Author Archives: Kamran Khan

Data Mining, Selection, Transforming, DM, Clustring.

Fakhrosadat Fanian and Marjankuchaki Rafsanjani

View:    Abstract |  HTML Full Text |  PDF |  XML|

Directed routing protocols, one of them is data centre protocol are the main proposed methods in improving exploration quality of sensor networks. In these protocols, routing data stored within networknodes locally. Therefore, there isn’t universal data about routes; one of these protocols is sensor protocol for information via negotiation (SPIN), in this article it was attempts to solve lack of receiving data by remote nodes from origin in case of non-request from nearer nodes to origin in this protocol using clustering process. In the other hand, it was attempt to prevent routing among origin and receiver nodes separately in this protocol that cause waste of major parts of network resources and by delivering this algorithm led to improve performance and efficacy and also increase life time of network and bearing of this protocol against error because of rotating cluster heads roles.

Hide Abstract

Data Mining: Exploring New Horizons from Huge Data Store

Trushar.B Patel1 and Premal Soni2

View:    Abstract |  HTML Full Text |  PDF |  XML|

DM i.e. Data Mining is the technique to find out the hidden facts from the large amounts of data. From the historic data, we derive knowledge. Data Mining is important aid for decision making in organizations. Data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns from the data store.

Hide Abstract

An Overview: Image Segmentation Techniques for Geometry and Color Detection In Augmented Reality Environments

Hasan Z.H Alhajhamad, Faris Amin Abu Hashish, Hoshang Kolivand and Mohd Shahrizal Sunar

View:    Abstract |  HTML Full Text |  PDF |  XML|

This work is an accumulative study on some techniques which could help to extract the geometry and color of an image in the real-time environment. Image segmentation is a hot-zone in Computer Vision approach, however, works still on to produce accurate segmentation results for images. In corporation with other surveys which compares multiple techniques, this paper takes the advantage of choosing the most appropriate technique(s) to be adopted for Augmented Reality environment.Interested reader will obtain knowledge on various categories and types of research challenges in the image-based segmentation within the scope of AR environments.

Hide Abstract

Design and Development of Agent Based Architecture for Effective Resource Utilization in A Grid Environment

P. Deepan Babu1 and T. Amudha2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Software agents are the autonomous, problem-solving computational entities capable of effective operation in dynamic and open environments. Intelligent agent is a type of software agent, autonomous in nature which observes and acts upon environment and performs some task at each host. Agent can also coordinate, reason, solve a problem, clone and merge with other agents. A Grid is a set of resources (such as CPU, Memory, Disk, Applications, and Database) distributed over wide area networks and supports large scale distributed applications. Resources in grid are geographically distributed, linked through internet, to create virtual super computer for vast amount of computing capacity to solve complex problems. Genetic Algorithm works with key parameters such as fitness function, crossover probability and mutation probability and optimizes task scheduling. The paper proposes a software agent based architecture to utilize the resources effectively in Grid environment. The architecture is compared and analyzed the resource utilization with three algorithms namely Shortest job first, Arbitrarily Scheduling Algorithm and Genetic algorithm. The efficiency of resources utilization is analyzed and suitable algorithm is suggested.

Hide Abstract

On Some Aspects of Educational Network

Subrata Paul1, Anirban Mitra2 and Prasanta Padhi3

View:    Abstract |  HTML Full Text |  PDF |  XML|

in popularity. While most people use these social networking to connect with friends, but by going through a close study one can easily observe that their utility extends much beyond the scope of knowing and connecting like-minded peoples. These tools can also be used for learning and knowledge sharing. "Educational Networking" is the appropriate term, which is a kind of social networking technologies used for educational purposes. As the phrase "social networking" can sometime carries negative impact and connotations for educators, the phrase "educational networking" seems to be safer and more objectively towards discussing the pedagogical value. In this article, we have provided a brief overview on advantages of education. Our works include a bit of review of the concepts, definitions and categorizations available in Social Network literature. We have also argued on the central characteristic of Educational networking, which is a combination of personalization and socialization. This combination has a potential to facilitate transparency between student communities. Such transparency gives students insight into each other's work, leading to an increase in quality and benchmark of their own work.

Hide Abstract

Artificial Neural Network Stream Processing Core (Annsp) Implementation in Embedded Systems

Jnana Ranjan Tripathy1 and Hrudaya Kumar Tripathy2

View:    Abstract |  HTML Full Text |  PDF |  XML|

ANnSP is a stream-based programmable and code-level statically reconûgurable processor for realization of neural networks in embedded systems. ANnSP is provided with a neural-network-to-stream compiler and a hardware core builder. The ANnSP stream compiler makes it possible to realize various neural networks using ANnSP. On the other hand, the ANnSP builder makes the ANnSP processor an IP core that can be restructured to satisfy different demands and constraints. This paper presents the architecture of the ANnSP processor, the streaming mechanism, and the builder facilities. Also, synthesis results of a 64-PE ANnSP on a 0.18µm standard-cell library are presented. The obtained results show that a 64-PE ANnSP can perform computations of 25.6 giga connections in a second, while its throughput is upto 51.2 giga 32-bit ûxed point operations per second. Comparing with high performance parallel architectures locates 64-PE ANnSP among the best state of the art parallel processors.

Hide Abstract

Comparison Between Upstream and Downstream Supply Chain Management and How they are Affected by E-Business

Mohammad Shkoukani, Eman Alnagi and Rawan Abulail

View:    Abstract |  HTML Full Text |  PDF |  XML|

With the increasing interactions and interrelationships among companies, their suppliers and customers, the need for management of the flow of products, material and information is increasing, which created the concept of the Supply Chain Management. SCM is an old concept implemented to create integration between these entities for many years ago, but with the emergent of e-business and the widespread of internet technologies, the activities and processes of supply chain management have been enhanced. This paper gives short description of the concept of SCM, with its two models, Upstream and Downstream. Two case studies are discussed within these concepts. And finally, it discusses the impact of e-business evolution on the processes of both models of SCM.

