Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Framework for Threat Modelling for a Power Utility: Case of Zimbabwe Power Utility Company .......... 8
Samuel Musungwini, Gilbert Mahlangu, Beauty Mugoniwa, and Samuel Simbarashe Furusa
Enhanced-bandwidth Compact Printed Inverted F Antenna Suitable for LTE/GSM Mobile Phone ....... 24
S. Jesse Jackson and T. Thomas
Onto Tagger: Ontology Focused Image Tagging System Incorporating Semantic Deviation Computing
and Strategic Set Expansion ...................................................................................................................... 44
Gerard Deepak and Sheeba Priyadarshini J
International Journal of Computer Science and Business
Informatics
IJCSBI.ORG
Roopali Garg
Assistant Professor (IT)
UIET, Panjab University Chandigarh, India
Abstract
Cognitive radio technology makes the unlicensed user to use the licensed band in
opportunistic manner. By using licensed band in intelligently way for solving the problem
of shortage of radio bands and optimal utilization of licensed band there is the requirement
control channel (CCC). Control channels are used for exchanging control information about
the new available channel for data transmission. When the primary user is detected or
decline of QoS of currently being used channel by cognitive user then there is need of the
common control channel to move on a new available channel. These channels are required
to sense the free channel, to transmit the control information for channel synchronization
between sender and receiver. It is challenging aspect of CRNs to provide the proper
coverage of CCC that the problems of data packet loss or termination of connection can be
reduced. In this paper various control channel assignment schemes are described.
Keywords
Common Control Channel (CCC), Media Access Control (MAC), Cognitive Radio
Networks (CRNs), Primary Users (PUs).
1. INTRODUCTION
Cognitive radio allows to cognitive users (unlicensed users) to use the
licensed band in opportunistic way for addressing the problem of radio
spectrum scarcity and utilization of licensed radio bands. It implements the
idea of spectrum sharing which permits the cognitive users to share free
licensed band intelligently without disturbing primary users
communication in the course of cognitive radio phenomena. In cognitive
IJCSBI.ORG
radio networks there must be channel synchronization between transmitter
and receiver upon which channel data will be transmitted to avoid the dada
packet loss.
A common control channel in CRNs does the various operations
such as make the connection between transmitter and receiver, detection of
other neighboring cognitive users [1], [2].We can define the control channel
in a number of ways such as a dedicated frequency band [3] or a time slot in
a time division multiple access systems. And a frequency hopping sequence
can be a common control channel. In an intelligent cognitive radio,
availability of the spectrum shows the both spatial and temporal variations
due to primary user activity. Thats why, there is no assurance that a
specified frequency band will be accessible for transferring the control
signals. We refer this is the problem of allotment of the common control
channels for controlling purpose.
In the cognitive radio networks common control channels
assignment is done in basic two ways static and dynamic channel allocation
algorithms. In this paper we will discuss the various control channel
assignment algorithms. There are numbers of challenges in the cognitive
radio networks to implement the common control channel algorithms. Some
of major issues are robustness to primary user activity, and security to
protect the control channel from jamming attack [10]. It is the major issue
of cognitive radio networks over which many researchers have been
working and they have purposed various common control assignment
methods which are described in remaining portion of this paper.
IJCSBI.ORG
2.1 Overlay
In overlay based CCC scheme, the CCC is permanently or for the short term
allocated of the spectrum not used by the primary user. When the allocated
common control channels are affected by primary users activity then
cognitive radio users has to leave the control channel and create the
connection over a new common control channel.
2.1.1 Out-of-Band
In this scheme, licensed or unlicensed band can be used like a common
control channel to establish connection between sender and receiver, node
co-ordination and synchronization. It helps to maintain the signaling
overhead which will increase the performance of the cognitive radio media
access protocol. Due to this, most of the cognitive radio network protocols
use unlicensed common control channel. If we use the unlicensed dedicated
common control channel it may be cause of interference with other
communications like networks like Bluetooth which will degrade the
performance of CR networks [11]. Also, transmit on single dedicated
common control channel will be subject to security attacks like control
channel jamming and Denial of service attacks (DoS) which can jeopardize
the entire cognitive radio network with single point of failure [11]. Thus,
designing common control channel through out-of-band technique has
number of issues with such as security attacks, and interference with other
technologies.
2.1.2 In-Band
In this common control design scheme, different intervals of time are used
to transmit the data and control messages [7]. Currently, sequential and
group based CCC design is proposed for node co-ordination and
synchronization. In sequential based network setup, CR nodes have to first
sense free channel list and scan each and every channel to find the common
channel which takes long time.
2.2 Underlay
In underlay scheme, same radio band can be used by both primary user and
cognitive radio users as a control channel. Control messages are transmitted
in low power by using short pulses by using spread spectrum phenomena,
which are transmitted over a high bandwidth. Because if transmit the
control information over large bandwidth then it does not disrupt the
communication of primary users. Even though, cognitive radio control
messages and primary user data can be transmitted concurrently in a
licensed spectrum.
IJCSBI.ORG
3. MAIN COMMON CONTROL CHANNEL DESIGN SCHEMES
IJCSBI.ORG
signal between sender and receiver and for dynamic primary user activity
[11].
IJCSBI.ORG
3.6 Adaptive Multiple Rendezvous Control Channel assignment
It solves the problem of multiple rendezvous CCC scheme which is static in
nature. In this design the sequences can be chosen dynamically for handling
the issue of the interference with primary user. It achieves the high
performance by changing the hopping sequence when a primary is detected.
If we compare it with sequence based rendezvous scheme it does not require
strict synchronization. In simple terms it becomes easy to understand that, it
exploits the frequency hopping spread spectrum technique in which
transmitting channel changes over a particular time slice or according to a
pseudo random sequence. Similarly, this scheme is implemented in same
fashion to avoid the interference with other control channel and also provide
primary users activity robustness. But there is a problem in this scheme is
the average time to rendezvous may not be limited, cause of this time
required to create common control channel link may be long. This happens
when available channels are large [7].
4. CONCLUSION
To address the problem of common control channel assignment various
designs has been purposed by various researcher and computer scientists.
We have mentioned some of them. Each and every design algorithm has
own pros and cons. But the thing is that according to particular cognitive
radio networks we have to choose optimal common control channel
assignment scheme that it becomes easy to cognitive radio user to sense the
free available channel, exchange the control information related to channel
tuning and reduce the interference problem with other licensed(primary
user) and non-licensed(cognitive radio) users.
REFERENCES
[1] I.F. Akyildiz, W.-Y. Lee, M.C. Vuran, S. Mohanty, Next generation/dynamic
spectrum access/cognitive radio wireless networks: a survey, Elsevier Computer
Networks vol.50, no.13, pp. 21272159, Sept. 2006
[2] I.F. Akyildiz, W.-Y. Lee, K.R. Chowdhury, Cognitive Radio Ad Hoc Networks, Ad
Hoc Networks, Elsevier Ad Hoc networks, vol. 7, no.5, pp 810836, Jul. 2009.
[3] Sisi Liu, Loukas Lazos, and Marwan Krunz, Cluster-based Control Channel
Allocation in Opportunistic Cognitive Radio, Networks IEEE Transactions on
Mobile Computing, (TMC), Vol. 11, No. 10, pp. 1436 1449, 2012
[4] Christian Doerr, Dirk Grunwald and Douglas Sicker, Dynamic Control Channel
Assignment in Cognitive Radio Networks using Swarm Intelligence, IEEE Global
Communications Conference (Globecom) 2008.
[5] J. Zhao, H. Zheng, and G.-H. Yang, Spectrum sharing through distributed
coordination in dynamic spectrum access networks, Wireless Communications and
Mobile Computing Journal, vol. 7, no. 9, pp. 10611075, 2007.
