absorb optimal resources under reasonable user cost and
maximum user sharing. Performance evaluation on CloudSim proves that the new
approach outperforms other existing, state-of-the-art methods. |
Keywords: |
Cloud Computing, Prediction Model, Time Series, Feedback Based Prediction Model,
Resource Provisioning |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
A MULTIPLE KNAPSACK APPROACH FOR ASSIGNMENT PROBLEM OF HUMAN RESOURCES |
Author: |
Said TKATEK, Otman ABDOUN, Jaafar ABOUCHABAKA, Najat RAFALIA |
Abstract: |
In this paper, we propose the assignment problem of resources humans
methodology by using the multiple knapsack approach to formulate the studied
problem, and solve it by using the genetic algorithm for obtaining the optimal
assignment of the new qualified employees that ensures the maximization the
productivity by introducing constraints corresponding to the cost of each posts,
and capacity of personnel in each service of enterprise. The personnel selected
can be transferred and diversifying their competencies and qualifications. This
study of this problem allows the managers of human resources to manage the
recruitment of qualified employees to occupy the posts in of enterprise for
improving the productivity. The multiple knapsack problems (MKP) is a more
complex variant of the 0 1 knapsack problem, an NP-Hard problem So, our problem
is difficult combinatorial problems Finally, a detailed algorithm based on the
GA will be presented as a method of solving our problem with a numerical example
to valid this work. |
Keywords: |
Multiple Knapsacks Problem, Assignment Problem, Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
BUILDING AN E-LEARNING SYSTEMS OWL ONTOLOGY BY EXPLORING THE UML MODEL |
Author: |
BOUCHRA BOUIHI, MOHAMED BAHAJ |
Abstract: |
The relevance of information in the field of e-learning is strongly requested.
The semantic web is the discipline that guarantees this relevance with its
ontology system. Since this trend is still evolving, we propose in this article
to bridge the gap between the semantic web and the software engineering by
making the ontology development closer to the widespread software engineering
community. We propose how to transform an e-learning UML class diagram into an
OWL ontology. This transformation is highlighted by the conversion of some UML
concepts like: class, instance, attributes, class identifier, inheritance,
association relationship and composition relationship. The added value of our
work is to propose to convert in a better way the UML class diagram features,
the inheritance and the composition relationships by exploring respectively
OWL-DL advanced features: the Value Partitions Design Pattern and the Collection
Ontology. The resulting ontology is designed by the open-source ontology editor
and framework for building intelligent systems Protege 4.3.0. |
Keywords: |
UML Model, OWL Ontology, E-learning, Value Partitions Design Pattern, The
Collection Ontology. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
CORRECTION OF INFLUENCES ON THERMOGRAPHIC MEASUREMENTS FOR NON-CONTACT
TEMPERATURE MEASUREMENT USING INFRARED THERMOGRAPHY |
Author: |
Faouaz JEFFALI, Bachir EL KIHEL, Abdelkarim NOUGAOUI, Abdelhamid KERKOUR-El MIAD,
Fabienne DELAUNOIS |
Abstract: |
The diagnostics failures of monitoring the condition of rotation machinery in
the industry are considered very significant to ensure the efficiency and safety
of production. However, many serious malfunctioning to the machine could easily
occur because of these failures, thus, a huge shortage in production. In this
domain, In fact, the most important installation faults lead to an increase of
temperature in specific areas. Infrared Thermography is a technique that has
been used regularly as a predictive device for the maintenance of electrical
installations. It is used around the field in order to evaluate the condition of
electrical systems and equipment. This article presents information about issues
that demand a specific focus during thermal tests of induction motor. Which are
presented as errors that could be made at the testing phase, and especially the
descriptions of the influences of parameters, on Thermographic measurements that
are obtained by a conversion of raw data to digital data by the use of Flir
Tools Software. |
Keywords: |
Thermography Camera, Moteur Asynchrone, Powder Brake, Effect Of Factors,
Temperature Measurement, Thermal Image. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
AN APPROACH FOR IDENTIFYING THE PRESENCE OF FACTOR IX GENE IN DNA SEQUENCES
USING POSITION VECTOR ANN |
Author: |
BIPIN NAIR B J, K SYED KHAMARUDHEEN, RANJITHA H S |
Abstract: |
Prediction of presence of genes in DNA sequences is of high importance in the
domain of bioinformatics and genetics. Identification of proper gene splice
junctions in DNA sequences is a difficult task. In our work, we have focused on
a gene called Factor IX, the absence of which causes a deadly disorder called
Haemophilia B. This paper proposes an approach for training the system to
identify a specific gene by providing relevant protein sequences and identifying
exact locations of splice junctions in DNA sequences. The algorithm proposed in
this work has yielded promising results with an accuracy of 96.8% in detecting
proper splice junctions for the given gene. |
Keywords: |
Haemophilia B, Factor IX, Position Vector ANN, Gene Prediction, DNA, Protein |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
ESSENTIAL KNOWLEDGE TRANSFER PROCESS MODEL TO SUPPORT DISASTER MANAGEMENT |
Author: |
HASNIZA YAHYA, MOHAMMAD NAZIR AHMAD, RADZIAH MOHAMAD, MOHD ZUHAILI MOHD RODZI |
Abstract: |
There is a lack of knowledge transfer modeling that focuses on the essence of
the knowledge transfer process. This paper aims to identify the processes that
are common and essential in the implementation of knowledge transfer from
multiple senders to one receiver using the star topology as the architecture.
