|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of Theoretical and Applied Information Technology
20th August 2014 | Vol. 66 No.2 |
Title: |
MULTI-LEVEL AES DESIGN SECURITY: FROM SYSTEMC-TLM TO FPGA |
Author: |
HASSEN MESTIRI, YOUNES LAHBIB, MOHSEN MACHHOUT, RACHED TOURKI |
Abstract: |
Advanced Encryption Standard (AES) cryptographic system are widely used in
embedded systems to secure secret information. One of the most powerful
cryptanalysis techniques against the cryptographic systems is the fault
injection attacks. The complexity of cryptographic systems is increasing which
requires fast security attacks simulation against fault injection attacks. The
multi-level Electronic System Level approach is one promising candidate that
allows models to reach higher simulation speed. It is known that the SystemC
Transaction Level Modeling (TLM) package simulates models 1000 times higher than
classical Register Transfer Level (RTL) simulators.
In this paper, we present a secure reconfigurable AES design against the fault
injection attacks at the Electronic System Level. Simulation results demonstrate
that the simulation time is dependent of the fault detection schemes types.
Moreover, The SystemC design is refined to RTL level. It is translated from
SystemC description to a VHDL equivalent and implemented on Xilinx Virtex-5 FPGA.
Experimental synthesis results show that the secure reconfigurable AES design is
very robust against fault injection attacks and the fault detection scheme
information redundancy allows a trade-off between the hardware overhead and the
security against fault injection attacks. |
Keywords: |
Security, Hardware, SystemC Design, Fault Detection Schemes, Electronic System
Level. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF HMSK AND SQFD ALGORITHMS FOR COMPUTER TOMOGRAPHY (CT)
IMAGE SEGMENTATION OF EFFECTIVE RADIOTHERAPY |
Author: |
V.V.GOMATHI, S.KARTHIKEYAN |
Abstract: |
Medical Image segmentation plays a significant role in many medical image
processing for effective diagnosis. Manual segmentation of medical image by the
radiologist is not only a tiresome and time consuming process, also not a very
accurate with the increasing medical imaging modalities and unmanageable
quantity of medical images. Therefore it is essential to examine current
methodologies of image segmentation. Enormous research has been done in medical
image segmentation, but it is still difficult to evaluate all the medical
images. However the problem remains challenging, with no general and unique
solution. In this paper, we present a HMSK (Hybrid Medoid shift and K-Means)
algorithm and Signature Quadratic form distance (SQFD) algorithm for Computer
tomography image segmentation. The performance of the two algorithms is
investigated. Experimental results with real patient images indicate the SQFD
algorithm is effective and efficient and reduce the number of fragments. Their
pros and cons were analyzed and proposed SQFD algorithm for slices of CT images
to give effective radiation therapy. |
Keywords: |
HMSK, SQFD, K-Means, Medical image segmentation, Computer tomography,
Radiotherapy |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
PID CONTROLLER BASED FOUR QUADRANT OPERATION OF DC MOTOR WITH UNIPOLAR VOLTAGE
SWITCHING |
Author: |
Mrs.P.KARPAGAVALLI , Dr. A. EBENEZER JEYAKUMAR |
Abstract: |
This paper deals with a method to improve the performance characteristics of the
closed loop DC motor drive by using proportional integral derivative
controller(PID) with Pulse width modulation(PWM) full bridge DC-DC converter
.The PID parameters are found by Zeigler- Nichols PID tuning method with
uniploar voltage switching technique is implemented. The overall system is
modeled in MATLAB / SIMULINK software, where different modes of operation were
presented and discussed. . In the proposed method, RMS ripple output voltage is
reduced and also high power factor is achieved in the AC input line current. The
design of the speed controller for four quadrant operation of the closed loop DC
Motor has proved successfully runs at close to the reference speed. |
Keywords: |
DC Motor, DC-DC converters, PWM, Four quadrant operation. Unipolar voltage
switching, PID controller, Ziegler- Nichols method. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
ELM BASED DETECTION OF ABNORMALITY IN RETINAL IMAGE OF EYE DUE TO DIABETIC
RETINOPATHY |
Author: |
T.VANDARKUZHALI , DR.C.S RAVICHANDRAN |
Abstract: |
Efficient detection of blood vessels for retinal vasculature disorder analysis
paves way for important roles in diagnosing diabetic retinopathy. It can be done
by the comparison of the states of retinal blood vessels. This paper proposes a
method for the Retinal image analysis by efficiently detecting the retinal blood
vessels and recognizes the retina to be normal or abnormal. The proposed work
uses an Extreme Learning Machine (ELM) approach and Probabilistic Neural Network
for blood vessel detection in digital retinal images. Feature extraction is done
on retinal image by the application of Discrete Wavelet Transform. The green
channel is selected for image analysis to extract vessels accurately. This
approach is based on pixel classification using a 7-D feature vector obtained
from pre-processed retinal images and given as input to an ELM. ELMs parameters
can be analytically determined rather than being tuned. Simulated results will
be shows that the blood vessels can be effectively detected from retina images
with parametric evaluation to measure the algorithm efficiency. |
Keywords: |
Retinal Images, Diabetic Retinopathy, Discrete Wavelet Transform, Extreme
Learning Machine (ELM) |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENHANCED AD HOC ON DEMAND MULTIPATH DISTANCE VECTOR FOR MANETS |
Author: |
VINAY KUMAR, Prof.(Dr.) C.RAM.SINGLA |
Abstract: |
Mobile Adhoc Networks (MANETs) include wireless devices communicating over
bandwidth-constrained links with nodes being free to move, join or leave
network. Limited range wireless communication and node mobility ensure that
nodes cooperate with each other to network and with underlying network,
dynamically changing to meet needs continually. This research investigates
performance of a highly dynamic mobile network using Ad hoc On-demand Multipath
Distance Vector (AOMDV) routing protocol under various active route timeout and
proposes a Link Quality based improved AOMDV (LQ-AOMDV) routing protocol modeled
on how quickly link changes occur and optimizes protocol overheads. Quality of
Service (QoS) parameters are measured and compared to AOMDV routing protocol. |
Keywords: |
Mobile adhoc networks (MANETs), Adhoc On-demand Multipath Distance Vector (AOMDV),
Link Quality (LQ) and Quality of Service (QoS). |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
REDUCED COMPLEXITY ADJACENT PHASE SEQUENCE MATRIX BASED PAPR OPTIMIZATION IN
OFDM SYSTEMS |
Author: |
M. PALANIVELAN, SHEILA ANAND |
Abstract: |
Orthogonal Frequency Division Multiplexing (OFDM) is a multicarrier modulation
scheme used in high speed communication systems. OFDM system is being
extensively used in several broadband communication systems like Wireless local
area network (WLAN), Worldwide interoperability for Microwave access (Wi-Max),
Digital video broadcasting (DVB) and Digital audio broadcasting (DAB). However,
the limiting factor remains the occurrence of high Peaks in OFDM signals, when
transmitted through power amplifier causes in-band and out-of-band distortion
and increase in Bit error rate (BER). The most popular quantification metric of
envelope variation of OFDM signal is the Peak-To- Average Power Ratio (PAPR).
