|Title: A Practical approach on Model checking with Modex and Spin|
|Author(s): Muhammad Iqbal Hossain, Nahida Sultana Chowdhury|
|Pages: 1-5||Paper ID: 110105-8989-IJECS-IJENS||Published: October, 2011|
Abstract: Software verification methods are used widely in commercial and industrial development. To formally verify a large software application we can extract a model from the source code and verify that model with any verification mechanism or human contribution. So there are two things extraction and verification. There are two main problems in this approach. The first problem is verification process by human is no longer reliable because in manual verification the error rate can be higher and that can decrease the functionalities of the whole process. The second problem is the effort to extract or verify the model can take a considerable investment of time and expertise. For a large system manual verification can take a great effort and the performance of humans. In this paper we have tried to represent the whole process in an automatic way. And also we have tried to ignore the manual contribution of human to make the whole procedure faster and reliable. For this purpose we choose an automated model extractor method: Modex and an automated verifier to extrac model: Spin. Firstly we have applied MODEX to automated the model extractor method and then we used SPIN to automatically verify the extracted model.
|Keywords: MODEX, SPIN, Model Extraction, Model Verification.|
|Full Text (.pdf) | 386 KB|
|Title: An Efficient Handover Scheme for PMIPv6 in IEEE 802.16/WiMAX Network|
|Author(s): Kheya Banerjee, Sheikh Md. Rabiul Islam, Zulkernine Ibne Tahasin, Rokon Uddin|
|Pages: 6-14||Paper ID: 112305-0909-IJECS-IJENS||Published: October, 2011|
Abstract: In the era of wireless communication, mobility management is an important issue. The world is deploying WiMAX (Worldwide Interoperability for Microwave Access) as the standard for broadband wireless communication because of it’s wide application areas, high speed and architecture for seamless handover. Alongside, a network-based mobility management protocol called PMIPv6 (Proxy Mobile Internet Protocol version 6) is being actively standardized and is starting to attract considerable attention among the telecommunication and Internet communities for its less handover latency. In PMIPv6, the functioning network provides control of the mobility management on behalf of the mobile node. Thus the mobile node is relieved from any mobility related signaling. However, the PMIPv6 suffers from handover latency and packet loss during handover. In this paper, an efficient handover scheme is proposed within a PMIPv6 domain in the WiMAX network. The proposed scheme reduces handover latency by eliminating the need of a Policy Server (PS) and by pre-registration of the mobile node for a new access point. Furthermore, a comprehensive analysis has been done by NS-2 (Network Simulator-2) for evaluating the delay of our proposed handover scheme and that of general PMIPv6. The analysis results reveal that the proposed strategy for handover has significantly reduced the handover latency of general PMIPv6.
|Keywords: Authentication Latency, Handover Latency, NS-2, PMIPv6, Registration latency, WiMAX, Wireless Link Delay.|
|Full Text (.pdf) | 816 KB|
|Title: Optimal Voltage Control on the Nigerian Rural Electric System Using Coordition of Distributed Static VAR System (D-SVS)|
|Author(s): Oodo S. O, Zhang G, Hui S, Z. Jiyan|
|Pages: 15-20||Paper ID: 112705-0808-IJECS-IJENS||Published: October, 2011|
Abstract: Traditional management technique for reactive power support has been in use for generations, on the Nigeria rural electric power system for the provision of reactive power supply to enhance the quality of power on the network. Recent Rapid industrialization of these rural areas however has brought about the presence of loads which varies their demand for reactive power. Thus voltage regulation due to insufficient reactive power supply became a critical issue, and without adequate power supply, there is no way small and medium scale industries [SMEs], which are the economic mainstay of any country, could be encouraged, The utility network needs to provide a controllable and variable amount of reactive power according to the requirement of the load rapidly to keep the voltage on its distribution network near to its rated value. This paper looks at the prospect of the application of a cost effective method of improving the voltage profile and power factor on the rural distribution network by the coordination of Distributed Static VAR Syatem (D-SVC) termed Integrated distributed Static VAR System (D-SVS) on the local rural power systems in Nigeria.
|Keywords: Voltage drop,power factor,Distributed Static VAR,Rural Electric Network, Integrated D-SVC.|
|Full Text (.pdf) | 384 KB|
|Title: Information Security Management System Standards: A Comparative Study of the Big Five|
|Author(s): Heru Susanto, Mohammad Nabil Almunawar, Yong Chee Tuan|
|Pages: 21-27||Paper ID: 113505-6969-IJECS-IJENS||Published: October, 2011|
Abstract: It cannot be denied that nowadays information is a very important asset for any modern organization. Therefore protecting its security is very important and becoming a top priority for many organizations. Unfortunately there is no single formula that can guarantee 100% of information security. Therefore there is a need for a set of benchmarks or standards to ensure the best security practices are adopted and an adequate level of security is attained. In this paper, authors introduce various information security standards briefly and then provide a comparative study for major information security standards, namely ISO27001, BS 7799, PCIDSS, ITIL and COBIT. The study will provide a picture of the position and specialization of each standard, adoption by countries and their usability levels.
