Documente Academic
Documente Profesional
Documente Cultură
Analytical Hierarchy Process Based Framework for Modelling Preferences and Priorities in
Requirements .................................................................................................................................... 1
R.Subha and S.Palaniswami
Wireless Solution for Water Saving In Agriculture Using Embedded System ......................................... 1
Venkata Narayana Eluri, K. Madhusudhana Rao and A. Srinag
Wireless Solution for Water Saving In Agriculture Using Embedded System ........................................ 1
Venkata Narayana Eluri, K. Madhusudhana Rao and A. Srinag
A Multi-parametric based W-PAC Mechanism in Ad Hoc Network using IPv6 and IPv4 Address ............ 1
S. Thirumurugan and Dr. E. George Dharma Prakash Raj
IJCSBI.ORG
S.Palaniswami
Principal,
Government College of Engineering,
Bodinayakanur, Tamil Nadu, India
ABSTRACT
Requirements engineering is a software engineering process which covers all the activities
involved in discovering, documenting and maintaining a set of requirements for a
computer-based system. The priorities that stakeholders associate with requirements may
vary from stakeholder to stakeholder. Different priorities imply different design decisions
for the system. So there must be a model to support the representation of preference in
requirements. In this paper we develop a framework to model alternative solutions for
mandatory goals and preferred goals based on priorities. A framework is created for
specifying preferences and priorities among requirements. The priorities among the
preferences are analysed by Analytical Hierarchy Process method (AHP). AHPs pair wise
comparison method is used to assess the relative value of the candidate requirements. The
preferences are analysed based on the prioritization of each task and a definite plan is
generated to view all those tasks according to priority.
Keywords
Requirements Engineering, Preference Goals, Priorities, Goal oriented frame work,
Analytic Hierarchy Process.
1. INTRODUCTION
Software engineering is a modelling activity in which, software engineers
deal with complexity through modelling by focusing at anytime, only the
relevant details and ignoring everything else. Software Engineering
encompasses all the life cycle activities of a project associated with
understanding a products necessary capabilities and attributes.
Requirements Engineering (RE) is the process of establishing the services
that the customer requires from a system and the constraints under which it
IJCSBI.ORG
operates and is developed. It may range from a high-level abstract statement
of a service or a system constraint to a detailed mathematical functional
specification. Requirements engineering acts as a bridge between the real-
world needs of users, customers and other constituencies affected by the
software system and the capabilities and opportunities afforded by software-
intensive technologies.
Preference goals are the goals that are chosen by the stakeholder, but it will
not always be in the same degree of desirability [1]. Sometimes preference
goals are considered as those goals which help other goals benefit from it.
For instance, in the book shop details example, we may opt to accomplish
the book order through a payment approach which is undesirable for the
customere.g., money orderbut still we favour the solution because, an
alternate goal may be suitable, say to maintain robust legal documents.
Such goals are represented as preferences or preference goals.
IJCSBI.ORG
(e.g., personal preference, business value, cost of implementation, and risk).
Based on the priorities we develop a goal model to reveal better solutions of
goals that are mandatory and goals that are preferred. The priorities and
preferences among requirements are specified by creating a framework. A
Goal Model is a key aspect of Requirements Engineering that may be used
in Stakeholder analysis, Context analysis, and Scenario more evidently.
Through acute cooperation of actors in the predestined software a system
should acquire the targets that are goals. The tradeoffs between cost,
performance, flexibility, security and other goals can be located and quickly
resolved by utilizing goal modelling. Aberrant interests between
stakeholders are also revealed using goal modelling. Goal modelling can
spot conflicts when interference occurs among the goals. Goal modelling
empowers requirement completeness to be measured. If all the goals in the
goal model are attained the requirements can be considered to be complete.
The rest of the paper is organized as follows. In Sect. 2, we present the goal
and the preference goal and assign certain priorities to those goals by AHP
method. Then, in Sect. 3, we take a look at related literature. In Sect. 4, we
have various methodologies to support the goal oriented framework In Sect.
5, we discuss the performance of the proposed reasoning task and conclude
it in Sect. 6.
2. RELATED WORKS
Earlier, in modeling and analysis only the preferences of the goals were
considered for analysis and the priorities for the preferences were expelled.
Technes perspective showcased the RE process which was involved in
describing requirements problems and comparing the candidate solutions at
an early stage. Object-orientation, predicates, temporal constraints, and task
sequencing are missing since they contribute to the detailed solution of the
chosen candidate solution [3]. Techne precedes and complements RMLs for
detailed specification which does include such features. In the course of
IJCSBI.ORG
these phases, the requirements problem for the system-to-be is being
structured and its candidate solutions are described and compared, based on
their desirability to the stakeholders.
In customization technique the preferences are not taken into account and
the software is developed according to the customers individual
requirements. Software needs to support customization at a much finer-rate.
Software assists people to live their lives despite disabilities, constitute a
significant class of applications where greater degree of customization is
essential [3]. This paper proposes a framework that supports the design of
highly customizable software by adopting goal-oriented analysis techniques.
The working of this framework can be demonstrated with a simple example
involving the design of a customizable email system.
Different design decisions for the system crop up due to varying priorities.
So we need to introduce a framework to specify both the preference
requirements and priorities in order to fulfil the mandatory requirements.
This enhances the extension of a traditional goal modelling notation to
support the representation of optional and preference requirements [5]. In
our extension, optional goals are marked off from the mandatory ones.
Later, quantitative prioritizations of the former are constructed and used as a
criterion for evaluating alternative ways to achieve the latter. In
Requirements Engineering (RE), goal-oriented techniques assist as to what
the stakeholders wants (goals) and the means (actions/tasks/plans) by which
these goals can be achieved, thereby gaining noticeable attention.
IJCSBI.ORG
information that has to be represented in RE languages and to determine if
the RE has gone into a favourable completion.
The existing system has goals that are modelled by intrinsic features such as
their type and attributes, and by their links to other goals and two other
elements of a requirements model. The modelling and reasoning about
preferences for stakeholders in the presence of mandatory goals remains
largely unexplored. Goal-oriented techniques in requirements engineering
have a unique way to keep one going between stakeholders wants (goals)
and the means (actions/tasks/plans) to achieve goals [1]. The current goal-
oriented modelling frameworks treat goals as mandatory requirements that
must be fulfilled by any proposed solution. In this respect, such frameworks
cannot accommodate reference (nice-to-have) requirements that might be
posed by stakeholders.
3. METHODOLOGY
3.1 Construction of a Goal Model
Goals are targets that are earned through acute cooperation of actors in the
predestined software. Initial phase of a project is best suited for goal
modeling. The relationships between a system and its environment are
expressed [7]. Goal models are effective in capturing large numbers of
alternative sets of low- level tasks, operations, and configurations that can
fulfil high-level stakeholder requirements.This module contains basic task
and the goals that are represented using GR Tool which is the goal
reasoning tool.
The GR-Tool is graphical tool that is employed to draw goal models and run
the algorithms and tools for forward and backward reasoning [8]. The
tradeoffs between cost, performance, flexibility, security and other goals can
be located and quickly resolved by utilizing goal modelling. It expresses the
relationships between a system and its environment. Goal models have been
found to be effective in concisely capturing large numbers of alternative sets
of low-level tasks, operations, and configurations that can fulfil high-level
stakeholder requirements. The algorithms for the forward reasoning have
been fully developed in java and are embedded in the GR-Tool. Tasks are
represented in hexagonal shapes and goals are in oval shapes. Goals and
tasks are connected with each other using AND- and OR-decompositions. A
goal model based on a book shop detail is shown in Figure 1.
IJCSBI.ORG
IJCSBI.ORG
If the goal is OR-decomposed into other goals or tasks, then one of these
goals or tasks should satisfy the parent goal. Preference goals are the goals
that are inclined by the stakeholder.The set of goals and its decomposition is
given below.
Table 2. Set of goals
Goals Decomposition
manage internet OR
searching
internet querying OR
catalogue consulting OR
taking detail of AND
transaction
date & time AND
member name AND
select item OR
pick available item OR
pre non ordered item OR
shopping cart AND
add item AND
check out AND
select item AND
get identification AND
details
But the same degree of desirability will not be maintained. Sometimes
preference goals are considered as those goals which help other goals to
benefit from them. Prioritizing requirements is the requirements task of
determining the implementation order of the requirements in an incremental
and iterative development cycle.
The outcome is more likely to be satisfied when the means for analysing and
evaluating the alternatives are more efficient [3]. The Analytic Hierarchy
Process compares alternatives in a stepwise fashion and measures their
contribution systematically to take decisions.
IJCSBI.ORG
To what extent an aspect dominates another with respect to a given attribute
is featured by comparing a scale of absolute judgements. The judgements
may be inconsistent. A method to measure inconsistency and improve the
judgements and the possibility of obtaining a better consistency is a concern
of the AHP. In AHP method,
Information is decomposed into a hierarchy of alternatives and
criteria.
Information is then synthesized to determine relative ranking of
alternatives.
Both qualitative and quantitative information can be compared using
informed judgments to derive weights and priorities.
Preference goals
Whole book details
Not take same book
Arrange book by
volume
Arrange books
Printed robust legal
document
Provides steps to user
Fear internet fraud
Secure form
Standard form
In order to derive weights and priorities both qualitative and quantitative
information are compared using informed judgments. The alternative
solution can be found by taking the goals and task based on AND, OR
decomposition. Each task is prioritized and based on the prioritys task the
goals may be compared .The goal which has the greatest priority may be
considered to be the first and the alternative solution is found out. The
IJCSBI.ORG
priorities of goals are calculated by using values in the relative intensity
table.
Algorithm
Calculation of priority among goals
Input: Set of goals based on the preference
Method: Analytical Hierarchy Process
Step 1: Set up n goals in the rows and columns of an n * n matrix.
Step 2: Perform pair wise comparisons of the entire goal according
to the criterion.
Step 3: Use averaging over normalized columns to estimate the
Eigen values of the matrix.
Step 4: Assign to each goal, its relative value based on the estimated
Eigen values.
Output: Plan is generated based on the priorities calculated, and the
tasks connected to each goal are listed. The relative intensity table
is given below on which priorities between requirements is taken
on the basis of the relative intensity
5 Essential or strong value Experience strongly favours one goal over another
IJCSBI.ORG
3.5 Reasoning about preferences
Here, based on the priorities, a model is constructed and preferred plans are
organized. Ordered sequences known as plans are considered as alternative
solutions. The sequence of leaf-level tasks that altogether satisfy the
AND/OR structure of the fundamental goal is the plan for the fundamental
goal. The priorities may be listed as probabilistic values. To render solutions
to goal requirements problems a plan is essential [3]. Solutions in goal
models are specified as configurations of tasks with no dependencies.
Without specifying the system dynamics the stakeholders requirements can
be modelled and solutions to requirements can be determined using
automated constraint solvers. Thus a set of tasks are contained in the plan
that is generated.
IJCSBI.ORG
5. CONCLUSION
The effort of reasoning, about preferences gives better understanding of the
connection between the stakeholder attitudes and is used to generate a plan
which consists of set of tasks based on preferences. The priorities among
preference goals are defined by the priority specification through the
assignment of numerical weights. A goal model is developed to recognize
alternative solutions of mandatory goals and preferred goals based on
priorities. The priority among the requirements is calculated using
Analytical Hierarchy Process. AHPs pair wise comparison method is used
to assess the relative value of the candidate requirements. The preferences
are analysed based on the prioritization of each task and a definite plan is
generated to view all those tasks according to priority.
6. REFERENCES
[1] Mussbacher G, Amyot D, Araujo Ja, Moreira A, Modelling software product lines
with AoURN, Proc. EA 08, vol 2, pp 12 (8), 2008
[2] Jureta IJ, Borgida A, Ernst NA, Mylopoulos J, Techne, Towards a new generation of
requirements modelling languages with goals, preferences, and inconsistency
handling, Proc of the 18th IEEE RE10, Sydney, Australia, pp 115124, 2010
[3] Giorgini P, Mylopoulos J, Nicchiarelli E, Sebastiani R, Reasoning with goal models,
Proc. ER02, London, UK, pp 167181,2002
[4] Sotirios Liaskos , Sheila A. McIlraith, Shirin Sohrabi, John Mylopoulos,Representing
and Reasoning About Preferences, Springer-Verlag., Vol 16, pp 227- 249, Aug 2011.
[5] Liaskos S, Lapouchnian A, Yu Y, Yu E, Mylopoulos J, On goal-based variability
acquisition and analysis, Proc.RE06, IEEE Computer Society, Minneapolis, pp 79
88, 2006
[6] Azar J, Smith RK, Cords D Value-oriented requirements prioritization in a small
development organization. IEEE Software 24:3237, (2007)
[7] Avesani P, Bazzanella C, Perini A, Susi A, Facing scalability issues in requirements
prioritization with machine learning techniques, Proc (RE05), pp 297305, 2005
[8] Liaskos S, Litoiu M, Jungblut MD, Mylopoulos J Goal Based behavioral
customization of information system, Proc. CAiSE11, London, UK., 2011
[9] Van Lamsweerde A, Requirements Engineering in the year00: a research
perspective, Proc. ICSE00, pp 5-19, 2000
[10] Saaty RW, The analytic hierarchy processwhat it is and how it is used Math
Model 9(3-5): 16117, 1987.
IJCSBI.ORG
Youakim Badr
INSA LYON, France
Mahmoud Rammal
Legal Law Center Lebanese University
Sin-Fil, Lebanon
ABSTRACT
Extracting information from plain text and restructuring them into relational databases raise
a challenge as how to locate relevant information and update database records accordingly.
In this paper, we propose a wrapper to efficiently extract information from unstructured
documents, containing plain text expressed with natural-like language. Our extraction
approach is based on the automata formalism to describe the wrapping process running
from text documents to Databases. As usual, relevant information in the text document are
delimited by regular expressions, which define the extracting automaton. Each automaton is
enriched by an output function that automatically generates SQL queries synchronized with
the extracting process in order to insert extracted data into database records. We validate
our extraction approach with automaton-based prototype to extract legal information about
Lebanese official journal decrees and automatically insert them into a relational database.
Keywords
Wrappers, Regular Expressions, Automata, SQL Language, XML.
1. INTRODUCTION
Several approaches to generating wrappers have been introduced in the
literature to extract information from structured, semi-structured and
unstructured documents.
In [2], the authors create wrappers for XML Paragraph-Centric. The
extraction patterns are expressed with regular expressions and translated
into automata. The automata then carry out the information extraction and
produce tuples of values. In [1], the extraction system is based on two
automata. The first automaton decomposes grammatically the given text
into noun groups, verbs groups and others words groups. On the other hand,
IJCSBI.ORG
the extraction patterns are encoded into a recognizing patterns automaton
that takes as input all the preceding groups and produces the resulting
entries. In [4], the system runs in two phases, the learning and the testing
phases. The learning phase produces the lexical pattern rules based on a
training collection of reports. The testing phase has three components a
noun phrasing an automaton and a neutral network. The noun phrasing runs
as a syntactical analyzer and produces a list of relevant information. The
automaton makes a matching operation and the neutral network predicts the
matched phrases most possible entity type. In [6] an approach to
automatically locate data-rich regions and to extract relevant attribute-value
pairs of database records from web pages across different sites is presented.
This approach relies on the fact that the attribute-value pairs of the records
usually occurs next to each others in well-designed web pages.
We note that all these approaches do not deal with the context of relevant
information for plain text documents and do not integrate in a unique
formalism both the extracting and the database writing processes.
In contrast to these approaches, we propose an extraction approach, a.k.a.
wrapper, that deal with plain text without a predefined structure (i.e., XML
and HTML) and without a natural language pre-processing (i.e., lexical,
semantic analysis) to identify phase structures and relevant information. Our
extraction approach is based on a formal description of the wrapping
process from text document to databases by means of automata output
functions that generate automatically SQL queries synchronized with the
extracting process. Moreover, on the formal aspect, we express with the
same formalism both the extracting and the database mapping processes.
We particularly rely on the automata and regular expressions formalism to
express the structure of relevant data and locate them. Each relevant
information is described by a regular expression. The sequence separating
two relevant information is also formulated with regular expressions. After
recognizing relevant information, a SQL insert query is generated. For each
relevant information, we specify four elements; its regular expression, the
regular expressions for its preceding and proceeding sequence and the
corresponding SQL query. All, the regular expressions forms the extracting
automaton and the SQL queries are included in the output function of the
automaton. Then, the automata cover both the extracting and the database
writing processes. The research is a first step to build automata generic
system based on attributed grammars like in [3].
The remaining of the paper is organized as follows. Section 2 establishes a
panorama of related works. Section 3 recalls the formalism of automata with
output functions and shows how we translate the relevant information
descriptions into extracting automata. In section 4, we present our
experimental results to extract legal decrees from the text document of the
IJCSBI.ORG
Lebanese official journal and insert them into a database. In section 5, we
conclude our work and provide some research trends.
2. RELATED WORKS
Several approaches have been proposed to extract data from text document
using automata. In [1], the authors describe a finite-state processor for
information extraction from real-world text, named FASTUS. FASTUS uses
a pre-defined finite-state machine (Recognizing Phrases Automaton) to
decompose the sentences of the real-world text into noun groups, verb
groups, and several other critical word classes phrases which will form the
candidate list of phrases. Next, the given patterns of interest (extraction
pattern) is encoded into a finite state machine (Recognizing Patterns
Automaton), and the resulted candidate list of phrases is passed as input to
this automaton that identifies phrasal matches with the given patterns of
interest and returns the necessary information. In [2], the authors deal with
the problem of creating a wrapper for XML paragraph-centric documents
named Xtractor. They propose a specification language to write the
extraction patterns, based on Regular Expressions, but is more simple and
easier to read than Regular Expressions themselves. This specification
language includes a set of meta-words that are referenced in a provided
dictionary for the domain of interest, and associates lexemes with these
meta-words. The extraction pattern, which is a regular language, is
translated into an equivalent finite-state automaton in the first phase. Then
in the second phase, the finite-state automaton will carry out the information
extraction, and the result is returned as data tuples of attributes.
