Pub Date : 2014-04-30DOI: 10.5121/IJCSES.2014.5201
M. Rhudy
Experimental data is subject to data loss , which presents a challenge for representing the data with a proper time scale. Additionally, data from separate measurement systems needto be aligned in order to use the data cooperatively. Due to the need for accurate time alignment, various practical techniques are presented along with an illustrative example detailing each step of the t ime alignment procedure for actual experimental data from an Unmanned Aerial Vehicle (UAV). Some examp le MATLAB code is also provided.
{"title":"Time Alignment Techniques for Experimental Sensor Data","authors":"M. Rhudy","doi":"10.5121/IJCSES.2014.5201","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5201","url":null,"abstract":"Experimental data is subject to data loss , which presents a challenge for representing the data with a proper time scale. Additionally, data from separate measurement systems needto be aligned in order to use the data cooperatively. Due to the need for accurate time alignment, various practical techniques are presented along with an illustrative example detailing each step of the t ime alignment procedure for actual experimental data from an Unmanned Aerial Vehicle (UAV). Some examp le MATLAB code is also provided.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-30DOI: 10.5121/IJCSES.2014.5202
S. Ameen, S. W. Nourildean
The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing with and without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different scenarios and different form application traffic applied. Simulation results showing throughput, delay, servers traffic sent and received have been collected and presented. The results clearly show that there is impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher than that on the delay. Furthermore, the impact show that the email traffic is more affected than web traffic.
{"title":"Firewall and VPN Investigation on Cloud Computing Performance","authors":"S. Ameen, S. W. Nourildean","doi":"10.5121/IJCSES.2014.5202","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5202","url":null,"abstract":"The paper presents the way to provide the security to one of the recent development in computing, cloud computing. The main interest is to investigate the impact of using Virtual Private Network VPN together with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud computing with OPNET modular simulator has been conducted for the cases of cloud computing with and without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different scenarios and different form application traffic applied. Simulation results showing throughput, delay, servers traffic sent and received have been collected and presented. The results clearly show that there is impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher than that on the delay. Furthermore, the impact show that the email traffic is more affected than web traffic.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129382001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-28DOI: 10.5121/IJCSES.2014.5101
P. AnjaliP, A. Binu
{"title":"A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce","authors":"P. AnjaliP, A. Binu","doi":"10.5121/IJCSES.2014.5101","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5101","url":null,"abstract":"","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121036345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-28DOI: 10.5121/IJCSES.2014.5103
S. Hassan, N. Rahman, Z. Htike, Shoon Lei Win
Entomology has been deeply rooted in various cultures since prehistoric times for the purpose of agriculture. Nowadays, many scientists are interested in the field of biodiversity in order to maintain the diversity of species within our ecosystem. Out of 1.3 million known species on this earth, insects account for more than two thirds of these known species. Since 400 million years ago, there have been various kinds of interactions between humans and insects. There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. Automation of insect identification is required because there is a shortage of skilled entomologists. This paper provides a review of the past literature in vision-based insect recognition and classifications. Over the past decades, automatic insect recognition and classification has been given extra attention especially in term of crop pest and disease control. This paper details advances in insect recognition, discussing representative works from different types of method and classifiers algorithm. Among the method used in the previous research includes color histogram, edge detection and feature extraction (SIFT vector). We provides discussion on the state-of-the-art and provides perspective on future research direction in insect recognition and classification problem.
