Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
International Journal of
ISSN 2225-658X (Online)
DIGITAL INFORMATION AND WIRELESS COMMUNICATIONS
Volume 4 Issue 2
2014
TABLE OF CONTENTS
Original Articles
PAPER TITLE
AUTHORS
PAGES
169
184
Tiroyamodimo Mogotlhwane
Sundar,
Inamura,
M.
Keiichi
191
202
213
226
236
248
258
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
This paper presents a new approach to modeling a
wireless channel using finite mixture models (FMM).
Instead of the conventional approach of using non
mixtures (single) probability distribution functions,
FMMs are used here to model the channel impulse
response amplitude statistics. To demonstrate this, a
FMM based model of Ultrawideband (UWB) channels
amplitude statistics is developed. In this research, finite
mixture models composed of combinations of
constituent PDFs such as Rayleigh, Lognormal,
Weibull, Rice and Nakagami are used for modeling the
channel amplitude statistics. The use of FMMs is
relevant because of their ability to characterize the
multimodality in the data. The stochastic expectation
maximization (SEM) technique is used to estimate the
parameters of the FMMs. The resultant FMMs are then
compared to one another and to non-mixture models
using model selection techniques such as Akaikes
Information Criteria (AIC). Results indicate that
models composed of a mixture of Rayleigh and
Lognormal distributions consistently provide good fits
for most of the impulses of the UWB channel. Other
model selection techniques such as Minimum
Description Length (MDL) and Accumulative
Predictive Error (APE) also confirmed this finding. This
selection of FMM based on Rayleigh and Lognormal
distributions is true for both the industrial as well as the
university environment channel data
KEYWORDS
Ultrawideband Communication, Small Scaling Fading,
Wireless Channel Modeling, Finite Mixture Models,
Stochastic Expectation Maximization.
1 INTRODUCTION
At various stages of design, the performance of a
communication system needs to be evaluated in the
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
and weighted delta functions (impulse train). The
impulse response amplitudes are commonly
modeled using non-mixture models such as
Rayleigh, Lognormal, Weibull, Rice and Nakagami
probability distribution functions for specific
channel conditions. Rayleigh is widely used for
amplitude statistics modeling due to elegant
theoretical explanation and occasional empirical
justification [2]. It has been observed that Rayleigh
provides good fit when there is no single dominant
multipath present among the arriving multipaths
[3],[4],[5]. Rice distribution is used when there is
a dominant multipath present in the various arriving
multipaths when there is a line-of-sight between the
transmitter and the receiver [6],[7]. Nakagami
distribution has been observed to provide good data
fit when the multipaths arrive with large time delay
spreads [8],[9].
Even though Weibull and
Lognormal distributions lack theoretic justification
for their use in channel amplitude modeling, they
provide excellent data fit in many cases
[10],[11],[12],[13],[14],[15],[16]. In this research,
we propose a new approach to model the impulse
response amplitude statistics of a wireless
communication channels using finite mixtures.
Finite mixtures describe the probability distribution
of a random variable as a weighted sum of
component probability distribution functions. The
development of a FMM based model is
demonstrated using the ultrawideband impulse
response amplitude data. The objective behind
using FMMs is to harness the individual
contributions from multiple component statistical
channel characterizations to describe the existence
of a multi-modal distribution of the data.
Section 2 of the paper discusses basics of small
scale channel fading. Section 3 provides basics
about UWB communication and existing channel
models for UWB channels. Section 4 describes the
UWB data collection methodologies and UWB data
used in this paper for channel modeling. Section 5
presents background on the topic of FMMs and
parameter estimation for FMMs and non-mixture
models. Model selection techniques for picking the
most appropriate channel model for UWB
communication are described in section 6. Results
of UWB channel modeling are presented in section
y(t )
x( )h(t, )d
(1)
(2)
170
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
h(t , )
N 1
t, exp
i
j 2 fc i (t ) i (t , )
(
i (t ))
(3)
i 0
N 1
t , exp
j
( t , )
( i (t ))
(4)
i0
h( ) i exp ( ji ( )) ( i )
(5)
i 0
f h fl
BW
100%
100%
fc
f h fl
(8)
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
is a combination of a large number of multipaths,
irrespective of the distribution of the individual
multipaths, the resultant signal can be assumed to
have a complex Gaussian distribution due to central
limit theorem [19] . Thus, the amplitude of the
signal of narrowband signals can be assumed to be
Rayleigh distributed [20].
On the other hand, the extremely wide bandwidth
of UWB makes the time resolution at the receiver
much narrower than conventional narrowband
systems. This means that only a few multipaths
combine together in a given time bin [21].
Therefore, the use of central limit theorem cannot
be justified and the assumption that the received
signal will have a complex Gaussian distribution
does not hold true. Thus, the amplitude distribution
of the ultrawideband signal cannot be assumed to
be Rayleigh distributed. Correspondingly, an
impulse sent through the ultrawideband channel
may not be received as a Rayleigh distributed series
of discrete time samples. In other words, the
impulse response of the channel may not be
Rayleigh distributed. This has resulted in increased
interest and research effort to determine, impulse
response amplitude, |n|, distribution for UWB
communication channels. Chong et al. used
Kolmogorov-Smirnov (K-S) test and Chi-square
test to suggest that Weibull distribution can be used
to model ultrawideband tap amplitudes in the 3
10 GHz range [22]. Cassioli et al. indicate that
Nakagami distribution provides the best fit for
ultrawideband amplitude statistics [23], while
Forester et al. suggest the use Lognormal
distribution [24]. For wireless channel modeling,
Taneda et al. introduced the use of information
theoretic model selection techniques by applying
Minimum Description Length (MDL) to find
channel tap amplitudes statistics [25]. Schuster et
al. introduced the use of another model selection
technique, Akaikes Information Criterion (AIC),
to identify appropriate models for ultrawideband
channel amplitude statistics [26]. Choudhary et al.
extended the use of a time series model selection
technique, the Accumulative Prediction Error, to
model UWB channel amplitude statistics [27].
Finite mixure models (FMMs) take advantage of
the vast number of applicable distributions for the
UWB channel impulse response amplitude by
172
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
4.1 Data measurement in typical university
environment
One set of data used in this research was measured
and reported by Schuster et al. in [26]. Figure 1
illustrates the set up for the data collection. An HP
8722D VNA is used to measure the channel transfer
function. To measure the transfer function, the
VNA is operated in a stepped frequency mode with
an IF bandwidth of 300 Hz. The sweep time was
9.8s. Each transfer function is recorded at 3201
equally spaced frequencies in the band from 2 GHz
to 8 GHz. As a result, the transfer functions are
measured with a frequency resolution of 1.875
MHz. Skycross SMT-3TO10M UWB antennas are
used as transmitting and receiving antennas. The
transmitted sounding signal has a 25dbm power
level. The transmitter (Tx) and receiver (Rx) of the
VNA are placed such that there exists a LOS
between Tx and RX. The Tx-Rx distances of d =
15.4m, 18.4m, 21.2m, 24.3m, and 27.2m are used
to collect the channel data. At each distance d, a 9x5
grid is created each separated with a spacing of 7
cms in both dimensions. At each location of the
grid, the receiver is placed and the channel transfer
function is measured. This process results in 45
transfer functions being measured. Next the entire
grid is shifted by 50cms and another set of 45
transfer functions are measured. Thus, for each d, a
total of 90 transfer functions are measured. The
individual transfer functions are inverse Discrete
Fourier Transformed to obtain the impulse response
of the channels. Thus for each d, 90 impulse
responses are obtained and each impulse response
has 3201 points. Sample impulse responses from
this data set are shown in figure 2. In summary,
there are 90 impulse response measurements at
each of the five values of d.
4.2 Data measurement in typical industrial
environment
The National Institute of Standards and Technology
(NIST) data set used in this research was measured
in an indoor industrial environment [28]. The
receiver of a vector network analyzer was placed on
a circular turn table with radius of 24 cms as shown
in figure 3. The distance from the center of the turn
table and the transmitter is d. The transmitter sends
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
research corresponds to values of d equal to 13.3m,
18.2m, 21.37m, 24.72m, and 30.06m. Sample
impulse responses from NIST data set are shown in
figure 4. In summary, there are 96 impulse response
measurements at each of the five values of d.
parameter
px
x2
e 2
(9)
1
2N
x
i 1
2
i
(10)
m 1 2m1 x
px 2
x
e
m
(11)
E x
m
E x E x
2
(12)
where
is the fourth order
moment. The parameter is the second moment as
is estimated as in equation 13 [31].
174
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
N
E x 2 1 x 2
i
N i1
(13)
x 2 2 x
exp
I
2 0 2
2
2
x
(14)
(15)
( K 1) x 2 2
x ( K 1)
p( x)
exp K
I 0 2 x
K ( K 1)
2
2( K 1)
(17)
N
E x2 1
xi2
N i 1
(18)
exp
2
E(x )
2
1 K
K
K
1 K I 0 2 KI 1 2
(19)
ln x 2
2
(21)
The parameter is the second moment as is
estimated as shown in equation 18.
1
N
1 N
lnxi
N i 1
N
(22)
lnx
i 1
(23)
a x
p(x) e b
b b
a1
(20)
175
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
16
=
,
,
,
,
,
are the
parameters of the mixture model. Further,
| represents the PDF of the kth constituent
distribution and wk represents the mixing
coefficient of that PDF
14
12
counts
10
8
6
4
2
0
0.2
0.3
0.4
0.5
0.6
amplitude bins
0.7
0.8
0.9
(a)
20
18
16
14
counts
12
10
8
6
P kn | x i
4
2
0
0.2
0.4
0.6
amplitude bins
0.8
w p (X | )
k
w kn P x i | kn
K
k 1
(b)
p X |
P ( kn ) P x i | kn
P x i
(24)
w kn P x i | kn
(25)
k 1
Step 3: The third step is the maximization step (Mstep) which involves updating the mixing
coefficients and parameters of the constituent PDFs
176
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
for the (n+1)th iteration. The mixing coefficients,
, are given by the ratio of the samples in
in the nth iteration to the total samples N. The
parameters of the kth constituent PDF are estimated
using the maximum likelihood estimation
technique based on the data in Xk are given by
equation 26.
kn 1 arg max ( L ( k ))
k
(26)
i 1
I ( f , p ) f ( x) log
p( x)
(27)
(28)
177
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
where K is the number of parameters in the
distribution p(x). The smaller the value of AIC the
closer the p(x) represents the unknown true
distribution f(x). To compare the relative fit of the
distributions under consideration, a difference, ,
is computed. , is difference between the AIC
value of each distribution and the minimum AIC
value in the set. Thus difference value for the
distribution with minimum AIC value is zero. The
AIC weights for a particular distribution are
computed as shown in equation 29.
wj
e
M
1
2
e
m 1
(29)
1 m
2
where
1 and M is the number of
distributions under test. Higher values of wj
indicate that the distribution provides a better the fit
to the data. Thus, among the group of distributions
under consideration, the distribution with the
highest value of wj can be chosen as the model best
representing the data.
6.2 Minimum description length
The MDL algorithm loosely states that the most
appropriate model to describe a data set is the one
which uses the least number of code words or the
shortest description of the data [42]. MDL can be
seen as finding the model that compresses the data
the most and effectively eliminates models that
overfit. MDL involves choosing a model which has
the smallest description length (DL) for the data set.
DL is calculated as shown in equation Error!
Reference source not found.30.
1
DL log( L( | x)) K log( N )
2
1
log p x | K log( N )
2
(30)
178
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Figure 6. Plot of AIC weights vs excess delay for model ranked first, Rayleigh-Lognormal FMM, and model ranked third for
university environment UWB data for d= 1
Figure 7. Plot of AIC weights vs excess delay for model ranked first, Rayleigh-Lognormal FMM, and model ranked third for
industrial environment UWB data for d= 21.3m.
179
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
180
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Table 1. Performance of non-mixture models (University
Environment)
Non-Mixture model
% of impulses for which
model ranked in top 3
Lognormal
Rice
Weibull
Rayleigh
Nakagami
36.8
6.7
3.9
3
1.1
8. Conclusions
In this research, a new approach to modeling
wireless channels using finite mixtures is
presented. The process and effectiveness of FMMs
is demonstrated by modeling the amplitude
statistics of the ultrawideband channel impulse
response. The ultrawideband data represented two
types of channel: industrial and typical college
environment. FMMs used here were composed of
distributions drawn from five commonly used non
mixture channel models, namely Rayleigh,
Nakagami, Rice, Weibull and Lognormal
distributions. The component distributions of
FMMs were chosen based on the wide usage in
channel modeling literature. The various 2181
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
component and 3-component FMMs were
estimated and compared among themselves and
with non-mixtures models using statistical metrics
such as AIC. The statistical metrics indicate that the
FMM composed of Rayleigh and Lognormal
distributions consistently ranked high in their
ability to provide accurate statistical description for
most of the impulses of channel impulse response.
