Volume 1, Issue 2, November 2010
Detection and Elimination of Duplicate Data from Semantic Web Queries
Zakia S.
Faisalabad Institute of Cardiology, Pakistan
Abstract–
Semantic Web adds semantics to World Wide Web by exploiting machine understandable metadata. The metadata can be described by resource descriptor framework (RDF). When these resources are queried by a Web browser, the duplicate records
may cause different problems: slow down indexing time, reduced search time efficiency, and extra storage space. We tackle this issue by implementing an algorithm which uses hash values to eliminate duplicate data records. The goal is to optimize the storage space and to increase the speed of returned results. We validate our approach on structured query language bases schema.
Keywords—RDF, Semantic Web, SQL and Algorithm
Download full paper PDF format
Analysis of Data Networks Optimization through MPLS BGP Multi-homed VPNs
M. Junaid Arshad, Asim Aziz and Tauqir Ahmad
Department of Computer Science and Engineering
University of Engineering and Technology, Lahore-Pakistan
Abstract–
The strength of the Internet has been its massive scalability and adaptability to accommodate variety of applications. So in this tradition MPLS (Multi Protocol Label Switching) is the latest technology being implemented in the Internet core, which is constantly expanding to meet the growing demands of bandwidth. MPLS provides a virtual path capability between packet (label) switches to efficiently carry differentiated services across the Internet. MPLS has capability to precisely engineer traffic tunnels to avoid congestion. In this research work firstly, we have analyzed MPLS, BGP, Multi-homing and VPNs in detail. IP VPNs issues such as speed, scalability, security and fault-tolerance over multihomed networks are also discussed in detail. We have discussed the MPLS BGP VPNs over multihomed environment in such a way that the issues such as scalability, intelligence and efficiency are focused and it will be able to meet modern demands of speed, scalability security and reliability for the future high-speed secure networks.
Keywords—MPLS, BGP, VPNs, Multi-homing, Performance and IP
Download full paper PDF format
Design and Development of a University Web Portal
Amjad Farooq and Imran Mir
Computer Science and Engineering Department
University of Engineering and Technology, Lahore-Pakistan
Abstract– A university portal takes data from different data sources, organizes them and provides with consistent look and feel to the users. It covers almost all major aspects related to students and teachers. Its high speed, dynamic rendering and asynchronous communication with data sources make things snappy and very responsive. University portal must be complete and provide all features related to students and teachers. This review paper provides a brief comparison of existing web portal and suggests some eye catching and stunning features/modules such as Oral Commands Interpreter, Oral Dictation, Multitasking, Rental Services, SMS alerts and Software Industry modules.
Keywords—University Portals, Portal Comparisons and Features in University Portal
Download full paper PDF format
Study the Best Approach for Virtual Private Network Implementation: CPU and Memory Usage Performance
Mohd Nazri Ismail
Department of MIIT, University of Kuala Lumpur (UniKL), Malaysia
Abstract– In this research, we propose an architectural solution to implement Virtual Private Network (VPN) test bed in campus environment. The objective of this evaluation is to measure the quality of the audio and video streaming on client server performance over different types of VPN technology. Virtual Private Network (VPN) technology has become a discussion issue for this time being. Therefore, this study is to analyze the VPN over open source application and hardware device performance areas related to quality of service delivered by audio and video streaming activities such as CPU and memory usage. In this study, network management system (NMS), ColaSoft Capsa is used to monitor and capture the performance of CPU and memory over VPN. In addition, the most apparent of implementing VPN in campus environment is to define the best solution between open source application and hardware device that can be used in operational environment. Based on the finding result, the VPN measurement through hardware device is able to contribute low percentage of CPU and memory usage compare to open source application.
Keywords—VPN, CPU, NMS, Memory, Audio and Video Streaming
Download full paper PDF format
A Z-Notation Formalization of Deterministic Finite Automata
Amjad Farooq, M. Junaid Arshad, Muhammad Abuzar Fahiem and Ayesha Jalal
University of Engineering and Technology, Lahore-Pakistan
Lahore College for Women University, Lahore-Pakistan
Abstract– A deterministic finite automaton (DFA) helps to design a system in a structured way and may be used to demonstrate visual flows between system functionalities. Formal methods (FM) are a mathematical formalization mechanism for the mature structuring of software / hardware products. FM based analysis of software / hardware design yields a reliable and robust system. In this paper, we provide FM for DAFs for the system development based on Z-Notation formalization. Z-Notation is widely used to describe the system properties and operations. This formalization may provide a guaranty to an efficient and accurate system design.
Keywords—Deterministic Finite Automaton, Formal Methods, Z-notation, System Design and Formal Specifications
Download full paper PDF format
Proficient Cluster-Based Routing Protocol Using EBSA and Lerach Approaches
E. Selvadivya and Greeta Priyadarshini
divyacharlez@gmail.com, greetasam@gmail.com
Abstract– In this research we deal with delay-tolerant networking (DTN) where we seek to address the technical issues in heterogeneous networks along with the homogeneous networks that may lack continuous network
connectivity. The main objective is to distributively group mobile nodes into a cluster, which can then
interchangeably share their resources for overhead reduction and power balancing, to achieve proficient
and scalable routing in DTMNs (Delay –Tolerant Mobile Networks). The EBSA approach is used in
heterogeneous networks and the LEACH approach is used in homogenous networks. The cluster-based
routing protocol based on exponentially biased stirring average (EBSA) scheme is employed for on-line
updating nodal contact probability. Based on nodal contact probabilities, a set of functions including
sync (), abscond (), and unite () are devised for cluster formation and gateway selection. The gateway nodes
exchange network information and perform routing in EBSA. Where as in homogenous networks we use the
LEACH approach were the cluster the skull aggregates the data from its cluster members based on the report
time TR and attributes A. These first level Cluster skulls aggregates the data and sends it to the second level
cluster skull and finally the second level cluster skull sends the data to a higher level cluster or a base station
The NS2 simulation results show that it achieves good energy consumption, increases the packets delivery
ratio and reduces end-to-end delay, when EBSA is used along with LEACH. Thus we obtain a good
performance metrics when we use both of them together.
Keywords—EBSA, LEACH, Clustering, Intra Clustering and Interclustering
Download full paper PDF format
AgentServices: Agent Services Framework for Handheld Devices
Muhammad Ali, Muhammad Aslam and A. M. Martinez-Enriquez
Department of CS, CINVESTAV-IPN, Mexico
Abstract– Computers and computing have become versatile and ubiquitous in the form of handheld devices. This computation power can be utilized in agent services to solve users’ daily life problems like hotel reservation. We propose an agent oriented services framework (AgentServices) using JADE as an agent system. AgentServices can be seen as a colony of multi mobile agents running on handheld devices. It creates and consumes services, exchange code with other agents and allows streaming of services offered by mobile agents. We harvest mobile agent technology in providing the user with comfort and ease to carry daily activities using just a handheld device. As case studies, we use the hotel reservation service support and a disaster management service.
Keywords—Mobile Agents, Service Agents, Agent Communication and Assistant Agent
Download full paper PDF format