The reduction in PAPR is desirable in order to obtain power efficiency of the
amplifier. This paper proposes an efficient Adjacent Phase Sequence Matrix (APSM)
method that is based on special matrices (Circulant, Riemann, Hilbert and
Hadamard) for optimizing PAPR of OFDM signals. The proposed technique does not
require the transmission of side information to the receiver for original phase
recovery. Further, the proposed technique reduces computational and phase search
complexity. The proposed scheme has been analyzed with random data, image and
audio input to validate multimedia requirements. The results show that the
proposed scheme offers better PAPR reduction and BER performance. |
Keywords: |
Adjacent Phase Sequence Matrix (APSM), Complementary Cumulative Distribution
Function (CCDF), Peak to Average Power Ratio (PAPR), APSM-Circulant (APSM-Ci),
APSM-Riemann (APSM-Ri), APSM-Hilbert(APSM-Hi), APSM-Hadamard(APSM-Ha). |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
IMAGE STEGANOGRAPHY TECHNIQUE USING SUDOKU PUZZLE AND ECC ALGORITHM FOR SECURED
DATA TRANSMISSION |
Author: |
DHANYA JOB, VARGHESE PAUL |
Abstract: |
Nowadays, Data transmission is becoming very important among humans. So there
are many modes of data transmission introduced. Some of the modes of data
transmission are through copper wires, wireless channels, computer buses, etc.
Though there are certain modes of transmission, secured data transmission is an
important thing what everyone needs, because everyone wants their data to
transmit securely. But secured data transmission is still an important problem
everyone is facing nowadays. So to overcome this problem, we have introduced a
image Steganography technique using Sudoku puzzle and ECC algorithm for secured
data transmission. Image Steganography refers to the process of hiding the data
into image, while ECC algorithm helps to convert the original data into secret
code. In the proposed method, the image Steganography is done using Sudoku
puzzle. So, this method not only hides the data, but it also converts the
original data into secret code. Thus, by combining these two techniques the data
will be more securely transferred by the method. The proposed mechanism will be
developed with the aid of the platform MATLAB. |
Keywords: |
Image Steganography, Sudoku puzzle, ECC algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
SIFT FEATURE EXTRACTION COMBINING FACE AND FINGER KNUCKLE RECOGNITION PROCESS |
Author: |
E.S.SHAMEEM SULTHANA, DR.S.KANMANI |
Abstract: |
This paper addresses the novel way for biometric image identification using
scale invariant feature transforms. We have split the authentication process
into two phases starting with face detection using distance comparison measures
followed by finger knuckle recognition phase. The data base chosen for this work
uses the combination of face and figure knuckle of a same person with the data
size of about 100 users. The SIFT features makes the similarity analysis of face
and finger knuckle combined together to authenticate a person. The key point
detector of SIFT combines the detector of face and finger knuckle and make fixed
detector points in the training image data sets. The different Gaussian filters
are applied on the various key point detectors with difference in scales. |
Keywords: |
Sift, Face Recognition, Finger Knuckle Recognition, Space Sift Comparison |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
STATISTICAL MACHINE TRANSLATION FOR INDONESIAN-GERMAN SIGN LANGUAGE |
Author: |
FRIDY MANDITA, TONI ANWAR |
Abstract: |
In the world of sign language, development has yielded significant results in
recent years. Much of the research in the field of sign language has been done.
Mostly, the research has designed for signer-independent schema that contains
sign language and video corpus of signers. Although there are many studies in
the field of sign language, but rarely there is research to translate from sign
language to another sign language. This paper, contributes to the research about
translating words from Indonesian-German Sign Language. For the translation
process a Markov model and the parsing tree method to translate the words are
used. Two different methods namely a binary search algorithm and a binary search
algorithm with Markov model are used for the process of translating a word which
derived from the input. A database that contains the list of words used in daily
conversations is prepared. A binary search algorithm and Markov models given a
better result when translated single words when are compared with a binary
search algorithm. However, binary search algorithm give a good result two or
more words are translated. |
Keywords: |
Sign language, Markov model, parsing tree, binary search algorithm. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENERGY EFFICIENT TRAFFIC CAPACITY IMPROVEMENT IN WIRELESS NETWORKS |
Author: |
D.SYLVIA, JEEVAA KATIRAVAN, D.SRINIVASA RAO |
Abstract: |
Wireless communication has seen rapid technological advancements in recent
years. Wireless mesh network and ad-hoc network are types of wireless networks.
