Table of Contents - Volume 5 Number 2

A Secure and Robust Prototype for Electronic Voting System

Pages : 161-168

Ashraf Darwishmagidalgendy and Eman Mohamed

View:    Abstract |  PDF  |  XML|

Electronic voting (EV) refers to the use of computers or computerized voting equipments to cast ballots in an election EV has been in development for more than 20 years, during which it has produced outstanding results both in theory and in practice. This paper presents a new secure preferential e-voting scheme. In this paper we will present an e-voting scheme that covers most of the e-voting requirements were implemented to guarantee voter’s privacy and authentication. A prototype implementation of EV protocol over the Internet which fulfils some electronic voting system requirements such as efficiency, transparency and mobility has been presented.

Hide Abstract


Views 
   PDF Download PDF Downloads: 911
[hupso]


Virtual Reality Helps Rheumatoid Arthritis Patients

Pages : 169-179

Wadee Alhalabi

View:    Abstract |  PDF  |  XML|

This paper concerns computer applications in medicine that exploit the potentially powerful interconnection between psychology (the mind) and physiology (the body). An important class of applications involve patients who suffer chronic pain caused by rheumatoid arthritis (RA); these patients look for any kind of therapeutic technique to use in addition to traditional medicine in order to alleviate pain, reduce physical disabilities caused by the disease or delay disease progress and improve their lifestyle. This paper focuses on a particular class of therapeutic techniques that provide imagery therapy using virtual reality in the treatment of rheumatoid arthritis. The paper presents a short review of virtual reality (VR) equipment and their use to provide immersive experiences. Furthermore, we describe imagery therapy (IT) involving guided imagery and illustrate its effects. We particularly describe the application of VR and IT in the treatment of rheumatoid arthritis. A brief introduction to our system and the research we have done in this field is presented, showing some preliminary results that support our hypothesis.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1236
[hupso]


An Alternate Approach to Compute the Reliability of A Network With Imperfect Nodes Using Binary Decision Diagrams

Pages : 181-188

Manoj Singhal

View:    Abstract |  PDF  |  XML|

In this paper i have adopted an efficient approach for calculating the reliability of the computer communication network with the help of binary decision diagram. The computer communication network has imperfect nodes and imperfect links. It means the nodes as well as the communication links may fail with known probability. The network is represented in the form of a directed graph. First i have found the reliability of the given network by applying the inclusionexclusion formula, which is an exact method to find the reliability of a network and then i have found the reliability of the given network with binary decision diagram. To find the reliability via binary decision diagram, we must order the nodes and the communication links of the given network by applying a proposed heuristic approach. I have found that the reliability obtained via binary decision diagram is equal to the reliability obtained by inclusion-exclusion formula. I have also shown that the generated binary decision diagram is of the minimum size.

Hide Abstract


Views 
   PDF Download PDF Downloads: 910
[hupso]


A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Data Centers

Pages : 189-197

Zohreh Royaee1 and Majid Mohammadi2

View:    Abstract |  PDF  |  XML|

Nowadays, power consumption of data centers has huge impacts on environments. Researchers are seeking to find effective solutions to make data centers reduce power consumption while keep the desired quality of service or service level objectives. Virtual Machine (VM) technology has been widely applied in data center environments due to its seminal features, including reliability, flexibility, and the ease of management. We present genetic algorithm scheduling approach to reduce data center power consumption, while guarantee the performance from users’ perspective . We use live migration and switching idle nodes to the sleep mode allow Cloud providers to optimize resource usage and reduce energy consumption.We have validated our approach by conducting a performance evaluation study using the CloudSim toolkit. The experimental results show that the proposed algorithm achieves reduced energy consumption in data centers.

