A. O. Akpovi, Ebiesuwa Seun, A. O. Adebayo, F. Osisanwo
{"title":"Introduction to Software Defined Networks (SDN)","authors":"A. O. Akpovi, Ebiesuwa Seun, A. O. Adebayo, F. Osisanwo","doi":"10.5120/IJAIS2016451623","DOIUrl":"https://doi.org/10.5120/IJAIS2016451623","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"10 1","pages":"10-14"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75508418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giang V. Trinh, K. Le, Tam Bang, Q. Trâm, T. Bui, T. Quan
Congestion in Wireless Sensor Networks (WSNs for short) causes not only packet loss and but also leads to excessive energy consumption. Therefore, congestion needs to be detected as well as controlled in order to prolong system lifetime. There are two streams to concern congestion detection including simulation-based and model-based. Following the second stream, formal modelling techniques are used for analysis of WSNs. Coloured Petri nets (CPNs for short) that combines Petri nets with programming languages is a powerful modelling technique. This paper presents a CPN-based approach for formal modelling and congestion detection of WSNs. The proposed model describes parameters and behaviours of a WSN. Then the congestion detection problem is reduced to a reachability problem on the state space of the CPN-based model. Moreover, the CPN-based model uses the hierarchical modelling capability of CPNs, including different levels of abstraction (sub-modules). This helps easily handling and extending the model. In reality, WSN components (sensors and channels) can execute a number of concurrent operations. This is called concurrency of WSNs. The CPN-based model is extended to express the concurrency, thus improving the congestion detection results.
{"title":"Modelling and Congestion Detection of Wireless Sensor Networks: A Concurrent-based Approach using Coloured Petri Nets","authors":"Giang V. Trinh, K. Le, Tam Bang, Q. Trâm, T. Bui, T. Quan","doi":"10.5120/IJAIS2016451629","DOIUrl":"https://doi.org/10.5120/IJAIS2016451629","url":null,"abstract":"Congestion in Wireless Sensor Networks (WSNs for short) causes not only packet loss and but also leads to excessive energy consumption. Therefore, congestion needs to be detected as well as controlled in order to prolong system lifetime. There are two streams to concern congestion detection including simulation-based and model-based. Following the second stream, formal modelling techniques are used for analysis of WSNs. Coloured Petri nets (CPNs for short) that combines Petri nets with programming languages is a powerful modelling technique. This paper presents a CPN-based approach for formal modelling and congestion detection of WSNs. The proposed model describes parameters and behaviours of a WSN. Then the congestion detection problem is reduced to a reachability problem on the state space of the CPN-based model. Moreover, the CPN-based model uses the hierarchical modelling capability of CPNs, including different levels of abstraction (sub-modules). This helps easily handling and extending the model. In reality, WSN components (sensors and channels) can execute a number of concurrent operations. This is called concurrency of WSNs. The CPN-based model is extended to express the concurrency, thus improving the congestion detection results.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"14 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89356521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Time and budget constraints are two main factors which affect the quality of software products. Testing is the last activity that performed in the software development life cycle which suffers more. Test cases are designed to find the bugs in the software. Prioritization of test cases is used to execute test cases earlier which are of high probability of finding bugs. Testing with all possible test cases is not possible even for trivial software. Testing of safety critical systems require more effort to identify the critical components. In the present work, authors proposed, a novel technique of test cases prioritization from UML state diagram by taking account risk. State machine diagram is transformed into WEFSM (Weighted Extended Finite State Machine) and a case study of ATM system is used to evaluate the proposed approach. A new metric based on risk called APRC (Average Percentage of Risk Covered) is proposed and used to demonstrate the effectiveness of proposed approach.