[6] J. Zhao, H. Zheng, G.-H. Yang, Distributed coordination in dynamic spectrum
allocation networks, in: Proc. IEEE DySPAN 2005, pp. 259- 268, November 2005
[7] Brandon F. Lo, A survey of common control channel design in cognitive radio
networks, Elsevier Physical Comm. , vol.4, No-1, pp. 2639, March-2011
IJCSBI.ORG
[8] C. M. Cordeiro and K. Challapali, C-MAC: A Cognitive MAC Protocol for Multi-
Channel Wireless Networks, in IEEE Symposium on New Frontiers in Dynamic
Spectrum Access Networks, April 2007.
[9] Yogesh R Kondareddy and Prathima Agrawal, Selective Broadcasting for Multi-Hop
CRNs, IEEE Sarnoff Symposium, Princeton, NJ 2008
[10] Claudia Cormio a, Kaushik R. Chowdhury, Common control channel design for
cognitive radio wireless ad hoc networks using adaptive frequency hopping,Elsevier
Ad-Hoc Nerworks Vol. 8, Issue 4, pp. 430-438, June 2010
[11] Satish Anamalamudi and Minglu Jin , Hybrid Common Control Channel Based MAC
Protocol for Cognitive RadioAd-Hoc Networks, International Journal of Information
and Electronics Engineering, Vol. 4, No. 3, May 2014
[12] Yogesh R Kondareddy and Prathima Agrawal, Synchronized MAC Protocol for
Multi-Hop CRNs, IEEE International Conference on Comm. Beijing, China 200.
IJCSBI.ORG
ABSTRACT
The purpose of this study was analyse threats that are inherent in the prepaid electricity
meter system and to propose a framework for threat modelling. This framework can be
effectively used by power utilities power utilities in particular and other prepaid meter
system organisations to achieve end-to-end actionable insights on prepaid electricity
metering infrastructure. The study used a qualitative case research methodology with a
single unit of analysis. A purposive sampling technique was used to select suitable
participants. Data was collected from power utility engineers and security experts using
semi-structured interviews and focus group in order to triangulate the research findings.
The findings of the study indicated that at the present moment there are very few
frameworks that can be explicitly used to model threat to prepaid electricity infrastructure.
This has exposed the infrastructure to various attacks such as physical bypass, cyber-attack
and mechanically induced attack. We therefore recommend the adoption of an explicit
framework for modelling threat in prepaid metering infrastructure.
Keywords
Threat modelling, cyber attack, electricity theft, framework, ICTs, Mobile
technologies.
1. INTRODUCTION
The prepaid metering infrastructure is one of the most vital components of
the electricity grid system (Hmmerli, Svendsen & Lopez, 2013), because it
is the dominion of revenue collection for the power utilities. Its installation
within the electricity grid system has transformed electricity from the right
to use into a cash commodity which is one of its paramount characteristics.
IJCSBI.ORG
This has provided significant benefits to the power utilities, which include
maximising revenue collection, minimising cost associated with revenue
collection, reduced consumer debt on electricity usage, supplying purchased
electricity only, reduction in incorrect electricity billing, etc. (Miyogo,
Ondieki, & Nashappi, 2013). With the prepaid electricity metering
infrastructure, customers are now able to purchase electricity tokens from
various designated points such as power utilitys revenue halls and other
vending kiosks (Pabla, 2008). However, the installation of prepaid
electricity metering infrastructure to the consumer premises presents
different threats that have left it exposed/vulnerable to attack (Tondel,
Jaatun & Line, 2012).
An attack is an unwanted action that utilizes one or more vulnerabilities to
which when performed, it has the paossibility of compromising the purpose
of the installed infrastructure (Ucedavelez & Partner, 2012). In this case, the
purpose of the prepaid electricity metering infrastructure is to ensure that
consumers pay for electricity before use in order to reduce consumer debt,
among other reasons. The attack on prepaid metering infrastructure which
come in various forms and from different sources has seen power utilities
around the world losing millions of dollars through electricity theft. This has
negatively impacted revenue streams and backward operations of these
utilities.
2. BACKGROUD
In Zimbabwe, a prepaid electricity metering system was launched in 2012
for both domestic and commercial consumers to replace the conventional
post-paid meters and estimation billing (Megawatt Bulletin, 2012). The
concept of prepayment is built around paying before using a product or
service. Prepayment systems provide a disbursement for goods and services
before consumption or use (Casarin & Nicollier, 2010). In the context of
electricity distribution, the aspect of prepayment calls for the consumers to
hold electricity credit on their accounts (Miyogo, Ondieki & Nashappi.,
2013). The consumer can only use electricity as a commodity or service
when the account is paid up in advance.
The power utility has managed to install more than 900 000 prepaid
electricity meters for both domestic and commercial consumers by now
(Sibanda, 2014), with important applications already laid out and usable.
However, the installation of prepaid electricity metering system has seen the
power utility being deprived of millions of dollars by the consumers who
have found ways to steal from prepaid electricity meters. The power utility
is losing about US$10 million a month in revenue from electricity theft
(Share, 2014). Electricity theft has also seen the country experiencing more
loads shedding than ever in recent months, because the power utility cannot
IJCSBI.ORG
raise enough revenue for continuous electricity generations. The system was
introduced without proper feasibility study to check the polarity of the
prepaid electricity meters, hence, the consumers tampering with the system.
The power utility has reacted to electricity theft by introducing a Revenue
Protection Unit (RPU) to conduct field inspections/checks, investigate and
report consumers engaging in electricity thefts. Farawo & Towindo (2013)
reported that the power utility now offers monetary incentives as a way to
persuade consumers to provide information about electricity theft. Since it is
laborious to monitor all the 900 000 and more prepaid electricity meters to
be installed by means of field checks/inspection, there is need to protect the
system and ensure the security of the installed infrastructure (prepaid
electricity meter) so as to yield projected revenues for the investments made.
Although, electricity theft has been in existence since the 20th century, the
introduction of the prepaid metering system world over which have
transformed electricity into a cash commodity has seen perpetrators
adopting smart ways or methods of stealing electricity (Sreenivasan,
2011). Some of these methods are so complicated that they cannot be easily
detected by the current methods being employed by the power utilities. For
example the use of infra-red programming and micro-processor
programming techniques to alter electricity billing registers.
3. RESEARCH PURPOSE
The purpose of this study was to propose a unique and specific framework
for threat modelling that can be used by power utilities in an effective
manner to achieve end-to-end actionable insights on prepaid electricity
metering infrastructure. This study was guided by the following objectives:
Evaluate and analyse various models/frameworks used in threat
modelling.
Determine the steps and processes used in threat modelling.
IJCSBI.ORG
Establish vulnerabilities, threats and attack strategies in prepaid
metering infrastructure.
Identify sources of threats and types of attackers in prepaid metering
infrastructure.
Provide guidance for further inquiry ito threats prevention.
IJCSBI.ORG
currently in use. Various frameworks and models have been used to model
threat to the infrastructure by different organisations. Some are simple and
ease to use by non-experts in the field of security while others are
complicated and require special skills and knowledge. These include, among
many the Threat Logic Tree, Attack Tree-Model, Game Theoretic Model,
PASTA model and Operationally Critical Threat, Asset, and Vulnerability
Evaluation (OCTAVE) framework. This study only looked at the Attack
Tree-Model, OCTAVE and Microsoft Security Development Lifecycle
(SDL) Threat Modelling. The decision to choose these models is because
ATM and Microsoft Security Development Lifecycle (SDL) Threat
Modelling have been used before to model threat in Advanced Metering
Infrastructure (AMI) and their concepts complement each other in threat
identification and evaluation. Although OCTAVE is yet to be used in AMI
and other metering infrastructure in electricity grids, its consideration was
based on the fact that it focuses on balancing operational risk, security
practices, and technology (Zhang & Xu, 2006), which is central to this
study.
IJCSBI.ORG
5.2 OCTAVE framework
OCTAVE is an approach that aims to increase the decision making process
of protection and management of organizational resources (Marek &
Paulina, 2006). It is intended to allow people to comprehend the security
matters of the organizations and work towards improving them with least
exterior assistance. It is underpinned on the philosophy and the principle of
self-direct which states that people from the organization are in a better
position to decide on the security of their resources. Thus, it provides a
systematic and context-driven approach for the organization to manage
threats to infrastructure. This technique studies, both technical and
organisational issues in order to portray the security needs of an
organisation using a three phase approach (Bakari, 2007) as indicated in
Figure 2.