In a similar approach, in [4] authors deals with the problem of extracting
meaningful entities, such as person names, addresses, narcotic drugs, or
vehicle names, from free texts of police narrative reports through a neural
network-based entity extractor. The system has three major components;
Noun phrasing, Finite state machine and lexical lookup, and Neural
network. The Noun phrasing component is a form of a syntactical analyzer
that extracts the noun phrases from the reports and will form the candidate
list of relevant information values. The Finite state machine and lexical
lookup component is a finite state machine that finds matches between the
words of the extracted noun phrases list and the items of a provided lexicon
that contains lists of possible values of the entities of interest. The Neural
network component, a feedforward/backpropagation neural network,
predicts the matched phrases most possible entity type. The system also has
two states; a learning state where it identifies the lexical pattern rules
(extraction pattern rules) based on a training collection of reports, where the
entities are manually identified by a human, and saves these rules in the
neutral network as synaptic weight, and a testing state where the system
IJCSBI.ORG
extracts the phrases and find item matches from the reports and predicts
their entity type based on the obtained extraction pattern rules from the
learning state.
In [6], authors describe a web information extraction system that extracts
attribute-value pairs, like Product code, Manufacturer, Price, and
Description of products from web pages that present product descriptions.
The system introduces a notion called Structural-Semantic Entropy to
identify if a web page contains a data-rich region or not. The data-rich
region of a web page is the region that contains the actual relevant
information. Structural-Semantic Entropy means the measure of
randomness of the leaf nodes that contain a semantic role of a given non-
leaf node. A leaf node contains a semantic role if it contains a keyword label
associated with the attribute-value pairs. This keyword label list is known
beforehand and given as input to the wrapper. The more this randomness is
higher the more the non-leaf node that is inspected is likely to be a data-rich
node. For every non-leaf node in the DOM tree of the web page its
Structural-Semantic Entropy is calculated, and every node having a
Structural-Semantic Entropy higher than a given threshold, which is
learned by experimentation, is considered to be a data-rich node that
contains a record. Finally, for every discovered data-rich node, the contents
of the next text-nodes of its leaf nodes that are annotated with a semantic
role are usually extracted as the value of the semantic roles (or attributes).
We conclude that most of these representative approaches do not provide
formal description of the whole extracting and database writing processes
and they do not run on non-structured text documents.
3. METHODOLOGY
Automata are used to support syntactical analyzer in the compiling process
of programming languages. They act like a virtual machine to recognize
words belonging to rational languages by passing from one state to another
according to a symbol of the initial alphabet.
Formally, an automaton is a 5-tuple A=< , S, s0, T, > where:
is the alphabet
S is the set of states
s0 is the initial state and an element of S
T is the set of terminal states and a subset of S
is the transition function defined by:
: S x S
The transition function is represented by a graph and leads the recognizing
process. As in [5], we can define a semantic for automata transition. A
semantic has the same domain as the transition function but it associates
IJCSBI.ORG
semantic values with each transition. This technique allows the enrichment
of the automaton and the possibility of executing of complementary
semantic operations in parallel with the automaton transition function. Then,
we formalize an extended automaton by a 7-tuple A=< , S, s0, T, , D,
>where , S, s0, T, remains the same as preceding and where D is a
semantic domain and is the semantic function defined by:
: S x D
As application of the data integration process from text document to
database, we consider the data integration process applied to the Lebanese
Official Journal (LOJ) in the Center of Documentation and Research of the
Lebanese University. The main unit in LOJ is the decree that contains
general information like decree number, date,, many 'based on' clauses,
many articles, a 'decrees' clause, a place, a date and many signatures (see
Figure 1). Each week, the center receives an electronic copy of LOJ as a text
document. The relevant information in the decrees are selected and
transferred manually to database by a copy-paste operation from text
document to database. This operation takes too much time and produces
errors. In the center, they want to develop a program that both selects
automatically the relevant information from the decrees of LOJ and insert
them in the database. That is why we are going now to use automata to
formalize the data integration process for LOJ decrees.
The relational schema of the database associated with the LOJ is described
as follows:
decree(decree_id_pk, type, number, title, location, date)
basedon(basedon _id_pk, decree_id_fk, value)
andafter(andafter _id_pk, decree_id_fk, value)
article(article_id_pk, decree_id_fk, value)
signature(signature_id_pk, decree_id_fk, value)
The list of relevant information with their values from the example decree of
Figure 1, and their corresponding regular expressions and database
operations are given in Table 1.
In addition, we give finite state automata where the transition function is
represented by a graph and the output function is formally identified. Each
state in the automata is implemented as a string to which we add the symbol
recognized at each transition. The domain D contains four operations:
1. insert: to insert a table record
2. update: to update a field of a table record
3. concatenate: to concatenate two strings
4. clear: to clear the string state.
IJCSBI.ORG
Decree No. 6873
Giving the Ministry of Finance treasury advance to pay the last installment of a
series of differences of ranks and salaries of civilian and military
The President of the Republic,
Based on the Constitution,
Based on the law of public accounting, as amended, particularly Article 203 and
subsequent of it,
Based on the suggestion of the Minister of Finance,
And after the approval of the Council of Ministers on 15/11/2011,
IJCSBI.ORG
differences of
ranks and salaries
of civilian and
military
the
Insert a new record in
Constitution
the basedOn table
BasedOn the suggestion Based on [a-zA-Z,.0-9 ]+ Based on | And after
and update the value
of the Minister of
field in this record
Finance
the approval of Insert a new record in
the Council of And after | Decrees the andAfter table
AndAfter And after [a-zA-Z,.0-9 ]+
Ministers on the following: and update the value
15/11/2011 field in this record
To give the
Ministry of
Finance treasury
Article [0-9]*: | [a-zA- Insert a new record in
advance worth /
Z]*, the [0-9]{2}th of the article table and
Article 500.000.000.000 Article [0-9]*: [a-zA-Z,.0-9 ]+
(January||December update the value field
/ LP (only five
) [0-9]{4} in this record
hundred billion
pounds).
Article [0-9]*:
This Decree
, the [0-9]{2}th of Update the location
shall be
Location Baabda [a-zA-Z]+ (January||December field in current record
published and
) [0-9]{4} of the decree table
reported where
needed.
the [0-9]{2}th of Update the date field
the 18th of
Date [a-zA-Z]+, (January||Dece Signature: in current record of
November 2011
mber) [0-9]{4} the decree table
Michel
Sleiman, Insert a new record in
Muhammad the signature table
Signature Signature: [a-zA-Z ]+ Issued by | Minister
NajibMikati, and update the value
Muhammad Al field in this record
Safady
IJCSBI.ORG
The automata associated with the decree relevant information are:
FSA( Type ):
a-z|A-Z| |
q0 a-z|A-Z| | q1 No. q2
IJCSBI.ORG
FSA( Title ):
0-9 a-z|A-Z| |
The President
of the
0-9 a-z|A-Z| |
q0 q1 q2 Republic, q
3
FSA( BasedOn ):
a-z|A-Z| |0-9
Basedon
Figure 5. BasedOn Finite State Automaton
IJCSBI.ORG
This automaton will extract all the alphanumeric characters including a
space character between every Based on keyword and another Based on
or And after keywords, and insert them as the value of the value
attribute of a new record in the basedon table.
FSA( AndAfter ):
a-z|A-Z| |0-9
Decrees the
following:
q0 And after q1 a-z|A-Z| |0-9 q2 q3
And after
Figure 6. AndAfter Finite State Automaton
FSA( Article ):
IJCSBI.ORG
D = {Insert(qi, 'article', 'value'), Concatenate(qi, c), Clear(qi)}
:QxD
(q0, Article) =
(q1, 0-9) =
(q1, : ) =
(q2, c) = Concatenate(q2, c) where c a-z|A-Z| |,|.
(q3, c) = Concatenate(q3, c) where c a-z|A-Z| |,|.
(q3, Article) =
(q4, 0-9) =
(q4, :) = Insert (q2+q3, 'article', 'value'); Clear(q2); Clear(q3)
(q3, a-z|A-Z) =
(q5, a-z|A-Z) =
(q5, , the) =
(q6, 0-9) =
(q6, th of) = Insert(q2+q3, 'article', 'value');
This automaton will extract all the alphanumeric characters including a
space, comma, and dot characters between every Article n: keyword
(where n is a number) and another Article n: keyword or any word
followed by a date delimiter, and insert them as the value of the value
attribute of a new record in the article table.
FSA( Location ):
a-z|A-Z
This Decree shall
be published and
reported where
needed. a-z|A-Z q2 , the
q0 q1 q3
IJCSBI.ORG
FSA( Date ):
a-z|A-Z 0-9 0-9
January||
, the December Signature:
a-z|A-Z
q0 q1 q2 q3 th of q4 q5 q6
Issued
q0 Signature: q1 a-z|A-Z| | q2 by|Minister q3
IJCSBI.ORG
keywords, and insert them as the value of the value attribute of a new
record in the signature table.
4. RESULTS
In order to validate our extraction approach, we have developed a .NET-
based prototype, including two modules, the extracting module and the
database writing module. The extracting module is the implementation of
the regular expressions of all relevant information with their preceding and
following sequences and also includes the output function for the SQL
operations. It extracts relevant information values from decrees of the text
document of the Lebanese official journal, and inserts these values in the
SQL queries that are saved in an XML document. The database writing
module takes as input the XML document for the SQL operations, selects a
SQL query, makes a connection to the database and finally executes this
query.
We have tested our prototype application on a sum of 100 decrees from
several LOJs. Then we manually checked the database entries with the
initial 100 decrees texts for consistency and errors. We found that out of the
100 decrees, 98 decrees where discovered and extracted, and out of the 98
extracted decrees, 5 errors were found in some of the attributes. To measure
the correctness of our prototype, we calculate two statistical classifications
used in pattern recognition and information retrieval, the Precision (also
called positive predictive value) which is the fraction of retrieved instances
that are relevant, and the Recall (also known as sensitivity) which is the
fraction of relevant instances that are retrieved. Based on the previously
found numbers, the number of relevant instances is equal to the 98 extracted
decrees minus the number of extracted decrees with errors which is 5,
giving us a 93 for the number of relevant instances. This will result in a
Precision that is equal to 93/98 which is approximately 95%, and a Recall
that is equal to 93/100 which is 93%.
5. CONCLUSIONS
In order to deal with information extraction from plain text without a
predefined structure (i.e., XML and HTML) and without a natural language
pre-processing, we have presented an automata-based model to describe a
wrapper that extracts meta-data from a text document containing the decrees
of the Lebanese Official Journals, generates the corresponding SQL writing
queries, and executes them in order to insert these extracted data into a
relational database. In this model, we specify with the automata formalism
both the extracting and the database writing processes. At present time, we
have developed a prototype extractor by directly coding the Finite State
IJCSBI.ORG
Automaton with the Output Function. The prototype extractor showed
prominent results in extracting correct meta-data about the articles and
successfully inserting them in their correct place in the relational database.
In our future works, we would like to target the extracting process by
considering conflicts when relevant information occurs in a wrong place.
Moreover, we are investigating a new specification language for automata
with output function in order to build a generic system that produces
automatically the automata program or the extraction and writing programs.
6. REFERENCES
[1] D. E. Appelt, J. R. Hobbs, J. Bear, D Israel and M. Tyson, FASTUS: A Finite-state
Processor for Information Extraction from Real-world Text. IJCAI 1993: Chambry,
1993.
[2] Y. BADR, Xtractor: A Light Wrapper for XML Paragraph-Centric Documents.
Proceedings of the 1st International Conference on Signal-Image Technology and
Internet-Based Systems, SITIS 2005, 2005.
[3] K. Barbar, Automatic generation of XML-based editors for autonomic systems,
International Journal of Autonomic Computing, v.1 n.3, p.246-262, May 2010
[4] M. Chau, J. J. Xu, H. Chen, Extracting Meaningful Entities from Police Narrative
Reports. National Conference on Digital Government Research 2002, 2002.
[5] Knuth, D., "Semantics of context-free languages", Math. Systems Theory 5, 127-145,
1968.
[6] X. Zheng, Y. Gu, Y. Li, Data Extraction from Web Pages Based on Structural-
Semantic Entropy. Proceedings of the 21st international conference companion on
World Wide Web. Pages 93-102. ACM New York, NY, USA, 2012
IJCSBI.ORG
ABSTRACT
Agriculture is a source of livelihood of majority Indians and has great impact on the
economy of the country. In a country like India, where climatic conditions vary
substantially and irrigation facilities are poor. Agriculture is timely and sufficient supply of
water. Water pumps are crucial in agriculture where electricity is indeed. The frequent,
intermittent, low voltage supply of power to the agriculture sector has caused problems to
the farmers who are spending their time monitoring the supply of power without which no
progress of their work. The power supply with frequent power cuts have not only lowered
the efficiency of farmers but also have led to the frustration of the farmer to give up
agriculture and move to urban areas for better prospects in the globalized world. In this
paper we presented a system which shows, how mobile communication can benefit
millions of farmers in rural India by providing a solution for the irrigation problems caused
by intermittent electrical power supply. Information is exchanged in form of
messages/miscalls between the system and the user cell phones. The system is based on
ATMEGA32 micro-controller and includes protection against fluctuations in power supply.
For measuring time and temperature RTC DS1307 and DS18S20 are used. By using this
system the hardships of farmers relating water distribution can be relieved.
Keywords
AT command supporting GSM mobile phone, ATMEGA32 Micro controller, Relays,
Sensors, LCD for monitoring the current reading of all the parameters.
1. INTRODUCTION
Even in the modern era of industrialization, agriculture plays a very
significant role in the overall socio-economic development of India. India
has an agriculture based economy. 43% of Indias territory comes under
agricultural lands. Agriculture along with other related fields like forestry
and logging provides employment to 52% of Indias population. Agriculture
also accounts for 8.56% of the countrys total exports. According to a
survey made in 2007, agriculture accounts for 16.6% of Indias Gross
Domestic Product. Hence, it is agriculture that is the most influential field
as compared to others in India. This importance on agriculture leads to an
emphasis on better agricultural practices. The underground water level is
slowly falling down and forests are being cut which reduces the rainfall as
well. With increasing area available for cultivation and the need for
increasing the productivity from the farm land, there is a growing need for
IJCSBI.ORG
electrical energy for irrigation. The generation of electricity is not growing
proportionately to the demand.
The supply to agriculture is limited to few fixed hours throughout the day.
In a sample survey of village Komarolu, located at distance of 17kms from
Giddalur (Taluka in Prakasam District, Coastal Region, Andhra Pradesh
State, India), it was observed that 3-phase supply is normally available for 7
hours a day from 2.00 am to 9.00 am for a week and from 11.00 am to 6.00
pm for next week and changes alternately. Due to increase in demand of
electricity the schedule given was not followed and sometimes power given
at night times and fluctuations in voltage level leads to motor damage[1]. So
farmers, after carrying strenuous physical activities in farm during day, have
to return back to their farms in night to carry water distribution using 3-
phase motor pumps. Agriculture receives power mostly during mid night
(off-peak) as this reduces the cost of electricity supply for the transmission
and Distribution Company. The farmers have to be on their guard all the
time due to the unpredictable nature of supply of electrical energy. And the
farmers have to switch on their motor after electricity supply resumes. The
reduced amount of yielding, man power wastage, and idle state of
equipment can observed in its results.
Due to the fast development in tele-communication technologies, it is
believed that wireless solution for irrigation in agriculture. This system has
fully utilized wireless sensor network, Global System for Mobile
Communication (GSM) and short message service (SMS)/missed call to
carry out data from the sensors to computers or directly alert the farmers
through their mobile phone and to control the remote watering process [2-
4], also through the mobile phone. This practice eliminates the use of wired
technology, improves old method of collecting data in farming areas and
allows farmers to control their sprinklers remotely. Also, It has been
observed that source of electrical energy generation is slowly depleting
using solar energy. We are going to discuss an example of how the mobile
technology can benefit millions of farmers by providing a solution for the
irrigation problems. Simple cell phones having just voice call and
messaging facility or cell phones with non-working display can be easily
adapted for remote control applications.
2. SYSTEM DESCRIPTION
A system is developed for optimum water distribution in the fields through
motor pump. The crop yield is maximized to a great extent by providing
proper amount of water at suitable time intervals based on climatic
conditions. The system offers attractive features like automatic control
based on parameters specified through keyboard /SMS/ number of miscalls;
provides protection against single phasing, over-current, over-voltage, dry
IJCSBI.ORG
running and probable bearing faults; alerts users in case of abnormal
conditions like power failure, dry-running, etc. and provides audible
indication through buzzer/ miscall on completion of task.
The figure 1 shows the Block diagram of the scheme. Using keyboard the
parameters of the system can be set or received in form of SMS/number of
miscalls in specified duration from user mobile through serial cable
connected to control system cell phone (Model Nokia 6610). Based on
commands received microcontroller system sends signals to switch on / off
motor through Starter using relays controlled by its ports. Three phase 5
hp,7 hp,10.5 hp induction motor working on Direct-on-line Starter are
chosen for agriculture purpose.
3 PHASESUPPLY
R Y B
CELLULAR
USER LINK ATMEGA32 STARTER
SYSTEM
MOBILE MICROCONTROLLER (MOTOR
MOBILE
BASED SYSTEM CONTRACTER)
IJCSBI.ORG
extracted and checked with predetermined format, which includes
password, desired time or ON/OFF commands or status query.
Microcontroller carries out for the valid control message. In this application,
any incoming SMS message is directly routed to micro-controller (TE) and
any outgoing text message is directly sent by micro-controller to designated
cell phone number without being stored in control system cell phone
memory. As a result, phone memory is not inundated with messages in spite
of many messages being transferred.
2) Miscall Approach: The operational cost of communication between user
and control system cell phones is further reduced by using concept of
miscall where in no charges are incurred by using only ring signal for
information transfer. Miscalls are treated in two situations one is calling
party disconnects after receiving ring tones and second one when called
party does not respond to call within mentioned 5 minutes. The system cell
phone is designed to send specified number of miscall(s) within five
minutes duration to user cell phone to report various conditions as shown in
Table 1. Similarly, user cell phone sends commands to system cell phone by
making specified number of miscalls as shown in Table 2.
Table 1. Messages based on missed calls from system cellphone
No. of missed calls in 5 min. Message indication
01 No Power
02 Power failure
03 Resumption after normal conditions
04 Task completion
05 Probable motor faults/dry running
IJCSBI.ORG
command is used in recognizing particular saved recipient. Micro-controller
checks incoming number with user cell phone when reception of unsolicited
code RING along with CLIP occurs. Micro-controller waits for five minutes
duration to check total number of calls and carries out specified task if
match founds. Similarly, microcontroller carries out number of voice calls
from control system cell phone to user cell phone within five minutes time
duration using ATD command. And SMS mode activated when the BUSY
or ERROR occurred while making voice call.