{"title":"Risk based Test Case Prioritization using UML State Machine Diagram","authors":"Gufran Ahmad Ansari, Wasiur Rhmann, Vipin Saxena","doi":"10.5120/IJAIS2016451624","DOIUrl":"https://doi.org/10.5120/IJAIS2016451624","url":null,"abstract":"Time and budget constraints are two main factors which affect the quality of software products. Testing is the last activity that performed in the software development life cycle which suffers more. Test cases are designed to find the bugs in the software. Prioritization of test cases is used to execute test cases earlier which are of high probability of finding bugs. Testing with all possible test cases is not possible even for trivial software. Testing of safety critical systems require more effort to identify the critical components. In the present work, authors proposed, a novel technique of test cases prioritization from UML state diagram by taking account risk. State machine diagram is transformed into WEFSM (Weighted Extended Finite State Machine) and a case study of ATM system is used to evaluate the proposed approach. A new metric based on risk called APRC (Average Percentage of Risk Covered) is proposed and used to demonstrate the effectiveness of proposed approach.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"12 1","pages":"15-21"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83652740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Monty Hall problem is a contingent likelihood case in which one of three doors has a profitable prize and other two doors imagine useless "goats." The amusement elements are a reasonable choice between stay or switch given the requirements of the diversion. This paper presents simulation results about for the original Monty Hall and a variation of two-player Monty Hall problem. The simulation results about, in view of the investigation of effective frequencies of either alternative, are helpful in illuminating the outlandish way of the issue. General Terms Monty Hall Problem
{"title":"Study of the Simulation of the Monty Hall Problem","authors":"Mazen Alrahili","doi":"10.5120/IJAIS2016451626","DOIUrl":"https://doi.org/10.5120/IJAIS2016451626","url":null,"abstract":"The Monty Hall problem is a contingent likelihood case in which one of three doors has a profitable prize and other two doors imagine useless \"goats.\" The amusement elements are a reasonable choice between stay or switch given the requirements of the diversion. This paper presents simulation results about for the original Monty Hall and a variation of two-player Monty Hall problem. The simulation results about, in view of the investigation of effective frequencies of either alternative, are helpful in illuminating the outlandish way of the issue. General Terms Monty Hall Problem","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"41-45"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84097526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Athithyaa Selvam, Balasubramanian Thiagarajan, T. Thivakaran
Everybody encounters different kinds of emergency circumstances in their day-to-day life. A 9-1-1 call may be a consequence of a natural disaster, emergency medical need, fire attack, crime or an individual or group of persons needing some form of immediate assistance. Strategy makers are faced with difficult decisions of providing resources to handle these emergencies, and due to lack of data, they face many problems. In this paper, a model is developed using data mining techniques for identifying patterns based on an analysis of the characteristics of 9-1-1 call activity from Montgomery County 9-1-1 calls dataset. This analysis is useful for allocating emergency responders and helps them take proactive steps in their response efforts. The model will also help strategy makers anticipate the occurrences of emergencies and enable them to effectively handle the emergency by appropriate allocation of resources. General Terms Data Mining, Pattern Mining
{"title":"Mining Patterns from 9-1-1 Calls Dataset","authors":"Athithyaa Selvam, Balasubramanian Thiagarajan, T. Thivakaran","doi":"10.5120/IJAIS2016451632","DOIUrl":"https://doi.org/10.5120/IJAIS2016451632","url":null,"abstract":"Everybody encounters different kinds of emergency circumstances in their day-to-day life. A 9-1-1 call may be a consequence of a natural disaster, emergency medical need, fire attack, crime or an individual or group of persons needing some form of immediate assistance. Strategy makers are faced with difficult decisions of providing resources to handle these emergencies, and due to lack of data, they face many problems. In this paper, a model is developed using data mining techniques for identifying patterns based on an analysis of the characteristics of 9-1-1 call activity from Montgomery County 9-1-1 calls dataset. This analysis is useful for allocating emergency responders and helps them take proactive steps in their response efforts. The model will also help strategy makers anticipate the occurrences of emergencies and enable them to effectively handle the emergency by appropriate allocation of resources. General Terms Data Mining, Pattern Mining","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"71 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86307132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
During last few years, the demand of cloud computing has immensely arisen among the Corporate/Business organizations. The cloud computing concept brings exclusive monetary benefits to the corporate houses through its pay-as per use facility. The incurred cost only lies in the consumption of hardware and software resources for any particular available business applications[1].For any particular project, all the web applications are deployed on available physical servers ,dispersed throughout the countries ,connected through cloud service providers. This mega scale growth in the adoption of cloud platform leads to extreme revenue benefits to the involved parties. But at the same time, information security also requires to be well enveloped in the cloud environment [2].In this research work, we have incorporated various cryptographic algorithms to improve the authentication module such as Challenge response Authentication protocol and file data storage using suitable and efficient Digital Signature Standard scheme along with effective encryption schemes such as AES as well. The proposed framework represents proper client –server authentication and secured & trusted architecture for stored information on cloud server. We have done research work to alleviate the security of stored information with in the cloud and also to protect it from any outside attack during information exchange between client and server. General Terms Information Security, Cloud Platform, File Integrity.
