Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1 Yiming WU, Siyong CAI Agronomic Disaster Management using Artificial Intelligence - A Case... more
An Adaptive and Real-Time Fraud Detection Algorithm in Online Transactions....................................1
Yiming WU, Siyong CAI
Agronomic Disaster Management using Artificial Intelligence - A Case Study.....................................13
M Sudha
Household Power Optimisation and Monitoring System ...................................................................23
John Batani, Silence Dzambo, Israel Magodi
Research Interests:
Development and Exploitation of Software Complex of Virtual Community Life Cycle Organization ....1 Olha Trach and Solomia Fedushko Systematic Review of Persuasive Health Technology Design and Evaluation Models..........................12... more
Development and Exploitation of Software Complex of Virtual Community Life Cycle Organization ....1
Olha Trach and Solomia Fedushko
Systematic Review of Persuasive Health Technology Design and Evaluation Models..........................12
Kasali Funmilayo, Kuyoro Afolashade and Awodele Oludele
Designing Condition-based Maintenance Management Systems for High-Speed Fleet .......................28
Gopalakrishna Palem
Research Interests:
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1 Abhilash Namdev and B.K. Tripathy Significance of Embedded Systems to... more
Scalable Rough C-Means clustering using Firefly algorithm..................................................................1
Abhilash Namdev and B.K. Tripathy
Significance of Embedded Systems to IoT................................................................................................. 15
P. R. S. M. Lakshmi, P. Lakshmi Narayanamma and K. Santhi Sri
Cognitive Abilities, Information Literacy Knowledge and Retrieval Skills of Undergraduates: A
Comparison of Public and Private Universities in Nigeria ........................................................................ 24
Janet O. Adekannbi and Testimony Morenike Oluwayinka
Risk Assessment in Constructing Horseshoe Vault Tunnels using Fuzzy Technique................................ 48
Erfan Shafaghat and Mostafa Yousefi Rad
Evaluating the Adoption of Deductive Database Technology in Augmenting Criminal Intelligence in
Zimbabwe: Case of Zimbabwe Republic Police......................................................................................... 68
Mahlangu Gilbert, Furusa Samuel Simbarashe, Chikonye Musafare and Mugoniwa Beauty
Analysis of Petrol Pumps Reachability in Anand District of Gujarat ....................................................... 77
Nidhi Arora
Research Interests:
Various Common Control Channel Assignment Schemes in CRNs: A Survey .........................................1 Jagsir Singh, Inderdeep Kaur Aulakh and Roopali Garg Framework for Threat Modelling for a Power Utility: Case of Zimbabwe Power... more
Various Common Control Channel Assignment Schemes in CRNs: A Survey .........................................1
Jagsir Singh, Inderdeep Kaur Aulakh and Roopali Garg
Framework for Threat Modelling for a Power Utility: Case of Zimbabwe Power Utility Company.......... 8
Samuel Musungwini, Gilbert Mahlangu, Beauty Mugoniwa, and Samuel Simbarashe Furusa
Enhanced-bandwidth Compact Printed Inverted F Antenna Suitable for LTE/GSM Mobile Phone ....... 24
S. Jesse Jackson and T. Thomas
Implementation of e-Government Services using Java Technologies: A Methodological Guide in
Improving an e-Police Management System in Zimbabwe ...................................................................... 32
Mahlangu Gilbert, Chikonye Musafare, Furusa Samuel Simbarashe and Mugoniwa Beauty
Onto Tagger: Ontology Focused Image Tagging System Incorporating Semantic Deviation Computing
and Strategic Set Expansion ...................................................................................................................... 44
Gerard Deepak and Sheeba Priyadarshini J
Research Interests:
Design of Industrial Robot Sorting System Based on A * Search Algorithm...........................................1 Wang Hongmei, Zhao Xueliang and Du Haitao Zhang Lanhua Digitizing Traditional Filmmaking Process for Education and... more
Design of Industrial Robot Sorting System Based on A * Search Algorithm...........................................1
Wang Hongmei, Zhao Xueliang and Du Haitao Zhang Lanhua
Digitizing Traditional Filmmaking Process for Education and Industry.................................................... 14
Zeeshan Jawed and Dr Nandita Sengupta
The Socio-Economic Impact of Identity Thefts and Cybercrime: Preventive Measures and Solutions . 32
Dr. Nabie Y. Conteh and Quinnesha N. Staton
Research Interests:
Synthetic Vision Systems – Terrain Database, Symbology and Display Requirements...........................1 Srikanth K P and Dr Abhay A Pashilkar A Conjoint Analysis of Customer Preferences for VoIP Service in... more
Synthetic Vision Systems – Terrain Database, Symbology and Display Requirements...........................1
Srikanth K P and Dr Abhay A Pashilkar
A Conjoint Analysis of Customer Preferences for VoIP Service in Pakistan............................................. 22
Amir Manzoor
Research Interests:
Impact of Human Capital Development on the Managerial Workforce of SMEs in Sabah, Malaysia ......1 Noraini Abdullah and Nurul Fatihah Rosli A Survey of Mobile Cloud Computing: Advantages, Challenges and... more
Impact of Human Capital Development on the Managerial Workforce of SMEs in Sabah, Malaysia ......1
Noraini Abdullah and Nurul Fatihah Rosli
A Survey of Mobile Cloud Computing: Advantages, Challenges and Approaches................................14
Mohammad Rasoul Momeni
An Efficient Authentication Protocol for Mobile Cloud Environments using ECC.................................29
Mohammad Rasoul Momeni
Research Interests:
A Hybrid Algorithm for Improvement of XML Documents Clustering ...................................................1 Somayeh Ghazanfari and Hassan Naderi A Novel Collaborative Filtering Friendship Recommendation Based on Smartphones... more
A Hybrid Algorithm for Improvement of XML Documents Clustering ...................................................1
Somayeh Ghazanfari and Hassan Naderi
A Novel Collaborative Filtering Friendship Recommendation Based on Smartphones ......................... 16
Dhananjaya G. M., Sachin C. Raykar and Mushtaq Ahmed D. M
Efficient Computational Tools for Nonlinear Flight Dynamic Analysis in the Full Envelope .................. 26
P. Lathasree and Abhay A. Pashilkar
Quantitative Aspects of Knowledge Knowledge Potential and Utility..................................................... 45
Syed V. Ahamed
A Novel Approach for Recommending Items based on Association Rule Mining ................................... 60
Vasundhara M. S.and Gururaj K. S.
