Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1165

A Robust Non-Blind Watermarking Technique for Color Video Based on Combined DWT-DFT Transforms and SVD Technique

A Robust Non-Blind Watermarking Technique for Color Video Based on Combined DWT-DFT Transforms and SVD Technique

Nandeesh B, Lohit S Meti, Manjunath G K

Статья научная

The rise of popularity of Digital video in the past decade has been tremendous thereby leading to malicious copying and distribution. So the need for preservation of ownership and in tackling copyright issues has become an imminent issue. Digital Video Watermarking has been in existence as a solution for this. The paper proposes a non-blind watermarking technique based on combined DWT-DFT transforms using singular values of SVD matrix in YCbCr color space. The technique uses Fibonacci series for selection of frames to enhance security and thereby maintaining quality of original video. Watermark encryption is done by scrambling the watermark using Arnold transform. Geometric and non-geometric attacks on watermarked video have been performed to test the robustness of the proposed technique. Quality of watermarked video is measured using PSNR and NC gives the similarity between extracted and the original watermark.

Бесплатно

A SCPS-NP Routing Algorithm Based on Mobile IP Routing

A SCPS-NP Routing Algorithm Based on Mobile IP Routing

Kai Hu, He Yang, Hong Jiang, Shu Jiang, Lujia Chen

Статья научная

Space communication protocol is a challenging problem in the future of space network. Now Mobile IP routing is very popular in the wireless communication network. The research shows the Mobile IP network has the much similar features to the space network. A Space Communications Protocol Specification Network Protocol (SCPS-NP) routing algorithm based on Mobile IP routing is proposed in the paper. Firstly, some basic knowledge about SCPS is introduced. The flooding routing algorithm in SCPS-NP protocol is studied. A new routing algorithmoptimized Mobile IP routing algorithm based on QoS is proposed. In order to verify the effects of the algorithm, A simulation model using NS2 network simulation tools is built and the comparisons between traditional Mobile IP routing and improved SCPS-NP routing are provided. The results show that optimized routing algorithm based on QoS could achieve better performance than traditional Mobile IP. Further, a working prototype based on SCPS-NP Gateway is implemented to test the algorithm’s application. It shows that algorithm based on Mobile IP routing can be used in the future space network.

Бесплатно

A Secure and Semi-Blind Technique of Embedding Color Watermark in RGB Image Using Curvelet Domain

A Secure and Semi-Blind Technique of Embedding Color Watermark in RGB Image Using Curvelet Domain

Ranjeeta, Sanjay Sharma, L. R. Raheja

Статья научная

A semi-blind and secure watermarking technique for the color image using curvelet domain has been proposed. To make the algorithm secure a Bijection mapping function has been used. The watermark also separated into color planes and each color plane into a bit planes. The most significant bit (MSB) planes of each color used as the embedding information and remaining bit planes are used as a key at the time of extraction. The MSB planes of each color of watermark image embedded into the curvelet coefficients of the blue color plane of the processed cover image. For embedding the MSB bit planes of watermark image in the cover image each curvelet coefficient of blue planes of the processed cover image has been compared with the value of its 8 connected coefficients (neighbors). The results of the watermarking scheme have been analyzed by different quality assessment metric such as PSNR, Correlation Coefficient (CC) and Mean Structure Similarity Index Measure (MSSIM). The experimental results show that the proposed technique gives the good invisibility of watermark, the quality of extracting watermark and robustness against different attacks.

Бесплатно

A Security Scheme against Wormhole Attack in MAC Layer for Delay Sensitive Wireless Sensor Networks

A Security Scheme against Wormhole Attack in MAC Layer for Delay Sensitive Wireless Sensor Networks

Louazani Ahmed, Sekhri Larbi, Kechar Bouabdellah

Статья научная

The main objective of this paper is to secure a cross-layer, energy efficient MAC protocol (CL-MAC) dedicated to delay sensitive wireless sensor networks (WSN) for detecting and avoiding wormhole attack. CL-MAC protocol is the result of our previous research works for which the security aspects have not been taken into consideration during its design stage. To formally prove the importance of the proposed scheme, we provide a theoretical study based on Time Petri Net to analyse some important properties related to the devastating effect of the wormhole attack and its countermeasure on the CL-MAC operations. Also, we perform an experimental evaluation through the simulation using realistic scenarios in order to show the performance of the proposal in terms of energy saving, packets loss ratio and latency. The obtained results indicate the usefulness of the formal study provided in this work when applied in security context and confirm clearly a good performance of the proposed scheme against wormhole attack.

