IJCSIS EDITORIAL BOARD

BEST PAPER AWARD

Vol. 10 No. 2 FEB 2012

Vol. 10 No. 2 February 2012 International Journal of Computer Science and Information Security
Publication February 2012, Volume 10 No. 2 (Download Full Journal) (Archive) (Download 2)

.
Copyright © IJCSIS. This is an open access journal distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
1. Paper 30011201: Conceptual modeling in the ontological basis of a Data Warehouse- Environment University (pp. 1-5)
Full Text: PDF

.
Latifa. Oubedda, Laboratory of Industrial Engineering and Computer, Science (LG2I), National School of Applied Sciences, -Agadir, University Ibn Zohr, Morocco
Brahim. Erraha, Laboratory of Industrial Engineering and Computer Science (LG2I), National School of Applied Sciences -Agadir, University Ibn Zohr. Morocco
Mohamed. Khalfaoui, Laboratory, Information Processing and Integrated Management, Superior School of Technology, Sale, University Mohammed V Agdal. Morocco

.
Abstract — The objective of this work is to establish an information system which would facilitate decision making for the exploitation of a model consisting of the main university stakeholders (teachers, students and administrators). This system is based on the relationship between actors (players) on the one hand and their activities and their aggregations in a graduate level on the other. It aims to make available to managers of the university a set of dashboards that can improve the quality of education. Meanwhile, ontology is now at the heart of the work of engineering knowledge and demonstrated in several areas. An ontology dedicated to the design of SD is a model of organization of knowledge for a given domain. It represents the multidimensional concepts of a domain and their multidimensional relationship (LDR) and semantic. After recalling our ontology construction method decision, we will detail in this paper the optimization phase of RMD after the enrichment of the ontology. This phase is governed by rules that we define optimization.
.
Keywords-Data warehouse conceptual modeling, ontology integration, information systems decisions.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2. Paper 31011208: Privacy Concerns In Higher Education: Traditional Versus Online Education (pp. 6-10)
Full Text: PDF

.
Arben Asllani, College of Business, The University of Tennessee Chattanooga, Chattanooga, Tennessee, USA
.
Abstract — Taking advantage of today’s hyper connected world, many institutions of higher education have already implemented online education programs, while many others are currently investigating online education models for use in the near future. As colleges and universities gradually explore the feasibility of including distance education programs, privacy protection and securing computer networks remains a primary concern for them. Privacy concerns when using online education models increase as most of the communication among students, faculty, and administration occurs electronically. This paper analyzes privacy policies in three institutions that represent different education models: established face-to-face, established online and prospective online models. The paper addresses privacy laws related to institutions of higher education in general and offers recommendations for those institutions of higher education that are considering expanding their face-to-face offerings to include online education models.
.
Keywords- higher education; traditional; online; privacy; FERPA
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
3. Paper 31011225: Evaluation Framework for Secure Methodologies (pp. 11-16)
Full Text: PDF

.
Alireza Fatehi Marj, University of Applied Science and Technology Shahr-e-babak Center, Shahr-e-babak, Iran
Nasser Modiri, Department of Computer Engineering, Zanjan Branch, Islamic Azad University, Zanjan, Iran
Parinaz Eskandarian Miyandoab, Department of Computer Engineering, Zanjan Branch, Islamic Azad University, Zanjan, Iran

.
Abstract — In recent years, the various processes and with different aspects were created in order to response the needs of producing secure software. As a result of secure methodologies production to develop software, their evaluation is difficult to select a methodology for a specific project. Due to This need, a framework for evaluation and measurement methodology plays an important role. Evaluation must consider the various parameters of the software project and pay attention to the similarities, differences, features and application of available methodologies. So there is need for measures to cover these requirements. Despite the researches in the analysis and evaluation of secure methodologies for software production in various aspects, the lack of an overall framework for evaluating these methodologies is seen. In this paper, we offer an extended framework for evaluating the secure methodologies that cover different aspects of a software development methodology. This framework will be considered the needs of project managers and method engineers in order to choosing an appropriate secure methodology in the desired project.
.
Keyword- Methodology; Framework; Evaluation; Security; Criteria
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
4. Paper 31011230: Improving Mobility in eXtreme Programming Methods through Computer Support Cooperative Work (pp. 17-22)
Full Text: PDF

.
Ridi Ferdiana, Electrical Engineering Department, Gadjah Mada University, Yogyakarta, Indonesia
Paulus Insap Santosa, Electrical Engineering Department, Gadjah Mada University, Yogyakarta, Indonesia

.
Abstract - One of the most challenging in eXtreme Programming is composing the entire team member and customer onsite. This problem will become seriously when the entire team member unavailable in the same place or the customer cannot give representation person for the development team. This situation will make information imperfectly for both customer and team member. In this research, we solve the problem by implementing computer support cooperative work (CSCW) as a tool to improve eXtreme Programming method. By joining these two concepts, we get 15% productivity improvement as a ratio between XP projects with CSCW and without CSCW.
.
Keywords: eXtreme Programming, CSCW, Software Development.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
5. Paper 21111106: Using Two levels danger model of the Immune System for Malware Detection (pp. 23-32)
Full Text: PDF