This research has thus established RayleighLognormal FMM as an alternative to conventional
non-mixture FMMs. Scrutiny of the weighting
coefficients of the Rayleigh-Lognormal FMM
indicate that the FMM has higher contributions
from the Rayleigh component for higher amplitude
impulses of the impulse response, while the FMM
takes higher contribution from the Lognormal
component for the low amplitude impulses.
Following the Rayleigh-Lognormal FMM, the
Nakagami-Lognormal FMM performed second
best and the Lognormal non-mixture performed
third best in terms of the percentage of impulses for
which they ranked among the top three models.
From these observations, it can be inferred that
Lognormal distribution is an important contributor
to true data model of the UWB channel data. The
Rayleigh and Lognormal non mixtures showed
trends similar to the Rayleigh-Lognormal FMM
coefficients in that Rayleigh performed well for
high amplitude impulses and Lognormal performed
well for low amplitude impulses. It is also observed
that the non-mixture Rayleigh and Lognormal
parameters are smoother in terms of variations than
that of the Rayleigh-Lognormal FMM. This could
be because of the complexity of the FMMs have
tendency to over fit the data. Visual inspection of
the histograms of the impulses showed that many
of the impulses had two modes. This can be linked
to the success of the 2-component FMM in
modeling the data. The poor performance of the 3component FMMs can be attributed to their
increased complexity that gets penalized by the
model selection techniques. Also, the number of
data samples was limited; hence the estimation of
the parameters of the 3-component FMMs may not
have been accurate. The statistical samples
available for this research were very limited. The
parameter estimation process and the model
selection process will be more accurate with the
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
182
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 169-183
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[16] Hashemi, H., Tholl, D., and Morrison, G.: Statistical
modeling of the indoor radio propagation channel
part II. In: Proc. IEEE Vehicular Technology Conf.,
VTC 92, Denver, Colorado, 839--843 (1992).
[17] Nekoogar, F.: Ultra-Wideband communications:
fundamentals and applications. Prentice Hall (2005).
[18] Siwiak, K. and McKeown, D.: Ultra-wideband Radio
Technology. Wiley (2004).
[19] Papoulis, A.: Probability, random variables and
stochastic processes. McGraw Hill (2002).
[20] Proakis, J.: Digital Communications. McGraw Hill
(2000).
[21] Luediger, H., Kull, B., Zeisberg, S., and Finger, A.: An
Ultrawideband indoor NLOS radio channel amplitude
probability density distribution. In: IEEE Proc. Spread
Spectrum Techniques and Applications Symposium, 1,
68--72 (2002).
[22] Chong, C. and Yong, S.: A generic statistical-based
uwb channel model for high rice apartments. IEEE
Trans. Antennas and Propagat.,53, 2389--2399, (2005).
[23] Cassioli, D., Win, M., and Molisch, A. F.: The ultrawide bandwidth indoor channel: from statistical models
to simulations:
IEEE J. Selected Areas in
Communications, 20, 40--48 (2002).
[24] Foerster, J. R., and Li, Q.: UWB channel modeling
contribution from intel. IEEE, Tech. Rep. P802.15
02/279SG3a, 2002, IEEE P802.15 SG3a Contribution.
[25] Taneda, M. A., and Araki, K.: The problem of the
fading model selection. IEICE Trans. Commun., E84B, 660--667 (2001).
[26] Schuster, U. and Bolcskei, H.: Ultrawideband channel
modeling on the basis of information theoretic criteria.
IEEE Trans. on Wireless Communications, 6 (2007).
[27] Choudhary, D. and Robinson, A.: Model selection and
Kolmogorov-Smirnov test for Ultrawideband channel
modeling. In: SPIE Proc. Wireless Sensing and
Processing II, 6577, 65770G-1 -- 65770G-7 (2007).
[28] Gentile, C., Braga, A. J., and Kik, A.: A comprehensive
evaluation of joint range and angle estimation in indoor
Ultrawideband location systems. EURASIP Journal on
Wireless Communications and Networking, 2008,
(2008).
[29] Oppermann, I., Hamalainen, M., and Iinatti, J., UWB:
theory and applications. Wiley (2004).
[30] Ciccognani, W., Durantini, A., and Cassioli, D.: Time
domain propagation measurements of the UWB indoor
channel using PN-sequence in the FCC compliant band
3.6-6GHz. IEEE Trans. Antennas and Propagat.,53,
1542--1549 (2005).
[31] Cheng, J. and Beaulieu, N. C.: Maximum-likehood
based estimation of the Nakagami m parameter. IEEE
Communication letters, 5, 101--103 (2001).
[32] Stuber, G.: Principles of mobile communications.
Springer (2000).
[33] Talukdar, K. K., and Lawing, W. D.: Estimation of the
parameters of the Rice distribution. J. Acoust. Soc.
Am., vol. 89, no. 3, pp. 1193-1197, Mar. 1991.
183
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
The impact of global warming is now showing its
ability to disturb human and other forms of life on the
earth. Environmental pollution and how it can be
minimised is a global issue for discussion. There is an
increase in promoting human activities that are
environmental friendly through the green initiatives.
Green computing is how the computing profession is
responding to concern for minimising environmental
pollution. Internet based operations enable work to be
done remotely minimising the need for human
movement. Automation of processes, one of the
benefits of computing minimise waste and indirectly
reduce the need for human involvement. Fossil fuels
used as fuel for vehicles are some of the leading causes
of carbon emission. The ability for people to work
from home (telecommuting), access banking services
online (online banking) and other online based
operations have the potential to reduce carbon
emissions. These online operations are computer driven
and enable professional expertise/service to be
accessed without the need for people to travel.
Computing applications have the potential to reduce or
minimise carbon emission. More concerted effort is
required from policy makers to embrace computing
technologies as tools to reduce carbon emissions.
KEYWORDS
Carbon tax, renewable energy, ICT, greenhouse gas,
carbon emission, green IT, green computing.
1 INTRODUCTION
The focus of this research is to review literature
that investigates computing contribution to
reduction of carbon emissions. Desktop research
methodology was used to review related work on
the subject matter. There are different approaches
that can be used to reduce carbon emission. Some
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
defined as all the gases that act to retain heat in the
atmosphere [4]. This heat retention by GHG leads
to increase in atmospheric temperature which is
often referred to as global warming [5].
Greenhouse gases that are naturally produced are
absorbed by plants. However, as a result of human
activities that produce GHG, such increase cannot
be absorbed by existing plants/vegetation. This is
worsened by increase in destruction of natural
forests that reduce plants and other vegetations
available.
2 AN OVERVIEW OF GREENHOUSE
GASES.
Fossil fuels are the main source of electricity
globally yet they are the main contributor of
increase in GHG. Like Stickley stated fossil fuels
are what make the world go round [5]. Globally,
not enough has been made to invest in renewable
energy which produce less carbon emission. Use
of solar power even in countries with higher solar
radiation is still limited. For example Botswana
has about 3200 hours of sunshine annually, but
this energy contributes less to national electricity
demand [6]. There is over dependence on fossil
fuel and in the US, petroleum, coal and natural gas
have been the main top three source of energy
since the mid 1920s [7]. Global data show that if
fossil fuels continue to be the main source of
energy, there will be increase in carbon dioxide
emissions [8]. Developing countries are likely to
overtake industrialised countries in terms of
carbon emission as shown in Figure 1.
Some of the industrialised countries are already
implementing policies that aim to reduce carbon
emissions. In the US there is a tax incentive
offered to home owners towards the cost of
installing solar panels [9]. Australia is also using
the tax incentive model. Germany despite having
limited solar radiation, account for more than 50%
of solar energy production [10]. Developing
countries especially those in Africa have higher
solar radiation. However the use of this renewable
energy has not been exploited fully in such
countries.
Figure 1 World Carbon Dioxide Emissions by Region, 20012025 (Million Metric Tons of Carbon Equivalent) [8]
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
186
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
187
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
electricity wastage. Reducing electricity wastage is
also a form of carbon emission.
3.2 ICT and Industry GHG
Industries that produce goods are some of the key
economic activities that many countries aim to
have. Industrial production of goods generates
employment for people besides producing such
goods for customers. Industrial manufacturing is
one of the highest carbon emission sources. This is
due to electricity demand for its processes. Hence
when the source of such electricity is from fossil
fuels, it indirectly contributes to carbon emission.
Industrial processes that use electricity sourced
from renewable energy sources contribute less to
carbon emissions.
Higher manufacturing in emerging economies like
China, India etc are increasing carbon emissions.
Lack of enough economic incentives to reduce
carbon emission in manufacturing is a great
challenge [19].
Automation of industrial
processes and monitoring can also reduce energy
consumption by the manufacturing industry. ICT
is required in this automation and monitoring as it
acts as the underlying driving technology.
3.3 ICT and Agriculture GHG
There is growing demand to produce more food to
feed the increasing global population. Methane
from cattle and irrigation using fresh water
contribute to increase in carbon emission.
Agricultural GHG emission can be reduced by
making
agricultural
processes
efficient,
minimising wastage in the production process.
Farmers in developing countries are slowly
adapting to ICT based solution for example using
mobile phones to find prices and markets for their
produce.
According to the World Bank, ICT can be used to
monitor pest thresholds in integrated pest
management, provide relevant and timely
information and agricultural services, map agro
biodiversity in multiple-cropping systems, forecast
disasters, and predict yields. Crop losses diminish
as farmers receive relevant and timely information
on pests and climate warnings through SMS
technology [20].
188
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
companies do not have a yard stick against which
to monitor their carbon footprint.
Costs of ICT and lack of knowledge in ICT
supported agriculture are some of the challenges
facing ICT adoption. ICT infrastructure is mainly
limited to areas with high population density like
cities and villages. So in developing countries it
will take time for such infrastructure to be made
available at farms as investors consider it to be
unproductive investments to provide such
infrastructure in thinly populated areas.
Green computing is generating interest among
professionals; however it has not yet been fully
implemented as part of the body of knowledge in
computing curriculum. For example Curricula
2013 is silent on this subject [22].
The work from home idea concepts has not fully
taken off. When employees work from home, they
save energy by not travelling to work especially if
their mode of transport is not environmentally
friendly.
The impact of global warming are already
showing their negative impact globally. Draught,
floods, increase in atmospheric temperature and
changes in patterns of seasons are now becoming
common. Global warming does not recognise
geographical boundaries, hence low producers of
carbon emission are equally affected just like the
high producers.
[2]
[3]
[4]
[5]
[6]
[7]
[8]
5 CONCLUSIONS
Carbon emission needs to be looked as
international tragedy that need to me monitored
and evaluated at central and local government
level. Carbon emission needs to be given highest
priority by policy makers and measure put in place
to monitor it. Carbon emission data need to be part
of data that is collected and shared globally just
like poverty level indicators.
Carbon emission rates data need to be made part
of information of any goods that are produced just
like labelling in the food industry. Carbon
emission data of any human activity need to be
made publicly available to increase level of
awareness among people. For example, when
carbon emission data of running a conference
through video conference and the traditional
method are available, individual may choose the
189
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 184-190
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
WorldBank,ICTinAgriculture:ConnectingSmallholders
to knowledge, Networks and Institutions. Retrieved
November26,2013,fromWorldBankGroup:http://www.ic
tinagriculture.org/sourcebook,2012.
[21]
[22]
190
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
KEYWORDS
Cognitive radio; spectrum management; software
radios;
self-organizing
networks;
interference
calculation
1 INTRODUCTION
With the exponential increase in the use of high
powered wireless devices, the spectrum
availability or rather, the lack of it is a major
challenge. Conventional xed spectrum allocation
results in a large part of frequency band remaining
underutilized. Channels that are dedicated to
licensed (primary) users are out of reach of
unlicensed users, while the licensed users do not
occupy the channel completely, at all times.
Cognitive radio is a concept that is capable of
addressing this issue and is a form of dynamic
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
detection threshold. For energy-detector based
spectrum sensing, the threshold is set to
distinguish signal from noise.
In the sensing based spectrum sharing model [2],
in which only the radio-frequency spectrum is
considered, a simple energy detector cannot
guarantee the accurate detection of signal
presence, necessitating complex spectrum sensing
devices and periodical exchange of information
about spectrum sensing. The changes in traffic or
user movement demand updates to be done in the
radio environment. The spectrum holes that are
detected through spectrum sensing is to be
followed up with analysis and decision making to
determine parameters such as mode of
transmission, data rate and bandwidth so that the
spectrum band is chosen in accordance with
requirements of user.