Both are multihop networks: in wireless ad hoc networks the mobility of the
relay nodes is very high when compared to the low mobility of the relay nodes in
wireless mesh networks. These multihop networks depend on the relay nodes for
packet transmission and therefore the network lifetime time is an important
consideration in these networks. The residual energy of the nodes should be high
enough, such that the network life time is extended and therefore improve the
traffic carrying capacity of the network. Data from malicious nodes also tend to
use the network energy and due consideration is to prevent the malicious nodes
from using the energy and bandwidth of the network. In this paper, an energy
efficient secure routing is proposed with the primary objective of improving the
traffic carrying capacity of the network .The efficiency of the proposed
algorithm is shown using extensive simulations. |
Keywords: |
Wireless Networks, Cooperative Communication, Energy Efficiency, Capacity
improvement |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
ENHANCING THE DIGITAL DATA RETRIEVAL SYSTEM USING NOVEL TECHNIQUES |
Author: |
S.GOWRI, G.S.ANANDHA MALA, G.DIVYA |
Abstract: |
The increase of crime rate around the globe projects the accuracy lag in the
current techniques which are followed in process of retrieving and analyzing
stored information in the cache gathered from varied channels of communication
systems for the digital investigation systems. Taking these accuracy lags as a
primary issue the principle objective for the development of this strategically
organized system by renewing the existing procedural oriented system and to
develop a genuine and a user-friendly framework on crime related information
mining system which is mainly objected to extract and inspect appropriate
information from cache memory which assimilates emails, chat threads and any
text messages for the discovery of the criminal tasks and solve the enigma with
the help of the validity concealed within the data. This procedural orientated
system is built by merging of the three aspects employed to the data which is
given as the input for textual evidencing which are the mails, text messages,
chat threads, etc. The three procedural features are, the segregation of the
body and header part of the textual corpuses containing all kinds of textual
proofs from variety of communication channels which is accomplished using PHP
script concept of regular expressions and along with which preprocessing of text
to the body portion of the input corpus is done by stemming and tokenization
processes, in order to increase the reliability in the text mining process and
for the convenience to the forensic departments of investigation in criminology.
The final aspect is the search technique implemented in this methodology which
is built for the most highly effective and efficient data retrieval process.
Even though the followed procedure is an ancient technique in this procedure
which is the segregation of body and header in a mail, the primary aspect of
this methodology focuses on building an efficient search engine for the purpose
of effectiveness in retrieval. For the effective search engine a hybrid
algorithm inherited from various other old searching algorithms is used for
improvement of the system. This algorithm constitutes of three features mainly;
it uses bit-parallelism simulation of the suffix automaton of xR, it is the
alternative form of the Reverse Factor algorithm and if the pattern length is
not longer than the memory-word size of the system efficiency in rate of
retrieval is high. A procedural methodical would be bought by the utilization of
this kind of technique to improvise the existing system initiating the searching
system which is highly efficacious; the efficiency of this algorithm for
searching is evidenced by its complexity of time and memory and with its values
of precision and recall. Integrating all the factors specified would assist in
easier reviewing of the text documents. |
Keywords: |
Textual evidences, tokenization, Stemming, Information retrieval, Preprocessing. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
DUALISTIC SIDE BY SIDE ENDORSEMENT OF MULTICAST PROTOCOL BY DYNAMIC CLUSTERING
IN MANET |
Author: |
P.MANJULA |
Abstract: |
Source authentication and message integrity become a fundamental requirement for
ad-hoc network. Clustering is an effective technique to reduce overhead and
ensure scalability which we are using in this paper. The proposed work is new
Tiered [11] Authentication scheme for Multicast traffic (TAM), using dynamic
clustering algorithm .The algorithm modifies Weighted Clustering Algorithm (WCA)
with mobility prediction. The weighted Clustering Algorithm itself is enhanced
with the use of mobility prediction in the Cluster Maintenance phase. Meanwhile
the nodes are mobile in MANET maintenance is essential. Effective exploitation
of power, minutest depletion of Bandwidth, Additional Stable Clusters by using
WCA helps in improving the QOS in MANETS. |
Keywords: |
MANET, TAM, Clustering, Weighted Clustering Algorithm, Mobility Prediction. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
STRENGTH AND PERMEABILITY PROPERTIES OF CONCRETE USING FLY ASH (FA), RISE HUSK
ASH (RHA) AND EGG SHELL POWDER (ESP) |
Author: |
M. SIVAKUMAR, Dr.N. MAHENDRAN |
Abstract: |
This research centers around the growth of the strength and permeability
attributes of concrete by optimal substitution of cement with joint ratio of Fly
ash (FA) and Rice husk ash (RHA) with Synthesis Egg shell powder (ESP). Two
categories of ash such as fly ash, rice husk ash with four distinct contents of
5%, 10%, 20%, 30%, and 40% in terms of weight were performed for the
substitution of cement and addition of a persistent 5% egg shell powder in every
substitution. At first we have evaluated the physical and chemical attributes of
fly ash, rice husk ash and egg shell powder. The restraints considered for
analysis included compressive strength, splitting tensile power, flexure force,
water permeability, sorptivity, total charge-passed acquired from swift chloride
permeability test (RCPT) and tempo of chloride ion diffusion according to the
diffusion coefficient. However, assessment results accomplished underscore the
point that strength and permeability properties of concrete significantly
jumping up to 30% of cement substitution by combined FA (15%), RHA (15%) with
additive ESP (5%), and subsequently tends to drop down with every supplementary
accumulation of substitution outside this level. |
Keywords: |
Fly Ash, Rice Husk Ash, Egg Shell Powder, Compressive Strength, Sorptivity |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
DISCLOSURE OF NON-FINANCIAL INFORMATION ABOUT PUBLIC SERVICES ON THE OFFICIAL
WEBSITE OF LOCAL GOVERNMENTS IN INDONESIA |
Author: |
DWI MARTANI, DIAN NASTITI, PANGGAH TRI WICAKSONO |
Abstract: |
This paper aims to contribute to Indonesian country-level analysis of
non-financial disclosures in the public sector by assessing non-financial
disclosures determinants in Indonesian municipals’ websites. Beginning with a
content analysis of the websites of 434 Indonesian local government which data
is gathered using a checklist developed based on the government regulation no.
