{"title":"Regularized Compression of A Noisy Blurred Image","authors":"P. Favati, G. Lotti, O. Menchi, F. Romani","doi":"10.5121/IJCSA.2016.6601","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6601","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"23 1","pages":"1-13"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81104381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Unknown Insider Threat Scenarios","authors":"M. S. Lodhi, Rahul Kaul","doi":"10.5121/IJCSA.2016.6602","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6602","url":null,"abstract":"Problems from the inside of an organization’s perimeters are a significant threat, since it is very difficult to differentiate them from outside activity. In this dissertation, evaluate an insider threat detection motto on its ability to detect different type of scenarios that have not previously been identify or contemplated by the developers of the system. We show the ability to detect a large variety of insider threat scenario instances We report results of an ensemble-based, unsupervised technique for detecting potential insider threat, insider threat scenarios that robustly achieves results. We explore factors that contribute to the success of the ensemble method, such as the number and variety of unsupervised detectors and the use of existing knowledge encoded in scenario based detectors made for different known activity patterns. We report results over the entire period of the ensemble approach and of ablation experiments that remove the scenario-based detectors.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"10 1","pages":"15-21"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75244782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROTOCOL FOR WIRELESS SENSOR NETWORKS","authors":"P. Anuja, Dr. Raju Shanmugam","doi":"10.5121/IJCSA.2016.6301","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6301","url":null,"abstract":"The most emerging prominent sensor network applications collect data from sensor nodes and monitors periodically. Resource constraint Sensor motes sense the environment and transit data to the remote sink via multiple hops. Minimum energy dissipation and secure data transmission are crucial to such applications. This paper delivers an energy efficient, lifetime improving, secure periodic Data Gathering scheme that is a hybrid of heuristic path establishment and secure data transmission. This protocol uses artificial intelligence (AI) based A* heuristic search algorithm to establish energy efficient admissible optimal path to sink in terms of high residual energy, minimum hop counts and high link quality. This scheme also adopts block encryption Rivest Cipher (RC6) Algorithm to secure the transmission of packets. This code and speed optimized block encryption provides confidentiality against critical data and consumes less energy for encryption. This proposed method increases the network lifetime there by reducing the total traffic load. Evaluation of performance analysis of this algorithm using Network Simulator (NS2) shows the superiority of the proposed scheme.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"26 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2016-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86643334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Clustering Algorithm For Coverage A Large Scale In Wireless Sensor Networks","authors":"Wassim Jerbi, Abderrahmen Guermazi, H. Trabelsi","doi":"10.5121/IJCSA.2016.6201","DOIUrl":"https://doi.org/10.5121/IJCSA.2016.6201","url":null,"abstract":"Virtual communities are becoming increasingly popular, particularly on the internet, as a means for like-minded individuals to meet, share or gain access to the information they are most interested in quickly and efficiently, from other individuals. The concept of a community of interest can be supported in a virtual community in order to bring the appropriate parties together, to share their knowledge with each other. The objective of our work is to investigate a community abstraction approach to agent based knowledge management.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"01-18"},"PeriodicalIF":0.0,"publicationDate":"2016-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76748856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Advance Solar Power Generation and Control of Brushless DC Motor Using Phase Current Infusion of Sensor Less Vector Control","authors":"A. Sundaram, G. Ramesh","doi":"10.12783/IJCSA.2016.0501.01","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0501.01","url":null,"abstract":"Solar power is a promising solution in recent environmental aspects so several methods of generation were implemented in past to reach advances in generation capacity and critical conditions of solar. This paper deals with Non-inverting Four Switch buck-boost converter (NFSBBC) which is presented to reach advances in generation with respect to solar condition. The advances of generation include maximum power point tracking using incremental conductance, reliable buck boost operation and voltage stability ratio. Incremental conductance can track rapidly on solar power than perturb and observer method, so proposed power generation draws a continuous power across DC-Link inverter drive for wide speed operation of brushless DC motor. A new phase current infusion is implemented to estimate flux, torque and control of speed in wide range without external infusion and sensing loops in present sensor less vector control. 110W/50V capacity of solar is implemented for present solar power generation; output capacity of converter reaches from 25-100V using buck boost operation. 25V/1500 rpm capacity of brushless DC Motor is controlled using proposed sensor less vector using current infusing logic.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"17 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81381061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"BK Web-Based E-Voting System: Ensuring Confidence with Votes and Results Verification","authors":"Ben Beklisi Kwame Ayawli, G. A. Gershon","doi":"10.12783/IJCSA.2016.0501.02","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0501.02","url":null,"abstract":"The purpose of this study was to design an e-voting system to improve verification and auditing of votes and election results to aid build confidence in the use of e-voting. A top-down design approach was adopted in the design and development of the evoting system. BK Web-based e-voting system after design was implemented in ten different elections in 2012, 2013 and 2014. It was very helpful in ensuring voter’s confidence in e-voting since they were able to verify their votes through Short Message Service, reports generated from the system and the provision of ‘strong room’ facility. The verification procedures demonstrated in this study when applied in e-voting systems would help build voter’s confidence in e-voting systems.