Hide Abstract

Risk Management in Software Engineering

Trushar. B Patel1 and Premal Soni2

View:    Abstract |  HTML Full Text |  PDF |  XML|

The process of identification, analysis and either acceptance or mitigation of uncertainty in investment decisionmaking. Essentially, risk management occurs anytime an investor or fund manager analyzes and attempts to quantify the potential for losses in an investment and then takes the appropriate action (or inaction) given their investment objectives and risk tolerance. Inadequate risk management can result in severe consequences for companies as well as individuals.

Hide Abstract

Tech Productivity – An Android Based Solution for Indian Agriculture

Shweta Sharan, Kamini and Neha Mahajan

View:    Abstract |  HTML Full Text |  PDF |  XML|

Information and Communication Technology (ICT) in agriculture is an emerging field focussing on the enhancement of agricultural and rural development in India. It involves innovative applications using ICT in the rural domain. The advancement of ICT can be utilized for providing accurate and timely relevant information and services to the farmers, thereby facilitating an environment for remunerative agriculture. This paper describes a mobile based application – Krishi Ville which would take care of the updates of the different agricultural commodities, weather forecast updates, agricultural news updates. The application has been designed taking Indian farming in consideration.

Hide Abstract

Web Usage Mining and Business Intelligence

H.B. Basanth Kumar

View:    Abstract |  HTML Full Text |  PDF |  XML|

Now a day’s World Wide Web has become very popular and interactive for transferring of information. The web is huge, diverse and active and thus increases the scalability, multimedia data and temporal matters. The growth of the web has outcome in a huge amount of information that is now freely offered for user access. The several kinds of data have to be handled and organized in a manner that they can be accessed by several users effectively and efficiently. So the usage of data mining methods and knowledge discovery on the web is now on the spotlight of a boosting number of researchers. Web usage mining is a main research area in Web mining focused on learning about Web users and their interactions with Web sites. The motive of mining is to find users’ access models automatically and quickly from the vast Web log data, such as frequent access paths, frequent access page groups and user clustering. Through web usage mining, the server log, registration information and other relative information left by user access can be mined with the user access mode which will provide foundation for decision making of organizations. This paper presents brief overview of web usage mining and business intelligence.

Hide Abstract

Data Analysis and Management Techniques in Wireless Sensor Networks

T. Ravi Kumar1 and K. Raghava Rao2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Harvesting the benefits of a sensor-rich world presents many data analysis and management challenges. Recent advances in research and industry aim to address these challenges. Modern sensors and information technologies make it possible to continuously collect sensor data, which is typically obtained as real-time and real valued numerical data. Examples include vehicles driving around in cities or a power plant generating electricity, which can be equipped with numerous sensors that produce data from moment to moment. Though the data gathering systems are becoming relatively mature, a lot of innovative research needs to be done on knowledge discovery from these huge repositories of data. The data management techniques and analysis methods are required to process the increasing volumes of historical and live streaming data sources simultaneously. Analysts need improved techniques are needed to reduce an analyst’s decision response time and to enable more intelligent and immediate situation awareness. Faster analysis of disparate information sources may be achieved by providing a system that allows analysts to pose integrated queries on diverse data sources without losing data provenance. This paper proposed to develop abstractions that make it easy for users and application developers to continuously apply statistical modeling tools to streaming sensor data. Such statistical models can be used for data cleaning, prediction, interpolation, anomaly detection and for inferring hidden variables from the data, thus addressing many of the challenges in analysis and managing sensor data. Current archive data and streaming data querying techniques are insufficient by themselves to harmonize sensor inputs from large volumes of data. These two distinct architectures (push versus pull) have yet to be combined to meet the demands of a data-centric world. The input of sensor streaming data from multiple sensor types further complicates the problem.

Hide Abstract

Visual Elicitation of Roles: Using A Hybrid Approach

A. Arockia Eucharista and K. Haribaskar

View:    Abstract |  HTML Full Text |  PDF |  XML|

Access control is the process of mediating requests to data and services maintained a system, determining which requests should be granted or denied. Significant research has focused on providing formal representation of access control models. Role Based Access Control (RBAC) has become the norm in most organizations. This success is greatly due to its simplicity: a role identifies a set of Permissions; users in turn are assigned to roles based on their responsibilities. To implement a RBAC system, it is important to devise a complete set of roles. This design task, known as role engineering, has been recognized as the costliest part of a RBAC – oriented project. We propose a new role engineering approach to Role – Based Access Control (RBAC) referred to as visual role mining. The main aim is to graphically represent user – permission assignments to enable quick analysis and elicitation of meaningful roles. We propose two algorithms: VISRODE (VISualize Roles using DicE) and EXTRACT (Exception Tolerant Role ACTualizer). A heuristic algorithm VISRODE is used to sort the users and permissions matrix to avoid the large gaps between items using DicE coefficient. EXTRACT is a probabilistic algorithm and it generates a list of pseudo roles. This paper offers a graphical way to effectively navigate the result so that it reduces the time complexity in visualizing the roles.