38/2007 on the segregation of duties between central and local government, this
study continues with a regression analysis to determine the impact of
educational level, municipals’ wealth, size and financial independence to the
level of the municipals’ non-financial disclosures on their websites. The
content analysis shows that only less than 10% municipals disclose information
about women and community empowerment programs, anti-corruption programs and
environmental related issues, while more than 50% disclose information about the
geographical area, the areas’ potentials and tourism attractiveness. Observation
on the independent variables reveals that educational level, municipals’ wealth
and size significantly affect the degree of non-financial information
disclosures in the municipals’ website. Based on the findings, this paper
concludes with two policy recommendations. Firstly, the central government needs
to establish recommendations and law to generate similar level of non-financial
disclosures in the municipals’ websites. Lastly, it seems necessary that in
developing the recommendations, the central government needs to pay more
attention to the information which is lacking of disclosures such as women and
community empowerment, anti-corruption programs and environmental issues. |
Keywords: |
Non-Financial Disclosures, Municipals’ Website, Public Sector Accountability,
Transparency |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
OPTIMAL TUNING OF PID POWER SYSTEM STABILIZER FOR MULTI MACHINE POWER SYSTEM
USING HARMONY SEARCH ALGORITHM |
Author: |
ABDUL HAMEEDKALIFULLAH, S.PALANI |
Abstract: |
This paper presents a novel Meta heuristic Harmony Search Algorithm (HSA) to
tune optimal gains of a Proportional Integral Derivative (PID) type multiple
stabilizers for multi machine power system. The problem of robustly tuning of
PID based multiple stabilizer design is formulated as an optimization problem
according to the time domain-based objective function which is solved by Harmony
Search Algorithm ( HSA) that has a strong ability to find the most optimistic
results. To demonstrate the effectiveness and robustness of the proposed
stabilizers, the design process takes a wide range of operating conditions and
system configuration into account. The effectiveness of the proposed stabilizer
is demonstrated through nonlinear simulation studies and some performance
indices on a four- machine two areas power system in comparison with the
Conventional Power System Stabilizers(CPSS) and PSO based optimized PID type
stabilizers (PSO PSS). The results of these studies show that the proposed HSA
based optimized PID type stabilizers have an excellent capability in damping
power system inter-area oscillations and enhance greatly the dynamic stability
of the power system for a wide range of loading conditions. The results obtained
using the proposed method are much superior than those obtained by CPSS and
PSOPSS based tuned stabilizers in terms of accuracy, convergence and
computational effort. |
Keywords: |
Harmony Search Algorithm, Power System Stabilizer, Power System Stability |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
A NOVEL IMPROVED GRADIENT NOISE TOLERANT METHOD FOR ENHANCED EDGE DETECTION |
Author: |
N. ANANDAKRISHNAN LT. DR. S. SANTHOSH BABOO |
Abstract: |
Edge Detection is the process of identifying the sharp changes that occur in the
brightness of an image. In order to study the objects in an image it is
necessary that the Edges are clear and predictable which is not the case in real
time images. Identifying Edges becomes a tedious process when real time images
are considered. An Improved Gradient Noise Tolerant (IGNT) method involves the
processes of observing the fine details of the image by omitting the irrelevant
data including the noisy data and detecting the edges of the objects and
features in the image using Preprocessing, Thresholding, Binarization and
Feature Extraction, which are experimented, analyzed and the results obtained
are discussed in this paper. |
Keywords: |
Otsu’s method, Edge Detection, threshold, features, object, LoG, Canny, pyramid. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
A ROBUST STEGANOGRAPHY APPROACH WITH HIGH EMBEDDING CAPACITY USING UNIQUE VALUE
EMBEDDING AND CODEBOOK |
Author: |
SARDJOENI MOEDJIONO, ACHMAD RIFAI, TEDDY MANTORO |
Abstract: |
Steganography is the art of hiding data and an effort to conceal the existence
of the embedded information. There are a lot of data to be embedded such as
text, image, audio, and video. An information hiding system is characterized by
having three different aspects that contend with each other. These are capacity,
security, and robustness. In steganography area, the common method used to hide
a secret data is LSB (Least Significant Bit). LSB provides the high embedding
capacity, however, when the secret data is larger than cover data, the cover
data would be dramatically distorted. The distorted cover data can attract the
attacker to perform steganalysis method. This study is carried out to overcome
the embedding capacity problem without producing a significant distortion in
cover data. The experiment is tested by hiding audio signals in image file. The
idea is to convert the audio signals into native data representation (unsigned
integer 8) and to find its unique values. The image will be modeled its codebook
in order to obtain a great embedded image quality using LBG (Linde Buzo Gray)
algorithm. The result shows a high PSNR (Peak Signal to Noise Ratio) for
extracted audio file and low RMSE (Root Mean Square Error) for image file. |
Keywords: |
Audio signals, Steganography, LBG, LSB, Codebook, Embedding capacity. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
