International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 4, No. 12, Nov. 2012

Cover page and Table of Contents: PDF (size: 200KB)

Table Of Contents

REGULAR PAPERS

Analogue Wavelet Transform Based the Solution of the Parabolic Equation

By Jean-Bosco Mugiraneza Amritasu Sinha

DOI: https://doi.org/10.5815/ijitcs.2012.12.01, Pub. Date: 8 Nov. 2012

In this paper we have proved that the solution of parabolic equation and its Fast Fourier Transform generate continuous wavelet transforms. Indeed, we have solved the parabolic equation using PDETool, exported its solution and coefficients to Matlab workspace. We have then imported the solution from workspace to signal processing tool. We have sampled the imported solution with the sampling frequency of 8192Hz and applied the band pass filter with that frequency. The convolution of the sampled PDE solution with the impulse response of the band pass filter has generated wavelet transform. This algorithm computes the wavelet transform either directly of via Faster Fourier Transform. The computation of the FFT of the PDE solution has produced complex wavelet.

[...] Read more.
A Proposed Virtualization Technique to Enhance IT Services

By Nashaat el-Khameesy Hossam Abdel Rahman Mohamed

DOI: https://doi.org/10.5815/ijitcs.2012.12.02, Pub. Date: 8 Nov. 2012

System virtualization is an antique art that will continue as long as applications need isolation and performance independence. Virtualization provides many benefits and greater efficiency in CPU utilization, greener IT with less power consumption, better management through central environmental control, more availability, reduced project timelines by eliminating hardware procurement, improved disaster recovery capability, more central control of the desktop, and improved outsourcing services. In this paper we will deliver new and enhanced IT services in less time and with greater agility. The goal of providing rapid near real-time response to customer requirements is in part being achieved by taking advantage of virtualization. Virtualization provides many benefits, including improved physical resource utilization, improved hardware efficiency, and reduced power and cooling expenses. However, it introduces another set of systems (virtual machines) that have to be controlled, provisioned, managed, updated, patched, and retired. This paper is organized into the following areas- An introduction to virtualization and its benefits, the Challenges of Virtualization techniques, an overview of the hardware virtualization technique, an overview of the software virtualization technique. The paper also proposes an effective and flexible distributed scheme with three phases, opposing to its predecessors. Our scheme achieves reducing the workload of a data center and continual service improvement.

[...] Read more.
Improvement in Quality of Software Architecture via Enhanced-Pattern Driven Architecture (EPDA)

By Muhammad Fahad Khan Kanwal Yousaf Anam Mustaqeem Muazaam Maqsood

DOI: https://doi.org/10.5815/ijitcs.2012.12.03, Pub. Date: 8 Nov. 2012

No doubt software plays an important role in improvement of our lives. Great demand of software makes software architecture more complex. Flaws in any software have direct impact on diverse fields of life (such as business, science, engineering etc). The main reason of any software failure is due to poor software architecture or quality attributes. This paper focuses on factors that affect the quality of software architectures and highlighted the major reason of the defects through questionnaire and survey. In the light of this survey a technique is proposed to improve the quality of any software architecture. The proposed architecture is Enhanced-Pattern driven architecture (EPDA). This architecture focuses on the improvement of design phase in any architecture. This will also help in resolving lots of problems which arise due to usage of different traditional architectural styles.

[...] Read more.
Validated CMS: Towards New Generation of Web Content Management Systems on Web 2.0

By Zakaria Itahriouan Anouar Abtoy Kamal Eddine El Kadiri Noura Aknin

DOI: https://doi.org/10.5815/ijitcs.2012.12.04, Pub. Date: 8 Nov. 2012

Web 2.0 makes users the main actors for publishing content and creating applications on the web. The increasing of information overload and consequently the decrease of its quality are the main problems of this domain. Content Management Systems (CMS) provide the ability to publish on the web by offering simple publishing tools for ordinary users with no technical skills. Content available on the web created using the CMS is not well controlled and requires efficient process that evaluates its quality. Therefore, Content Management Systems contribute to the problem related to information and content quality similarly to Web 2.0 tools. The mechanism of validating content has proved a high-level of content’s quality control by involving users in the process according to Web 2.0 philosophy. From these perspectives, we develop Validated Content Management System (VCMS) as a new Web 2.0 tool that supports content validation mechanisms. This article presents the VCMS and its ability to provide an effective quality control for web content. We introduce a new manner of collaborative publishing and we give an overview about features of our system and its core architecture.