Cluster Integrated Self Forming Wireless Sensor Based System for Intrusion Detection and Perimeter
Defense Applications ................................................................................................................................. 70
A. Inigo Mathew, M. Raj Kumar, S. R. Boselin Prabhu and Dr. S. Sophia
Research Interests:
Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1 Ei Ei Khin and Thandar Phyu Adaptive Search Information Technology in the University Library... more
Enhancing AODV Routing Protocol to Eliminate Black Hole Attack in MANET.......................................1
Ei Ei Khin and Thandar Phyu
Adaptive Search Information Technology in the University Library ........................................................ 15
Andriy Andrukhiv and Dmytro Tarasov
Educational Data Mining: Performance Evaluation of Decision Tree and Clustering Techniques Using
WEKA Platform........................................................................................................................................... 26
Ritika Saxena
Hamiltonian cycle in graphs 𝝈4 ≥ 𝟐n....................................................................................................... 38
Nguyen Huu Xuan Truong and Vu Dinh Hoa
Research Interests:
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1 Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman Layered Defense Approach: Towards Total Network... more
Determination of the Account Personal Data Adequacy of Web Community Member .............................. 1
Solomia Fedushko, Yuriy Syerov, Andriy Peleschyshyn and Korzh Roman
Layered Defense Approach: Towards Total Network Security............................................................13
Kalaivani Chellappan, Ahmed Shamil Mustafa, Mohammed Jabbar Mohammed and Aqeel Mezher
Thajeel
Millennials: Entitled Networking Business Leaders............................................................................23
Dr. Caroline Akhras
Modeling of Citizen Claims Processing by Means of Queuing System ................................................36
Oleksandr Markovets and Andriy Peleschychyn
Suggestions for Informational Influence on a Virtual Community ......................................................47
R. V. Huminskyi, A. M. Peleshchyshyn and Z. Holub
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission ...............66
Uchenna P. Daniel Ani and Mohammed Mustapha
Research Interests:
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1 S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew Dual Hybrid Algorithm for Job Shop Scheduling Problem... more
A Review of Efficient Information Delivery and Clustering for Drip Irrigation Management using WSN.1
S. R. Boselin Prabhu, Dr. S. Sophia and A. Inigo Mathew
Dual Hybrid Algorithm for Job Shop Scheduling Problem ........................................................................ 14
Do Tuan Hanh, Vu Dinh Hoa and Nguyen Huu Mui
CThe Comparative Analysis of Power Optimization in Clustered Sleep Transistors................................ 25
M. Divya Sree, Y. Kranthi Kiran and Vijaya Vardhan Kancharla
Cyber Crimes Incidents in Financial Institutions of Tanzania ................................................................... 37
Edison Wazoel Lubua (PhD)
Research Interests:
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an Apparel Production Plant of Sri Lanka.................................................................................................1 Z. A. M.... more
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka.................................................................................................1
Z. A. M. S. Juman and W. B. Daundasekara
Analysis of BT and SMS based Mobile Malware Propagation ................................................................. 16
Prof. R. S. Sonar and Sonal Mohite
Behavioral Pattern of Internet Use among University Students of Pakistan........................................... 25
Amir Manzoor
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ...............................................................................................................................74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Ganesh R. Pathak, Suhas H. Patil and Jyoti S. Tryambake
Research Interests:
Symmetric Image Encryption Algorithm Using 3D Rossler System........................................................1 Vishnu G. Kamat and Madhu Sharma Node Monitoring with Fellowship Model against Black Hole Attacks in... more
Symmetric Image Encryption Algorithm Using 3D Rossler System........................................................1
Vishnu G. Kamat and Madhu Sharma
Node Monitoring with Fellowship Model against Black Hole Attacks in MANET.................................... 14
Rutuja Shah, M.Tech (I.T.-Networking), Lakshmi Rani, M.Tech (I.T.-Networking) and S. Sumathy, AP [SG]
Load Balancing using Peers in an E-Learning Environment ...................................................................... 22
Maria Dominic and Sagayaraj Francis
E-Transparency and Information Sharing in the Public Sector ................................................................ 30
Edison Lubua (PhD)
A Survey of Frequent Subgraphs and Subtree Mining Methods ............................................................. 39
Hamed Dinari and Hassan Naderi
A Model for Implementation of IT Service Management in Zimbabwean State Universities ................ 58
Munyaradzi Zhou, Caroline Ruvinga, Samuel Musungwini and Tinashe Gwendolyn Zhou
Present a Way to Find Frequent Tree Patterns using Inverted Index ..................................................... 66
Saeid Tajedi and Hasan Naderi
An Approach for Customer Satisfaction: Evaluation and Validation ....................................................... 79
Amina El Kebbaj and A. Namir
Spam Detection in Twitter – A Review...................................................................................................... 92
C. Divya Gowri and Professor V. Mohanraj
Research Interests:
A Novel Facial Recognition Method using Discrete Wavelet Transform Multiresolution Pyramid..........1 G. Preethi Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing Concepts ................. 9 Sheetalrani R.... more
A Novel Facial Recognition Method using Discrete Wavelet Transform Multiresolution Pyramid..........1
G. Preethi
Enhancing Energy Efficiency in WSN using Energy Potential and Energy Balancing Concepts ................. 9
Sheetalrani R. Kawale
DNS: Dynamic Network Selection Scheme for Vertical Handover in Heterogeneous Wireless Networks
.................................................................................................................................................................... 19
M. Deva Priya, D. Prithviraj and Dr. M. L Valarmathi
Implementation of Image based Flower Classification System................................................................ 35
Tanvi Kulkarni and Nilesh. J. Uke
A Survey on Knowledge Analytics of Text from Social Media .................................................................. 45
Dr. J. Akilandeswari and K. Rajalakshm
Progression of String Matching Practices in Web Mining – A Survey ..................................................... 62
Kaladevi A. C. and Nivetha S. M.
Virtualizing the Inter Communication of Clouds ...............................................................................72
Subho Roy Chowdhury, Sambit Kumar Patel, Ankita Vinod Mandekar and G. Usha Devi
Tracing the Adversaries using Packet Marking and Packet Logging ....................................................... 86
A. Santhosh and Dr. J. Senthil Kumar
An Improved Energy Efficient Clustering Algorithm for Non Availability of Spectrum in Cognitive Radio
Users ....................................................................................................................................................... 101
Research Interests:
Improving Ranking Web Documents using User’s Feedbacks...............................................................1 Fatemeh Ehsanifar and Hasan Naderi A Survey on Sparse Representation based Image Restoration... more
Improving Ranking Web Documents using User’s Feedbacks...............................................................1
Fatemeh Ehsanifar and Hasan Naderi
A Survey on Sparse Representation based Image Restoration ............................................................... 11
Dr. S. Sakthivel and M. Parameswari
Simultaneous Use of CPU and GPU to Real Time Inverted Index Updating in Microblogs
.................................................................................................................................................................... 25
Sajad Bolhasani and Hasan Naderi
A Survey on Prioritization Methodologies to Prioritize Non-Functional Requirements ........................ 32
Saranya. B., Subha. R and Dr. Palaniswami. S.