OPTIMIZATION OF I-PD CONTROLLER PARAMETERS WITH MULTI OBJECTIVE PARTICLE SWARM
OPTIMIZATION |
Author: |
S J SUJI PRASAD, R. MEENAKUMARI, P A BALAKRISHNAN |
Abstract: |
I-PD controller is one of the variants of PID controller that eliminates
proportional and derivative kick. In this paper, the effect of I-PD controller
with the Multi Objective Particle Swarm Optimization (MOPSO) method for a first
order integrating system with delay is presented. The performance of PSO
optimized I-PD controller is analyzed with individual objective functions such
as; overshoot, rise time, settling time, and compared against integrated multi
objective function with weighted aggregation approach. The simulation study
reveals that the MOPSO based I-PD controller results in elimination of
overshoot, reduction in Integral Square Error (ISE) and Integral Absolute Error
(IAE) compared to PSO I-PD with settling time as an objective function. |
Keywords: |
I -PD Controller, Multi Objective Particle Swarm Optimization (MOPSO), Objective
Function, Overshoot, Rise Time, Settling Time. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
VANETs AND ITS RELATED ISSUES: AN EXTENSIVE SURVEY |
Author: |
JATAU ISAAC KATUKA, MUHAMMAD SHAFIE ABD. LATIFF |
Abstract: |
Vehicular Ad hoc Networks (VANETs) is a type of ad hoc network whereby its nodes
are represented by vehicles. It originated from the desire to ensure drivers
comfort and safety in road transportation so as to reduce the risk of accidents
on the roads. VANETs have some unique features that make it different from
MANETs in terms of characteristics, architecture, applications and challenges.
This paper presents an extensive survey on VANETs and issues that are common so
as provide necessary information and insight to developers and researchers in
this field of research. The paper begins with ad hoc networks and ends with
tools for VANETs simulation. |
Keywords: |
Wireless Access in Vehicular Environments, Mobile Ad hoc Networks, Flying Ad hoc
Networks, Intelligent Transport Service, Vehicular Ad hoc Networks, Routing |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
PROFICIENT KEY TREE STRUCTURE FOR DYNAMIC MULTICAST GROUPS |
Author: |
USHA DEVI G, WAHIDHA BANU RSD |
Abstract: |
Most of the group key management schemes focus on reducing the update messages.
Majority of the groups are dynamic in nature and large. To assuage the
scalability problem, various key structures have been proposed. In dynamic
multicast groups, key updates are complicated since group members join and leave
at any time. Hierarchical tree structure is suitable for maintaining multicast
group members and keys. If the member wishes to join, it sends request to the
Group Centre (GC) or Key Server. The Server authenticates the member and assigns
an inimitable ID, which is later inserted into the tree. Similarly, the Server
adjusts the tree when the member leaves from the group. Forward and backward
secrecy are ensured by updating the keys whenever a join/leave request is
handled called re-keying. Proficient Key Tree structure is proposed to reduce
the number of re-keying operations during join/leave operations. This tree
structure has two parts namely the upper part called quad tree at few levels
which has at most four children and the lower part called a binary tree which
has at most two children. With this structure, experimental results show that
the costs are reduced compared to the full binary key tree approach. |
Keywords: |
Proficient Key Tree Structure, Re-keying, Quad level, Multicast Groups. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
EVALUATION OF EDF AND RM SCHEDULING ALGORITHMS: CHOICES AND TRADEOFFS |
Author: |
V.KAVITHA, Dr. V.KANNAN AND Dr. S.RAVI |
Abstract: |
Since the first results published in 1973 by Liu and Layland on the Rate
Monotonic (RM) and Earliest Deadline First (EDF) algorithms, a lot of progress
has been made in the schedulability analysis of periodic task sets. Priority
based real time scheduling algorithms such as RM and EDF have been analyzed
extensively in this literature to achieve optimized results in real rime
operations. In the paper, RM and EDF scheduling techniques have been used,
analyzed and compared based on different parameters in real time environment and
these traditional priority scheduling algorithms are analyzed by addressing the
following metrics: Best case response time, Worst case response time, response
time jitter and latency. Past work has been extended in this direction by
characterizing the behavior of the scheduling algorithms in detail using
theoretical analysis as well as experimental evaluation. The results of this
analysis can be used to control design choices for real time systems. Various
issues have been presented on which there is still a need to work. |
Keywords: |
EDF, Jitter, Latency, priority scheduling, Response time, RM |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
PROFICIENT ALGORITHM FOR SUPERIOR WARNING MESSAGE BROADCAST IN VANET |
Author: |
S. CLOUDIN, NIDHIN AS, K.KOMATHY |
Abstract: |
In the past few decades, the number of vehicles on road has been rapidly
increasing. Due to this high density of vehicles, road accidents and the
potential threats on road are also increasing. To reduce these factors, VANET
technology which uses moving car as nodes in a network to create a mobile
network is adapted to enhance the vehicular technology by disseminating messages
to each other. Since vehicles have high mobility, warning messages have to be
quickly disseminated in order to reach maximum number of vehicles on road. The
notification to the nearby vehicle is simply done by broadcasting the messages,
which is retransmitted over and again by the vehicles simultaneously to other
nearby vehicles. Selection of a set of forwarding nodes is a challenging task.
