|Title: Monitored Intelligent Car Speed Adaptation (MISA) System|
|Author(s): Omaima Bamasak, Ghadah Al-Mehmadi, Amal Al-Ghamdi, Arwa Al-Mutawa, Mashael Al-Ghamdi|
|Pages: 1-13||Paper ID: 113203-7575 IJECS-IJENS||Published: June, 2011|
Abstract: With the rapid increase in number of vehicles in Saudi Arabia, the traffic accident caused by high speed has become a serious health problem. Saudi Arabia is currently taking the lead in the number of car accidents in the world. Over 65% of accidents occur as a result of vehicles travelling at excess speed, which makes traffic accidents among the top five causes of death in Saudi Arabia. To address this problem, we propose a solution, called Monitored Intelligent Speed Adaptation (MISA), which aims to enhance the driving safety through monitoring driver’s behavior and alerts him/her if any traffic rule violation has been made. The driving safety is also indirectly achieved by collecting information about vehicles' behavior which provides researchers and traffic department with valuable data that help them in studying the violations and the problems in the roads network. This aim was achieved through developing a system of two subsystems. The first one is designed to be installed in the vehicle to inform the driver of the current street maximum speed limit while driving and alerts the driver when he/she violates this maximum speed limit. The car speed and its position on the road network are determined by analyzing the received GPS signals. Car behavior data are collected and sent to the second subsystem which is a central server that eventually collects data about registered vehicles' behavior. These collected data can be used for providing statistics for researchers and decision makers, tracking purposes as well as keeping log for each driver that can be accessed by insurance companies.
|Keywords: Intelligent speed adaptation, MISA, traffic accidents control, intervening degree, advisory systems.|
|Full Text (.pdf) | 1,361 KB|
|Title: Multiple Pivot Sort Algorithm is Faster than Quick Sort Algorithms: An Empirical Study|
|Author(s): Salman Faiz Solehria, Sultanullah Jadoon|
|Pages: 14-18||Paper ID: 114103-0707 IJECS-IJENS||Published: June, 2011|
Abstract: Multiple Pivot Sort is a new comparison-based sorting algorithm that has been developed to address shortcomings in current popular comparison-based sorting algorithms. The goal of this work is to perform an extensive empirical study of Multiple Pivot Sort against other established sorting algorithms including Quick Sort, Merge Sort, and Heap Sort. This research presents data to support the hypothesis that Multiple Pivot Sort is an extremely promising new algorithm in a critical field of Computer Science. The empirical study includes comparisons of the various sorts using randomly generated arrays of size 10 data items up to 1 million or more data items. In addition, integer arrays in which the data is in order and in reverse order are used in the study. Data items include integers, strings, and classes. The study keeps track of the number of comparisons, the number of data moves, and CPU time specific to the machine for each sort. Results of the empirical study performed in this research support the claim that Multiple Pivot Sort may well be the fastest sorting algorithm in existence.
|Keywords: Multiple Pivot Sort, Quick Sort, Empirical Study, Sorting Algorithm.|
|Full Text (.pdf) | 360 KB|
|Title: A Novel EWMA based Link Quality Evaluation Algorithm for WSN|
|Author(s): MI Xue, ZHAO Hai, ZHU Jian|
|Pages: 19-22||Paper ID: 114503-2727 IJECS-IJENS||Published: June, 2011|
Abstract: The environments of WSN frequently disturb the link quality. Link quality not only affects the reliability of data transmission in the network, but also determines the performance of related Upper-layer network protocol. Therefore, link quality evaluation becomes a considering question. The link quality evaluation methods include data package delivery rate and LQI(Link Quality Index). Practical tests show that the delivery rate and LQI value has high dithering and low performance, which can not provide the foundation for Upper-layer protocol. This paper proposed a stable and sensitivity adjustable evaluation algorithm by applying EWMA mathematical model to link quality evaluation. The experimental results prove the validity of the algorithm which can better evaluate actual link quality according to the historical and current data.