{"title":"A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform","authors":"Shweta Sharma","doi":"10.5120/IJAIS2016451612","DOIUrl":"https://doi.org/10.5120/IJAIS2016451612","url":null,"abstract":"During last few years, the demand of cloud computing has immensely arisen among the Corporate/Business organizations. The cloud computing concept brings exclusive monetary benefits to the corporate houses through its pay-as per use facility. The incurred cost only lies in the consumption of hardware and software resources for any particular available business applications[1].For any particular project, all the web applications are deployed on available physical servers ,dispersed throughout the countries ,connected through cloud service providers. This mega scale growth in the adoption of cloud platform leads to extreme revenue benefits to the involved parties. But at the same time, information security also requires to be well enveloped in the cloud environment [2].In this research work, we have incorporated various cryptographic algorithms to improve the authentication module such as Challenge response Authentication protocol and file data storage using suitable and efficient Digital Signature Standard scheme along with effective encryption schemes such as AES as well. The proposed framework represents proper client –server authentication and secured & trusted architecture for stored information on cloud server. We have done research work to alleviate the security of stored information with in the cloud and also to protect it from any outside attack during information exchange between client and server. General Terms Information Security, Cloud Platform, File Integrity.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"11 1","pages":"3-7"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79386951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Telemedicine is the use of information and communication technology (ICT) to provide and support health care. It is not only limited to communication between physicians, but it can also be used in consultation, diagnosis, monitoring and even surgery. It provides a way for the masses that live in remote areas to access medical services without having to travel all the way to urban areas to seek medical attention. Most developed countries have ventured fully into telemedicine and the outcomes of the implementation of telemedicine can be felt. In developing countries, implementation has taken place as well, albeit with challenges. For instance, countries like Bangladesh are working hard towards the use of telemedicine to improve the provision of healthcare to its people. This study is as a result of the evaluation of literature to establish the challenges faced in the implementation process by developing countries. The study has pointed out challenges in telemedicine implementation that will assist developing countries to find the best ways implementing of implementing telemedicine systems.
{"title":"Challenges Faced by Organizations in Implementing Telemedicine in Developing Countries: A Literature Review","authors":"Oroko Dismas Ombuya, N. A. Ishmael","doi":"10.5120/IJAIS2016451616","DOIUrl":"https://doi.org/10.5120/IJAIS2016451616","url":null,"abstract":"Telemedicine is the use of information and communication technology (ICT) to provide and support health care. It is not only limited to communication between physicians, but it can also be used in consultation, diagnosis, monitoring and even surgery. It provides a way for the masses that live in remote areas to access medical services without having to travel all the way to urban areas to seek medical attention. Most developed countries have ventured fully into telemedicine and the outcomes of the implementation of telemedicine can be felt. In developing countries, implementation has taken place as well, albeit with challenges. For instance, countries like Bangladesh are working hard towards the use of telemedicine to improve the provision of healthcare to its people. This study is as a result of the evaluation of literature to establish the challenges faced in the implementation process by developing countries. The study has pointed out challenges in telemedicine implementation that will assist developing countries to find the best ways implementing of implementing telemedicine systems.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"8-11"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86961594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper I discussed about some separation properties of fuzzy topological space. The definition of fuzzy compactness does not hold good on the definition of fuzzy Hausdorff space, we introduce a new definition of proper compactness and prove some interesting results related with it.
{"title":"Separation of Fuzzy Topological Space","authors":"Md. Arshaduzzaman","doi":"10.5120/IJAIS2016451610","DOIUrl":"https://doi.org/10.5120/IJAIS2016451610","url":null,"abstract":"In this paper I discussed about some separation properties of fuzzy topological space. The definition of fuzzy compactness does not hold good on the definition of fuzzy Hausdorff space, we introduce a new definition of proper compactness and prove some interesting results related with it.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"61 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84026345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Web Pages which are recommended by the normal web page recommendation system are listed and are not clustered. The web search is based on keyword. The search engine does not understand the meaning of the searched query as it does not have a background domain knowledge of the searched query. The earlier search engine designed clustered the web pages according to static clusters formed [2]. As static clustering, faced some drawbacks of mapping the Web pages, there was a need to find the solution for the same. This paper presents a solution to form the clusters dynamically considering the domains for efficient clustering. General Terms Data mining, Semantic-based Mining, Recommendation Systems, Clustering techniques.
{"title":"A Novel Approach to Cluster Web Pages Dynamically based on Domain Knowledge","authors":"T. D’abreo, A. Khandare, P. Janrao","doi":"10.5120/IJAIS2016451617","DOIUrl":"https://doi.org/10.5120/IJAIS2016451617","url":null,"abstract":"Web Pages which are recommended by the normal web page recommendation system are listed and are not clustered. The web search is based on keyword. The search engine does not understand the meaning of the searched query as it does not have a background domain knowledge of the searched query. The earlier search engine designed clustered the web pages according to static clusters formed [2]. As static clustering, faced some drawbacks of mapping the Web pages, there was a need to find the solution for the same. This paper presents a solution to form the clusters dynamically considering the domains for efficient clustering. General Terms Data mining, Semantic-based Mining, Recommendation Systems, Clustering techniques.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"53 1","pages":"12-15"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83099222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Method for Soil Analysis using FARM-IT Approach","authors":"M. Martiš, P. Lobo, S. Chavan","doi":"10.5120/IJAIS2016451618","DOIUrl":"https://doi.org/10.5120/IJAIS2016451618","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"313 1","pages":"16-19"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76350546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}