This study extracts the actual processes involved during the flow of knowledge
from the source to the receiver identified from the literature review and
existing theories. The processes are identified as: acquire, convert, implement
and store (ACIS). The model is illustrated in a case study of flood management
in Malaysia. The utilization of the identified essential processes of knowledge
transfer will provide stakeholders with a concrete way of transferring knowledge
by standardizing the actual process of knowledge transfer. These processes may
be applied in various domains that use the star topology as the communication
architecture. |
Keywords: |
Knowledge Transfer, Knowledge Management, Knowledge Sharing, Disaster
Management, Flood Management |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
NOVEL GAP ANALYSIS FRAMEWORK FOR CLOUD HEALTH INFORMATION SYSTEMS |
Author: |
IRFAN SYAMSUDDIN |
Abstract: |
This study aims to propose a novel gap analysis framework that can be used to
identify any problems in Cloud Health Information Systems projects. Advance
implementation of cloud computing to improve Health Information Systems needs a
comprehensive gap analysis methodology considering many aspects associated with
the technology. The new gap analysis is derived from two widely used
methodologies namely ITPOSMO and ServQUAL. The way to integrate both techniques
is discussed along with how it could be easily applied by evaluators of Cloud
Health Information Systems projects. |
Keywords: |
Cloud Computing, Information Systems Evaluation, Gap Analysis, ITPOSMO, ServQUAL,
Cloud Health Information Systems. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
A NOVEL RANK BASED CO-LOCATION PATTERN MINING APPROACH USING MAP-REDUCE |
Author: |
M.SHESHIKALA, D. RAJESWARA RAO, R.VIJAYA PRAKASH |
Abstract: |
With the increase in spatial data analysis, the co-location patterns and its
dependencies are used to discover the complex patterns on spatial databases.
Most of the traditional spatial data mining techniques have been implemented
based on the assumption that the data is meaningful and clean. It is essential
to study the data integration issues along with spatial co-locating patterns.