A Review on Various Visual Cryptography Schemes ................................................................................ 45
Nagesh Soradge and Prof. K. S. Thakare
Web Page Access Prediction based on an Integrated Approach ............................................................. 55
Phyu Thwe
A Survey on Bi-Clustering and its Applications ..................................................................................65
K. Sathish Kumar, M. Ramalingam and Dr. V. Thiagarasu
Pixel Level Image Fusion: A Neuro-Fuzzy Approach ................................................................................ 71
Swathy Nair, Bindu Elias and VPS Naidu
A Comparative Analysis on Visualization of Microarray Gene Expression Data...................................... 87
Poornima. S and Dr. J. Jeba Emilyn
Research Interests:
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1 Sridevi S., Rumeniya G. and Usha M. Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of... more
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Research Interests:
Cloud Architecture for Search Engine Application ...............................................................................1 A. L. Saranya and B. Senthil Murugan Efficient Numerical Integration and Table Lookup Techniques for Real... more
Cloud Architecture for Search Engine Application ...............................................................................1
A. L. Saranya and B. Senthil Murugan
Efficient Numerical Integration and Table Lookup Techniques for Real Time Flight Simulation.............. 8
P. Lathasree and Abhay A. Pashilkar
A Review of Literature on Cloud Brokerage Services................................................................................ 25
Dr. J. Akilandeswari and C. Sushanth
Improving Recommendation Quality with Enhanced Correlation Similarity in Modified Weighted Sum
.................................................................................................................................................................... 41
Khin Nila Win and Thiri Haymar Kyaw
Bounded Area Estimation of Internet Traffic Share Curve ...................................................................... 54
Dr. Sharad Gangele, Kapil Verma and Dr. Diwakar Shukla
Information Systems Projects for Sustainable Development and Social Change ................................... 68
James K. Ho and Isha Shah
Software Architectural Pattern to Improve the Performance and Reliability of a Business Application
using the Model View Controller .............................................................................................................. 83
G. Manjula and Dr. G. Mahadevan
Research Interests:
A Predictive Stock Data Analysis with SVM-PCA Model .......................................................................1 Divya Joseph and Vinai George Biju HOV-kNN: A New Algorithm to Nearest Neighbor Search in Dynamic... more
A Predictive Stock Data Analysis with SVM-PCA Model .......................................................................1
Divya Joseph and Vinai George Biju
HOV-kNN: A New Algorithm to Nearest Neighbor Search in Dynamic Space.......................................... 12
Mohammad Reza Abbasifard, Hassan Naderi and Mohadese Mirjalili
A Survey on Mobile Malware: A War without End................................................................................... 23
Sonal Mohite and Prof. R. S. Sonar
An Efficient Design Tool to Detect Inconsistencies in UML Design Models............................................. 36
Mythili Thirugnanam and Sumathy Subramaniam
An Integrated Procedure for Resolving Portfolio Optimization Problems using Data Envelopment
Analysis, Ant Colony Optimization and Gene Expression Programming ................................................. 45
Chih-Ming Hsu
Emerging Technologies: LTE vs. WiMAX ................................................................................................... 66
Mohammad Arifin Rahman Khan and Md. Sadiq Iqbal
Introducing E-Maintenance 2.0 ................................................................................................................. 80
Abdessamad Mouzoune and Saoudi Taibi
Detection of Clones in Digital Images........................................................................................................ 91
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
The Significance of Genetic Algorithms in Search, Evolution, Optimization and Hybridization: A Short
Review ...................................................................................................................................................... 103
Research Interests:
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1 S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi An Efficient Connection between Statistical Software and... more
An Integrated Distributed Clustering Algorithm for Large Scale WSN...................................................1
S. R. Boselin Prabhu, S. Sophia, S. Arthi and K. Vetriselvi
An Efficient Connection between Statistical Software and Database Management System ................... 1
Sunghae Jun
Pragmatic Approach to Component Based Software Metrics Based on Static Methods ......................... 1
S. Sagayaraj and M. Poovizhi
SDI System with Scalable Filtering of XML Documents for Mobile Clients ............................................... 1
Yi Yi Myint and Hninn Aye Thant
An Easy yet Effective Method for Detecting Spatial Domain LSB Steganography .................................... 1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
Minimizing the Time of Detection of Large (Probably) Prime Numbers ................................................... 1
Dragan Vidakovic, Dusko Parezanovic and Zoran Vucetic
Design of ATL Rules for TransformingUML 2 Sequence Diagrams into Petri Nets..................................... 1
Elkamel Merah, Nabil Messaoudi, Dalal Bardou and Allaoua Chaoui
Research Interests:
A Hybrid Approach for Supervised Twitter Sentiment Classification ....................................................1 K. Revathy and Dr. B. Sathiyabhama A Survey of Dynamic Duty Cycle Scheduling Scheme at Media Access Control Layer for... more
A Hybrid Approach for Supervised Twitter Sentiment Classification ....................................................1
K. Revathy and Dr. B. Sathiyabhama
A Survey of Dynamic Duty Cycle Scheduling Scheme at Media Access Control Layer for Energy
Conservation .....................................................................................................................................1
Prof. M. V. Nimbalkar and Sampada Khandare
A Survey on Privacy Preserving Data Mining Techniques ....................................................................1
A. K. Ilavarasi, B. Sathiyabhama and S. Poorani
An Ontology Based System for Predicting Disease using SWRL Rules ...................................................1
Mythili Thirugnanam, Tamizharasi Thirugnanam and R. Mangayarkarasi
Performance Evaluation of Web Services in C#, JAVA, and PHP ..........................................................1
Dr. S. Sagayaraj and M. Santhosh Kumar
Semi-Automated Polyhouse Cultivation Using LabVIEW......................................................................1
Prathiba Jonnala and Sivaji Satrasupalli
Performance of Biometric Palm Print Personal Identification Security System Using Ordinal Measures 1
V. K. Narendira Kumar and Dr. B. Srinivasan
MIMO System for Next Generation Wireless Communication..............................................................1
Sharif, Mohammad Emdadul Haq and Md. Arif Rana
Research Interests:
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining Techniques:A... more
An Efficient Classification Mechanism For Network Intrusion Detection System Based on Data Mining
Techniques:A Survey..........................................................................................................................1
Subaira A. S. and Anitha P.
Automated Biometric Verification: A Survey on Multimodal Biometrics ..............................................1
Rupali L. Telgad, Almas M. N. Siddiqui and Dr. Prapti D. Deshmukh
Design and Implementation of Intelligence Car Parking Systems ........................................................1
Ogunlere Samson, Maitanmi Olusola and Gregory Onwodi
Intrusion Detection Techniques for Mobile Ad Hoc and Wireless Sensor Networks..............................1
Rakesh Sharma, V. A. Athavale and Pinki Sharma
Performance Evaluation of Sentiment Mining Classifiers on Balanced and Imbalanced Dataset ...........1
G.Vinodhini and R M. Chandrasekaran
Demosaicing and Super-resolution for Color Filter Array via Residual Image Reconstruction and Sparse
Representation..................................................................................................................................1
Jie Yin, Guangling Sun and Xiaofei Zhou
Determining Weight of Known Evaluation Criteria in the Field of Mehr Housing using ANP Approach ..1
Saeed Safari, Mohammad Shojaee, Mohammad Tavakolian and Majid Assarian
Application of the Collaboration Facets of the Reference Model in Design Science Paradigm ...............1
Lukasz Ostrowski and Markus Helfert
Personalizing Education News Articles Using Interest Term and Category Based Recommender
Approaches .......................................................................................................................................1
Research Interests:
Implementation of Ear Biometrics as Emerging Technology in Human Identification System ...............1 B. Srinivasan and V. K. Narendira Kumar Determining the Security Enhancement of Biometrics in Internet Passport Scheme using... more
Implementation of Ear Biometrics as Emerging Technology in Human Identification System ...............1
B. Srinivasan and V. K. Narendira Kumar
Determining the Security Enhancement of Biometrics in Internet Passport Scheme using Cryptographic
Algorithms ........................................................................................................................................1
B. Srinivasan and V. K. Narendira Kumar
Novel Image Fusion Techniques using DCT .........................................................................................1
V. P. S. Naidu
High Performance Data mining by Genetic Neural Network ................................................................1
Dadmehr Rahbari
Parallel Ensemble Techniques for Data Mining Application .................................................................1
M. Govindarajan
A Hybrid Cryptosystem for Image using Chaotic Mapping ...................................................................1
Nidhi Sethi and Sandip Vijay
Investigating Factors Affecting Adoption and Implementation of m-Government in the South African
Department of Home Affairs: An on-going Research ..........................................................................1
Maleshoane Sepeame and Emmanuel Babatunde Ajala
Prospects of Thermal Management Techniques in Microprocessor Architecture .................................1
Ajaegbu Chigozirim, Shodiya A.S and Kuyoro Shade O.