Hide Abstract


Views 
   PDF Download PDF Downloads: 999
[hupso]


The Impact of Client-Server Modalities on Cryptography

Pages : 199-204

Mohammed Mosa Al-Shomrani1 , Mohammad. A.A. Al- Rababah2 and Hussein Ahmad3

View:    Abstract |  PDF  |  XML|

The performance of a mobile network is considered in the context of the given parameters QoS. We consider the known model QoS and problems of their use in mobile networks. In this paper proposed a mechanism to ensure QoS in mobile networks using Multiprotocol Label Switching (MPLS)

Hide Abstract


Views 
   PDF Download PDF Downloads: 851
[hupso]


Queuing Approach to Estimate the MANET’s Optimal Number of Nodes

Pages : 205-214

Saad Talib Hasson and Enass Fadil

View:    Abstract |  PDF  |  XML|

Mobile Ad-hoc Network (MANET) was defined as a set of mobile nodes that moved freely and connected among each other without any infrastructure or administrator control. Each node contains a kind of queuing system like buffer used it to serve the arriving packets that reached to the busy node. The packets reaches each node in certain sequence. The number of received (arriving packets) per unit time is called “ arrival rate”. The average rate or the average time between any two successive packets is called the inter- arrival time and follow certain statistical distributions. The node will serve the packets according to certain mechanism (discipline) like drop tail. The effects of the service mechanism on the behavior of the MANET was studied and tested. Many queuing theory parameters were used to study and analyze the behavior of the MANETs. A mathematical model was built and implemented to estimate the optimal number of nodes required to be deployed in each new designed MANETs environment.

Hide Abstract


Views 
   PDF Download PDF Downloads: 953
[hupso]


Intelligent and Effective Diabetes Risk Prediction System Using Data Mining

Pages : 215-221

Kawsar Ahmed1,Tasnubajesmin1, Ushin Fatima2,Md. Moniruzzaman2, Abdulla-L-Emran2 and Md. Zamilur Rahman1

View:    Abstract |  PDF  |  XML|

Diabetes is not only a disease but also responsible for occurring different kinds of diseases such as heart attack, kidney disease, blindness and renal failure. With respect to Bangladesh, Diabetes is a deadly, disabling and cost disease whose risk is increasing at alarming rate. The diagnosis of diabetes is a vital and tedious task. The detection of diabetes from some important risk factors is a multi-layered problem. Initially 400 diabetes and non-diabetes patients’ data is collected from different diagnostic centre and data is pre-processed. After pre-processing data is clustered using K-means clustering algorithm for identifying relevant and non-relevant data to diabetes. Next significant frequent patterns are discovered using AprioriTid shown in Table 1 and Decision Tree algorithm shown in Table 2. Finally implement a system to predict diabetes which is easier, cost reducible and time saveable.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1087
[hupso]


Requirement for Computer Support and its Protocols for AVT

Pages : 223-230

Asia Begum, Faheem Khan,Parveen Mehboob,Muhammad Shoaib and Lala Rukh

View:    Abstract |  PDF  |  XML|

Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model. In this paper modeling collaboration processes is presented in which mainly humans are involved. In this paper virtual team agility (VTA) are presented and successfully implemented and the concept of social protocol, combining social networks and workflow models, is proposed as a model. In this paper, the requirements of computer support for virtual team agility (VTA) are presented. Additionally, the concept of social protocol, combining social networks and workflow models, is proposed as a model supporting interactions within agile VT

Hide Abstract


Views 
   PDF Download PDF Downloads: 865
[hupso]


Using Artificial Bee Colony Algorithm for MLP Training on Software Defect Prediction

Pages : 231-239

Solmaz Farshidpour1 and Farshid Keynia2

View:    Abstract |  PDF  |  XML|

Defects in software systems continue to be a major problem. Defect prediction is an important topic in software quality research and could help on planning, controlling and executing software development activities. Nowadays, computer scientists have shown the interest in the study of social insect’s behaviour in neural networks area for solving different prediction problems.Chief among these is the Artificial Bee Colony (ABC) algorithm. This paper investigates the use of ABC algorithm that simulates the intelligent foraging behaviour of a honey bee swarm. Multilayer Perceptron (MLP) trained with the standard back propagation algorithm normally utilises computationally intensive training algorithms. One of the crucial problems with the backpropagation (BP) algorithm is that it can sometimes yield the networks with suboptimal weights because of the presence of many local optima in the solution space. To overcome ABC algorithm used in this work to train MLP learning the complex behaviour of software defect prediction data trained by BP, the performance of MLP-ABC is benchmarked against MLP training with the standard BP. The experimental result shows that MLP-ABC performance is better than MLP-BP.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1062
[hupso]