Generally, spatial co-location mining algorithms are used to discover the
spatial objects and its dependencies among them. As the data size increases, the
co-location objects and its patterns are difficult to process on complex spatial
objects. In this paper, an optimized spatial co-locating pattern mining
framework was developed to discover the highly ranked correlated patterns using
the hadoop framework. This MapReduce model was used to minimize computational
time and space on complex spatial databases. Finally, the experimental results
on the complex spatial data are evaluated using the proposed framework and the
traditional hadoop based pattern mining models. |
Keywords: |
Spatial Dataset, Co-Location Models, Association Rules, Prevalence Threshold,
Mapreduce |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
MIGRATION OF A RELATIONAL DATABASE RDB TO AN OBJECT ORIENTED DATABASE OODB |
Author: |
ALAE EL ALAMI, MOHAMED BAHAJ, ILIAS CHERTI |
Abstract: |
The objective of this paper is to propose a solution to the migration of RDB to
OODB which is based on metadata and the principle of semantic enrichment to
extract different object principles including inheritance, aggregation, and
composition. Then, to achieve the transformation of the physical schema and to
establish the migration of data to the target database. This is done in an
automatic way, a prototype has been implemented that takes a RDB and converts it
to an OODB which is part of reverse engineering. Then, to realize the
relational-object data mapping that respects the passage by reference and the
different object principles. |
Keywords: |
RDB, ORDB, OODB, Semantic Enrichment, Schema Translation, Data Mapping,
Metadata, DB4O |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
OBJECT RECOGNIZER FOR ORGANIZING AND STRUCTURING UNSTRUCTURED DOCUMENTS USING
INTERROGATIVE KNOWLEDGE |
Author: |
ISKANDAR ISHAK, FATIMAH SIDI, MARZANAH A. JABAR |
Abstract: |
Knowledge in unstructured documents is lacking the structured characteristics;
therefore raising the problem of extracting answers when queried by simple
queries. This paper proposes the Interrogative Knowledge Object- (IKO-)
Recognizer that is able to model the extracted interrogative lexical constructs
from unstructured documents into ontological constructs. An experiment is
carried out to test performance of the IKO-Recognizer using quantitative
retrieval performance metrics of recall and precision. The result shows that the
extracted interrogative constructs is able to increase human understanding on
knowledge available in unstructured document. |
Keywords: |
Interrogative Knowledge, Unstructured Documents, Object Recognizer, Information
Retrieval |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
NEW ROBUST DESCRIPTOR FOR IMAGE MATCHING |
Author: |
KABBAI LEILA, ABDELLAOUI MEHREZ, DOUIK ALI |
Abstract: |
Nowadays, object recognition based on feature extraction is widely used in image
matching due to its robustness to different types of image transformations. This
paper introduces a new approach for extracting invariant features from interest
regions. This approach is inspired from the well known Scale Invariant Feature
Transform (SIFT) interest points detector and aims to improve the computational
efficiency of matching and object recognition while applying geometric and
photometric transformations. To do so, we replace the Histogram of Gaussian (HoG)
descriptor used in SIFT by other operators based on Local Binary Patterns (LBP),
Gabor filter and Pyramid of Histograms of Oriented Gradients (PHOG). The novelty
of this work is the construction of several descriptors based on Gabor, PHOG and
LBP functions. Leading to seven new descriptors based on several combinations of
the three proposed functions LBP, Gabor and PHOG at different layers. The
performance of the proposed descriptors is evaluated using the recall vs.
1-precision curves and the average Areas Under Curve (AUC) metrics. Experiments
show that the proposed descriptor called Histogram of LBP, Gabor and PHOG (HLGP)
achieves more stable and robust results. Experimental evaluations demonstrate
that HLGP outperforms the SIFT and the recent state-of-the-art descriptors. |
Keywords: |
Scale Invariant Feature Transform (SIFT), Local Binary Patterns (LBP), Pyramid
of Histograms of Oriented Gradients (PHOG), Gabor, image matching, local
descriptor |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
DECOMPOSING AND SOLVING CAPACITATED VEHICLE ROUTING PROBLEM (CVRP) USING
TWO-STEP GENETIC ALGORITHM (TSGA) |
Author: |
MUHAMMAD LUTHFI SHAHAB, DARYONO BUDI UTOMO, MOHAMMAD ISA IRAWAN |
Abstract: |
Capacitated vehicle routing problem (CVRP) is one of the vehicle routing problem
(VRP) that uses capacity restriction on the vehicles used. There are many
methods have been studied to solve CVRP. To solve CVRP, it is possible to
decompose CVRP into regions (sub problems) that can be solved independently. A
two-step genetic algorithm (TSGA) is formulated in this paper. TSGA is used to
decompose CVRP and then find the shortest route for each region using two
different simple genetic algorithms. TSGA is then compared with genetic
algorithm (GA). To compare these two algorithms, four instances is formed, those
are P50, P75, P100, and P125. For each instance, fourteen different vehicle
capacities is used. The results show that TSGA is better than GA in terms of
computational time and distance except for some small vehicle capacities at P50
and P75. |
Keywords: |
Capacitated Vehicle Routing Problem (CVRP), Genetic Algorithm (GA),
Decomposition, Two-Step Genetic Algorithm (TSGA) |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
TRANSFORMING XML SCHEMA CONSTRAINING FACETS AND XML QUERIES TO OBJECT CONSTRAINT
LANGUAGE (OCL) |
Author: |
TOUFIK FOUAD, BAHAJ MOHAMED |
Abstract: |
Unified Modeling Language UML became the main part of software development
including web applications that use XML for exchanging structured data. Thats
why there is a need for modeling XML elements with UML.