|Keywords: ISO27001, BS7799, PCIDSS, ITIL, COBIT, ISMS, Information Security, PDCA.|
|Full Text (.pdf) | 824 KB|
|Title: Optimization of TCP Over Wireless Networks|
|Author(s): Mohammad Usman Ali Khan, Shahid Khan, Yasir Ali Rasheed|
|Pages: 28-34||Paper ID: 114705-8282-IJECS-IJENS||Published: October, 2011|
Abstract: As mobile devices are popular portals for internet users; they have some basic design limitations of the TCP having congestion control mechanism. But in mobile wireless networks, non congestion related packet losses due to varying signal power inherent with mobility and handover between base-stations are dominant. Due to the misinterpretation of such non congestion related packet losses optimum performance is compromised. This paper provides an overview of the challenges and suggests optimization techniques for TCP in wireless network environments. The consequence is a wireless enhancement scheme for TCP called Congestion Coherence. By several investigations and statistical analysis, we identified that the performance degradation of wireless TCP is mainly due to the timeout resulting from frequent packet losses. This scheme determines the cause of packet loss by using the sequential coherence of packet marking, it uses three-level ECN signals to detect congestion loss and to reduce number of timeouts established on the perception that congestion neither happens nor disappears abruptly. Simulations show that the performance and efficiency of this technique is better than the existing techniques.
|Keywords: ECN, TCP, ECN-Echo|
|Full Text (.pdf) | 375 KB|
|Title: Single Phase Automatic Voltage Regulator Design for Synchronous Generator|
|Author(s): M. Rabiul Alam, Rajib Baran Roy, S. M. Jahangir Alam, Dewan Juel Rahman|
|Pages: 35-40||Paper ID: 115105-2929-IJECS-IJENS||Published: October, 2011|
Abstract: The Automatic Voltage Regulator (AVR) is widely used in industrial application to obtain the stability and good regulation of different electrical apparatus. In order to get output of the alternator, the field excitation is controlled by the AVR. The AVR maintains the constant voltage up to certain level of the load current which is independent of the generator speed and load. In this paper, the excitation control for the synchronous generator is designed by using silicon controlled rectifier (SCR) in order to improve the overall effectiveness of the synchronous generator. The control strategy is aimed to generate and deliver power to the interconnected system economically and reliably while managing the voltage and field current within set limitations. This includes a more accurate measurement of voltage and current, as well as improving the response time and system stability.
|Keywords: AVR, Synchronous Generator, Stabilizer, Synchronizing Pulse Generator.|
|Full Text (.pdf) | 543 KB|
|Title: Efficient Integrity Checking Technique for Securing Client Data in Cloud Computing|
|Author(s): Dalia Attas, Omar Batrafi|
|Pages: 41-45||Paper ID: 116105-8282-IJECS-IJENS||Published: October, 2011|
Abstract: It has been widely observed that the concept of cloud computing is become one of major theory in the world of IT industry. It involves storing the user's data to be able to use the applications and services that the clouds introduce. There is a significant numbers of risks can be occurred. One of these risks that can attack the cloud computing is the integrity of the data stored in the cloud . In order to overcome the threat of integrity of the data, the user must be able to use the assistance of a Third Party Auditor (TPA). The TPA has an experience that clouds users does not have, and checks over the integrity that is difficult for the users to check. The user can handout the integrity checking mission to the TPA, in such a way that the TPA will not be able to manipulate with the client data with one way or another . In this paper, we will introduce a model for the integrity checking over the cloud computing with the support of the TPA using digital signature technique. The proposed model result was shown efficiently with a number of situations that performed by unauthorized attackers. The checking done over two parts the CSP and TPA, without giving any secure data that void the integrity definition and without uploading any secure data to the cloud.