3. MICROCONTROLLER SYSTEM
AT Mega32 microcontroller has RISC architecture with 32 KB of in-system
programmable Flash, 1k E2PROM, 2k SRAM, 32-bit General purpose I/O,
8channel 10-bit ADC, TWI, USART, SPI, JTAG interface support etc [7-8].
Ponyprog software was used for flash programming [9]. The software was
developed in C language using GCC compiler.
3.1 Interfacing
Interfacing diagram of micro-controller system is shown in Fig. 2. 8-bits of
Port A are configured as analog inputs ports. PA0-PA2 bits monitor the
present values of supply phase voltages. Water level of well indicated by
port A 3 and 4 pins while PA5 to PA7 are used to sense whether water has
reached the desired final destination of the regions. PB0-PB5 pins are
connected to 2 16 characters LCD display in 4-bit data length mode. Two
relays are controlled by upper 2 bits of Port B. Start (green) pushbutton of
starter for automated starting of the pump from micro-controller board is
connected to one relay while other relay is connected in series with stop
(red) pushbutton for stopping the motor pump from micro-controller. Upper
4 bits of Port C and upper 4 bits of Port D are used to interface 4x4
keyboard matrixes. DS1307 (RTC) is chosen for implementation of timing
applications. It is connected through TWI interface (I2C) i.e. PC0 (SCL)
and PC1 (SDA) pins. Two temperature sensors (DS18S20) are used having
single wire interface for connectivity. PC2 bit is used for single-wire
interface. Internally RxD (PD0) and TxD (PD1) are connected to 9-pin
RS232 female connector through MAX 232 IC for TTL-
RS232Csignaltranslation.
3.2 Real Time Clock
The DS1307 serial real-time clock (RTC) is a low power, full binary-coded
decimal (BCD) clock/calendar [10]. Address and data are transferred
serially through an I2C, bi-directional bus (TWI). The clock/calendar
provides all timing information from seconds to years. With the help of
keyboard and LCD display, present date and time are written into
corresponding internal memory locations of this IC using I2C protocol.
IJCSBI.ORG
Whenever on-time duration for pump is specified, the two registers of AT
Mega32 are used to store time duration in minutes and hours.
R PD7
VOLTAGE 4X4
Y ADC0 (PA0) PD4
SENSING
B BLOCK ADC2 (PA2) PC4 KEY BOARD
PC7
XTAL1
XTA PB5 D4
C1
L1 PB4 D5
PB3 D6 LCD
PB2 D7 DISPLAY
C2 PB1 ENIN
XTAL2 PB0 RS
GND
XTA
L2
Figure 2. Microcontroller system interfacing
GND
The pump is switched on through relays using ports of micro-controller.
After passage of every minute (known through RTC) relevant registers of
microcontroller are updated if normal conditions exists and when their
values reach null, by using PB7 bit the pump is switched off. The
occurrence of abnormal conditions like unbalanced phase voltages, dry-
running, etc. causes pump to be switched OFF and the counting is
temporary stopped and is resumed on restoration of normal conditions. Thus
it is ensured that proper quantity of water is distributed by keeping pump
ON for specified time duration under normal conditions and user is
informed about restoration of normal conditions through miscalls.
3.3 Phase Voltage Measurement
In order to measure phase voltages, three transformers of equal ratings (6-0-
6) are used to step down voltage. These voltages are converted into
appropriate dc levels at analog inputs of micro-controller. Phase voltages
IJCSBI.ORG
are read at regular intervals by micro-controller. The values of phase
voltages are compared with one another. If the result of any comparison
exceeds specified value, signal is sent to switch off the pump along with
error message indicating unbalanced phase voltage condition and conveying
this information to user cell phone through miscalls. Internal 10-bit ADC of
micro-controller is configured to work in left justified format and only most
significant 8-bit values are used for comparison.
3.4 Temperature measurement
There has been tremendous research in fault diagnosis and protection
schemes for induction motor [11]. The basic over-current protection for
motor is provided by bimetallic strip of starter. Maximum reliability ensured
by mounting temperature sensor on body of motor and another temperature
sensor is mounted at a suitable location to measure ambient temperature.
Whenever temperature difference between the two sensors exceeds
specified safety limit (250C), signal is sent to switch off pump along with
error indication to LCD display and conveying miscalls to user cell phone to
indicate probable fault occurrence. This arrangement ensures that
catastrophic event like burning of motor due to any fault like over-current,
bearing blockage and insulation failure are avoided. And preventive
maintenance is carried out at substantially lower cost. The chosen
temperature sensor is DS 18S20 manufactured by Dallas Semiconductor
(Maxim) [12-13].It has operating temperature range of 55oC to +125oC. A
major advantage associated with this sensor is the availability of output
directly in digital form obviating the need of analog to digital conversion.
Moreover, this sensor provides inherent error-detection capability through
CRC technique.
3.5 Water Level Sensor
In order to prevent dry running of motor and allow automatic restart of
motor when sufficient water level is regained, three wires are inserted into
the well. One wire (GND) is inserted at bottom of well while second wire is
adjusted just above foot-valve of the suction pipe of motor pump (LL) and
third one at suitable level above second wire (HL). Microcontroller switches
OFF the motor and sends miscalls indicating empty well (dry running)
conditions whenever water falls below LL level. Whenever water rises
beyond HL level and sends miscalls indicating resumption of task, the
micro-controller switches ON the motor again. The flexibility of system can
be increased by using water level sensor and prevents the damage of motor.
IJCSBI.ORG
Figure 3. Implementation
3.6 Water Reach Sensor
There are two approaches for water distribution in this system. One method
is to specify the ON time duration of pump and second approach is to
specify the area of water distribution before stopping motor. First approach
is more suitable for sprinkle-based irrigation system while second approach
is chosen for ground-level water irrigation. For ground level water
irrigation, two wires are extended to extreme end of region where water is
to be reached. In this scheme, three such regions are presently supported
and one end of wire of these regions (R1, R2, R3) are connected to PA5,
PA6 and PA7 port bits of microcontroller using pull-up resistors of 100k
while other ends are connected to GND.
IJCSBI.ORG
productivity of food grains and bring prosperity to this hardworking
population ensured with the usage of proposed system.
5. REFERENCES
[1] Ilonen J. Kamarainen J. K, Lindh T, Ahola J, Kalviainen H andPartanen,
Diagnosis tool for motor condition monitoring. IEEE Trans. Ind. Application,
Vol 41, No. 4, 2005 pp. 963-971.
[2] KuniakiUmino, Yasuhiro Ohyama, Jin-Hua She and Hiroyuki Kobayashi,
Remote Controlled Embedded System, 4th China-Japan International
Workshop on Internet Technology and Control Applications, Hunan, China, 21-
26 October, 2005.
[3] A Weaver J Luo, and S Zhang, Monitoring and Control using Internet and
Java, Proc. 25th Annual Conference on IEEE Industrial Electronics IECON99,
Vol. 3 , pp 1152-1158, 1999.
[4] Trohandl C, Proske M &Elmeureich W, Remote Target Monitoring in
Embedded System Lab courses using a Sensor Network, Proc. 32nd Annual
Conference on IEEE Industrial Electronics IECON 2006, 6-10 Nov 2006, pp
5433-5438.
[5] AT Commands Set for Nokia GSM and WCDMA products,Version 1.2, July
2005, available online: http://forum.nokia.com.
[6] ETSI TS 127 007 V5.3.0 (2003-03) Digital cellular telecommunications system
(Phase2+); Universal Mobile Telecommunications System (UMTS); AT
command set for 3G User Equipment (UE) (3GPP TS 27.007 version 5.3.0
Release 5, available online: http://www.etsi.org.
[7] ATMELAVRATMega32 Datasheet, available online:
http://www.atmel.com/dyn/resources/prod_documents/2503S.pdf.
[8] Richard Barnett, Larry OCull and Sarah Cox, Embedded C Programming and
Atmel AVR, Delmar-Cengage Learning India Pvt. Ltd., 2007 Edition (India).
[9] Ponyprog software, available online: http://www.lancos.com/
[10] DS1307 64 x 8, Serial, I2C Real-Time Clock Datasheet, availableonline:
http://pdfserv.maxim-ic.com/en/ds/DS1307.
[11] Benbouzid, M.E.H, A review of induction motors signature analysis as a
medium for faults detection, IEEE Trans. Ind.Electronics, Vol 47, No.5, 2000
pp. 984-993.
[12] DS18S20 High-Precision 1-Wire Digital Thermometer, available online:
http://pdfserv.maxim-ic.com/en/ds/DS18S20.
[13] Overview of 1-Wire Technology and Its Use, available
online:http://www.maxim-ic.com/an1796.
IJCSBI.ORG
Pradeep B. Dahikar
Kamla Nehru Mahavidyalaya Sakkardara, Nagpur (MS), India
Satish J. Sharma
Department of Electronics and Computer Science, R.T.M. Nagpur University, Nagpur
ABSTRACT
The scope of this paper includes development and implementation of virtual laboratories.
Virtual Experiments can be performed using the concept of virtual Intelligent SoftLab
(VIS). The virtual experiments described here will help students to perform it at anytime
and anywhere. The model accepts inputs using virtual instruments and observed virtual
results on the screen. There is a facility for constructing an experimental circuit, change the
input values and observed outputs respectively. The graphical and simulated effects of
virtual experiments are visible on the screen. SoftLab will help Electronics, Computer
Science and Engineering students perform and practice experiments to improve their
understanding of the subject.
Keywords
SoftLab, Virtual, VIS Model, Virtualization, Virtual Lab.
1. INTRODUCTION
For the last two decades, Electronics and Computer Science technology
have been among the fastest growing areas in the research field. Due to this,
there is a traditional laboratory in keeping up with some of the modern
industry's requirements. The concept of traditional real laboratories in
educational institutions has many limitations. The availability of resources
may be too limited to provide basic as well as advanced laboratory
equipments, and there may be a paucity of qualified faculty members. Even
if the facilities are there, in many cases a student may end up as a spectator
in the conduct of experiments. Students are not free to do experiments
according to their own schedules, as the time slot for an experiment may be
limited to the usual working hours. Numbers of subjects like Physics and
Electronics students have to perform a large number of experiments in an
academic year. Many times students do not get time to repeat experiments
which they have performed during the session. Also many of the
laboratories lack of resources to perform experiments in which sophisticated
IJCSBI.ORG
instruments are required. The new era of education demands a revolution
and modernization in techniques for different subjects. One gap in subjects
having component of practice is the lack of a complete set of e-experiments
that is a full scale virtual laboratory, instead of little virtual experiments.
Science subjects always have a component of practical. In subjects like
Physics and Electronics students have to perform a large number of
experiments in an academic year. Many times students do not get time to
repeat experiments which they have performed during the session. Also
many of the laboratories lack of resources to perform experiments in which
sophisticated instruments are required. Therefore to provide access to
laboratory experiments, anytime anywhere, concept of virtual laboratory is
developed. This virtual laboratory can cater to students at undergraduate
(UG) and post graduate (PG) levels. Some softwares like Mat Lab and Lab
VIEW are available for simulation of experiments and for other purposes.
However, these softwares are generally available only in big
Institutes/Laboratories and the student can use them only during college
hours. It is therefore decided to develop software for performing individual
experiments virtually on a computer screen. An attempt is made to develop
software for electronics experiments from basic to advance level. The
facilities of the laboratories in educational institutions are generally
insufficient when the number of students is considered. Implementation of a
laboratory to meet the requirements has a very high price.
The Virtualization of experiments is one of the most efficient ways for the
modernization of traditional laboratories. Virtualization is basically the
conversion of real experiments into virtual experiments with the help of
information and communication technologies (ICT), which provide a real
laboratory environment and 'feel' to perform the experiment. The basic goal
for Virtualization is to provide a facility to perform the experiment by using
either the Internet or s specific computer program. This can provide a highly
interactive and powerful learning environment for the engineering and
science disciplines and enables a learner to select and control all the related
parameters of the experiments. A complete graphical interface with the
adequate learning components and a scientific approach can provide the
'feel' of performing experiments efficiently. The Virtualization of an
experiment and its application by Internet based remote techniques can
provide a relevant and meaningful practical learning experience. This
relatively new concept of Virtualization is cost effective and there is no time
bound for the users as experiments could be accessed "24X7" anywhere any
time. Virtual experiments can be used extensively for teaching, e-learning,
and other computer-based education [1].
IJCSBI.ORG
2. LITERATURE REVIEW
In 1990, Mercer, Lynn from Canada University of Regina proposed the
concept of the Virtual Lab and built a simple one. During the next 20 years,
a lot of researchers further built and enriched the concept of Virtual Lab.
Experimental simulations have appeared with discipline specific texts, such
as Jones and Childers (2001), and Christian and Belloni (2001), or on the
World Wide Web at sites such as the Physical Sciences Resource Center
[2]. Many of these simulations are implemented using Java applets, and are
well designed and executed. Other online experimentation includes the
Stevens Institute of Technology in their Remote Dynamical Systems
Laboratory [3], which incorporated several online experiments but is
subject to limited use and limited data. Mercer University has implemented
the Online Interactive Chaotic Pendulum [4]. The site has an exemplary
interface and data presentation, but doesn't provide easy access to data.
Several mechanical engineering courses have online experimentation,
including Curtin University [5]. These sites tend to be highly technical and
their online availability appears to be limited. Other organizations that have
executed online experimentation include the Advanced Liquid Crystalline
Optical Materials (ALCOM) Science and Technology Center [6] of the Kent
State University. Tan, Tang and Paterson at Queensland University of
Technology had a project on developing a web based remote controlled
mechanical vibrations laboratory via the Internet.
IJCSBI.ORG
Salzmann (1999) proposed the steps of remote, real time control over the
Internet, and demonstrated the feasibility of using a distributed online
laboratory to complement and enhance the traditional laboratory. Ertugrul
(2000) reported such software tool applications, and his paper aimed to
provide some background knowledge about the tools and to address
common problems encountered by users. Resendez and Bachnak (2003) and
Bachnak et al. (2003) showed that such software tools could be used to
perform data acquisition and remotely control hardware devices through the
Internet. Trevelyan (2002) aimed to provide a cost effective online
laboratory to staff and students. Their first project was a tele-robot, which
was written in special purpose software written in C, C++ and Java.
Trevelyan (2004) reviewed the entire principal lessons their group learned
since 1994 and briefly described Telelabs, a cost-effective framework to
provide an extendable series of online labs that could be sustained from
normal operating budgets. Hofmann and Bubb (2003) explained about the
virtual environment for the typical industrial application. Almgren and
Cahow (2005) explained the way to make engineering education more
innovative by using the Internet.
Pheatt and Ballester (2003) discussed the design and implementation of web
courses and remote experiments, and the incorporation of these techniques
into the curriculum without acquiring equipment, setting up equipment or
creating a laboratory environment. Che (2005) presented the development of
biological engineering education along with a discussion on the
development of e-learning with a time sharing mainframe model and
providing a centralized, remote controllable biology lab. Feisel and Rosa
(2005) explored the major factors influencing conventional laboratories.
They described the various limitations which affect the effectiveness of
laboratory work and also its importance in science and engineering
education. Ozeki et al. (2006) produced remote experiments with a digital
certificate and encryption of communication data to protect a supervisory
control system against illegal access. They did the development of the
remote experiment system with testing and demonstration. Jeschke et al.
(2008) discussed the integration of experimental setups into a virtual
cooperative knowledge space, so that availability and accessibility can be
enhanced for a wide range of users. They worked out the architecture and
implementation of the remote experiment. Grber, Vetter, Eckert & Jodl
(2007) described a remote laboratory and its helpfulness to provide a tool to
sustain this shift towards a student-centered engineering teaching approach.
In papers by Bauer and Fedk (2007) and Bauer et al. (2008) a distance
measurement application for educational purposes was described, and the
monitoring of industrial applications was studied through web based
applications. Macas and Mndez (2008) describes the automation of their
IJCSBI.ORG
laboratory and rapid integration of automation systems into most of the
engineering processes. Cui, Wang, Zhang and Akujuobi, 2011, 27 (4)
(2008) focused on the reasons for traditional laboratories lagging behind and
emphasize the basic demands behind the modern trend to increased
virtualisation. Kolias et al. (2007) provided a categorization of remote
experimentation in education according to the platform used for conducting
the experiments and the scientific field represented. Gadzhanov and
Nafalski (2010) reviewed the pedagogical effectiveness of distance
education, with a special focus on remote laboratories for measurement and
control. Machotka et al. (2010) developed the remote laboratory NetLab at
the University of South Australia. NetLab was developed from the
beginning as a collaborative learning environment that enables students to
cooperate while conducting remote experiments via the Internet on both the
domestic and international levels. Herrera and Fuller (2011) proposed a
model for the implementation of remote experimentation laboratories in a
distributed collaborative scenario, focusing on two crucial key elements,
namely the shared knowledge and the interaction for the collaboration. They
contributed towards the implementation of remote experimentation using
collaborative scenarios. R Tiwari and K Singh summarized their experiences
during the design, evaluation and implementation of Virtualization for a
number of engineering experiments, enabling these to be accessed through
the Internet as virtual experiments. They also covered the features required
to give the 'feel' of performing experiments, inclusion of learning
components, incorporation of easy navigation, testing of the effectiveness of
learning, and development of useful feedback mechanisms.
3. VIRTUALIZATION OF LABORATORIES
Virtualization is the creation of a virtual rather than actual version of
something, such as a hardware platform, an operating system, a storage
IJCSBI.ORG
device or a network resource. Virtualization is a technique that allows you
to run more than one server (or other infrastructure component) on the same
hardware [7]. The virtual machine concept was in existence since 1960s
when it was first developed by IBM to provide concurrent, interactive
access to a mainframe computer. Each virtual machine (VM) used to be an
instance of the physical machine that gave users an illusion of accessing the
physical machine directly. It was an elegant and transparent way to enable
time-sharing and resource-sharing on the highly expensive hardware. Each
VM was a fully protected and isolated copy of the underlying system. Users
could execute, develop, and test applications without ever having to fear
causing a crash to systems used by other users on the same computer.