Design Recovery or Reverse Engineering allows us to get conceptual schema which
helps developers to understand systems and to ease its maintenance.
A lot of XML Schema mapping methods focus only on getting the structural part
(elements, complex types and attributes) without giving importance to
constraints and restrictions and also XML Queries. In this sense our goal is to
represent the mapping and the transformations rules from XML elements and
queries to UML/OCL. |
Keywords: |
UML, OCL, XML Schema, XQuery, Transformation. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
INCREMENTAL EVOLUTIONARY GENETIC ALGORITHM BASED OPTIMAL DOCUMENT CLUSTERING (ODC) |
Author: |
A.KOUSAR NIKHATH, K.SUBRAHMANYAM |
Abstract: |
Clustering is one of the phenomenal process towards information retrieval and
knowledge discovery. Cluster optimality is still a questionable factor for
current benchmarking clustering strategies. In particular document clustering is
most sensible towards information retrieval and knowledge discovery, which is
due to the curse of high volume and high dimensionality observed in recent
times. In order to this many of document clustering models have been devised in
recent times, but all of these models are questionable either the case of
cluster optimality, process time complexity or adoptability. Henceforth, here we
devised a deep machine learning approach called incremental evolutionary genetic
algorithm based optimal document clustering (ODC) process. The experiments were
done on documents dataset with curse of high dimensionality and volume. The
results obtained from the experiments observed to be remarkably optimistic
towards document clustering and also evincing the linearity in time complexity
and memory usage. |
Keywords: |
Text Mining, Unsupervised Learning, Document Clustering, Cluster Optimization,
Evolutionary Computation, ODC |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
USING FRAMEWORK TO SYNCHRONIZE ONTOLOGY WITH RELATIONAL DATABASE |
Author: |
AHMED EL ORCHE, MOHAMED BAHAJ |
Abstract: |
Ontology is building bloc of semantic web. Ontologies evolve over time and not
static. The synchronization of the relational database with the ontology is
required once the ontology is changed. In this paper the authors propose an
approach to synchronize the relational database with the ontology in two steps,
firstly to match the relational database schema with the ontology, secondly to
make design of a framework able to compare the current ontologys version with
the pervious one, then manipulate the changes happened to build SQL queries to
be executed in the relational database. |
Keywords: |
Synchronization, Semantic, Database, Datatype, Object Properties, OBDB,
Ontology. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
AGENT MODEL DEVELOPMENT BY USING ONTOLOGY IN UNIVERSITYS
ARCHIVING |
Author: |
MUHAMMAD HASBI, RETANTYO WARDOYO, JAZI EKO ISTIYANTO, KHABIB MUSTOFA |
Abstract: |
Email classification, based on its subject targetted to the chief. The email
should be targetted to the other unit appropriate with its email content. This
research is limited with the email domain at university and aimed at making
agent model using ontology classify emails based on their subject and content in
the universitys archiving process. The use of agent to classify emails is done
in order the process run autonomously. However, using agent with ontology to
classify emails based on their subject and content is still becoming something
interesting to study since there is no such research done before. Hence, this
research is proposed to develop models to classify emails based on content by
using agent with ontology to overcome the problem of archiving.
The agent used is the multi-agent which is reactive and proactive that can work
autonomously. These agents classify emails and dispose them by ontology to
certain unit in the university. The email classification method used is the
Naive Bayesian method. The classification is based on the emails content to
determine the emails topic which is the keyword of the units job description in
the university. The keyword then is used to enquery it to the ontology data. The
query is aimed at determining the emails target unit in the university. The
ontology is the representative of the knowledge of the Units job description in
the organization structure of a university.
