IJITCS Vol. 6, No. 7, Jun. 2014
Cover page and Table of Contents: PDF (size: 196KB)
REGULAR PAPERS
The purpose of this study is to forecast Southwest Indian Monsoon rainfall based on sea surface temperature, sea level pressure, humidity and zonal (u) and meridional (v) winds. With the aforementioned parameters given as input to an Artificial Neural Network (ANN), the rainfall within 10x10 grids of southwest Indian regions is predicted by means of one of the most efficient clustering methods, namely the Kohonen Self-Organizing Maps (SOM). The ANN is trained with input parameters spanning for 36 years (1960-1995) and tested and validated for a period of 9 years (1996-2004). It is further used to predict the rainfall for 6 years (2005-2010). The results show reasonably good accuracy for the summer monsoon periods June, July, August and September (JJAS) of the validation years.
[...] Read more.Proposed the PID controller parameters tuning method based-on New Luus-Jaakola (NLJ) algorithm and satisfaction idea. According to the different requirements of each performance index, designed the satisfaction function with fuzzy constraint attributes, and then determined the comprehensive satisfaction function for PID tuning by NLJ algorithm. Provided the steps of PID controller parameters tuning based on the NLJ algorithm and satisfaction, and applied this tuning method to the cascade control system of superheated steam temperature for Power Station Boiler. Finally the simulation and experiment results have shown the proposed method has good dynamic and static control performances for this complicated superheated steam temperature control system.
[...] Read more.Association rules are the main technique for data mining. Apriori algorithm is a classical algorithm of association rule mining. Lots of algorithms for mining association rules and their mutations are proposed on basis of Apriori algorithm, but traditional algorithms are not efficient. For the two bottlenecks of frequent itemsets mining: the large multitude of candidate 2- itemsets, the poor efficiency of counting their support. Proposed algorithm reduces one redundant pruning operations of C_2. If the number of frequent 1-itemsets is n, then the number of connected candidate 2-itemsets is C-n, while pruning operations C_n. The proposed algorithm decreases pruning operations of candidate 2-itemsets, thereby saving time and increasing efficiency. For the bottleneck: poor efficiency of counting support, proposed algorithm optimizes subset operation, through the transaction tag to speed up support calculations.
Algorithm Apriori is one of the oldest and most versatile algorithms of Frequent Pattern Mining (FPM). Its advantages and its moderate traverse of the search space pay off when mining very large databases. Proposed algorithm improves Apriori algorithm by the way of a decrease of pruning operations, which generates the candidate 2-itemsets by the apriori-gen operation. Besides, it adopts the tag-counting method to calculate support quickly. So the bottleneck is overcome.
A Mobile Adhoc Network is a multi-hop self-configuring network without any fixed infrastructure. Due to mobility of nodes, dynamic topology and highly dynamic environment, designing and implementing stable routing in Mobile Ad-hoc Networking is a major challenge and a critical issue. This paper analyses the performance analysis of on demand routing protocol, Dynamic Source Routing (DSR), Adhoc on Demand Distance Vector Routing (AODV) and table driven protocol, Destination-Sequenced Distance Vectoring (DSDV) using a network simulator NS2. Different types of test scenario have designed with fixed number of nodes but varying mobility. Different performance metric values like, throughput, delay, normalized network load, end to end delay, dropped packets, packets delivery ratio have been observed. The experimental results have been analysed and recommendation based on the obtained results has been proposed about the significance of each protocol in different scenarios and situations. The simulation results show that both protocols are good in performance in their own categories. We believe that findings of this paper will help the researcher to find the best protocol under predefined condition with varied mobility. We believe that this research will help the researcher to identify and further investigate any particular metrics value of AODV, DSR and DSDV.
[...] Read more.Service discovery is the process of retrieving the service most similar to the query based on the description of functional and/or non-functional semantics. The original algorithm used in literature was proposed by Paolucci et al., 2002. Some research works, propose an extension or an improvement of this algorithm to correct the matchmaking used. In this paper we present an algorithm of matchmaking that resolves the problems of Paolucci algorithm by using the shortest path algorithm which determines the optimal matching between user query and provider service. This approach is validated within a framework proposed at the end of this paper and compared with the greedy approach and the bipartite graph based matching.
