International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 4, No. 8, Jul. 2012

Cover page and Table of Contents: PDF (size: 142KB)

Table Of Contents

REGULAR PAPERS

A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio

By Ila Sharma G. Singh

DOI: https://doi.org/10.5815/ijitcs.2012.08.01, Pub. Date: 8 Jul. 2012

In this paper, we have proposed a novel approach using Fuzzy Logic System (FLS) for the potential management of the spectrum access. We have used four descriptors such as spectrum utilization efficiency of the secondary user, mobility, distance of the primary user, and signal strengths of the secondary users. On the basis of these descriptors, there are 81 fuzzy rules have been setup, which are based on the linguistic knowledge. The output of the FLS provide the possibility of accessing spectrum band for secondary users and the user with the greatest possibility has to assigned the available spectrum band.

[...] Read more.
Trends, Issues and Challenges Concerning Spam Mails

By Jitendra Nath Shrivastava Maringanti Hima Bindu

DOI: https://doi.org/10.5815/ijitcs.2012.08.02, Pub. Date: 8 Jul. 2012

Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone’s life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the recipients’. The entire internet community pays the price, every time there pops a spam mail. Online privacy of the users is compromised when spam disturbs a network by crashing mail servers and filling up hard disks. Servers classified as spam sites are forfeited from sending mails to the recipients’. This paper gives the broader view of spam, issues challenges and statistical losses occurred on account of spams.

[...] Read more.
Genomic Analysis and Classification of Exon and Intron Sequences Using DNA Numerical Mapping Techniques

By Mohammed Abo-Zahhad Abo-Zeid Sabah M. Ahmed Shimaa A. Abd-Elrahman

DOI: https://doi.org/10.5815/ijitcs.2012.08.03, Pub. Date: 8 Jul. 2012

Using digital signal processing in genomic field is a key of solving most problems in this area such as prediction of gene locations in a genomic sequence and identifying the defect regions in DNA sequence. It is found that, using DSP is possible only if the symbol sequences are mapped into numbers. In literature many techniques have been developed for numerical representation of DNA sequences. They can be classified into two types, Fixed Mapping (FM) and Physico Chemical Property Based Mapping (PCPBM (. The open question is that, which one of these numerical representation techniques is to be used? The answer to this question needs understanding these numerical representations considering the fact that each mapping depends on a particular application. This paper explains this answer and introduces comparison between these techniques in terms of their precision in exon and intron classification. Simulations are carried out using short sequences of the human genome (GRch37/hg19). The final results indicate that the classification performance is a function of the numerical representation method.

[...] Read more.
Offline Handwritten Devanagari Script Recognition

By Ved Prakash Agnihotri

DOI: https://doi.org/10.5815/ijitcs.2012.08.04, Pub. Date: 8 Jul. 2012

Handwritten Devanagari script recognition system using neural network is presented in this paper. Diagonal based feature extraction is used for extracting features of the handwritten Devanagari script. After that these feature of each character image is converted into chromosome bit string of length 378. More than 1000 sample is used for training and testing purpose in this proposed work. It is attempted to use the power of genetic algorithm to recognize the character. In step-I preprocessing on the character image, then image suitable for feature extraction as here is used. Diagonal based feature extraction method to extract 54 features to each character. In the next step character recognize image in which extracted feature in converted into Chromosome bit string of size 378. In recognition step using fitness function in which find the Chromosome difference between unknown character and Chromosome which are store in data base.