The use of ontology can result in the disposition target distributedly in the
universitys units appropriate with its email subject and content. This model
can be run precisely in determining the emails
disposition target to a certain unit in the university. |
Keywords: |
Agent, Reactive, Classification, Disposition, Ontology. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
A CONCEPTUAL FRAMEWORK FOR PREDICTING FLOOD AREA IN TERENGGANU DURING MONSOON
SEASON USING ASSOCIATION RULES |
Author: |
AZWA ABDUL AZIZ, NUR ASHIKIN HARUN, MOKHAIRI MAKHTAR, FADZLI SYED ABDULLAH,
JULAILY AIDA JUSOH, ZAHRAHTUL AMANI ZAKARIA |
Abstract: |
Over the last decade, flooding has been one of catastrophic disaster which
causes economic damage, lost life and environmental deprivations. The need for
flood prediction is rising since the decision maker lacks intelligent tools to
predict flood areas. The data mining and geospatial visualization will test the
temporal data which include river flow and rainfall data to find patterns and
new information which then will use to predict areas that expose to flood. Since
Terengganu situated at east peninsular, every year in October to March will be
having heavy rainfall and increasing of sea levels .To this extent, we propose a
framework to support flood prediction which the outcome will intention to better
manage floods through prevention, protection and emergency response. |
Keywords: |
Data Mining, Association Rule, Geographical Information System(GIS), Flood Area
Prediction, Hydrology |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
EFFICIENT ENERGY MOBILE AGENT COLLECTOR FOR INTRUSION DETECTION SYSTEM IN
WIRELESS SENSOR NETWORK |
Author: |
YOUSEF EL MOURABIT, AHMED TOUMANARI, MARYAM EL AZHARI, ANOUAR BOUIRDEN |
Abstract: |
Wireless sensor networks (WSNs) consists of a small size battery powered sensor
nodes. Due to their constrained characteristics, WSNs are vulnerable to various
attacks, which make the security a major concept to handle. Intrusion detection
system (IDS) becomes essential tools to ensure the safety of this kind of
network. However, since sensors nodes are usually equipped with small and
limited energy resources, a significant limitation is presented mainly in terms
of energy autonomy which therefore affects the network lifetime. Thereby, It is
greatly important to ensure an efficient IDS by strategically deploying an
appropriate collector to minimize the amount of energy consumed. In this paper
we propose an efficient mobile agent collector to minimize energy consumption
and delay transmission for IDS in WSN. The proposed mobile agent collector is
validated through simulation experiments using OMNET++ and Castalia simulator,
sensor nodes positions are predefined by the base station whilst Dijkstras
algorithm is used to find the optimal path towards the base station passing by
source nodes to gather the required data. The simulation provides empirical
results illustrating the effectiveness of our approach. |
Keywords: |
Mobile Agent, Intrusion Detection, Data Collection, Energy Consumption, Wireless
Sensor Network. |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
Title: |
A REVIEW OF MOBILE IP PROTOCOL FOR THE IMPLEMENTATION ON DUAL STACK MOBILITY
MANAGEMENT |
Author: |
FAROUK ABDUL JALIN, NOR EFFENDY OTHMAN |
Abstract: |
Network mobility nowadays plays the most crucial roles in delivering seamless
mobility connectivity to billions of users around the world, and mostly the
process of providing quality services are transparent from users involvement.
While the world itself in the midst of transitioning of the Internet Protocol
(IP), IPv4 and IPv6 nodes will roam across the network. However, the current
state of implementation and the introduction of the current transition scenario
is not focused on the implementation of mobility communications. The trend of
increasing users mobility and the demand of speeding up the transition to IPv6
has obviously triggered the need for developing network mobility management
suited for the mixed-IP environment. Current mobility protocols tightly coupled
with the IP version due to the particularities of the protocols itself.
Considering the scenario IPv6 will become the only protocol version eventually,
the deployment will utilize the IPv6 mobility platform to support the dual stack
environment. The goal of this investigation is to analyze and evaluate the
different in existing IP mobility solution operating in mobile IP network,
pinpointing each solution shortcoming and suggesting methods for improving the
issues including handover latency, packet loss, and delivery failure, and
signaling overhead issues in IP mobility management support protocol to suit the
IP mobility support protocol in the mixed IP network environment. This article
will present a study of the mechanism involved in various mobility protocols
that have been standardized to study the best solution for the implementation of
dual stack mobility management. |
Keywords: |
Mobility Management, And Dual Stack |
Source: |
Journal of Theoretical and Applied Information Technology
31st May 2016 -- Vol. 87. No. 3 -- 2016 |
Full
Text |
|
|
|