In this work, a Cell Structured Broadcast Modeling Algorithm (CSBMA) is proposed
to design a virtual hexagon network to remove the broadcast storm problem in
real urban scenarios. The proposed work is a sender-initiated broadcast approach
in which a sender estimates its neighbor location with a non-geometric broadcast
approach and selects a set of forwarding candidate nodes located at the boundary
of sender’s nodes based on communication area overlap values. A simple random
backoff mechanism is also proposed to reduce the packet collisions. |
Keywords: |
Mobility Models, Broadcast Storm Problem, Warning Message Dissemination, VANET,
Non-Geometric Approach, Virtual Hexagon-Based Coverage, Boundary Node
Estimation. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
GEOGRAPHIC RELAY REGION BASED POWER AWARE ROUTING IN WIRELESS SENSOR NETWORKS |
Author: |
M. VIJU PRAKASH, B. PARAMASIVAN |
Abstract: |
Power aware routing is a powerful localized routing scheme for wireless sensor
networks (WSNs) due to its scalability and efficiency. Maintaining neighborhood
information for packet forwarding may not be suitable for WSNs in highly dynamic
scenarios. Beacon-based protocols are maintaining neighbor information but does
not comply on energy efficiency. We propose a novel routing scheme, called
Geographic Relay Region based Power Aware Routing (GRRR), which can provide
energy efficient, loop-free, stateless, sensor-to-sink power aware routing
without the help of prior neighborhood information. In this routing scheme, each
node first announces its next-hop optimum relay position on the straight line
toward the sink and each node computes its quality value based on the residual
power and distance between the optimum relay regions. Forwarder node is elected
by the source based on quality value communicated using
Request-To-Send/Clear-To-Send (RTS/CTS) handshaking mechanism. We establish the
conditions for guaranteed delivery for sensor-to-sink routing, assuming no
packet loss and no failures in greedy forwarding. We extend this scheme to lossy
sensor networks to provide stable and efficient routing in the presence of
unreliable communication links. Simulation results show that GRRR outperforms
existing protocols with highly dynamic network topologies. |
Keywords: |
Wireless Sensor Networks, Power-Aware Geographic Routing, Optimum Search Relay
Region, Lossy Sensor Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
MEMORABILITY RATES OF GRAPHICAL PASSWORD SCHEMES |
Author: |
OBASAN ADEBOLA OLUKAYODE, NORAFIDA ITHNIN, OLUMIDE SIMEON OGUNNUSI |
Abstract: |
Passwords authentication has become a widely recognized element of computer
security for confirming users’ identity before access can be granted or
repudiated to an intended information contents or applications of the system.
Graphical password schemes are a login option that use images instead of
alphanumeric strings for the purpose of user authentication. This alternative
means of authentication is mainly designed to achieve good memorability and
secutity of any choosen passwords based on widely known superiority effect of
images over random strings. This paper provides a comprehensive survey of
graphical password schemes and reports a memorability comparison between them.
It also highlights how different memory tasks affect the graphical passwords and
the relationship between them. |
Keywords: |
Graphical Password, Authentication, Memorability, Memory Tasks |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
WAVELET THRESHOLDING AND FUSION FOR ULTRASOUND MEDICAL IMAGE DE-NOISIING |
Author: |
P.V.V.KISHORE, S.R.C.KISHORE, A.S.C.S.SASTRY, R.SRI RAM |
Abstract: |
Ultrasound medical images are a source of visual information regarding the
health condition of human body. This non invasive diagnostics technique is most
widely used by doctors around the globe has been in use for quite some time now.
However, the ultrasound medical image quality is severely hampered due to the
presence of speckle components that invade the ultrasound image. Noise presence
in ultrasound images greatly reduces the visual information related to internal
body parts. This research proposes wavelet based soft and hard thresholding
techniques for removing speckle noise form ultrasound medical images.
Thresholding operation is a global processing technique which will damage the
objects of interest in the US images. To restore the lost visual quality due to
global thresholding, wavelet based fusion of original ultrasound image and
thresholded ultrasound image is performed. This procedure restores the lost
object information in the thresholded ultrasound images. Evaluation of fusion
rules for the proposed process is done using fusion factor and fusion symmetry.
The overall performance of the proposed techniques is computed using mean square
error (mse) and peak signal to noise ratio (psnr). |
Keywords: |
Ultrasound Medical Image, Speckle Noise, Discrete Wavelet Transform (DWT), Soft
and Hard Thresholding, Wavelet based Fusion. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
NETWORK INTRUSION DETECTION SYSTEM: AN IMPROVED ARCHITECTURE TO REDUCE FALSE
POSITIVE RATE |
Author: |
P.BRINDHA, Dr.A.SENTHILKUMAR |
Abstract: |
Counting Bloom Filter (CBFs) is widely employed in networking applications. They
support membership queries with minimal error and surmount the drawback of Bloom
filters. However, they engross large amount of memory. A new Sidon sequence
based CBF is introduced to improve the competency of the CBFs. Unlike CBF, the
hashed Variable increment is queried for its present. This method achieves 24%
of the improvement in false positive rate and a lower inundate probability bound
than CBF. The proposed work is described in Verilog and simulated using Xilinx
12.1. The functional block is implemented as hardware using Virtex 4 (XC4VSX25)
Field Programmable Gate Array (FPGA). It is observed that the hardware
complexity and memory overhead increases, which could be a trade-off for
improving FPR in order to increase the Network Security. |
Keywords: |
Intrusion Detection, Bloom Filter, Sidon sequence, Counting Bloom filter, False
Positive Rate. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
OPTIMAL MAPPING MODE FOR XILINX FIELD-PROGRAMMABLE GATE ARRAY DESIGN FLOW |
Author: |
MEHDI JEMAI, SONIA DIMASSI, BOURAOUI OUNI, ABDELLATIF MTIBAA |
Abstract: |
The design mapping mode has a large impact on FPGA designs in terms of
performance, area, and power dissipation. Existing Xilinx FPGA design flow
offers to designers three mapping modes. Each mode has its advantages and its
drawbacks. To address this problem, in this paper, we have used these three
Xilinx design mapping approaches to map set applications. Next, we have
evaluated design results provided by each design mapping approach. Next, a
comparative study between these design mapping modes has been presented.
