Volume 6, Number 3

E-commerce in Developing Countries

Trushar Patel1 and Premal Soni2

View:    Abstract |  HTML Full Text |  PDF |  XML|

This study examines the advantages and possibilities for the use of electronic transactions for their market. It focuses on developing and transition countries that have not fully implemented the use of e-commerce in their economic, commercial and productive processes. An important aim of this research is to create awareness on the likely effects for enforcing the use of digital signatures to carry out e-commerce transactions on the economies of developing and transition countries. The study also proposes key issues to be considered for policy-makers in countries in order to consider in fostering the development of e-commerce.

Hide Abstract

Robots Considered Harmful

Sanjay Bhatt1, Syed Minhaj Ali2 and Sana Iqbal3

View:    Abstract |  HTML Full Text |  PDF |  XML|

Recent advances in trainable algorithms and electronic symmetries are continuously at odds with link-level acknowledgements. Given the current status of omniscient methodologies, theorists famously desire the development of Markov models, which embodies the appropriate principles of programming languages. We describe a mobile tool for visualizing the Ethernet, which we call Vaisya.

Hide Abstract

Cloud for Education: the Challenges of Current Reign

Shashikala Ravichandran1 and Roohi Ali2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Sighting towards the current scenario of modern era‘s Higher education the scene is quite changing and widespread, extending within the reign of cloud computing only, campuses are now leveraging with mobile apps, smart phones and highly customized devices. And at the same time, the amount of data and content that are to be maintained and stored has gone from a nibble to what could now only be described as a flood. This add-ons complexity and cost. Beside these challenges, there is increasing demands for transparency, governance, and data-retention regulations are pointing to the “big data” problems faced by higher education. Therefore an unassailable shared service solution is now becoming a need for hour in this every second updating arena, the IT and computing leaders in higher education and research are wondering for it to integrate from already spread out lots of agile services from cloud. And the next battle will be in the area of architecture that provides services and applications according to a specific institution as “above campus” into cloud service that must be chosen with care to identify and deliver centrally or locally to persist a unique infrastructure from others in a row. And also investigating the standards and current cloud technologies such as content management framework for the above stated issues to consolidate and centralize a common service framework across disparate institutions of higher education and research and common services that can be used by all. This paper presents the role of cloud computing in the provision and support of up gradation and development in higher education that yield tools that meet the demands of the next generation campus society. Furthermore, we present integration components framework transformation in the development of higher education with cloud computing as an appropriate alternative support. And investigating the Interpretability standards currently available for higher education, the challenges and their possible solutions.

Hide Abstract

Adding TCP-Variants to NS-2

Ahmed Jawad Kadhim

View:    Abstract |  HTML Full Text |  PDF |  XML|

The network simulator (NS-2) is very important to simulate the network types such as mobile ad-hoc network efficiently and easily by providing the environment of this network exactly. This simulator helps the researcher in the last years to introduce Their researches without need to the expensive requirements to build the network in real time. This simulator uses file (called cbegen.tcl) to generate the traffic between nodes of the network at random time according to uniform distribution. The original cbrgen.tcl file provides two types of traffics that are CBR with UDP and FTP with TCP. The purpose of this paper is to add the one-way TCP and two-way TCP variants to NS-2. Also, this paper made these variants operate with many types of sink such as TCPSink, TCPSink/DelAck, TCPSink/Sack1, and TCPSink/Sack1/DelAck. This addition make it usable for anyone that wants to study the behaviour of these variants and its effects on the network.

Hide Abstract

Analytical Study for Optimal Time Parameter in Cellular Communication Data Analysis

Wurood H. Albayati and Tawfiq A. Al-Asadi

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this research we will try to determine time quantization periods which could be used for cellular data analysis to reduce cost and time in processing such huge data. The research try to answer such questions as, What is the excite time quantization value required to perform network and user analysis? It is possible to eliminate any periods of time without effecting the quality of obtained result? Does it worth to eliminate such data(what is the gain for such elimination)?

Hide Abstract

Search Engine: A Review

S.K.Vijay1, Manish Maheshwari2 and Roohi Ali2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Searching online has become part of the everyday lives of most people. Whether to look for information about the latest gadget to getting directions to a popular trend, most people have made search engines part of their daily routine. Beyond trivial applications, search engines are increasingly becoming the sole or primary source directing people to essential information. For this reason, search engines occupy “a prominent position in the online world”; they have made it easier for people to find information among the billions of web pages on the Internet. Due to the large number of websites, search engines have the complex task of sorting through the billions of pages and displaying only the most relevant pages in the search engine results page (SERP) for the submitted search query. With the continued growth of the Internet and the amount of websites available, it has become increasingly difficult for sites looking for an audience to achieve visibility. There are millions of new websites appearing on the Internet every month. As a result of this continued growth, it has made it increasingly difficult for websites to stay visible among all the other competing sites.