Capacity Based Clustering Model for Dense Wireless Sensor Networks ...............................................1
S. R. Boselin Prabhu and S. Sophia
Research Interests:
Concurrency Control Mechanism for Nested Transactions in Mobile Environment ..............................1 Ms. Nyo Nyo Yee and Ms. Hninn Aye Thant Generating Keys in Elliptic Curve Cryptosystems... more
Concurrency Control Mechanism for Nested Transactions in Mobile Environment ..............................1
Ms. Nyo Nyo Yee and Ms. Hninn Aye Thant
Generating Keys in Elliptic Curve Cryptosystems ................................................................................1
Dragan Vidakovic and Dusko Parezanovic
Cost Estimation of Information Technology Risks and Instituting Appropriate Controls........................1
Princewill Aigbe and Jackson Akpojaro
An Efficient Access Control Model for Wireless Sensor Network..........................................................1
Behzad Molavi, Hamed Bashirpour and Dr. Morteza Nikooghadam
Three Tank System Control Using Neuro - Fuzzy Model Predictive Control ..........................................1
Adel Abdurahman
The Computer-Linguistic Analysis of Socio-Demographic Profile of Virtual Community Member ..........1
Yuriy Syerov, Andriy Peleschyshyn and Solomia Fedushko
Using Analytic Hierarchy Process (AHP) to Select and Rank a Strategy Based Technology .....................1
Majid Nili Ahmadabadi, Masoud Najafi, Peyman Gholami and Payam Gholami
Explore the Possibility of Moving the Government to the Web 2 in IRAN.............................................1
Alireza Shirvani, Ameneh Malmir and Fariba Azizzadeh
Research Interests:
Comparative Analysis of Job Scheduling for Grid Environment ............................................................1 Neeraj Pandey, Ashish Arya and Nitin Kumar Agrawal Hackers Portfolio and its Impact on Society... more
Comparative Analysis of Job Scheduling for Grid Environment ............................................................1
Neeraj Pandey, Ashish Arya and Nitin Kumar Agrawal
Hackers Portfolio and its Impact on Society ........................................................................................1
Dr. Adnan Omar and Terrance Sanchez, M.S.
Ontology Based Multi-Viewed Approach for Requirements Engineering ..............................................1
R. Subha and S. Palaniswami
Modified Colonial Competitive Algorithm: An Approach for Graph Coloring Problem ..........................1
Hojjat Emami and Parvaneh Hasanzadeh
Security and Privacy in E-Passport Scheme using Authentication Protocols and Multiple Biometrics
Technology ........................................................................................................................................1
V. K. Narendira Kumar and B. Srinivasan
Comparative Study of WLAN, WPAN, WiMAX Technologies ................................................................1
Prof. Mangesh M. Ghonge and Prof. Suraj G. Gupta
A New Method for Web Development using Search Engine Optimization ............................................1
Chutisant Kerdvibulvech and Kittidech Impaiboon
A New Design to Improve the Security Aspects of RSA Cryptosystem ..................................................1
Sushma Pradhan and Birendra Kumar Sharma
A Hybrid Model of Multimodal Approach for Multiple Biometrics Recognition ...................................1
P. Prabhusundhar, V.K. Narendira Kumar and B. Srinivasan
Research Interests:
Analytical Hierarchy Process Based Framework for Modelling Preferences and Priorities in Requirements....................................................................................................................................1... more
Analytical Hierarchy Process Based Framework for Modelling Preferences and Priorities in
Requirements....................................................................................................................................1
R.Subha and S.Palaniswami
Unstructured Data Integration through Automata-Driven Information Extraction ...............................1
Maroun Abi Assaf, Kablan Barbar, Youakim Badr and Mahmoud Rammal
Wireless Solution for Water Saving In Agriculture Using Embedded System.........................................1
Venkata Narayana Eluri, K. Madhusudhana Rao and A. Srinag
Upcoming Trends of Virtual Experiments for Laboratories...................................................................1
Bhaskar Y. Kathane, Pradeep B. Dahikar and Satish J. Sharma
Negotiation Based Resource Allocation for Distributed Environments.................................................1
Krishnamoorthy M. and Senthil Murugan B.
Wireless Solution for Water Saving In Agriculture Using Embedded System ........................................1
Venkata Narayana Eluri, K. Madhusudhana Rao and A. Srinag
Digital Image Tamper Detection Techniques - A Comprehensive Study ...............................................1
Minati Mishra and Flt. Lt. Dr. M. C. Adhikary
A Multi-parametric based W-PAC Mechanism in Ad Hoc Network using IPv6 and IPv4 Address............1
S. Thirumurugan and Dr. E. George Dharma Prakash Raj
A New Online XML Document Clustering Based on XCLS++..................................................................1
Ahmad Khodayar E Qaramaleki and Ahmad Khodayar E Qaramaleki
Research Interests:
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1 Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal Efficient Neighbor Routing in Wireless Mesh... more
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
Research Interests:
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1 Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal Efficient Neighbor Routing in Wireless Mesh... more
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
Research Interests:
The sophisticated modus operandi of modern day criminals has necessitated the development of modern policing initiatives that are centered on Criminal Intelligence. As a law enforcement strategy, criminal intelligence has altered the... more
The sophisticated modus operandi of modern day criminals has necessitated the development of modern policing initiatives that are centered on Criminal Intelligence. As a law enforcement strategy, criminal intelligence has altered the policing pattern by reinforcing the traditional approaches of investigating. Although the use of advanced information systems has become necessary in the profiling and prediction of crime threats, their full potential has not been realised. The purpose of this qualitative research was to evaluate the adoption of deductive databases in augmenting criminal intelligence in Zimbabwe. The major data collection instruments were document review and semi-structured interviews. The study established that ZRP has been yet to adopt deductive database technology. All the systems that are currently being used rely only on data stored in the database. There is no inference of new facts from the databases. In order to augment criminal intelligence, the study recommends that ZRP should adopt a deductive database technology for empowering decision makers and achieving strategic intent. The identified application areas of deductive databases can bring about improved service delivery system coupled with effective decision making at all levels of planning.
Social Tagging of images uploaded to the Web is highly mandatory as tags serve as the entities for image retrieval. Manual Tagging of images makes the overall process tedious and moreover the tags when manually assigned become noisy.... more
Social Tagging of images uploaded to the Web is highly mandatory as tags serve as the entities for image retrieval. Manual Tagging of images makes the overall process tedious and moreover the tags when manually assigned become noisy. Several automatic tag recommendation systems are available but the background study proves that the tag relevance is not very high. In the era of Semantic Web, there is a need for a semantic driven tagger which would perform efficiently. Also, a system which bridges the gap between manual and automatic tag recommendation is required. An ontology driven semantic tagger for tagging images with social importance which tags the images based on limited reference tags is proposed. The proposed methodology combines ontology crawling using K-Means Clustering and Semantic Deviation Computation using Modified Normalized Google Distance Measured. The tag space is enhanced using Strategic Set Expansion incorporating a dynamic semantic deviation computation. An average precision percentage of 84.4 and an F-Measure percentage of 86.67 are achieved.
