Vol. 6, No. 1, Feb. 2010
Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu, Heychyi Young
Vol. 6, No. 1, pp. 1-20, Feb. 2010
Keywords: Operations Support System (OSS), New Generation Operations Systems and Software (NGOSS), enhanced Telecom Operations Map (eTOM), Internet Protocol Television (IPTV), IP-Virtual Private Network (IP-VPN)
Show / Hide AbstractDue to the convergence of voice, data, and video, today’s telecom operators are facing the complexity of service and network management to offer differentiated value-added services that meet customer expectations. Without the operations support of well-developed Business Support System/Operations Support System (BSS/OSS), it is difficult to timely and effectively provide competitive services upon customer request. In this paper, a suite of NGOSS-based Telecom OSS (TOSS) is developed for the support of fulfillment and assurance operations of telecom services and IT services. Four OSS groups, TOSS-P (intelligent service provisioning), TOSS-N (integrated large-scale network management), TOSS-T (trouble handling and resolution), and TOSS-Q (end-to-end service quality management), are organized and integrated following the standard telecom operation processes (i.e., eTOM). We use IPTV and IP-VPN operation scenarios to show how these OSS groups co-work to support daily business operations with the benefits of cost reduction and revenue acceleration.
Yogesh Singh, Arvinder Kaur, Bharti Suri
Vol. 6, No. 1, pp. 21-32, Feb. 2010
Keywords: Regression Testing, Test Prioritization, Test Selection, Interprocedural
Show / Hide AbstractSoftware maintenance is one of the major activities of the software development life cycle. Due to the time and cost constraint it is not possible to perform exhaustive regression testing. Thus, there is a need for a technique that selects and prioritizes the effective and important test cases so that the testing effort is reduced. In an analogous study we have proposed a new variable based algorithm that works on variables using the hybrid technique. However, in the real world the programs consist of multiple modules. Hence, in this work we propose a regression testing algorithm that works on interprocedural programs. In order to validate and analyze this technique we have used various programs. The result shows that the performance and accuracy of this technique is very high.
Eun-Ha Song, Young-Sik Jeong
Vol. 6, No. 1, pp. 33-42, Feb. 2010
Keywords: map visualization, DXF, DWG, SHP, GML, POI, Trace Monitoring
Show / Hide AbstractGIS can only be applied to certain areas by storing format. It is subordinate to a system when displaying geographic information data. It is therefore inevitable for GIS to use GML that supports efficient usage of various geographic information data and interoperability for integration and sharing. The paper constructs VisualGML that translates currently-used geographic information such as DXF (Drawing Exchange Format), DWG (DraWinG), or SHP (Shapefile) into GML format for visualization. VisualGML constructs an integrated map pre-process module, which filters geographic information data according to its tag and properties, to provide the flexibility of a mobile device. VisualGML also provides two major GIS services for the user and administrator. It can enable visualizing location search. This is applied with a 3-Layer POI structure for the user. It has trace monitoring visualization through moving information of mobile devices for the administrator.
Shirisha Tallapally, R Padmavathy
Vol. 6, No. 1, pp. 43-52, Feb. 2010
Keywords: STPKE’ Protocol, The Proposed Protocol, Undetectable Online Password Guessing Attack
Show / Hide Abstract?In the secure communication areas, three-party authenticated key exchange protocol is an important cryptographic technique. In this protocol, two clients will share a human-memorable password with a trusted server, in which two users can generate a secure session key. On the other hand the protocol should resist all types of password guessing attacks. Recently, STPKE’ protocol has been proposed by Kim and Choi. An undetectable online password guessing attack on STPKE’ protocol is presented in the current study. An alternative protocol to overcome undetectable online password guessing attacks is proposed. The results show that the proposed protocol can resist undetectable online password guessing attacks. Additionally, it achieves the same security level with reduced random numbers and without XOR operations. The computational efficiency is improved by ? 30% for problems of size ? 2048 bits. The proposed protocol is achieving better performance efficiency and withstands password guessing attacks. The results show that the proposed protocol is secure, efficient and practical.
