|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
January 2015 | Vol. 71 No.3 |
Title: |
MAX FLOW BASED ON TOPOLOGY CONTROL CHANNEL ASSIGNMENT IN MULTI-RADIO
MULTI-CHANNEL WIRELESS MESH NETWORKS |
Author: |
ASHRAF ALZUBIR, KAMALRULNIZAM ABU BAKAR |
Abstract: |
The wireless network technologies have been popping up everywhere and becoming
more popular day by day. Wireless Mesh Network (WMN) is one of the promising
wireless technologies that provide effective, innovative and multihop solutions
to provide the Internet connectivity to a large number of mesh routers with a
low cost of construction. The interference problem between wireless links is
critical and challenging problem faced in wireless networks that affects overall
throughput. Hence, interference problem can be mitigated through efficient
utilization of non-overlapping channels. Moreover, the multiple radios that are
installed in each mesh router which operates in distinct channels enables the
mesh routers to transmit packets simultaneously, resulting in increased
throughput of the network. In this paper, we propose a novel algorithm Max-flow
based on Topology-control Channel Assignment (MTCA) that aims to reduce the
interference problem between the wireless links and maintaining on network
connectivity. Simulation results reveal improved performance of the proposed
algorithm in terms of mitigating interference problem and overall throughput of
network as compared to existing work. |
Keywords: |
Wireless Mesh Network, Channel Assignment, Interference, Multi-Channel
Multi-Radio, Throughput |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
IMPLEMENTATION OF AN INTRUSION DETECTION SYSTEM BASED ON SELF ORGANIZING MAP |
Author: |
EMIRO DE LA HOZ FRANCO, ANDRES ORTIZ GARCIA, JULIO ORTEGA LOPERA, EDUARDO DE LA
HOZ CORREA, FABIO MENDOZA PALECHOR |
Abstract: |
The main purpose of this study is to identify a methodology to validate the
effectiveness of an Intrusion Detection Systems proposed in three phases
(selection, training and classification) using FDR to feature selection and Self
Organizing Maps to training-classification. Therefore, initially are covered
basics introductory in the first four items, related to the input dataset, the
intrusion detection system and the metrics that are necessary to evaluate the
IDS, the feature extraction technique FDR and the funcionality about the
self-organizing map (SOM). Later in the methodology Item, in the body of the
paper, a functional model proposed to described the intrusion detection, such
model is validated from the comparation of metrics in simulation develops
enviroments. Finally concluded that the detection rates obtained by the proposed
functional model are: sensitivity of 97.39% (fits correctly identified as
attacks) and a specificity of 62.73% (normal traffic correctly identified as
normal traffic) using only 17 features of the dataset input. These results are
compared with other simulating scenarios different, consulted from the
documentary sources, from which it is suggested to integrate at the proposed
model other techniques for training and classification processes to optimize the
intrusion detection model. |
Keywords: |
Intrusion Detection System – IDS, Self-Organizing Map – SOM, Fisher’s
Discriminant Rate – FDR, Gaussian Mixture Model (GMM), dataset NSL-KDD |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
A NEW CLUSTERING BASED SEGMENTATION TECHNIQUE FOR BREAST LESIONS DETECTION |
Author: |
YOUNES KABBADJ , FAKHITA REGRAGUI |
Abstract: |
Microcalcifications can be a very important sign of breast cancer. As their
detection is very crucial to further investigation, automatic detection in
mammograms can help practitioners to locate missed abnormalities. The aim of
this work is to propose a simple method based on fuzzy clustering to efficiently
segment microcalcifications. This method which is derived from two existing
methods, automatically determines the number of classes in each image and then
isolates potential microcalcifications. Compared to previous methods, the
proposed method was tested on 7 Regions of Interest and demonstrated higher
performance reaching up to 0.93 in terms of F1-Score and an overall best
performace. |
Keywords: |
Computer Aided Detection, Machine Learning, Image Analysis, Fuzzy Clustering,
Image Segmentation |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN EEFICIENT MANAGEMENT OF SEMANTIC METADATA REPOSITORIES USING TEMPORAL BASED
KALMAN FILTER ON WEB ARCHITECTURE |
Author: |
A.ABDUL RAHUMAN, Dr.C.CHANDRASEKAR |
Abstract: |
A major concern incorporating data accesses for web search classification is the
need for accurate user result, optimality solution on semantic ontology search
with combination of keyword. These concerns often make it difficult to produce
results relevant to the user query with maximal metadata repositories. Moreover,
with multiple pages produced as a result of current standard search on web
domain, harness the augmented filtering potential relevant to the user query. To
present an effective metadata managing repositories on web domain,
Temporal-based Kalman Filter on Web Architecture (TKF-WA) is proposed in this
paper. TKF-WA addresses a metadata based semantic ontology search on web domain.