Hide Abstract

Coplanarwire Crossing Based on Bayesian Scheme for QCA

K. Jeyakanth

View:    Abstract |  HTML Full Text |  PDF |  XML|

QCA is one of the innovating technologies for Nano scale computation. With the present difficulties in reduction of sizes in transistor circuits, QCA has been proposed as a kind of replacement for such instances Researchers have developed several models for defect characterization and design to minimize the uncertainty of proper circuit operation. This uncertainty of the circuit aids in developing a probabilistic model for analysis. One such model is the Bayesian network (BN) modeling6 , which exploits the causal relationships in clocked QCA circuits to obtain a model with low complexity. It is based on density matrix formulations and also takes the dependencies induced by clocking of cells. One of the many interesting features of BN is that it not only captures the dependencies existing between two QCA cells, but can also be used to conduct steady stateoperations without the need for temporal computation of quantum mechanical equations.

Hide Abstract

Generation and Analysis of the Random Numbers by GCC Compiler

Saksham Srivastava

View:    Abstract |  HTML Full Text |  PDF |  XML|

The random numbers have been generated by the GCC compiler and tested for their randomness. The code used by the library function of GCC compiler to generate random numbers is also presented. Chi-square test, Runs test below and above median, and Reverse arrangement test have been conducted to test the randomness. It has been shown that the Random numbers generated by GCC compiler have successfully passed these tests.

Hide Abstract

Protein Fold Recognition Algorithms-A General Survey

T. Kalaichelvi1 and P. Rangarajan2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Protein folding is considered as a significant confrontation in biological and protein research. This confrontation is interrelated to the fact that the conventional computational approaches are not potent enough to search for the appropriate structure in the large conformational space of protein. This insufficiency of the computational methods is a major hindrance in facing the protein folding problem. Trying to solve the problem, many researchers have examined the efficiency of the protein threading technique. Perhaps, parallel evolutionary methods for protein fold recognition have also been used. Typically, protein folding accredits to how a protein amino acid sequences with respect to the physiological conditions, folds into a three-dimensional structure called as native state. In this paper, various algorithms that have been framed for protein structure prediction. Furthermore, a survey of parallel evolutionary models for protein fold recognition has also been provided. The result of this survey showed that evolutionary methods can be effectively used to resolve the protein folding problems.

Hide Abstract

Modeling Analysis of Telecommunication Networks

Al.Shraideh Khaled

View:    Abstract |  HTML Full Text |  PDF |  XML|

To solve the problems of modeling telecommunications networks currently used by a large number of different methods. All of them can be divided into two classes1-5. First class combines methods of physical modeling in which, instead of the real system uses its simplified physical counterparts. In view of the significant limitations of these methods, they are rarely The second class includes methods of mathematical modeling, using appropriate analytical tools to describe transfer processes in the network. Depending on the used product are mathematical methods based on statistical (simulation) modeling, and theoretical and analytical methods Statistical and physical modeling to obtain accurate results, but because of the high labor intensity, considerable time and low degree of flexibility is of limited use.

Hide Abstract

Modified Based Random Efficient Energy Routing Algorithm(BREERA)

Saad Talib Hasson1 and Alyaa. A. Al-Monaaem Al-Najar2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Recently Wireless sensor Networks (WSNs) takes interesting researches due to there important and crucial applications. WSNs have limited energy so all researches focused in designing routing algorithms to save energy and to make each one operating for longer possible time. Based Random Efficient Energy (BREERA) is one of WSNs routing algorithms saved energy of the whole network because its sensor nodes needn’t to know any information about their sensor nodes neighbors. This paper suggests two approaches to modify the performance of the routing algorithm BREERA and make a comparison between the performance of the original BREERA and the performance of the modified BREERA. The first suggested method was called weights method which improved the performance of BREERA with the average received messages, lost messages, PDF, and average total energy. Weights method used two cases of energy weights (w1= 0.1 and w1= 0.8). With the value of the energy weight equal to 0.1 obtained higher received messages average, higher PDF average, less lost messages average and less died nodes average. While with the value of the energy weight equal to 0.8, a higher total energy was obtained. The second suggested approach is to limit the number of members for each cluster head which improves the performance of BREERA in received messages, lost messages, died nodes, PDF and total energy .The simulator Net Logo version 4.1.3 was used to design the simulation program of the routing algorithm BREERA.

Hide Abstract

Route Stability in Wimax (802.16)

A.F.Sheik Subani

View:    Abstract |  HTML Full Text |  PDF |  XML|

Thesis is devoted to network with WiMAX. It is claimed that WiMAX provides a perfect opportunity for an alternative network development. Discussion is based on five main aspects of WiMAX network implementation. Establishment and development of Base Stations (BS), Access Service Network Gateway (ASNG), and Connectivity Service Network (CSN), Base Station Controllers (BSC) and an Analogous Option (AO) to the GSM model are taken into account. The above mentioned entities are considered as integrative parts of WiMAX network establishment and implementation. Starting from 2011 the system was updated and rate was up to 1 Gigabits for fixed stations. The main emphasis in thesis is made on alternative nature of WiMAX.

Hide Abstract

Migrating Health Care By Analysing MYTHS in Cloud Technology

N. Jaswanth, J. Durga and D. Kiran Kumar

View:    Abstract |  HTML Full Text |  PDF |  XML|

Now a days the healthcare industry is facing significant pressures to lower the costs associated with providing healthcare, adopt new systems that support electronic medical records (EMR), and share data quickly and securely with other healthcare and government agencies and complainces like HIPAA. the healthcare industry has not been quick to adopt new technologies as it relates to infrastructure to support back-office operations. This paper enriches in focusing the health care sectors and its adoptions to cloud technology especialy in IaaS. Creating awarness and embeding the health care firms to the most smarter cloud technology this proposed approaches focus on discussing various cloud benefits to kickstart the health care firms as per their changing demands most effectively.