{"title":"VISION BASED ENTOMOLOGY : A SURVEY","authors":"S. Hassan, N. Rahman, Z. Htike, Shoon Lei Win","doi":"10.5121/IJCSES.2014.5103","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5103","url":null,"abstract":"Entomology has been deeply rooted in various cultures since prehistoric times for the purpose of agriculture. Nowadays, many scientists are interested in the field of biodiversity in order to maintain the diversity of species within our ecosystem. Out of 1.3 million known species on this earth, insects account for more than two thirds of these known species. Since 400 million years ago, there have been various kinds of interactions between humans and insects. There have been several attempts to create a method to perform insect identification accurately. Great knowledge and experience on entomology are required for accurate insect identification. Automation of insect identification is required because there is a shortage of skilled entomologists. This paper provides a review of the past literature in vision-based insect recognition and classifications. Over the past decades, automatic insect recognition and classification has been given extra attention especially in term of crop pest and disease control. This paper details advances in insect recognition, discussing representative works from different types of method and classifiers algorithm. Among the method used in the previous research includes color histogram, edge detection and feature extraction (SIFT vector). We provides discussion on the state-of-the-art and provides perspective on future research direction in insect recognition and classification problem.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115885119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-02-28DOI: 10.5121/IJCSES.2014.5102
K. Rajalakshmi, K. Gopal
In today’s technology, the essential property for wireless communication network is to exhibit as a dependable network. The dependability network incorporates the property like availability, reliability and survivability. Although these factors are well taken care by protocol for wired network, still there exists huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access network is very important factor to be considered will performing wireless network designing. This paper focuses on discussion of survivability in wireless access network. Capability of a wireless access network to perform its dedicated accessibility services even in case of infrastructure failure is known as survivability. Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to minimize the overall connection cost for multiple requests. The various failure scenario of wireless access network as existing in literature is been explored. The existing survivability models for access network like shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail here. Further comparison between various existing survivability solutions is also tabulated.
{"title":"A Survey on Cost Effective Survivable Network Design in Wireless Access Network","authors":"K. Rajalakshmi, K. Gopal","doi":"10.5121/IJCSES.2014.5102","DOIUrl":"https://doi.org/10.5121/IJCSES.2014.5102","url":null,"abstract":"In today’s technology, the essential property for wireless communication network is to exhibit as a dependable network. The dependability network incorporates the property like availability, reliability and survivability. Although these factors are well taken care by protocol for wired network, still there exists huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access network is very important factor to be considered will performing wireless network designing. This paper focuses on discussion of survivability in wireless access network. Capability of a wireless access network to perform its dedicated accessibility services even in case of infrastructure failure is known as survivability. Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to minimize the overall connection cost for multiple requests. The various failure scenario of wireless access network as existing in literature is been explored. The existing survivability models for access network like shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail here. Further comparison between various existing survivability solutions is also tabulated.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125917785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-12-31DOI: 10.5121/IJCSES.2013.4601
M. H. Al-Jammas
Th e complexity of implementing the Boolean functions by digital logic gates is directly related to the complexity of the Boolean algebraic expression. Although the truth table is used to represent a function, when it is expressed algebraically it appeared in many different, but equivalent, forms. Boolean expressions may be simplified by Boolean algebra. However, this procedure of minimization is awkward because it lacks specific rules to predict each succeeding step in the manipulative process. Other methods like Map methods (Karnaugh map (K-map), and map Entered Variables) are useful to implement the Boolean expression with minimal prime implicants. Or the Boolean function can be represents and design by used type N’s Multiplexers by partitioned variable(s) from the function. An adaptive map is a combined method of Boolean algebra and K-map to reduce and minimize Boolean functions involving more than three Boolean variables.