The purpose of this paper is to explore and address the socioeconomic impact of identity thefts and cybercrime in general. The paper will further explain the various ways employed in their implementation. The paper will also put forward... more
The purpose of this paper is to explore and address the socioeconomic impact of identity thefts and cybercrime in general. The paper will further explain the various ways employed in their implementation. The paper will also put forward ways to prevent the threats and vulnerabilities of the attacks. The study will also recommend solutions to stop and or mitigate the consequences of cyber-thefts. The study will define social engineering as well as provide various social engineering tactic. The paper will also discuss the reasons for the rise in cybercrime. Such reasons will include financial gain, revenge, as well as non-financial gains. Also cited are examples that demonstrate the capabilities of cybercriminal. The paper will also provide justification for the reasons behind the cumbersome task and failure in instituting a lasting solution to the criminal activities. Finally, this paper will close with a conclusion on the economic implications of social engineering on the general cyberwar on cybercrime at the national and global levels. In general, while losses due to cybercrime are troubling, they do not directly pose as a threat to national security, except to the extent that international cybercrime allows potential opponents to train and maintain proxy forces at the expense of others.
In Pakistan, the VoIP service is gaining popularity. By the end of 2014, the total number of broadband subscribers exceeded 3.35 million and the total number of mobile 3G subscribers were approximately 4 million. The service providers in... more
In Pakistan, the VoIP service is gaining popularity. By the end of 2014, the total number of broadband subscribers exceeded 3.35 million and the total number of mobile 3G subscribers were approximately 4 million. The service providers in Pakistan continue to invest in infrastructure and supporting regulatory policies fueling the development of infrastructure. It is expected that such an environment would be able to provide good quality Voice over IP (VoIP) service. In this context, this study analyzed Pakistani consumer preferences for VoIP service. The findings have significant implications for service providers looking to develop effective marketing strategies and design VoIP service that meets consumers' demand.
The growth of mobile cloud computing users is rapid and now many mobile users utilize from mobile cloud computing technology. This technology makes mobile users stronger beyond the mobile computing capabilities. The security risks have... more
The growth of mobile cloud computing users is rapid and now many mobile users utilize from mobile cloud computing technology. This technology makes mobile users stronger beyond the mobile computing capabilities. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing the mobile cloud computing technology. In this paper we proposed a lightweight and efficient authentication protocol for mobile cloud environment. According to significant advantages of ECC (elliptic curve cryptosystem), it has been adopted through this paper. Our proposed protocol has many advantages such as: supporting user anonymity, identity management and also resistance against related attacks such as replay attack, stolen verifier attack, modification attack, server spoofing attack and so on.
Intrusion detection and perimeter defense was a major concern for military and civil applications. In military the purpose is mostly for monitoring remote high altitude areas, areas with less access and extreme weather conditions and for... more
Intrusion detection and perimeter defense was a major concern for military and civil applications. In military the purpose is mostly for monitoring remote high altitude areas, areas with less access and extreme weather conditions and for force protection. Provided suitable sensors the system can detect identify and classify threads based on the count, number, type weather it is armored vehicles or men in foot, type and amount of weapons they carry, etc., can be detected in advance. This system provides reliable real time war picture and better situational awareness. This will further help to improve the troop readiness and decrease the reaction time. Added using the data collected tactical planning for deploying troops effectively can be done. In case of civil applications economic zones like oil fields, gold mines, can be protected from intruders and attackers. Industrial complex and production facility can be protected with minimized man power and improved efficiency. Basic criteria are which had to be taken into account while deploying wireless sensors for such applications has been discussed. Particularly locating the intruder with respect to the distance from the sensor node to the target in terms of latitude and longitudinal coordinates are discussed here.
Given a simple undirected graph G with n vertices, we denote by σ k the minimum value of the degree sum of any k pairwise nonadjacent vertices. The graph G is said to be hamiltonian if it contains a hamiltonian cycle (a cycle passing all... more
Given a simple undirected graph G with n vertices, we denote by σ k the minimum value of the degree sum of any k pairwise nonadjacent vertices. The graph G is said to be hamiltonian if it contains a hamiltonian cycle (a cycle passing all vertices of G). The problem HC (Hamiltonian Cycle) is well-known a NPC-problem. A lot of authors have been studied Hamiltonian Cycles in graphs with large degree sums σ k , but only for k = 1, 2, 3. In this paper, we study the structure of nonhamiltonian graphs satisfying
σ 4 ≥ 2n, and we prove that the problem HC for the graphs satisfying σ 4 ≥ 2nt is NPC for t < 1 and is P for t ≥ 1.
VoIP as a packet switched system is clearly one of the most important evolving trends in computing and telecommunications. However, just like many other new Information technology trends, VoIP introduces both security risks and... more
VoIP as a packet switched system is clearly one of the most important evolving trends in computing and telecommunications. However, just like many other new Information technology trends, VoIP introduces both security risks and opportunities for the IT world, viable solutions of which are required. The use of publically verified cryptographic algorithms to ensure confidentiality of VoIP traffic transmitted over insecure public networks as the Internet cannot be overemphasized. Nonetheless, the uses of cryptographic algorithms yet imposes a delay overhead and packet size overhead on VoIP, which is unconnected to the processing time required to encrypt/decrypt bits or blocks of data and the increase in packet size due the block size of the encryption algorithm. This delay levied is dependent on the mode of operation of the cryptographic algorithms. Mindful of the fact that other components like voice codecs and network bandwidth also contributed delay capabilities on VoIP traffic, and additions of security overheads, there exists a threshold point where an increase in call volume exerts a negative effect on pre-established calls with respect to time and the rate of packet loss. This study sought to determine the combination of cryptographic algorithms, cipher mode and voice codec that holds the uppermost threshold point, before the latency and rate of packet loss of active calls goes past ITU acceptable standards; for one way latency in both plain and encrypted VoIP traffic of 150ms and 200ms respectively and 5% packet loss rate. Through simulation of appropriate scenarios, results indicates that each of the encryption algorithms (AES, DES and 3DES) append additional overhead on the e2e delay and rate of packet loss during VoIP transmission. Also revealing that VoIP-supported codecs are faster and have a higher threshold in terms of the number of calls before the e2e delay and the rate of packet loss exceeds the acceptable limit for encrypted and plain VoIP e2e delay and packet loss rate.
The growing popularity of social networks made them a perfect platform for informational warfare. They are widely utilized in influencing miscellaneous processes of human interaction, namely opinion formation, decision making, imposing... more
The growing popularity of social networks made them a perfect platform for informational warfare. They are widely utilized in influencing miscellaneous processes of human interaction, namely opinion formation, decision making, imposing goals and spreading information. Such interference in people's behavior poses a threat to the personality and the society as a whole. An open problem is to reduce the informational hazard in virtual communities to the threshold value. Our contribution to the solution of the problem is the algorithm of choosing discussions of a virtual community that are suitable for the influence on the internal informational space. The algorithm in action is demonstrated on the virtual community model. In this paper we dwell on one stage of the algorithm, particularly making suggestions. On this stage, the list of discussions unsuitable for informational influence (prohibited discussions) is composed. The experiments results have proved the significance of this stage and the advantages of influencing a virtual community with the list of prohibited discussions in getting accurate outcome.
This paper presents a dual hybrid method to solve job shop scheduling problem (JSP). We use a genetic algorithm (GA) combined with the dual hybrid approach to obtain a new genetic algorithm (GTD-GA). The algorithm proposed new hybrid... more
This paper presents a dual hybrid method to solve job shop scheduling problem (JSP). We use a genetic algorithm (GA) combined with the dual hybrid approach to obtain a new genetic algorithm (GTD-GA). The algorithm proposed new hybrid approach called dual hybrid, and new data organization with the purpose of maximizing the GT algorithm. They're building program for the experimental schedule finding maximum job shop problem. In order to prove the effectiveness of the algorithm, we ran on the standard given by Muth and Thompson and compare with the results of Yamada used GT-GA for JSP. Moreover, we also compare them with the local search genetic algorithm of M. Kebabla, L. H. Mouss for the job shop problem.