Hide Abstract

Approximate Dynamic Programming Modeling for a Typical Blood Platelet Bank

U. Abdulwahab and M. I. M. Wahab*

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper, we have devised a real-time, workable model for solving the practical problems associated with responsible blood platelet inventory. These problems include how to eciently dispense, organize, store, and order platelets that become unusable after 6 days. Stochastic demand and supply, as well as deterministic lead times, are congured into their model. Any shortages or outdates of the 8 major blood types are penalized in this proposal, with revenuw in conjunction with a further emphasis on the age of platelets will maximize ecency as well. A combined model of linear programing and approximate dynamic programming (ADP) was deployed while constructing their practical model. In an environment which emphasizes the need for realtime judgements, this new policy, as advanced here, will lead to substantial shortage, outdate, and cost reductions of these time-stamped platelets. The experimental application of this model produced shortages in the range of apporximately 4.7% with outdates at 5.5%, a vast improvement over existing methods. An ADP approach was found to be practical during this research, and additionally the model showed much promise with respect to enhancing a reward system that simultaneously decreases shortages and the number of expired platelets.

Hide Abstract

Best Selection of Mobility Model for MANET Using NS-2

Saad Aljebori1 and Alaa Taima2

View:    Abstract |  HTML Full Text |  PDF |  XML|

A mobile ad hoc network (MANET) is an autonomous, self-configuring network of mobile nodes that can be formed without the need of any pre-established infrastructure or centralized administration. MANETs are extremely flexible and each node is free to move independently, in any random direction. Each node in MANET maintains continuously the information required to properly route traffic. This paper presents the mathematical model to select the best mobility model for any MANET using Network Simulator version 2 (NS-2) with respect to four performance metrics (Throughput, Packet Delivery Fraction (PDF), Average End-to-end Delay(AED), and Normalize Routing Load (NRL)) for different scenarios such as different number of nodes, different speeds, different pause times, different environment area and different traffic rates. The weights of these performance metrics are assigned according to user need. We use Ad-hoc On-demand Distance Vector (AODV) as routing protocol and four mobility models (Random Waypoint(RWP), Reference Point Group Model (RPGM), Gauss Markov Model (GMM), Manhattan Grid Model (MGM)). The results indicate that this model is efficient and flexible to select the best mobility model because the weights of performance metrics are determined according to user’s need.

Hide Abstract

Methods and Techniques for the Intrusion Finding in MANET

Mukhtar Ahmad, Faheem Khan, Sohaib Ahmad, Shazia Naeem, M.N.Khalid and Shehzad Rizwan

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper, we are showing two Intrusion Detection Techniques for MANET as we know that Data accessibility in a MANETs is influenced by Mobility and Power constrain of the Servers and Clients, and the data in MANETSs be replicated. In this paper we exercise two methods for transferring of Communication among the Nodes. The first method is planned for finding of malevolent Nodes in a Neighborhood of Nodes in which each pair of Nodes in the Neighborhood are contained by the Radio range within Each other.. The next method is to planned for the exposure of malevolent Nodes in a Neighborhood of Nodes, where every pair of Nodes will not be in the Radio range of one another but a Node among them having all the other Nodes in its one count range or one-hop vicinity. In this paper we exercise Intrusion Detection System(IDS) for finding Malevolent Node and the two method known as Clique and Cluster as shown in[8]. To Summarize, it can be seen from ADCLI Algorithm indeed Detects the Malevolent Nodes effectively with a towering proportion of accurateness when at most k malevolent Nodes are present in a set of n (n ³ 4k + 1) Nodes, Even when there is a practical proportion of Packet collision (Message destruction). Moreover, standard false Detection is also minimum in such a situation. on the other hand for the situations where more than k malevolent Nodes are present, the result might be volatile. The proof of accuracy show that the Algorithm functions properly at all times for a consistent channel. In situation of the ADCLU Algorithm, Algorithm functions well Even in an unpredictable channel where the proportion of collision is around 5 %. The two methods known as Clique and Cluster as shown in [8].In these methods a Node call the Monitor Node commences the discovering procedure. Depend on the Communications, which is accepted through the Detection course of action, every Node decides the Nodes it believes to be malevolent and drive a Message to the Monitor Node. The Monitor Node ahead examining the Message to decide the malevolent Nodes among the Suspected Nodes. In this paper, we are showing two Intrusion Detection Techniques for MANET.The first method is planned for finding of malevolent Nodes in a Neighborhood of Nodes zzzzin which each pair of Nodes in the Neighborhood are contained by the Radio range within Each other. This kind of Nodes in the Neighborhood is called a Clique8 . The next method is to planned for the exposure of malevolent Nodes in a Neighborhood of Nodes, where every pair of Nodes will not be in the Radio range of one another but a Node among them having all the other Nodes in its one count range or one-hop vicinity. Such Neighborhood is alike to a Cluster as shown in8. The above two methods exercise Communication transferring among the Nodes. A Node call the Monitor Node commences the discovering procedure. Depend on the Communications, which is accepted through the Detection course of action, every Node decides the Nodes it believes to be malevolent and drive a Message to the Monitor Node. The Monitor Node ahead examining the Message to decide the malevolent Nodes among the Suspected Nodes.

Hide Abstract

A Paper in Mobile Ad-Hoc Networks About Maintaining its Survivability

Sohaib Ahmad, Faheem Khan, Mukhtar Ahmad , Shazia Naeem, M.N .Khalid and Asia Begum

View:    Abstract |  HTML Full Text |  PDF |  XML|

In general, Security techniques pursue two defense lines: one preventive and the second
one is reactive6. The first one offers techniques to circumvent any type of Attack, as firewalls and
cryptographic systems. The second consists in getting act on demand to lessen Intrusions, as
Intrusion Detection systems. This paper observes Survivable approaches whose purpose is to
facilitate network s to complete their functions properly and significantly even In the presence of
Intrusions. preventive, reactive techniques and Tolerance defense lines. This paper established
Survivability concepts and its association with preventive, reactive and Tolerance defense lines.
Survivable MANETs will be capable to accomplish their purposes and aims by means of the
cooperation between those three defense lines. Key Properties of Survivability as resistance,
acknowledgment, recovery and adaptability were thorough, and Survivability needs for MANETs
were examined. In conclusion, this function highlights that a completely Survivable MANET be
supposed to be appropriate cooperatively the three defense lines as an alternative of only one or
two lines separately.