IJCSBI.ORG
current mitigation strategies/plans and establishing security requirements.
The OCTAVE framework has presented the foundation and guidelines for
many organizations to deal with various threats. Although the OCTAVE
framework covers major factors for threat modelling, it focuses more on
information infrastructure. Therefore, there is a need for an improved
framework that will encompass the physical infrastructure that is deployed
external to the organization such as the prepaid electricity meter.
IJCSBI.ORG
The processes and steps to be followed in the threat model differ according
to the framework/model used. Although frameworks and models use
different processes/steps, they all intend to achieve a common goal that is to
provide guidelines in dealing with threats and attacks to the infrastructure
(Bertino, Martino, Paci, & Squicciarini, 2010). Figure 3 shows a six (6)
step-process model proposed by Meier et al. (2003) in their study on
Improving Web Application Security.
IJCSBI.ORG
more the modeller has knowledge about the key functionalities,
characteristics and the people served by the asset/system, the easier it is to
find threats and determine vulnerabilities
6.2.1 Decompose the application
In order to focus the attention of threat modelling to the areas of concern,
the architecture should be divided into sub components. This is the third
step that provides an illustration of the boundaries of the asset to help define
the parameters of threat modelling.
7. METHODOLOGY
A qualitative case research methodology (Yin, 2014), with a single unit of
analysis was used in this study to collect data from various sources. The
IJCSBI.ORG
unity of analysis in this study was a power utility which has installed
prepaid metering infrastructure. A purposive sampling technique was used
to choose participants from the target population. The sample of this study
was comprised of six (6) electrical engineers who have worked in the power
utility for more than three (3) years. Data was collected from both the power
utility engineers and security experts using semi-structured interviews and
focus group, respectively in order to triangulate the research findings and
evaluate the framework
IJCSBI.ORG
attacker can be used because no skill is required to exploit the threat.
The attacker only needs to be brave and an understanding of the
wiring integrity of the prepaid electricity meter. The attacker may
use two approaches which are visible and non-visible approach. In
the former the bypassing is done outside the prepaid electricity meter
while in the latter bypassing takes place inside the meter. The goal is
to divert the flow of electricity from the service line to the load so
that electricity consumption is not measured.
Threat to billing software embedded in the prepaid electricity meter
(Cyber-attack strategy)- this threat can be exploited by using an
infrared device or micro-controller programming which access the
billing software through the port of the meter. Since every prepaid
metering infrastructure has an infra-red port to allow the electrical
engineers to carry out maintenance work, the ports permit access to
any device that uses the infra-red light. The attack is non-visible and
non-physical because it cannot be detected by just a mere
observation and the attacker does not need to have a physical contact
with the infrastructure. This strategy is usually used by intelligent
people and other experts in computer programming. The goal of this
strategy is to reduce the billing cycle so that few units of
consumption will be recorded by the infrastructure.
Threat to the mechanically built-up (Mechanically induced strategy)
- particularly the meter disk, the magnet and other internal
components. The meter disk is the most important component of the
infrastructure that enables power utility record the electricity that has
been consumed. This threat can be exploited by inserting metal
objects to the infrastructure or exposing it to a strong magnetic
object so that the disks rotary movement is not proportional to the
electricity consumed. The attack can be visible or non-visible. Any
potential attacker can use this strategy since its not complicated.
The goal of this strategy is to make the disk to rotate slowly so that
less electricity is recorded. The slow the movement of the disk the
low electricity is recorded.
An attack-tree model shown in Figure 3 below has been used to model the
vulnerabilities, threats and attack strategies to prepaid electricity metering
infrastructure.
As shown in Figure 3 below, the tree starts by defining the goal of the
attacker which is the root node. In this case the ultimate goal of the attacker
is to defeat the electricity billing or enjoy free electricity. The nodes that
follow depict the strategies that can be used to fulfil the ultimate goal. The
strategies are decomposed further down so that all the possible
IJCSBI.ORG
actions/threats that may lead to the accomplishing of the goal are known.
The decomposition process will continue until the vulnerabilities are
identified which make it impossible to break the tree any further.
Crossover Total meter Cable Neutral Phase Magnetic Strong heat Objects
cabling disconnecti alternation removal diversion influence exposure injection
ng
IJCSBI.ORG
information, the modeller can consult employees and security expert
on more clues. After that a security survey/field inspection can be
conducted to confirm or refute the attack by looking for visible and
invisible attacks. Lastly, there is a need to recognise and generate the
attack patterns based on the methods used.
Map intrusion & attack scenarios to attack goals using attack tree (s)
IJCSBI.ORG
Source: Own construction
Phase 2: Threat assessment, analysis & evaluation- this is the main
phase of threat modelling. It requires an outline of the
intrusion/attack scenarios based on technological and non
technological conduct. For example, cyber-attack is technological
while the physical by-pass and mechanically induced are both non-
technological. The phase also requires the description and mapping
of attack goals to intrusion scenarios, profiling attackers in order to
understand their capabilities. Finally, the threats need to be rated
using the PIVE model which has been proposed by this study.
Phase 3: Develop mitigation plan & strategy- this phase involves
the examination of current protection strategies in order to identify
gaps, prioritise the threat and checking for infrastructure
dependencies. The modeller also needs to decide on the protection
strategy based on the factors like cost befit analysis in order to
decide whether to respond with technology or not. Last
vulnerabilities should be resolved and a review carried out.
11. LIMITATIONS
This research was conducted at a time when the Prepaid metering system
has just been rolled in Zimbabwe and as such this being a new system in a
new environment, some threats are still to be discovered. Hence these
researchers believed this framework to be a good starting point. In this
manuscript the authors have confined the framework to ZESA the power
utility organisation in Zimbabwe but in reality we believe this framework
can also be extended to other organisations in Zimbabwe and beyond.
12. CONCLUSION
Threat modelling is one of the key requirements that enable organizations to
minimize security risks and achieve operational excellence. When
conducting threat modelling, the modeller should view the infrastructure
from the position of the attacker. This will enable them to see it as an
exposed system. Power utilities can use threat modelling to mitigate and
defeat attack scenarios before they can cause severe damage.
IJCSBI.ORG
strategies used by power utilities in dealing with the attack to prepaid
metering infrastructure. Furthermore, the use of mobile technologies to
achieve end-to-end actionable insights and deliver operational analytics on
the infrastructure may also be considered.
14. ACKNOWLEDGEMENTS
The researchers would like to acknowledge the valuable contributions to the
success of this work by people from the power utility in Zimbabwe and
registered electricity consumers and the framework reviewers. We would
like to recognize the assistance rendered by these as their valuable input
enabled us to craft this piece of work. We are indeed grateful to these
participants for availing themselves for the research and providing data that
enabled this study to be carried out. Otherwise this research would not have
been possible. Their priceless contribution is greatly appreciated.
REFERENCES
Bakari, J. K. (2007). A Holistic Approach for Managing ICT Security in Non-Commercial
Organisations: A Case Study in a Developing Country.
Bertino, E., Martino, L. D., Paci, F., & Squicciarini, A. C. (2010). Security for web services
and service-oriented architectures. Security for Web Services and Service-Oriented
Architectures, 1226. http://doi.org/10.1007/978-3-540-87742-4
http://www.arrow.dit.ie/cgi/viewcontent.cgi?article=1012&context=engschcivcon
Burns, S. F. (2005). Threat Modeling: A Process To Ensure Application Security, (January)
SANS Institute
Ciampa, M., (2009). Security and Guide to Network Security Fundamentals. 3rd edition.
Boston: Cengage Learning.
Excellence, N. (2013). Deliverable D6 . 3: Advanced Report on Smart Environments.