[...] Read more.
Architecture Aware Key Management Scheme for Wireless Sensor Networks

By Benamar KADRI Mohammed FEHAM Abdellah MHAMMED

DOI: https://doi.org/10.5815/ijitcs.2012.12.05, Pub. Date: 8 Nov. 2012

The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexibility, facility of use and deployment as well as their low cost give them an increasing field of applications. Usually sensors are limited in capacities deployed in a hostile and unpredictable environment, making the security of these networks a challenging task. In this paper we are going to present a key management scheme in which the base station play the role of the secure third party responsible of distributing key and managing security in the network, two versions of this scheme are presented the first one for flat networks and the second one for hierarchical networks in which the cluster head play the key role in all key agreement with the base station.

[...] Read more.
Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers

By G. Ramesh R. Umarani

DOI: https://doi.org/10.5815/ijitcs.2012.12.06, Pub. Date: 8 Nov. 2012

The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. We have proposed a Web programming language to be analyzed with five Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers. This is followed by conducting tests simulation in order to obtain the best encryption algorithm versus Web browser. The results of the experimental analysis are presented in the form of graphs. We finally conclude on the findings that different algorithms perform differently to different Web browsers like Internet Explorer, Mozilla Firefox, Opera and Netscape Navigator. Hence, we now determine which algorithm works best and most compatible with which Web browser.
A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as encryption/decryption speed in the different web Browsers. Experimental results are given to demonstrate the effectiveness of each algorithm.

[...] Read more.
Efficient Networks Communication Routing Using Swarm Intelligence

By Koushal Kumar

DOI: https://doi.org/10.5815/ijitcs.2012.12.07, Pub. Date: 8 Nov. 2012

As demonstrated by natural biological swarm’s collective intelligence has an abundance of desirable properties for problem-solving like in network routing. The focus of this paper is in the applications of swarm based intelligence in information routing for communication networks. As we know networks are growing and adopting new platforms as new technologies comes. Also according to new demands and requirements networks topologies and its complexity is increasing with time. Thus it is becoming very difficult to maintain the quality of services and reliability of the networks using current Networks routing algorithms. Thus Swarm intelligence (SI) is the collective behavior of decentralized self-organized systems, natural or artificial. The concept is employed in work on artificial intelligence. A new class of algorithms, inspired by swarm intelligence is currently being developed that can potentially solve numerous problems of modern communications networks. These algorithms rely on the interaction of a multitude of simultaneously interacting agents. In this paper we give disadvantages of previously used network routing algorithms and how we can apply swarm intelligence to overcome these problems.

[...] Read more.
Real Time Handwritten Marathi Numerals Recognition Using Neural Network

By Sandeep B. Patil G.R. Sinha

DOI: https://doi.org/10.5815/ijitcs.2012.12.08, Pub. Date: 8 Nov. 2012

Character recognition is an important task in biometrics. This paper uses neural network for real time handwritten Marathi numerals recognition. We have taken 150 online Marathi numerals written in different styles by 10 different persons. Out of these, 50 numerals were used for training purpose and another 100 numerals were used for recognition purpose. The numerals undergo the preprocessing steps using image processing techniques and after character digitization it is further subjected to the multilayer backward propagation neural network for recognition purpose. The proposed research work gives recognition accuracy from 97% and to 100% for the different resolution of input vector.

[...] Read more.
Classification of SAR Images Based on Entropy

By Debabrata Samanta Goutam Sanyal

DOI: https://doi.org/10.5815/ijitcs.2012.12.09, Pub. Date: 8 Nov. 2012

SAR image classification is the progression of separating or grouping an image into different parts. The good feat of recognition algorithms based on the quality of classified image. The good recital of recognition algorithms depend on the quality of classified image. The proposed classification method is hierarchical: classes which are difficult to distinguish are grouped.An important problem in SAR image application is accurate classification. In this paper, we developed a new methodology of SAR image Classification by Entropy. The severance between different groups or classes is based on logistic and multi-nominal regression, which finds the best combination of features to make the separation and at the same time perform a feature selection depending on Grouped –Entropy value.

[...] Read more.
Analysis of MC-CDMA System in Mobile Communications

By M. F. Ghanim M. F. L. Abdullah

DOI: https://doi.org/10.5815/ijitcs.2012.12.10, Pub. Date: 8 Nov. 2012

Wireless communication plays an important role in our daily life. One of the most important techniques which is Candidate for the fourth generation is Multicarrier Code Division Multiple Access (MC-CDMA) due to its high data rate. This research paper presents the MC-CDMA system using different modulation techniques. The variety of modulation types are depended in order to show the effects of modulation index and type on broadcasting data. The bit error rate of the system is plotted for a range of signal to noise ratio so that the effect of modulation on the MC-CDMA system will be evident. Actually, the simulation results show that QAM gives less bit error rate that makes MC-CDMA more flexible and suitable for mobile communication next generation technology. Also, the peak-to-average power (PAPR) of MC-CDMA is analyzed to show that high PAPR is the main disadvantage of MC-CDMA system then the possible solutions for this problem are discussed in this research paper.

[...] Read more.