{"title":"ADAPTIVE MAP FOR SIMPLIFYING BOOLEAN EXPRESSIONS","authors":"M. H. Al-Jammas","doi":"10.5121/IJCSES.2013.4601","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4601","url":null,"abstract":"Th e complexity of implementing the Boolean functions by digital logic gates is directly related to the complexity of the Boolean algebraic expression. Although the truth table is used to represent a function, when it is expressed algebraically it appeared in many different, but equivalent, forms. Boolean expressions may be simplified by Boolean algebra. However, this procedure of minimization is awkward because it lacks specific rules to predict each succeeding step in the manipulative process. Other methods like Map methods (Karnaugh map (K-map), and map Entered Variables) are useful to implement the Boolean expression with minimal prime implicants. Or the Boolean function can be represents and design by used type N’s Multiplexers by partitioned variable(s) from the function. An adaptive map is a combined method of Boolean algebra and K-map to reduce and minimize Boolean functions involving more than three Boolean variables.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128058865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-31DOI: 10.5121/IJCSES.2013.4501
Ogbimi, E.F, A. Oluwatope, G. Aderounmu
In a complex world, where networking expands very rapidly, the network stability of flow of bandwidth played a vital role in transmitting packets. Hence, it was imperative to find solution to the problem of congestion especially in the follow of bandwidth stability. Congestion in computer networking is caused by so many factors. Some of the signs are packet loss, queuing delay resulting from overloading the buffer, faulty hardware devices, intermixing of old and new technologies and unstable flow of bandwidth resulting from positive feedback A negative feedback mechanism was added to the network. Feedback was developed using both control and queuing theory. The congested signalling was tested for stability using control theory. Kendall notation was used to determine both arrival and service rates with all the queue disciplines. Matlab was used to simulate the model. Bode plots and impulse responses were used to analyse the performance of the improved model. The results showed that flow of bandwidth was stable with increase in service rate of packets and decrease in the probability of routers not accepting packets. This shows that adopting dynamic explicit feedback model reduced congestion by minimal packet drops, balanced flow of bandwidth, converges to fairness and minimized amplitude of oscillation.
{"title":"Congestion Control in Packet Switched Wide Area Networks using a Feedback Model","authors":"Ogbimi, E.F, A. Oluwatope, G. Aderounmu","doi":"10.5121/IJCSES.2013.4501","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4501","url":null,"abstract":"In a complex world, where networking expands very rapidly, the network stability of flow of bandwidth played a vital role in transmitting packets. Hence, it was imperative to find solution to the problem of congestion especially in the follow of bandwidth stability. Congestion in computer networking is caused by so many factors. Some of the signs are packet loss, queuing delay resulting from overloading the buffer, faulty hardware devices, intermixing of old and new technologies and unstable flow of bandwidth resulting from positive feedback A negative feedback mechanism was added to the network. Feedback was developed using both control and queuing theory. The congested signalling was tested for stability using control theory. Kendall notation was used to determine both arrival and service rates with all the queue disciplines. Matlab was used to simulate the model. Bode plots and impulse responses were used to analyse the performance of the improved model. The results showed that flow of bandwidth was stable with increase in service rate of packets and decrease in the probability of routers not accepting packets. This shows that adopting dynamic explicit feedback model reduced congestion by minimal packet drops, balanced flow of bandwidth, converges to fairness and minimized amplitude of oscillation.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-10-31DOI: 10.5121/IJCSES.2013.4502
Amritpal Kaur, Madhavi Arora
Artificial neural networks are models inspired by human nervous system that is capable of learning. One of the important applications of artificial neural network is character Recognition. Character Recognition finds its application in number of areas, such as banking, security products, hospitals, in robotics also. This paper is based on a system that recognizes a english numeral, given by the user, which is already trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system has a neural network as its core, which is first trained on a database. The training of the neural network extracts the features of the English numbers and stores in the database. The next phase of the system is to recognize the number given by the user. The features of the number given by the user are extracted and compared with the feature database and the recognized number is displayed.