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"20 1","pages":"12-22"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82528670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Metadesign Approach in Ontology Construction","authors":"Mesnan Silalahi","doi":"10.12783/IJCSA.2016.0502.02","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0502.02","url":null,"abstract":"This paper describes the ontology construction using a metadesign approach. The approach will constitutes key concepts such as: supporting human-problem interaction, underdesigning for emergent behavior, enabling legitimate peripheral participation, sharing control, promoting mutual learning and support, rewarding and recognizing contributions, and fostering reflective communities. The approach supports for flexibility and extensibility in the process and the used tools. The development of semantic web applications was part of the tools support to follow the metadesign framework. The central actor along the phases are the domain experts who also were respondencts in the survey. Based on the resultant ontology and the survey of the participatory domain-experts in a case-study, this approach proved to effectively build the ontology.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"205 1","pages":"35-43"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73766715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modified Clustering Algorithm for Energy Efficiency Utilizing Fuzzy Logic in WSN (MCF)","authors":"Tuba Firdaus, Meenakshi Yadav","doi":"10.12783/IJCSA.2016.0502.01","DOIUrl":"https://doi.org/10.12783/IJCSA.2016.0502.01","url":null,"abstract":"A number of research have taken place in the field of Wireless Sensor Networks (WSN) as there is continuous need of advancement in the field of wireless communication, digital technology and micro-electro-mechanical systems(MEMS) . So the need of growth of low cost, low power, multifunctional sensor nodes have been required. A Wireless Sensor Network is a collection of sensor nodes that have the capability of sensing any environmental phenomenon, processing that information and then sending that data to the base station. A single sensor node is not capable of capturing desired information from a particular region so a collection of nodes are arranged to get accurate and sufficient result. This collection of sensor nodes along with a base station will collaboratively form a network that is known as Wireless Sensor Network. As limited energy is one of the most important constraint of WSN so it must be assured that it is utilized in most efficient way. Clustering is best approach to remove redundant data transmission to base station. Each cluster has a cluster head that is responsible for transmitting data to base station for that cluster members. Cluster head (CH) collect the data from all members of its cluster and perform aggregation on these data to remove redundancy then send it to base station. So appropriate CH election is very important for improving efficiency. In this thesis we have presented a clustering approach that has taken a heterogeneous environment and uses fuzzy logic to elect CHs more efficiently. We have combined two parameters Distance and Residual Energy and apply fuzzy rules on that to find the priority of a node for being a CH. Simulation shows that using fuzzy logic in SEP (Stability Election Protocol) will improve the energy efficiency by providing better load distribution and utilizing the benefits of heterogeneity of network. We have shown our analysis on two parameters- Number of dead nodes and average energy of nodes","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"24-34"},"PeriodicalIF":0.0,"publicationDate":"2016-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88843401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luciano T. E. Pansanato, A. Rivolli, Douglas Felipe Pereira
{"title":"An Evaluation with Web Developers of Capturing User Interaction with Rich Internet Applications for Usability Evaluation","authors":"Luciano T. E. Pansanato, A. Rivolli, Douglas Felipe Pereira","doi":"10.12783/ijcsa.2015.0402.02","DOIUrl":"https://doi.org/10.12783/ijcsa.2015.0402.02","url":null,"abstract":"The user interaction logging with a Rich Internet Applications can provide valuable information for usability evaluation and user behavior study. However, current research has focused only on issues of implementation and validation of tools for capturing user interaction instead tool usage by web developers. This work presents an evaluation through user testing of a tool called WAUTT for capturing user interaction with Rich Internet Applications. The main goal of this evaluation is to investigate the use of a tool for capturing user interaction with web developers. The results indicate that the participants have good understanding of the tool, found easiness to operate the tool for capturing and analyzing the user interaction, consider its future re-use, and they felt satisfied with the experience. The results also assisted for identifying the user interaction data considered more useful to web developers.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81618675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Generalization Ability of Artificial Neural Networks in Forecasting TCP/IP Traffic Trends: How Much Does the Size of Learning Rate Matter?","authors":"V. Moyo, K. Sibanda","doi":"10.12783/ijcsa.2015.0401.02","DOIUrl":"https://doi.org/10.12783/ijcsa.2015.0401.02","url":null,"abstract":"Artificial Neural Networks (ANNs) have attracted increasing attention from researchers in many fields. They have proved to be one of the most powerful tools in the domain of forecasting and analysis of various time series. The ability to model almost any kind of function regardless of its degree of nonlinearity, positions ANNs as good candidates for predicting and modelling self-similar time series such as TCP/IP traffic. Inspite of this, one of the most difficult and least understood tasks in the design of ANN models is the selection of the most appropriate size of the learning rate. Although some guidance in the form of heuristics is available for the choice of this parameter, none have been universally accepted. In this paper we empirically investigate various sizes of learning rates with the aim of determining the optimum learning rate size for generalization ability of an ANN trained on forecasting TCP/IP network traffic trends. MATLAB Version 7.4.0.287’s Neural Network toolbox version 5.0.2 (R2007a) was used for our experiments. The results are found to be promising in terms of ease of design and use of ANNs. We found from the experiments that, depending on the difficulty of the problem at hand, it is advisable to set the learning rate to 0.1 for the standard Backpropagation algorithm and to either 0.1 or 0.2 if used in conjunction with the momentum term of 0.5 or 0.6. We advise minimal use of the momentum term as it greatly interferes with the training process of ANNs. Although the information obtained from the tests carried out in this paper is specific to the problem considered, it provides users of Back-propagation networks with a valuable guide on the behaviour of ANNs under a wide range of operating conditions. It is important to note that the guidelines accrued from this paper are of an assistive and not necessarily restrictive nature to potential ANN modellers.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75239244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}