Initially, semantic learning object link class is developed to classify the set
of keywords automatically for effective management of metadata repositories. The
metadata links the related learning objects internally and manages maximal
metadata repositories. The managed metadata repositories on Web Architecture
present a Temporal-based Kalman Filtering algorithm to remove the irrelevant
pages which are not related or insignificant to the user query. Temporal-based
Kalman Filtering performs the series of measurement based on time with metadata
repositories to satisfy the user query set. Kalman Filtering is temporal based
in the proposed web architecture to not only handle the regular (i.e.,
sentence-based) but also the irregular (i.e., keyword-based) query set.
Experiment conducted on IRIS2 dataset with factors such as system utility rate
on filtering, search retrieval efficiency and average response time. |
Keywords: |
Temporal based Kalman Filter Design, Semantic Metadata Repositories, Ontology,
Web Architecture, Semantic Learning Object, User Query |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
FACE TRACKING FOR A SYSTEM OF COLLECTING STATISTICS ON VISITORS AND QUALITY
ASSESSMENT OF ITS FUNCTIONING |
Author: |
A.S.SAMOYLOV, D.M.MIKHAYLOV, P.E.MININ, A.D.EGOROV |
Abstract: |
This article focuses on the development of a face tracking algorithm for a
system collecting statistics about visitors. The basic method of tracking by
template-matching is modified in several ways to cope with its drawbacks and
achieve a stable tracking performance. In addition, the problem of objective
quality assessment for tracking methods is considered, and a piece of software
is described that provides a solution to the problem. Experiments conducted
using this software prove the effectiveness of the proposed modifications. |
Keywords: |
Face Tracking, Template Matching Tracking, Template Update, Histogram Matching,
Quality Assessment. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
THE DESIGN OF THE HYBRID PID-ANFIS CONTROLLER FOR SPEED CONTROL OF BRUSHLESS DC
MOTOR |
Author: |
HIDAYAT, SASONGKO PRAMONO HADI, SARJIYA, 2SUHARYANTO |
Abstract: |
This paper presents the design of the hybrid PID-ANFIS controller for
controlling the speed of the Brushless Direct Current Motor (BLDCM). The
objective of this work is to obtain the BLDCM speed controller equipment
effectively. The hybrid PID-ANFIS controller is a combination of classical PID
controller and ANFIS controller. This method is applied to BLDCM speed
controller by simulation and implementation with making its prototype. Hybrid
PID-ANFIS controller input consists of speed setting, actual speed and error
speed. The actual speed is acquired the processing the rotor position sensor
output signal. PID controller parameters are tuned using closed loop Ziegler
Nichols method, while ANFIS controller parameters are acquired by off-line
hybrid training. ANFIS training data includes the training input data (actual
speed and speed setting) and target of ANFIS training (BLDCM input voltage in
the form of PWM). The parameters of hybrid PID-ANFIS controller are the
combination of the parameter of PID and ANFIS, added by the error limit. The
error limit is functioned to select of working domain of each controllers
through determining weight of PID and ANFIS activation signal that presented by
a linear curve. The development of prototype is implementation from the
development of structure and parameter of hybrid ANFIS-PID controller that
uploaded into microcontroller ARM cortex STM32 F103RB using C programming
language. The controller performance was analyzed based on speed response
parameters, control energy and Integral Square Error (ISE) through testing each
controller structure at various loaded and non-loaded conditions speeds setting.
