Latest Articles - Volume 10 No. 1

  • Website Design of Indian Central Universities: Issues and Challenges

    Mudasir M kirmani1 and Syed Mohsin Saif*2

    [ View:    Abstract ] [ HTML Full Text]

    World has shrunk into logically small e-village where everyone can communicate with every other person with great ease via both audio and visual media. The existence of being a global village has only been possible with interconnected communication links connecting users from geographically distant areas. The most predominant media for achieving this is with the help of well developed website. Educational institutions play vital role in reshaping any nation by imbibing quality attributes in culture, civilization and modernization. The information available on websites of educational institutions has become very important for prospective students and at present most of the universities are completing the process of admissions online with websites as mediators. Therefore, the need of the hour is to have updated and informative websites with ease of access. A key feature of the ongoing growth of Worldwide Web over the past decade has seen proliferation of web portals and mobile applications that focus on supporting education. The main aim of this research work is to study websites of central universities established post 2004 to explore their quality parameters and to get an insight into the challenges faced by prospective users. The research work recommends a common design framework for all central universities in order to help prospective users with understanding and usage of central universities websites.

    Hide Abstract

    Views    PDF Download PDF Downloads: 5
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Cardiovascular Disease Prediction Using Data Mining Techniques: A Review

    Mudasir M Kirmani

    [ View:    Abstract ] [ HTML Full Text]

    Cardiovascular disease represents various diseases associated with heart, lymphatic system and circulatory system of human body. World Health Organisation (WHO) has reported that cardiovascular diseases have high mortality rate and high risk to cause various disabilities. Most prevalent causes for cardiovascular diseases are behavioural and food habits like tobacco intake, unhealthy diet and obesity, physical inactivity, ageing and addiction to drugs and alcohol are to name few. Factors such as hypertension, diabetes, hyperlipidemia, Stress and other ailments are at high risk to cardiovascular diseases. There have been different techniques to predict the prevalence of cardiovascular diseases in general and heart disease in particular from time to time by implementing variety of algorithms. Detection and management of cardiovascular diseases can be achieved by using computer based predictive tool in data mining. By implementing data mining based techniques there is scope for better and reliable prediction and diagnosis of heart diseases. In this study we studied various available techniques like decision Tree and its variants, Naive Bayes, Neural Networks, Support Vector Machine, Fuzzy Rules, Genetic Algorithms, and Ant Colony Optimization to name few. The observations illustrated that it is difficult to name a single machine learning algorithm for the diagnosis and prognosis of CVD. The study further contemplates on the behaviour, selection and number of factors required for efficient prediction.

    Hide Abstract

    Views    PDF Download PDF Downloads: 3
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • A Survey on User Authentication Techniques

    K. Sharmila1,*, V. Janakiand A. Nagaraju3

    [ View:    Abstract ] [ HTML Full Text]

    Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn’t work.  A qualitative survey of user authentication systems being used in today’s environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown.

    Hide Abstract

    Views    PDF Download PDF Downloads: 3
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Survey on Packet Marking Algorithms for IP Traceback

    Y. Bhavani1*, V. Janaki2 and R. Sridevi3

    [ View:    Abstract ] [ HTML Full Text]

    Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.

    Hide Abstract

    Views    PDF Download PDF Downloads: 2
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Iris Biometric Modality: A Review

    Iqra Altaf Mattoo and Parul Agarwal*

    [ View:    Abstract ] [ HTML Full Text]

    Biometric Recognition is the most suitable and informed identification method which is used in different fields due to its uniqueness of the countless behavioural and physiological traits like hand geometry, finger prints, iris recognition, face recognition, handwriting, voice recognition, etc. Iris recognition system is widely being used as it has inherently distinctive patterns that provide a robust method for the identification purpose. Different nations have already started to use biometric recognition system for the identification purposes including patient identification, border security, etc. In this review paper, different steps that are involved in Iris Recognition system are defined and evaluation of different Iris Recognition methods used by different researchers for each recognition step is done as well.

    Hide Abstract

    Views    PDF Download PDF Downloads: 1
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone