{"title":"An unfangled approach to semantic search for e-tourism domain","authors":"K. Palaniammal, M. Indra Devi, S. Vijayalakshmi","doi":"10.1109/ICRTIT.2012.6206758","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206758","url":null,"abstract":"Semantic web is the technology which drives the syntactic search and there are a wide variety of applications available for tourism sector today which promotes the country's economic status. This paper concerned with the development of a model towards the semantic search and the result which is based on user's priority while searching the tourism domain of interest. From this proposed model, the conditional probability for the given input can be calculated and querying ontology to provide relevant information. This proposed model has been developed with use of Netica-J. The ontology is being created with Protégé which is the tool used as an ontology editor and the SPARQL is used for querying the ontology. The interface between the ontology and SPARQL is being made with the help of Jena.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121437958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cost aware reconfiguration technique for recovery in wireless mesh networks","authors":"R. Ramakrishnan, N. Ram, Omar AlHeyasat","doi":"10.1109/ICRTIT.2012.6206757","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206757","url":null,"abstract":"Wireless Mesh Network (WMN) is considered as one of the inevitable technologies in the world of networking because of its ability to provide high bandwidth wireless backbone covering a large physical region. Generally, mesh routers which make use of single radio and single channel suffer from capacity issues. This can be overcome by configuring mesh nodes using multiple radios and multiple channels. But during their lifetime, multi radio wireless mesh networks are severely affected because of the frequent link failures caused by interference, obstacles in motion and bandwidth requirements of the application. This paper presents a detailed study on various techniques used to recover wireless mesh network from link failures and the issues to be addressed in order to improve the performance of the network. Further, this paper proposes an Enhanced Reconfiguration System (ERS) which provides cost aware reconfiguration scheme that enables WMNs to recover from local link failures. ERS makes use of primitive link changes such channel, radio and route switch operations to recover WMNs from link failures. It generates a set of reconfiguration plans and selects the best plan which provides the required service at minimal cost. The system cooperatively reconfigures network settings among all mesh routers based on this best reconfiguration plan and thus maximizes the network performance.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124382902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical inspection for Replica Management in WANET using Distributed Spanning Tree","authors":"R. Baskaran, P. Victer Paul, P. Dhavachelvan","doi":"10.1109/ICRTIT.2012.6206827","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206827","url":null,"abstract":"Replica Management is an important methodology to reduce bandwidth utilization, to get better data accessibility and to preserve data consistency in Wireless Ad hoc Networks (WANET). Global Replica Management (GRM) is the method to preserve data consistent throughout the network which is necessary in many multi-locational collaborative applications. But GRM is not encouraging for those applications because of huge number of messagepasses are needed for replica management. To reduce the message passes required to accomplish GRM, we follow an connection organization called Distributed Spanning Tree (DST). In our previous work [1], an efficient technique for formulation of DST in wireless environment is dealt and analysis shows that the DST reduces the messagepasses required for communication between the nodes in wireless network. In this paper, we propose an analytical inspection on efficiency improvement in Replica management application in DST formulation wireless network over the ordinary wireless network.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133199538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS enhancement in future generation network by handoff delay minimization","authors":"K. Priya, G. Raja","doi":"10.1109/ICRTIT.2012.6206825","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206825","url":null,"abstract":"Worldwide Interoperability for Microwave Access (WiMAX) specified by IEEE 802.16 supports Wireless Metropolitan Area Network (WMAN). In the environment of WMAN the mobile client has high mobility and it moves from the coverage area of Serving Base Station (SBS) to Target Base Station (TBS). Handoff is one of the Quality of Service (QoS) parameter in the WiMAX network which supports mobility and is the main challenging research in WiMAX network. The handoff is the process in which the mobile nodes switch from one BS to another until it gets the better signal quality. In this scheme Mobile Station (MS) scans for the TBS selection until it gets the better signal quality. The main issue in the WiMAX network is the handoff latency and it occurs when the MS is unable to predict the TBS based on the quality signal. The proposed work improves the handoff latency during the transmission of signals from the Previous Base Station (PBS) to TBS by providing the fast handoff scheme using the location based mobility pattern table for WiMAX networks. The QoS parameters like packet loss ratio and delay are also considered during the handoff.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133705623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormal human activity recognition using SVM based approach","authors":"A. Palaniappan, R. Bhargavi, V. Vaidehi","doi":"10.1109/ICRTIT.2012.6206829","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206829","url":null,"abstract":"Tele-health care applications have gained much attention in the field of ubiquitous computing. With availability of affordable wearable sensors, it is possible to recognize human activities. Activity detection has many applications such as security and health care applications. In this paper, the focus is on detecting abnormal activities of the individuals by ruling out all possible normal activities. Abnormal activities are unexpected events that occur in random manner. Human activities can be recognized using various approaches. Most widely used approach is multi-class SVM. This paper proposes a novel scheme of representing human activities in form of a state transition table. The transition table helps the classifier in avoiding the states which are unreachable from the current state. By avoiding the unreachable states, computational time for classification is reduced significantly when compared to conventional approaches. It is found from simulation studies that the proposed scheme gives accurate results with less computational complexity.