The testing results are obtained the best response performance that impacted to
improve control energy reduction 17.36% and ISE 15.29%, the controllers can
operate on a wide speed setting spectrum. |
Keywords: |
BLDCM, Speed control, Hybrid PID-ANFIS |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
RIVER BOUNDARY DELINEATION FROM REMOTELY SENSED IMAGERY BASED ON SVM AND
RELAXATION LABELING OF WATER INDEX AND DSM |
Author: |
PARAMATE HORKAEW, SUPATTRA PUTTINAOVARAT, KANIT KHAIMOOK |
Abstract: |
Topographic mapping of river boundary area is important in the environment
management and hydrological modeling. In recent years, delineation of river by
means of remotely sensed image classification has been widely investigated.
Prime advantages of remote sensing technology for river delineation are reducing
labor cost and time and elevating restrictions on ground surveys. However, these
techniques are as yet to produce satisfactory result due to, for instance, the
lack of an effective means of removing shadow and spurious noise. This paper
proposes the boundary delineation of river from satellite image using Support
Vector Machine (SVM) and two well accepted water indices (NDWI2 and MNDWI). In
our framework, relaxation labeling was also incorporated in order to ensure
reliable classification while suppressing spurious artifacts, inherited from the
satellite imaging. The subsequent assessment suggested that MNDWI index yielded
the most accurate classification and hence water extraction. The resolution of
the delineated river braches was further enhanced by incorporating DSM data. The
technique was then benchmarked against labor intensive manual tracing with
promising consistency. |
Keywords: |
River Delineation, SVM, Relaxation Labeling |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
MINIMIZING STUDENT ATTRITION IN HIGHER LEARNING INSTITUTIONS IN MALAYSIA USING
SUPPORT VECTOR MACHINE |
Author: |
ANBUSELVAN SANGODIAH, PRASHANTH BELEYA, MANORANJITHAM MUNIANDY, LIM EAN HENG,
CHARLES RAMENDRAN SPR |
Abstract: |
Attrition or better known as student dismissal or drop out from completing
courses in higher learning institutions is prevalent in higher learning
institutions in Malaysia and abroad. There are several reasons attributed to the
attrition in the context of student in higher learning institutions. The degree
of attrition varies from one institution to another and it is cause for concern
as there will be a lot of wastage of resources of academic and administrative
besides the adverse effect on the social aspect. In view of this, minimizing the
attrition rate is of paramount importance in institutions. There have been
numerous non-technical approaches to address the issue, but they have not been
effective to predict at early stage the likelihood of students dropping out from
higher learning institutions. Technical approach such as data mining has been
used in predicting student attrition by some researchers in their past research
work. However, not all prediction data mining techniques and other relevant and
significant factors attributed to student attrition have been fully explored to
address the issue. As of result this, this study will focus on using support
vector machine model to predict probation status of student in which in most
cases will lead to student’s dismissal. It will also examine relevant and other
factors that contribute to the attrition among students in Malaysia. The result
of the study is appealing as the support vector machine model achieves a decent
accuracy in prediction despite working on small size of data set. With all this
in place, higher learning institutions in Malaysia can deploy the model in
predicting probation status of student to minimize student attrition. |
Keywords: |
Attrition, Data Mining, Support Vector Machine, Classification Model,
Educational Data Mining |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
QUESTION CLASSIFICATION USING STATISTICAL APPROACH: A COMPLETE REVIEW |
Author: |
ANBUSELVAN SANGODIAH, MANORANJITHAM MUNIANDY, LIM EAN HENG |
Abstract: |
In recent days, question classification is growing in popularity as it has an
important role in question answering systems, information retrieval and it can
be used in a wide range of other domains. The main aim of question
classification is to accurately assign labels to questions based on expected
answer type. Past research works have relied on matching questions against
hand-crafted rules. However, rules require enormous effort to create and often
suffer from being too specific. A great deal of current research works on
question classification is based on statistical approach to overcome these
issues by employing machine learning techniques such as Support Vector Machine
and Artificial Neural Network. This paper presents an updated literature survey
of current methods or approaches for question classification in the areas of
question answering systems, information retrieval and educational environment.