[...] Read more.Solo sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, a SSO scheme proposed and claimed its security by providing well organized security arguments. But their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks i.e., credential recovering attack and impersonation attack without credentials. So we propose a more authentication scheme that overcomes these attacks and flaws by make use of efficient verifiable encryption of RSA signatures. We promote the formal study of the soundness of authentication as one open problem.
[...] Read more.Ever increasing demand of good quality communication relies heavily on Network Intrusion Detection System (NIDS). Intrusion detection for network security demands high performance. This paper gives a description of the available approaches for a network intrusion detection system in both software and hardware implementation. This paper gives a description of the structure of Snort rule set which is a very popular software signature and anomaly based Intrusion Detection and prevention system. This paper also discusses the merit of FPGA devices to be used in network intrusion detection system implementation and the approaches used in hardware implementation of NIDS.
[...] Read more.Last few decades have remained the witness of steeper growth in demand for higher computational power. It is merely due to shift from the industrial age to Information and Communication Technology (ICT) age which was marginally the result of digital revolution. Such trend in demand caused establishment of large-scale data centers situated at geographically apart locations. These large-scale data centers consume a large amount of electrical energy which results into very high operating cost and large amount of carbon dioxide (CO_2) emission due to resource underutilization. We propose MADLVF algorithm to overcome the problems such as resource underutilization, high energy consumption, and large CO_2 emissions. Further, we present a comparative study between the proposed algorithm and MADRS algorithms showing proposed methodology outperforms over the existing one in terms of energy consumption and the number of VM migrations.
[...] Read more.Voice over IP (VoIP) is the technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and communication services providers. The main are cost savings, rich media service, phone and service portability and mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as architecture complexity, interoperability problems, QoS concerns, and security issues. Due to the inability of the IP networking technology to support the stringent QoS constraints of voice traffic, and the incapability of traditional security mechanisms to adequately protect VoIP systems from recent intelligent attacks, QoS and security issues are considered as the most serious challenges for successful deployment of the VoIP technology. The aim of this paper is to carry out a deep analysis of the security issues and QoS concerns of the VoIP technology. Firstly, we present a brief overview about the VoIP technology. Then, we discuss the QoS problems encountering the deployment of the VoIP technology. The presented discussion mainly address the QoS issues related to the use of the IP networking technology, the QoS concerns related to voice clarity, and the QoS mechanisms proposed to support voice traffic QoS constraints. After that, we investigate the security issues of the VoIP technology. The presented investigation mainly address the vulnerabilities and security attacks of VoIP systems, as well as the countermeasures that should be considered to help the deployment of secured VoIP systems.
[...] Read more.The minimum rule base Proportional Integral Derivative (PID) Fuzzy Computed Torque Controller is presented in this research. The popularity of PID Fuzzy Computed Torque Controller can be attributed to their robust performance in a wide range of operating conditions and partly to their functional simplicity. The process of setting of PID Fuzzy Computed Torque Controller can be determined as an optimization task. Over the years, use of intelligent strategies for tuning of these controllers has been growing. PID methodology has three inputs and if any input is described with seven linguistic values, and any rule has three conditions we will need 343 rules. It is too much work to write 343 rules. In this research the PID-like fuzzy controller can be constructed as a parallel structure of a PD-like fuzzy controller and a PI controller to have the minimum rule base. However computed torque controller is work based on cancelling decoupling and nonlinear terms of dynamic parameters of each link, this controller is work based on manipulator dynamic model and this technique is highly sensitive to the knowledge of all parameters of nonlinear robot manipulator’s dynamic equation. This research is used to reduce or eliminate the computed torque controller problem based on minimum rule base fuzzy logic theory to control of flexible robot manipulator system and testing of the quality of process control in the simulation environment of MATLAB/SIMULINK Simulator.
[...] Read more.