In addition to these technical challenges, the
practical implementation of dynamic spectrum
management must also conform to the rules and
regulations set out for radio spectrum access in
international law as well the legislation specified
by respective countries.
2 RELATED WORK
2.1 Artificial Intelligence for Cognitive Radios
Application of Artificial Intelligent (AI)
techniques to cognitive radio networks is a
promising field of research since such networks
should have the capacity to learn and adapt within
any layer of the radio communication system. The
application of various classes of AI techniques to
cognitive radio networks can be found in the
literature. Ref. [3] presented the adaptive
component, which uses Genetic Algorithms (GAs)
to evolve a radio defined by a chromosome whose
genes represent the adjustable parameters in a
given radio. The GA could find a set of parameters
that optimize the radio for the users current needs
[3]. Ref. [4] described the physical components of
the spectrum sensing network as well as the
experimental system's information storage and
learning mechanisms. It was pointed out that the
spectrum sensing network of the project might be
extended to a universal research platform for
192
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
generate artificial spectrum data based on the
presented models.
3 SIMULATION
For radio compatibility, the interference in the
victim receiver input is mostly the unwanted
emissions from the transmitters as well as
blocking and intermediation, considering only the
adjacent bands. The analytical and classical
approaches for the estimation of these interference
mechanisms treat the operation of radio
communications systems static, without taking
into account the user movement on mobile
systems and hence they are rigid and difficult to
implement. Even with reasonable assumptions and
simplifications, the accuracy of such interference
assessment is impacted by the order and settings
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The sRSS output vector so calculated for each
WSD is shown in Fig.1. The figure shows the
results when five WSDs are considered. This is
followed by the detection of channels in which a
WSD is allowed to transmit by comparing to
threshold as stated earlier. Constraints on
transmission power are then determined and
interference is calculated.
4 RESULTS
Once the output vectors are read, the user can
perform interference calculation in the simulator
engine. The victim link and interfering links were
set up and the results were obtained for different
conditions.
4.1 Co-channel Interference between Fixed
Links
The interferer was set as cognitive radio which
had seamlessly acquired the signal strength since
the receiver and transmitters were fixed lines and
optimally utilized the spectrum in locations not
194
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
used. The parameter EIRP max was input with
three parameters offset (MHz), Mask (dBm) and
reference bandwidth of DTT (kHz). The
probability Density Function (PDF) function is
shown in Fig. 4.
195
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
are fundamental parameters used in system
analysis.
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
(2)
Here, x is the spectral efficiency (in bps per Hz)
with respect to calculated SINR and a conversion
factor for bps to kbps also to be included.
2 tiers,
single
sector
2 tiers,
3GPP
2 tiers,
3GPP
2 tiers,
3GPP2
0.5
85.247
27.096
100
11.731
0.5
86.422
9.159
0.5
74.154
8.904
Cell
layout
Cell Radius
(km)
2 tiers,
single
sector
For
Reference
Cell (%)
100
For
OFDMA
system (%)
21.628
197
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Fig. 11. Achieved bitrate (kbps) for OFDMA UL victimOFDMA UL interferer system; Reference cell (top plot),
whole system (bottom plot)
We can also analyze the signal-to-interferenceplus-noise ratio (SINR) of the victim reference
cell and the victim system from the simulation
results. Fig. 12 and Fig. 13 depict the probability
density for different values of SINR for the victim
reference cell and the victim system respectively.
198
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The type of interference signal chosen for
calculations was both unwanted and blocking. The
calculations were performed in both the
compatibility mode and translational mode to aid
in analysis.
Detection threshold
50
0
-100
Interference probability
(%)
0.07
0.06
0.0
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
of operating frequency of the white space device.
The simulator model uses an effective algorithm
to detect the presence or the absence of a protected
services transmission. If it detects no emission
above this threshold in a channel, the white space
device is allowed to transmit; otherwise the white
space device keeps silent or looks into other
channels.
The simulator model took spatial and temporal
distributions of the received signals into account
and the statistical probability of interference was
examined for a wide variety of scenarios. The
various output features such as sensing received
signal strength, WSD frequency and its density,
CDF of victim frequency, EIRP, average EIRP per
frequency and average active WSDs per frequency
gave useful information about interference
assessment. In the case of an interferer being set as
a cognitive radio, the spectrum sensing
characteristics included EIRP max which is an
important parameter to see if a radio solution is
within the values allowed by local regulatory
bodies.
The model was able to simulate more precise
mutual positioning of the systems under
consideration, hence demonstrated the efficiency
of use of radio spectrum. It was seen that the
issues of complex range of spectrum engineering
and the corresponding radio compatibility were
able to be dealt with. Though the model exhibited
highly interactive features in simulating CDMA
and OFDMA systems including that of individual
element details and whole system characteristics
such as average capacity loss and average bitrate
loss, it lacked the ability to simulate
CDMA/OFDMA as victim and cognitive radio
interferer. This unconventional setting can be
included in the future algorithm. The time
complexity of calculations in the CDMA/
OFDMA module can also be improved with
enhancement in the detection algorithm.
In addition, interference analysis and compatibility
for different cases were explored and analyzed
with the help of the Interference Calculation
Engine. Adaptive detection threshold values can
be implemented and studied for better interference
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 191-201
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
7 REFERENCES
1.
2.
Kang, X., Liang, Y., Garg, H. K., Zhang, L.: SensingBased Spectrum Sharing in Cognitive Radio Networks.
IEEE Transactions on Vehicular Technology 58, 46494654 (2009).
3.
4.
5.
6.
He, A., Bae, K., Newman, T., Gaeddert, J., Kim, K.,
Menon, R., Morales, L., Neel, J., Zhao, Y., Reed, J.,
Tranter, W.: A Survey of Artificial Intelligence for
Cognitive Radios. IEEE Transactions on Vehicular
Technology, Special Issue on Cognitive Radio 59,
1578-1592 (2010).
7.
8.
9.
201
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
A License Management System for Content Separate Delivery over P2P Network
Masaki Inamura and Keiichi Iwamura
Department of Electrical Engineering, Graduate School of Engineering, Tokyo University of Science.
6-3-1 Niijuku, Katsushika-ku, Tokyo, 125-8585 Japan.
minamura@sec.ee.kagu.tus.ac.jp, iwamura@ee.kagu.tus.ac.jp
ABSTRACT
We propose a license management system for content
separate delivery over P2P network. In trivial content
delivery systems, a content file is delivered to a user
bound license data within content-key simultaneously.
However, a server needs to administer not only user
license but also content files, and so server's load is
heavy in these systems. In our proposed system, users
can obtain a content file not only a content delivery
server but also other and can be licensed for the
content-key separated content delivery. Therefore, our
proposed system is lightweight and scalable.
Furthermore, for the purpose to show the feasibility,
we have implemented a prototype system. As the result
of the evaluation, we show our proposed system is
secure and practical.
KEYWORDS
Digital rights management, Peer-to-peer, Content
delivery, Separate delivery, License Management
1 INTRODUCTION
Recently, the internet becomes common
technology and makes it possible for users to do
their work efficiently. Especially, as a result of the
development of broadband networks, cellular
phone networks and wireless networks, a digital
content delivery service over the computer
network is widely penetrated.
Nowadays most of current content delivery
systems are based on the server-client model
generally, e.g. iTunes Store [1] and YouTube [2].
In this model, content and license information are
stored in the server of a content provider.
Therefore, the content provider should handle
huge amount of traffic data in response to users
request. On the other hand, content distribution
over P2P (Peer-to-Peer) network is promising
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
content to the other user over P2P network, and
the other user can decrypt the received content by
use of the license information that is from the
license administrator. An outstanding feature of
the proposed method is that the license
administrator only manages one master secret and
only re-binds a content-key to the target user on
the request basis. Therefore, our proposed system
is light-weight and scalable. Furthermore, for the
purpose to show the feasibility, we have
implemented a prototype system. As the result of
the evaluation, we show our proposed system is
secure and practical.
2 RELATED WORKS
One of fundamental methods in DRM systems is
Super-distribution [5]. Super-distribution model
permits users to copy content and a content
provider collects a charge for each content data.
As a result, a content provider can realize content
distribution service through many kinds of
networks. Therefore, recent content distribution
services tend to use Super-distribution model. In
the Super-distribution model, however, each user
has to connect to the license administration server
whenever the user enjoys one or more contents.
For this reason, the license issuing burden of
license administrator in Super-distribution model
is more than that in the other content distribution
model. Namely the license administration server
in Super-distribution model must be overloaded.
No efficient mechanisms to solve the above
problem are proposed.
Super-distribution model is also based on the
separate delivery where a license is issued
separately with content distribution. Therefore, the
model is applicable to P2P network because
content can be delivered by means of peer to peer
communication while the license is issued by
using direct connection between the license
administrator and a user. When content providers
distribute content to users over P2P network, the
traffic on distributing content over the whole P2P
network is smoothing. Therefore, the total number
of transaction on content distribution will increase.
Eventually, it is expected that transaction on the
license issuing is also increasing. For this reason,
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
administrator can increase the number of contentkey issue servers according to a scale of service.
(2) User Class
User class has plural users on the network and
these users connect each other over P2P network.
Furthermore, users can connect servers in
License Administrator Class over direct
communication.
(3) Communication and Transaction in/between
License Administrator Class and User Class
A user can obtain a Content-File, shown in section
3.2, from a content provider directly or from other
204
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
205
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Concerning this problem, we propose a new key
management and authentication mechanisms for
efficient content distribution service. In the
mechanism, we define a file set including contentkey, license data (user-key and meta-data), content
and other data, which we call Content-File. In this
Content-File, each data is encrypted with
encryption key where only the entity that has a
master-key can decrypt and obtains all data in
Content-File. If the license administrator has the
master-key, the administrator can get content-key
and license data from Content-file without
searching process. Therefore, we can decrease the
burden of the license administrator.
We show a proposed Content-File format in
Figure 2.
The license administrator manages servers that
hold the master-key, which we call content-key
issue server. In case that a user who obtains the
Content-File, the user decrypts a content-key with
his/her user-key and decrypts content with the
decrypted content-key.
For distribution of content, a user sends the
Content-File to the other users over P2P network,
after the re-encryption of the Content-File with
temporal user-key. The other user who receives
the Content-File, requests the content-key issue
server to re-encrypt the content-key in this
Content-File with his/her user-key for the purpose
of using this content. After the receiving user
receives the re-encrypted content-key from the
server, the user enables to use the content.
3.3 Protocol
In this chapter, we propose a protocol for realizing
our service model. The protocol consists of three
parts; content direct distribution, content-key
issuance and content distribution through P2P
connection. In content direct distribution protocol,
we show that a user obtains a Content-File from a
content provider directly when this Content-File
has not been distributed yet among users or a user
cannot find this Content-File over P2P. In content
distribution protocol through P2P connection, we
show that a user obtains a Content-File through
P2P connection when a user can find this ContentFile over P2P. In content-key issuance protocol,
we show a user obtains his/her own Content-File
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
||: Concatenation.
(1) Content Direct Distribution:
The content direct distribution protocol consists of
two phases; setup of the Content-File for
distribution and distribution of the Content-File to
a user. We show the content direct distribution
protocol in figure 3.
[Phase 1] Setup of the Content-File for
distribution:
1. Content Provider > Content-key Issue Server:
SENC(Cont,Kc) and Kc with concatenation.
2. Content-key Issue Server > Content Provider:
SENC(Kc,Kud 1 ) and SENC(Meta||Kud 1 ,Km)
with concatenation.
3. In Content Provider:
Setup
of
SENC(Meta||Kud 1 ,Km),
SENC(Kc,Kud 1 ) and SENC(Cont||Kc).
[Phase 2] Distribution of the Content-File:
1. User > Content Provider:
Content request.
2. Content Provider > User:
r 0 , g 0 , p 0 and g 0 s mod p 0 with concatenation.
3. User > Content Provider:
r 1 , g 0 s mod p 0 and SENC(r 0 ,Kt 0 ) with
concatenation.
(Kt 0 is g 0 s s mod p 0 .)
4. Content Provider > User:
SENC(r 1 ,Kt 0 ) (after verification that r 0 is
decrypted from SENC(r 0 ,Kt 0 ) correctly.)
5. User > Content Provider:
0
0 1
207
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
6.
7.
2 3
208
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Setup of gu x , pu x and gu x sux mod pu x .
8. In User:
Generating gu x f(ID1st) mod pu x ,Kt 1 and Ku 1st .
(Ku 1st is gu x suxf(ID1st) mod pu x .)