New Developed Traffic Generator for NS-2

Pages : 241-250

Saad Talib Hasson1 and Mohammad H. Husain2

View:    Abstract |  PDF  |  XML|

In this paper, a new version of the traffic generator script “cbrgen.tcl” to the Network Simulator (NS-2) was developed and applied in many simulation experiments. The main objective of this paper was to study the impacts of varying the transmitted (sent) data rate for the CBR and TCP traffic under varying number of nodes. The performance of MANETs traffic pattern was evaluated with respect to the quantitative metrics such as PDF, packet loss, throughput, end to end delay and NRL. As a result of this study with the comparative performance between the different data rates of CBR and TCP traffic over varying number of nodes shows a better performance in smaller rates.

Hide Abstract


Views 
   PDF Download PDF Downloads: 941
[hupso]


Feature Aware Prediction of User Action in Software Process

Pages : 251-256

Seema Safi, Sajid Anwar and Lala Rukh

View:    Abstract |  PDF  |  XML|

A lot of Software Process Description Languages have been exercised and made. Some implement one paradigm, for example rule based languages (pre-/post conditions), net based languages (petri nets, state machines), or imperative languages (based on programming languages). Others implement multiple paradigms .all of them are not very efficient, reliable and robust and the approach we use, observes the user’s action and tries to predict his next step. For this we use approaches in the area of machine learning (sequence learning) and adopt these for the use in software processes. This paper describes an approach for user (e.g. SW architect) assisting in software processes. The sequence prediction technique, which is presented in this paper, is based on IPAM4 and Jacobs/Blockeel5. The results show that our approach predicts continuously better than the original algorithm. In this paper we described an approach to assist users by predicting the next step the user starts during process enactment. We evaluated this work by defining situations and we compared our approach with the core algorithm we have adopted.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1014
[hupso]


An UML Based Design of E-Learning System Using Digital Certificate

Pages : 257-262

Ambalika Ghosh and Sunil Karforma*

View:    Abstract |  PDF  |  XML|

E-Learning System involves an open participation of learner, teacher & administrator among different region in the world. Due to use of internet as electronic communication media there are several types of risks & threats such as - alternation of course material, change or deletion of important information like fees, assignments; marks etc. may hamper the electronic E-Learning environment in different ways. Security of information in a learning system electronically requires some technique for confidentiality, identification, authentication and non-repudiation of the user. Digital Certificate, using cryptographic technique implements above four elements of security needed for E-learning. In this paper we have discussed how digital certificate can be used for secure information processing like upload mark sheet in E-learning system. Here, we have wrapped Digital Certificate in an Object Oriented Model and applied it for authentication and verification of uploaded mark sheet by Faculty.

Hide Abstract


Views 
   PDF Download PDF Downloads: [Download not found]
[hupso]


Review on Financial Forecasting Using Neural Network and Data Mining Technique

Pages : 263-267

Mehzabin Shaikh and Gyankamal J. Chhajed

View:    Abstract |  PDF  |  XML|

The rise of economic globalization and evolution of information technology, financial data are being generated and accumulated at an extraordinary speed. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in strategic planning and investment decisionmaking. The competitive advantages achieved by data mining include increased revenue, reduced cost, and much improved marketplace responsiveness and awareness. There has been a large body of research and practice focusing on exploring data mining techniques to solve financial problems. This paper describes data mining in the context of financial application from both technical and application perspective by comparing different data mining techniques.