[...] Read more.
Empirical Estimation of Hybrid Model: A Controlled Case Study

By Sadaf Un Nisa M. Rizwan Jameel Qureshi

DOI: https://doi.org/10.5815/ijitcs.2012.08.05, Pub. Date: 8 Jul. 2012

Scrum and Extreme Programming (XP) are frequently used models among all agile models whereas Rational Unified Process (RUP) is one of the widely used conventional plan driven software development models. The agile and plan driven approaches both have their own strengths and weaknesses. Although RUP model has certain drawbacks, such as tendency to be over budgeted, slow in adaptation to rapidly changing requirements and reputation of being impractical for small and fast paced projects. XP model has certain drawbacks such as weak documentation and poor performance for medium and large development projects. XP has a concrete set of engineering practices that emphasizes on team work where managers, customers and developers are all equal partners in collaborative teams. Scrum is more concerned with the project management. It has seven practices namely Scrum Master, Scrum teams, Product Backlog, Sprint, Sprint Planning Meeting, Daily Scrum Meeting and Sprint Review. Keeping above mentioned context in view, this paper intends to propose a hybrid model naming SPRUP model by combining strengths of Scrum, XP and RUP by eliminating their weaknesses to produce high quality software. The proposed SPRUP model is validated through a controlled case study.

[...] Read more.
Performance of Linear Block Coding for Multipath Fading Channel

By Hemlata Sinha M.R. Meshram G.R. Sinha

DOI: https://doi.org/10.5815/ijitcs.2012.08.06, Pub. Date: 8 Jul. 2012

This paper deals with the performance of linear block codes which provide a new paradigm for transmission over multipath fading channels. Multi path channel fading is the main enemy for any wireless communications system. Therefore, for any novel approach applied at any wireless communication system, its efficiency is measured according to its ability of mitigating the distortion caused by fading. It causes time dispersion to the transmitted symbols resulting in inter symbol interference (ISI). ISI inter symbol interference problem is a major impairment of the wireless communication channel. To mitigate the ISI problem and to have reliable communications in wireless channel, channel equalizer and channel coding technique is often employed. In this paper the BER (Bit Error Rate) performance is shown from analytically and by means of simulation for multipath dispersive channels. We have designed a channel equalizer using MLSE (Viterbi algorithm) in this paper for such a multipath channel (introducing inter symbol interferences) with BPSK modulation based on the assumption that the channel can be perfectly estimated at the receiver. Obviously the performance of channel coding in terms of BER is better than uncoded channel.

[...] Read more.
Doppler Shift Impact On The MIMO OFDM System In Vehicular Channel Condition

By Samarendra Nath Sur Rabindranath Bera

DOI: https://doi.org/10.5815/ijitcs.2012.08.07, Pub. Date: 8 Jul. 2012

Vehicle-to-vehicle (V2V) communication systems will play an important role in intelligent transportation systems (ITS). But in high mobility road condition, orthogonal frequency division multiplexing (OFDM) is very sensitive to Doppler shift. In this scenario multiple input and multiple output (MIMO) system combined with OFDM, make MIMO -OFDM techniques very attractive and productive for vehicle-to-vehicle communications. This paper deals with the bit error rate (BER) performance analysis of MIMO-OFDM system in high way road condition which is modeled based on the Nakagami fading characteristic. The system performance is analyzed with the change in m value of Nakagami channel and also with the variation in the modulation schemes.

[...] Read more.
Using Negative Binomial Regression Analysis to Predict Software Faults: A Study of Apache Ant

By Liguo Yu

DOI: https://doi.org/10.5815/ijitcs.2012.08.08, Pub. Date: 8 Jul. 2012

Negative binomial regression has been proposed as an approach to predicting fault-prone software modules. However, little work has been reported to study the strength, weakness, and applicability of this method. In this paper, we present a deep study to investigate the effectiveness of using negative binomial regression to predict fault-prone software modules under two different conditions, self-assessment and forward assessment. The performance of negative binomial regression model is also compared with another popular fault prediction model—binary logistic regression method. The study is performed on six versions of an open-source objected-oriented project, Apache Ant. The study shows (1) the performance of forward assessment is better than or at least as same as the performance of self-assessment; (2) in predicting fault-prone modules, negative binomial regression model could not outperform binary logistic regression model; and (3) negative binomial regression is effective in predicting multiple errors in one module.

[...] Read more.