Hmmerli, B., Svendsen, N. K. & Lopez, J. 2013. Critical Information Infrastructures
Security: 7th International Workshop, CRITIS 2012, Lillehammer, Norway, September 17-
18, 2012. Revised Selected Papers, Springer Berlin Heidelberg.
Hardy, G. M. (2012) Beyond Continuous Monitoring: Threat Modeling for Real-time
Response, (October) SANS Institute
Marek, P., & Paulina, J. (2006). The OCTAVE methodology as a risk analysis tool for
business resources. International Multiconference Computer Science and IT , 485497.
Retrieved
from:http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:The+OCTAVE+me
thodology+as+a+risk+analysis+tool+for+business+resources#2
Mcgrath, M., & Lennon, R. (2013). Letterkenny Institute of Technology Threat Modelling
for Legacy Enterprise Applications, (August).
Meier, J. D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., & Murukan, A.
(2003). Chapter 3 Threat Modeling, (June).
IJCSBI.ORG
Microsoft. (2012). Introduction to Microsoft Security Development Lifecycle (SDL) Threat
Modeling. Retrieved from http://www.cs.berkeley.edu/~daw/teaching/cs261-
f12/hws/Introduction_to_Threat_Modeling.pdf
Miyogo, C. N., Ondieki, S., & Nashappi, G. (2013). An Assessment of the Effect of
Prepaid Service Transition in Electricity Bill Payment on KP Customers , a Survey of
Kenya Power , West Kenya Kisumu, 3(9), 8897.
Pabla A.S., (2008). Electric Power Distribution, 5th edition. New Delhi: Tata McGraw-Hill.
Available at:
http//www.books.google.com/books/about/Electric_Power_Distribution.html?id...
Schneier, B. (1999). Attack Trees. Dr Dobbs Journal, 24(12), 2129. Retrieved from
http://www.schneier.com/paper-attacktrees-ddj-ft.html
Tndel, A. I. , Jaatun, M. G. & Line, M. B. (2012). SecurityThreats in
DemoSteinkjer_v1.pdf. SINTEF ICT and Telenor, 1.
Ucedavelez, T., & Partner, M. (2012). Real world threat modelling using the pasta
methodology. pp.2-61. Available at:
https://www.owasp.org/images/a/aa/AppSecEU2012_PASTA.pdf
Williams, L. (2007). Threat Models Software Security Touchpoints: Purpose of Threat
Modeling, 115.
Yin, R.K. (2014) Application of case study research: Design and Methods. 5 th edition.
London: Sage publications.
Zhang, X., & Xu, S. (2006). TDDC03 Projects , Spring (2006): A Comparison of Attack
Trees , Threat Modeling and OCTAVE.
IJCSBI.ORG
Enhanced-bandwidth Compact
Printed Inverted F Antenna
Suitable for LTE/GSM Mobile
Phone
S. Jesse Jackson
PG Student, ECE Department
QIS College of Engineering and Technology, Ongole, India
sikha.jessejackson@gmail.com
T. Thomas
Assistant Professor, ECE Department
QIS College of Engineering and Technology, Ongole, India
thomas.thatapudi.t@ieee.org
ABSTRACT
In this paper design of multi band Printed Inverted F Antenna for LTE/GSM mobile
application is manifested. The proposed design is suitable for embedding in the mobile
handset and has advantages in aspects like low profile, small radiation effect, and good
tuning properties. A matching circuit is employed in addition with the proposed aerial
constructed by a rectangular plate placed on top of the FR-4 dielectric substrate of 65x80
mm2 size to provide wide operating frequency band. This makes the design more suitable
for better tuning to a required frequency bands. The ground plate is coated on substrate of
its bottom side. Overall size of PIFA is small enough to be embedded in a smart phone, and
it has been optimized to cover the LTE and GSM bands at 2600, 1500, and 800 MHz
frequencies respectively. It has a gain ranging from 1.469 dBi to 5.428 dBi at the resonating
frequency bands. The study of antennas performance in term of impedance bandwidth, S-
parameters, radiation pattern and gain is presented with CST Microwave studio simulation
results.
Keywords
Chip inductor, chip capacitor, Impedance matching circuit, Mobile phone, Multi band,
PIFA, Tuning.
1. INTRODUCTION
Nowadays mobile phones are everywhere and users are depending on
phones for multiple services. The hard-hitting issues for handheld cellular
user equipment are the antennas with broad impedance bandwidth, low
profile, less weight and it should be cost effective, and Omni-directional
radiation pattern is desirable. To provide continuous interactive voice, data
IJCSBI.ORG
and even video services many improvements are being made in
communication systems to make these services available anytime and
anyplace. Next-generation cellular communication systems higher
bandwidths are mandatory, LTE bands are only alternative for future needs.
LTE generally offer high reception date rates [13]. In general based on
specification either internal or external antennas are used in mobile
handsets. The close proximity of external antenna causes higher radiation
absorption rate, it is the major disadvantages of such type of mobile
antennas. Contrary to this, to avoid human interference internal antennas are
printed on substrate system board, and care will be taken to make sure that
the major radiation from antenna is radiated away from head. The printed
aerial are designed depending on the mobile phone type and amendments
have to be made to meet the specifications. The design of low profile
antenna is expected in the mobile handsets and all performance parameters
should be up to the mark so that it can be used for commercial services. To
achieve wide bandwidths for LTE/ WWAN operation the inverted-F
antenna (IFA) is usually used as internal antenna in mobile phones, but 6-
10mm of extra profile is a added size to the basic design, leading to more
sophisticated design called PIFA printed inverted F-shape antenna [4-9].
Mono pole antenna is improved in many aspects to be used in mobile
phones, which is now called as PIFA. The advantages of PIFAs made them
very suitable for small devices so they are widely used in mobile user
equipment. A wide planar radiator is used in place of a slim conductive
radiating element of an Inverted F antenna, this new design is named as
Planer IFA. In the basic PIFA construction one element as top plate, another
as ground plane, for feeding the resonating upper element a strip is used. For
DC-shorting between ground and upper element a plane is used for
connection at one edge of the radiating plane. For better impedance
matching, the following are optimized in PIFA design, they are the signal
feed position, and the shorting pin position in the slot. The separation
between signal feed and DC-shorting pins is another design issues for the
better impedance matching of the PIFA. Design of both E-plane and H-
plane polarizations with desired directional properties is possible with PIFA.
PIFAs are the best antennas when the antenna point of reference is not
predictable and reflections are present [10-12]. Control of the resonance
frequencies independently by changing lengths of strips or slots is a widely
known method in the micro strip patch antenna design.
The antenna space in a mobile handset environment is extremely limited.
Therefore, designing an internal antenna for a mobile handset is difficult,
especially when multi-band operation is required. This paper presents an
antenna for mobile phone with attractive characteristics as shown in figures
1 and 2, the proposed antenna [13] with multiband operation design to
IJCSBI.ORG
support GSM/LTE bands is presented. Embedded matching circuit provides
tuning property for the system to different resonant frequencies.
Figure 1. Proposed antennas radiating section with slots and matching circuit
2. PROPOSED ANTENNA
Tuning of antenna for different resonance frequencies is easy with alteration
of element values of a matching circuit connected to the antenna of a mobile
phone. To avail this advantage in the proposed design matching circuit with
three elements is employed. A capacitor (1 pF) is connected in series with a
parallel combination of capacitor (3.1 pF) and inductor (8.8 nH). For the
given set of values of matching elements the proposed antenna resonates at
three different frequencies. And other lower and upper resonance
frequencies can be obtained with different combination of values for the
matching circuit elements.
The substrate is a made up of FR4 having r = 4.4 and thickness 0.8 mm, on
top of this the radiator plane of 35 x 10mm2 surface area is realized. At a
height of 8.2 mm the separate PCB structure is hovered above a ground
plate of 65 x 80 mm2 with the support of DC-shorting rod with 1.2mm
radius and 9mm height. Slots in the structure are crafted to make it resonate
at different frequencies, moreover the spacing between feed and shorting
strips has considerable impact on resonance frequencies.
For resonance at different frequencies patch slots are introduced. In figure 2.