9. User > Content-key Issue Server:
SENC(SENC(Meta||Kud 1 ,Km)
||SENC(Kc,Ku 1st )
||gu x f(ID1st) mod pu x ,Kt 1 )
10. Content-key Issue Server:
SENC(SENC(Meta||Ku 1st ,Km)
||SENC(Kc,Ku 1st ),Kt 1 )
11. In user:
Setup of SENC(Meta||Ku 1st ,Km),
SENC(Kc,Ku 1st )
(SENC(Cont,Kc). has already been set up.)
When using the Content-File, the user
dynamically generates Ku 1st by gu x sux mod pu x in
seeds for user-key and ID 1st .
If a user needs to pay a charge for content use,
this user pays a charge to the content-key issue
server. The content administration server collects
metadata and charges for content use from
content-key issue servers at a fixed pace, and
divides these charges among content providers
under metadata.
(3) Content Distribution through P2P Connection:
The content distribution through P2P connection
protocol consists of two phases; setup of the
Content-File for distribution and distribution of
the Content-File to a user. We show the content
direct distribution protocol in figure 5.
[Phase 1] Setup of the Content-File for
distribution:
1. Former User > Content-key Issue Server:
Distribution request.
2. Content-key Issue server > Former User:
r 4 , g 2 , p 2 and g 2 s mod p 2 with concatenation.
3. Former User > Content-key Issue Server:
r 5 , g 2 s mod p 2 and SENC(r 4 ,Kt 2 ) with
concatenation.
(Kt 2 is g 2 s s mod p 2 .)
4. Content-key Issue Server > Former User:
SENC(r 5 ,Kt 2 ) (after verification that r 4 is
decrypted from SENC(r 4 ,Kt 2 ) correctly.)
5. Former User > Content-key Issue Server:
4
4 5
6.
7.
6 7
If this new user wants to use received ContentFile, the user follows same procedures using ID 2nd
in (2), and so the user received re-encrypted data,
SENC(Meta||Ku 2nd ,Km) and SENC(Kc,Ku 2nd ).
4 DISCUSSION
4.1 Security
In our proposed method, for the purpose of
protecting content distributed in this model against
illegal use, the following is required:
209
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
A) Wiretapping Impossibility:
The content, which is obtained through
wiretapping, cannot be used on terminals
without permitted terminal.
B) Illegal Distribution Process Impossibility:
Even if users or third parties receive content
without running legal process, they cannot use
it.
C) Replay Attack Impossibility:
210
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
content-key, user-key and master-key, so
illegal use of content is protected.
B) Even if the Content-Files are obtained, any
person cannot use content without procedures
in section 3.3 (2) because of encryption, so
illegal use of content is protected.
C) A Content-file which a user obtains from a
content provider directly or a former user
through P2P is encrypted with temporal userkey for content distribution, and so this user
cannot decrypt this Content-File with any
user-key for other Content-File because of
difference from the temporal user-key.
D) ID of a user terminal is used on user-key, and
a content-key issue server can know
gu x f(ID1st) mod pu x . However, this server cannot
obtain original ID. Information, which
identifies a user, is not sent except a seed of
this user-key in our protocol, so user privacy
about a channel through which a user obtains
content is protected against entities of license
administrator class.
5 CONCLUSION
211
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 202-212
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
REFERENCES
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
212
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
A robust nonlinear composite adaptive control
algorithm is done for a 6-DOF quadrotor system.
The system is considered to suffer from the
presence of parametric uncertainty and noise
signal. The under-actuated system is split to two
subsystems using dynamic inversion. A sliding
mode control is controlling the internal dynamics
while the adaptive control is controlling the fully
actuated subsystem. All the plant parameters such
as mass, system inertia, thrust and drag factors are
considered as fully unknown and vary with time.
The composite adaptive control is driven using the
information from two errors; tracking error and
prediction error. An enhancement on the adaptive
control has been done using robust technique to
reject the presence of the noise. The stability of
the closed-loop system is driven in the flight
region of interest. Also the performance of the
designed controller is illustrated to follow a
desired position, velocity, acceleration and the
heading angle of quadrotor despite the fully
unknown parameters and noise measurement.
KEYWORDS
Nonlinear Quadrotor Control, Under-Actuated
system, Composite Adaptive Control, Unknown
Parameters, Robust Control.
1
INTRODUCTION
213
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
been done in [6] while an enhancement using
adaptive integral backstepping has been done
in [7]. An adaptive robust control has been used
in [8] and a model reference adaptive control is
done in [8]. However for mass and inertia
estimating, a comparison between model reference
adaptive control and model identification adaptive
control has presented in [10]. Moreover a
Lyapunov-based robust adaptive control has been
used in [11], [12] and [13]. And in [14], a
composite adaptive controller has been shown.
Furthermore, estimating extra parameters such as
aerodynamic coefficients can be shown first
in [15] using Lyapunov-based robust adaptive
control also in [16] using adaptive sliding mode
control and last in [17] using adaptive integral
backstepping method.
Quadrotor is considered as under actuated
subsystem; it has more degree of freedom than
number of actuators. Thus, the introduced control
method will divide the whole system to two sub
systems. The first subsystem will control the
internal dynamics using sliding mode control.
However, the second subsystem, which is a full
actuated system, will be controlled using a robust
adaptive control; to remove the effects of the
parameter uncertainty and reject the noise while
tracking the desired output.
This research paper is organized as follows. In
Section 2, the problem statement is defined. The
dynamic equation of the quadrotor model and the
reference frames are introduced in the next
section3. The proposed adaptive control scheme is
fully described in Section 4. Followed by The
enhancement on the adaptive law using robust
technique in Section 5. Finally, the validation of
the proposed control is done using Simulation in
last section.
2
PROBLEM DEFINITION
QUADROTOR MODEL
214
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
(1)
(2)
[ ]
[ ]
(3)
][
][
]
(4)
To map the orientation of a vector from Bframe to E-frame and vice versa, a rotation matrix
is needed and it is described as follows:
[
where
means
( ) and
means
( ).
where
are the quadrotor inertia matrix
around
axis respectively in [Nms2],
is the quadrotor mass in [kg],
is the overall
-1
propellers speed in [rads ],
is the total
rotational moment of inertia around the propeller
axis in [Nms2], is the thrust factor in [Ns2],
is the drag factor in [Nms2], is the distance
between the center of the quadrotor and the center
of a propeller in [m], [
] are the inputs
of the quadrotor representing the collective force,
roll torque, pitch torque, yaw torque respectively
and
is the speed of the ith motor in [rads-1].
4
CONTROL SCHEME
215
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
method is been used to divide the system into two
subsystems [18].
The internal dynamics that yield from using the
feedback linearization are considered in the first
subsystem and it is given by:
(5)
[ ]
command
and
for the roll and pitch signals
respectively are been selected such that the
tracking control for
and
are been achieved.
Thus, the internal dynamics will be grantee to be
stable. The block diagram of the sliding control is
shown in Figure 3.
]
(8)
)
(9)
Control
for
Internal
216
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
( )
(10)
(15)
( )
(11)
* +
(12)
where and
are design positive constants and
represent a stable Hurwitz polynomial.
4.1.3 Control Law:
A relation between the input force ( ) and the
gravitational acceleration ( ) could be made by
using the dynamic equation (1) to simplify the
control law. From the dynamic equation of the zaxis:
( )
( )
(16)
(17)
(13)
4.3 Parameterization:
When the system moves in XY-plane, the
acceleration in z-axis will equal to zero:
( )
( )
(14)
217
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
(20)
where
represent the command
inputs of the second subsystem and
represent the desired system performance Also.
]
(21)
[ ]
[ ]
(22)
where
is a positive definite diagonal matrix
defined as:
[
(23)
218
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
And
are design positive
constant, which represent a stable Hurwitz
polynomial.
(24)
(30)
(31)
( )
( )
( )
( )
(32)
(33)
(25)
* ( )
where
( )
Therefore,
converge exponentially to the region
defined by ( ).
(26)
(27)
where
is the filtered version of the actual input,
defined as:
(34)
(35)
(28)
where:
(
(
)
)
(29)
where
are defined as design
positive control gains. By substituting the control
law in (6) yields:
(36)
(37)
219
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Let us choose the composite adaptation law as:
(
)
(38)
( )
( )
(39)
By ysing Barbalatslemma
( )
( )
(40)
( )) (
)
( )(
( )
))
(41)
( )
And since
are positive definite
diagonal matrices, the above expression
guaranteed global stability and global tracking
convergence of both the sliding control and
adaptive control systems.
5
PARAMETER DRIFT
* ( )
( )
* ( )
( )
| |
+ | |
SIMULATION RESULTS
220
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
In the simulation, all the plant parameters are
considered to vary with time and they have been
generated using square wave function. Also, they
have a common duty cycle of 50% and a common
frequency of
. Still, each parameter has
got different amplitude and offset which are
shown in Table 1.
Parameter
Value
[
Time
Varying
Parameter
Fixed
Parameter
Frequency
in Hz
Offset
Amplitude
1.5
0.01
0.0125
0.02
0.1
0.002
Value
1
0.005
0.005
0.01
0.09
0.001
( )
*
)
)
+
( )
( )
)
20
Frequency in Hz
0.015
0.01
0.012
0.009
( )
0.03
Command
Offset
0
0
0
0
221
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
In Figure 6, the tracking error of the both scheme is illustrated. The robust control which has been
represented in the blue line has less tracking error.
222
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
In Figure 8, the parameter estimation has been plotted. The black thick line represents the true parameter
estimation. The robust control has better ability to estimate the actual parameter.
In Figure 8, it is easily shown that the robust control can reject the noise in effective way.
223
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Table 4: Parameter Estimation Mean Square Error (MSE)
Parameter
(
)
Robust
0.10981
0.00367
0.01143
22.8098
0.06901
2.51034
0.10981
Method
Non-robust
0.036170
2.539e-05
8.021e-05
0.271159
0.001622
0.094554
0.036170
CONCLUSION
A robust nonlinear composite adaptive control
algorithm is done for a 6-DOF quadrotor system.
The proposed controller forced the quadrotor to
follow a desired position, velocity, acceleration
and the heading angle despite the parameter
uncertainty and noisy signal.
The composite adaptive controller is driven
using the information from both the tracking
errors and the parameter errors. The composite
adaptive controller has been enhanced to reject the
noise using robust technique. The stability of the
closed-loop system is shown in the flight region of
interest. Also the comparisons between both
sachems are illustrated.
REFERENCES
[1] Puri, A. "A Survey of Unmanned Aerial
Vehicles (UAV) for Traffic Surveillance."
Technical Report, Tampa, 2005.
[2] Li, B., Mu, C. and Wu, B. "A Survey of Vision
Based
Autonomous
Aerial
Refueling
forUnmanned Aerial
Vehicles." Third
International Conference on Intelligent Control
and Information Processing. Dalian, China:
IEEE, 2012.
[3] Saggiani, G. M., and Teodorani."Rotary wing
UAV potential applications: an analytical
study through a matrix method", Aircraft
Engineering and Aerospace Technology, Vol.
76 Iss: 1, pp.6 14, 2004.
[4] Chowdhary, G., Sobers, M., Pravitra, C.,
Christmann, C., Wu, A., Hashimoto, H., Ong,
224
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 213-225
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Flight Evaluations", IEEE Transactions on
Control Systems Technology, vol. 21, no. 4,
pp. 1400-1406.
[15] Bialy, B.J., Klotz, J., Brink, K. & Dixon,
W.E. 2013, "Lyapunov-based robust adaptive
control of a quadrotor UAV in the presence of
modeling uncertainties", IEEE, , pp. 13.
[16] Bouadi, H., Simoes Cunha, S., Drouin, A. &
Mora-Camino, F. 2011, "Adaptive sliding
mode control for quadrotor attitude
stabilization and altitude tracking", IEEE, , pp.
449.
[17] Lee, D., Nataraj, C., Burg, T.C. and
Dawson, D.M. 2011, "Adaptive tracking
control of an underactuated aerial vehicle",
IEEE, , pp. 2326.
[18] Das, A., Lewis, F. L., and Subbarao, K.,
"Sliding Mode Approach to Control Quadrotor
Using Dynamic Inversion, Challenges and
Paradigms in Applied Robust Control", ISBN:
978-953-307-338-5,
InTech,
DOI:
10.5772/16599.
Available
from:
http://www.intechopen.com/books/challengesand-paradigms-in-applied-robustcontrol/sliding-mode-approach-to-controlquadrotor-using-dynamic-inversion
[19] Sastry, S.S. and Isidore, A., "Adaptive
Control of Linearizable Systems", I.E.E.E
Transactions Automation Control, 1989.