School Administration and Management System (SAMS) has the potential to improve school administration and management, however there is still little research and literature on this aspect of Information and Communication Technology (ICT)... more
School Administration and Management System (SAMS) has the potential to improve school administration and management, however there is still little research and literature on this aspect of Information and Communication Technology (ICT) in Education. In South Africa, Education Management Information Systems (EMIS),has been developed to assist with educational information needs encompassing education planning as well as implementation of relevant education policies at central government level. At school level South African (SA) SAMS is the basic standard for all school data collection to improve and standardize data collection.The aim of this study was to explore and describe the critical success factors for the adoption of SA-SAMS by school personnel in South Africa. The data collected by means of a survey conducted in 51StarSchools in Limpopo Province of South Africa was analysed by means of Structured Equation Modelling. The results indicated that social factors and facilitating condition are critical in the adoption of SA-SAMS;the training offered to teachers was not tailor-made for this specific group of rural teachers. Although teachers believed SAMS was useful they are not using it as a result of how it was implemented.
The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a... more
The ABI Research believes that the number of mobile cloud computing users is expected to grow from 42.8 million (1.1% of total mobile users) in 2008 to 998 million (19% of total mobile users) in 2014. The security risks have become a hurdle in the rapid adaptability of the mobile cloud computing technology. Significant efforts have been devoted in research organizations and academia to securing the mobile cloud computing technology. In this paper we proposed a lightweight authentication protocol for mobile cloud environment. Our proposed protocol has many advantages such as: supporting user anonymity, local authentication and also resistance against related attacks such as replay attack, stolen verifier attack, modification attack, server spoofing attack and so on.
Social Networking sites have become popular in recent years, among these sites Twitter is one of the fastest growing site. It plays a dual role of Online Social Networking (OSN) and Micro Blogging. Spammers invade twitter trending topics... more
Social Networking sites have become popular in recent years, among these sites Twitter is one of the fastest growing site. It plays a dual role of Online Social Networking (OSN) and Micro Blogging. Spammers invade twitter trending topics (popular topics discussed by Twitter user) to pollute the useful content. Social spamming is more successful compared to email spamming by using social relationship between the users. Spam detection is important because Twitter is mainly used for commercial advertisement and spammers invade the privacy information of the user and also the reputation of the user is damaged. Spammers can be detected using content and user based attributes. Traditional classifiers are required for spam detection. This paper focuses on study of detecting spam in twitter.
The main objective of this work is to develop a practical approach to improve customer satisfaction, which is generally regarded as the pillar of customer loyalty to the company. Today, customer satisfaction is a major challenge. In fact,... more
The main objective of this work is to develop a practical approach to improve customer satisfaction, which is generally regarded as the pillar of customer loyalty to the company. Today, customer satisfaction is a major challenge. In fact, listening to the customer, anticipating and properly managing his claims are stone keys and fundamental values for the enterprise. From a perspective of the quality of the product, skills, and mostly, the service provided to the customer, it is essential for organizations to differentiate themselves, especially in a more competitive world, in order to ensure a higher level of customer satisfaction. Ignoring or not taking into account customer satisfaction can have harmful consequences on both the economic performances and the organization's image. For that, it is crucial to develop new methods and have new approaches to THE PROBLEMATIC customer dissatisfaction, by improving the services quality provided to the costumer. This work describes a simple and practical approach for modeling customer satisfaction for organizations in order to reduce the level of dissatisfaction; this approach respects the constraints of the organization and eliminates any action that can lead to loss of customers and degradation of the image of the organization. Finally the approach presented in this document is tested and evaluated.
When an e-Learning System is installed on a server, numerous learners make use of it and they download various learning objects from the server. Most of the time the request is for same learning object and downloaded from the server which... more
When an e-Learning System is installed on a server, numerous learners make use of it and they download various learning objects from the server. Most of the time the request is for same learning object and downloaded from the server which results in server performing the same repetitive task of locating the file and sending it across to the requestor or the client. This results in wasting the precious CPU usage of the server for the same task which has been performed already. This paper provides a novel structure and an algorithm which stores the details of the various clients who have already downloaded the learning objects in a dynamic hash table and look up that table when a new request comes in and sends the learning object from that client to the requestor thus saving the precious CPU time of the server by harnessing the computing power of the clients.
Seamless Service delivery in a heterogeneous wireless network environment demands selection of an optimal access network. Selecting a non-promising network, results in higher costs and poor services. In heterogeneous networks, network... more
Seamless Service delivery in a heterogeneous wireless network environment demands selection of an optimal access network. Selecting a non-promising network, results in higher costs and poor services. In heterogeneous networks, network selection schemes are indispensable to ensure Quality of Service (QoS). The factors that have impact on network selection include Throughput, Delay, Jitter, Cost and Signal Strength. In this paper, multi-criteria analysis is done to select the access network. The proposed scheme involves two schemes. In the first scheme, Dynamic Analytic Hierarchy Process (AHP) is applied to dynamically decide the relative weights of the evaluative criteria set based on the user preferences and service applications. The second scheme adopts Modified Grey Relational Analysis (MGRA) to rank the network alternatives with faster and simpler implementation. The proposed system yields better results in terms of Throughput, delay and Packet Loss Ratio (PLR).
Predicting the user's web page access is a challenging task that is continuing to gain importance as the web. Understanding users' next page access helps in formulating guidelines for web site personalization. Server side log files... more
Predicting the user's web page access is a challenging task that is continuing to gain importance as the web. Understanding users' next page access helps in formulating guidelines for web site personalization. Server side log files provide information that enables to build the user sessions within the web site, where a user view a session consists of a sequence of web pages within a given time. A web navigation behavior is helpful in understanding what information of online users demand. In this paper, we present the system that focuses on the improvements of predicting web page access. We proposed to use clustering techniques to cluster the web log data sets. As a result, a more accurate Markov model is built based on each group rather than the whole data sets. Markov models are commonly used in the prediction of the next page access based on the previously accessed pages. Then, we use popularity and similarity based-page rank algorithm to make prediction when the ambiguous results are found. Page Rank represents how important a page is on the web. When one page links to another page, it is a vote for the other page. The more votes for a page, the more important the page must be.
Cryptography is study of transforming information in order to make it secure from unintended recipients or use. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts visual information (picture, printed text, handwritten... more
Cryptography is study of transforming information in order to make it secure from unintended recipients or use. Visual Cryptography Scheme (VCS) is a cryptography method that encrypts visual information (picture, printed text, handwritten notes) such that decryption can be performed using human visual system. The idea is to convert this visual information into an image and encypher this image into n different shares (known as sheets). The deciphering only requires selecting some shares out of n shares. The intent of this review paper is to contribute the readers an overview of the basic visual cryptography scheme constructions as well as continued work in the area. In inclusion, we also review some applications that take advantage of such secure system.