Finally, we have extracted the weak and the strong points of each design mapping
mode. |
Keywords: |
Design mapping mode; Xilinx FPGA device; FPGA Reconfiguration Zone;
reconfigurable Module. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
SOAP: SENSITIVE OPERATIONAL ATTRIBUTE PATTERN BASED VULNERABILITY ANALYSIS FOR
BUSINESS INTELLIGENCE USING RULE SETS |
Author: |
S. SENTHIL KUMAR, DR.M.PRABHAKARAN |
Abstract: |
The development of internet technology opens the gate for most business
solutions to be performed online; for example online shopping, fund transfer,
banking process and etc. The problem is, how secure the transactions performed
online and what security metrics considered by service providers. By providing
online services, the providers of service have great deal of securing user
information’s and business data from malicious users. There are chances for
variety of internet attacks, to degrade the service performance or
malfunctioning the user information. Now a day, there is a high frequency of
online stealing of user information and anonymous transfer of funds from
personal accounts. We propose a naval approach to safeguard the services,
information of both personal and corporate from malicious attacks. The proposed
SOAP approach which groups services according to the type of attributes they
access and how the services are completed. We use service rule sets using which
a service access matrix is computed to find out malicious service accesses.
Finally we generate set of vulnerability patterns based on service access matrix
and rule set. |
Keywords: |
Vulnerability, Service Access Matrix, Business Intelligence, Operational
Attribute. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
GRAY CO-EFFICIENT MASS ESTIMATION BASED IMAGE SEGMENTATION TECHNIQUE FOR LUNG
CANCER DETECTION USING GABOR FILTERS |
Author: |
K.SANKAR, DR.M.PRABAKARAN |
Abstract: |
Lung cancer detection techniques have been discussed widely in the medical
domain; where the location and presence of cancer has to be identified from low
level X-Rays or medium level Scans. Still the accuracy of detection depends on
the medical practitioner or the automatic detection system. Whatever it is, the
process has defects in identifying LCD and the accuracy of identification is
highly questionable due to the false positive results provided. There are many
features and techniques have been proposed earlier for detection of LCD, we
propose a new mass estimation technique with gray co-efficient values based on
which segmentation is performed. The proposed method removes the noise present
in the input image using Gabor filter. The efficiency of Gabor filter helps to
improve the image quality, and then we compute the gray co-efficient mass
estimation for each of the pixel from image. Based on computed mass value of
each pixel, the segmentation is performed. The segmentation process uses mass
threshold, using which the pixel is selected for LCD process. The selected
pixels are used to form the region for LCD and to produce results to the user.
The proposed approach has produced efficient results with less false results,
also reduces the time complexity. |
Keywords: |
Gabor Filter, Image segmentation, Mass Estimation, LCD Detection. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
SHAPING AN EXPERTS LOCATOR SYSTEM: RECOMMENDING THE RIGHT EXPERT |
Author: |
NASSER ALHOSAN, AYHAM FAYYOUMI, HOSSAM FARIS |
Abstract: |
Experiences and knowledge inside any organization is a high valued resource. In
order to utilize this resource, organizations should facilitate the knowledge
sharing process between experts and others. Experts-locator systems recommend
experts within the organization. However, current systems does not take into
account the responsiveness of experts in providing support when requested. The
proposed system ranks and recommends experts based on factors such as experience
duration, experience level, number of projects, and more importantly, number of
sent emails as a responsiveness indicator. Delphi technique was followed to
identify and weight the factors. The prototype system has been experimented and
results indicate that ranking formula is useful to recommend more responsive
experts. |
Keywords: |
Knowledge Management, Knowledge Sharing, Experts-locator Systems, Responsiveness |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
SUBJECTIVE SYMMETRICAL SUPPORT VECTOR MACHINE FOR WEB TRAFFIC MINING |
Author: |
S.G.SHRINIVAS, DR. N.M. ELANGO |
Abstract: |
Traffic classification has received significant attention due to the capability
of blocking unwanted transfer of complex information. One of the important
decisions that have to be made while constructing a classification model is to
employ learning approach. Hierarchical Distributed Peer-to-Peer (HP2PC)
architecture grouped to form higher level neighborhoods but elaborated technique
were not adopted to handle bidirectional traffic and was not extended to dynamic
structure. Cluster-Adaptive Distance Bound (CADB) based on separating hyper
plane boundaries of Voronoi clusters facilitate resourceful spatial filtering,
with relatively small preprocessing storage. The storage overhead was in a way
addressed using the Euclidean and Mahalanobis similarity measures but effective
attribute selection was not applied to solve the issue related to distance
bounds. To overcome the bidirectional traffic problem with dynamic structure
Subjective Symmetrical Support Vector Machine (SS-SVM) mechanism is developed. A
hybrid attribute selection algorithm is designed which pre-filters (i.e.,
Classifies) the attributes with improved (refers to subjective symmetry) Support
Vector Machine and solve the related distance bounds problem. After classifying
the attributes with SS-SVM, the best attributes are further selected and then
generates the attribute value. SS-SVM algorithm assigns higher values to the
attributes that are capable to generate data report from minority and majority
class. Moreover, SS-SVM for flow-based attribute selection in traffic
classification is applied. Subjective Symmetrical mechanism experimented with
factors such as classification rate, true positive rate, attribute selection
efficiency, memory consumption, and report generation effectiveness. Subjective
Symmetrical mechanism improves averagely the attribute selection up to 6 % when
compared with the state-of-art methods. |
Keywords: |
Web Traffic classification, Support Vector Machine, Subjective Symmetry,
Bidirectional traffic, Hybrid Attribute Selection Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
ATTRIBUTE VALUE PAIRS BASED ON DISCERNIBILITY MATRIX FOR OUTLIERS DETECTION |
Author: |
MISINEM, AZURALIZA ABU BAKAR, ABDUL RAZAK HAMDAN, FAIZAH SHAARI |
Abstract: |
Outlier mining is one important task in data mining and it has always been
receiving attention from many researchers. The detection of outliers is found
useful in many real applications like fraud detection and network intrusion.