(b) the measurements of the slots of width 1mm in the radiator patch are
shown. For the feed line the length and the width are 15.5mm and 1mm.
Where as in case of rectangular patch antenna dimensions are calculated
based upon operating frequency. Dimensions of radiator are calculated from
the following equations [13], in which Fr resonant frequency, c light
velocity, permittivity of substrate. To make available higher data rates for
various services the antennas are planned to support foremost cellular
system bands namely GSM/UMTS/LTE. In this proposal both rectangular
strip and its slots are designed to support multiple bands.
IJCSBI.ORG
C
L (1)
2 Fr eff
1 2
W (2)
2 Fr o o r 1
(a)
(b)
(c)
Figure 2. (a) Proposed antenna with elevated radiator shorted to ground. (b)
Dimensions of radiating element (all dimensions are in mm). (c) Matching circuit for
the proposed antenna, the rating of the capacitor is pF
while that of the inductor is in nH.
IJCSBI.ORG
3. SIMULATION RESULTS
When matching circuit with given combination of elements is connected
resonance can obtained at three different frequencies that is 0.8 GHz, 1.5
GHz and 2.7 GHz as shown in Fig. 3. On the other hand the antennas return
loss value with coaxial feed without matching circuit is -15.5dB at 0.93GHz
and -31dB at 1.8 GHz. The impedance bandwidth is wide enough to cover
GSM800, 1500 and LTE2600 bands. The proposed Z-shaped feed extension
helps to adjust the return loss value to a desired lower level and shows
considerable affect on bandwidth characteristics of the proposed antenna.
IJCSBI.ORG
IJCSBI.ORG
Table 1. Gain of proposed antenna at resonant frequencies
Frequency (GHz)
parameter
0.8 1.5 2.7
Gain (dBi) 1.469 2.872 5.428
4. CONCLUSION
The presented compact PIFA design has enough frequency bandwidth to
support GSM, LTE, and DCS bands having directivity ranging from 1.4dBi
to 5.4dBi. The proposed antenna has an appreciable return loss at different
resonant frequencies 0.8GHz, 1.5GHz and 2.7GHz. The low profile flat
design of presented multiband PIFA for cellular user equipment is simple
and easy to fabricate. Matching circuit used in the modal has given fine
tuning possibility making it to resonate at different frequencies. The
proposed antenna is recommended for smart phones with multiband
functionality.
5. ACKNOWLEDGMENTS
The authors are pleased to acknowledge the support of management of the
organizations for providing all required facilities to carry out the work, and
sincere thanks to principal for suggestions.
6. FUTURE SCOPE
This modal can be further improved to have more frequency bands like
LTE700, LTE2300 etc., and matching circuit can be optimized for better
profile advantage.
REFERENCES
[1] F-H Chu and Kin-Lu W, Planar printed strip monopole with a closely-coupled
parasitic shorted strip for eight-band LTE/GSM/UMTS mobile phone, IEEE
Transactions. on Antennas and Prop., V. 58, No. 10, Oct. 2010, pp. 34263431.
[2] Keng-Chih Lin, Chih-Hao Lin and Yi-Cheng Lin, Simple printed multiband antenna
with novel parasitic-element design for multi standard mobile phone applications,
IEEE Trans. on Antennas and Propag., Vol. 61, No. 1, Jan. 2013, pp. 488491.
[3] Yong-Ling Ban, Jin-Hua Chen, Joshua Le-Wei Li and Yujiang Wu, Small-size
printed coupled-fed antenna for eight-band LTE/GSM/UMTS wireless wide area
network operation in an internal mobile handset, IET Microw. Antennas Propag., Vol.
7, Iss. 6, Jun. 2013, pp. 399407.
[4] Y. K. Park and Y. Sung, A reconfigurable antenna for quad-band mobile handset
applications, IEEE Trans. on Antennas and Propag., Vol. 60, No. 6, Jun. 2012, pp.
30033006.
[5] Yun-Wen Chi, Kin-Lu Wong, Quarter-wavelength printed loop antenna with an
internal printed matching circuit for GSM/DCS/PCS/UMTS operation in the mobile
phone, IEEE Trans. on Antennas and Propag., Vol. 57, No. 9, Sept. 2009, pp. 2541
2547.
IJCSBI.ORG
[6] Jae Hee Kim, Won Woo Cho and Wee Sang Park, A small dual-band inverted-F
antenna with a twisted line, IEEE Antennas and Wirel. Propag. Lett., Vol. 8, 2009,
pp. 307310.
[7] Chien-Wen Chiu and Yu-Jen Chi, Planar hexa-band inverted-F antenna for portable
device applications, IEEE Antennas Wirel. Propag. Lett., Vol. 8, 2009, pp. 1099
1102.
[8] Sung. Y, Compact quad-band reconfigurable antenna for mobile phone applications,
Electron. Lett., Vol. 48, No. 16, 2012, pp. 977979.
[9] N. Misran, M. M. Yunus and M. T. Islam, Small Dual-Band Planar Antenna with
Folded Patch Feed, Journal of Applied Sciences Research, Vol. 6, No. 12, pp. 1975-
1980, 2010.
[10] Mikko Komulainen, Markus Berg, Heli Jantunen, Eekki T. Salonen and Charles Free,
A Frequency Tuning Method for a Planar Inverted-F Antenna, IEEE Trans. on
Antennas and Propagat., Vol. 56, No. 4, Apr. 2008, pp. 944-950.
[11] Z. D. Liu, P. S. Hall and D. Wake, Dual-Frequency Planar Inverted-F Antenna, IEEE
Trans. Antennas Propagat., Vol. 45, No. 10, Oct. 1997, pp. 1451-1458.
[12] F. R. Hsiao, H. T. Chen, T. W. Chiou, G. Y. Lee and K. L. Wong, A Dual-Band
Planar Inverted-F Patch Antenna with a Branch-Slit, Microwave and Optical
Technology Letters, Vol. 32, No. 4, Feb. 2002, pp. 310-312.
[13] Sandeep Kumar Veeravalli, K Shambavi, Zachariah C Alex, Design of tri band
antenna for mobile applications International conference on Communication and
Signal Processing, April 3-5, 2013, pp. 947-950.
IJCSBI.ORG
Implementation of e-Government
Services using Java Technologies:
A Methodological Guide in
Improving an e-Police Management
System in Zimbabwe
Mahlangu Gilbert, Chikonye Musafare, Furusa Samuel Simbarashe
and Mugoniwa Beauty
ABSTRACT
In recent years, there has been a paradigm shift in service delivery in government
ministries, departments and agencies. Many governments have redefined their service
delivery systems through the implementation of e-government using various technologies.
This has seen the transfer of major government services to online platforms. The purpose of
this study was to appraise the implementation of e-government services using Java
technologies by focusing on an e-police management system in Zimbabwe so that
Zimbabwe Republic Police (ZRP) can align its systems with other National Police Services
world-over. Using a qualitative research method, the researchers collected data from the
participants through qualitative questionnaires, semi-structured interviews and focus group
discussions. The findings indicated that the majority of services that are offered by the ZRP
are not electronically enabled. The study proposes that ZRP can improve its service
delivery system by utilising Java technologies presented in this study. This will enable the
organisation to solve the problems that are inherent in the current system.
Keywords
E-government services, Java technologies, e-police management system
1. INTRODUCTION
In recent years, there has been a paradigm shift in service delivery in
government ministries, departments and agencies. This has been fostered by
the introduction of e-government systems around the world. Governments
have entered into an intense competition of occupying a leading position in
IJCSBI.ORG
IJCSBI.ORG
IJCSBI.ORG
3. JAVA TECHNOLOGY
Java consist of various technologies which are subsidiary elements of the
three main suites; Java Enterprise Edition (J2EE), Java Standard Edition
(J2SE) and Java Mobile Edition (JME). These technologies can support
embedded, web, stand alone, distributed and mobile application
development. The utilisation of these technologies can allow the
development of different types of Java application that can be used in the
implementation of e-government services. In this section, the subsidiary
elements of Java technologies that are used for web and mobile application
development are presented.