|Keywords: Wireless Sensor Network; EWMA; package delivery ratio; evaluation model.|
|Full Text (.pdf) | 419 KB|
|Title: Complete Description of Well-known Number Systems using Single Table|
|Author(s): Shahid Latif, Junaid Qayyum, Muhammad Lal, Faheem Khan|
|Pages: 23-30||Paper ID: 114403-5050 IJECS-IJENS||Published: June, 2011|
Abstract: A number system is a set of rules and symbols used to represent a number, or any system used for naming or representing numbers is a number/numeral system. The modern society is familiar with decimal number system using ten digits. However digital devices and computers use binary number system instead of decimal, using only two digits i.e. 0 and 1 based on the fundamental concept of the decimal number system. Various other number systems also used this fundamental concept of decimal number system i.e. octal system and hexadecimal number system using eight and sixteen digits respectively. The awareness and concept of various number systems, their number representation, arithmetic operations, compliments and the inter conversion of numbers belongs to different number system is essential for understanding of computers. More over, successful programming for digital devices require the understanding of data formats (BCD, ASCII etc), number systems and their inter conversion (a process in which things are each converted into the other). Understanding all these number systems and particularly the inter conversion of numbers requires allot of time and techniques to expertise. In this paper the concepts of the four most common number systems, their representation, arithmetic, compliments and interconversion is taken under the consideration in tabulated form. It will provide an easy understanding and practising of theses number systems to understand as well as memorise them. The four number systems are binary, octal, decimal and hexadecimal.
|Keywords: Number system, Binary, octal, hexadecimal, inter conversion, compliments.|
|Full Text (.pdf) | 339 KB|
|Title: Comparison of Achievement Integrated Network-Based Electronic Tourism in Support Visit Indonesia Year 2010|
|Author(s): Prakoso Bhairawa Putera, Dini Oktaviyanti|
|Pages: 31-37||Paper ID: 114703-02-3434 IJECS-IJENS||Published: June, 2011|
Abstract: Technology has an important role in the development of mankind, especially when people run the organization. The rate of technological development brought a major impact on many aspects of life and the environment. Technology itself is an application and / or development of a variety of theoretical findings for the benefit of mankind. The implication of technological progress is preceded by research activities to develop science. Information technology has become an important component in various fields, including the tourism industry, including promotion, marketing, and sales of tourism products. Based tourism information technology known as e-tourism. Problems of e-tourism in Indonesia is not yet optimal marketing of tour packages for the information provided on this website is not interactive tourism with tourists who need information, have not integrated tourism websites with the other components of information systems in the tourism industry, such as airlines, cruise , insurance, travel agents, hotels, and managing their own attractions. This paper examined the comparative achievement of an integrated network of tourism information web based (electronic tourism) is done through exploratory approach. While the analysis used is a qualitative analysis, which will describe the findings of literature studies, and analyze the structure of information in the website. Object of study itself uses case studies in three regions, namely Aceh, Batam, Bangka and Belitung, which is based on the availability of an integrated network of tourism information in each region. There are several indicators used to measure the extent to which the achievement of an integrated network of tourism information-based e-tourism of the region of Aceh, Bangka Belitung, and Batam. The indicators used are: The popularity of search engines, description of institutions, Up-date information / news, serial data agency, internal service, public service / external feedback email response test, view the homepage, Conformity domain name with the name of the institution (Refer to Ministerial Regulation Depkominfo No.28/2006). From the technology application of e-tourism in Indonesia, concluded that this technology can be a solution for the promotion of tourism in Indonesia. 1This paper has presented and has been improved based on the results of discussions at the National Seminar on Information Technology Applications (SNATI) 2010 at the Islamic University of Indonesia, Yogyakarta, June 19, 2010. E-tourism can be utilized in the field of tourism to solve the problem of data interoperability, allowing the promotion, marketing, and sales of a more complete tour packages and integrated.
|Keywords: Information Systems, Digital Telecommunications and Computer Networks, Tourism Network, e-Tourism, Visit Indonesia Year 2010.|
|Full Text (.pdf) | 511 KB|
|Title: Cost Effective Online Voting System for Pakistan|
|Author(s): Salman Faiz Solehria, Sultanullah Jadoon|
|Pages: 38-46||Paper ID: 114803-7272 IJECS-IJENS||Published: June, 2011|
Abstract: The Election Schedule for the conduct of General Elections as well as for the by-elections, as the case may be, is decided by the Chief Election Commissioner in Pakistan. The current system is being operated manually. Votes are polled manually. All the record of voters, candidates, polling stations, regions detail and parties’ information are stored manually. Results are calculated manually. All records are stored in registers and files. There is a big problem for election commission to manage the records. Our proposed cost effective Online Voting system will replace the manual record keeping system of voters, candidates; duty staff by polling the votes by a computerize system, which will reduce the chances of error occurrence, while counting, minimize time being consumed during counting, increase security of votes being polled. No chances of vote’s rejection and easy management of records.