[20] Slotine, J.J.E., and Coetsee, J.A., "Adaptive
Sliding Controller Synthesis for Nonlinear
Systems", Int. J. Control, 43(4), 1986.
[21] Slotine, J -J E, and Weiping Li. Applied
Nonlinear Control. Englewood Cliffs, N.J.
Prentice Hall, 1990., 1990.
[22] Emran,
B.
"NONLINEAR
CONTROL
J.,
and
A.
Yesildirek.
COMPOSITE ADAPTIVE
FOR
QUADROTOR."
The
225
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Faculty and Head of Department of Computer Engineering, Islamic Azad University (IAU), UAE Branch, Dubai, UAE
2
Department of Computer Engineering, Islamic Azad University (IAU), UAE Branch, Dubai, UAE
1
malakooti@iau.ae , 2 e_bazofti@yahoo.com
I.INTRODUCTION
Database security is the most important issue of cloud
computing, information sharing and processing where
many users are assigned to share the same
information stored on the distributed networks or
database servers. Although there are many security
checks and authentication techniques to identify the
users before they are allowed to access the data
centers or database servers but yet the unauthorized
users and hackers can always find a way to bypass all
these security checks and illegally access the
database. The multilayer encryption is one the best
ways to secure the contents of database table and
prevent the access of the illegal users from the
original data even they have reached to the core of
data centers.
They are several different encryption techniques that
have been used for database security but none of
them have used three levels of security as we applied.
In addition we have applied another algorithm called
226
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Malakooti-Bazofti Hash algorithm to generate a
unique Tag or Hash pattern for the entire database
content to be compared with previous stored Tag. If
the new Tag is different from the previous Tag, then
the system will activate the Attack Alarm and
informs the administrator via SMS or Email.
The idea of securing databases using cryptographic
system is not new and several researchers have
proposed new techniques for the database encryption.
Gudes, Koch and Stahl [1] have presented anew
method for database encryption based on substitution,
transposition,
Reduction and expansion of data items but it
preserves data structures. Davida, Wells and Kam [2]
have proposed an encryption technique based on the
Chinese Remainder Theorem in which some
algebraic operation are performed on the content of
database and each records are encrypted by applying
some mathematical operations. The encrypted data
also can be decrypted by the inverse operation using
Chinese remainder theorem. Several other researchers
including [3-6] have used Data Encryption Standard
(DES) and RSA algorithm to perform the encryption
and decryption based on the public and private keys
as well as performed the authentication based on the
checksums of the data elements and the checksum are
obtained from the identifiers and the database key.
Our proposed method for encrypting the database
contents is based on the Malakooti Orthogonal
Transform in which its orthogonal property can be
used to invert the Transformation matrix by Matrix
Transpose operation instead of direct calculation of
the matrix inversion, during the decryption process.
To increase the level of security on the database
contents we have obtained the matrix of secret
byesby applying the Cellular Automata on the
elements of the M-T matrix. Once the secrete key
matrix is calculated it will be multiplied with the
matrix of coded data elements and finally XOR
operation is applied on the resulting elements and the
Hash values derived from Hash function applied on
the corresponding database records.
In addition to applying three levels of security on
database based on the M-T transform, Cellular
Automata, and Hash Algorithm, we have generated a
Unique Hash pattern or Authentication Tag based on
Malakooti-Bazofti (MB) Hash Algorithm, in which
]
],
(3.2)
(3.3)
Where the matrix I is a 2 x 2 identity matrix and
constant parameters c is equal to the determinant
of . Thus,
(
)
c
(3.4)
227
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Thus,
inverse is given as
(3.5)
Similarly, the fourth order M-T matrix,
can be
obtained according to (3.6)
[
]
(3.6)
The matrix
matrix
is a 4 x 4 anti-symmetric unitary
=C2 I,
(3.7)
where the matrix I is an 4 x 4 identity matrix, c is
given in (3-4), and the inverse of M2 is calculated
according to
M 2 1
M t2
C
(3.8)
And
M-T matrix,
t
Mk
(3.10)
Ck
(3.11)
(3.12)
And
(
=(
)
( )
( )
( )
(
.
(3.15)
We can easy generate the elements of the M-T
matrices by assuming that a=1, b=2, and expand the
idea to get
M-T matrices of size 2, 4, 8, 16, recursively as
following:
1 2
M1
2 1
1
2
M2
2
(3-16)
1
4
2
4
1
2
4
2
2
(3.17)
(3.9)
=
=
(3.13)
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
and other branches of sciences. In two dimensional
CA grids each cell has a few neighborhood cells. If
the neighboring cells are located at right side, left
side, top, or bottom of the specified cell, they are
called Von Neumann Neighborhood in the honor of
Von Neumann who worked with Stanislaw Ulam at
Los Alamos National Laboratory, New Mexico,
USA, 1940.
An initial state of each cell at time t=0 is givens but
the new state of each cell at other times, t>0, is
calculated based on current state of the cell and the
sates of cells in its neighborhood. The mathematical
rules for updating the state of all cells are the same
and it will not be changed over the time [7].
Given the rule, anyone can easily calculate future
states, but it appears to be very difficult to calculate
previous states. However, the designer of the rule can
create it in such a way as to be able to easily invert it.
Therefore, we can say that it is Cleary a trapdoor
function, and can be used as a public-key
cryptosystem. The security of such systems is not
currently known [8].
The idea of Cellular Automata is intuitive and simple,
and it consists of a regular grid of cells. Each of
which may be in a predetermined number of states.
Cell ai+1 with the following rule:
Cell ai+1=Cell ai-1 + Cell ai
(4.1)
Suppose that we have the string of 11010010 and we
want to use the above rule such as our cellular
automata, then the Generated string will be
10101011. Table-1 shows the Generated string of
internal cellular automata rule [9].
Table 1: An Example of Cellular Automata
Input string
Internal cellular rule
Generated string
1 1 0 1 0 0 1 0
Cell ai+1=Cell ai-1 + Cell ai
1 0 1 0 1 0 1 1
V. PROPOSED METHOD
In addition to our suggested method for encrypting
the database using Malakooti Orthogonal Transform
that applied on the matrix of ASCII values
representing the elements of each record in the
database, the idea of Cellular Automata also is used.
229
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
hash function operation and finally calculation of the
Hash Value to generate the Authentication Tag.
230
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
{
M2
2 4
1
2
4 2 2 1
2- Specify the Rule of Cellular Automata for
Key generation algorithm, For example , we
used this rules for cellular automata:
Cell ai+1=Cell ai-1 + Cell ai
(7-1)
Kt
2 6 3 3
2 4 1
4
4- Compute the determinant of the key matrix to
make sure that key matrix is invertible. Its
inversion is required for the decryption
process.
5- Generate a new key matrix if the determinant
of the key matrix is equal to zero.
The inverse of matrix Kt must exist otherwise the
decryption process cannot be performed. One can
easily show that possibility of the determinant of Kt
to be zero is very low because the rows of database
table have different value and chance of the
determinant to be zero is very low but it is not
impossible.
The Source Code of key Generation Algorithm
int u = 0,g;
publicvoidKey_Gen_Cellula()
{
if (u == 0)
}
}
}
else
{
for (inti = 0; i<= 7; i++)
{
for (int j = 0; j <= 7; j++)
{
Matrix_KeyGen_Cellula_Data[i,j]
Matrix_KeyGen_Cellula_Copy_Data[i, j];
}
}
for (inti = 0; i<= 7; i++)
{
for (int j = 0; j <= 7; j++)
{
g = j;
for (int k = j + 1; k <= j + 1; k++)
{
if (k == 8) { }
231
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
if (j == 0)
{
Matrix_KeyGen_Cellula_Data[i,j]
Matrix_KeyGen_Cellula_Copy_Data[i, j] + 1;
}
elseif (j == 7) Matrix_KeyGen_Cellula_Data[i, j] = 1;
else
Matrix_KeyGen_Cellula_Data[i,j]
Matrix_KeyGen_Cellula_Copy_Data[i,g-1]
Matrix_KeyGen_Cellula_Copy_Data[i, k];
}
}
}
for (inti = 0; i<= 7; i++)
{
for (int j = 0; j <= 7; j++)
{
Matrix_KeyGen_Cellula_Copy_Data[i,j]
Matrix_KeyGen_Cellula_Data[i, j];
=
+
}
}
}
u++;
}
57
53
32
32
Ma
101
110
0
0
0
0
0
0 114 0 115 0 111 0
0 32 0 50 0 48 0
0 0 0 0 0 0 0
0 0 0 0 0 0 0
0
0
0
0
48
56
66
65
0 49
0 48
0 79
0 110
0 49
0 55
0 66
0 100
2 4 1
2 4 8 2 4
4 2 2 1
8 4 4 2
M3
2 4 4 8 1
2
2 4
4 2 8 4 2 1 4 2
4
8 2 4 2 4 1 2
4 2 4 2 2 1
8 4
1
4 11 9 18 6
7
14
0
18
9 15
Kt
1
9 31 9 18
4
24 10 18
9 5
7
7
4
5
7 14 5
7 13
5 2 7 14
MC = Kt* Cd
1
1
1
1
1 1
1 1
9 1
4 1
21
11
9
4
(8-2)
232
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
8- Multiply the Hash Value of each row obtained
from Hash function, Hf, into the
corresponding row of the secret key matrix,
Kt, to get complex secret key values. Apply
these keys on each row of Mc Matrix to obtain
the Encrypted data matrix, Me, that represents
the encrypted version of the corresponding
data table.
Me= MCXOR(Hf*Kt)
(8-3)
9981
13197
Mc
13302
1098
0
(9-2)
9183 6050
111
148
4830 3607 813
11550 9045 1980 2640 4770 3440 660
17607 12285 5559 7412 3780 3323 243
0
0
0
0
0
0
0
= (MT)-1 * MT *Ma
(9-3)
233
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
X.GENERATION OF AUTHENTICATION TAG
In this section we have generated an Authentication
Tag Value based on the Malakooti- Bazofti (M-B)
Algorithm, in which multiple level of XOR and
NOR operations are applied on each group of hash
values obtained from the database records. Thus, all
hash values that obtained from the records are
combined together to obtain a unique hash value
require for the database security and authentication.
We have proposed a robust and fast algorithm for the
database
security
and
authentication
that
automatically and accurately will generate the Hash
values for the entire rows of the database tables to
obtain a unique Hash value for each table. This
unique hash value can be used to check the validity of
the data inside the database and guarantee the
authentication of all information in each database.
Should any slight change is made on the database
while the database is in the protected mode, the
generated hash value would be totally different from
the stored hash value and the software system
automatically will activate the alarm flag to inform
the administrator about unauthorized change of
database via SMS or Email.
In our proposed method, we have divided each
database table into N different records and used the
concept of parallel algorithm to calculate the Hash
values of all records of each table in database as well
as to calculate the Hash values of all columns,
accurately and efficiently. Once the hash values are
calculated, the fast XOR and NOR operations are
applied on the generated Hash values to obtain a
unique hash values for the Authentication Tag.
234
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 226-235
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Should any slight change is made on the database
while the database is in the protected mode, the
generated Hash value would be totally different from
the stored hash value and the software system
automatically will activate the alarm flag to inform
the administrator about unauthorized change of
database via SMS or Email.
Our proposed algorithm applied three levels of
security on the database contents and guarantees the
security of database tables. It also use the orthogonal
property of M-T matrix to obtain its inverse using its
transpose rather than the direct inverse calculation,
required for the decryption process More work need
to done to obtain a fast algorithm to perform the
cellular automata for generating the matrix of secret
keys.
XII. REFERENCES
[1] E. Gudes, H.S. Koch and F.A. Stahl The application of
cryptography for data base security. Proceedings of AFIPS
National Computer Conference, 1976, pp. 97-107.
[2] G.1. Davida, D.L. Wells and J.B. Kam, A database
encryption system with subkeys, ACM Trans. on Database
System, Vol. 6, No.2, June 1981, pp. 312-328.
[3] A.Afyoni Database Security and Auditing, 2005,
Amazon.com.
[4] L.Bouganim, Y.Guo, Database Encryption, Le Chesnay,
France, 2009.
235
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Fatimah M. Mujallid
ABSTRACT
This paper describes the multistage process for
building Arabic WordNet (ArWn) to be used in mobile
device. The goal of this paper is how to create corpus,
starting with selecting an annotation task, designing the
data with the annotation process, and finally evaluating
the results for a particular goal. Therefore, the paper
presents designing and implementing bi-lingual lexicon
to be used in machine translation and language
processing.