Hide Abstract

Cloud Computing: Risks and Security Issues

Sucheta Arora

View:    Abstract |  HTML Full Text |  PDF |  XML|

Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription- based or pay per use service that, in real time over the internet, extends IT’s existing capabilities. In this article we try to cover the issues that a company needs to consider when evaluating a cloud service and also identifies some issues and risks involved in controlling cloud computing services and provides recommendations on their appropriate use. We have also discussed about the predictions and future of cloud computing.

Hide Abstract

Secure Dynamic Data Aggregation Routing Protocol for Wireless Sensor Networks

Bhawana Mathur

View:    Abstract |  HTML Full Text |  PDF |  XML|

Routing in sensor networks is complicated due to several issues ranging from security to energy constraints of wireless sensor nodes. This distinguishes them from contemporary wireless ad hoc networks. Adversaries can launch DoS attacks by injecting false data reports via compromised nodes. Previously a Hill Climbing key dissemination filtering scheme was developed where each node disseminates its key to forwarding nodes and later transmits reports along with the key. The forwarding nodes validate the credibility of the reports based on the key obtained earlier. This approach assures stronger filtering capacity for nodes closer to data sources and achieves secure and reliable transmissions. Sensor nodes process capability, bandwidth and battery capacity is still scarce. It is necessary to save resources of sensor nodes with the purpose of prolonging network lifetime. In that regard we propose to use a dynamic data aggregation routing protocol, named DABDR along with the earlier filtering scheme for secure and dynamic transmissions in Wireless Sensor Networks.

Hide Abstract

SSL Based Transport Layer Security

J.Vijayabharathi

View:    Abstract |  HTML Full Text |  PDF |  XML|

The last couple of years has seen a growing momentum towards using the Internet for conducting business. One of the key enablers for business applications is the ability to setup secure channels across the internet. The Secure Sockets Layer (SSL) protocol provides this capability and it is the most widely used transport layer security protocol. In this paper we investigate the performance of SSL both from a latency as well as a throughput point of view. Since SSL is primarily used to secure web transactions, we use the SPECWeb96 benchmark suitably modified for use with the SSL protocol. We benchmark two of the more popular web servers that are in use today and find that they are a couple of orders of magnitude slower when it comes to serving secure web pages. We investigate the reason for this deficiency by instrument the SSL protocol stack with a detailed profiling of the protocol processing components. Based on our findings we suggest two modifications to the protocol that reduce the latency as well as increase the throughput at the server.

Hide Abstract

Intelligent Fuzzy Analytic Hierarchy Processing Decision Support System – An Aid in Expert Analysis of Shoulder and Neck Pain Occupational Risk Factors

T. Padma and S. P. Shantharajah

View:    Abstract |  HTML Full Text |  PDF |  XML|

This research develops a fuzzy decision support system (FDSS) to evaluate and prioritize the relative importance of the imprecise, uncertain and vague nature of risk factors causing shoulder and neck pain (SNP), an important musculoskeletal disorder and most ubiquitous pain complaint in an occupational environment. The objective involves derivation of mechanical-, physicaland psychosocial-related risk categories using knowledge acquisition implemented by identifying the risk factors through literature analysis, conventional and concept mapping interviews with expert neurologist, orthopaedict, psychologist and physiotherapist. Fuzzy analytic hierarchy process (FAHP) is applied as an evaluation tool to measure the significance of the risk factors. The results indicate that the proposed system supplements SNP diagnosis experts with more precise key decision support information.

Hide Abstract

Service Oriented Architecture Integration

Suresh Krishnaraju1 and K. Subramani2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Organizations across many industries have moved or in the process of moving towards a service-oriented IT architecture. This article explores the challenges and impacts that organizations are facing in the process of adopting service oriented architecture with Web services. While some adoption issues are relevant for any organization, others depend on the industry and type of organization. The results of multiple case studies suggest that differences in the business environment need to be considered in the decision of when and how to move to a service

Hide Abstract

Impact of Information Technology in Various Sectors

A. Sreeram1, Y. Srinivas2, G. Ananda Rao3, S.R. Karumuri4, J. Vijayasekhar5 and R. Sampath Kumar2

View:    Abstract |  HTML Full Text |  PDF |  XML|

IT has brought in several technological developments in every field .IT plays a major role in simplifying various organizational processes. IT has accelerated several business organizations all over the world, helped several businesses realize organizational goals and automate processes by following the principles of usability, efficiency, customer related and a clear communication. Most business enterprises rely on the power of information technology for carrying out their daily tasks conveniently and faster. IT makes complex procedures easier, faster and also helps a lot in avoiding redundancy. It lets individuals access necessary data, ensuring the safety of confidential ones. Information Technology has made every individual completely dependent for even the simplest day to day task.

Hide Abstract

Double-Reflecting Data Perturbation Method for Information Security

Maram Balajee1 and Challa Narasimham2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Information Security plays a vital role in data Communication through LAN, WAN, Internet etc. Cryptography is one of the best tools for Information Security. Cryptography is made up of two different tools that are Encryption and Decryption. Encryption is the method to hide the original data in Data Communication. While Data Communication, the data is masked using codes/shuffling. Here the purpose is to ensure privacy by keeping the information hidden/encoded to which it is not intended. When data reached destination, the encrypted data will be decrypted using some mathematical functions or decoding techniques is called Decryption. The processes are done using mathematical login, or algorithms. This paper proposes new methods for encryption and decryption by using some mathematical methods and number sequences.