IJCSBI.ORG
IJCSBI.ORG
4. METHODOLOGY
A qualitative research method based on qualitative questionnaires and semi-
structured interviews were conducted to ascertain whether ZRP is providing
some of its services online to the general public. These research instruments
also helped the researchers to identify areas of application for Java
technology in implementing an e-police management system. Focus group
discussion was used to critical evaluate the methodological guide for the use
of Java technologies in improving an e-police management system in
Zimbabwe. The participants for completing the qualitative questionnaire
were randomly selected from the general public. Although the selection for
IJCSBI.ORG
5. FINDINGS
This section presents the findings of the study based on the information
gathered from the police officers and the citizens of Zimbabwe.
IJCSBI.ORG
Notices that include policies and procedures that support law enforcement
are not accessible by either web or mobile technology. In most cases,
citizens are caught by surprise by the law enforcement agents.
5.1.5. Police officers using web or mobile technology to clear vehicles and
finger prints
Clearances for vehicle and finger prints are done manually. The details of
the vehicle or the person to be cleared are captured at the police station and
sent through manual dispatches to the Head Office which has the central
database. The officers at the Head Office verify the records as per clearance
required. In turn, the clearing officer action the clearance documents
accordingly and send them back to the dispatching office using the same
delivery channel.
IJCSBI.ORG
this section areas of application for e-police management system where java
technologies can be used are identified and explained.
6.2. E-suggestion
This service will allow citizens to send their suggestions that can assist the
police officers in tracking criminals and detecting crime. An electronic
suggestion box need to be implemented using JSP and JDBC API. JSP is
necessary for developing web forms for inputting suggestions while JDBC
is needed for allowing the insertion of suggestions to the electronic
suggestion box and retrieving them for further analysis. The major SQL
statements for this service are the INSERT and SELECT.
6.3. E-clearance
This service will provide a linkage between the police department and
government departments that has the central databases for vehicle and
fingerprints. There is need for system integration especially between ZRP's
Stolen Motor Vehicle Database and CVR's vehicle registration system to
allow verification of vehicle before registration by CVR. In addition,
integration is needed between ZRP's Fingerprint Identification System (FIS)
and National Registration System to allow verification of accused identity
before creation a criminal record of same by ZRP. The JDBC and the EJB
API can be used in this service since the two APIs are used to provide
connection among relational databases and handling database transactions
respectively. This linkage will unlock government-to-government e-
government.
IJCSBI.ORG
6.5. E-notices
This service will enable the police to transfer policies and procedures to the
online platform, giving easy access of information to citizens instead of
placing policies and procedures on notice boards at the charge office. Other
critical notices may include the names of criminals on the wanted list,
warrant of arrests, missing persons, people detained at police stations, lost
and found property and victims of road accidents. This service can be
implemented using JSP or Java Servlet to provide dynamic web content.
Apart from putting notices on the website, crime alerts can also be executed
as SMS using Ozeki Message Server and JDBC, whereby the SELECT
statement written in Java will be used to query the database table for
outgoing messages to the citizens.
6.7. E-payment
The presence of this service to the e-police management system is expected
to allow citizens to pay for services and fines that are administered by ZRP
using available electronic or mobile payment systems in Zimbabwe. For
example, fingerprint vetting and road traffic offenses. In this regard, the JSP
is needed for developing form based and API based gateways to provide
authentication, authorisation and integration. The other technologies for this
service include the mobility pack which enables the development of
applications for mobile devices and the JDBC for handling payment records
of services and fines.
7. FURTHER RESEARCH
The study looked at the basic and core business of the police force in
Zimbabwe. In order to fully utilise an e-police management system, there is
need to incorporate the aspect of intelligent system in order to increase
crime control. Furthermore, future research may also look at how the
technology may be used to handle the administrative needs of the police
force. For example, e-procurement and e-transfers of police officers.
IJCSBI.ORG
8. CONCLUSION
Java technologies have come a long way in developing mobile and web
technologies. Most applications that are needed to allow online service
delivery can be developed using Java. The use of Java technologies for the
implementation of e-police management system by ZRP is expected to
improve the quality of services, reduce the costs of delivering services,
improve the utilisation of scarce resources, enhance accountability and
transparency and restore citizen confidence in government services. This
study noted that there are a number of services ZRP can provide online to
Zimbabwe citizens and its officers. For the aforesaid reason, ZRP need to
implement e-government system to conform to other National Police
Services world-over. Hence, this study suggested a methodological guide of
providing an e-police management system anchored in a web portal
developed using Java technologies that are capable of supporting the core
business of the police force in Zimbabwe.
9. ACKNOWLEDGEMENTS
The authors are grateful to ZRP officers, the citizens of Zimbabwe and Java
programmers who participated in this research. The information they
provided was vital for the success of this research.
10. REFERENCES
Al-khouri, A.M., 2013. e-Government in Arab Countries: A 6-Staged Roadmap to Develop
the Public Sector. , 4(1), pp.80107.
Bergsten, H., 2002. JavaServer Pages,
Bilbao, B., Dutta, S. & Lanvin, B., 2013. The Global Information Technology Report 2013:
Growth and Jobs in a Hyperconnected World, Available at:
http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:The+Global+Infor
mation+Technology+Report+2013+Growth+and+Jobs+in+a+Hyperconnected+Worl
d#1.
Chavan, R. et al., Securing Information Brokering In Distributed Information Sharing
Using RC6 and SPEKE. , 2(2).
Devasena. C.L. & Balraj, P.L., 2014. E-Governance in Southern States of India - Towards
Whole-of-Government ( WoG ) Abstract: , 3(2).
Dolgicer, B.M., Bayer, G. & Bardash, M., 2003. Java Servlets and Enterprise Java Beans In
Enterprise Architectures: Friends or Foes Part I.
El-Kassas, W.S. et al., 2015. Taxonomy of Cross-Platform Mobile Applications
Development Approaches. Ain Shams Engineering Journal. Available at:
http://linkinghub.elsevier.com/retrieve/pii/S2090447915001276.
Hair, J.F. et al., 2015. Essentials of Business Research Methods, Routledge. Available at:
https://books.google.com/books?id=GfnqBgAAQBAJ&pgis=1 [Accessed December
21, 2015].
IJCSBI.ORG
Kumaran, S.I., 2002. Jini Technology: An Overview, Prentice Hall PTR. Available at:
https://books.google.com/books?id=WtxQAAAAMAAJ&pgis=1 [Accessed
December 21, 2015].
Manonaniam, 2000. Advanced Java Programming with Database Application.
OECD, 2009. OECD e-Government Studies Rethinking e-Government Services User-
Centred Approaches: User-Centred Approaches, OECD Publishing. Available at:
https://books.google.com/books?id=Og7WAgAAQBAJ&pgis=1 [Accessed
November 24, 2015].
OECD, 2011. OECD Public Governance Reviews Estonia: Towards a Single Government
Approach, OECD Publishing. Available at:
https://books.google.com/books?id=n2HWAgAAQBAJ&pgis=1 [Accessed
December 14, 2015].
Qian, K., 2007. Java Web Development Illuminated, Jones & Bartlett Learning. Available
at: https://books.google.com/books?id=oY9fShrQyUgC&pgis=1 [Accessed
December 14, 2015].
Saraevi, M., 2011. Integrated Management Web- Based Applications on Java Platform.
Quality, pp.573580. Available at: http://muzafers.uninp.edu.rs/refer.html.
Singh, S., 2015. E-Governance State-of-the-Art Survey: Stuttgart , Germany. , pp.4765.
Stevens, P., 2010. Web Development in Java Warning More information HTTP basic
Layers Terminology that s not specific to Java. Agenda.