Virtualization was thus used to reduce the hardware acquisition cost and
improving the productivity by letting number of users work on it
simultaneously. As hardware got cheaper and multiprocessing operating
systems emerged, VMs were almost extinct in the 1970s and 1980s. With
the emergence of wide varieties of PC based hardware and operating
systems in 1990s, the Virtualization ideas were in demand again [8]. There
can be innumerous reasons how Virtualization can be useful in practical
scenarios, a few of which are the following:
IJCSBI.ORG
single physical host. However, Cloud Computing can be better described
as a service where Virtualization is part of a physical infrastructure.
Cloud Computing builds on top of a virtualized infrastructure (compute,
storage, network) by using standardization and automated delivery to
provide service management. This makes monitoring the virtualized
resources and the responsible deployment of these resources possible.
3.1 Need of Virtual Lab
Physical distances and the lack of resources make us unable to perform
experiments, especially when they involve sophisticated instruments. Also,
good teachers are always a scarce resource. Web-based and video-based
courses address the issue of teaching to some extent. Conducting joint
experiments by two participating institutions and also sharing costly
resources has always been a challenge. With the present day internet and
computer technologies the above limitations can no more hamper students
and researchers in enhancing their skills and knowledge. In India costly
instruments and equipment need to be shared with fellow researchers to the
extent possible. Web enabled experiments can be designed for remote
operation and viewing so as to enthuse the curiosity and innovation into
students. This would help in learning basic and advanced concepts through
remote experimentation. Today most equipment has a computer interface
for control and data storage. It is possible to design good experiments
around some of this equipment which would enhance the learning of a
student. Internet-based experimentation further permits use of resources
knowledge, software, and data available on the web, apart from encouraging
skillful experiments being simultaneously performed at points separated in
space.
3.2 Objectives of the Virtual Labs
To provide remote-access to Labs in various disciplines of Science and
Engineering. These Virtual Labs would cater to students at the
undergraduate level, postgraduate level as well as to research scholars.
To enthuse students to conduct experiments by arousing their curiosity.
This would help them in learning basic and advanced concepts through
remote experimentation.
To provide a complete Learning Management System around the Virtual
Labs, where the students can avail the various tools for learning,
including additional web-resources, video-lectures, animated
demonstrations and self evaluation.
To share costly equipment and resources, which are otherwise available
to a limited number of users due to constraints on time and geographical
distances?
IJCSBI.ORG
3.3 Salient Features of the Virtual Lab
Virtual Labs will provide to the students the result of an experiment by
one of the following methods (or possibly a combination)
Modeling the physical phenomenon by a set of equations and carrying
out simulations to yield the result of the particular experiment. This can,
at-the-best, provide an approximate version of the real-world
experiment.
Providing measured data for virtual lab experiments corresponding to
the data previously obtained by measurements on an actual system.
Remotely triggering an experiment in an actual lab and providing the
student the result of the experiment through the computer interface. This
would entail carrying out the actual lab experiment remotely.
Virtual Labs will be made more effective and realistic by providing
additional inputs to the students like to accompany audio and video
streaming of an actual lab experiment and equipment.
For the touch and feel part, the students can possibly visit an actual
laboratory for a short duration.
IJCSBI.ORG
been developed for different areas, such as physics, electronics, robotics,
physiology, chemistry, engineering, economics, and ecology[9].
Develop the Soft Lab for the following purposes.
Lower Your Measurement Costs with Virtual Instrumentation the costs
of a measurement application.
Reducing system specification time cost.
Lowering hardware and software prices.
Minimizing set-up and configuration time costs.
Decreasing application software development time costs.
Lowering system validation & hardware calibration time costs.
4.2 LabVIEW
LabVIEW (short for Laboratory Virtual Instrumentation Engineering
Workbench) is a system design platform and development environment for
a visual programming language from National Instruments. LabVIEW is a
software development environment originally designed for computer-
controlled data acquisition. It has since grown to be a general purpose
programming environment with a wide range of applications. The basic
object in LabVIEW is a Virtual Instrument (VI). It has two parts:
The Front Panel or GUI.
The Block Diagram or programming guts.
The VI Front Panel was originally designed to mimic the front panel of a
laboratory instrument, but it can be set up to resemble pretty much any sort
IJCSBI.ORG
of user interface. National Instruments has a website entitled LabVIEW 101
that contains a series of instructional videos and PDFs of the instructions.
LabVIEW is commonly used for data acquisition, instrument control, and
industrial automation on a variety of platforms including Microsoft
Windows, various versions of UNIX, Linux. The latest version of LabVIEW
is version LabVIEW 2011, released in August 2011. In LabVIEW 8.20,
you have the freedom to choose your preferred syntax for technical
computing. Whether developing algorithms, analyzing results, processing
signals, or exploring DSP concepts, you can combine the intuitive
LabVIEW graphical dataflow programming with LabVIEW MathScript, a
math-oriented text-based programming language that includes more than
600 commonly used functions for math, signal processing and analysis [11].
IJCSBI.ORG
experiment can also be made available. A frequently asked question (FAQs)
section is continuously being developed for each experiment.
IJCSBI.ORG
and diverse array of equipment. The SoftLab framework should provide the
infrastructure and facilities that serve the needs of basic research.
The basic facilities include with VIS:
High-performance graphics processors to support scientific
visualization, and multimedia facilities.
Software that allows application researchers to make full use of these
facilities to evaluate their experiments without any risk.
Virtual laboratories that provide scientists with a full range of
functionality, both for experimental activities and for the mathematical
modeling and simulation of the experimental processes.
IJCSBI.ORG
other computer-based education.The functionality provided by this problem
solving environment will therefore be:
Collect the experimental data in real time.
Provide a visualization of the experiments.
Control the experiment.
Input the experimental data to the computational model.
Control the computational model and visualize the numerical simulation
solution.
Professionals confirmed certain characteristics of the virtual lab.
Creating new intellectual models in education better than the real, and
more beautiful than the imagination.
Knowledge-building and inculcate information.
Encouraging and guiding students.
Registering students' information and evaluating them automatically.
Performing experiments, which are difficult to be performed in the
traditional lab due to its danger and high cost.
Reducing the learning time spent in the traditional lab.
Develop an exploration based on scientific assumptions and processes.
Permanently updated.
6. CONCLUSIONS
SoftLab will help Electronics; Computer Science and Engineering students
perform and practice experiments to improve their understanding of the
subject. The design of the VIS model is more effective and realistic as
necessary variable inputs and outputs are visible on the monitor screen.
This model created for the client based system, can be converted into a
client - server based application system. Through this model, the examiner
can conduct the examination, in which the student can perform their
experiments in a given time period, by applying timer. Some modifications
may be done, by applying a video camera. Through this video camera, the
lab instructor or examiner can watch the video clip of the experiment
performed by the student in stepwise so that the instructor/examiner can find
the errors if any. This virtual experiment provides practice for students for
the touch & feel part they have already performed in the laboratory.
7. ACKNOWLEDGEMENTS
We are very much thankful to Dr. D. A. Deshpande, Dr. P. K. Butey and Dr.
U. A. Lanjewar for their valuable inputs, constant guidance and their
extensive support and encouragement in this work.
IJCSBI.ORG
8. REFERENCES
IJCSBI.ORG
ABSTRACT
Resource allocation is an important task in distributed systems. A dynamic allocation is
most effective task in decreasing execution time and improving overall system
performance. The request for the resources might be generated at any time in environment
and it has to be allocated without any delays and conflicts. The workload distributed among
the system raises the major concern in the context of optimal allocation of resources. The
primary objective of this system is to achieve the high performance and availability.
Thereby reducing the computation and communication delays happens in dynamic
environment. It generates good results in synchronization between the systems.
Keywords
Resource Allocation, Negotiation, APR protocol, Load balancing, Airplane rerouting.
1. INTRODUCTION
Nowadays we are using computing platform for various purposes. The
purpose and usage may differ from one business to other business. Based on
their usage level, the appropriate computing hardware is chosen and the
users try to optimize its usage, thereby obtaining maximum profit from the
minimal hardware. Distributed system provides the environment to process
large amount of data with a short span of time. The total workload is
distributed among the systems, then it is processed within small amount of
time and its results could be aggregated. The job allocation can take place
based upon the resource availability. But if the system gets overloaded with
more number of jobs then it will create unnecessary delays and traffic,
hence there is also a delay in executing jobs submitted before. This results
in load imbalance problem and conflicts. So the load can be properly
distributed, and the jobs must be completed without any resource conflicts
and delays.
There exists a situation in which the resource required by a job, but it is
hold by some other process. But there is no usage of holding the resource.
So it must be reallocated as soon as when the process finishes its job. This
necessitates incorporates the purpose of bargaining in which the resources
must be reallocated when finishes its job, by that both process gets the
mutual benefit without any incurring any loss.
IJCSBI.ORG
2. RELATED WORK
Load balancing has been previously studied mainly for the purpose of
balancing workload in centralized environment. So we remember some
balancing concept for distributed environment which is presented in some
papers. In contextual based resource allocation they viewed the system in
terms of physical and social contexts. Resource allocations is done based on
it maximal usage. In this system, if the task enters into the system, it
receives and puts into agent waiting queue. If the waiting queue reaches
maximum limit, it stops further allocations. The agents can execute the jobs
with required resources. If not, agents try to negotiate with other agents to
accomplish their desired tasks. The aim of this approach is to reduce
average queues size for the agents and maximizes the resource usage [1].
In Agent based simulations they have to proper monitoring and migrating
mechanism to correct load problems. Initially it detects heterogeneity of
system connected in environment and its loads. Balancing operations is
performed through various phases. Namely, Monitoring phase, filtering and
selecting operation phase, redistribution phase and migration phase. Better
approach to handle the dynamic changes, happen due to unanticipated
resources enters into the system. But we have more computation and
communication load to handle and need complex structure to monitoring
resources [2].
We have adaptive algorithm to effectively schedule and manage the shared
resources. And the failures can be handled very easily. If the main container
fails, it replicated main containers to become active. The problem of
centralized system fails or overload at centralized system then it totally
becomes imbalanced and recovery takes more time. This problem is solved
using distributed system through approximate optimized scheduling
algorithm with partial information. It is trying to reduce the delays
happening between the communication agents. This model can increase
distributed simulation performance by minimizing is communication loads
[3].
Task allocation is done in variety of ways. The multiagent system is
organized in network structure manner that can interact with its neighbour
nodes to increase computation speed and to decrease the communication
delays between agents. Through, Semi-Supervised approach with load
balancing is providing the good results compared to other methods. In full
supervised allocation method can reduce the task allocation based on the
probability of task allocation in future. The comparative analysis of both
locality and centrality can give alternative benefits with communication
costs and load performance [4].
IJCSBI.ORG
Pipelined computation helps in giving the necessary information and it has
been passed from one system to other systems. The pipelined computation
is implemented in both centralized and distributed environment. The
distributed adaptive scheduling algorithm provides the better load balance
compared to centralized systems. The distributed, heterogeneous and shared
nature of large system gives more results to complete the work within
stipulated amount of time [5].
Load balancing is well handled in agent based distributed system. Here they
are tried to reduce the load from heavyweight to light weighted loads. Credit
based system is used to handle overload that may happens in the
environment. Through regression analysis method we can find out the
system information can find out parameters Location credit (LC) and Load
balancing coordinator (LBC), that decide when to migrate the load between
hosts The overall complexity of this approach is O (n2) [6].
In another approach they are presented the load balancing in game theory
point of view. Workload is distributed using round robin algorithm (it
allocates equal time slice to execute each task). The local interaction with
neighbours is the way to reduce the communication delays. The model
which followed here is to assigns the job each node with equal amount of
capacities to run. If the node finds overload it tries move the work to any
other node with load is very less by giving some payments. Dynamic load
balancing is achieved through local interactions itself [7].
3. PROPOSED WORK
3.1 Resource Allocation for Distributed Environment
Before getting detail into our proposed work, let see some of the problems
which might occurs in airspace management. In airspace management, we
have many numbers of airplanes who takes the journey in particular region.
But here, the unmanned little air planes need a protocol to negotiate the
route or in software applications where the multiagent system must suggest
the user possible alternative reorganizations of the route of many planes.
Regarding the airspace management, an accurate research has been made by
the Agent technology centre that developed AGENTFLY, a multi-agent
system enabling large-scale simulation of civilian and unmanned air traffic.
This system integrates advanced flight path planning, decentralized collision
avoidance with highly detailed models of the airplanes and the
environment. The AGENTFLY project is still maintained and its authors
are continuously improving it in many ways.
And also let us the problem of load balancing in distributed systems. The
distributed systems processes large amount of data by decomposing its work
into smaller segments and it gets completed. At each system we have certain
limit for the processing the number of tasks. So we need to distribute the
IJCSBI.ORG
workload among the systems properly and maintain the system from load
imbalance state. Each system must be operated with equal amount of
workload. The allocation of jobs is based upon the resource requirement
level. The allocation must to provide more benefit when we do the
allocation process as well as the reallocation process. It helps in faster
execution of jobs submitted. And the resource allocation in distributed
environment approach gives more benefits in getting maximum resource
usage level.
So the implementation of airspace management is possible to do with kind
of distributed environment. The multiagent concept is an easiest approach to
make the negotiation between the airplane (Agents) systems. If we want to
say accurately, it provides more advantage over the communication and for
further operations.
IJCSBI.ORG
1. We start off with the initial allocation Z0; this is the initial allocation
of resources to agents.
2. We define the current allocation to be Z0 with 0 side payments.
3. Any agents is permitted to put forward a deal (Z, Z, p) as a proposal
where Z is the current allocation. If all agents to that deal (i.e. are
satisfied with the allocation Z and payments p) and the relevant
termination condition has been satisfied, then negotiation terminates
and the deal Z is implemented with payments p.
4. If every agent to the deal but the termination condition is not reached,
then the current allocation is set to Z with payments p, and go to
step3.
5. If some agent is unsatisfied with deal, then the current allocation
remains is unchanged and go to step3.
3.3 Comparsion Mechanism for Finding theCollision State
The system which is prevents from collision state is started. All the airplane
systems which is moving state, starts signalling to the base systems. The
base system is having some algorithm for finding the collision state. The
algorithm for finding the collision state is described below with pseudo
code. The comparator interface is always keep checks the condition
whenever the airplane is in signalling state (Airplane system is in moving
state).
Repeat
Flag = false
Count++
If A [i-1].speed==A[j].speed then
End if
IJCSBI.ORG
End if
End if
End for
List ();
It.previous
End for
End procedure
At this juncture, the loop is executed infinitely till the touches the condition,
there is no airplane is in Service Agents region. It predominately repeats this
process to avoid the collisions. The list A is continually getting updated and
traversed with each and every agent, to detect the airplane colliding state. If
the loop is traversed once, it activates the handler and manger to continue
further process.
4. SYSTEM ARCHITECTURE
In this section, we discuss the architecture of negotiation based resource
allocation system. The main reason behind this architecture is to reduce the
conflict that arises between the airplane systems.
At the initial stage, service agent (which is present in base systems) is
started with all the components which are required to manage all the
operations. It is considered as the basement system, which keep tracks the
airplane system. The base system is consists of three components namely,
Process Request, Service Handler, Manager. Each component works
together to handle the data which is generated from the airplane systems. It
decides whether the airplane what has to do when the uncertain event occurs
at air plane systems. And it is capable of handling any number of flight
systems which travels in its zone. So whenever the airplane starts it shares
the GPS information with the basement system. Service Agent stores the
airplane system location information in its database. At each and every
second, the airplane GPS information is updated in service agent database.
Every time the data about each flight is got synchronized to take more
optimized decisions in avoiding the collisions. The updating information in
database is happened through the process request component only.
IJCSBI.ORG
5. EXPERIMENTS
In this section, we demonstrated this approach with real time application of
aircraft traffic control system. Here we have considered the airplane
rerouting progression. In aircraft traffic control system, each aeroplane is
considered as autonomous system (agents), which is travel in airspace with
generating signals. And it continually makes interaction with basement
IJCSBI.ORG
system to avoid collisions. This system is implemented with distributed
multiagent system JADE (Java Agent Development Framework). JADE
provides the distributed agent platform. The agent platform can be split
among several hosts. Only one Java application, and therefore only one
JVM, is executed on each host.Agents are implemented as Java threads and
live within Agent Containersthat provide the runtime support to the agent
execution. The computer is present at each airplane system helps to load and
run the agents. Agents extract the system information (i.e. airplane
information) and then it properly sends its signal information to basement
systems.
The system which is present at middle named as Service Agent and also
considered as basement system, and its keep on receiving the signal from
airplane systems. It not only manages all airplane system information and
also it does the route allocating process. It keep tracks each airplane to
avoiding clashes, and to maintain respecting constraints on the path they can
use, time to make a decision, distance they need to maintain between them
and so on.
Here we considered airspace as resource which is to be used by the planes
to make the journey. All the airplane system (agents) information is got
synchronized with service agent in the form of messages. The reason behind
synchronizing is to detect the location of planes. At every time it updates
the information about airplane system in the servicing agent system.
It always checks the algorithmic conditions for collision occurrence. The
condition for finding collision state is comparing the distance and height
between the planes including with its speed. If it satisfies the collision state
condition, servicing agent informs to corresponding agents. For instance,
the distance difference between the airplane systems is less than 25miles is
considered for the collision and informed. Negotiations are fully handled by
Manager Component. Then corresponding agents receives the INFORM
message and immediately it requests the servicing agent for route clearance.
Here the purpose of negotiation comes between the agents. The servicing
agent responds with REQUEST message contains the proposals. The
proposal includes system (route) information to modify and side payment
information. The PROPOSE message may contains either
ACCEPTED/REJECTED conditions.
If the agent accepts the proposals then it has to make the payment and
process the reroute information for the clearance. After modifying it system
information it continues with its journey. The route information including
height and speed information it has to maintain till gets away from
conflicting airplanes. If the agent rejects the proposals, then servicing agent
responds with another PROPOSE message. It is the final proposal message
IJCSBI.ORG
and it must be accepted by the airplane agent and to make the payments.
Because reject again and again it never the benefit of this maximal usage.
The benefit behind the both proposals is somewhat advantages to either
service agent or airplane system. But if agent accepts the proposal at first
gets more advantage and the agent rejects the proposal gets less benefit
only. Consider we have many number of airplanes may enters into the
condition of collision. It has been well handled by the process request and
service handler components. At this point the servicing agent is standing as
more reliable and available one to manage any number of airplane systems
data.