Hide Abstract

Batch Installer Inoculation for Digital Repository Software Open Source Dspace

Bharat M. Chaudhari

View:    Abstract |  HTML Full Text |  PDF |  XML|

This technical writing describes the batch process injection for installing Dspace 1.8.2 version on MS-Window operating system XP-VISTA-7.The public complier of process which has been made for DSpace-1.8.2.exe, Apache Ant 1.8.3.exe, Apache Tomcat (Dspace) _1.7.28 .exe while postgresql-9.1.3-1-windows.exe and jdk-6u31-windows-i586.exe remained no changes. The limiting factor to adopt Dspace has ever been the difficulty in Installing DSpace. And as we know that installation and configuration of the prerequisites that are usually time consuming and difficult with any operating system Linux, MAC or Window.

Hide Abstract

A Review on Role of Information Technology in Business Management

A.Sreeram1,D.R.P. Chandra Sekhar1, S R Karumuri2,Y. Srinivas3 and J.Vijayasekhar4

View:    Abstract |  HTML Full Text |  PDF |  XML|

Information technology plays a vital role in day-to-day activities right from small business to large business. Whether you need computers for storage, transfer, retrieval or transmission of information, you can manage your business with greater accuracy and efficiency with the assistance of information technology and computer applications. As an example considers the internet, it provides us with all latest happenings around the globe. Railways and Airways are connected with Information Technology. If we want to travel we can book tickets online, reserve rooms, etc. Since IT has become an essential part irrespective of the field i.e., education, or entertainment, or business. Buying and selling has become quite easy now. Online shopping through credit cards and debit cards has made purchasing effortless. Moreover you can do shopping anytime as there is no time constraint; they are open round the clock. Banking is another area which has been automated like managing accounts, transferring of cash, depositing, withdrawing, etc. Implementing IT in an effective manner would decrease the cost; cost which is expected at the time of failure. Also increases the flexibility.

Hide Abstract

Review on Financial Forecasting Using Neural Network and Data Mining Technique

Mehzabin Shaikh and Gyankamal J. Chhajed

View:    Abstract |  HTML Full Text |  PDF |  XML|

The rise of economic globalization and evolution of information technology, financial data are being generated and accumulated at an extraordinary speed. As a result, there has been a critical need for automated approaches to effective and efficient utilization of massive amount of financial data to support companies and individuals in strategic planning and investment decisionmaking. The competitive advantages achieved by data mining include increased revenue, reduced cost, and much improved marketplace responsiveness and awareness. There has been a large body of research and practice focusing on exploring data mining techniques to solve financial problems. This paper describes data mining in the context of financial application from both technical and application perspective by comparing different data mining techniques.

Hide Abstract

An UML Based Design of E-Learning System Using Digital Certificate

Ambalika Ghosh and Sunil Karforma*

View:    Abstract |  HTML Full Text |  PDF |  XML|

E-Learning System involves an open participation of learner, teacher & administrator among different region in the world. Due to use of internet as electronic communication media there are several types of risks & threats such as - alternation of course material, change or deletion of important information like fees, assignments; marks etc. may hamper the electronic E-Learning environment in different ways. Security of information in a learning system electronically requires some technique for confidentiality, identification, authentication and non-repudiation of the user. Digital Certificate, using cryptographic technique implements above four elements of security needed for E-learning. In this paper we have discussed how digital certificate can be used for secure information processing like upload mark sheet in E-learning system. Here, we have wrapped Digital Certificate in an Object Oriented Model and applied it for authentication and verification of uploaded mark sheet by Faculty.

Hide Abstract

Feature Aware Prediction of User Action in Software Process

Seema Safi, Sajid Anwar and Lala Rukh

View:    Abstract |  HTML Full Text |  PDF |  XML|

A lot of Software Process Description Languages have been exercised and made. Some implement one paradigm, for example rule based languages (pre-/post conditions), net based languages (petri nets, state machines), or imperative languages (based on programming languages). Others implement multiple paradigms .all of them are not very efficient, reliable and robust and the approach we use, observes the user’s action and tries to predict his next step. For this we use approaches in the area of machine learning (sequence learning) and adopt these for the use in software processes. This paper describes an approach for user (e.g. SW architect) assisting in software processes. The sequence prediction technique, which is presented in this paper, is based on IPAM4 and Jacobs/Blockeel5. The results show that our approach predicts continuously better than the original algorithm. In this paper we described an approach to assist users by predicting the next step the user starts during process enactment. We evaluated this work by defining situations and we compared our approach with the core algorithm we have adopted.

Hide Abstract

New Developed Traffic Generator for NS-2

Saad Talib Hasson1 and Mohammad H. Husain2

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper, a new version of the traffic generator script “cbrgen.tcl” to the Network Simulator (NS-2) was developed and applied in many simulation experiments. The main objective of this paper was to study the impacts of varying the transmitted (sent) data rate for the CBR and TCP traffic under varying number of nodes. The performance of MANETs traffic pattern was evaluated with respect to the quantitative metrics such as PDF, packet loss, throughput, end to end delay and NRL. As a result of this study with the comparative performance between the different data rates of CBR and TCP traffic over varying number of nodes shows a better performance in smaller rates.