Hide Abstract

Parallel Mining Association Rules in Calculation Grids

Khadidja Belbachir and Hafida Belbachir

View:    Abstract |  HTML Full Text |  PDF |  XML|

As a result of the physical storage expansion and backup equipment and the increasing need to store more data, the sequential searching algorithms of association rules have been found ineffective. Thus the introduction of new parallel versions has become a necessity. We propose in this paper, a parallel version of a sequential algorithm Partition. This is fundamentally different from other sequential algorithms, as it scans the database only twice to generate all significant association rules. Consequently, the parallel approach does not require much communication between sites. The proposed approach was implemented for an experimental study. The results obtained show a large gain in execution time compared to the sequential version.

Hide Abstract

An Efficient Edge Detection Method Based on Bit-Plane Slicing for Bacterial Images

P. Kalavathi

View:    Abstract |  HTML Full Text |  PDF |  XML|

Bit-plane slicing is a method which divides the image into many binary image planes and categorizes the image data into most significant and least significant information. In this paper a new edge detector using the most significant image data to detect the edges in the bacterial images is developed. This proposed method finds the edges in the higher order bit-planes using contouring technique and combines these edges to get the final edge image. The edges obtained by the proposed method are more accurate than the existing method. The experimental result obtained by the proposed edge detector is compared with the popular edge detectors Canny, Log, Prewitt, Robert and Sobel and have produced best results.

Hide Abstract

Comparative Study and Performance Analysis of DSDV, OLSR, AODV, DSR And MAODV Routing Protocols in Manets

Haider Ayad Khudair1 and Mohammed A.Naser2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Mobile Ad-Hoc Network (MANET) is a wireless network without infrastructure and decentralized network which need a robust dynamic routing protocol and it is becoming an important concept of modern communication technologies and services. There are various routing protocols available for MANETs. In this work, we focus on the most popular ones are DestinationSequenced Distance Vector (DSDV), Optimized Link State Routing(OLSR), Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Multicast Ad Hoc On-Demand Distance Vector Routing Protocol (MAODV) routing protocol. This paper is an attempt to study, analysis and compare these five routing protocols on the basis of various performance metrics such as throughput of received packets, throughput of dropped packets, packet delivery ratio, end to end delays, jitter and normalizes routing load .This performance evaluation have been perform under different environments. The simulation results indicate that none of the routing protocols we selected have shown best performance in all the six different performance metric. Therefore, the efficiency of a network can be achieved by choosing the best suitable protocols based on the network requirement.

Hide Abstract

Role of Information and Communication Technology in Education

M. Akkalakshmi1, N.Venkatanarayana2, Y. Srinivas1, J. Vijayasekhar3 and G. Ananda Rao4

View:    Abstract |  HTML Full Text |  PDF |  XML|

Information and communication technology has changed the way in almost all the fields and is playing salient role in education. Use of ICT in teaching-learning process is different from teaching in a classroom. Teachers have to be trained in such a way that they should plan, create and deliver the content using ICT tools. Integrating ICT into education seems to be necessary issue for educators and education administrators in the world. ICT tools provide more effective learning environment. Use of ICT make changes in teaching methods, learning approaches, handling and exchanging information. The purpose of this paper discusses the benefits and difficulties in use of ICT for teaching-learning process, approaches for use of ICT in education in India as well as other counties.

Hide Abstract

Dangers of Internet to Society and Practical Avoidance

Mohammad Al-Rababah, Abdulsamad Al-Marghirani and Mohammed Mosa Al-Shomrani

View:    Abstract |  HTML Full Text |  PDF |  XML|

The internet information network of the latest technology at the moment, which is linked to information and communication technologies and computers that have evolved significantly since the end of the last century, and continues to evolve quickly and persistence. Some Statistics indicate that the number of Internet users in the world, about 0.7%, while in the United States and Canada, up to 40% . The online network is composed of huge numbers of networks, linking computers distributed in different parts of the globe, dubbed the “network of networks”, because most of the computers connected to the Internet, are also part of smaller networks, found within companies, universities and government departments, and connects online between these networks to make up the global network is huge, connects hundreds of millions of people, to communicate with each other, and access to information, and the exchange of data and programs, and serves the Internet more than 200 million users and is growing very fast up to 100 percent per year, has started the idea of the Internet was originally military government idea and spread to the education sector and research and then trade up to become accessible to individuals where the sail in the Internet completely free but the price you pay is to provide a service to you.

Hide Abstract

Effect of the Neuron Coding by Gaussian Receptive Fields on Enhancing the Performance of Spiking Neural Network for an Automatic Lipreading System

Asmaa Ourdighi and Abdelkader Benyettou

View:    Abstract |  HTML Full Text |  PDF |  XML|

The artificial neural networks have been generally based on rate coding in the earliest stage of computational neuroscience development. What if all the idea of computational paradigm involving the propagation of continuous data affected straight the enhancing of neural network performance and the main objective becomes how to encode the data for modeling biological behavior. The spiking neural networks (SNN) were founded around this concept where not only the network topology, neuron model and plasticity rule should be defined, but also used the timing of the spike to encode and compute information. In this paper, we proposed an automatic lipreading system for spoken digits based on spike response model (SRM). We experimentally demonstrated the impact of the coding strategy to improve the results by comparing two strategies: Spike time coding and population coding by using Gaussian receptive fields (GRF); which achieved 75% and 83.33% accuracy, respectively, on Tulips1.0 dataset.

Hide Abstract