Question classification involving other languages besides English has also been
examined. |
Keywords: |
Question Classification, Machine Learning, Semantic Features, Syntactic
Features, Support Vector Machine |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
ENHANCING DATA SECURITY TO HANDLE DOS AND SYN FLOOD ATTACK WITH HARDWARE
IMPLEMENTATION |
Author: |
ANSILLA J.D, Dr.N.VASUDEVAN, Dr.S.RAVI |
Abstract: |
Network security has become an important issue in organization, business and
public data handling and has grown exponentially in recent times. The threats to
the valuable information on the network are becoming more widespread and more
sophisticated. The ‘SYN’ field in the TCP segment reflects the status of the
socket setup. This ‘SYN’ bit if set by unauthorized process can prevent genuine
users from getting connected. This work focuses on secure communication between
end-points terminal and protect information during transmission. In this paper,
DES algorithm is implemented on ARM processor using embedded C and provides
better efficiency with hardware implementation is demonstrated. |
Keywords: |
Trusted Nodes, Data Security, Data Encryption Standard (DES), Socket Shell, SYNC
FLOOD |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN EFFICIENT HEURISTIC BASED TREE CLASSIFIER MODEL FOR MEDICAL DISEASE DIAGNOSIS |
Author: |
K.GAYATHR, DR. M.CHITRA |
Abstract: |
The explosive growth of medical data and distributed sources augments the demand
for efficient disease diagnosis and identify the cause of disease. The varying
filtering concept used on the existing system performs the decision making
process to exploit the contextual information. But filtering was not developed
on medical expert support system for predicting drug effectiveness. Data
publishing using slicing partitioned high dimensional data into parallel and
perpendicular vectors. Slicing technique with column generalization was not
examined thoroughly with classification implications. To thoroughly predict the
drug effectiveness on medical expert support system, Smoothing Heuristic Divider
Method of Classification tree (SHDC) is proposed in this paper. The main
objective behind SHDC is to examine and classify thoroughly drug effectiveness
using classification tree on the varying set of medical data. Initially, Support
Vector Machine predictive model is developed in SHDC method to predict data
quality and to perform mapping operation. Data quality in SVM is measured using
double exponential smoothing technique to predict the medical data changes for
varied intervals. SVM in SHDC method maps the input data vectors into high
dimensional space to obtain optimal hyper plane support vectors on medical data
support system. Secondly, classification is performed using Heuristic Divider
Method to split (i.e.,) classify the medical data hyper planes for improving the
searching process. Finally, the classifier is provided to support medical expert
support system using Support Vector Machine which constructs separating hyper
plane. With this, the separating hyper plane maximizes classifier margin and
performs experimental evaluation on factors such as true rating rate,
classification accuracy and finally percentage reduction in prediction time. |
Keywords: |
Heuristic Divider Method, Support Vector Machine, Hyper Plane, High Dimensional
Space, Smoothing Technique, Predicting, Medical Expert Support System |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
DETECTION AND PREVENTION OF DENIAL OF SERVICE ATTACKS (DOS) IN WLANS
INFRASTRUCTURE |
Author: |
AABDALLAH ELHIGAZI ABDALLAH, SHUKOR ABD RAZAK, COULIBALY YAHAYA |
Abstract: |
Wireless networks are very common today because of their flexibility,
portability and ease of installation. Users working through wireless connections
have to be aware of the environments due to the vulnerability of the
infrastructure and various types of attacks that can be made by the intruders to
compromise valuable and critical data. Denial of Service attack (DOS) is the
most significant attack in the wireless 802.11 WLANs. Wired Equivalent Privacy (WEP)
and Wi-Fi Protected Access (WPA) security protocols are used to protect wireless
network infrastructure against intruders. Despite remarkable advances, both WEP
and WPA protocols still suffer from DOS attack because their management and
control frame is not encrypted. Integrated Central Manager (ICM) algorithm was
proposed to detect and prevent DOS attacks. However, in ICM, time needed to
detect DOS attack is too long. The algorithm maintains five tables for observing
activities in the network. When a client requests for a connection, all the five
tables needs to be processed; this is increases both network overhead and
latency. In This paper, we proposed an algorithm called Enhanced Integrated
Central Manager (EICM) to enhance DOS detection and prevention time. The
algorithm was evaluated by gathering MAC addresses using Wireshark software and
MATLAB was used for simulation. The obtained results demonstrate that that the
proposed algorithm outperforms its predecessor in terms of DOS detection and
prevention time by decreasing network overhead. |
Keywords: |
WLAN Security, Denial of Service, MAC Spoofing, EICM |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
CONSTRUCTION OF PHYLOGENETIC TREE USING NEIGHBOR JOINING ALGORITHMS TO IDENTIFY
THE HOST AND THE SPREADING OF SARS EPIDEMIC |
Author: |
MOHAMMAD ISA IRAWAN, SITI AMIROCH |
Abstract: |
The epidemic of SARS is a dramatic example of how quickly the virus spread
throughout the world. The pattern of spread of the SARS virus can be likened to
a tree called a phylogenetic tree. All of SARS virus related to one another are
connected to a network that is transmitted from one individual to another. The
results of this branching process to determine the beginning of the epidemic as
well as the host of the corona virus.