There are many outlier detection methods found in literature which include the
frequent pattern generation and Rough Set based outlier detection. Although many
methods have been proposed in data mining, the problems in detecting outliers
efficiently continue especially in many real applications, due to the high
dimensionality of huge data sets and high computational in processing. In this
study, we proposed a method to detect outliers by discovering interesting
attribute value pairs based on the Discernibility Attribute Value Matrix (DAV)
in Rough Set Theory (RS). Interesting attribute value pairs (avp) are generated
from the DAV Matrix. Two measures which are the support and interest value are
used to measure the interestingness of the attributes. In order to detect
outliers, a new measurement called the DAV Outlier factor (DAVOF) is proposed.
In addition, an Average Ratio (AR), which measures the performance of the
outlier detection method is also proposed. The DAV algorithm (DAVAlg) is
compared with the FindFPOF and RSetAlg methods. The result shows that the DAVAlg
outperforms the other two methods. |
Keywords: |
Outliers Detection, Discernibility Attribute Value (DAV) Matrix, Attributes
Value Pairs (avp) |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
INCREASING PERFORMANCE OF SAC-OCDMA BY COMBINE OFDM TECHNIQUE |
Author: |
A. O. ALDHAIBANI, S. A. ALJUNID, M. S. ANUAR, AR ARIEF |
Abstract: |
Optical CDMA playing significant roles to extend from local area networks to
longer span telecommunication type networks. In order to play a significant role
in these longer span with higher data rate networks. Optical CDMA code Prefer to
have OFDM technique. In this letter, combine SAC-OCDMA with OFDM, operate high
data rates and propagate with high fidelity over fiber links. The design of
hybrid system with code weight equal to 2 for operation at 10 Gb/s and evaluate
their propagation over an existing 100 km network link by means optisystem
software. The proposed system using multi diagonal (MD) code gives a good
performance based on bit error rate (BER) and long distance. As a result, the
BER improved 10^-4 for the OFDM-OCDMA than conventional OCDMA systems at
distance 100 Km, as well as the data rate reached to 10 Gbps with desired bit
error rate (BER). |
Keywords: |
Spectrum Amplitude code OCDMA; OFDM; MD. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
AUTOMATIC LIGHTNING WHISTLER DETECTION USING CONNECTED COMPONENT LABELING METHOD |
Author: |
KOMANG SETIA DHARMA, I PUTU AGUNG BAYUPATI, PUTU WIRA BUANA |
Abstract: |
The Earth’s atmosphere contains many natural phenomena, one of them is lightning
whistler. This phenomena is electromagnetic waves that occurs shortly after the
occurrence of lightning and it propagates in the ionosphere and magnetosphere.
It propagates with different speed resulting sound like a whistling at radio
frequency and is commonly known as whistler wave. Some benefits on this research
of whistler wave is for global communications, lightning geolocation,
ground-to-satellite communications, satellite protection and many more. An
effort to analyze the whistler waves is to detect patterns of whistling from
whistler wave. For being able to detect the pattern of whistler, it must be
converted into spectrogram image. In the detection process, spectrogram image
goes through a noises removal process using image processing methods such as
adaptive thresholding method, median filter and opening method. Noises removal
process aims to remove or reduce the noises in the spectrogram image. Then,
spectrogram image will be labeled and detected using connected component
labeling method, the detection results are waves pattern that has marked with
red border boxes and also a number of wave patterns detected. By using image
processing, connected component labeling method and then applied with Matlab
programming language, the pattern of whistler can be detected easily and faster. |
Keywords: |
Whistler Wave, Connected Component Labeling, Image Processing. |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
Title: |
PERFORMANCE EVALUATION OF CROSS LAYER BASED AODV PROTOCOL USING MULTIPATH
GATEWAY ROUTE DISCOVERY FOR MANETS |
Author: |
K. PALANI, P. RAMAMOORTHY |
Abstract: |
The quality of service is a fundamental attribute of MANETs that makes an
impression on the performance of the network, when connected to the internet.
Several authors have proposed some solutions to improve the performance of the
integration of mobile ad hoc network and internet to achieve effective data
services at high data rates. A gateway node is needed in this case to establish
connection between mobile ad hoc networks and internet. The usage of AODV
routing protocol faces problems like establishing a long route, time delay and
breakage of routes, which leads to perform degradation in the Quality of Service
parameters. This paper focus on the development of a multipath gateway route
discovery scheme using a cross layer based AODV protocol. The performance
analysis of this protocol brings out a better quality of service for data
transfer between MANETs and internet environment. |
Keywords: |
MANET, Multipath gateway Route Discovery, CBAODV Protocol, QoS parameters,
Routing Discovery Time, Retransmission Attempts and throughput |
Source: |
Journal of Theoretical and Applied Information Technology
20th August 2014 -- Vol. 66. No. 2 -- 2014 |
Full
Text |
|
|
|