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134278103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion detection in heterogeneous Wireless Sensor Networks with an energy efficient localization algorithm","authors":"A. Ahmed, A. Rajeswari","doi":"10.1109/ICRTIT.2012.6206815","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206815","url":null,"abstract":"Wireless sensor networks are tremendously being used in different environments to perform various monitoring tasks such as search, rescue, disaster relief, target tracking and a number of tasks in smart environments. In many such tasks, node localization is inherently one of the system parameters. Node localization is required to report the origin of events, assist group querying of sensors, routing and to answer questions on the network coverage. This paper reviews different approaches of node localization discovery in wireless sensor networks. Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a battlefield. We discuss the network connectivity and broadcast reachability, which are necessary conditions to ensure the corresponding detection probability in a WSN. Our simulation results validate the analytical values for both homogeneous and heterogeneous WSNs.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"677 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Shyamaladevi, T. T. Mirnalinee, T. Trueman, R. Kaladevi
{"title":"Integration of semantics, sensors and services on the ubiquitous web","authors":"K. Shyamaladevi, T. T. Mirnalinee, T. Trueman, R. Kaladevi","doi":"10.1109/ICRTIT.2012.6206767","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206767","url":null,"abstract":"The human interaction system provides a move from entity and object centric processing to relationship and event centric processing. The computer is interacted efficiently with the human for giving the solution to their problems. To provide the service based on the human requirements by integrating relevant web services. The integrated system gives the ability to extract, represent and reason about a variety of relationship as well as providing integral support. The proposed system is called farmer helping system which integrates relevant web services like soil information, plant information and weather information and pesticides and fungicides information. This farmer helping system gives the appropriate solution for the farmers. To provide the meaningful representation ontology is used. The integration of the services to increase the interoperability in the heterogeneous environment. The farmer helping system analyses the message from the user, contacts appropriate resources, and return actionable information, while requiring minimal involvement or technology consciousness from the user. The semantically annotated data is then used for integration, search, analysis, discovery, question answering and situational awareness for making the user system efficient.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115676987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business process property evaluation engine for interactive and reliable Business Process Modeling","authors":"M. Thirumaran, P. Dhavachelvan, G. Kiran","doi":"10.1109/ICRTIT.2012.6206741","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206741","url":null,"abstract":"Capturing business processes in the early phases of systems development is the trend being followed by many enterprises of the current business scenario. Business Process Modeling Notation (BPMN) is the widespread dexterous set employed by such organizations. Prior studies have only examined issues related to semantic and functional model checking methods. In this paper, a productive architecture for business process property evaluation engine which can be integrated with any Business Process modeling framework to efficiently extract the isolated properties in the individual components of the model is proposed. It incorporates the provision to visualize the runtime exceptions in the model. Evaluation of the proposed architecture with the help of the Architecture Tradeoff Analysis Method (ATAM) exposes the major potential of this property evaluation engine. This new course of research in the development of efficient business model renders ample scope for the certitude of the easy maintenance and re-engineering of business processes in future.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decoding performance of binary and non-binary LDPC codes for IEEE 802.11n standard","authors":"P. Venkateshwari, M. Anbuselvi","doi":"10.1109/ICRTIT.2012.6206782","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206782","url":null,"abstract":"LDPC codes, a kind of error correcting codes, performs near Shannon limit and are recommended for many practical applications. Non-binary LDPC codes excels binary LDPC in error correcting property especially for short and moderate block length. Construction of parity check matrix for IEEE 802.11n standard non-binary LDPC code has been done here. Comparison of binary LDPC and non-binary LDPC codes for IEEE 802.11n standard based on their decoding performance for probability domain and log domain decoding algorithms which has not been made so far is done in this paper. Decoding performance measured in terms of bit error rate and frame error rate shows that the non-binary codes outperforms binary codes for 802.11n LDPC with increasing order of Galois field.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129375555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Gangeshwari, J. Subbiah, K. Malathy, D. H. Miriam
{"title":"HPCLOUD: A novel fault tolerant architectural model for hierarchical MapReduce","authors":"R. Gangeshwari, J. Subbiah, K. Malathy, D. H. Miriam","doi":"10.1109/ICRTIT.2012.6206822","DOIUrl":"https://doi.org/10.1109/ICRTIT.2012.6206822","url":null,"abstract":"MapReduce algorithm is a scheduling algorithm that can be used to process large amounts of data efficiently. Process scheduling is an application that uses the mapreduce technique. Hyper Cubic Peer-to-Peer Cloud (HPCLOUD) is a structured peer to peer framework implemented on a cloud environment on which mapreduce technique can be applied for process scheduling. In addition, fault tolerance and load balancing can be achieved on the HPCLOUD architecture. The performance evaluation shows that system proposed to demonstrate improved performance in terms of response time with respect to increase in number of files.","PeriodicalId":191151,"journal":{"name":"2012 International Conference on Recent Trends in Information Technology","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}