Author Archives: admincom

Simulate and Model MANETs Environment with AOMDV Routing Protocol

Mohammed Saad Talib1 and Zainab Saad Talib2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Simulation techniques are being the most important tool that can be used in verification, test and implementation of the Mobile Ad-hoc Network (MANET) environments. These computerized techniques can be feasibly used as a virtual tool to model and operate any suggested environment. MANET was defined “as a set of mobile nodes that moved freely and connected among each other without any infrastructure”. Simulation represents a good reliable tool that can be used to evaluate the performance of an existing or proposed MANET environment under different configurations along periods of real time. In this paper certain MANET’s environment was simulated and operated with AOMDV routing Protocol. The effects of the number of nodes, their speeds and their pause times were modeled and analyzed. The network simulator NS-2 was used as a tool to study and evaluate the effects of these factors. Many performance metrics such as throughput, packets loss, packet delivery fraction (PDF), average end-to-end delay, normalize routing load (NRL) and jitter were used as comparison indications. The simulation environment was implemented with different number of nodes, different speeds, and varying pause times. Significant effects and relations between all these parameters and performance metrics were found and calculated.

Hide Abstract

Performance Evaluation in Web Architectures

Rupesh Nagendra

View:    Abstract |  HTML Full Text |  PDF |  XML|

There are several web architectures present in World Wide Web (WWW) such as Client-server web architecture (CWA), distributed web architecture (DWA) and serviceoriented architecture (SOA). DWA and SOA is the most popular distributed technology in whole WWW. The use of SOA or more specifically the web services technology is an important architecture decision. Marketing application also used only distributed technology, because distributed technology is provided several quality attributes modifiability, performance, availability, security, interoperability and scalability. CWA doesn’t provide quality attribute as much DWA and SOA. Today distributed web architecture has become the most popular approach for developing web architecture. In this paper we have evaluated the performance quality attributes for CWA, DWA and SOA. These performance evaluations have observed in terms of time.

Hide Abstract

Security Measures of WSN Networks by Avoiding Message Replay Attacks

Geetanjali Kandhari1, Deepak Aggarwal2

View:    Abstract |  HTML Full Text |  PDF |  XML|

The challenges area of Ad Hoc networks is attributable to their lack of established infrastructure, requirement for redistributed management, dynamic topology, and wireless channel characteristics. We have a tendency to study the performance of IEEE 802.15 MAC protocol below varied conditions such as using Power control method and other techniques that improve better than of other Ad Hoc networks. To satisfy these needs a WSN networks is used to supports adaptively and improvement across layers of the protocol is needed. The WSN network improves better than other Ad Hoc networks types because in WSN the data only transferred when the both (sender /receiver) satisfied otherwise they kept on sleeping mode. The major challenge of this paper is to avoid the attacks because WSN continuously performed better than other technologies. The attack that is classified in the section 3; from these attack classification we analyze that the Message Replay attack is one of the more powerful attack that continuously touch with destination node and destination node assumes that the packets was received soon but an malicious node can’t transferred the packets to the destination node. So in this stage message dropping start and the performance of the entire network goes down. We implement the secret key methodology in the network scenario so that each node communicates to other node only when if they having a secret key otherwise communication could not occurred. From the results studied it was observed that we improve the performances of WSN and avoided the Message replay attacks.

Hide Abstract

Simulation Study to Observe the Effects of Increasing Each of The Network Size and the Network Area Size on MANET’s Routing Protocols

Saad Talib Hasson 1  And   Sura Jasim

View:    Abstract |  HTML Full Text |  PDF |  XML|

Mobile Ad hoc Network (MANET) is one of the essential required wireless networks in this era. The routing process is one of the most important challenges that faces the designers and the managers of such networks. While, the performance evaluation is the main process that must be controlled in order to test, improve and develop any new or available MANET. This network’s performance can be measured using many metrics such as throughput, delay, overhead, etc. This paper represents a behavioral study for certain MANET Routing protocols using OPNET Modeler with respect to three performance metrics (Throughput, Routing Overhead and Delay). Different scenarios with different number of nodes (network size) and different network area size were applied and implemented. Three routing protocols namley (Adhoc On-Demand Distance (AODV), Optimized Link State Routing protocol (OLSR) and Geographic Routing Protocol (GRP)) were used and applied in this study.

Hide Abstract

A Systematic Literature Survey on Various Techniques for Software Fault Proneness

Prerna Jain* And Balraj Singh

View:    Abstract |  HTML Full Text |  PDF |  XML|

Fault proneness prediction of a software module having a great role in the quality assurance. Faults proneness prediction is to find the areas of the software which have a greater impact. In today’s world it is becoming a big issue to find the fault prone modules. Faults are the flaws in the software that can cause a failure. Most of the failures are in the small parts of the software modules. Testing of the fault prone modules again and again after resolving the fault decreases the testing cost and effort as compared to test the whole module after resolving the fault again and again. The primary goal of this research paper is to analyse the techniques of fault proneness of the software module.

Hide Abstract

GPS Based Surveying for Mapping of Canal Alignment in GIS Environment – A Case Study of a Branch Canal of Alimineti Madhava Reddy project, Nalgonda District, Andhra Pradesh, India.

Jayachandra Kannemadugu and D. Punyasheshudu2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Much more challenging than that of groundwater is the improvement of performance of canal systems, which will remain the dominant water transfer technique in developing countries in the future. The standards used for design of irrigation canals in many countries have not kept up with the development of new technologies. Global Position Systems ( GPS) and Geographical Information System (GIS) integrated systems have emerged in the recent years as powerful tools in conducting large scale surveys for mapping and to create spatial data base of any Geographical area in any scale and integration of non-spatial information, modeling, analysis and generating statistical data according to the nature of application. This article employs spatial analysis techniques to extract the extent of land components of the individual owners/enjoyers which would be acquired by the Government for constructing the canal and to make the compensations against their land.

