

Improved Data Preparation Technique in Web Usage Mining |
Pages: 284-291 (8) | [Full Text] PDF (741 KB) |
Mona S. Kamat, Dr. J.W.Bakal, Madhu Nashipudi |
Information Technology Department, Pillai Institute of Information Technology (PIIT), Panvel, Navi Mumbai, India Shivajirao S. Jondhale College Of Engineering (SSJCOE), Dombivali, Thane, India |
Abstract - The process to discover and extract useful information is web usage mining. It helps to better understand and achieve the needs of web-based applications. To enhance the efficiency and to ease of the mining process, the data should be preprocessed. The proper study and analysis of web log file is useful to manage the websites effectively for administrative and user’s perspective. Many a time the backward referencing used to track the reachability of the pages which consumes time and generates complete path from the root node even if the link has come from some other server page. This problem can be using two-way hash table structure as Access History List. In our system, session identification is done using AHL by considering immediate link analysis, backward referencing without searching the whole tree representing the server pages. Based on this study, it can be concluded that the system is complex but user session sequences are generated with less time and greater precision. |
Index Terms - Session identification, Web usage mining, Preprocessing, Backward reachability |
The Network Architecture Encrypted Color Image Transmission in an Amplify and Forward Relaying Based STBC Encoded Cooperative MIMO OFDM System |
Pages: 292-298 (7) | [Full Text] PDF (614 KB) |
K. J. A. CHISTY, S. M. A. ISLAM, S. E. ULLAH, S. R. SABUJ |
Department of Physics, Jahangirnagar UniversityDepartment of APEE, University of RajshahiDepartment of EEE, Bangladesh University |
Abstract - The present paper emphasizes greatly on the development of a simulation model for the single relaying based cooperative MIMO OFDM wireless communication system This paper provides a new insight on system performance comparison with Amplify and Forward relaying protocol, STBC and Spatial multiplexing schemes, four channel equalization techniques (ZF, MMSE, ZF-SIC and MMSE-SIC) and four digital modulation schemes (BPSK, QPSK, 16PSK and 64PSK). From simulation results for encrypted color image transmission, it is observable that the STBC encoded MIMO-OFDM system with Amplify and Forward relaying protocol, BPSK digital modulation and MMSE-SIC channel equalization technique provides an encouraging and quite acceptable system performance. |
Index Terms - Cooperative communication, Orthogonal frequency division multiplexing, Amplify and forward, Minimum mean square error and Zero forcing |
Decomposition of 3D medical image based on Fast and Adaptive Bidimensional Empirical Mode Decomposition |
Pages: 299-309 (11) | [Full Text] PDF (907 KB) |
OMAR AIT ZEMZAMI, HAMID AKSASSE, MOHAMMED OUANAN, BRAHIM AKSASSE, AZIZA BENKUIDER |
Equipe ASIA, Computer Science Department, Moulay Ismil University, Faculty of Science and Technology, P.O. Box 509, Boutalamine 52000 Errachidia, Morocco |
Abstract - Three-dimensional (3D) imaging and display have been subjects of much research due to their diverse bene?ts and applications. This paper presents a new approach for decomposing the three-dimensional medical images using Bidimensional Empirical Mode Decomposition (BEMD). The BEMD is an extension of the Empirical Mode Decomposition (EMD), which can decompose non-linear and non-stationary signals into basis functions called the Intrinsic Mode Functions (IMFs). IMFs are monocomponent functions that have well defined instantaneous frequencies. This decomposition, obtained by a process known as sifting process, allows extracting the structures at different scales and spatial frequencies with modulation in amplitudes and frequency. BEMD decomposes an image into bidimensional BIMFs. This paper suggests a simple, but effective, method for decomposing a three-dimensional medical image into basis function. This approach is neither parametric nor data driven, which means it does not depend on a priori basis set. Moreover, it preserves the totality of information in term of the quality of the reconstructed 3D image. The performance of this approach, using the BEMD, is approved with some medical images. |
Index Terms - Bidimensional Empirical Mode Decomposition (BEMD), Fast and Adaptive BEMD (FABEMD), Intrinsic Mode Function (IMF), 3D Reconstruction |
Design Electronic Stethoscope for Cardiac Auscultation analyzed using Wavelet Decomposition |
Pages: 310-315 (6) | [Full Text] PDF (463 KB) |
I Dewa Gede Hari Wisana |
Department of Electromedical Engineering, Health Polytechnic Ministry of Health Surabaya, Indonesia |