To construct a phylogenetic tree takes inputs in the form of a distance matrix.
In this study the distance matrix is derived from the alignments between
sequence by using Super Pairwise Alignment (SPA). The output of the alignment is
in the form of number of differences of sequences that determine in genetic
distance. From the distance matrix, the genetic distance is converted to
evolutionary distances using the Jukes Cantor model of which was established by
phylogenetic tree by using the neighbor joining algorithm.
From the results of the phylogenetic tree formation are known as host SARS Co-V
is a palm civet with evolutionary distance of 0.1314. The epidemic began on
December 16, 2002 in Guangzhou of South China and then spread to Zhongshan.
Rallying point of the epidemic in Guangzhou Hospital and the Metropole hotel
subsequently spread to Hanoi, Toronto, Singapore, Taiwan, and Hong Kong so that
SARS to be international case. Furthermore, from the result of alignments of
hosts and human SARS Co-V with SPA is known that the mutation is a mutation that
occurs with type I protein replacement at position 77, 139, 147, 244, 344, 360,
472, 480, 487, 577, 609, 613, 665, 765, 778, and 1163. |
Keywords: |
SARS Coronavirus, Phylogenetic Tree, Neighbor Joining Algorithm, Super Pairwise
Alignment. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
A NEW HEURISTIC DECISION TREE AND TIME-INVARIANT DETECTION OF PADDY GROWTH
STAGES FROM MODIS DATA |
Author: |
S. MULYONO, M. SADLY, 1M. IVAN FANANY, T. BASARUDDIN |
Abstract: |
Satellite remote sensing has essentially been applied in agriculture such as
monitoring paddy growth stages, cropping schedule, and fertilizer management
over vast areas. Many methods have been devoted for detecting paddy growth
stages by deriving a certain profiles of vegetation indices from high temporal
resolution satellite data. In this paper, we introduce a time-variant method
referred to as a heuristic decision tree (HDT) for detecting 3-classes of paddy
growth stages from a limited number of MODIS images and generalize the result
through machine learning to predict the growth stages in time-invariant manner.
We compared our proposed method to two previous studies in [8] and [9]. For the
time-variant case, all methods are validated by 124 times of observation data
among 50 reference points from field survey. After doing some adjustments for
calculating the accuracy, the result shows that the accuracy for [8, 9], and our
proposed method are 0.8951, 0.9375, and 0.9435 respectively. For the
time-invariant case, we evaluate three Kernel-based Regularized (KR)
classification methods, i.e. Principal Component Regression (KR-PCR), Extreme
Learning Machine (KR-ELM), and Support Vector Machine with radial basis function
(RBF-SVM). All data samples are divided into training (25%) and testing (75%)
sampling, and all models are trained and tested through 10-rounds random
bootstrap re-sampling method to obtain more variety on hypothesis models during
learning. The best model for each classifier method is defined as the one with
the highest kappa coefficient during testing. The experimental results for
3-classes of paddy growth stages prediction show that the classification
accuracy in testing for our proposed method of each learner are 0.8485, 0.8874,
and 0.8252 respectively, whereas for previous study [8] are 0.6845, 0.7845, and
0.6949 respectively. |
Keywords: |
Remote sensing, MODIS, Phenology, Paddy growth stages, Kernel based learner |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
ASATE : AN ADAPTIVE SECURE SCHEME FOR EFFECTIVE WIRELESS SENSOR NETWORK IN
EMERGENCY SITUATION |
Author: |
RACHID HAJI, HICHAM BEKKARI, ABDERRAHIM HASBI, ABDELILAH MAACH |
Abstract: |
In emergency situation, wireless sensor networks can be subject to various
attacks aimed to mislead information or to paralyze the network. In such
context, security is an essential requirement to ensure efficient communication
within sensor network. Most of the proposed security protocols for WSNs fix only
a part of security issues and are based on authentication or cryptography. In
this paper, we propose to enhance framework Ad-M-QOS-DS with a new adaptive
secure capability. The new feature brings more confidentiality, data integrity
and availability within malicious context. The new security layer ASATE combined
three approaches: Authentication based on MAC Filtering, Trust index based on
the criticality of events and adaptable Encryption depending on the type of
messages spread on the network and the present risk. |
Keywords: |
Emergency situations; Wireless Sensor Networks; Security; Authentication; Trust
Index; Risk; Encryption |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
FIRE ALARM SYSTEM COMMUNICATION PROTOCOL RESEARCH BASED ON THE COMPONENTS OF THE
"BOLID C2000M" SYSTEM |
Author: |
S.D. FESENKO, Y.Y SHUMILOV, A.D. EGOROV, A.S. FILIMONTSEV, A.A. SHINKARENKO, D.T.