6. RESULTS
The system implementation is made with interconnection of aircraft systems
(i.e. Remote system) with service agent. At each system the airplane system
information is get loaded. After the start up, it sends current aeroplane
system location information to service agent and the corresponding plane
information are updated in service agent database. Basically the service
agent keeps tracks the aeroplanes for collision, so it must to have updated
airplane location information. Since the airplane is moving object, so we
cant predict the data exactly at all the intervals.
IJCSBI.ORG
variation. It gives what we already defined in case of 100 systems. The
results is slightly may vary due to load performance characteristics. Using
this approach get more benefits in low memory consumption, because if
airplane reaches its destination, related about the airplane system state is get
removed the service agent. So there is no pointless to maintain information
about the airplanes, after the end of the journey.
This experiment provides good results with certain number of systems. We
connect as many number of service agent which we need when service
reaches maximum capability. So here, we have considered one service agent
for each sector or region. So we concluded the airplane systems may
contact its nearest service agent to get the service. With this formation of
several service agents we dont get any unreachable conditions or not able
to connect situation. Gradually, we can get better performance compare to
single service agent.
For instance, at the figure 2, we put limits the number of airplane systems
for each service agent to connect. At first instant, we are connected 50 to
150 at one service agent. And if requests go beyond 200, it activates another
service agent for further requests processing of airplane system. Based on
the requirements, we can increase the service agents to get better
performance. But we dont have that much problems, because it maintains
the airplane systems information without redundancy.
7. CONCLUSION
The simulation experiment demonstrates the effectiveness of this approach.
Our on-going work includes distributed quality optimization for effectively
handling the conflicts and error handling mechanisms. As well as
information exchange mechanisms among the agents are handled well. We
can use this approach for load balancing between the servers and resource
allocation. So we have the possibility of sharing computer resources in
networking system. It helps to negotiate for obtaining the CPU, RAM,
PRINTER, and other computing resources. The main advantage behind this
distributed multiagent system approach is the better way to navigate the
workload if it reaches maximum limit. And it is easier to maintain the
location information in different system (i.e. in its corresponding region of
airplane systems), with replication of servicing agent in each sector or
region of traffic control system. And the distributed multiagent system
provides environment to handle any kind of failure that happens between
the systems.
It is more applicable in load balancing between the servers. Most probably it
increases the resource usage level at computing environments. The most
important thing with this application is airplane systems and basement
IJCSBI.ORG
systems must have to proper devices to make communications. At any point
if we miss or lose signal information, we got severe problem.
8. REFERENCES
[1] Yichuan Jiang, Member, IEEE, and Jiuchuan Jiang, Contextual Resource
Negotiation-Based Task Allocation and Load Balancing in Complex Software
Systems, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED
SYSTEMS, VOL. 20, NO.5, MAY 2009.
[2] Robson E. De Grande, Azzedine Boukerche, Dynamic balancing of
communication and computation load for HLA-based simulations on large-scale
distributed systems, Journal of Parallel Distributed computing 71 (2011) 40-52.
[3] Qingqi Long, Jie Lin, Zhixun Sun, Agent scheduling model for adaptive dynamic
load balancing in agent-based distributed simulations, Simulation Modelling
Practice and Theory 19 (2011) 1021-1034.
[4] Yichuan Jiang AB, Zhaofeng Li C, Locality-sensitive task allocation and load
balancing in networked multiagent systems: Talent versus centrality, Journalof
Parallel Distributed computing 71 (2011) 822-836.
[5] IoannisRiakiotakis A, Florina M. Ciorba B, Theodore Andronikos C, George
Papakonstantinou A, Distributed dynamic load balancing for pipelined
computations on heterogeneous systems, Parallel Computing 37 (2011) 713-729.
[6] Maha A. Metaweia B, Salma A. Ghoneim A, Sahar M.Haggaga, Salwa M. Nassar
B, Load balancing in distributed multiagent computing system, Ain Shams
Engineering journal (2012) 3,237-249.
[7] Sameena Shah A, Ravi Kothari B, Convergence of the Dynamic Load balancing
problem to Nash equilibrium using distributed local Interactions, Information
Sciences 221 (2013) 297-305.
IJCSBI.ORG
ABSTRACT
Agriculture is a source of livelihood of majority Indians and has great impact on the
economy of the country. In a country like India, where climatic conditions vary
substantially and irrigation facilities are poor. Agriculture is timely and sufficient supply of
water. Water pumps are crucial in agriculture where electricity is indeed. The frequent,
intermittent, low voltage supply of power to the agriculture sector has caused problems to
the farmers who are spending their time monitoring the supply of power without which no
progress of their work. The power supply with frequent power cuts have not only lowered
the efficiency of farmers but also have led to the frustration of the farmer to give up
agriculture and move to urban areas for better prospects in the globalized world. In this
paper we presented a system which shows, how mobile communication can benefit
millions of farmers in rural India by providing a solution for the irrigation problems caused
by intermittent electrical power supply. Information is exchanged in form of
messages/miscalls between the system and the user cell phones. The system is based on
ATMEGA32 micro-controller and includes protection against fluctuations in power supply.
For measuring time and temperature RTC DS1307 and DS18S20 are used. By using this
system the hardships of farmers relating water distribution can be relieved.
Keywords
AT command supporting GSM mobile phone, ATMEGA32 Micro controller, Relays,
Sensors, LCD for monitoring the current reading of all the parameters.
1. INTRODUCTION
Even in the modern era of industrialization, agriculture plays a very
significant role in the overall socio-economic development of India. India
has an agriculture based economy. 43% of Indias territory comes under
agricultural lands. Agriculture along with other related fields like forestry
and logging provides employment to 52% of Indias population. Agriculture
also accounts for 8.56% of the countrys total exports. According to a
survey made in 2007, agriculture accounts for 16.6% of Indias Gross
Domestic Product. Hence, it is agriculture that is the most influential field
as compared to others in India. This importance on agriculture leads to an
emphasis on better agricultural practices. The underground water level is
slowly falling down and forests are being cut which reduces the rainfall as
well. With increasing area available for cultivation and the need for
increasing the productivity from the farm land, there is a growing need for
IJCSBI.ORG
electrical energy for irrigation. The generation of electricity is not growing
proportionately to the demand.
The supply to agriculture is limited to few fixed hours throughout the day.
In a sample survey of village Komarolu, located at distance of 17kms from
Giddalur (Taluka in Prakasam District, Coastal Region, Andhra Pradesh
State, India), it was observed that 3-phase supply is normally available for 7
hours a day from 2.00 am to 9.00 am for a week and from 11.00 am to 6.00
pm for next week and changes alternately. Due to increase in demand of
electricity the schedule given was not followed and sometimes power given
at night times and fluctuations in voltage level leads to motor damage[1]. So
farmers, after carrying strenuous physical activities in farm during day, have
to return back to their farms in night to carry water distribution using 3-
phase motor pumps. Agriculture receives power mostly during mid night
(off-peak) as this reduces the cost of electricity supply for the transmission
and Distribution Company. The farmers have to be on their guard all the
time due to the unpredictable nature of supply of electrical energy. And the
farmers have to switch on their motor after electricity supply resumes. The
reduced amount of yielding, man power wastage, and idle state of
equipment can observed in its results.
Due to the fast development in tele-communication technologies, it is
believed that wireless solution for irrigation in agriculture. This system has
fully utilized wireless sensor network, Global System for Mobile
Communication (GSM) and short message service (SMS)/missed call to
carry out data from the sensors to computers or directly alert the farmers
through their mobile phone and to control the remote watering process [2-
4], also through the mobile phone. This practice eliminates the use of wired
technology, improves old method of collecting data in farming areas and
allows farmers to control their sprinklers remotely. Also, It has been
observed that source of electrical energy generation is slowly depleting
using solar energy. We are going to discuss an example of how the mobile
technology can benefit millions of farmers by providing a solution for the
irrigation problems. Simple cell phones having just voice call and
messaging facility or cell phones with non-working display can be easily
adapted for remote control applications.
2. SYSTEM DESCRIPTION
A system is developed for optimum water distribution in the fields through
motor pump. The crop yield is maximized to a great extent by providing
proper amount of water at suitable time intervals based on climatic
conditions. The system offers attractive features like automatic control
based on parameters specified through keyboard /SMS/ number of miscalls;
provides protection against single phasing, over-current, over-voltage, dry
IJCSBI.ORG
running and probable bearing faults; alerts users in case of abnormal
conditions like power failure, dry-running, etc. and provides audible
indication through buzzer/ miscall on completion of task.
The figure 1 shows the Block diagram of the scheme. Using keyboard the
parameters of the system can be set or received in form of SMS/number of
miscalls in specified duration from user mobile through serial cable
connected to control system cell phone (Model Nokia 6610). Based on
commands received microcontroller system sends signals to switch on / off
motor through Starter using relays controlled by its ports. Three phase 5
hp,7 hp,10.5 hp induction motor working on Direct-on-line Starter are
chosen for agriculture purpose.
3 PHASESUPPLY
R Y B
CELLULAR
USER LINK ATMEGA32 STARTER
SYSTEM
MOBILE MICROCONTROLLER (MOTOR
MOBILE
BASED SYSTEM CONTRACTER)
IJCSBI.ORG
extracted and checked with predetermined format, which includes
password, desired time or ON/OFF commands or status query.
Microcontroller carries out for the valid control message. In this application,
any incoming SMS message is directly routed to micro-controller (TE) and
any outgoing text message is directly sent by micro-controller to designated
cell phone number without being stored in control system cell phone
memory. As a result, phone memory is not inundated with messages in spite
of many messages being transferred.
2) Miscall Approach: The operational cost of communication between user
and control system cell phones is further reduced by using concept of
miscall where in no charges are incurred by using only ring signal for
information transfer. Miscalls are treated in two situations one is calling
party disconnects after receiving ring tones and second one when called
party does not respond to call within mentioned 5 minutes. The system cell
phone is designed to send specified number of miscall(s) within five
minutes duration to user cell phone to report various conditions as shown in
Table 1. Similarly, user cell phone sends commands to system cell phone by
making specified number of miscalls as shown in Table 2.
Table 1. Messages based on missed calls from system cellphone
No. of missed calls in 5 min. Message indication
01 No Power
02 Power failure
03 Resumption after normal conditions
04 Task completion
05 Probable motor faults/dry running
IJCSBI.ORG
command is used in recognizing particular saved recipient. Micro-controller
checks incoming number with user cell phone when reception of unsolicited
code RING along with CLIP occurs. Micro-controller waits for five minutes
duration to check total number of calls and carries out specified task if
match founds. Similarly, microcontroller carries out number of voice calls
from control system cell phone to user cell phone within five minutes time
duration using ATD command. And SMS mode activated when the BUSY
or ERROR occurred while making voice call.
3. MICROCONTROLLER SYSTEM
AT Mega32 microcontroller has RISC architecture with 32 KB of in-system
programmable Flash, 1k E2PROM, 2k SRAM, 32-bit General purpose I/O,
8channel 10-bit ADC, TWI, USART, SPI, JTAG interface support etc [7-8].
Ponyprog software was used for flash programming [9]. The software was
developed in C language using GCC compiler.
3.1 Interfacing
Interfacing diagram of micro-controller system is shown in Fig. 2. 8-bits of
Port A are configured as analog inputs ports. PA0-PA2 bits monitor the
present values of supply phase voltages. Water level of well indicated by
port A 3 and 4 pins while PA5 to PA7 are used to sense whether water has
reached the desired final destination of the regions. PB0-PB5 pins are
connected to 2 16 characters LCD display in 4-bit data length mode. Two
relays are controlled by upper 2 bits of Port B. Start (green) pushbutton of
starter for automated starting of the pump from micro-controller board is
connected to one relay while other relay is connected in series with stop
(red) pushbutton for stopping the motor pump from micro-controller. Upper
4 bits of Port C and upper 4 bits of Port D are used to interface 4x4
keyboard matrixes. DS1307 (RTC) is chosen for implementation of timing
applications. It is connected through TWI interface (I2C) i.e. PC0 (SCL)
and PC1 (SDA) pins. Two temperature sensors (DS18S20) are used having
single wire interface for connectivity. PC2 bit is used for single-wire
interface. Internally RxD (PD0) and TxD (PD1) are connected to 9-pin
RS232 female connector through MAX 232 IC for TTL-
RS232Csignaltranslation.
3.2 Real Time Clock
The DS1307 serial real-time clock (RTC) is a low power, full binary-coded
decimal (BCD) clock/calendar [10]. Address and data are transferred
serially through an I2C, bi-directional bus (TWI). The clock/calendar
provides all timing information from seconds to years. With the help of
keyboard and LCD display, present date and time are written into
corresponding internal memory locations of this IC using I2C protocol.
IJCSBI.ORG
Whenever on-time duration for pump is specified, the two registers of AT
Mega32 are used to store time duration in minutes and hours.
R PD7
VOLTAGE 4X4
Y ADC0 (PA0) PD4
SENSING
B BLOCK ADC2 (PA2) PC4 KEY BOARD
PC7
XTAL1
XTA PB5 D4
C1
L1 PB4 D5
PB3 D6 LCD
PB2 D7 DISPLAY
C2 PB1 ENIN
XTAL2 PB0 RS
GND
XTA
L2
Figure 2. Microcontroller system interfacing
GND
The pump is switched on through relays using ports of micro-controller.
After passage of every minute (known through RTC) relevant registers of
microcontroller are updated if normal conditions exists and when their
values reach null, by using PB7 bit the pump is switched off. The
occurrence of abnormal conditions like unbalanced phase voltages, dry-
running, etc. causes pump to be switched OFF and the counting is
temporary stopped and is resumed on restoration of normal conditions. Thus
it is ensured that proper quantity of water is distributed by keeping pump
ON for specified time duration under normal conditions and user is
informed about restoration of normal conditions through miscalls.
3.3 Phase Voltage Measurement
In order to measure phase voltages, three transformers of equal ratings (6-0-
6) are used to step down voltage. These voltages are converted into
appropriate dc levels at analog inputs of micro-controller. Phase voltages
IJCSBI.ORG
are read at regular intervals by micro-controller. The values of phase
voltages are compared with one another. If the result of any comparison
exceeds specified value, signal is sent to switch off the pump along with
error message indicating unbalanced phase voltage condition and conveying
this information to user cell phone through miscalls. Internal 10-bit ADC of
micro-controller is configured to work in left justified format and only most
significant 8-bit values are used for comparison.
3.4 Temperature measurement
There has been tremendous research in fault diagnosis and protection
schemes for induction motor [11]. The basic over-current protection for
motor is provided by bimetallic strip of starter. Maximum reliability ensured
by mounting temperature sensor on body of motor and another temperature
sensor is mounted at a suitable location to measure ambient temperature.
Whenever temperature difference between the two sensors exceeds
specified safety limit (250C), signal is sent to switch off pump along with
error indication to LCD display and conveying miscalls to user cell phone to
indicate probable fault occurrence. This arrangement ensures that
catastrophic event like burning of motor due to any fault like over-current,
bearing blockage and insulation failure are avoided. And preventive
maintenance is carried out at substantially lower cost. The chosen
temperature sensor is DS 18S20 manufactured by Dallas Semiconductor
(Maxim) [12-13].It has operating temperature range of 55oC to +125oC. A
major advantage associated with this sensor is the availability of output
directly in digital form obviating the need of analog to digital conversion.
Moreover, this sensor provides inherent error-detection capability through
CRC technique.
3.5 Water Level Sensor
In order to prevent dry running of motor and allow automatic restart of
motor when sufficient water level is regained, three wires are inserted into
the well. One wire (GND) is inserted at bottom of well while second wire is
adjusted just above foot-valve of the suction pipe of motor pump (LL) and
third one at suitable level above second wire (HL). Microcontroller switches
OFF the motor and sends miscalls indicating empty well (dry running)
conditions whenever water falls below LL level. Whenever water rises
beyond HL level and sends miscalls indicating resumption of task, the
micro-controller switches ON the motor again. The flexibility of system can
be increased by using water level sensor and prevents the damage of motor.
IJCSBI.ORG
Figure 3. Implementation
3.6 Water Reach Sensor
There are two approaches for water distribution in this system. One method
is to specify the ON time duration of pump and second approach is to
specify the area of water distribution before stopping motor. First approach
is more suitable for sprinkle-based irrigation system while second approach
is chosen for ground-level water irrigation. For ground level water
irrigation, two wires are extended to extreme end of region where water is
to be reached. In this scheme, three such regions are presently supported
and one end of wire of these regions (R1, R2, R3) are connected to PA5,
PA6 and PA7 port bits of microcontroller using pull-up resistors of 100k
while other ends are connected to GND.
IJCSBI.ORG
productivity of food grains and bring prosperity to this hardworking
population ensured with the usage of proposed system.
5. REFERENCES
[1] Ilonen J. Kamarainen J. K, Lindh T, Ahola J, Kalviainen H andPartanen,
Diagnosis tool for motor condition monitoring. IEEE Trans. Ind. Application,
Vol 41, No. 4, 2005 pp. 963-971.
[2] KuniakiUmino, Yasuhiro Ohyama, Jin-Hua She and Hiroyuki Kobayashi,
Remote Controlled Embedded System, 4th China-Japan International
Workshop on Internet Technology and Control Applications, Hunan, China, 21-
26 October, 2005.
[3] A Weaver J Luo, and S Zhang, Monitoring and Control using Internet and
Java, Proc. 25th Annual Conference on IEEE Industrial Electronics IECON99,
Vol. 3 , pp 1152-1158, 1999.
[4] Trohandl C, Proske M &Elmeureich W, Remote Target Monitoring in
Embedded System Lab courses using a Sensor Network, Proc. 32nd Annual
Conference on IEEE Industrial Electronics IECON 2006, 6-10 Nov 2006, pp
5433-5438.
[5] AT Commands Set for Nokia GSM and WCDMA products,Version 1.2, July
2005, available online: http://forum.nokia.com.
[6] ETSI TS 127 007 V5.3.0 (2003-03) Digital cellular telecommunications system
(Phase2+); Universal Mobile Telecommunications System (UMTS); AT
command set for 3G User Equipment (UE) (3GPP TS 27.007 version 5.3.0
Release 5, available online: http://www.etsi.org.
[7] ATMELAVRATMega32 Datasheet, available online:
http://www.atmel.com/dyn/resources/prod_documents/2503S.pdf.