|Keywords: data centers, Third party editors, cloud server, digital signature and encryption.|
|Full Text (.pdf) | 943 KB|
|Title: Design of Internet Portal|
|Author(s): Inayat ullah|
|Pages: 46-48||Paper ID: 1110604-05-7474-IJECS-IJENS||Published: October, 2011|
Abstract: Society has a long, rapidly growing volumes of data, management of which is further complicated by their heterogeneous and poorly structural nature. In terms of socio-economic-globalization, ensure the effectiveness of information systems (IS) requires new approaches to their design and implementation. Accelerated, the widespread introduction of IT in life and human activity requires integration of heterogeneous data objects and etadata, IP, often built on mutually contradictory methodologies and models (not cluding those of leading manufacturers of system software, like Microsoft, IBM, Oracle, SAP, BEA and others). Problem search technology, language and software tools to develop unifying large-scale software so far is the focus of a number of leading research groups. Thus, the need to create models and their supporting integration tools and IP support throughout their life cycle. In this connection there is a family of interrelated problems associated with multiple standards and the heterogeneity of design methodologies, incompatible mathematical foundation for modeling and object description language (Meta) data, as well as unbalanced interfaces between the database, IP and users. The aim is to construct a methodological foundations of the semantic design of large-scale IP and its application for collecting, processing and generation of accounting information in the Internet environment. The problem under consideration is part of a comprehensive conceptual approach to a continuous, integrated design, implementation and maintenance globally distributed Internet Portal, which includes a methodological scheme, the mathematical model (meta) data for the domain and computing environment, as well as semantic tools for design and implementation, architecture and interface solutions for prototype and full-scale enterprise web portals.
|Full Text (.pdf) | 174 KB|
|Title: An Interaction of Electromagnetic Wave and Human Skin Membrane Cell in Analysis of Electrical Field And Attenuation Coefficients Factors|
|Author(s): M. Muzafar Ismail, Noorazlan Zainudin, Rosman A. Rahim, Maizatul Alice, N. Mohd Kassim|
|Pages: 49-53||Paper ID: 113405-7676-IJECS-IJENS||Published: October, 2011|
Abstract: The interaction between electromagnetic waves and human cellvery importance to study. This interaction can come from many sources such as cellular phone. The structure of a human cell was studied from many school of taught such as biochemical in cell, cytoplasm, nucleus and membrane and the understanding obtained was used as the basis in the developing of mathematical model. The main objective of this project is to analyze the behavior and determine the parameters of the interaction in a single cell when expose to electromagnetic wave such as the attenuation coefficient and electric fields of difference frequency. The Maxwell equations were used as the basis of the modeling in this project with aid of numerical method approaches specifically Finite Difference Time Domain (FDTD) techniques. To develop the model MATLAB tool was used. Results obtained from the developed model was verified with known result obtained from others researchers.
|Keywords: Electromagnetic wave, finite difference time domain, attenuation coefficient, electric fields.|
|Full Text (.pdf) | 568 KB|
|Title: Autonomous Subgoal Discovery in Reinforcement Learning Agents using Bridgeness Centrality Measure|
|Author(s): Mohammad Ali Imanian, Parham Moradi|
|Pages: 54-62||Paper ID: 111105-8383-IJECS-IJENS||Published: October, 2011|
Abstract: The standard reinforcement learning methods do not scale up well for complex tasks and a solution to this drawback is to decompose a learning task into a set of subgoals, develop some skills based on the identified subgoals and then utilize the learnt skills. In this paper we propose a new approach for automatically identifying and evaluating subgoals based on bridgeness centrality measure. Investigating three benchmark problems, it is shown that how the proposed steps can significantly improve the learning performance of the agent.
|Keywords: Hierarchical Reinforcement Learning, Option, Skill Acquisition, Subgoal Discovery, Option, Graph Centrality Measure, Autonomous agents.|
|Full Text (.pdf) | 953 KB|
|Title: Reyni’s Entropy and Mean Square Error for Improving the Convergence of Multilayer Backprobagation Neural Networks : A Comparative Study|
|Author(s): Hussein Rady|
|Pages: 63-74||Paper ID: 117905-8282-IJECS-IJENS||Published: October, 2011|
Abstract: Improving the efficiency and convergence rate of the Multilayer Backpropagation Neural Network Algorithms is an active area of research. The last years have witnessed an increasing attention to entropy based criteria in adaptive systems. Several principles were proposed based on the maximization or minimization of entropic cost functions. One way of entropy criteria in learning systems is to minimize the entropy of the error between two variables: typically one is the output of the learning system and the other is the target. In this paper, improving the efficiency and convergence rate of multilayer Backpropagation (BP) Neural Networks was proposed. The usual mean square error(MSE) minimization principle is substituted by the minimization of Renyi’s entropy (RE) of the differences between the multilayer perceptions output and the desired target. These two cost functions are studied, analyzed and tested with two different activation functions namely, the Sigmoid and the arctangent activation functions. The comparative approach indicates that the Degree of convergence using Renyi’s entropy cost function is higher than its counterpart using MSE and that MSE speeds the convergence than Renyi’s Entropy.
|Keywords: Neural Network, Backpropagation, Renyi’s Entropy, Mean Square Error, Activation Function, Learning Rate.|
|Full Text (.pdf) | 821 KB|