{"title":"Neural Network Based Numerical digits Recognization using NNT in Matlab","authors":"Amritpal Kaur, Madhavi Arora","doi":"10.5121/IJCSES.2013.4502","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4502","url":null,"abstract":"Artificial neural networks are models inspired by human nervous system that is capable of learning. One of the important applications of artificial neural network is character Recognition. Character Recognition finds its application in number of areas, such as banking, security products, hospitals, in robotics also. This paper is based on a system that recognizes a english numeral, given by the user, which is already trained on the features of the numbers to be recognized using NNT (Neural network toolbox) .The system has a neural network as its core, which is first trained on a database. The training of the neural network extracts the features of the English numbers and stores in the database. The next phase of the system is to recognize the number given by the user. The features of the number given by the user are extracted and compared with the feature database and the recognized number is displayed.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126594387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-31DOI: 10.5121/IJCSES.2013.4401
Ziyati Elhoussaine, Rachid Haboub, M. Ouzzif, Khadija Bami
Nodes in Mobile Ad-hoc network are connected wirelessly and the network is auto configuring [1]. This paper introduces the usefulness of data warehouse as an alternative to manage data collected by WSN. Wireless Sensor Network produces huge quantity of data that need to be proceeded and homogenised, so as to help researchers and other people interested in the information. Collected data is managed and compared with other coming from datasources and systems could participate in technical report and decision making. This paper proposes a model to design, extract, transform and normalize data collected by Wireless Sensor Networks by implementing a multidimensional warehouse for comparing many aspects in WSN such as (routing protocol[4], sensor, sensor mobility, cluster ….). Hence, data warehouse defined and applied to the context above is presented as a useful approach that gives specialists row data and information for decision processes and navigate from one aspect to another.
{"title":"MULTIDIMENSIONAL ANALYSIS FOR QOS IN WIRELESS SENSOR NETWORKS","authors":"Ziyati Elhoussaine, Rachid Haboub, M. Ouzzif, Khadija Bami","doi":"10.5121/IJCSES.2013.4401","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4401","url":null,"abstract":"Nodes in Mobile Ad-hoc network are connected wirelessly and the network is auto configuring [1]. This paper introduces the usefulness of data warehouse as an alternative to manage data collected by WSN. Wireless Sensor Network produces huge quantity of data that need to be proceeded and homogenised, so as to help researchers and other people interested in the information. Collected data is managed and compared with other coming from datasources and systems could participate in technical report and decision making. This paper proposes a model to design, extract, transform and normalize data collected by Wireless Sensor Networks by implementing a multidimensional warehouse for comparing many aspects in WSN such as (routing protocol[4], sensor, sensor mobility, cluster ….). Hence, data warehouse defined and applied to the context above is presented as a useful approach that gives specialists row data and information for decision processes and navigate from one aspect to another.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-30DOI: 10.5121/IJCSES.2013.4302
Rupam, A. Verma, Ankit Singh
In the past decades computer network have kept up growing in size, complexity and along with it the number of its user is also being increased day by day. Hence the amount of network traffic flowing at each node has increased drastically. So to keep a track on these nodes a packet sniffer is used. Sometimes a packet sniffer is called a network monitor or network analyzer. Many system administrator or network administrator use it for monitoring and troubleshooting network traffic. Packet sniffers are useful for both wired and wireless networks. The purpose of this paper is to show the basics of packet sniffer, how it works in both switched and non switched environment, its practical approach, its positive vs negative aspects and its safe guards.
{"title":"An Approach to Detect Packets Using Packet Sniffing","authors":"Rupam, A. Verma, Ankit Singh","doi":"10.5121/IJCSES.2013.4302","DOIUrl":"https://doi.org/10.5121/IJCSES.2013.4302","url":null,"abstract":"In the past decades computer network have kept up growing in size, complexity and along with it the number of its user is also being increased day by day. Hence the amount of network traffic flowing at each node has increased drastically. So to keep a track on these nodes a packet sniffer is used. Sometimes a packet sniffer is called a network monitor or network analyzer. Many system administrator or network administrator use it for monitoring and troubleshooting network traffic. Packet sniffers are useful for both wired and wireless networks. The purpose of this paper is to show the basics of packet sniffer, how it works in both switched and non switched environment, its practical approach, its positive vs negative aspects and its safe guards.","PeriodicalId":415526,"journal":{"name":"International Journal of Computer Science & Engineering Survey","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}