[8] Richard Barnett, Larry OCull and Sarah Cox, Embedded C Programming and
Atmel AVR, Delmar-Cengage Learning India Pvt. Ltd., 2007 Edition (India).
[9] Ponyprog software, available online: http://www.lancos.com/
[10] DS1307 64 x 8, Serial, I2C Real-Time Clock Datasheet, availableonline:
http://pdfserv.maxim-ic.com/en/ds/DS1307.
[11] Benbouzid, M.E.H, A review of induction motors signature analysis as a
medium for faults detection, IEEE Trans. Ind.Electronics, Vol 47, No.5, 2000
pp. 984-993.
[12] DS18S20 High-Precision 1-Wire Digital Thermometer, available online:
http://pdfserv.maxim-ic.com/en/ds/DS18S20.
[13] Overview of 1-Wire Technology and Its Use, available
online:http://www.maxim-ic.com/an1796.
IJCSBI.ORG
ABSTRACT
Photographs are considered to be the most powerful and trustworthy media of expression.
For a long time, those were accepted as proves of evidences in varied fields such as
journalism, forensic investigations, military intelligence, scientific research and
publications, crime detection and legal proceedings, investigation of insurance claims,
medical imaging etc. Today, digital images have completely replaced the conventional
photographs from every sphere of life but unfortunately, they seldom enjoy the credibility
of their conventional counterparts, thanks to the rapid advancements in the field of digital
image processing. The increasing availability of low cost and sometimes free of cost image
editing software such as Photoshop, Corel Paint Shop, Photoscape, PhotoPlus, GIMP and
Pixelmator have made the tampering of digital images even more easier and a common
practice. Now it has become quite impossible to say whether a photograph is a genuine
camera output or a manipulated version of it just by looking at it. As a result, photographs
have almost lost their reliability and place as proves of evidences in all fields. This is why
digital image tamper detection has emerged as an important research area to establish the
authenticity of digital photographs by separating the tampered lots from the original ones.
This paper gives a brief history of image tampering and a state-of-the-art review of the
tamper detection techniques.
Keywords
Digital Image, Tampering, Splicing, Cloning, Steganography, Watermarking .
1. INTRODUCTION
Today, digital images not only provide forged information but also work as
agents of secret communication. Users and editing specialists manipulate
digital images with varied goals. Scientists and researchers manipulate
images for their work to get published; medical images are tampered to
misrepresent the patients diagnostics, photo and yellow journalists use the
trick for creating and giving dramatic effect to their stories, politicians,
lawyers, forensic investigators use tampered images to direct the opinion of
people, court or law to their favour and so on. Hence, distinguishing the
original images from faked lots and establishing the authenticity of digital
IJCSBI.ORG
photographs have become some of the greatest challenges of the present
time. Retouching, splicing, copy-pasting, cropping, cloning etc are some of
the popular techniques used for image manipulations. In additions to these
techniques there also exists a wide range of Steganographic methods those
use this popular digital media for secret data transmission.
IJCSBI.ORG
2.1 Conventional Vs Digital Image Tampering
Digital Image tampering is very much similar in nature to that of the
conventional photo fakeries where the conventional photographs are
replaced by their digital counterparts. One of the key characteristics of a
digital image is; it is easier to modify or manipulate a digital image in
comparison to its conventional counterpart. The process of digital image
tampering have been made even more simple and easier, thanks to the
availability of low cost (or sometimes free of cost) and powerful image
editing software nowadays.
History of digital image tampering can be dated back to the late twentieth
century to support political propagandas [3]. According to the Wall Street
Journal, even in 1989, out of all the colour photographs published in United
States, 10% were digitally altered or retouched! [4] An article in the journal
Nature reports on the impact of digital photography and image-manipulation
software in science. Mike Rossner, editor of the Journal of Cell Biology,
estimates that roughly 20% of accepted manuscripts to his journal contain at
least one figure that has to be remade because of inappropriate image
manipulation. And, in 1990, 2.5% of allegations examined by the U.S.
Office of Research Integrity, which monitors scientific misconduct,
involved contested scientific images. By 2001, this figure was nearly 26%
[5]. We suspect, as on date, more than 90% of commercially captured and
published digital photographs, if not tampered with some ulterior motive,
are at least retouched to improve the look, colour, contrast or background.
IJCSBI.ORG
Figure 2c. This iconic portrait of U.S Figure 2d. The horse handler had been
President Lincoln is a composite of airbrushed from the original
Lincolns head and the Southern photograph of Benito Mussolini to make
politician John Calhouns body [9]. him look more epic and heroic [9].
IJCSBI.ORG
to invisible planes, the manipulation techniques can be classified as image
tampering or image Steganography. Image tampering again can be
performed either by making changes to the context of the scene elements or
without the change of the context. In the second case, the recipient is duped
to believe that the objects in an image are something else from what they
really are but the image itself is not altered [11]. Figure.3 shows such an
image published in November 1997 after 58 tourists were killed in a
terrorist attack at the temple of Hatshepsut in Luxor Egypt in which a
puddle of water were digitally altered to appear as blood flowing from the
temple [12].
IJCSBI.ORG
3.1 Digital Image Tampering Vs Digital Image Steganography
Tampering and Steganography, though both the techniques manipulate a
digital image from its original capture but, they differ from each other at
their vary purposes. One manipulates an image for the purpose of hidden
communication whereas the other manipulates it to fake a fact and mislead
the viewer to misbelieve the truth behind a scene [18][19].
Figures.2c and 2d show two different tampered images and their original
counterparts and figure.5, given below, shows a Stego Lena image that has
been created by embedding a piece of hidden information into the original
Lena image. The differences between the pairs of tampered images and their
original ones are clearly visible where as there exists no visible difference
between both the Lena images.
Figure 5. Original Lena image, Stego Lena and the Retrieved hidden Information
IJCSBI.ORG
4. TAMPER DETECTION TECHNIQUES
Digital image tamper detection techniques can be broadly classified into two
groups such as active detection techniques and passive (blind) techniques.
The active techniques require a pre-processing step and suggest embedding
of watermarks or digital signatures to images so as to authenticate them. The
major difficulty with this method is that it requires the watermark to be
embedded at the time of image capturing and for this; all digital cameras
should have a standard inbuilt watermark. Few questions need to be
answered in this regard are: whether all the camera manufacturing
companies will agree to manufacture cameras with some standard
watermarks signals inbuilt into them? Whether the costumers will be ready
to accept the probable degradation in the image quality due to the embedded
watermark? What about the processing time and complexity that involves
the embedding and retrieval of the watermark? Most importantly how to
deal with all those millions of pre manufactured digital cameras already
available in market as well as with users and can false watermarking be
completely ruled out? All these questions make the image authentication
and active tamper detection technique a remote possibility in practice. On
the other hand, the passive detection techniques do not require pre
embedding of any watermark or digital signatures to the images and hence
are commonly used for the purpose of tamper detection in digital images.
The fragile watermark though has good localization and security properties
but cannot differentiate forgeries such as addition or removal of parts of
image, from the innocent image processing operations such as brightness or
contrast adjustments. J. Fridrich [23] solves this problem through his new
hybrid image authentication watermarking scheme that combines both the
IJCSBI.ORG
fragile and a robust watermark. The hybrid watermark can be used to
accurately pinpoint changes as well as distinguish forgeries from other
innocent operations. This work is further improved and a secured hybrid
method [24] is presented in by Deguillaume and Voloshynovskiy. Several
researchers worked in these active tamper detection and authentication
schemes and developed a number of fragile, semi-fragile, robust, public as
well as private key based watermarks for copyright protection,
authentication and tamper detection [25-29] out of which, some either failed
to effectively address the problems or sacrifice tamper localization accuracy
of the original methods while few of them were proved to be highly efficient
and effective. However, the hierarchical digital watermarking method
proposed by Phen et.al is a simple but efficient method that not only
localizes and detects tampering but also is capable of tamper recovery with a
little degradation to the image quality. The precision of tamper detection
and localization of this method is 99.6% and 100% after level-2 and level-3
inspection, respectively. The tamper recovery rate is better than 93% for a
less than half tampered image [22].
IJCSBI.ORG
image will likely be compressed and because of a probable use of the
smoothing or other post processing operation, the segments may only
match approximately not exactly. The authors in this paper give two
different detection schemes: exact and robust matching those successfully
detects duplicate regions in an image even when the images are post
processed following a copy-paste. Methods based on blur movement
invariants and DWT, SVD, PCA based sorted neighbourhood approaches
are suggested in [32][33][34] for robust detection of cloned regions in an
image.
IJCSBI.ORG
image splicing by thresholding transition region measures of DWT
coefficients of a suspicious image in chroma spaces. Only the low frequency
sub-band of the DWT of the suspected image is extracted to reduce the size
of the image and improve the performance [39]. Because splicing combines
image parts from multiple images so, careful study of the lighting conditions
can provide a better clue on detection of these types of manipulations.
6. REFERENCES
[1] The Oxford dictionary online. http://oxforddictionaries.com
[2] P Lester. Photojournalism: An Ethical Approach. Lawrence Erlbaum Associates.
91-92; 1991.
[3] H. Farid, A Survey of Image Forgery Detection, IEEE Signal Processing
Magazine, 26(2):16-25, 2009
[4] C. Amsberry, Alterations of photos raise host of legal, ethical issues," TheWall
Street Journal, Jan 1989.
[5] http://www.fourandsix.com/photo-tampering-history
[6] http://en.wikipedia.org/wiki/Kerry_Fonda_2004_election_photo_controversy
[7] http://www.snopes.com/photos/politics/kerry2.asp
[8] http://www.famouspictures.org/mag/index.php?title=Altered_Images#Tourist_of_
Death
[9] http:// izismile.com/ 2012/02/08/ historic photographs_ which are known _to _be
_altered 13_pics.html
[10] http://samvada.org/2012/news-digest/congress-mla-arrested-for-tampering-rss-
chief-mohan-bhagwat-photo
[11] Kusam, Pawanesh Abrol and Devanand, Digital Tampering Detection
Techniques: A Review, BVICAMs International Journal of Information
Technology, Vol.1, No.2,
[12] Giuseppe Messina, "DCT Based Digital Forgery Identification", Presented to
Interpol Crime Against Children Group, Lyon, 25 March 2009.
[13] Sangwon Lee, David A. Shamma, Bruce Gooch, Detecting false captioning using
common-sense reasoning, Digital Investigation, Elsevier, 2006:S65-S70.
[14] F. Cutzu, R. Hammoud, and A. Leykin, Estimating the degree of photorealism of
images: Distinguishing paintings from photographs, in Proc. IEEE Conf.
Computer Vision Pattern Recognition, Madison, WI, 2003.
IJCSBI.ORG
[15] Siwei Lyu and Hany Farid, "How Realistic is Photorealistic?, IEEE
TRANSACTIONS ON SIGNAL PROCESSING, VOL. 53, NO. 2, FEBRUARY
2005 845-850.
[16] V. Athitsos, M. J. Swain, and C. Frankel, Distinguishing photographs and
graphics on the world wide web, in Proc.Workshop Content-Based Access Image
Video Libraries, San Juan, PR, 1997.
[17] http://www.lostateminor.com/2013/04/23/nathan-walshs-photorealistic-paintings-
of-america/
[18] http://www.autodesk.com/eng/etc/fakeorfoto/about.html
[19] Patchara Sutthiwan, Yun-Qing Shi, Jing Dong, Tian-Tsong Ng, New
Developments in Color Image Tampering Detection, 978-1-4244-5309-2/10,
IEEE, Pp3064-3067, 2010.
[20] Minati Mishra, A.R. Routray, Sunit Kumar: High Security Image Steganography
with modified Arnolds cat map, IJCA, Vol.37, No.9:16-20, January 2012.
[21] Yun Q. Shi, Chunhua Chen, Guorong Xuan, and Wei Su, Steganalysis versus
Splicing Detection, International Workshop on Digital Watermarking, December
2007.
[22] Phen Lan Lina, Chung-Kai Hsiehb, Po-Whei Huangb, A hierarchical digital
watermarking method for image tampers detection and recovery, Pattern
Recognition, Elsevier, Pp. 2519-2528, 2005.
[23] Jiri Fridrich, A HYBRID WATERMARK FOR TAMPER DETECTION IN
DIGITAL IMAGES, Fifth International Symposium on Signal Processing and its
Applications (ISSPA) 1999.
[24] F. Deguillaume, S. Voloshynovskiy, T. Pun, Secure hybrid robust watermarking
resistant against tampering and copy attack, Signal Processing, Elsevier, Vol.
83,2003, pp. 21332170.
[25] C.-S. Woo, J. Du, B. Pham, "Multiple watermark method for privacy control and
tamper detection in medical images," in Proc. APRS Workshop on Digital Image
Computing, Australia, 2005, pp.59-64.
[26] Byun, S. C., et al. "A public-key based watermarking for color image
authentication." Multimedia and Expo, 2002. ICME'02. Proceedings. 2002 IEEE
International Conference on. Vol. 1. IEEE, 2002.
[27] P.W. Wong, A public key watermark for image verification and authentication,
in: Proceedings of the IEEE International Conference on Image Processing,
Chicago, IL, October 1998, pp. 455459.
[28] D. Kundur, D. Hatzinakos, "Toward a telltale watermarking technique for tamper-
proofing", in: Proceedings of the IEEE International Conference on Image
Processing, vol. 2, 1998, pp. 409413.
[29] J. Fridrich, Image watermarking for tamper detection, in: Proceedings of the IEEE
International Conference on Image Processing, vol. II, Chicago, IL, USA, October
1998, pp.404408.
[30] Hany Farid, Image Forgery Detection: A survey,IEEE SIGNAL PROCESSING
MAGAZINE , MARCH 2009, Pp: 16-25.
[31] Jessica Fridrich, David Soukal, and Jan Luk, Detection of Copy-Move Forgery
in Digital Images, Proc. Digital Forensic Research Workshop, IEEE Computer
Society, Cleveland, OH, August 2003
[32] G. Li, Q. Wu, D. Tu, and S. Sun, A sorted neighborhood approach for detecting
duplicated regions in image forgeries based on DWT and SVD, in IEEE Int.
Conf. Multimedia and Expo, Beijing, China, 2007, pp. 17501753.
[33] W. Luo, J. Huang, and G. Qiu, Robust detection of region-duplication forgery in
digital images, in Proc. Int. Conf. on Pattern Recognition, Washington,D.C.,
2006, pp. 746749.
IJCSBI.ORG
[34] B. Mahdian and S. Saic, Detection of copy move forgery using a method based
on blur movement invariants, Forensic Sci. Int., vol. 171, pp. 180189, 2007.
[35] Tian-Tsong Ng, Shih-Fu Chang, A MODEL FOR IMAGE SPLICING,
International conference on Image Processing (ICIP), IEEE, Pp. 1169-1172, 2004.
[36] Yun Q. Shi, Chunhua Chen, Wen Chen, A Natural Image Model Approach to
Splicing Detection, ACM Conference07, Dallas, Texas, USA., September 20
21, 2007.
[37] Jing Zhang, Yun Zhao, Yuting Su, A New Approach Merging Markov and DCT
Features for Image Splicing Detection, IEEE, 390-394, 2009.
[38] Detect Digital Image Splicing with Visual Cues, Zhenhua Qu, Guoping Qiu, and
Jiwu Huang, S. Katzenbeisser and A.-R. Sadeghi (Eds.): IH 2009, LNCS 5806, pp.
247261, 2009.Springer-Verlag Berlin Heidelberg 2009.
[39] Michael Zimba, Sun Xingming, Digital Image Splicing Detection Based on Local
Complexity of Local Maximum Partial Gradient of DWT Coefficients,
International Journal of Digital Content Technology and its Applications (JDCTA)
Volume6, Number5, Pp. 1:9, March 2012.
IJCSBI.ORG
ABSTRACT
The wireless network plays an indispensable role in the present communication scenario.
This network functionality has been improved with the advent of clustering mechanism.
The type of nodes which are used in forming these clusters will decide the nature of the
applications the network could be utilized. These nodes can be either IPv4 or IPv6 nodes.
There are various queries need to be resolved while IPv4 or IPv6 nodes have been
considered to devise the clusters. This paper work brings out the discussion on cluster
formation using IPv4 nodes and IPv6 nodes. This study proposes IPv4 cluster creation,
IPv6 cluster creation and also a novel duplicate address detection strategy for stateless
address autoconfiguration. The cluster formation work has been simulated with the help of
OMNET++.
Keywords
W-PAC, IPV4, IPV6.
1. INTRODUCTION
The ad hoc wireless network formation has been based on IPv4 or IPv6
nodes. The IPv4 nodes are configured with the 32bit IP address and IPv6
nodes are configured with 128bit address. The configuration of node with
IPv4 address has almost got saturated in this present scenario. Due to this
non availability of unique IPv4 address the situation drives us to move
towards IPv6 address. The configuration of IPv4 node could be done
manually or dynamically using DHCP server. The IPv6 node can be
configured dynamically using DHCPv6 or stateless auto configuration
without DHCPv6. Generally the IPv6 node can self configure automatically.
The DHCPv6 has been similar to DHCPv4 used in IPv4 nodes
configuration. This study considers the clustering mechanism on ad hoc
scenario network to support scalability and improves the performance of
IJCSBI.ORG
network in terms of bandwidth utilization. The IPv4 or IPv6 nodes are
considered to form the clusters. This work discusses the cluster formation
and issues need to be faced when IPv4 nodes or IPv6 nodes are used to
make clusters.
This paper has been organized as follows. Section 1 deals with introduction.
Section 2 says about the related works. Section 3 speaks about the existing
W-PAC algorithm to form clusters. Section 4 tells about the cluster creation
with the help IPv4 nodes. Section 5 gives out the cluster formation using
IPv6 nodes. Section 6 puts down the experimental results and analysis.
Section.7 signifies the future works on this study. Section.8 ends up with the
conclusion.
2. RELATED WORKS
The existing single parameter cluster formation algorithm k-means has
faced problem in obtaining an efficient cluster in terms of time. The PAC
[1] algorithm has solved that problem. But this algorithm forms clusters at
the initial level and leaves many nodes as non clustered node. It also doesnt
able to form maximum clusters that is possible for the given sample set of
nodes.
The Ex-PAC [2] algorithm, comes under single parametric algorithm, has
been an extension of the PAC mainly to overcome the drawbacks faced by
the PAC. In this algorithm the sample size also high for experimental
results. This also could be able to form the maximum number of clusters
possible for the given sample set of nodes.