RUBIN, V.L. EVSEEV |
Abstract: |
This article considers the issues of engineering systems as a particular case of
automated control systems information security from unauthorized access to the
automation equipment. That includes intruders and threats classification. Next,
on the basis of the obtained data, algorithms for the analysis of closed
protocols in such systems are developed. Practical research of a typical
engineering system protection was also described, for this purpose the data
transfer protocol used by the system "Bolid C2000M" was studied. This work is a
preliminary step for further development of the device protecting the system
from an unauthorized access. |
Keywords: |
Cybersecurity, Engineering Systems, Fire Alarm System, Automated Control System,
Communications Links, Data Transfer Protocol. |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
A SEMANTIC WEB SERVICE COMPOSITION FOR E-GOVERNMENT SERVICES |
Author: |
AMINA ADADI, MOHAMMED BERRADA, DRISS CHENOUNI, BOUCHAIB BOUNABAT |
Abstract: |
Emerging from e-business ideas in the late 1990s, e-Government is seen as a
concept that is focused on fully exploiting Internet and information and
communication technologies to deliver effective government services to citizens,
businesses, and other stakeholders. However e-Government has some specific
features as opposed to traditional e-business scenarios, because of the enormous
challenges it faces in achieving interoperability, integration and security,
which are of interest to our dynamic Web service composition research and on
which semantic Web service composition architecture could be properly
demonstrated. From these reasons, we propose in this paper an approach for the
composition of semantically described e-Government Web services, enabling
citizens to dynamically compose services according to their goals and through a
single point of access. |
Keywords: |
Web Service Composition, Semantic Web Services, E-Government, Multi-agent
systems, AI Planning |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
Title: |
AN EVALUATION OF IEEE 802.11 MAC LAYER HANDOFF PROCESS IN CAPWAP CENTRALIZED
WLAN |
Author: |
MOHAMMED BALFAQIH, ROSDIADEE NORDIN, ZAIN BALFAQIH, SHARIQ HASEEB, AISHA HASHIM |
Abstract: |
The growing demand to provide secure wireless connectivity, especially in hot
spot areas such as conference halls and events, motivated the development of
Control and Provisioning of Wireless Access Point (CAPWAP) centralized Wireless
Local Area Network (WLAN). The centralized WLAN utilizes an Access Controller
(AC) to simplify configuration, management, and control of Wireless Termination
Points (WTPs) in large scale deployment of a wireless network. In order for the
clients to associate and re-associate to WTPs, scanning and authentication
phases are performed. The contributed latency during scanning and authentication
phases, in the MAC layer handoff process, makes it difficult to support
real-time applications that are sensitive to network latencies. This work
simulates the effect of using different scanning and authentication methods in
CAPWAP centralized WLAN during MAC layer handoff process. This can be considered
as a significant contribution since no prior work has been done, to our
knowledge, to simulate the handoff latency components in centralized networks.
This work also studies the effect of varied propagation environments including
isolation, and indoor and outdoor environments on handoff process. Moreover, the
effects of employed WTP type and the client movement speed on the handoff
process latency have been analyzed. |
Keywords: |
Handoff, CAPWAP, Scanning, Authentication, Centralized Network |
Source: |
Journal of Theoretical and Applied Information Technology
31st January 2015 -- Vol. 71. No. 3 -- 2015 |
Full
Text |
|
|
|