IJCSBI.ORG
Sheeba Priyadarshini J
Department of Computer Science
St. Josephs College (Autonomous)
Langford Road, Bangalore, India
ABSTRACT
Social Tagging of images uploaded to the Web is highly mandatory as tags serve as the
entities for image retrieval. Manual Tagging of images makes the overall process tedious
and moreover the tags when manually assigned become noisy. Several automatic tag
recommendation systems are available but the background study proves that the tag
relevance is not very high. In the era of Semantic Web, there is a need for a semantic driven
tagger which would perform efficiently. Also, a system which bridges the gap between
manual and automatic tag recommendation is required. An ontology driven semantic tagger
for tagging images with social importance which tags the images based on limited reference
tags is proposed. The proposed methodology combines ontology crawling using K-Means
Clustering and Semantic Deviation Computation using Modified Normalized Google
Distance Measured. The tag space is enhanced using Strategic Set Expansion incorporating
a dynamic semantic deviation computation. An average precision percentage of 84.4 and an
F-Measure percentage of 86.67 are achieved.
Keywords
Ontology Tagger, Semantic Deviation, Social Tagging, Strategic Set Expansion, Tag
Recommendation.
1. INTRODUCTION
The World Wide Web is a repository of billions of images, video, text and
other data. Owing to the increasing number of users of the World Wide
Web, even the data on the Web is increasing exponentially. With the
popularity of trends in Social Networking, the amount of social data is also
IJCSBI.ORG
increasing almost every minute. It has been estimated that Social data
mainly includes images and videos that are shared among the social actors
(users and their friends) when compared to text and other kinds of data.
Images are among the topmost in the list of social data that are the most
shared.
The problem targeted is definitely not the increasing amount of social or
web data or their means to handle it but retrieving the exact or highly
similar items like images or video when searched is the main issue. Tags or
Annotations become a very important means to retrieve web multimedia
information. To facilitate easy searching or retrieval of exact images or
items from the World Wide Web, Tagging of such social data items plays an
important strategy as images without tags over the Web are
ubiquitous[1].There can be two approaches which can be followed. The first
approach is the traditional approach where the Search Engine or The Search
Algorithm must be designed in a more efficient or intelligent manner to
extract the required items. The second of the two approaches is by correctly
tagging the social items like images and reducing the noise in such tags such
that there is a quicker and faster convergence to retrieve the exact images or
videos from the World Wide Web. However, there exists diversity in social
tagging behaviors [2].
Tagging an image or a video or any such social items like blogs is like
specifying the right address for the search engine to retrieve the tagged item.
Tags bridge the gap between users cognition and objective [3].Tagging that
exists in the present day scenario varies from manual to automatic tag
recommendation. Tagging an image on the social websites is a methodology
of organizing the images and reliable tags must be specified for social
photos [4]. Several automatic taggers are available but the best tag
recommendation system must be semantically driven and must recommend
them by re-organizing the tags such that the users may be convinced by the
tags that are recommended by the search engine. Also the semantics of the
tags assigned must correlate with that of the Web Search Engine such that
the items that are browsed must have high relevance and must be
significant.
Although, with the availability of several approaches for automatic tag
recommendation, a semantic web approach which is actually budding for
tagging will make it much efficient to comply with the web search engines.
An ontological approach is proposed for tag construction and
recommendation in order to minimize and remove noisy tags for images of
community importance. Ontologies constitute important intrinsic structures
of the Semantic Web. Due to a paradigm shift towards improved semantic
web technologies, ontology focused approach for image tagging is a highly
IJCSBI.ORG
IJCSBI.ORG
2. RELATED WORKS
Zhou et al., [8] have proposed a hybrid collaborative model for image
tagging which incorporates probabilistic techniques with a content based
strategy for image tagging. The strategy uses an image tag associative
matrix for and non-negative factorization of matrix for collaborative
filtering. Correlations are estimated using a norm method. The approach is
tested using three large databases with a large number of images and tags.
Pantraki et al., [9] have proposed an image tagging and recommendation
system which uses the strategy of Parallel Strategy Analysis 2 in which
three matrices are used with visual features, user information and the tag
information. This strategy was tested with ample data sets. The major
drawback of this technique is that it uses three large data structures which
may tend to increase the overall complexity of the solution.
Zhu et al., [10] have proposed an approach where the social information of
the image is used as social clues for tagging of images. Along with social
clues, the social group information and the tagging preferences of the image
owner is used to predict and annotate tags. A strategy called as
neighborhood voting on the Online Social Networks is used. This approach
is quite good but the tag space doesnt predict numerous tags which
becomes a disadvantage in this system. Qian et al., [11] have proposed a
novel strategy of incorporating diversified semantics for image tagging and
annotation over online social networks. The strategy uses considering the
factor of relevance of improving the tag quality. The usage of semantic
compensation onto the already determined top ranked tags is one of the
major concepts on which this strategy is based.
Liu et al., [12] have proposed an innovative methodology of using more
than a single for tagging of an image. This multi feature tagging approach
learns several scores of features which are further converted to weights. A
tag pair matrix of a predormintarily low rank is formulated such that several
features are a significant in tagging of an image. Lin et al., [13] have
proposed a strategy of image tagging on social websites by extracting sparse
patterns of tags from tags that are already available in the web data. The tags
which the users have contributed already are being used to predict and re-
recommend tags in this approach. The problem of minimizing the quadratic
loss is very well treated in this strategy by incorporating a bi-layer norm.
Though there would be a good level of tag relevance, there will be a
dependency on the already available tags rather than the image level
compatibility.
IJCSBI.ORG
IJCSBI.ORG
of social image tagging based on social inputs. Online Social Websites are a
repository for very large volumes of social data like the features and patterns
of users, images and social tags. This approach mainly concentrates on the
semantic analysis of these social inputs to formulate and predict tags for
annotation.
3. PROBLEM DEFINITION
Tagging of images is of most importance as the tag names play a vital role
when the images are retrieved in the search engine. The major objectives of
our work which were tackled as individual problems are:
To automatically recommend tags for an image uploaded driven by a
limited input tag of users reference.
To implement an ontological approach for tag recommendation.
To overcome and avoid noisy and redundant tags.
To improve the overall quality of the tags for community important
images.
To improve the recall, precision, f-measure and accuracy of the
proposed system.
IJCSBI.ORG
5. IMPLEMENTATION
The implementation of the proposed system is done using JAVA as a
programming language and Netbeans as the IDE. The reference tag names
are initially parsed and tokenized. Tokenization is performed by
incorporating a JAVA based NLTK (Natural Language Tool Kit) Tokenizer
IJCSBI.ORG
IJCSBI.ORG
5.1 EXPERIMENTATION
The experiment was carried out by using 1124 images which were of
community importance. 350 images were collected from personal
photographers while the rest were crawled from Bing and Google Image
search engines. Several monuments which are popular and the ones which
are not very popular are also included for experimentation. The
amalgamation of less popular monuments with that of the popular ones
actually makes the system ready for every kind photographs of community
importance.
5.2 ALGORITHM
The Proposed Algorithm which inputs a reference tag pair and predicts tags
is discussed in Table 1.
IJCSBI.ORG
6. RESULTS
The tagging for several images that are uploaded are governed by the system
implemented. Several images that are of community importance and are of
interest to others are incorporated into the experiments. Various images that
were crawled from the Google and Bing image search engines and were
further uploaded through the proposed system for tagging. Table 2 depicts
the images and their corresponding tags which were recommended by the
system. The tags recommended were checked for correctness and relevance.
The tags recommended by the system must be acceptable by the user and
the user must finalize the tags based on the systems recommendation. The
proposed system predicts and recommends tags of a high quality which will
be evaluated in the performance evaluation
IJCSBI.ORG
IJCSBI.ORG
7. PERFORMANCE EVALUATION
The performance analysis of Onto Tagger is carried out by using four
evaluation metrics namely the Recall, Precision, F-measure and Accuracy
which is depicted in Equations (4), (5), (6) and (7) respectively. The
percentage of the metrics used is considered in the approach proposed. The
Precision or Positive Predictive Value referred to as a Fraction of Retrieved
Instances [22] and is incorporated as the ratio of the number of relevant
recommended tags to that of the tags formulated in the Tag Space. Recall
also called as sensitivity is known as the fraction of relevant instances [22]
IJCSBI.ORG
2 * Precision * Recall
F - Measure (6)
Precision Recall
Precision Recall
Accuracy (7)
2
The images which were considered for performance evaluation are Amber
Fort, Bom Jesus Church Goa, Philomenas Church Mysore, Velankanni
Church and Qutab Minar. The images chosen range from the most popular to
the less famous images. All images chosen have an importance to a specific
community or a society in general. The percentage of Recall, Precision, and
Accuracy for the images is individually depicted in Table 2. Also, the
average measures of the depicted evaluation metrics is computed which is
also lists in Table 2.