Consequently, the paper takes into consideration
language characteristics in both directions Arabic and
English. The proposed system is based on WordNet
lexical database with a semantic and commonsense
knowledge. The proposed dictionary will be
implemented for mobile devices, therefore; the cloud
computing will be used in this implementation.
Consequently, SQL Azure will be used to solve
scalability, and interoperability of mobile users and
other methods have been used for both Arabic and
English languages. So, the SQL Azure will be used as
the cloud database to solve both the scalability in the
data with scale terabytes of data to millions of mobile
users and the interoperability challenges. The system
dictionary is developed and tested in Android mobile
platform. Experimental results show that the proposed
system has two versions- at work; offline and online.
The online approach uses the mobiles computing in the
cloud system to reduce the storage complexity of the
mobile. Real time test will be used in order to evaluate
the system access and respond times to display results.
KEYWORDS
MT, dictionary, Arabic, NLP, lexical, and
commonsense.
1 INTRODUCTION
Machine Translation (MT) is an important area
of Natural Language Processing (NLP)
applications and technologies in this domain are
highly required. Machine Translation applications
translate source language text (SL) into target
236
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Arabic language is one of the most spoken
language in a group called semitic languages, 422
people around the world speak it which considered
to be one of most considered and distributed
language around the globe [8] [9] [10] [11] [12].
The Arabic language is ranked sixth of the most
ten impact languages, with an estimated 186
million native speakers. In 2010 [12] the number
of Arabic native speakers increased to 239 million
people and the ranked of Arabic in the list rose to
the fifth3. Arabic speakers are increasing and
Arabic language is expanding in the world,
therefore number of Arabic documents and articles
are increased. This shows the importance of the
Arabic Language in the world.
Currently, linguistic and lexical resources for
Arabic language are growing but still they are few,
especially efforts for mobile devices. However,
the last decade has known a number of attempts
aiming at offering electronic resources for the
Arabic NLP community. One of the attempts is
the Arabic WordNet [12] [13] [14] [15] [16]
project which the objective was to construct and
develop a freely available lexical database for
standard Arabic. Arabic WordNet has very low
coverage and limited words.
Nowadays, people use their mobile for many
purposes and most of the users have replaced
computers desktops and laptops with them. By
2012 there were about 6 billion mobile users in the
world3. This big number shows what the future
will be; mobile computing. There are successful
attempts to build English smart mobile dictionary
but there are reared in Arabic language. The need
for an Arabic lexical database mobile application
has led to the creation of mobile dictionary
system. This paper presents to design and
implement bilingual (Arabic-English) mobile
dictionary using WordNet as lexical database.
In this paper, key terminology and formulations
used throughout this paper will be introduced.
Section 2 gives an overview in all the relevant
areas most notably the related work upon this
work is founded. Section 3 describes the mobile
dictionary framework, so, the system architecture
will be presented and illustrated. In section 3, also,
3
http://newsfeed.time.com/2013/03/25/more-people-have-cellphones-than-toilets-u-n-study-shows/
237
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
database and it is linked to PWN using ontology
inter-lingual mechanism. The structure of AWN
consists of four entity types: item, word, form and
link. An item has information about the synsets,
ontology classes and instances. A word has
information about word senses. A form represents
a root or is plural form derivation. A link is used
to connect two items, and also it connects a PWN
synset to an AWN synset. Another WordNet
created for Arabic is a master thesis written in
2010 [20]. This thesis presents easy to use Arabic
interface WordNet dictionary which is developed
as the way the EWN has been developed [21].
This is monolingual dictionary for Arabic
language and is not connected to EWN or PWN
although it is built following them [21].
All these previous studies were built to work on
desktop applications. However there are few
attempts to build lexical database on mobile
platforms based on lexical knowledge and
commonsense. One of these attempts is creating
WordNet mobile-base to work with PWN for the
Pocket PC platform (Windows Mobile), they
called it WordNetCE [22]. Also there is smart
phone version (WordNetCE-SP) [23] [24].
Another success attempts is the Dubsar project
[24] which is a simple web-based dictionary
application based on PWN. Dubsar is a work in
progress; it is available for free worldwide on the
iTunes App Store for many of mobile devices.
Also it is available in the Android Market for free
worldwide.
There are other non free dictionaries and
thesaurus based on PWN for mobile platform such
as English WordNet dictionary by Konstantin
Klyatskin7, Advanced English Dictionary and
Thesaurus by Mobile System Company8,
LinkedWord Dictionary & Thesaurus by Taisuke
Fujita and Blends by Leonel Martins9.
From this literature review, the authors can
observe that there are no attempts to create an
Arabic dictionary for mobile platforms by using
lexical database. So the goal is to conduct a
dictionary which is organized by meaning and has
7
8
http://filedir.com/company/konstantin-klyatskin/
http://appworld.blackberry.com/webstore/content/314/?countrycode=
SA&lang=en
9
https://itunes.apple.com/us/app/linkedword-dictionarythesaurus/id326103984?mt=8
238
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
on faith fullness (translation model) and fluency
(language model) as the following:
P ( S , T ) = argmax T P ( S| T) P (T)
(1)
(2)
239
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The annotation process can be summarized in
terms of the MATTER cycle processes [4]: Model,
Annotate, Train, Test, Evaluate and Revise.
3.5. Matter Description
The annotation process can be summarized in
terms of the MATTER cycle processes [4]; Model,
Annotate, Train, Test, Evaluate and Revise. Figure
2 shows the MATTER development life cycle,
[31].
(5)
S(T,P)
(6)
(7)
(8)
(9)
240
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
understanding [5]. Today, practical translation
systems exist for specific domains and for
particular pairs of languages. According to that
natural language toolkit (NLKT) is published and
used to support such translation. Many of NLP
material are covered in more details [4] [5].
Consequently, simple translator can be made
using NLTK by employing source language (e.g.
English language) and target language (e.g. French
language) pairs, and then convert each to
dictionary.
There are many online language translation
APIs (e.g. provided by Google and Yahoo).
Using such APIs translation, we can translate text
in a source language to a target language. NLTK
comes with a simple interface for using it [6].
Therefore, the internet is required to access and
used in the translation function. Consequently, to
translate text, two things are needed to know:
1. The language of text or source language.
2. The language of want to translate or target
language.
4 MOBILE DICTIONARY FRAME WORK
4.1 Principles
The proposed dictionary is a cloud mobile
application for an English-English, English-Arabic
and Arabic-Arabic dictionaries. The first phase is
used to collect and download the data from online
English dictionary that is liked The Project
Gutenberg Etext of Websters Unabridged
Dictionary10, and it is used to create database file,
figure 4.
http://www.gutenberg.org/cache/epub/673/
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
the same system. These layers do not have to be
physically on different locations on different
computers on a network, but could be logically
divided in layers of an application [28] [29]. In the
four tier structure there are three layers are hidden:
presentation layer, process management layer and
database management layer. Figure 5 illustrates
these four layers. Within the dictionary-scale
semantic processing, the cloud computing
services; Software as a Service (SaaS), Platform as
a Services (PaaS), Infrastructure as a Services
(IaaS) [29] and Data as a Services (DaaS)
supposed to be employed, as illustrated in figure 5.
The
SaaS
layer
introduces
software
applications, PaaS presents a host operating
system, cloud development tools, while, IaaS
delivers virtual machines or processors, supports
storage memory or auxiliary space and uses
network resources to be introduced to the clients.
Finally, DaaS includes large quantity of available
data in significant volumes (Peta bytes or more).
Such data may have online activities like social
media, mobile computing, scientific activities and
the collation of language sources (surveys, forms,
etc.).
Therefore, cloud clients can access any of the
previous web browsers or a thin client with the
ability to remotely access any services from the
cloud.
4.3 Arabic WordNet Database Design
Arabic WordNet is identical to the Standard
English WordNet (PWN and EWN) in structure.
Therefore, Arabic words will be organized into
four types of POS: nouns, verbs, adjectives and
adverbs. Each word is grouped with other words
that have the same meaning in a group called
Synset. Each Synset is organized under a concept,
and it is related to other synset with lexical or
semantic relations. Nouns and verbs are arranged
in structured way based on the hypernymy/
hyponymy relations. Adjectives are categorized in
groups consist of head and satellite synsets. Nearly
all head sysnets have one or more synsets that
have the same meaning these called satellite
synsets. Every adjective is organized based on
antonyms pairs. The antonym pairs are in the head
synsets of a group.
242
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
http://www.slideshare.net/rmaclean/json-and-rest
http://shop.oreilly.com/product/9780596529260.do
13
http://msdn.microsoft.com/en-us/magazine/dd315413.aspx
12
243
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
2. The RESTful Web service receives the mobile
application message request and give a call and
pass $filter=synset_id as a parameter.
3. Windows SQL Azure database will return the
records that are equal to synset_id.
4. The returned data will be converted to JSON
format (automatically) and go back to the
mobile device.
5. The data will be available to the mobile
application.
5 EVALUATION
The proposed ArWn is made up of Arabic
words and related English words, so, the complete
synsets includes 5 parts of speech, nouns (6,438),
verbs (2,536), adjectives (456), adjective satellite
(158), and adverbs (110).
14
http://www.gartner.com/newsroom/id/2335616
http://www.idc.com/ getdoc.jsp?containerId=
prUS23638712#.USKkKmcV-gM
5.1Performance
The response time is important to evaluate the
performance of mobile dictionary system. The
definition of response time is the duration that a
system or application takes to respond to the
client. To calculate such time in mobile, we need
to know: network bandwidth (speed), number of
users (clients), client processing time, server
processing time, and network latency time.
Therefore, the mobile dictionary system response
time can be defined using all the varieties above to
return the results to the user (client), as follows:
Time = T client + T network latency + T server
(10)
Where:
T network latency = Word meanings * N / Net Speed
(11)
N represents number of clients.
Real time testing of mobile dictionary is used in
order to evaluate the system access time and the
needed time to respond and show the results. The
testing was done by connecting to the Azure
cloud, using Wi-Fi connection with 2MB/S speed.
15
244
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The service respond time is illustrated in table 1.
The respond time is in seconds.
Table 1. Mobile Dictionary Service Respond Time
Service
English
word details
Word
Time
Word
Time
Word
Time
Word
Time
Word
Time
Rodent
5.9049 s
Stimulant
3.8422 s
Bruise
4.3392 s
Man
5.4584 s
Cat
5.1174 s
5.9066 s
5.1384 s
3.4754 s
3.1556 s
3.9299 s
3.0172 s
3.7155 s
4.9957 s
3.0083 s
4.3919 s
Rodent
0.5215
Stimulant
0.3156 s
Bruise
0.3123 s
Man
0.7523 s
Cat
0.3130 s
0.9635 s
0.8978 s
0.4134 s
0.4084 s
0.6646 s
0.5485 s
0.6333 s
0.6399 s
0.4660 s
0.5285 s
Word
Time
Word
Time
Word
Time
Word
Time
Word
Time
Equivalence
Arabic details
Arabic
word details
Equivalence
English
details
Rodent
5.2448 s
Stimulant
4.6711 s
Bruise
4.1127 s
Man
5.0872 s
Cat
5.7743 s
English 2 Arabic
Arabic 2 English
6
5
4
3
2
1
0
Rodent
0.5862 s
Stimulant
0.3038 s
Bruise
0.3079 s
Man
0.6863 s
Cat
0.4818 s
Attribute
Cause
Class member:Category
Class member:Region
Class member:Usage
Pertainym
Substance holonym
Substance meronym
Member meronym
Member holonym
Part meronym
Part holonym
Hyponym
Instance hyponym
Entails
Antonym
Similar
Derived
See also
Verb group
Participle
Hypernym
Troponym
Disharmonies
Derived related form
Total
No of
Relation
13
11
10
6
3
12
11
11
21
21
6
6
138
6
6
6
5
26
6
5
3
37
2
2
2
375
Correct
Relation
11
9
8
4
2
8
8
8
15
19
4
4
99
4
4
5
4
20
5
5
2
31
2
2
2
285
Precision
Percentage
15.385
18.182
20.000
33.333
33.333
33.333
27.273
27.273
28.571
9.524
33.333
33.333
28.261
33.333
33.333
16.667
20.000
23.077
16.667
0.000
33.333
16.216
0.000
0.000
0.000
21.35 %
84.62
81.82
80.00
66.67
66.67
66.67
72.73
72.73
71.43
90.48
66.67
66.67
71.74
66.67
66.67
83.33
80.00
76.92
83.33
100.00
66.67
83.78
100.00
100.00
100.00
100 %
245
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
6 CONCLUSIONS
This paper described building bilingual
dictionary with lexical and commonsense
database. Such dictionary used clouds technology
and services to store the proposed data of the
dictionary. Therefore, the authors proposed an
application for mobile devices with Android
operating system. This application is a dictionary
uses the WordNet as a lexical concept and
commonsense database. This dictionary is
bilingual from English language to Arabic
language and vice versa. The RESTful web
service of the Windows Azure have been used to
deal with the interoperability and data scaling on
the storage problem of mobile application.