Hide Abstract

Using Artificial Bee Colony Algorithm for MLP Training on Software Defect Prediction

Solmaz Farshidpour1 and Farshid Keynia2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Defects in software systems continue to be a major problem. Defect prediction is an important topic in software quality research and could help on planning, controlling and executing software development activities. Nowadays, computer scientists have shown the interest in the study of social insect’s behaviour in neural networks area for solving different prediction problems.Chief among these is the Artificial Bee Colony (ABC) algorithm. This paper investigates the use of ABC algorithm that simulates the intelligent foraging behaviour of a honey bee swarm. Multilayer Perceptron (MLP) trained with the standard back propagation algorithm normally utilises computationally intensive training algorithms. One of the crucial problems with the backpropagation (BP) algorithm is that it can sometimes yield the networks with suboptimal weights because of the presence of many local optima in the solution space. To overcome ABC algorithm used in this work to train MLP learning the complex behaviour of software defect prediction data trained by BP, the performance of MLP-ABC is benchmarked against MLP training with the standard BP. The experimental result shows that MLP-ABC performance is better than MLP-BP.

Hide Abstract

Requirement for Computer Support and its Protocols for AVT

Asia Begum, Faheem Khan,Parveen Mehboob,Muhammad Shoaib and Lala Rukh

View:    Abstract |  HTML Full Text |  PDF |  XML|

Despite many works on collaborative networked organizations (CNOs), CSCW, groupware, workflow systems and social networks, computer support for virtual teams is still insufficient, especially support for agility, i.e. the capability of virtual team members to rapidly and cost efficiently adapt the way they interact to changes. In this paper, requirements for computer support for agile virtual teams are presented. Next, an extension of the concept of social protocol is proposed as a novel model supporting agile interactions within virtual teams. The extended concept of social protocol consists of an extended social network and a workflow model. In this paper modeling collaboration processes is presented in which mainly humans are involved. In this paper virtual team agility (VTA) are presented and successfully implemented and the concept of social protocol, combining social networks and workflow models, is proposed as a model. In this paper, the requirements of computer support for virtual team agility (VTA) are presented. Additionally, the concept of social protocol, combining social networks and workflow models, is proposed as a model supporting interactions within agile VT

Hide Abstract

Intelligent and Effective Diabetes Risk Prediction System Using Data Mining

Kawsar Ahmed1,Tasnubajesmin1, Ushin Fatima2,Md. Moniruzzaman2, Abdulla-L-Emran2 and Md. Zamilur Rahman1

View:    Abstract |  HTML Full Text |  PDF |  XML|

Diabetes is not only a disease but also responsible for occurring different kinds of diseases such as heart attack, kidney disease, blindness and renal failure. With respect to Bangladesh, Diabetes is a deadly, disabling and cost disease whose risk is increasing at alarming rate. The diagnosis of diabetes is a vital and tedious task. The detection of diabetes from some important risk factors is a multi-layered problem. Initially 400 diabetes and non-diabetes patients’ data is collected from different diagnostic centre and data is pre-processed. After pre-processing data is clustered using K-means clustering algorithm for identifying relevant and non-relevant data to diabetes. Next significant frequent patterns are discovered using AprioriTid shown in Table 1 and Decision Tree algorithm shown in Table 2. Finally implement a system to predict diabetes which is easier, cost reducible and time saveable.

Hide Abstract

Queuing Approach to Estimate the MANET’s Optimal Number of Nodes

Saad Talib Hasson and Enass Fadil

View:    Abstract |  HTML Full Text |  PDF |  XML|

Mobile Ad-hoc Network (MANET) was defined as a set of mobile nodes that moved freely and connected among each other without any infrastructure or administrator control. Each node contains a kind of queuing system like buffer used it to serve the arriving packets that reached to the busy node. The packets reaches each node in certain sequence. The number of received (arriving packets) per unit time is called “ arrival rate”. The average rate or the average time between any two successive packets is called the inter- arrival time and follow certain statistical distributions. The node will serve the packets according to certain mechanism (discipline) like drop tail. The effects of the service mechanism on the behavior of the MANET was studied and tested. Many queuing theory parameters were used to study and analyze the behavior of the MANETs. A mathematical model was built and implemented to estimate the optimal number of nodes required to be deployed in each new designed MANETs environment.

Hide Abstract

A Genetic Algorithm Scheduling Approach for Virtual Machine Resources in Cloud Data Centers

Zohreh Royaee1 and Majid Mohammadi2

View:    Abstract |  HTML Full Text |  PDF |  XML|

Nowadays, power consumption of data centers has huge impacts on environments. Researchers are seeking to find effective solutions to make data centers reduce power consumption while keep the desired quality of service or service level objectives. Virtual Machine (VM) technology has been widely applied in data center environments due to its seminal features, including reliability, flexibility, and the ease of management. We present genetic algorithm scheduling approach to reduce data center power consumption, while guarantee the performance from users’ perspective . We use live migration and switching idle nodes to the sleep mode allow Cloud providers to optimize resource usage and reduce energy consumption.We have validated our approach by conducting a performance evaluation study using the CloudSim toolkit. The experimental results show that the proposed algorithm achieves reduced energy consumption in data centers.

Hide Abstract

An Alternate Approach to Compute the Reliability of A Network With Imperfect Nodes Using Binary Decision Diagrams

Manoj Singhal

View:    Abstract |  HTML Full Text |  PDF |  XML|

In this paper i have adopted an efficient approach for calculating the reliability of the computer communication network with the help of binary decision diagram. The computer communication network has imperfect nodes and imperfect links. It means the nodes as well as the communication links may fail with known probability. The network is represented in the form of a directed graph. First i have found the reliability of the given network by applying the inclusionexclusion formula, which is an exact method to find the reliability of a network and then i have found the reliability of the given network with binary decision diagram. To find the reliability via binary decision diagram, we must order the nodes and the communication links of the given network by applying a proposed heuristic approach. I have found that the reliability obtained via binary decision diagram is equal to the reliability obtained by inclusion-exclusion formula. I have also shown that the generated binary decision diagram is of the minimum size.

