International Journal of Information Engineering and Electronic Business (IJIEEB)

IJIEEB Vol. 5, No. 3, Sep. 2013

Cover page and Table of Contents: PDF (size: 134KB)

Table Of Contents

REGULAR PAPERS

A Framework for an E-government Based on Service Oriented Architecture for Jordan

By Zakaria I. Saleh Rand A. Obeidat Yaser Khamayseh

DOI: https://doi.org/10.5815/ijieeb.2013.03.01, Pub. Date: 8 Sep. 2013

E-government is growing to a size that requires full attention from governments and demands collaboration and facilitation between private sectors and Non-Government Organizations (NGOs). In order to reach successful e-government applications, governments have to provide services to citizens, businesses and government agencies. In Jordan, e-government applications are limited to an informative goal; they essentially offer information and no services. Moreover, it is found that the traditional peer-to-peer integration of applications will result in a tightly coupled system that reduces the agility and expansibility of the E-Government system. This paper proposes a novel integration mechanism based on the web service of the Service Oriented Architecture (SOA) for the various E-government systems. We propose a stage model for E-Government interoperability based on Service Oriented Architecture (SOA). In addition, a framework for E-government based on SOA is proposed. The proposed architectures are being examined using case study in the context of implementing environmental license web service in the Jordanian ministry of environment.

[...] Read more.
Effect of Four Wave Mixing on AP-DCDM-WDM Fiber Optic System with Different Power per Channel

By Farman Ullah Aamir Khan Nadia N Qadri Muhammad Masood Sarfraz

DOI: https://doi.org/10.5815/ijieeb.2013.03.02, Pub. Date: 8 Sep. 2013

Absolute polar duty cycle division multiplexing over WDM is a multiplexing technique which promises better spectral efficiency. Non linearities in fiber optic communication are major issues, especially the effect of four wave mixing. This paper presents the effect of four wave mixing on 40 Gbps AP-DCDM over WDM fiber optic systems. The system was tested by simulating the AP-DCDM-WDM design in Optisystem software and MATLAB code. From the results the effect of four wave mixing on the system is presented under different configurations such as input power per channel. Simulation results have shown that AP-DCDM-WDM systems have greater tolerance to dispersion and have better receiver sensitivity than other conventional techniques. The effect of FWM on AP-DCDM-WDM system is also less than on other conventional techniques on basis of simulation.

[...] Read more.
Theory of Fuzzy Sets: An Overview

By Mamoni Dhar Hemanta. K. Baruah

DOI: https://doi.org/10.5815/ijieeb.2013.03.03, Pub. Date: 8 Sep. 2013

In this article, we would like to revisit and comment on the definition of complementation of fuzzy sets and also on some of the theories and formulas associated with this. Furthermore, the existing probability-possibility consistency principles are also revisited and related results are viewed from the standpoint of the Randomness-Fuzziness consistency principles. It is found that the existing definition of complementation as well as the probability – possibility consistency principles is not well defined. Consequently the results obtained from these would be inappropriate from our standpoints. Hence we would like to suggest some new definitions for some of the terms often used in the theory of fuzzy sets whenever possible.

[...] Read more.
Power Aware Reliable Virtual Machine Coordinator Election Algorithm in Service Oriented Systems

By Danial Rahdari Mahdi Golmohammadi Abas Pirmoradi

DOI: https://doi.org/10.5815/ijieeb.2013.03.04, Pub. Date: 8 Sep. 2013

Service oriented systems such as cloud computing are emerging widely even in people’s daily life due to its magnificent advantages for enterprise and clients. However these computing paradigms are challenged in many aspects such as power usage, availability, reliability and especially security. Hence a central controller existence is crucial in order to coordinate Virtual Machines (VM) placed on physical resources. In this paper an algorithm is proposed to elect this controller among various VM which is able to tolerate multiple numbers of faults in the system and reduce power usage as well. Moreover the algorithm exchanges dramatically fewer messages than other relevant proposed algorithms.

[...] Read more.
Ergodic Capacity of MIMO Channel in Multipath Fading Environment

By Rafik Ahmad Devesh Pratap Singh Mitali Singh

DOI: https://doi.org/10.5815/ijieeb.2013.03.05, Pub. Date: 8 Sep. 2013

The demand for the higher bandwidth is continuously increasing, and to cater to wireless communication can be used. The bandwidth has a close relationship with data-rates in turn has a dependency with channel capacity. In this paper, the channel capacity is estimated when CSI is known/not known at the transmitter and it has been shown that the knowledge of the CSI at the transmitter may not be very useful. The channel capacity for the random MIMO channels is also estimated through simulation and outage capacity is discussed. Finally, MIMO channel capacity in the presence of antenna correlation effect is estimated and obtained results are discussed.

[...] Read more.
Security Challenges and Attacks in Mobile Ad Hoc Networks

By CH. V. Raghavendran G. Naga Satish P. Suresh Varma

DOI: https://doi.org/10.5815/ijieeb.2013.03.06, Pub. Date: 8 Sep. 2013

Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

[...] Read more.
Speech Compression Based on Discrete Walsh Hadamard Transform

By Noureddine Aloui Souha Bousselmi Adnane Cherif

DOI: https://doi.org/10.5815/ijieeb.2013.03.07, Pub. Date: 8 Sep. 2013

This paper presents a new lossy compression algorithm for stationary signal based on Discrete Walsh Hadamard Transform (DWHT). The principle of compression algorithm consists in framing the original speech signal into stationary frames and applying the DWHT. Then, the obtained coefficients are thresholded in order to truncate all coefficients below a given thresholds values. Compression is achieved by efficient encoding of the string values of zeros. A comparative study of performance between the algorithms based on DWHT and Discrete Wavelet Transform (DWT) is performed in terms of some objective criteria: compression ratio (CR), signal to noise ratio, peak signal to noise ratio (SNR), normalized root mean square error (NRMSE) and CPU time. The simulation results show that the algorithm based on DWHT is characterized by a very low complexity implementation and improved CR, SNR, PSNR and NRMSE compared to the DWT algorithm and this for stationary frame.

[...] Read more.
Design Computed Torque Controller with Parallel Fuzzy Inference System Compensator to Control of Robot Manipulator

By Arman Jahed Farzin Piltan Hossein Rezaie Bamdad Boroomand

DOI: https://doi.org/10.5815/ijieeb.2013.03.08, Pub. Date: 8 Sep. 2013

Computed torque controller (CTC) is a significant nonlinear controller under condition of partly uncertain dynamic parameters of system. This controller is used to control of highly nonlinear systems especially for robot manipulators, because this controller is a robust and stable. Conversely, computed torque controller is used in many applications; it has an important drawback namely; nonlinear equivalent dynamic formulation in uncertain dynamic parameter. The nonlinear equivalent dynamic formulation problem in uncertain system can be solved by using artificial intelligence theorem. However fuzzy logic controller is used to control complicated nonlinear dynamic systems, but it cannot guarantee stability and robustness. In this research parallel fuzzy logic theory is used to compensate the system dynamic uncertainty in computed torque controller.

[...] Read more.