Research Interests:
Nonfunctional Requirements are as important as functional requirements. But they have been often neglected, poorly understood and not considered adequately in software development process. If the NFRs are not met properly, it will lead to... more
Nonfunctional Requirements are as important as functional requirements. But they have been often neglected, poorly understood and not considered adequately in software development process. If the NFRs are not met properly, it will lead to the dissatisfaction of customers. NFRs may be more critical than functional requirements as there can be mutual dependencies among the NFR, which may affect the completion of the project. Hence it is necessary to prioritize the NFRs effectively. But prioritizing such NFR is a challenging task in Software development. Many techniques are used to prioritize the requirements in various dimensions. It is important to choose the appropriate requirement prioritization technique for a particular software development process. One can select the appropriate techniques based on the various factors such as, the stakeholders involved, available resources, and the product he develop and so on. The goal of this paper is to increase the awareness about the importance of NFRs and to analyze the various techniques that are used to prioritize the NFRs.
Waveform conversion is difficult task for the students during studying. Virtual Intelligent SoftLab (VIS) gives the easy implementation of waveform conversion using the virtual instruments. The study of waveform conversion is important in... more
Waveform conversion is difficult task for the students during studying. Virtual Intelligent SoftLab (VIS) gives the easy implementation of waveform conversion using the virtual instruments. The study of waveform conversion is important in Electronics, Computer Science and Engineering. The virtual intelligent softlab convert rectangular waveform to sawtooth, digital and pulse waveform using virtual instruments. This model will help students to perform it any time and anywhere without traditional laboratory. The screen shows virtual waveform using virtual input Instruments and observed converted waveform using the virtual output Instruments. In this model we learn the circuit connection without physical damages. There is a facility for the user to change the voltage and observed the outputs on the screen.
The problem of internet traffic sharing between two operators was discussed by Naldi (2002) and he has developed mathematical relationship between traffic share and network blocking probability. This relationship generates probability... more
The problem of internet traffic sharing between two operators was discussed by Naldi (2002) and he has developed mathematical relationship between traffic share and network blocking probability. This relationship generates probability based quadratic function which has a definite bounded area. This area is a function of many parameters and needs to be estimated. But, by direct integration methods, it is difficult solve. This paper presents an approximate methodology to estimate the bounded area using Trapezoidal rule of numerical quadrature. It is found that bounded area is directly proportional to customer choice and network blocking .It helps to explain relationship among traffic share and computer network parameters.
During the recent years, tampering of digital images has become a general habit among people and professionals. As a result, establishment of image authenticity has become a key issue in fields those make use of digital images.... more
During the recent years, tampering of digital images has become a general habit among people and professionals. As a result, establishment of image authenticity has become a key issue in fields those make use of digital images. Authentication of an image involves separation of original camera outputs from their tampered or Stego counterparts. Digital image cloning being a popular type of image tampering, in this paper we have experimentally analyzed seven different algorithms of cloning detection such as the simple overlapped block matching with lexicographic sorting (SOBMwLS) algorithm, block matching with discrete cosine transformation, principal component analysis, discrete wavelet transformation and singular value decomposition performed on the blocks (DCT, DWT, PCA, SVD), two combination models where, DCT and DWT are combined with singular value decomposition (DCTSVD and DWTSVD. A comparative study of all these techniques with respect to their time complexities and robustness of detection against various post processing operations such as cropping, brightness and contrast adjustments are presented in the paper.
In big data era, we need to manipulate and analyze the big data. For the first step of big data manipulation, we can consider traditional database management system. To discover novel knowledge from the big data environment, we should... more
In big data era, we need to manipulate and analyze the big data. For the first step of big data manipulation, we can consider traditional database management system. To discover novel knowledge from the big data environment, we should analyze the big data. Many statistical methods have been applied to big data analysis, and most works of statistical analysis are dependent on diverse statistical software such as SAS, SPSS, or R project. In addition, a considerable portion of big data is stored in diverse database systems. But, the data types of general statistical software are different from the database systems such as Oracle, or MySQL. So, many approaches to connect statistical software to database management system (DBMS) were introduced. In this paper, we study on an efficient connection between the statistical software and DBMS. To show our performance, we carry out a case study using real application.
It is well known that Multiple Input-Multiple Output systems enhance the spectral efficiency significantly of wireless communication systems. However, their remarkable hardware and computational burden hinders the wide deployment of such... more
It is well known that Multiple Input-Multiple Output systems enhance the spectral efficiency significantly of wireless communication systems. However, their remarkable hardware and computational burden hinders the wide deployment of such architectures in modern systems. It is a big challenge to reduce hardware complexity, use power with flexible capacity, data rate and bit error rate for the MIMO technology. In this paper we give a theoretical overview of several important theoretical concepts which is related to MIMO. The main part of this thesis can be considered as a most efficient decision for highest capacity with the reasonable BER performance. Hence we came up with an idea to write this thesis paper where we investigated the techniques which we can utilize in order to increase capacity (Bit/s/Hz) and hence provide the less BER in MIMO system. For this system we use Hybrid selection/Maximal-ratio transmission technique over a faded correlated MIMO quasi-static channel. Here faded correlated channel has the ability to carry high capacity data and HS/MRT technique minimizes the BER of system. For this system we use MSK modulation technique which reduces the complexity at transmission side. In practically, For more complexity free in this technique excludes the up converter, amplifier and filtered stage which also alleviate the cost. In this paper at first we try to focus the main important related techniques used in MIMO with the advantages and drawbacks. Then we review the MIMO system from the several past paper works and then we compare the performance of this technique. From this comparison result and using best technique we suggest a future work which will give the best performance. Finally, we describe the technique which we used in our suggested work.
The transition from Web 2.0 to Web 3.0 has resulted in creating the dissemination of social communication without limits in space and time. Sentiment analysis has really come into its own in the past couple of years. It's been a part of... more
The transition from Web 2.0 to Web 3.0 has resulted in creating the dissemination of social communication without limits in space and time. Sentiment analysis has really come into its own in the past couple of years. It's been a part of text mining technology for some time, but with the rise in social media popularity, the amount of unstructured textual data that can be used as a machine learning data source, is enormous. Marketers use this data as an intelligent indicator for customer preferences. This paper aims to evaluate the performance of sentiment mining classifiers for problems of unbalanced and balanced large data sets for three different products. The classifiers used for sentiment mining in this paper are Support Vector Machine (SVM), Naïve bayes and C5.The results shows that the performance of the classifiers depends on the class distribution in the dataset. Also balanced data sets achieve better results than unbalanced datasets in terms of overall misclassification rate.
In the world of computer science & Information Technology security is essential and important issue. Identification and Authentication Techniques plays an important role while dealing with security and integrity. The human physical... more
In the world of computer science & Information Technology security is essential and important issue. Identification and Authentication Techniques plays an important role while dealing with security and integrity. The human physical characteristics like fingerprints, face, hand geometry, voice and iris are known as biometrics. These features are used to provide an authentication for computer based security systems. Biometric verification refers to an automatic verification of a person based on some specific biometric features derived from his/her physiological and/or behavioral characteristics. Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. The future in biometrics seems to belong to the multimodal biometrics (a biometric system using more than one biometric feature) as a Unimodal biometric system (biometric system using single biometric feature) has to contend with a number of problems. In this paper, a survey of some of the multimodal biometrics is conducted.