Moreover, the results of this paper open a new
way of approaching for mobile computing in
cloud system, by using such technology for
reducing the complexity of mobile storage.
In the future, the authors plan to develop the
dictionary for other mobile operating system. Also
the authors intent to increase the Arabic language
coverage and add to the dictionary some advanced
features such as visuality to the Arabic WordNet
dictionary. Also, the proposed system can be
extended by adding special needs technology,
such as sign language, speech recognition and
speech synthesis to allow deaf and blind peoples
to communicate.
REFERENCES
1. Jurafsky, D. and Martin, J. Speech and Language
Processing: An Introduction to Natural Language
Processing, Computational Linguistics and Speech
Recognition. Prentice Hall, Englewood Cliffs, NJ, 2008.
2. Karimi, S. Machine transliteration of proper names
between English and Persian. Ph.D. dissertation, RMIT
University, Melbourne, 2008.
3. Karimi, S. Falk Scholer, F. and Turpin, A. Machine
Transliteration Survey. ACM Computing Surveys, Vol.
43, No. 3, Article 17, Publication date: April 2011.
4. Pustejovsky, J., and Stubbs, A., Natural Language
Annotation for Machine Learning, 1st Edition, O'Reilly
Publisher, Release Date: October 2012.
5. Bird, S., Klein, E. and Loper, E., Natural Language
Processing with Python, OReilly Media, 2009.
6. Nitin I. and Damerau, F., Handbook of Natural Language
Processing, (Second Edition), Chapman and Hall/CRC,
2010.
7. Perkins, J., Python Text Processing with NTK 2.0
Cookbook, Packt Publishing, Birmingham-Mumbai, 2010.
246
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 236-247
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
22. Far, R.: Mobile Computing Principles: Designing and
Developing Mobile Applications with UML and XML,
published by Cambridge Univ. Press, 2005, pp. 861.
23. Talukder, A., and Yavagal, R.: Mobile Computing:
Technology, Application & Service Creation, published
by the Tata McGraw Hill publishing company limited,
Jan 1, 2005, pp. 668.
24. Arokiamary, V.: Mobile Computing, published by
Technical Publications Pune, Jan 1, 2009, pp. 556.
25. Strowd, H., Lewis, G.: T-Check in System-of-Systems
Technologies: Cloud Computing, Software Engineering
Institute, Carnegie Mellon, Pittsburgh, Pennsylvania,
Technical
Note
CMU/SEI-2010-TN-009,
2010,
http://www.sei.cmu.edu/library/abstracts/reports/ 10tn009.cfm
247
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Group Decision Support System Based on Enhanced AHP for Tender Evaluation
Fadhilah Ahmad1 , M Yazid M Saman2, Fatma Susilawati Mohamad3, Zarina Mohamad4,
ABSTRACT
Application of model base in group decision making
that makes up a Group Decision Support System
(GDSS) is of paramount importance.
Analytic
Hierarchy Process (AHP) is the multi-criteria decision
making (MCDM) that has been applied in GDSS. In
order to be effectively used in GDSS, AHP needs to be
customized so that it is more user friendly with ease of
used features. In this paper, we propose an enhanced
AHP model for GDSS tendering. The enhanced AHP
method used is the Guided Ranked AHP (GRAHP). It
is a technique where decision matrix tables are
automatically filled in based on ranked data. However,
the generated values in the decision matrix tables can
still be altered by following the guidelines which in
turn serve the purpose of improving the consistency of
the decision matrix table. This process is transparent to
Decision Makers because the degree of data
inconsistency is visible. A prototype system based on
tendering process has been developed to test the
GRAHP model in terms of its applicability and
robustness.
KEYWORDS
Group Decision Support System (GDSS), MultiCriteria Decision Making (MCDM), Analytic
Hierarchy Process (AHP), Tender Evaluation.
1 INTRODUCTION
Decision support system (DSS) is seen as building
blocks that offers the best combination of
computational power, value for money and
significantly offers efficiency in certain decision
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
constraints. Evaluation of a problem in DSS can
either be done by a single decision Maker (DM) or
a group of decision makers (DMs). If it involves a
single DM, the DSS is called Single DSS (SDSS)
and if a group of DMs are involved, the term
group DSS (GDSS) is used. GDSS comprises a
large body of research and it remains an active
area of investigation. A GDSS in web-based
environment is a computerized system that makes
use of model base and database/knowledge base
which delivers decision support information or
decision support tools to a group of DMs/users
using a web browser such as Netscape Navigator
or Internet Explorer [3].
There is a need to consider a group of DMs in
improving the productivity of decision making and
also the quality of decision results. [4] states that
groups have an advantage in combining talents
and providing innovative solutions to possibly
unfamiliar problems. This is because groups
possess a range of skills and knowledge compared
to individual DM. A well-known MCDM model
that has been used in GDSS is Analytic Hierarchy
Process (AHP) [26-28]. [18] used Group Analytic
Network Process (GANP) to support hazard
planning and emergency management under
incomplete information. They showed that both
AHP and GANP have great potential to be
deployed in specified case involving a group of
DMs. Group fuzzy prioritization processes for
AHP/ANP was also suggested to be used if the
nature of the problems is tentative, imprecise,
approximate and uncertain [11]. A group decision
approach for evaluating educational web sites
using several soft computing technologies e.g.
fuzzy theory, grey system and group decision
method has been proposed by [19]. A GDSS for
evaluation of tenders of ICT equipment based on
multi attribute group decision models and the
software WINGDSS was developed by 12]. The
winner of a tender would be the one who makes
the best offer after the prequalification process and
the ranking processes.
Even though many GDSS have been developed
using various model bases, none of them provides
flexibility to DMs in terms of the followings:
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
approximate and uncertainty, then the model base
suggested is group fuzzy prioritization processes
based on AHP or GANP.
Another GDSS approach has been studied by [11]
on journal evaluation. The method that has been
used is an integration of subjective (eg. experts
judgments on journals) and objective approach
(eg. Impact factors of journals). Fuzzy set
approach is used when dealing with imprecise or
missing information.
Gwo-Jen et al. (2004) have proposed a group
decision approach for evaluating educational web
sites. Several soft computing technologies have
been employed in the approach, such as fuzzy
theory, grey system and group decision method. A
computer-assisted website evaluation system,
EWSE (Educational Web Site Evaluator), has
been developed based on an experimental
Authors
Model
2014
Kar
2014
Taylan et al.
2013
Srdjevic and
Srdjevic
AHP
2007
GANP
2007
AHP
Hazard planning
and emergency
management
Voting
2006
Ratnasabaphthy
and Rameezdeen,
Shih, Huang and
Shyur
Procurement
AHP,
TOPSIS, Nominal Group
Technique (NGT),
Bordas function
ANP, Delphi, MAH
Recruitment and
selection
2005
Fields
2005
Kengpol and
Tuominen
2005
Limayem,
Banerjee and Ma
2005
2004
Gwo-Jen, Tony,
Selection of
supplier
Selection of
construction
projects
Selection of
Wetland area
Issues Addressed
Use of Geometric Mean in Fuzzy AHP
Creating weight using Fuzzy AHP for
linguistic variable
AHP synthesis of the best local priority
vectors based on the most consistent
decision makers
GANP DSS that used quadratic
programming and interval information
to cope with incomplete information.
Preference intensity using cardinal
approach
several-issues-at-time
decision-making
Four rounds of Delphi surveys, several
statistical methods, and interviews
Enhancing consensus among DMs,
GDSS framework
Evaluation of
information
technology
GDSS process
enhancement
Achieving consensus in
and qualitative judgments
quantitative
Evaluation of
journals
Evaluation of
250
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
and Judy
Mikhailov
AHP
Fuzzy AHP
2000
Rapcsak, Sagi,
Toth and Ketszeri
1996
Tavana, Kennedy
and Joglekar
2002
educational web
Model base
enhancement
(AHP process
enhancement)
Evaluation of
tenders in
information
technology
Recruitment and
selection
incomplete information
Group prioritisation process using fuzzy
programming optimization to deal with
missing judgements.
Model building, GDSS system
development methodology, and methods
of aggregation the score by each DM.
Improving consistency among DMs.
251
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Criteria 1
Alternative A
Criteria 2
Sub-criteria
3.1
Sub-criteria
3.2
Criteria 3
Goal
.
.
Alternative
B
Alternative C
.
.
Sub-criteria
..
Sub-criteria
..
Criteria N
Alternative N
Definition
1
3
5
7
9
2, 4, 6, 8
A=
A1
A2
A3
An
A1
a12
a13
a1n
A2
1/a21
a23
a2n
A3
1/a31
1/a32
a3n
Am
1/am1
1/am2
1/am3
(1)
(2)
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
a decision analysis method introduced by Othman
[13] in 2004. This method can be used to fill in
AHP decision matrices based on the priority
ranking of each element value in each criteria or
sub criteria for each pairwise element comparison.
The elements are all ranked according to their
priority values in hierarchical form. In terms of
assigning the value to each comparison elements
in AHP decision matrices, the pairwise
comparison value can be obtained using the
following rules:
Assume that Pi (i = 1, 2, , 9) is a rank for i-th element,
i.
If Pi = Pj
ii.
If Pi < Pj
1/aij
then
aij = 1
+ 1) and
Initialise rank_value;
For ( there is record ){
if ( element [ i-th] > element [i-th + 1] ){
assign rank_value to the i-th element;
assign rank_value + 1 to the next element;
increment rank_value
}elseif (element [ i-th] = = element [i-th + 1]){
assign rank_value to the i-th element;
assign rank_value to the next element;
}Increment i}
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
[15] for each criteria and contractors. Arithmetic
means are used to combine judgment by individual
DM [16] into group preferences in order to
produce the final ranking. The ranking is displayed
in tabular and graphical forms (Fig. 4). All the
operations of the tendering process starting from
the initial input to the final ranking involve
accessing the database and various model bases
that include statistic, weight and GRAHP. This is
another unique feature of our model where data
2.
6 SUMMARY
This paper has discussed the GRAHP model as an
enhancement of AHP in handling data
consistency. Our findings suggest that GRAHP
enable DMs to be more intuitive in their decision
making processes. Furthermore, GRAHP guides
the DMs in terms of selecting suitable input scales
for decision matrix tables. In terms of system
design and development, we have produced
flexible and user friendly interfaces. At the top of
each GAHP model form, there is a brief
description of AHP scales. DMs can easily select
the AHP scales using drop down menus provided
in the forms. There is also set of guidelines on
how to choose the scale values to reduce
inconsistency of data entry if DMs are not satisfied
with the calculated input values performed by the
system. The use of GRAHP approach simplifies
the evaluation process because most of the time
the DMs will not be bothered with inconsistent
data in the matrices. The DMs will be alerted with
warning messages if the problem still persists. The
degree of inconsistency of data is also displayed to
the DMs to enable the values in the decision
matrix tables to be re-adjusted in order to assist the
DMs with re-evaluation.
7 ACKNOWLEDGEMENT
The authors are very grateful to the Ministry of
Higher Education Malaysia and University Sultan
Zainal Abidin, Malaysia for the grants, and
support
1.
Kameshwaran S., and Narahari Y., 2003. eProcurement Using Goal Programming E-Commerce
and Web Technologies Proceedings, Lecture Notes in
Computer Science, Springer-Verlag, pp. 6-15.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
254
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
15. Saaty, T.L. 1990. Decision Making for Leaders, RWS
Publications, Pittsburgh.
16. Aczel and Saaty, 1983 in Assessing The Value of ELearning system by Yair Levy (2006). Google Book
Result. http://books.google.com/books. Accessed on
January 2007.
17. Kengpol, A and Tuominen, M. 2005. A Framework for
Group Decision Support Systems: An Application in the
Evaluation of Information Technology for Logistics
Firm. Int. J. Production Economics. 101 (2006) 159171.
18. Levy, J. K and Taji. K. 2007. Group Decision Support
System for Hazards Planning and Emergency
Management: A Group Analytical Network Process
(GANP) Approach. Mathematical and Computer
Modelling.
19. Gwo-Jen, H., Tony, H.C.K and Judy, T.C.R. 2004. A
Group-Decision Approach for Evaluating Educational
Web Sites, Elsevier.