Hide Abstract

Background Construction of Video Frames in Video Surveillance System Using Pixel Frequency Accumulation

Jalal H. Awad and Amir S. Almallah   

View:    Abstract |  HTML Full Text |  PDF |  XML|

Moving object detection has been widely used in diverse discipline such as intelligent transportation systems, airport security systems, video monitoring systems, and so on. In this paper we proposed an edge segment based statistical background modeling algorithm, which can be implemented for moving edge detection in video surveillance system using static camera. The proposed method is an edge segment based, so it can help to exceed some of the difficulties that face traditional pixel based methods in updating background model or bringing out ghosts while a sudden change occurs in the background.As an edge segment based method it is robust to illumination variation and noise, it is also robust against the traditional difficulties that faces existing pixel based methods like the scattering of the moving edge pixels. Therefore they can’t utilize edge shape information. Some other edge segment based methods treat every edge segment equally creating edge mismatch due to non stationary background. The proposed method found elegant solution to this lake by using a model that uses the statistics of each background edge segment, so that it can model both the static and partially moving background edges using ordinary training images that may even contain moving objects.

Hide Abstract

A Review on Shot Boundary Detection

H.B. BASANTH KUMAR

View:    Abstract |  HTML Full Text |  PDF |  XML|

Recent advances in technology have made tremendous amount of multimedia content available. The amount of video is increasing, due to which the systems that improve the access to the video is needed. A current research topic on video includes video abstraction or summarization, video classification, video annotation and content based video retrieval. In all these applications one needs to identify shot and key frames in video which will correctly and briefly indicates the contents of video. This paper presents a brief overview on shot boundary detection and its techniques.

Hide Abstract

A Comparative Study of two major Search Engines: Google and Yahoo

Sushma Malik

View:    Abstract |  HTML Full Text |  PDF |  XML|

With the initiation of the Web and search engines, online searching has become a common method for obtaining information. People search for information on a daily basis, for various purposes: for help with job-related tasks or schoolwork, or just for enjoyment. Searching is the second most common online activity after email. On a typical day more than half of Internet users are searching the Internet using a search engine. Web searching is an easy and convenient way to find information. Web search provide searchers with almost instant access to millions of search results, but the quality of the information linked to by these search results is rough. Some of this information may be incorrect, or come from unreliable sources. Today, So many search engines available on the Internet, such as Google, Yahoo, Bing, AltaVista, MSN Search and Ice rocket. These search engines provide different features and efficiencies. Obviously, we cannot use all of them at the same time, so we can get confused, which one is the best? Which one should I use? The present study is trying to answer these questions by comparing two search Engines: Google and Yahoo.

Hide Abstract

A Novel Approach to Deal with Keyloggers

Mehdi Dadkhah

View:    Abstract |  HTML Full Text |  PDF |  XML|

Keyloggers have been widely used by hackers as a tool to steal information and passwords from users in e-commerce. The malware security software has also grown but keylogger grow too. This article reviews some of the techniques used by hackers to spread Keyloggers and bypass various security techniques by using advanced Keyloggers and finally, we describe a novel approach to deal with Keyloggers. This approach, capable of dealing with the most advanced Keyloggers, and greatly reduces damage caused by Keyloggers.

Hide Abstract

Multi-module Singular Value Decomposition for Face Recognition

A. Namachivayam and Kaliyaperumal Karthikeyan

View:    Abstract |  HTML Full Text |  PDF |  XML|

The paper introduces a face recognition method using probabilistic subspaces analysis on multi-module singular value features of face images. Singular value vector of a face image is valid feature for identification. But the recognition rate is low when only one module singular value vector is used for face recognition. To improve the recognition rate, many sub-images are obtained when the face image is divided in different ways, with all singular values of each image used as a new sample vector of the face image. These multi-module singular value vectors include all features of a face image from local to the whole, so more discriminator information for face recognition is obtained. Subsequently, probabilistic subspaces analysis is used under these multi-module singular value vectors. The experimental results demonstrate that the method is obviously superior to corresponding algorithms and the recognition rate is respectively 97.5% and 99.5% in ORL and CAS-PEAL-R1human face image databases.

Hide Abstract

The Relation between E-Commerce and AIS in Medium Scale Organizations

Muhannad Akram Ahmad1, Farah Hanna Zawaideh2, Ahmad Bisher3

View:    Abstract |  HTML Full Text |  PDF |  XML|

The advance adoption of Accounting Information Systems (AIS) in low and medium scale organizations, make many uncertainties in different scopes of development and reliability. In medium scale organizations, the e-commerce is the most critical process that could be used with AIS with the need of strong criteria to meet the reliability and productivity requirements. The effects of applying e-commerce on medium scale organization with the cooperation of AIS is studied and dem­onstrated in this paper. The study sample involves Jordanian medium scale organizations. A questionnaire had been and based on analysis that are demonstrated in this paper, and a hypothesis checked based on the study sample which is a group of 50% of the medium scale in Jordan companies. A statistical analysis where done to demonstrate the hypothesis and the relationship between the e-commerce and AIS in the study sample was done in this paper. The use of e-commerce supplies suitable accounting information about elements present at the right time, at a state that is both dependable and steady for decision makers, besides, using e-commerce tackles the issue of providing information access security by requiring a username and password which prevents unauthorized system entrances. A strong relationship between the two side; AIS and e-commerce is presented in this paper at a specific scale of organizations, and business model.

Hide Abstract