Research Interests:
Data mining in computer science is the process of discovering interesting and useful patterns and relationships in large volumes of data. Most methods for mining problems is based on artificial intelligence algorithms. Neural network... more
Data mining in computer science is the process of discovering interesting and useful patterns and relationships in large volumes of data. Most methods for mining problems is based on artificial intelligence algorithms. Neural network optimization based on three basic parameters topology, weights and the learning rate is a powerful method. We introduce optimal method for solving this problem. In this paper genetic algorithm with mutation and crossover operators change the network structure and optimized that. Dataset used for our work is stroke disease with twenty features that optimized number of that achieved by new hybrid algorithm. Result of this work is very well in comparison with other similar method. Low present of error show that our method is our new approach to efficient, high-performance data mining problems is introduced.
A wireless sensor network is used as an effective tool for gathering data in various situations. Recent researches in wireless communications and electronics has enforced the development of low-cost wireless sensor network. Wireless... more
A wireless sensor network is used as an effective tool for gathering data in various situations. Recent researches in wireless communications and electronics has enforced the development of low-cost wireless sensor network. Wireless sensor networks are web of sensor nodes with a set of processors and limited memory unit embedded in it. Reliable routing of packets from sensor nodes to its base station is the most important function for these networks. The conventional routing protocols cannot be applied here due to its battery powered nodes. To support energy efficiency, nodes are often clustered in to non-overlapping clusters. This paper gives a brief overview on clustering process in wireless sensor networks. A research on the well evaluated distributed clustering algorithm Low Energy Adaptive Clustering Hierarchy (LEACH) and its followers are portrayed artistically. To overcome the drawbacks of these existing algorithms a distributed clustering model has been proposed for attaining energy efficiency to a larger scale.
Three-tank (3T) system is the most representative didactical equipment used as a bench mark system for system modeling, identification and control. A real target representing 3T system has been used for generating data that is used for... more
Three-tank (3T) system is the most representative didactical equipment used as a bench mark system for system modeling, identification and control. A real target representing 3T system has been used for generating data that is used for developing a linear model based on auto-regressive exogenous (ARX) method, and neuro-fuzzy (NF) network technique. The developed models have been used as an internal model of the model predictive control (MPC). Control actions of the NFMPC algorithm has been determined using nonlinear programming methods based on sequential quadratic programming (SQP) technique. The developed NFMPC algorithm has shown good performance and set point tracking over the linear MPC algorithm based on ARX model for controlling the 3T system. Keywords Three-tank system, model predictive control (MPC), auto regressive exogenous (ARX) model, neuro-fuzzy model, sequential quadratic programming (SQP).
A single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Biometric identification based on multiple biometrics represents an emerging trend. Automated biometric... more
A single biometric identifier in making a personal identification is often not able to meet the desired performance requirements. Biometric identification based on multiple biometrics represents an emerging trend. Automated biometric systems for human identification measure a " signature " of the human body, compare the resulting characteristic to a database, and render an application dependent decision. These biometric systems for personal authentication and identification are based upon physiological or behavioral features which are typically distinctive, although time varying, such as Face recognition, Iris recognition, Fingerprint verification, Palm print verification in making a personal identification. Multi-biometric systems, which consolidate information from multiple biometric sources, are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data, large intra-user variations and susceptibility to spoof attacks that are commonly encountered in uni-biometric systems. In this paper, it addresses the concept issues and the applications strategies of multi-biometric systems.
This paper introduce a security improvement on the RSA cryptosystem, it suggests the use of randomized parameters in the encryption process to make RSA many attacks described in literature, this improvement will make the RSA semantically... more
This paper introduce a security improvement on the RSA cryptosystem, it suggests the use of randomized parameters in the encryption process to make RSA many attacks described in literature, this improvement will make the RSA semantically secure i.e. , an attacker cannot distinguish two encryptions from each other even if the attacker knows (or has chosen) the corresponding plaintexts. This paper also briefly discuss some other attacks on the RSA and the suitable choice of RSA parameter to avoid attacks, also an important issue for the RSA implementation is how to speed up the RSA encryption and decryption process.
A Mobile ad-hoc network (MANET) is a wireless network, self-configuring, capable of self-directed operation, hastily deployable and operates without infrastructure. MANET operates without centralized administration. The nodes are self... more
A Mobile ad-hoc network (MANET) is a wireless network, self-configuring, capable of self-directed operation, hastily deployable and operates without infrastructure. MANET operates without centralized administration. The nodes are self configuring, independent, quickly deployable. Nodes are movable since topology is very vibrant and they have restricted energy and computing resources. Routing protocols should incorporate QoS metrics in route finding and maintenance, to support end-to-end QoS. General AODV routing faces problems like long route, time delay, mobility and many other while routing. The nodes low in energy level will not be in a position to complete the routing. The QoS parameters like throughput, PDR and delay are affected directly. The proposed protocol EN-AODV, announces energy and based on nodes sending and receiving rates and the sizes of the data to be transmitted it justifies whether its energy level is maintained or decreased. It calculates the energy levels of the nodes before they are selected for routing path. A threshold value is defined and nodes are considered for routing only if its energy level is above this threshold value. The transmissions are made secure by introducing message digest algorithm. The nodes perform routing and all these routing are secured using MD5 algorithm which increases the reliability of routing. The work is implemented and simulated on NS-2. The simulation results have shown an increase in PDR, decrease in delay and throughput is maintained. The proposed EN-AODV provides more consistent and reliable data transfer compared to general AODV.
The scope of this paper includes development and implementation of virtual laboratories. Virtual Experiments can be performed using the concept of virtual Intelligent SoftLab (VIS). The virtual experiments described here will help... more
The scope of this paper includes development and implementation of virtual laboratories. Virtual Experiments can be performed using the concept of virtual Intelligent SoftLab (VIS). The virtual experiments described here will help students to perform it at anytime and anywhere. The model accepts inputs using virtual instruments and observed virtual results on the screen. There is a facility for constructing an experimental circuit, change the input values and observed outputs respectively. The graphical and simulated effects of virtual experiments are visible on the screen. SoftLab will help Electronics, Computer Science and Engineering students perform and practice experiments to improve their understanding of the subject.
Requirements engineering is a software engineering process which covers all the activities involved in discovering, documenting and maintaining a set of requirements for a computer-based system. The priorities that stakeholders associate... more
Requirements engineering is a software engineering process which covers all the activities involved in discovering, documenting and maintaining a set of requirements for a computer-based system. The priorities that stakeholders associate with requirements may vary from stakeholder to stakeholder. Different priorities imply different design decisions for the system. So there must be a model to support the representation of preference in requirements. In this paper we develop a framework to model alternative solutions for mandatory goals and preferred goals based on priorities. A framework is created for specifying preferences and priorities among requirements. The priorities among the preferences are analysed by Analytical Hierarchy Process method (AHP). AHP's pair wise comparison method is used to assess the relative value of the candidate requirements. The preferences are analysed based on the prioritization of each task and a definite plan is generated to view all those tasks according to priority.
Swarm intelligence is a computational intelligence technique to solve complex real-world problems. It involves the study of collective behaviour of behavior of decentralized, self-organized systems, natural artificial. Swarm Intelligence... more
Swarm intelligence is a computational intelligence technique to solve complex real-world problems. It involves the study of collective behaviour of behavior of decentralized, self-organized systems, natural artificial. Swarm Intelligence (SI) is an innovative distributed intelligent paradigm for solving optimization problems that originally took its inspiration from the biological examples by swarming, flocking and herding phenomena in vertebrates. In this paper, we have made extensive analysis of the most successful methods of optimization techniques inspired by Swarm Intelligence (SI): Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO). An analysis of these algorithms is carried out with fitness sharing, aiming to investigate whether this improves performance which can be implemented in the evolutionary algorithms.