20. Fadhilah Ahmad, M Yazid M Saman, N. M. Mohamad
Noor and Aida Othman. 2007. DSS For Tendering
Process: Integrating Statistical Single-Criteria Model
With Mcdm Models. The 7th IEEE International
Symposium on Signal Processing and Information
Technology, Cairo Egypt.
21. Fadhilah Ahmad, Suhailan Safei, Md Yazid Mohd
Saman,and Hasni Hassan. 2010. Integrated Decision
Support System Using Instant Messaging And Enhanced
AHP For Human Resource Selection. The 1st
International Symposium on Computing in Science &
Engineering (ISCSE), June, 3-5, 2010, in Kusadasi,
Aydin, Turkey.
22. Fadhilah Ahmad, M Yazid M Saman, N. M. Mohamad
Noor and Aida Othman. 2007. DSS For Tendering
Process : Integrating Statistical Single-Criteria Model
With MCDM Models. The 7th IEEE International
Symposium on Signal Processing and Information
Technology, Cairo Egypt.
23. Moreira, L. O, Flavio, R.C., Sousa, and J.C. Machado,
2011. A Distributed Concurrency Control Mechanism
for XML Data, Journal of Computer and System
Sciences.
24. Celik, M., Kandakoglu, A., & Er, D. 2009. Structuring
fuzzy integrated multi-stages evaluation model on
academic personnel recruitment in MET institutions.
Expert Systems with Applications, 36(3, Part 2), 6918
6927.
25. Eleftherios siskos, Dimitris Askounis,and John Psarras,
2014. Multicriteria Decision Support for global egovernment evaluation, Omega, 46:51-63
26. Bojan Srdjevic and Zorica Srdjevic, 2013. Synthesis of
individual best local priority vectors in AHP-group
decision making Applied Soft Computing 13:2045
2056
27. M. Tavana, A. Hatami-Marbini, 2011. A group AHPTOPSIS framework for human spaceflight mission
planning at NASA, Expert Systems with Applications
38:1358813603.
255
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Choose project
Determine no. of
contractors for
evaluation
Determine no.
of DMs
Statistical
Model
Determine DM &
group leader
Who rank
criteria ?
User request
Group Leader
Choose project
Group features
Group
Leader?
Yes
Database
No
Each DM
ranks criteria?
?
Yes
Weighted
Model
No
Display criteria rank
Integrated Model
Operations
Use Arithmetic
Means to integrate
weight & produce
ranking
GRAHP
Model Bases
256
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 248-257
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
257
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
ABSTRACT
The paper describes the process of modelling domain
knowledge of Information Science (IS) by creating an
Ontology of Information Science domain (OIS). It also
reports on the life cycle of the ontology building
process using Methontology, based on the IEEE
standard for development software life cycle process,
which
mainly
consists
of:
specification,
conceptualization, formalization, implementation,
maintenance and evaluation. The information resource
used in acquisition and evaluation has been obtained
from Information Science. The conceptualization
consists of identifying IS concepts and grouping them
into a hierarchy tree based on a faceted classification
scheme. The OIS ontology is formalized by using the
ontology editor Protg to generate the ontology code.
The achieved result is OIS ontology which has fourteen
facets: Actors, Method, Practice, Studies, Mediator,
Kinds, Domains, Resources, Legislation, Philosophy &
Theories, Societal, Tool, Time and Space. The model is
evaluated using ontology quality criteria to check the
ontologys usefulness, and how it could be transferred
into application ontology for Information Science
education.
KEYWORDS
Ontology - Knowledge Representation- Semantic web Information Science- Web Ontology LanguageProtg.
1. INTRODUCTION
In recent years ontology has gained attention in
both academic and industrial fields. The word
ontology has been defined in different ways,
originally taken from philosophy, where it means
the basic characteristics of existence in the world.
Ontology is applied in various domains such as
medicine, movies, cooking, and management, to
provide a formal model that structures knowledge.
The Information Sciences IS domain appeared as
an interesting research area due to the fact that it is
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
paper is organized as follows: in section 2 we
discuss the theoretical foundation of ontology. In
section 3 we discuss the method of building IS
ontology and how it has been constructed. Section
4 presents ontology of Information Science
development and implementation, followed by
discussion and evaluation in section 5. Finally, the
conclusion and future work will be presented.
2. BACKGROUND
2.1. Ontology Definition
Ontology has different definitions in available
literature [1,2,3]. Basically, ontologies are used in
different communities. Ontology emerged from
the philosophical field as an area of study
introduced by Aristotle. In recent years this term
has borrowed from computer science community
uses to represent the knowledge required to
understand the real world. Developers have been
developing a conceptual base for building
technology to construct knowledge components to
be reusable and sharable.
So, ontology has been defined from different
perspectives. The philosophical perspective
defined ontology as the science or study of
being[4], while the Artificial Intelligence (AI)
community defined it in 1991 :
Ontology defines the basic terms and relations
comprising the vocabulary of a topic area as well
as the rules for combining terms and relations to
define extensions to the vocabulary. [5]. This
definition is a brief definition, which indicates that
ontology is providing definitions of terms that are
explicitly defined and the relations and rules to
unite them, but ontology is more than that. It can
provide inferred new terms using the rules. In
1993 Gruber defined ontology as: An ontology is
a specification of a conceptualization. [6].
His definition has been developed to be more
accurate for defining ontology which is: Formal
explicit specification of shared conceptualization
The definition can be explained as follows:
A formal: ontology should be machine readable
and processed by an Artificial Intelligent (AI)
system. We do not need there to be
communication devices between people and
259
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
that is being used in the semantic web. The aim of
this study is:
1. Providing a visualisation of the Information
Science area.
2. Sharing a common understanding
Information Science theory.
of
260
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
A is a set of axioms on O
[27]
261
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Determine domain scope &
interest
3. IMPLEMENTATION
3.1. Conceptual Model of OIS Ontology
The conceptual model reflects on the
computational model. It could be a communication
device for experts in the domain. It shows the
entity classes, attributes and their relationships
with OIS ontology. We develop the main
relationships among the defined classes. The
conceptual model is a base of domain ontology
which helps to build the OIS ontology. Figure 2
shows the conceptual model of domain ontology.
<rdf:RDF
xmlns="http://www.semanticweb.org/ontologies/2011/1/On
tology1298894565306.owl#"
xml:base="http://www.semanticweb.org/ontologies/2011/1
/Ontology1298894565306.owl"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#"
xmlns:owl2xml="http://www.w3.org/2006/12/owl2xml#"
xmlns:owl="http://www.w3.org/2002/07/owl#"
xmlns:xsd="http://www.w3.org/2001/XMLSchema#"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntaxns#"
Xmlns:
Philosophy="&Ontology1298894565306;Philosophy&"
xmlns:Ontology1298894565306="http://www.semanticweb.
org/ontologies/2011/1/Ontology1298894565306.owl#">
<owl:Ontologyrdf:about="http://www.semanticweb.org/ont
ologies/2011/1/Ontology1298894565306.owl#">
<rdfs:comment>Information Science ontology that
describes the domain of IS.</rdfs:comment>
<dc:creator xml:lang="en
>Ahlam Sawsaa 2011.</dc:creator>
</owl:Ontology>
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Furthermore, the current version is defined by a
large number of classes - about 687 - and consists
of approximately 170 assertions including more
than 67 rules and relations to determine the rich
semantic expression capability of the language.
4. EVALUATION
Ontology evaluation means taking into
consideration that which guarantees the stability
and accuracy of the ontology. Evaluation of the
ontology
avoids
concept
duplication,
excessiveness and inconsistent relationships to
create a better understanding. In this study the
evaluation process is based on interim and
completion evaluation. The evaluation is used at
development stage to improve the design and
implementation of the project. The OIS ontology
was evaluated during the development process to
ensure its completeness and consistency of
meaning.
263
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
Table 1 Evaluation criteria of OIS ontology
Ontology Criteria
Percentage
Consistent of ontology
0.64%
0.56%
Completeness
0.48%
Clarity
0.40%
Generality
0.44%
0.48%
264
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
The current version of OIS ontology contains 687
classes - about 44% - and 700 subclasses; about
45%.
In addition, we note that classes and subclasses
feature in the OIS more than other components
such as data property that is 1%, object property
which is 4% while individuals make up 6%. This
is because this model is a generic model that
structures the IS domain as the base of application
ontologies that will be developed. The model has
data properties that indicate the semantic relations
between classes and subclasses. The model has
different relationships (object property) such as,
hierarchical relationships (isPartOf, IsA, ), inverse
relationships ( hasA, hasPart),equivalency and
associative relationships. These relationships are
representing the core relations between the
concepts. In comparison to other relations the
hierarchical relations were used more than their
functional equivalent, while the transitive relations
were used less than others. We describe some
classes of the OIS ontology to clarify some of
these relationships.
6. CONCLUSION
6.1. Achievements
The following are the main achievements
presented through this study:
- Constructing an Ontology of Information
Science (OIS), and methods of building it.
- Demonstrating the strategy of building and
designing the conceptual model in the domain
using ontology technique. Ontology of
information science will help to identify the
features of this science, which mainly consist
of the overlapping sets of science that make it
difficult to determine its boundaries.
- The resulting ontology covers three main
areas of the domain knowledge: library
science, archival science and computing
science. The vocabularies of these branches
are formalized in class hierarchy with
relations which are interconnecting concepts
from all these areas, in order to define a
sufficient model of the Information Science
domain.
- The phases of the methodology were
specification,
knowledge
acquisition,
conceptualization,
formalization,
and
evaluation, of all which are essential in
order to attain the results. The domain
knowledge was formalized by using the
Protg ontology editor, which can also be
used to automatically generate the
ontology code. The ontology was evaluated
and validated by using FaCT++ reasoner.
The evaluation report was used to check if
the ontology was consistent and satisfied
needs.
6.2. Future Works
The reusing, sharing, and maintaining of the
ontology for future issues that relate to our
ontology need to be considered. In the OIS module
there is always space for improvement, at least
adding the additional of new or missing concepts
and adding new classifications based on different
criteria and perspectives. Although most
Information Science concepts were considered,
there are concepts that need to be added. Another,
more interesting, possibility would be to link this
general model with others that are related to the
domain in order to be integrated with other
ontologies in an ontology library to use for
specific applications.
7. REFERENCES
1.
2.
3.
4.
5.
6.
7.
265
International Journal of Digital Information and Wireless Communications (IJDIWC) 4(2): 258-266
The Society of Digital Information and Wireless Communications, 2014 (ISSN: 2225-658X)
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
http://www.geneontology.org/
22. JEPSEN, T. C. (2009) 2009 just what is an
ontology. IEEE computer society, 11.
23. LABORATORY, E. I. TOVE Ontology Project.
University
of
Toronto.
Toronto,
http://www.eil.utoronto.ca/enterprisemodelling/tove/.(2011)
24. VOGRINCIC, S. & BOSNIC, Ontology- based
multi-label classification of economic articles.
ComSIS, Vol8, pp.101-119. (2011).
25. BELLO, A. Ontology and Phenomenology. IN
POLI, R. & SEIBT, J. (Eds.) Theory and
Applications
of
Ontology:
Philosophical
Perspectives. London New York, Springer (2010).
26. HARTMANN, N. (1952) The new ways of
ontology, Chicago.
27. GMEZ-PREZ,
A.,
CORCHO,
O.
&
FERNNDEZ-LPEZ, M. Methodologies, tools
and languages for building ontologies. Where is
their meeting point? Data & Knowledge
Engineering, 46, 41-64. (2003)
28. POLI, R. Ontological methodology. International
Journal of Human-Computer Studies, 56, 639-664.
(2002)
29. SABOU , M., WORE,C. GOBLE,C. MISHNE,G.
Learning domain ontologies for web service
descriptions; an experiment in bioinformatics.
www2005. china, Japan. (2005)
30. SAWSAA, A. & JOAN, L. Virtual community of
practice Ontocop: Towards a New model of
Information science ontology (ISO). International
Journal of Information Retrieval Research,, 1, pp.
55-78. (2011)
31. IEEE, S. IEEE standard for developing software life
cycle process, New York(USA), IEEE Computer
Society. (1996)
32. FERNNDEZ-LPEZ,
M.
Overview
of
methodologies for building ontologies. In:
Workshop Ontologies and Problem-Solving
Methods : Lessons Learned and Future Trends de la
conferencia International Joint Conference for
Artificial Intelligence (IJCAI99), August 1999.
Stockholm, Sweden. (1999).
33. HERRE, H. The Ontology of Mereological
Systems: A Logical Approach. IN POLI, R. &
SEIBT, J. (Eds.) Theory and Applications of
Ontology: Philosophical Perspectives. London
,New York, Springer (2010).
266