|Keywords: E – Voting, Framework, Polling Station, Election Commission.|
|Full Text (.pdf) | 911 KB|
|Title: Impact of User Satisfaction on Software Quality in use|
|Author(s): Tayyaba Nafees|
|Pages: 47-53||Paper ID: 118003-2929 IJECS-IJENS||Published: June, 2011|
Abstract: The idea of user satisfaction is not new. But how important it is in quality in use is new and under description. Satisfying the customers is an essential element to staying in business in this modern world of global competition. Software companies satisfy and even delight their customers with the value of their software products and services to gain their loyalty and repeat business. Customer satisfaction is therefore a primary goal of process improvement of software quality. Most of the software companies give the more importance to user satisfaction rather than McCall other quality factors. So in this paper I argue about the quality in use and user satisfaction, its relationship and its importance.
|Keywords: User satisfaction; quality in use; metric.|
|Full Text (.pdf) | 470 KB|
|Title: Performance Analysis of Static Load Balancing in Grid|
|Author(s): Sherihan Abu Elenin, Masato Kitakami|
|Pages: 54-60||Paper ID: 118903-4646 IJECS-IJENS||Published: June, 2011|
Abstract: Monitoring is the act of collecting information concerning the characteristics and status of resources of interest. The Grid Monitoring Architecture (GMA) based on simple Consumer/ Producer architecture with an integrated system registry and distinguishes transmission of monitoring data and data discovery logically. We propose grid monitoring system based on GMA. The proposed grid monitoring system consists of producers, registry, consumers, and failover registry. The registry is used to match the consumer with one or more producers, so it is the main monitoring tool. The failover registry is used to recover any failure in the main registry. The structure of proposed grid monitoring system depends on java Servlet and SQL query language. Load balancing (LB) should be added to the system to overcome the message overloaded. Load balancing algorithms can be static or dynamic. This paper evaluates the four types of static load balancing algorithms; Randomized, Round Robin, Threshold, and Central Manager algorithms. We evaluate the performance of the system by measuring the response time, and throughput. Central Manager algorithm introduces the smallest response time and the highest throughput.
|Keywords: Grid computing, monitoring system, load balancing, response time, Security, throughput.|
|Full Text (.pdf) | 536 KB|
|Title: Performance Evaluation of Linear Channel Estimation Algorithms for MIMO-OFDM in LTE-Advanced|
|Author(s): Saqib Saleem, Qamar-ul-Islam, Waqar Aziz, Abdul Basit|
|Pages: 61-66||Paper ID: 119303-7474 IJECS-IJENS||Published: June, 2011|
Abstract: In this paper two linear channel estimation techniques, Least Square Error (LSE) and Linear Minimum Mean Square Error (LMMSE) along with their modified versions, for reduced complexity, are discussed for LTE-Advanced which is based on MIMO-OFDM technology. LMMSE demonstrates better performance but with more complexity than LSE because it requires channel and noise statistics. The performance and complexity can be optimized by modifying LSE and LMMSE techniques. These algorithms are evaluated based on CIR samples and multi-path channel taps. MATLAB Monte –Carlo Simulations are used to optimize their performance in terms of Mean Square Error (MSE), Bit Error Rate (BER) and Frame Error Rate (FER) for 2×2 MIMO System. Simulation parameters are taken according to the physical layer of LTE-Advanced as given in Release-10 by 3rd Generation Partnership Project (3GPP).
|Keywords: LTE-Advanced, LSE, LMMSE, MIMO-OFDM, 3GPP, ITU, DFT.|
|Full Text (.pdf) | 567 KB|
|Title: A 2D positioning System using WSNs in indoor Environment|
|Author(s): Hakan Koyuncu, Shuang Hua Yang|
|Pages: 67-72||Paper ID: 119503-0707 IJECS-IJENS||Published: June, 2011|
Abstract: This paper describes a 2D location deter- mination system using wireless sensor nodes (WSN) in indoor environment. The system is based on radio-location fingerprinting algorithm. It uses WSN technology and programmable Zigbee wireless network protocols. The important point in this study is to estimate the location of a mobile sensor. WSNs, transmitters and receivers, have been deployed in an experimental test bed for location estimation. K-nearest neighborhood algorithm has been implemented together with weight functions over a set of radio location fingerprints collected in a 2D space. Experi- mental results show the effects of different weight functions to achieve accurate and stable position detection in indoor environments.