The multi-parametric cluster formation algorithm W-PAC [3] forms the
cluster based on weight computation involves multiple parameters. This
method also suggests cluster maintenance strategy which deals with the load
distribution and mobility.
The cluster formation includes essential parameters on creating clusters
dynamically. The PSO-PAC [4] applies the swarm intelligence to device
clusters by considering the essential parameters. This ultimately reduces the
computation time towards optimizing the cluster creation process.
The cluster formation approach could be integrated with the existing well
performing protocols [5] has been realized. The applications [6] show
significance performance hike while the clustering has been incorporated
with the existing protocols at the network layer.
The IPv4 address no longer will serve the world has been realized. The IPv6
address has got the focus in the present scenario. The configuration of
address can be done in two ways. The configuration uses DHCPv6 server
and stateless autoconfiguration [7]. This address can be local link address or
global address. This will be decided based on the application requirement.
But there must be awareness on the restrictions of using the address range
has been essential.
IJCSBI.ORG
The stateless autoconfiguration of IPv6 nodes should have duplicate address
detection mechanism. Since when the nodes move across the clusters there
is a possibility of address duplication. To eliminate this passive duplicate
address detection mechanism [8] has been introduced. This method shows
improved results than passive autoconfiguration for mobile ad hoc
networks.
The purpose of autoconfigured address has been realized while the ad hoc
network has come to existence. The limitations of IPv4 and the need of IPv6
[9][10] have been understood clearly. Having understood the difference
between IPv4 and IPv6 the scenarios will demand the specific way of
addressing the nodes. These works are dealing the autoconfiguration or
manual configuration of IPv4 and IPv6 nodes. The clustering as a
mechanism comes for this IPv4 or IPv6 autoconfigured node to make the
routing simple and also confirms the efficient utilization of bandwidth and
other resources.
3. W-PAC
The clustering mechanism W-PAC (weighted Partitioning Around Cluster
head) forms the cluster based on the weight value of the node. This has three
phases in clustering process. They are cluster creation, cluster head election
and maintenance phase. The cluster creation phase devises the clusters and
cluster head election phase selects the cluster head.
Cluster Creation
(1) Initialize set of nodes as M.
(2) Compute the degree of node Ni.
(3) Deg (Ni) = 0.
(5) If ( i not equal to j)
(4) j = 1.
begin
MD (Ni, Nj) = MOD X2 X1 + Y2 Y1
IJCSBI.ORG
end
(6) Repeat the step 5 until j = M.
Cluster Head Election
(1) Create Clusters using W-PAC cluster creation.
(2) Cluster = Ci, P = Number of nodes in Ci.
(3) j = 1; Ni = (Ut , Vt ); Nj = (Ut1 , Vt1 );
(4) If ( i not equal to j)
begin
If ( Manhattan Dist(Ni,Nj) < Radious )
begin
Compute the Mobility speed of Node Ni belongs to Ci.
T
1
M(Ni) = MOD Ut Ut1 + Vt Vt1
T
t=1
j=j+1
end
end
(5) Repeat the step 4 until j = P.
(6) Assume the energy consumption of nodes E(Ni).
(7) The weight of node Ni computed as follows,
IJCSBI.ORG
4. IPV4
The clusters with cluster head created using W-PAC procedure have been
considered for implementing the clusters using IPv4 nodes. By default all
the nodes are configured with IPv4 address.
192.168.25.2
N2
192.168.25.1 192.168.25.0
192.168.25.4
N4
N1 CH
192.168.25.3
N3
IJCSBI.ORG
algorithm forms the clusters with cluster head. The cluster head node which
runs server process broadcasts the probe message to all the member nodes
belong to the same cluster. The member nodes put the request to cluster
head to configure themselves if the nodes have received the message first
time. The server periodically probes the client node to have the member
nodes under its affiliation.
Client DHCPv4
Request
Server
Reply (Configuration)
DHCPv4
Client Probe
Server
ACK / No ACK
Figure 2. Communication between Client and Server
The member node which runs the client process sends the acknowledgement
to the server process runs under cluster head node while the message
received count is more than once. This will update the members list table in
cluster head. The absence of the acknowledgement indicates the movement
of node beyond the cluster boundary. In this way the cluster head will be
aware of the member nodes under its control.
192.168.25.2 192.168.25.0
N2
192.168.25.1 192.168.25.0
192.168.25.4
N4
N1 CH
192.168.25.3
N3
IJCSBI.ORG
to hold the position of cluster head, then this would be considered for the
cluster head position otherwise this will be continued till the node with the
sufficient energy level has been identified within the cluster.
192.168.25.2 192.168.25.2
N2
N2
192.168.25.1 192.168.25.0
192.168.25.4
N4
N1 CH
192.168.25.3
N3
IJCSBI.ORG
fe80:302:11:1:
1220:0:0:2
N2
N4
N1 CH
fe80:302:11:1:
1220:0:0:3
N3
The DHCPv6 server assigns address dynamically to the IPv6 nodes. These
addresses can be reused while the node moves out of the cluster.
fe80:302:11:1
:1220:0:0:0
fe80:302:11:1:
1220:0:0:2
N2 CH
N4
N1 CH
fe80:302:11:1:
1220:0:0:3
N3
IJCSBI.ORG
The Figure 6 shows the mobility of the IPv6 node acts as cluster head. The
movement of cluster head will elect the member node as next cluster head.
This will be decided based on the weight values computed for all nodes. The
next node which has least weight will be elected as cluster head. This
process will be limited by the clusters boundary.
fe80:302:11:1:
fe80:302:11:1: 1220:0:0:2
1220:0:0:2 N2
N2
N4
N1 CH
fe80:302:11:1:
1220:0:0:3
N3
N3
IJCSBI.ORG
Unique/ Duplicate
Figure 9. Node confirms unique IPv6 address with the cluster head
Figure 9 shows the node communication with the cluster head to detect the
duplication in the selected address under stateless autoconfiguration method.
The cluster head reply conveys the uniqueness of the address which is
obtained by the member node.
Algorithm: CHDAD
(1) ADD_LIST ={ Empty }
(2) Duplicate = false.
(3) Member node N sends IPv6 address to CHi of the cluster Ci.
(4) For each cluster Ci
IJCSBI.ORG
Begin
The Cluster head CHi validates the address
Begin
If ( IPv6 of N ADD_LIST ) then
Reply to member node N about the duplication of
IPv6 address.
Duplicate = true
End
i=i+1
End
(5) If (Duplicate = false) then
Add the IPv6 address of node N to ADD_LIST.
(6) Repeat the steps 2 through 5 for all the node of the cluster Ci.
(7) Repeat the steps 1 through 6 for all the clusters of the network.
The CHDAD (Cluster heads duplicate address detection) mechanism takes
the IPv6 address decided by the member nodes . This will be probed against
the duplication by the respective CH head by checking the existence of the
address in their list ADD_LIST or neighbors list. If the address is not found
in this list then the address gets added to the list of the respective cluster
head. The cluster head node should have the information stored in the form
of table as shown in Table.1. This will be exchanged among the cluster
heads on demand.
Table 1. Data structure of CHs Info Packet Fields
IJCSBI.ORG
and immediately informs the cluster head node. The cluster head maintains a
list of IPv6 addresses which are allotted.
fe80:302:11:1:
1220:0:0:2
N2
N4
N1 CH
fe80:302:11:1:
1220:0:0:3
N3
Parameter Values
N (Number of IPv6
10
Nodes)
Space (area) 30 30
Tr (Transmission
6m
range)
Ideal nodes percentage 90%
IJCSBI.ORG
The Table.3 shows the computed weight value of the nodes. The results
show that the cluster1 and cluster2 will have cluster heads as node6 and
node1 respectively. These are decided based on the weight value of the
nodes belong to each cluster. The Figure 11 shows the clusters formed using
set of nodes. The W-PAC cluster formation algorithm forms two clusters for
the given sample set. These nodes later on configured with IPv6 address
either by stateless or stateful way.
30
25 20, 24
Node Position(m)
20 26, 20
C1
15 20, 12 24, 14 30, 14
27, 12 32, 12
10 28, 10
10, 10 21, 8
5
C2
0
0 10 20 30 40
VII. FUTURE DIRECTION
Node position(m)
The Figure 12 shows the cluster C1 comprised of member nodes and cluster
head as node6. The CH6 node runs DHCPv6 to configure the nodes under
IJCSBI.ORG
stateful method using IPv6 address. The node6 will broadcast the IPv6
address to the member nodes in order to communicate with the server node.
The member node sends the request and gets the IPv6 address from the
server as their unique address.
Broadcasting
N2 N5
CH6 Request
Reply
N4
N8
400
350 352.95
300 308.75
Weight of CH
250 258.7
200 208.4
150 158.7
133.4127.9
100 107.9
73.45 58.7
50
0
0 1 2 3 4 5 6 7 8 9
CH Nodes
The Figure 13 shows the cluster heads order based on weight to change the
cluster heads when the existing cluster head moved away.
7. CONCLUSIONS
This study describes the cluster formation of IPv4 and IPv6 nodes. It has
pointed out the methods of forming clusters while using IPv6 nodes. The
cluster maintenance strategy after the cluster formation using W-PAC has
also been discussed. The simulation with the help of OMNET++ shows the
study to be applied in a realistic manner. In future this work has to be
extended for huge sample set and also consider forming the clusters
dynamically.
IJCSBI.ORG
REFERENCES
[1] S. Thirumurugan and E. George Dharma Prakash Raj, PAC - A Novel approach For
Clustering Mechanism in Adhoc Network, ICSCCN 2011, pp.593-598.
[2] S. Thirumurugan and E. George Dharma Prakash Raj, Ex-PAC: An Improved
Clustering Technique in Ad Hoc network, RACSS12, 2012, pp.195-199.
[3] S. Thirumurugan and E. George Dharma Prakash Raj, W-PAC: An Efficient Weighted
Partinioning Around Cluster head Mechanism for Adhoc Network, CCSEIT12, pp.182-
188.
[4] S. Thirumurugan and E. George Dharma Prakash Raj, PSO-PAC: An Intelligent
Clustering Mechanism in Ad hoc Network, NETCOM 12.
[5] S. Thirumurugan, Direct sequenced C-IAODV Routing Protocol, International
Journal of Computer Science and Technology, Vol.1, Issue.2, Dec 2010, pp. 108-113.
[6] S. Thirumurugan, C-AODV: Routing Protocol for Tunnels Network, International
Journal of computer science and technology, Vol.2, Issue.1, Mar2011, pp.113-116.
[7] Li Qing, An IP address auto-configuration scheme for MANET with global
connectivity, ICIME10, 2010, pp.244-247.
[8] M. Sivakumar, C J Jickson and R M S Parvathi , Passive Duplicate Address Detection
in DYMO Routing Protocol for MANETS, ICVCI11, 2011, pp.9-14.
[9] He Zhonglin and He Yuhua , Study on Key Technologies of MANET, ISME10,
2010, pp.112-115.
[10] Ulrich Herberg and Thomas Clausen, Yet Another Autoconf Proposal (YAAP) for
Mobile Ad hoc NETworks, MASN10, 2010, pp.20-26.
IJCSBI.ORG
Hassan Naderi
Department of Computer Engineering
Iran University of Science and Technology
Resalat St., Tehran, Iran
ABSTRACT
Many methods have been proposed to XML document clustering. These methods can be
divided into three categories: structure-based, content-based and hybrid methods. XCLS++
is one of the most effective and efficient algorithms to XML document clustering which fit
into the structural clustering category. Because of its efficiency, XCLS++ can be used
XML stream clustering. In this paper, we will show one of the weaknesses of this method
and then we will try to solve it by deleting a factor in the XCLS++formula. As we will
show, this factor is related to the node weight in a tree which represents a given XML
document. According to our experimentations which have been presented in this paper, the
effectiveness (in term of accuracy) and efficiency (in term of execution time) of XCLS++
can be improved once this weight factor is eliminated from the original XCLS++ formula.
Keywords
Clustering, XML documents, XCLS++, Structure similarity, Content similarity.
1. INTRODUCTION
One of the methods used to extract information from databases is data
mining which is used in the search engines. The appropriate structure to
store data in databases contributed to data mining. The easy execution of
data mining in database causes increasing of search engine efficiency. So,
using the proper structure in a database is a crucial point. One of the good
ideas for using appropriate structure in database is clustering.
During past years, various formats like HTML and XHTML are presented
for showing documents using the content and the structure. Because XML
documents are used to transfer and to search in documents and also the
usage of this technology is increased day by day, a good management on
these documents is vital.
IJCSBI.ORG
In general, XML document clustering methods can be divided into three
categories: 1- Structural, 2-Content-basedand 3- Combination of structure
and content (hybrid). In the structural approach, an important criterion in
clustering is the structure of the document. In the other word, the structural
similarity between documents is a criterion for placing them in the same
class. In the content-based method, the criterion of clustering is the
similarity between the texts of both documents, and finally in the hybrid
approach, the content and the structure similarity together are criterions to
clustering two documents.
XCLS++ is one of the structured based methods to XML document
clustering [12]. Its an improved version of XCLS+ algorithm which is an
efficient method for clustering XML documents [9]. Our studies showed
that XCLS++ can be improved, because it has some problems which make it
away from optimal output. In this paper, our focus is on XCLS++ method
and new method has been proposed with better performance. In the next
section, the related articles are investigated. In the section 3 the
XCLS++method and in the Section 4 the problem of XCLS++ method are
presented. In the Section 5 our new proposed method is explained and then
it will be compared with the other algorithms in the next section. Execution
times of the algorithms are compared in Section 7, and the last section is
allocated to conclusion.
2. PREVIOUS WORKS
The criterion of clustering is based on the similarity of documents. As
mentioned above, there are three ways to find the similarity of documents:
1- structural [2][5][10][11][12]which consider only the structure of the
document2- content-based [9] which considers only the content and finally
3- hybrid (content with structure) [1][3][4][8] which consider both the
content and the structure. As we know, each XML document can be
transferred into a tree and then clustering operations can be done with those
trees. Structural methods only consider the structure and do not pay
attention to content. The XCLS++ is one of the most efficient online
algorithms to XML document clustering that fit into the structural clustering
category. Our focus in this paper is concentrated on this type of clustering.
Based on our studies, we have seen some problems in the XCLS++formula,
which makes it away from optimal value. The presented solution in this
paper can solves the problem of XCLS++ and optimizes it. Details of this
method and its evaluations will be presented in the next sections.
3. THE FORMULA OF XCLS++ METHOD
As previously mentioned XCLS++ method is an example of structural
approach and it works based on the similarity between tag names. So it
doesnt consider the content of XML documents. XCLS++ by make some
changes on XCLS+ at two stages could solve existent drawback of XCLS+
IJCSBI.ORG
[11]. But in this paper we will show that those changes are not enough to
make optimization. Some trees which will be shown later will prove
inefficiency of XCLS++ in some cases. In this paper we will try to eliminate
these inefficacies. The operations of XCLS+ and XCLS++ are similar. In
this way like the XCLS+ method the incoming XML document is compared
to clustered documents. If the value of similarity is greater than are equal to
a threshold (t), the XML document will be placed in the relevant cluster.
Otherwise, new incoming document is clustered in a new cluster. This
process is continued until the last document is entered. The similarity
calculation is performed based on a formula. In what follow, the XCLS++
details will be explained and calculation of similarity value between two
trees is shown. Then problem of XCLS++ has been presented. After that a
solution to this problem will be introduced. The formula of XCLS++, which
is an improved formulation of the XCLS+ method, is as follow:
+ +
.
=( + + )
+ .
=( + + )
=
(
= ) + .
= (
+
) +
=( + )
IJCSBI.ORG
1- Represent a XML document by a relative tree.
2- Consider this tree with a tree related to a cluster.
3- Start to search same node in two trees from root node. If a node is found then do
the calculation of the Formula1.Then go to step2, otherwise go to Step3.
4- If depth of trees moves toward the lower level in the both trees. Search the same
node as step1. If there is same node, calculate the Formula1 and repeat step2,
otherwise go to step3.
5- If depth of tree is (usually in clustered document), move toward down level in the
clustered document and stay in the same level of the new incoming document.
Search again the same nodes. If there is the same node, calculate the formula and
then repeat step2, otherwise repeat step3.
tree1 tree2
cn=1 cb=0 cc=1
0 0 L= 0
,
1 cn=1 cb=0 cc=2
1 1 L= 1
2 3 2 3 L= 2
, ,
, , 1 1
1 1
IJCSBI.ORG
second example (Figure 3) with XCLS++ method is 1.4. Note that factors
without parenthesis () on the dotted arrows belong to both trees.
tree1 tree2
,
10 L= 1
1
,
cn(tree1)=1 cb(tree1)=0 cc(tree1)=2 10 L= 2
2 3 cn(tree2)=1 cb(tree2)=0 cc(tree2)=2
1 1 cn=2 cb=2 cc=2
1 L=3
2 3 L=4
,1 ,1
tree1 tree2
cn(tree1)=1 cb(tree1)=0 cc(tree1)=2
L= 0
cn(tree2)=1 cb(tree2)=0 cc(tree2)=2 1
1
cn=2 cb=2 cc=1 2 3 L= 1
, ,
1 1
2 3
0 L= 2
, ,
1 1
0 L= 3
0 L= 4
1
Figure 3. Same nodes of both trees are in the same upper levels
These results are unreal. Because similarity values in Figure 2 and Figure 3
which only differ in placed levels, must be closed together and less than
one. But similarity values calculated with XCLS++ are very different. The
reason of this difference is related to the weighting in XCLS++ formula.
Our new formula is capable to solve this problem. In what follows, the
proposed method is discussed in more details.
5. NEW METHOD: THE OTHER CHANGE ON THE XCLS++
The main drawback of XCLS++ method which is derived from XCLS+ and
XCLS methods is its weighting factor. The weight causes high level nodes
in a tree be hardly compared to low level nodes in another tree. So we must
reduce the effect of the levels in order to minimize the difference between
two such trees. A simple change can solve the problem of the formula
IJCSBI.ORG
XCLS++. As previously mentioned, the main reason of this problem is due
to the weighting factor. By removing the weight factor, this problem can be
solved. So by deleting this factor the expected results can be earned. Finally,
the proposed formula without weighting factor will be:
+ +
.