Бесплатно

A Semantic Approach to the Notion of Representation and Its Application to Information Systems

A Semantic Approach to the Notion of Representation and Its Application to Information Systems

Lin Liu, Junkang Feng

Статья научная

Representation is a key concept for information systems (IS). IS is designated to provide information. However, the most available information systems such as databases using a computer are actually data storage and management systems because all they handle are data, which may be used to represent information. Therefore, a good understanding on the relationships between data, information and representation is vital for our study of information systems. And yet, it would seem that in the literature of information systems, the notion of representation has not been well studied, and in particular, how a possible representational relationship between two sets of data constructs may be systematically identified and how this representational relation may be explored for bearing on IS problems would seem worth looking at. The results of our investigation show that representation is a special type of signs created or being used by human agents to carry information about other states of affairs. Any representational relationship is realized and underpinned by information flow between components within an information channel. Moreover, representation can be quantitatively measured as long as certain conditions are met. The information content of representation reveals what you could possibly learn from it and the semantic content of representation is the proposition that a human originator intended to convey by using the representation. In addition, schema connections (i.e., connections between elements within a data schema) can be identified by examining the representational relationship between data entities.

Бесплатно

A Semantic Metadata Enrichment Software Ecosystem based on Metadata and Affinity Models

A Semantic Metadata Enrichment Software Ecosystem based on Metadata and Affinity Models

Ronald Brisebois, Alain Abran, Apollinaire Nadembega

Статья научная

Information systems need to be more flexible and to allow users to find content related to their context and interests. Metadata harvesting and metadata enrichments could represent a way to help users to find content and events according to their interests. However, metadata are underused and represents an interoperability challenge. This paper presents a new framework, called SMESE, and the implementation of its prototypes that consists of its semantic metadata model, a mapping ontology model and a user interest affinity model. This proposed framework makes these models interoperable with existing metadata models. SMESE also proposes a decision support process supporting the activation and deactivation of software features related to metadata. To consider context variability into account in modeling context-aware properties, SMESE makes use of an autonomous process that exploits context information to adapt software behavior using an enhanced metadata framework. When the user chooses preferences in terms of system behavior, the semantic weight of each feature is computed. This weight quantifies the importance of the feature for the user according to their interests. This paper also proposed a semantic metadata analysis ecosystem to support data harvesting according to a metadata model and a mapping ontology model. Data harvesting is coupled with internal and external enrichments. The initial SMESE prototype represents more than 400 millions of relationships (triplets). To conclude, this paper also presents the design and implementation of different prototypes of SMESE applied to digital ecosystems.

Бесплатно

A Semi-Automatic and Low Cost Approach to Build Scalable Lemma-based Lexical Resources for Arabic Verbs

A Semi-Automatic and Low Cost Approach to Build Scalable Lemma-based Lexical Resources for Arabic Verbs

Noureddine Doumi, Ahmed Lehireche, Denis Maurel, Ahmed Abdelali

Статья научная

This work presents a method that enables Arabic NLP community to build scalable lexical resources. The proposed method is low cost and efficient in time in addition to its scalability and extendibility. The latter is reflected in the ability for the method to be incremental in both aspects, processing resources and generating lexicons. Using a corpus; firstly, tokens are drawn from the corpus and lemmatized. Secondly, finite state transducers (FSTs) are generated semi-automatically. Finally, FSTs are used to produce all possible inflected verb forms with their full morphological features. Among the algorithm's strength is its ability to generate transducers having 184 transitions, which is very cumbersome, if manually designed. The second strength is a new inflection scheme of Arabic verbs; this increases the efficiency of FST generation algorithm. The experimentation uses a representative corpus of Modern Standard Arabic. The number of semi-automatically generated transducers is 171. The resulting open lexical resources coverage is high. Our resources cover more than 70% Arabic verbs. The built resources contain 16,855 verb lemmas and 11,080,355 fully, partially and not vocalized verbal inflected forms. All these resources are being made public and currently used as an open package in the Unitex framework available under the LGPL license.