Hide Abstract

Providing Security to Wireless Packet Networks by Using Optimized Security Method

N. Paparayudu, G. Suresh Kumar and J. Srikanth

View:    Abstract |  HTML Full Text |  PDF |  XML|

Now-a-days technology is growing very fast, due to rapid development of the technology in computer arena, communication through network become a habit to the users. Communication through network is happen using two channels i.e., by connection oriented and connection less. At present users prefer wireless networks for communication and transferring data due to its flexibility. So in this paper we are focusing on wireless networking, as it is not reliable we are proposing an optimized security technique to provide security to the communication on wireless. In this paper we mainly focus on packet scheduling which plays the vital role in the transmission of data over wireless networks. We are using optimized security technique to secure the packets at initial level itself while scheduling the packets.

Hide Abstract

Virtual Reality Helps Rheumatoid Arthritis Patients

Wadee Alhalabi

View:    Abstract |  HTML Full Text |  PDF |  XML|

This paper concerns computer applications in medicine that exploit the potentially powerful interconnection between psychology (the mind) and physiology (the body). An important class of applications involve patients who suffer chronic pain caused by rheumatoid arthritis (RA); these patients look for any kind of therapeutic technique to use in addition to traditional medicine in order to alleviate pain, reduce physical disabilities caused by the disease or delay disease progress and improve their lifestyle. This paper focuses on a particular class of therapeutic techniques that provide imagery therapy using virtual reality in the treatment of rheumatoid arthritis. The paper presents a short review of virtual reality (VR) equipment and their use to provide immersive experiences. Furthermore, we describe imagery therapy (IT) involving guided imagery and illustrate its effects. We particularly describe the application of VR and IT in the treatment of rheumatoid arthritis. A brief introduction to our system and the research we have done in this field is presented, showing some preliminary results that support our hypothesis.

Hide Abstract

A Secure and Robust Prototype for Electronic Voting System

Ashraf Darwishmagidalgendy and Eman Mohamed

View:    Abstract |  HTML Full Text |  PDF |  XML|

Electronic voting (EV) refers to the use of computers or computerized voting equipments to cast ballots in an election EV has been in development for more than 20 years, during which it has produced outstanding results both in theory and in practice. This paper presents a new secure preferential e-voting scheme. In this paper we will present an e-voting scheme that covers most of the e-voting requirements were implemented to guarantee voter’s privacy and authentication. A prototype implementation of EV protocol over the Internet which fulfils some electronic voting system requirements such as efficiency, transparency and mobility has been presented.

Hide Abstract

Using Conceptual Analysis in Java Environment for the X-Ray View on a Class

Zaheer Aslam, Mohammad Kamran Khan, Shahzad Rizwan, Fawad Ali Khan, Zahid Haroon and Noor Zaman

View:    Abstract |  HTML Full Text |  PDF |  XML|

Modularity is one of the very vital Methods in Software Engineering and a requirement for every reliable Software. As the design space of Software is normally pretty large, it is important to offer automatic way to assist modularizing it. An automatic way for Software Modularization is Object Oriented Concept Analysis (OOCA). X-Ray view of the Class is one of the features of this Object Oriented Concept Analysis. We will utilize this design in a Java Environment.

Hide Abstract

A Framework for Managing Verb Phrase Effective and Easy English-Hindi Machine Translation

Vivek Dubey and H.R. Sharma

View:    Abstract |  HTML Full Text |  PDF |  XML|

Automatic Machine Translations from one to another language have been the subject of great attention of computational linguistics for many years. In English- Hindi Machine Translation, verb tuning is a vital operation. Present paper is an approach to describe easy English-Hindi verb phrase mapping. This work results satisfactory in Machine Translation over type of English sentences. It is observed that carefully analysis of tense, mood and aspect of English sentences leads to proper translation in Hindi through the efficient use of verb phrase mapping.

Hide Abstract

An Intelligent Prototype for the Characterization of Myocardial Infarction Blood And Analysis on the Efficacy of Streptokinase Using Spectral Data

S. Djodilatchoumy

View:    Abstract |  HTML Full Text |  PDF |  XML|

Myocardial Infarction (MI) or Acute Myocardial Infarction (AMI), commonly known as a heart attack, is the interruption of blood supply to part of the heart, causing heart cells to die. This is most commonly due to occlusion (blockage) of a coronary artery following the rupture of a vulnerable atherosclerotic plaque, which is an unstable collection of lipids and white blood cells in the wall of an artery. The resulting ischemia and oxygen shortage if left untreated for a sufficient period of time can cause damage or death (infarction) of heart muscle tissue (myocardium). Streptokinase (SK), a protein secreted by several species of streptococci can bind and activate human plasminogen. SK is used as an effective and inexpensive clot-dissolving medication in some cases of MI (heart attack) and pulmonary embolism. Though investigations on characterisation of MI blood and analysis on the efficacy of the drug Streptokinase have been done by many, not much work is done on automation of this investigation. The goal of this study is to train the prototype (Neural Network [NN]) to identify whether the given blood sample is MI blood or not and also to examine prospectively the effect of Streptokinase in MI patients using the prototype which is already trained to identify the MI blood.

Hide Abstract

Analysis of Imaging Artifacts in MR Brain Images

K. Somasundaram and P. Kalavathi

View:    Abstract |  HTML Full Text |  PDF |  XML|

MRI brain images are widely used in medical applications for research, diagnosis, treatment, surgical planning and image guided surgeries. These MR brain images are often corrupted with various imaging artifacts and may affect the performance of brain image processing techniques. In this paper, we listed and identified the causes of the common imaging artifacts in MR brain images.

Hide Abstract