=( + + ) + .
=( + + )
=
(
= ) + .
=( + ) +
=( + )
IJCSBI.ORG
Entropy is sum documents which located in the cluster i which are of the
class r. The entropy formula is:
=
=
( ) =
=
as
=
,
, =
IJCSBI.ORG
etc. Files were evaluated with the algorithms. The results of algorithm are
in Table 1 and include:
0.7 0.22 0.26 0.30 0.95 0.90 0.75 0.88 0.80 0.80
0.8 0.18 0.25 0.26 0.80 0.80 0.78 0.90 0.80 0.79
0.9 0.20 0.30 0.30 0.96 0.83 0.80 0.95 0.90 0.88
As previous examples, the results obtained in this section shows that the
new method has higher effectiveness than both XCLS++ and XCLS+
methods. Not only optimality of new method is high but also deleting
weight factor causes decreasing execution time. This topic is discussed in
the next section.
7. COMPARING EXECUTION TIME
After comparing effectiveness of algorithms, in this section execution time
is compared too. As previously cited weighting factor has lost its efficiency
due to the fundamental change on the basic formula. With deleting weight
factor amount of calculation is deleted and running time is predictably
decreases. Algorithms have been simulated in MATLAB 6.5.1 for reaching
expected results. This simulation has been done on two same trees with
XCLS++ and new algorithms. Simulated results are:
IJCSBI.ORG
IJCSBI.ORG
[4] Woosaeng Kim, Computer Engineering and Applications, XML document
similarity measure in terms of the structure and contents, CEA'08 Proceedings of
the 2nd WSEAS International Conference, 2008.
[5] G. R. Nayak, Fast and effective clustering of XML data using structural
information knowledge. Information System, 2008.
[6] The Wisconisns XML data bank. Accessed
from:http://www.cs.wisc.edu/hiagara/data.html Cited2012.
[7] The XML data repository. Accessed from:
http://www.cs.washington.edu/research/xmldatasets/. Cited 2012.
[8] Waraporn Viyanon, Sanjay K. Madria, Sourav S. Bhowmick, Management of
Data, XML Data Integration Based on Content and Structure Similarity Using
Keys, 2008.
[9] Aptarshi Ghosh and Pabitra Mitra, Pattern recognition, ICPR Combining Content
and Structure Similarity for XML Document Classification using Composite SVM
Kernels, 19th International Conference, 2008.
[10] Jing Peng Dong Qing Yang Shi Wei Tang et al, similarity in chinese text
processing, A New Similarity competing method based on concept, series F:
Information science, 51(9): p1212-1230, 2008.
[11] Mohamad Alishahi, Mohmoud Naghibzadeh and Baharak Shakeri Aski, Tag
Name Structure-based Clustering of XML Documents, International Journal of
Computer and Electrical Engineering Vol. 2, No. 1, February, 2010.
[12] Ahmad Khodayar and Hassan Naderi, XCLS++: A new algorithm to improve
XCLS+ for clustering XML documents, International Journal of Information
Technology, Control and Automation (IJITCA) Vol.2, No.4, 2012.
IJCSBI.ORG
R. Baskaran
CEG Guindy, Anna University
Chennai 600025, India
ABSTRACT
A Mobile ad-hoc network (MANET) is a wireless network, self-configuring, capable of
self-directed operation, hastily deployable and operates without infrastructure. MANET
operates without centralized administration. The nodes are self configuring, independent,
quickly deployable. Nodes are movable since topology is very vibrant and they have
restricted energy and computing resources. Routing protocols should incorporate QoS
metrics in route finding and maintenance, to support end-to-end QoS. General AODV
routing faces problems like long route, time delay, mobility and many other while routing.
The nodes low in energy level will not be in a position to complete the routing. The QoS
parameters like throughput, PDR and delay are affected directly. The proposed protocol
EN-AODV, announces energy and based on nodes sending and receiving rates and the sizes
of the data to be transmitted it justifies whether its energy level is maintained or decreased.
It calculates the energy levels of the nodes before they are selected for routing path. A
threshold value is defined and nodes are considered for routing only if its energy level is
above this threshold value. The transmissions are made secure by introducing message
digest algorithm. The nodes perform routing and all these routing are secured using MD5
algorithm which increases the reliability of routing. The work is implemented and
simulated on NS-2. The simulation results have shown an increase in PDR, decrease in
delay and throughput is maintained. The proposed EN-AODV provides more consistent and
reliable data transfer compared to general AODV.
Keywords
Ad-hoc, MANET, AODV, EN-AODV, QoS, MD5.
1. INTRODUCTION
Mobile ad-hoc network is an extraordinarily testing vibrant network. They
do not rely on existing infrastructure to support communication. Each
mobile node acts as an end node when it is the source or destination of a
communication and forwards packets for other nodes when it is an
intermediate node of the route Mobile Ad-Hoc network [1] is a system of
wireless mobile nodes that self-organizes itself in dynamic and temporary
network topologies. Ad hoc networks are easier to organize than wired
networks and are used in many applications, such as in human or nature
induced disasters, battlefields, meeting rooms where either a wired network
is unavailable or deploying a wired network is inconvenient. MANETs are
characterized by self-configured, dynamic changes of network topology,
IJCSBI.ORG
limited bandwidth, instability of link capacity and other resource constraints.
This dynamic nature of MANET makes it enormously complicated to obtain
accurate knowledge of the network state and thats why the consistency of
data transmission in this network cannot be guaranteed.
There have been many MANET routing protocols, which fall into several
categories: proactive routing protocols such as dynamic Destination-
Sequenced Distance-Vector routing (DSDV), Optimized Link State Routing
(OLSR), Topology Broadcast based on Reverse Path Forwarding (TBRPF),
on-demand routing protocols such as Dynamic Source Routing (DSR),
Adhoc on demand distance vector (AODV), Signal Stability-based Adaptive
routing (SSA). Proactive routing protocols have little delay for route
discovery and are robust enough to link breaks and obtain a global optimal
route for each destination. However, their routing overhead is also high. On-
demand routing protocols are easy to realize and their overhead is low. But
routes in on-demand routing protocols are easy to break in the case of
topology variations. In AODV [2] node doesnt have any information about
other nodes until a communication is needed. By broadcasting HELLO
packets in a regular interval, local connectivity information is maintained by
each node. Local connectivity maintains information about all the
neighbours.
In ensuring QoS provisioning, a network is expected to guarantee a set of
measurable pre-specified service attributes to the users in terms of end-to-
end performance, such as challenging task to ensure QoS provisioning
including routing in ad-hoc networks due to the mobile and dynamic nature
of the nodes. Recent QoS solutions are planned to operate on trusted
environments and totally assume the participating nodes to be cooperative
and well behaved [3, 4]. The major drawback of conventional AODV
protocol is the absence of the Quality of Service (QoS) provision that make
routing protocols which requiring applications of QoS lower efficiency.
MANETS usually consist of mobile battery operated devices that
communicate over the wireless medium. These devices are battery operated
and therefore need to be energy conserving so that the battery life of each
individual node can be extended. To make the most of the lifetime of an ad
hoc network, it is essential to lengthen each individual node life through
minimizing the total transmission energy consumption for each
communication request. Therefore, an efficient routing protocol must satisfy
that the energy consumption rate at each node is evenly distributed and at
the same time the total transmission energy for each request is minimized.
The transaction made by nodes in MANET should be a secured transaction.
To provide security for all transactions Message digest algorithm in
IJCSBI.ORG
introduced during transmission. All transmissions are secured using MD5
Algorithm. Thus it increases the reliability of routing.
Therefore, energy for nodes needs to be considered while routing since
nodes may drain out of energy levels. Though a node is providing its
complete support for routing it can perform well only if it has sufficient
energy. MD5 algorithm is also introduced to secure transmissions and
increases the reliability in routing. Traditional AODV does consider the
energy levels of nodes before routing. Energy is announced by the proposed
AODV protocol that checks for energy levels of nodes before taking part in
routing in order to make the MANET routing efficient and effective and also
ensure QoS.
2. LITERATURE SURVEY
An energy efficient routing protocol for maximizing lifetime in MANET [5]
is introduced. If the network is divided into more than two, and one of the
nodes consumes all the energy, that node can no longer participate in the
network. In recent years, more works has been under taken to not only
improve the energy storage but also to lengthen the networks lifetime. A
enhanced AODV routing protocol is presented which is modified to
improve the networks lifetime in MANET .One improvement for the
AODV protocol is to maximize the networks lifetime by applying
an Energy Mean Value algorithm which considerate node energy-aware.
An energy consumption analysis based on mobility models [6] is discussed
to know which protocol is better than another in different mobile network
scenarios, four mobility models are proposed for simulating different
scenarios of mobile ad hoc networks. Also a byte-based energy consumption
evaluation methodology is introduced for the protocol assessment. The
experiment built upon mobility models show that it is fit for the mobile ad
hoc network with low node mobility, while AODV, DSR, and especially
DSDV perform well on energy consumption for the mobile ad hoc network
with high node mobility.
A novel cross layered energy based AODV protocol [7] is proposed. A
dynamic energy conscious routing algorithm ECL-AODV where cross layer
interaction is provided to utilize the energy related information from
physical and MAC layers. This algorithm avoids the nodes which are having
low residual energy. By maximizing the lifetime of mobile
nodes routing algorithm selects a best path from the viewpoint of high
residual energy path as part of route stability. The RTS/CTS transmission is
a crucial step towards saving the energy of mobile nodes. In this scheme, the
RTS/CTS transmission occurs after route discovery and route reply process.
IJCSBI.ORG
The path is reserved for further transmissions. The receiving power of
sender, intermediate nodes and receiver are also another part
of route stability. The protocol is implemented for achieving quality of
service (QoS) in terms of average energy consumption, packet delivery
ratio, end-to-end delay and throughput
An energy level based routing protocols-ELBRP [8] that not only makes the
system energy consumption down but also prolongs the system lifetime and
improves the delay characteristic. The proof of correctness and complexity
analysis of ELBRP are presented and also compares the performance of
existing protocols. The studies show that ELBRP has a better delay
performance, and lower energy consumption and longer network lifetime.
The analysis are based on the comparison of two energy-based mechanisms
called E-AODV, an energy consumption rate-based routing protocol, and F-
AODV, a cross-layer-based routing protocol [9]. The trends and the
challenges on designing cross-layer communication protocols for MANETs
are investigated. The results show that the performance of the layer
cooperation paradigm depends on the network characteristics and the
application constraints.
An energy efficient integrated routing protocol (E2IRP) [10] for mobile ad
hoc networks used in remote surveillance systems is presented. The
integration of MAC and routing layers can effectively reduce the amount of
control information being exchanged for discovery and maintenance of the
route in the network. This in turn reduces the energy and time consumed for
the processing of these packets. Though the number of packets and
processing is less, the protocol provides a better reliability and throughput.
The nodes are organized in concentric tiers around the gateway. The event
reports are routed towards the gateway from one tier to another and the
response is routed back to the source, in the same manner. The proposed
E2IRP outperforms traditional AODV routing protocol in terms of battery
power consumption and also the throughput.
A new routing protocol called energy-aware grid multipath routing
(EAGMR) [11] protocol is proposed. The proposed protocol can conserve
energy and provide the best path to route according to probability.
Simulation results indicate that this new energy-aware protocol can save
energy of mobile hosts and improve data packet delivery ratio
A novel energy saving energy routing protocol: ES-AODV [12] is
presented. Nodes made use of the HELLO message mechanism in AODV
and reduced energy consumed by inserting intermediate node iteratively.
From performance analysis and simulation results, it could be found that
IJCSBI.ORG
ES-AODV had many advantages. Compared to the AODV protocol, ES-
AODV prolonged nodes' lifetime and substantially improved the saving
energy performance.
3. PROPOSED WORK
Many energy management schemes have been proposed to evaluate energy
values and most of the energy based protocols for calculated values based
on the energy consumed by nodes during the transmission. Routing in
mobile ad hoc networks is pretentious due to the dynamic nature of nodes,
which are not stable and keep moving. But still nodes communicate with
each other and exchange data within the available nodes on the network.
The architecture of the proposed work is presented in Figure 1. The node
energy level also plays a very crucial role in MANET routing. Focus is on
identifying the nodes energy level consumed so far and energy level left
over and higher than the threshold value assumed to be half the initial value
of the nodes energy assumed, which should be sufficient for performing the
upcoming transmission. If energy level not sufficient the proposed protocol
selects an alternate path to carry on routing successfully using reliable
nodes.
IJCSBI.ORG
Parameters Description
The initial energy of each node in the MANET set to
Initial energy
default value 100 J.
Final energy The maximum energy is set to 0.
Nodes The number of nodes that are part of MANET.
Node id Unique Id of each node in MANET.
Energy consumption based on the various events like
Event
R Received, D Dropped, S Sent, F Failed.
Time Time consumed for the event.
The energy consumed by a node to complete the
Consumed energy
transmission successfully.
The total energy consumed by all nodes in the
Total energy
network.
Average energy Average energy consumed by a node.
IJCSBI.ORG
if (maxenergy<consumenergy[i]){
maxenergy=consumenergy[i]
nodeid=i}}
IJCSBI.ORG
step . Instead of taking bytes of message in order M0 through M15, the
message byte that is used at stage i is M (5i+1) mod 16.
Third pass- G is replaced by function H (XOR of its arguments), another
set of constants (T33 thru T48), amount of left rotation{4,11,16,23, 4, 11..} at
each step and message byte used at stage I is M(3i+5) mod16.
Fourth pass- H replaced by function I(combination of bitwise XOR, OR
and NOT), another set of constants (T49 thru T64), mount of left rotation{6,
10, 16, 21, 6, 10...} and message byte used at stage is M7i mod 16 .
4. RESULTS
The proposed EN-AODV protocols performance is analyzed using NS-2
simulator. The network is planned and implemented using network
simulator with maximum of 50 nodes and other parameters based on which
the network is shaped are given in Table 2. The simulator is applied with
traditional AODV and with proposed energy based EN-AODV and results
are obtained for assessment. The proposed EN-AODV protocol has shown
good progress over the QoS parameters like PDR and Delay and throughput
is maintained. PDR is increased and delay is reduced compared to the
traditional AODV. The performance of the proposed protocol is also
represented graphically where it clearly shows the betterment of the QoS
parameters. The consumed energy levels of each node are also shown
graphically.
Parameter Value
Network size 1600 x 1600
Number of nodes 50
Movement speed 100 kbps
Transmission range 250 meters.
Packet size 5000
Traffic type CBR
Simulation time 30 minutes.
Maximum speed 100 kbps
MAC layer protocol IEEE 802.11
Protocol AODV
NS2 version 2.34
IJCSBI.ORG
Security scheme scenarios:
The nodes are marked initially as true and as transmission starts they start
changing.
Flag for node(1)--------> true
Flag for node(2)--------> true
Flag for node(9)--------> false
Flag for node(28)-------->false
Figure 2 shows the snapshot of the simulation where node 9 and node 28 are
marked as attackers because they replicate ip address. Figure 3 shows the
snapshot where transmission goes on between source and destination while
network identifies attackers. Figure 4 shows the routing has taken an
alternate path thus avoiding attackers.
IJCSBI.ORG
IJCSBI.ORG
The QoS parameter values are showing better improvement when the
routing takes place with the proposed EN-AODV protocol which works
using energy levels of each node that identifies nodes with low energy
levels in the route and immediately take an alternate path to provide reliable
routing. The results shown in the above table clearly shows the PDR and
delay of the proposed EN-AODV protocol is superior compared to
traditional AODV protocol at different node sizes.
IJCSBI.ORG
70
60
50
40
30
20
10
0
Nodes
5. CONCLUSIONS
In this paper, an energy based EN-AODV protocol is proposed that
identifies the nodes that drain out of energy level during data transmission.
Energy value for each node is calculated to spot the unreliable nodes in the
path during routing. A node which has sufficient energy level for the
transmission is selected for routing. MD5 algorithm in used to make
transmissions secured which add more reliability and also identifies
attackers and eliminates them. This proposed scheme has shown a good
development over QoS parameters like PDR and delay and has also
provided reliable routing. The same scheme can also be implemented on
other MANET routing protocols and check the performance with respect to
QoS parameters. The future work may provide an encryption scheme for
secured packet transmission and also to provide virtual energy for source
nodes participating in the routing to enhance reliability in MANET routing.
IJCSBI.ORG
6. REFERENCES
[1] Kortuem.G., Schneider. J., Preuitt. D, Thompson .T.G.C, Fickas. S. Segall. Z.
(2001), When Peer to-Peer comes Face-to-Face: Collaborative Peer-to-Peer
Computing in Mobile Ad hoc Networks. 1st International Conference on Peer-to-
Peer Computing, August, Inkoping, Sweden, 75-91.
[2] C. Perkins, E. Royer and S. Das, Ad hoc on-demand Distance Vector Routing,
RFC-3651.
[3] Hu, Y., (2003), Enabling Secure High-Performance Wireless Ad Hoc Networking,
PhD Thesis, Carnegie Mellon University (CMU).
[4] IIyas M., (2003), The Handbook Of Wireless Ad Hoc Network, CRC
[5] Jin-Man Kim, Jong-Wook Jang (2006), International Conference on internet and
web Applications and services.
[6] Jun-Hu Zhang, Hui Peng, Feng-Jing Shao (2011), Eighth International
Conference on Fuzzy Systems and Knowledge Discovery (FSKD) Volume: 4,
2275 2280
[7] Muthumayil, K., Rajamani, V., Manikandan,S (2011), Third International
Conference on Advanced Computing (ICoAC), 276 281.
[8] Li Layuan, Li Chunlin, Yuan Peiyan (2006), International Conference on
Intelligent agent technology, IEEE/WIC/ACM, 306 312
[9] Romdhani, L, Bonnet, C (2007), 9th IFIP International Conference on Mobile
Wireless Communications Networks, 96 100.
[10] Kathiravan, K., Divya, V., Selvi, S.T (2009), 5th International Conference on
Mobile Ad-hoc and Sensor Networks, 340 346.
[11] Wu, Zhengyu, Song, Hantao, Jiang, Shaofeng, Xu, Xiaomei (2007), 1st Asia
International Conference on Modelling and Simulation, 36 41.
[12] Xinsheng Wang, Qing Liu, Nan Xu (2008), Fourth International Conference on
Natural Computation, Volume: 5, 276 280.