Бесплатно

A Simple Model of Mapping of Land Surface Temperature from Satellite Digital Images in Bangladesh

A Simple Model of Mapping of Land Surface Temperature from Satellite Digital Images in Bangladesh

Shaikh Habiba Sultana, M. Shahjahan Ali, Mst. Ashrafunahar Hena, M. Muntasir Rahman

Статья научная

Land Surface Temperature is a key parameter in energy budget models, estimating soil moisture, forest detection and forecasting, monitoring the state of the crops and many other applications. In this work, a method has been developed to retrieve land surface temperature using the National Oceanic and Atmospheric Administration (NOAA) of USA, Advanced Very High Resolution Radiometer (AVHRR) satellite images. The land surface temperature has been determined taking AVHRR images from February to December in a year. Seasonal variations have also been studied. The results have been presented in the false color composition (fcc) map for each month. Studying the resulting maps it is found that there is a marked spatial and seasonal variations in the surface temperature among different regions of the country. We could not compare our result with the measured data as, till now, no measured data of surface temperature is available for our country. But it is observed that our result is well in conformity with the observed air temperature of the country. This method can thus be used for long term monitoring of surface parameters for the country. The long term study of surface temperature can be very much important for sustainable land resources development and to understand the effect of possible environmental changes.

Бесплатно

A Simple Statistical Model to Estimate Incident Solar Radiation at the Surface from NOAA AVHRR Satellite Data

A Simple Statistical Model to Estimate Incident Solar Radiation at the Surface from NOAA AVHRR Satellite Data

Mst. Ashrafunnahar Hena, M. Shahjahan Ali, M. Muntasir Rahman

Статья научная

Processing of meteorological satellite image data provides a wealth of information useful in earth surface and environmental applications. Particularly, it is important for the estimation of different parameters of surface energy budget. In this work, a method has been developed to estimation of hourly incoming solar radiation on the surface of Bangladesh using NOAA-AVHRR satellite digital images. The model is based on the statistical regressions between the ground truth and satellite estimated values. Hundreds of full resolution images (1.1 km) for two months of the year have been processed using ERDAS IMAGINE software. Ground solar global irradiation for one place has been estimated for two months through this application. The efficiency of this method for calculating surface insolation has been checked by estimating the relative deviation between the estimated Irradiation and measured Irradiation. The method can be used for calculation of hourly irradiation over areas in a tropical environment.

Бесплатно

A Simulation Based Performance Comparison of AODV and DSDV Mobile Ad Hoc Networks

A Simulation Based Performance Comparison of AODV and DSDV Mobile Ad Hoc Networks

Subhrananda Goswami, Subhankar Joardar, Chandan Bikash Das, Barun Das

Статья научная

Mobile Ad hoc Network (MANET) is formed by a group of autonomous mobile nodes connected by wireless links, in which there is no backbone infrastructure. In this work, an attempt has been made to understand the characteristics/behavior of Ad hoc On Demand Distance Vector (AODV) and Destination Sequence Distance Vector (DSDV) routing protocols when operating in more challenging environment such as frequent change in network topology and node density. The performance differentials are analyzed using throughput, Packet Delivery Ratio and normalized routing load which shall provide an insight about the sensitivity of the protocols under consideration when exposed in more challenging environment. Simulation based analysis of the protocols have been done using NS-2.

Бесплатно

A Study and Critical Survey on Service Reusability Metrics

A Study and Critical Survey on Service Reusability Metrics

T. Karthikeyan, J. Geetha

Статья научная

The software productivity and quality can be improved by the systematic reuse of software. Reuse and reusability are the two important factors in the software development. Reusability is a prime principle in service oriented architecture. For realizing the reuse of service, the adequacy of ability of service reuse should be properly quantified. The quantification of reuse needs a suite of metrics and many metrics are also available. Each research and publication focuses on different qualities of service to propose a set of metrics for service reusability. This paper studies the service reusability to understand the concept and survey the reusability metrics. The purpose of the paper is exploring the available service reusability metrics for further research.

