K. Kiran, K. Vaishnavi, P. D. Shenoy, K. Venugopal
{"title":"Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm","authors":"K. Kiran, K. Vaishnavi, P. D. Shenoy, K. Venugopal","doi":"10.5120/IJAIS2017451659","DOIUrl":"https://doi.org/10.5120/IJAIS2017451659","url":null,"abstract":"WiMAX and WiFi are among the major wireless technologies escalating today. Both these technologies provide last mile connectivity and differ in their Media Access Control (MAC) layer and physical (PHY) layers. Since most of the devices are equipped with WiFi, and WiMAX is prevailing in today’s devices, an efficient way of routing the data is by making use of both these technologies simultaneously. This work presents such a technique based on the Bee-hive routing algorithm for an infrastructure-based mesh network, which promotes interoperability between the WiMAX and WiFi technologies. The network consists of two types of nodes 1)coordinator node 2)subscriber node, and divides the entire network into regions called foraging regions/zones based on the hop count from the coordinator node. A detailed implementation of this algorithm is presented in this work. The algorithm is tested for various mobile and static topologies by varying the parameters such as the speed of motion of the mobile nodes and the hop limit.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"581 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76259750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cross-Layer Congestion Control in Wireless Ad Hoc Network","authors":"A. Alomari","doi":"10.5120/IJAIS2017451661","DOIUrl":"https://doi.org/10.5120/IJAIS2017451661","url":null,"abstract":"Congestion control is a critical issue in mobile ad-hoc networks. This paper reflects a cooperatively ideal strategy of cross-layer congestion control, routing and setting up ad hoc wireless networks. We first calculate the degree check and scheduling check using multi-commodity flowing variables and calculate reserve sharing in networks with secure wireless channels as a service expansion issue with these controls. By dual corrosion, the reserve sharing problem naturally decomposes into three sub-issues: congestion control, routing, and scheduling that interact through congestion price. The overall junction property of this procedure is demonstrated. We next prolong the dual system to handle networks with time-varying channels and adaptive multi-proportion devices. The constancy of this resultant system is traditional, and its performance is characterized by an ideal position system which has the best feasible proportion state at the link layer. We then take a broad view the results mentioned above of an overall model of queueing network served by a set of interdependent parallel servers with time-varying service abilities, which models many design issues in communication networks. We show that for a curved optimization issue where a subset of variables lies in a polytope and the rest in a curved set, the dual-based procedure remains stable and optimum when the check set is modulated by an irreducible finite-state Markov series. This paper so offering a step toward a systematic way to carry out the cross-layer design by “Layering as optimization corrosion” for time-varying channel models.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"49 1","pages":"56-58"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74444278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yogesh Dubey, Pranil Chaudhari, Shaldon Chaphya, T. D’abreo
{"title":"Efficient Detection of Legitimate and Malicious URLs using ID3 Algorithm","authors":"Yogesh Dubey, Pranil Chaudhari, Shaldon Chaphya, T. D’abreo","doi":"10.5120/IJAIS2017451660","DOIUrl":"https://doi.org/10.5120/IJAIS2017451660","url":null,"abstract":"Malicious websites are one of the serious threat over the internet. Ever since the inception of the internet, there has been a rise in malicious content over the web such has terrorism, financial fraud, phishing and hacking that targets user’s personal information. Till date, the various systems have been used for the detection of a malicious website based on text and content of the websites. This method has some disadvantages and the numbers of victims have therefore continued to increase. Here we developed a system which helps the user to identify whether the website is malicious or not. Our system identifies whether the site is malicious or not through URL. The proposed system is fast and more accurate compared to current system. The classifier is trained with datasets of 1000 malicious sites and 1000 legitimate site URLs. Trained classifier is used for detection of malicious URLs.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"53-55"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81498953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adoption of Computer-Aided Technology (CAx) in Textile and Apparel Industries","authors":"Mekonnen Wagaw","doi":"10.5120/IJAIS2017451655","DOIUrl":"https://doi.org/10.5120/IJAIS2017451655","url":null,"abstract":"The extended nature of industrial operations demanded the integration of information and communication technologies (ICT) and computer aided technology (CAx) in industrial processes. Although there are 130 textile and apparel industries in Ethiopia, the adoption of such technology is limited. Hence, this research studied factors affecting CAx adoption through the extension of the technology acceptance model of Davis (1989) by adding perceived competitive advantage, cost effectiveness, and perceived security. The finding revealed that perceived ease of use, perceived service, perceived competitive advantage, cost effectiveness, perceived security and perceived usefulness are significant predictors of intention to use CAx in textile and apparel industries. General Terms Information Systems, ICT Adoption, Technology Acceptance, Computer-Aided Technology.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"252 1","pages":"35-42"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76289749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hala A. Abdel Halim, E. Othman, A. Sakr, A. Zaki, A. Abouelsoud