Abstract - Stethoscope become standard equipment used medical personnel to perform initial checks on patients. Stethoscope in general has a function for auscultation, which is listening to the sounds that occur in the body. The sound produced by the biological activity of the bodys organs, like the heart, lungs and digestive system. The heart is one organ that plays a role in the circulatory system. Contraction of the heart that can cause pulsation felt in the arteries in some places. Instrument used for the detection of clinically sound heart is an acoustic stethoscope. Acoustic stethoscope has a weakness, depending on the hearing of each physician. Diagnosis of each physician may vary. Sensitivity of the ear of each doctor is different. Noise signals generated in the electronic stethoscope will be analyzed using Wavelet. In this research, recognition of heart sounds using a stethoscope sound signal based on wavelet decomposition. Heart sound signal is decomposed up to level 8 using Daubechies3 wavelet (db3). Energy of each subband is calculated spectogram. Analysis of cardiac auscultation signals with wavelet daubachies, system can calculate the value of heartrate with 78% for heart sound pattern of early and late systolic murmur, 63% Diastolic heart sound patterns Rumble and 85% for normal heart sound patterns. |
Index Terms - Wavelet, Stetoschope, Heartrate |
Performance Assessment of DFT-OFDM and DWT-OFDM Systems in the Presence of the SSPA and Fading Channel |
Pages: 316-323 (8) | [Full Text] PDF (1.38 MB) |
Abdolreza Kiani and Soheila Mousavi |
Department of Electrical Engineering, Abadan Branch, Islamic Azad University, Abadan, Iran |
Abstract - This paper investigates performance degradation of conventional Orthogonal Frequency Division Multiplexing (OFDM) and Discrete Wavelet Transform based OFDM (DWT-OFDM) systems when the signals are passed through a nonlinear High Power Amplifier (HPA) and fading channel. In the case of DWT-OFDM, several wavelets such as Daubechies, Symlet and Biorthogonal are evaluated. Simulation results in terms of PAPR, PSD, and Bit Error Rate (BER) show that DWT-OFDM is more robust against interference and multipath effects compared to DFT-OFDM, and increasing the length of the basis function improves BER and PAPR. |
Index Terms - DFT-OFDM, DWT-OFDM, BER, PAPR, High Power Amplifier |
An Effectual Identification Manual Malware Analysis Using Static Method |
Pages: 324-328 (5) | [Full Text] PDF (477 KB) |
NORKHUSHAINI AWANG, ARIFIN SALLEH and MOHAMAD YUSOF DARUS |
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, 40450 Malaysia |
Abstract - Today malware threats represent the greatest challenge to information security. Combat between malware writer and malware researcher never end. Malware writers use a variety of avoidance techniques such as Code Obfuscation, Packing, Anti-Debugging and Anti-Virtualisation Technologies to foil researchers analysis. On behalf of researchers they try to find out many techniques to defend Information Technology (IT) services from access or stolen by unauthorized parties. Most of the researches perform malware analysis in Virtualisation Technology in the isolation environment because of security issues. This research focuses on analysis malware using static method in operating system environment. Thus, we focus on malware analysis that uses Anti-Virtualisation avoidance technique. Although our platform environment exposed to the threat by malware sample, we protect this environment by using Toolwiz TimeFreeze and window backup image to protect and secure our environment. This research proved that our environment capable to do malware analysis and compare our environment with the virtual machine environment to prove that our analysis more accurate. |
Index Terms - Malware, Security, Threats, Static Analysis, Dynamic Analysis, Operating System |
Security in Wireless Sensor Networks: Issues and Challenges |
Pages: 329-334 (6) | [Full Text] PDF (200 KB) |
Mahsa Teymourzadeh, Roshanak Vahed, Soulmaz Alibeygi, Narges Dastanpor |
Faculty of Engineering, Department of Computer Engineering, Islamic Azad University Khorasgan, IranDepartment of Electronic Engraining, Islamic Azad University Shahrekord, IranFaculty of Engineering, Department of Electronic Engraining, Islamic Azad University Naein, Iran |
Abstract - A wireless sensor network (WSN) has important applications such as remote environmental monitoring and target tracking. In addition, Wireless Sensor networks is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. This has been enabled by the availability for a kind of possible attacks; the innate power and recall limit of sensor nodes earn customary security solutions unfeasible. These sensors are equipped with wireless interfaces with which they can communicate with one pther to form a network. In this paper we present a survey of security issues in WSNs, address the state of the art in research on sensor network security, and discuss some future directions for research. |
Index Terms - Wireless Sensor Networks, Security Attack, Survey, Security |