Hide Abstract


Views 
   PDF Download PDF Downloads: 876
[hupso]


A Review on Role of Information Technology in Business Management

Pages : 269-272

A.Sreeram1,D.R.P. Chandra Sekhar1, S R Karumuri2,Y. Srinivas3 and J.Vijayasekhar4

View:    Abstract |  PDF  |  XML|

Information technology plays a vital role in day-to-day activities right from small business to large business. Whether you need computers for storage, transfer, retrieval or transmission of information, you can manage your business with greater accuracy and efficiency with the assistance of information technology and computer applications. As an example considers the internet, it provides us with all latest happenings around the globe. Railways and Airways are connected with Information Technology. If we want to travel we can book tickets online, reserve rooms, etc. Since IT has become an essential part irrespective of the field i.e., education, or entertainment, or business. Buying and selling has become quite easy now. Online shopping through credit cards and debit cards has made purchasing effortless. Moreover you can do shopping anytime as there is no time constraint; they are open round the clock. Banking is another area which has been automated like managing accounts, transferring of cash, depositing, withdrawing, etc. Implementing IT in an effective manner would decrease the cost; cost which is expected at the time of failure. Also increases the flexibility.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1144
[hupso]


Batch Installer Inoculation for Digital Repository Software Open Source Dspace

Pages : 273-276

Bharat M. Chaudhari

View:    Abstract |  PDF  |  XML|

This technical writing describes the batch process injection for installing Dspace 1.8.2 version on MS-Window operating system XP-VISTA-7.The public complier of process which has been made for DSpace-1.8.2.exe, Apache Ant 1.8.3.exe, Apache Tomcat (Dspace) _1.7.28 .exe while postgresql-9.1.3-1-windows.exe and jdk-6u31-windows-i586.exe remained no changes. The limiting factor to adopt Dspace has ever been the difficulty in Installing DSpace. And as we know that installation and configuration of the prerequisites that are usually time consuming and difficult with any operating system Linux, MAC or Window.

Hide Abstract


Views 
   PDF Download PDF Downloads: 841
[hupso]


Double-Reflecting Data Perturbation Method for Information Security

Pages : 283-288

Maram Balajee1 and Challa Narasimham2

View:    Abstract |  PDF  |  XML|

Information Security plays a vital role in data Communication through LAN, WAN, Internet etc. Cryptography is one of the best tools for Information Security. Cryptography is made up of two different tools that are Encryption and Decryption. Encryption is the method to hide the original data in Data Communication. While Data Communication, the data is masked using codes/shuffling. Here the purpose is to ensure privacy by keeping the information hidden/encoded to which it is not intended. When data reached destination, the encrypted data will be decrypted using some mathematical functions or decoding techniques is called Decryption. The processes are done using mathematical login, or algorithms. This paper proposes new methods for encryption and decryption by using some mathematical methods and number sequences.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1007
[hupso]


Impact of Information Technology in Various Sectors

Pages : 289-294

A. Sreeram1, Y. Srinivas2, G. Ananda Rao3, S.R. Karumuri4, J. Vijayasekhar5 and R. Sampath Kumar2

View:    Abstract |  PDF  |  XML|

IT has brought in several technological developments in every field .IT plays a major role in simplifying various organizational processes. IT has accelerated several business organizations all over the world, helped several businesses realize organizational goals and automate processes by following the principles of usability, efficiency, customer related and a clear communication. Most business enterprises rely on the power of information technology for carrying out their daily tasks conveniently and faster. IT makes complex procedures easier, faster and also helps a lot in avoiding redundancy. It lets individuals access necessary data, ensuring the safety of confidential ones. Information Technology has made every individual completely dependent for even the simplest day to day task.