{"title":"A Comparative Study of Intelligent Control System Tuning Methods for an Evaporator based on Genetic Algorithm","authors":"Hala A. Abdel Halim, E. Othman, A. Sakr, A. Zaki, A. Abouelsoud","doi":"10.5120/IJAIS2017451646","DOIUrl":"https://doi.org/10.5120/IJAIS2017451646","url":null,"abstract":"This paper employs Genetic Algorithm to obtain the optimum parameters of an evaporator control system by using different tuning methods. Tuning methods consists of two main groups; first group consists of minimizing the performance indices factors separately such as; Integral of Absolute Error (IAE), Integral of Square Error (ISE), Integral of Time Absolute Error (ITAE) and Integral of Time multiplied with Square Error (ITSE).Second group consists of minimizing the performance indices factors separately plus the step response parameters such as; the rise Time (Tr), Settling Time (Ts), The Maximum Overshoot (Mp) and Steady state Error(Ess). Simulation Results prove that the second group of tuning methods give best performance, robust stability and improve the system robustness. General Terms Process Control, Intelligent Control, Optimal Control, Genetic Algorithm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"69 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87460218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment","authors":"A. Verma, G. K. Shankhdhar, M. Darbari","doi":"10.5120/IJAIS2017451648","DOIUrl":"https://doi.org/10.5120/IJAIS2017451648","url":null,"abstract":"Providers to cloud computing including Amazon, Google, Microsoft, Rachspace and Terremark have all contributed at a high end for this bulk storage technology. As goes with all the software packages including CRMs and ERPs the need for security has to be redefined, restructured and its domain adjusted because as the development progresses the vulnerabilities are exposed. To deal with the security issues in cloud computing this paper discusses some concepts like ontology, web semantics, and message passing within or between cloud components. This paper introduces a Context Sensitivity Policy approach for the Cloud Security Paradigm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"30 1","pages":"15-18"},"PeriodicalIF":0.0,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87474818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Measuring the severity of fungi caused disease on leaf using triangular thresholding method","authors":"Richard Marfo","doi":"10.5120/IJAIS2017451668","DOIUrl":"https://doi.org/10.5120/IJAIS2017451668","url":null,"abstract":"A Thesis submitted to Department of Computer Science, Kwame Nkrumah University of Science and Technology in partial fulfillment of the requirement for the degree of Master of Science in Information Technology, 2016","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"1 1","pages":"24-32"},"PeriodicalIF":0.0,"publicationDate":"2017-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89581086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Many Approaches for Obtaining Least Noisy Signal using Kaiser Window and Genetic Algorithm","authors":"A. Alomari","doi":"10.5120/IJAIS2017451644","DOIUrl":"https://doi.org/10.5120/IJAIS2017451644","url":null,"abstract":"In a communication system in a signal is an information holding portion which is a route for the system. But this route may not be clean and plane route when data is transmitted from signal there will be some noise is added to the signal and signal turned into a noisy signal, so that is why we want to remove this noise from signal to get information from the signal. In this research, we find some approaches to remove this noise from the signal. These approaches are Wavelet filter based on Butterworth IIR filter and Kaiser Window FIR filter for the analysis of the signal. The newly designed Wavelet filter presents and idea for signal analysis and finding difficulties during any communication. The other techniques are FIR filter that mostly uses for videos. It is somehow valuable technique for filtering signal. This technique uses for complicated purposes like signal preconditioning and various communication application. Most of the FIR filters designing methods is based on Windows method, frequency sampling method and Optimal Sampling method these approaches has been proposed to obtain the clean signal from a noisy signal.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"17 1","pages":"22-26"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73211634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Different Versions of the Monty Hall Problem","authors":"Mazen Alrahili","doi":"10.5120/IJAIS2017451642","DOIUrl":"https://doi.org/10.5120/IJAIS2017451642","url":null,"abstract":"The Monty Hall problem is a conditional probability example in which one of three doors has a big prize and other two doors conceive worthlessly. The game features are a rational decision between stay or switch given the constraints of the game. This paper aims to explain the different versions of the Monty Hall Problem in a many way to approve and solve the Monty Hall problem. General Terms Monty Hall Problem.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"9 1","pages":"12-17"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84291465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding the Game Theory of the Prisoner’s Dilemma","authors":"M. Algarni","doi":"10.5120/IJAIS2017451640","DOIUrl":"https://doi.org/10.5120/IJAIS2017451640","url":null,"abstract":"The prisoner dilemma (PD) is the best-known session of procedure in sociology. It helps us comprehend what oversees the harmony amongst collaboration and rivalry in business, in governmental issues, and in social settings. Diversion hypothesis is regularly presented in college classes with regards to a detainee's difficulty worldview, which shows the contention between motivating social forces to collaborate and private impetuses to abscond. This paper exhibits an extremely straightforward card amusement that effectively includes an extensive number of understudies in a Prisoner’s Dilemma. The degree of participation is influenced by the result impetuses and by way of rehashed connection.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"3 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80177491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}