A Hexagon Tessellation Approach for the Transmission Energy Efficiency in Underwater Wireless Sensor NetworksSungun Kim, Hyunsoo Cheon, Sangbo Seo, Seungmi Song, Seonyeong Park
Vol. 6, No. 1, pp. 53-66, Feb. 2010
Keywords: UWSN, Hexagon Tessellation, Energy Efficiency, Hybrid
Show / Hide AbstractThe energy efficiency is a key design issue to improve the lifetime of the underwater sensor networks (UWSN) consisting of sensor nodes equipped with a small battery of limited energy resource. In this paper, we apply a hexagon tessellation with an ideal cell size to deploy the underwater sensor nodes for two-dimensional UWSN. Upon this setting, we propose an enhanced hybrid transmission method that forwards data packets in a mixed transmission way based on location dependent direct transmitting or uniform multi-hop forwarding. In order to select direct transmitting or uniform multi-hop forwarding, the proposed method applies the threshold annulus that is defined as the distance between the cluster head node and the base station (BS). Our simulation results show that the proposed method enhances the energy efficiency compared with the existing multi-hop forwarding methods and hybrid transmission methods
Feng Yu, Damalie Oyana, Wen-Chi Hou, Michael Wainer
Vol. 6, No. 1, pp. 67-78, Feb. 2010
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression
Show / Hide AbstractIn this study, a clustering algorithm that uses DCT transformed data is presented. The algorithm is a grid density-based clustering algorithm that can identify clusters of arbitrary shape. Streaming data are transformed and reconstructed as needed for clustering. Experimental results show that DCT is able to approximate a data distribution efficiently using only a small number of coefficients and preserve the clusters well. The grid based clustering algorithm works well with DCT transformed data, demonstrating the viability of DCT for data stream clustering applications.
Younghee Kim, Wonyoung Kim, Ungmo Kim
Vol. 6, No. 1, pp. 79-90, Feb. 2010
Keywords: Frequent Itemsets, Weighted Support, Window Sliding, Weighted Support FP-Tree, Data Stream, WSFI-Mine
Show / Hide AbstractA data stream is a massive unbounded sequence of data elements continuously generated at a rapid rate. The continuous characteristic of streaming data necessitates the use of algorithms that require only one scan over the stream for knowledge discovery. Data mining over data streams should support the flexible trade-off between processing time and mining accuracy. In many application areas, mining frequent itemsets has been suggested to find important frequent itemsets by considering the weight of itemsets. In this paper, we present an efficient algorithm WSFI (Weighted Support Frequent Itemsets)- Mine with normalized weight over data streams. Moreover, we propose a novel tree structure, called the Weighted Support FP-Tree (WSFP-Tree), that stores compressed crucial information about frequent itemsets. Empirical results show that our algorithm outperforms comparative algorithms under the windowed streaming model.
Abdulaziz Alkussayer, William H Allen
Vol. 6, No. 1, pp. 91-106, Feb. 2010
Keywords: Security Patterns, Secure Development, Security Framework
Show / Hide AbstractThe rapid growth of communication and globalization has changed the software engineering process. Security has become a crucial component of any software system. However, software developers often lack the knowledge and skills needed to develop secure software. Clearly, the creation of secure software requires more than simply mandating the use of a secure software development lifecycle; the components produced by each stage of the lifecycle must be correctly implemented for the resulting system to achieve its intended goals. This study demonstrates that a more effective approach to the development of secure software can result from the integration of carefully selected security patterns into appropriate stages of the software development lifecycle to ensure that security designs are correctly implemented. The goal of this study is to provide developers with an Integrated Security Development Framework (ISDF) that can assist them in building more secure software.
Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park
Vol. 6, No. 1, pp. 107-120, Feb. 2010
Keywords: IP Address Trading, Resource PKI, Routing Security, IP Address Management
Show / Hide AbstractThe Internet has been growing at unprecedented rates. The problem of an address shortage could act as a barrier on this growth. In principle, a new Internet standard, IPv6 solves the problem of the address shortage because it has a very large address space. But IPv6 is not yet compatible with the IPv4 and during the IPv4-to-IPv6 transition period IPv4 address will continue to be in demand. Thus for quite some time, the problem of IP address shortage will persist. To solve the problem, we propose the mechanism of secure IP address trading. This mechanism is based on the Resource PKI (RPKI). The RPKI is the working item of IETF. This proposed mechanism maximizes the trust of IP address trading using RPKI.
Abdisalam Issa-Salwe, Munir Ahmed, Khalid Aloufi, Muhammad Kabir
Vol. 6, No. 1, pp. 121-128, Feb. 2010
Keywords: information systems, Information Systems, Business Planning, Planning Strategy, IT/IS Alignment.
Show / Hide AbstractUsing information systems effectively requires an understanding of the organisation, management, and the technology shaping the systems. All information systems can be described as organisational and management solutions to challenges posed by the environment. The advances in information systems have affect on our day-to day lives . As the technology is evolving immensely so are the opportunities in a healthy way to prepare the organisation in the competitive advantage environment In order to manage the IS/IT based systems, it is important to have an appropriate strategy that defines the systems and provide means to manage them. Strategic Information Systems Alignment (SISA) is an effective way of developing and maintaining the IS/IT systems that support the business operations. Alignment of the IS/IT plans and the business plans is essential for improved business performance, this research looks at the key features of SISA in the changing business circumstances in Saudi Arabia.