Hide Abstract


Views 
   PDF Download PDF Downloads: 927
[hupso]


Service Oriented Architecture Integration

Pages : 295-301

Suresh Krishnaraju1 and K. Subramani2

View:    Abstract |  PDF  |  XML|

Organizations across many industries have moved or in the process of moving towards a service-oriented IT architecture. This article explores the challenges and impacts that organizations are facing in the process of adopting service oriented architecture with Web services. While some adoption issues are relevant for any organization, others depend on the industry and type of organization. The results of multiple case studies suggest that differences in the business environment need to be considered in the decision of when and how to move to a service

Hide Abstract


Views 
   PDF Download PDF Downloads: 855
[hupso]


Intelligent Fuzzy Analytic Hierarchy Processing Decision Support System – An Aid in Expert Analysis of Shoulder and Neck Pain Occupational Risk Factors

Pages : 303-331

T. Padma and S. P. Shantharajah

View:    Abstract |  PDF  |  XML|

This research develops a fuzzy decision support system (FDSS) to evaluate and prioritize the relative importance of the imprecise, uncertain and vague nature of risk factors causing shoulder and neck pain (SNP), an important musculoskeletal disorder and most ubiquitous pain complaint in an occupational environment. The objective involves derivation of mechanical-, physicaland psychosocial-related risk categories using knowledge acquisition implemented by identifying the risk factors through literature analysis, conventional and concept mapping interviews with expert neurologist, orthopaedict, psychologist and physiotherapist. Fuzzy analytic hierarchy process (FAHP) is applied as an evaluation tool to measure the significance of the risk factors. The results indicate that the proposed system supplements SNP diagnosis experts with more precise key decision support information.

Hide Abstract


Views 
   PDF Download PDF Downloads: 1001
[hupso]


SSL Based Transport Layer Security

Pages : 315-320

J.Vijayabharathi

View:    Abstract |  PDF  |  XML|

The last couple of years has seen a growing momentum towards using the Internet for conducting business. One of the key enablers for business applications is the ability to setup secure channels across the internet. The Secure Sockets Layer (SSL) protocol provides this capability and it is the most widely used transport layer security protocol. In this paper we investigate the performance of SSL both from a latency as well as a throughput point of view. Since SSL is primarily used to secure web transactions, we use the SPECWeb96 benchmark suitably modified for use with the SSL protocol. We benchmark two of the more popular web servers that are in use today and find that they are a couple of orders of magnitude slower when it comes to serving secure web pages. We investigate the reason for this deficiency by instrument the SSL protocol stack with a detailed profiling of the protocol processing components. Based on our findings we suggest two modifications to the protocol that reduce the latency as well as increase the throughput at the server.

Hide Abstract


Views 
   PDF Download PDF Downloads: 878
[hupso]


Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks

Pages : 321-325

Bhawana Mathur

View:    Abstract |  PDF  |  XML|

Routing in sensor networks is complicated due to several issues ranging from security to energy constraints of wireless sensor nodes. This distinguishes them from contemporary wireless ad hoc networks. Adversaries can launch DoS attacks by injecting false data reports via compromised nodes. Previously a Hill Climbing key dissemination filtering scheme was developed where each node disseminates its key to forwarding nodes and later transmits reports along with the key. The forwarding nodes validate the credibility of the reports based on the key obtained earlier. This approach assures stronger filtering capacity for nodes closer to data sources and achieves secure and reliable transmissions. Sensor nodes process capability, bandwidth and battery capacity is still scarce. It is necessary to save resources of sensor nodes with the purpose of prolonging network lifetime. In that regard we propose to use a dynamic data aggregation routing protocol, named DABDR along with the earlier filtering scheme for secure and dynamic transmissions in Wireless Sensor Networks.

Hide Abstract


Views 
   PDF Download PDF Downloads: 800
[hupso]


Cloud Computing: Risks and Security Issues

Pages : 327-332

Sucheta Arora

View:    Abstract |  PDF  |  XML|

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription- based or pay per use service that, in real time over the internet, extends IT’s existing capabilities. In this article we try to cover the issues that a company needs to consider when evaluating a cloud service and also identifies some issues and risks involved in controlling cloud computing services and provides recommendations on their appropriate use. We have also discussed about the predictions and future of cloud computing.

Hide Abstract


Views 
   PDF Download PDF Downloads: 862
[hupso]