Бесплатно

A Study on Semantic Searching, Semantic Search Engines and Technologies Used for Semantic Search Engines

A Study on Semantic Searching, Semantic Search Engines and Technologies Used for Semantic Search Engines

Junaid Rashid, Muhammad Wasif Nisar

Статья научная

Semantic search engines(SSE) are more efficient than other web engines because in this era of busy life everyone wants an exact answer to his question which only semantic engines can provide. The immense increase in the volume of data, traditional search engines has increased the number of answers to satisfy the user. This creates the problem to search for the desired answer. To solve this problem, the trend of developing semantic search engines is increasing day by day. Semantic search engines work to extract the best answer of user queries which exactly fits with it. Traditional search engines are keyword based which means that they do not know the meaning of the words which we type in our queries. Due to this reason, the semantic search engines super pass the conventional search engines because they give us meaningful and well-defined information. In this paper, we will discuss the background of Semantic searching, about semantic search engines; the technology used for the semantic search engines and some of the existing semantic search engines on various factors are compared.

Бесплатно

A Survey Based Study on Fog Computing Awareness

A Survey Based Study on Fog Computing Awareness

Zainab Javed, Waqas Mahmood

Статья научная

In this day and age, the rise in technological advancements has the potential to improve and transform our lives every day. The rapid technology innovation can have a great impact on our business operations. Currently, Cloud computing services are popular and offer a wide range of opportunities for their customers. This paper presents a survey on a more recent computing architecture paradigm known as Fog Computing. Fog networking is a beneficial solution that offers the greater facility of data storage, enhanced computing, and networking resources. This new concept of fog complements cloud solution by facilitating its customers with better security, real-time analysis improved efficiency. To get a clear picture and understanding of how fog computing functions, we have performed an extensive literature review. We also presented a comparative study of fog computing with cloud and grid computing architectures. In this study, we have conducted a survey that led us to the conclusion that fog computing solution is still not applicable and implemented in most of the IoT industries due to the lack of awareness and the high architecture’s cost. Results of the study also indicate that optimized data storage and security are a few of the factors that can motivate organizations to implement the Fog computing architecture. Furthermore, the challenges related to fog computing solution are reviewed for progressive developments in the future.

Бесплатно

A Survey On Emotion Classification From Eeg Signal Using Various Techniques and Performance Analysis

A Survey On Emotion Classification From Eeg Signal Using Various Techniques and Performance Analysis

M. Sreeshakthy, J. Preethi, A. Dhilipan

Статья научная

In this paper, the human emotions are analyzed from EEG Signal (Electroencephalogram) with different kinds of situation. Emotions are very important in different activity and decision making. Various feature extraction techniques like discrete wavelet transform, Higher Order crossings, Independent component analysis is used to extract the particular features. Those features are used to classify the emotions with different groups like arousal and valence level using different classification techniques like Neural networks, Support vector machine etc.. Based on these emotion groups analyze the performance and accuracy for the classification are determined.

Бесплатно

A Survey of Catadioptric Omnidirectional Camera Calibration

A Survey of Catadioptric Omnidirectional Camera Calibration

Yan Zhang, Lina Zhao, Wanbao Hu

Статья научная

For dozen years, computer vision becomes more popular, in which omnidirectional camera has a larger field of view and widely been used in many fields, such as: robot navigation, visual surveillance, virtual reality, three-dimensional reconstruction, and so on. Camera calibration is an essential step to obtain three-dimensional geometric information from a two-dimensional image. Meanwhile, the omnidirectional camera image has catadioptric distortion, which need to be corrected in many applications, thus the study of such camera calibration method has important theoretical significance and practical applications. This paper firstly introduces the research status of catadioptric omnidirectional imaging system; then the image formation process of catadioptric omnidirectional imaging system has been given; finally a simple classification of omnidirectional imaging method is given, and we discussed the advantages and disadvantages of these methods.

Бесплатно

A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks

A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks

M.Barveen Banu, P.Periyasamy

Статья научная

A MANET (Mobile Ad hoc NETwork) is an interconnection of mobile devices by wireless links forming a dynamic topology without much physical network infrastructure such as routers, servers, access points/cables or centralized administration. Routing is a mechanism of exchanging data between the source node and the destination node. Several protocols are used to perform routing the information from the source node to the destination node. The main aim of this paper is to explore the working principles of each unipath routing protocol. The unipath routing protocols are divided into Table-Driven (Proactive), On-demand (Reactive), Hybrid routing protocols.