|Keywords: WSN, transmitter, receiver, RSSI, LQI, AP, weight function, fingerprints, k-NN algorithm.|
|Full Text (.pdf) | 545 KB|
|Title: Fuzzy Inference System Mamdani to Predicting Conformational Epitope Location|
|Author(s): Faizah, M. R. Widyanto, Asmarinah|
|Pages: 73-81||Paper ID: 1110303-9696 IJECS-IJENS||Published: June, 2011|
Abstract: Predicting of conformational epitope is one of the major challenge in the field of vaccine design. Several methods have been developed for predicting conformational epitope but that methods have mostly been based on protein sequence and not very effective. This is the first attempt in this are to predict conformational epitope using fuzzy inference system mamdani. The proposed method based on amino acid properties and spatial information. The prediction results of the proposed system have high accuracy and its performance is comparable to existing tools.
|Keywords: Conformational epitope, fuzzy system, prediction, amino acid.|
|Full Text (.pdf) | 758 KB|
|Title: Test Case Generation and Test Data Extraction Techniques|
|Author(s): Pakinam N. Boghdady, Nagwa L. Badr, Mohamed Hashem, Mohamed F. Tolba|
|Pages: 82-89||Paper ID: 113803-9191 IJECS-IJENS||Published: June, 2011|
Abstract: The software testing immensely depends on three main phases: test case generation, test execution, and test evaluation. Test case generation is the core of any testing process; however, those generated test cases still require test data to be executed which makes the test data generation not less important than the test case generation. This kept the researchers during the past decade occupied with automating those processes which played a tremendous role in reducing the time and effort spent during the testing process. This paper explores different approaches that had emerged during the past decade regarding the generation of test cases and test data from different models as an emerging type of model based testing. Unified Modeling Language UML models took the greatest share from among those models. Many researchers had paid a great attention to optimizing and reducing the test cases rather than generating them; light is shed on some of those approaches as well.
|Keywords: Model based Testing (MBT), Evolutionary testing, Genetic algorithms, Metamorphic testing and Meta-heuristic search techniques.|
|Full Text (.pdf) | 250 KB|
|Title: Performance Evaluation of TCP Vegas versus Different TCP Variants in Homogeneous and Heterogeneous Networks by Using Network Simulator 2|
|Author(s): B. S. Yew, B. L. Ong, R. B. Ahmad|
|Pages: 90-97||Paper ID: 1111403-5656 IJECS-IJENS||Published: June, 2011|
Abstract: The performances of TCP Vegas versus different TCP variants in homogeneous and heterogeneous networks were evaluated via simulation experiment using network simulator (ns-2). In our simulation experiments, we investigate the performance of TCP Vegas in both homogeneous and heterogeneous wired and wired-cum-wireless networks. In homogeneous wired network, TCP Vegas outperforms other TCP variants. In contrast, the performance of TCP Vegas is the worst compared to other TCP variants in homogeneous wired-cum-wireless network. For both heterogeneous wired network and heterogeneous wired-cum-wireless network, TCP Vegas is unable to achieve fair bandwidth allocation when sharing the bottleneck link with other TCP variants. On the other hand, TCP Vegas has a significantly lower delay than other TCP variants in both homogeneous and heterogeneous wired and wireless networks.
|Keywords: TCP Vegas, Homogeneous, Heterogeneous, Wired Network, Wired-cum-Wireless Network.|
|Full Text (.pdf) | 654 KB|
|Title: Using Fuzzy Logic Methods for Carbon Dioxide Control in Carbonated Beverages|
|Author(s): Iman Askerbeyli, Juneed S. Abduljabar|
|Pages: 98-106||Paper ID: 1111503-7474 IJECS-IJENS||Published: June, 2011|
Abstract: In this paper, this article is about one of the applications of fuzzy logic and neuro-fuzzy in field of control, it is how to measuring the percentage of carbon dioxide gas which is contained in sugary solution of Fizzy drink by using computer system depended on the concept of fuzzy logic and neuro-fuzzy mechanism, by these two methods the percentage of carbon dioxide can be measured in sugary solution of fizzy drink, at last the comparison can be done among result in order to know which one of methods has less ratio than another to measuring the real value of carbon dioxide of AL-TAMIM company for food stuff.
|Keywords: Fuzzy logic, adaptive network fuzzy inference system, carbonated beverages, control application.|
|Full Text (.pdf) | 639 KB|