IJCSBI.ORG
Onto Tagger is compared with Tag Relevance [7] which is used as a bench
mark for performance comparison. The Precision Percentage of Onto Tagger
was compared with that of Tag Relevance. Five arbitrary Precision values of
Tag Relevance were considered which was then converted into a percentage
of precision for comparison with the Precision Percentage of Onto Tagger.
Figure 2 gives the graphical depiction of the Precision Percentage of Onto
Tagger and Tag relevance. It is clearly evident from the line graph that the
Performance of Onto Tagger is much better than that of Tag Relevance.
Figure 2: Comparison of the Precision Percentage of Onto Tagger with Tag Relevance
IJCSBI.ORG
IJCSBI.ORG
8. CONCLUSIONS
An innovative approach for automatic tag recommendation which is based
on limited reference tags is implemented successfully. The paradigm is
driven by ontology extraction and incorporates a Modified Normalized
Google Distance measure to compute semantic deviations between ontology
entities and tags. A strategic set expansion strategy is incorporated to
enhance the population of the tag space. The proposed methodology clusters
similar ontologies using a basic K-Means Clustering Algorithm. Several
community contributed images that are crawled from Flicker and Google
Image Search are used for validating the approach. Experimental evidences
show that the Proposed onto Tagger approach is the best-in-class method for
tagging social images on the Web. Onto Tagger yields an average precision
of 84.4 %, an average recall of 89.2 %, accuracy of 86.8 %. The average
proposed F-measure of Onto Tagger is 86.67 %. Onto Tagger incorporates a
strategic set expansion technique which increases the overall number of tags
recommended. Onto Tagger extracts the ontology information of the similar
tags. Owing to the reason of incorporating ontological information, the tags
are of high relevance. Dynamic Semantic Deviation Computation that has
been used in Onto Tagger eliminates the noisy and irrelevant tags. Onto
Tagger is one of the image tag recommendation systems which is driven by
the reference input tags which makes it a cognitive bridge between manual
tagging and automating tagging systems.
ACKNOWLEDGMENTS
I whole heartedly thank my parents who stood by me and supported me
during the implementation of this work. Above all, I thank God the
Almighty and Everlasting Father and my Lord Jesus Christ who gave me
strength, wisdom and health for the completion of this work.
REFERENCES
[1] Deng, Z.H., Yu, H. and Yang, Y., 2015, October. Image Tagging via Cross-Modal
Semantic Mapping. In Proceedings of the 23rd Annual ACM Conference on
Multimedia Conference (pp. 1143-1146). ACM.
[2] Liu, Q. and Li, Z., 2016. Projective nonnegative matrix factorization for social image
retrieval. Neurocomputing, 172, pp.19-26.
[3] Jabeen, F., Khusro, S., Majid, A. and Rauf, A., 2016. Semantics discovery in social
tagging systems: A review. Multimedia Tools and Applications,75(1), pp.573-605.
IJCSBI.ORG
[4] Hong, Y., Chen, T., Zhang, K. and Sun, L., 2016, January. Personalized Annotation for
Mobile Photos Based on Users Social Circle. In MultiMedia Modeling (pp. 76-87).
Springer International Publishing.
[5] Wikipedia article https://en.wikipedia.org/wiki/Normalized_Google_distance last
accessed on Feb 29th, 2016.
[6] R.L. Cilibrasi and P.M.B. Vitanyi, The Google similarity distance , IEEE Trans.
Knowledge and Data Engineering, 19:3(2007), 370383 or
http://arxiv.org/abs/cs.CL/0412098
[7] Mishra, D., Singh, U.P. and Richhariya, V., 2014. Tag Relevance for Social Image
Retrieval in Accordance with Neighbor Voting Algorithm. IJCSNS, 14(7), p.50.
[8] Zhou, N., Cheung, W.K., Qiu, G. and Xue, X., 2011. A hybrid probabilistic model for
unified collaborative and content-based image tagging. Pattern Analysis and Machine
Intelligence, IEEE Transactions on, 33(7), pp.1281-1294.
[9] Pantraki, E. and Kotropoulos, C., 2015, September. Automatic image tagging and
recommendation via PARAFAC2. In Machine Learning for Signal Processing
(MLSP), 2015 IEEE 25th International Workshop on (pp. 1-6). IEEE
[10] Zhu, S., Aloufi, S. and El Saddik, A., 2015, June. Utilizing image social clues for
automated image tagging. In Multimedia and Expo (ICME), 2015 IEEE International
Conference on (pp. 1-6). IEEE.
[11] Qian, X., Hua, X.S., Tang, Y.Y. and Mei, T., 2014. Social image tagging with diverse
semantics. Cybernetics, IEEE Transactions on, 44(12), pp.2493-2508.
[12] Liu, X., Liu, R., Cao, Q. and Li, F., 2013, November. Multi-feature Late Fusion for
Image Tagging. In Pattern Recognition (ACPR), 2013 2nd IAPR Asian Conference
on (pp. 34-37). IEEE.
[13] Lin, J., Yuan, J., Duan, L.Y., Luo, S. and Gao, W., 2012, July. Social Image Tagging
by Mining Sparse Tag Patterns from Auxiliary Data. In Multimedia and Expo (ICME),
2012 IEEE International Conference on (pp. 7-12). IEEE.
[14] Im, D.H. and Park, G.D., 2013, June. STAG: semantic image annotation using
relationships between tags. In Information Science and Applications (ICISA), 2013
International Conference on (pp. 1-2). IEEE.
[15] Pliakos, K. and Kotropoulos, C., 2014, May. Simultaneous image tagging and geo-
location prediction within hypergraph ranking framework. InAcoustics, Speech and
Signal Processing (ICASSP), 2014 IEEE International Conference on (pp. 6894-6898).
IEEE.
[16] Barmpoutis, P., Kotropoulos, C. and Pliakos, K., 2015, September. Image tag
recommendation based on novel tensor structures and their decompositions. In Image
and Signal Processing and Analysis (ISPA), 2015 9th International Symposium on (pp.
7-12). IEEE.
[17] Pavlidis, T., 2009, June. Why meaningful automatic tagging of images is very hard.
In Multimedia and Expo, 2009. ICME 2009. IEEE International Conference on (pp.
1432-1435). IEEE.
[18] Hughes, M., Connor, N.E. and Jones, G.J., 2012, May. A machine learning approach to
determining tag relevance in geotagged Flickr imagery. In Image Analysis for
Multimedia Interactive Services (WIAMIS), 2012 13th International Workshop on (pp.
1-4). IEEE.
IJCSBI.ORG
[19] Wang, L., Zhao, Z., Su, F. and Sun, W., 2014, July. Content-based social image
retrieval with context regularization. In Multimedia and Expo Workshops (ICMEW),
2014 IEEE International Conference on (pp. 1-6). IEEE.
[20] Gong, T., Li, S. and Tan, C.L., 2010, October. A semantic similarity language model to
improve automatic image annotation. In Tools with Artificial Intelligence (ICTAI),
2010 22nd IEEE International Conference on (Vol. 1, pp. 197-203). IEEE.
[21] Sawant, N., Li, J. and Wang, J.Z., 2011. Automatic image semantic interpretation using
social action and tagging data. Multimedia Tools and Applications, 51(1), pp.213-246.
[22] Wikipedia article https://en.wikipedia.org/wiki/Precision_and_recall as accessed on
Feb 29th, 2016.