Бесплатно

A Survey on Current Repertoire for 5G

A Survey on Current Repertoire for 5G

Muhammad Aamir Nadeem, Muhammad Anwaar Saeed, Imran Ali Khan

Статья научная

Cellular technology progressed miraculously in the last decade. It has redefined communication paradigm. Statistics provided by Ericson and Cisco show the number of mobile connected devices will reach figures of 9.2 billion and 11.6 billion respectively by 2020. Overall connected devices will surpass 50 billion then. Extremely higher data rates, zero latency, massively scalable, connecting everything anywhere is what that 5G promises. To meet such ambitious goals which apparently seems challenging, the tools and technologies that mobile communication has in its repertoire and what it needs more either enhancement in existing solutions or new solution or joint venture of both, is a question that demands an answer. To realize 5G, evolution and revolution both approaches are being employed. Evolution seeks enhancements in existing technologies while revolution looks for new innovations and technologies. Extension in frequency spectrum, network densification, MIMO, carrier aggregation, Centralized-RAN, HetNets, and Network Functionality Virtualization are the key enablers. This paper disseminates information about ongoing research and development of 5G.

Бесплатно

A Survey on Fault Tolerant Multi Agent System

A Survey on Fault Tolerant Multi Agent System

Yasir Arfat, Fathy Elbouraey Eassa

Статья научная

A multi-agent system (MAS) is formed by a number of agents connected together to achieve the desired goals specified by the design. Usually in a multi agent system, agents work on behalf of a user to accomplish given goals. In MAS co-ordination, co-operation, negotiation and communication are important aspects to achieve fault tolerance in MAS. The multi-agent system is likely to fail in a distributed environment and as an outcome of such, the resources for MAS may not be available due to the failure of an agent, machine crashes, process failure, software failure, communication failure and/or hardware failure. Therefore, many researchers have proposed fault tolerance approaches to overcome the failure in MAS. So we have surveyed these approaches in this paper, whereby our contribution is threefold. Firstly, we have provided taxonomy of faults and techniques in MAS. Secondly, we have provided a qualitative comparison of existing fault tolerance approaches. Thirdly, we have provided an evaluation of existing fault tolerance techniques. Results show that most of the existing schemes are not very efficient, due to various reasons like high computation costs, costly replication and large communication overheads.

Бесплатно

A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline

A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline

Akshay Dilip Lahe, Guddi Singh

Статья научная

In recent years, Machine learning is being used in various systems in wide variety of applications like Healthcare, Image processing, Computer Vision, Classifications, etc. Machine learning algorithms have shown that it can solve complex problem-solving capabilities close to humans or beyond humans as well. But recent studies show that Machine Learning Algorithms and models are vulnerable to various attacks which compromise security the systems. These attacks are hard to detect because they can hide in data at various stages of machine learning pipeline without being detected. This survey aims to analyse various security attacks on machine learning and categorize them depending on position of attacks in machine learning pipeline. This paper will focus on all aspects of machine learning security at various stages from training phase to testing phase instead of focusing on one type of security attack. Machine Learning pipeline, Attacker’s goals, Attacker’s knowledge, attacks on specified applications are considered in this paper. This paper also presented future scope of research of security attacks in machine learning. In this Survey paper, we concluded that Machine Learning Pipeline itself is vulnerable to different attacks so there is need to build a secure and robust Machine Learning Pipeline. Our survey has categorized these security attacks in details with respect to ML Pipeline stages.

Бесплатно

A Swarm Intelligence Based Model for Mobile Cloud Computing

A Swarm Intelligence Based Model for Mobile Cloud Computing

Ahmed S. Salama

Статья научная

Mobile Computing (MC) provides multi services and a lot of advantages for millions of users across the world over the internet. Millions of business customers have leveraged cloud computing services through mobile devices to get what is called Mobile Cloud Computing (MCC). MCC aims at using cloud computing techniques for storage and processing of data on mobile devices, thereby reducing their limitations. This paper proposes architecture for a Swarm Intelligence Based Mobile Cloud Computing Model (SIBMCCM). A model that uses a proposed Parallel Particle Swarm Optimization (PPSO) algorithm to enhance the access time for the mobile cloud computing services which support different E Commerce models and to better secure the communication through the mobile cloud and the mobile commerce transactions.

Бесплатно

Журнал