.
Mafaz Muhsin Khalil Alanezi, Computer Sciences, College of Computer Sciences and Mathematics, Iraq, Mosul, Mosul University
Najlaa Badie Aldabagh, Computer Sciences, College of Computer Sciences and Mathematics, Iraq, Mosul, Mosul University
.
Abstract — Most signature−based antivirus products are effective to detect known malwares but not unknown malwares or malwares' variants, which make them often lag behind malwares. Also most antivirus approaches are complex for two reasons. First, lots of malicious and benign codes as training dataset are difficult to collect. Second, they would consume lots of times when training classifiers. Immunity PE Malware Detection System (IPEMDS) was designed to give computer systems PE homeostatic capabilities analogous to those of the human immune system. Because the constraints of living and computational systems are very different, however, we cannot create a useful computer security mechanism by merely imitating biology. IPEMDS approach has been first to choose a set of requirements similar to those of the immune system. It then created abstractions that captured some of the important characteristics of biological homeostatic systems and then used these abstractions to guide the design of two levels of defense called them IPEMDS. The goals of IPEMDS are to obtain high detection rate and a very low false positive. IPEMDS enter in a challenge to a chief this goal from depending only on a finite numbers of benign files to classify between a new benign and malware executable files, and both of them unseen before by IPEMDS.
.
Keywords: Heuristic analysis, Packed Executable, Homeostasis, Dentritic Cell Algorithm (DCA), Toll-like Receptors (TLR), Global Alignment, API.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
6. Paper 31121115: Innovative Approach in Zero Tree Wavelet method (pp. 33-38)
Full Text: PDF

.
A. Nagarajan, Associate Professor Dept of Master of Computer Application PSNA College of Engineering & Technology Dindigul., Tamilnadu ,India.
Dr. K. Alagarsamy, Associate Professor, Dept of MCA, Computer Center, Madurai Kamaraj University, Madurai, Tamilnadu, India.

.
Abstract - Image Compression is just used everywhere. All the images you get on the Internet and web pages are compressed, typically in the JPEG or GIF formats, most modems use compression, HDTV will be compressed using MPEG-2 and several file systems automatically compress files when stored and the rest of us do it by hand. Compression is that the algorithms used in the real world make heavy use of a wide set of algorithmic tools, hash tables, including sorting, dictionary and FFTs. Furthermore, algorithms with strong theoretical foundations and implementation play a critical role in real-time applications because many of compression algorithmic models available, where in some of the algorithms will only be standing in the field. In this paper we are concentrating about zero tree wavelet method and proposed an enhancing approach in zero tree wavelet method.
.
Keywords:
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
7. Paper 31011205: STX Scheme for Reducing Latency with Centralized Matching Algorithms (pp. 39-49)
Full Text: PDF

.
G. Ramesh Kumar, Dept.of Computer Science & Applications, Adhiparasakthi College of Arts & Science, G.B.Nagar, Kalavai - 632 506,Vellore District. Tamil Nadu.
S. Tharani, Department of Computer Science & Applications,Adhiparasakthi College of Arts & Science, G.B.Nagar, Kalavai - 632 506, Vellore District. Tamil Nadu.

.
Abstract - This research work is motivated by the need to achieve low latency in an input-queued centrally-scheduled cell switch for high-performance computing applications; specifically, the aim is to reduce the latency incurred between a request and response arrival of the corresponding grant. The minimum latency in switches with centralized scheduling comprises two components, namely, the control-path latency and the data-path latency, which in a practical high-capacity, distributed switch implementation can be far greater than the cell duration. We introduce a speculative transmission scheme to significantly reduce the average control-path latency by allowing cells to proceed without waiting for a grant, under certain conditions. It operates in conjunction with any centralized matching algorithm to achieve a high maximum utilization. Using this model, performance measures such as the mean delay and the rate of successful speculative transmissions are derived.
.
Keywords: speculative transmissions (STX), collisions, crossbar switch, cache table, control-path latency.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8. Paper 31011206: Adjusted Probabilistic based route discovery process in mobile ad hoc networks (pp. 50-54)
Full Text: PDF

.
V. Mathivanan, Research Scholar, Alagappa University, Karaikudi, Tamilnadu, India
E. Ramaraj, Director, Department of Computer Center, Alagappa University, Karaikudi, Tamilnadu, India

.
Abstract - An ad hoc wireless network consists of set of mobile nodes connected without any central administration. Path finding processes in on-demand route discovery methods in mobile ad hoc networks (MANETs) use flooding. Source mobile node simply broadcast route request (RREQ) packet to its neighbor node and once again the neighbour node rebroadcast RREQ to its neighbour until unless route to a particular destination is found. The excessive RREQ packet can lead collision problem and consume more bandwidth in the network and decrease network performance. This paper proposed new probabilistic based route discovery method to reduce number of RREQ packet generated by the mobile nodes during the path finding process. In this paper exhibits an Ad Hoc on demand distance vector Routing protocol (AODV)[1] using in simulation based on our new probabilistic method route discovery processes. When we compare the modified AODV with traditional AODV, the simulation results shows significant improvement in the terms of routing overhead and end-to-end delay.
.
Keywords: MANET, AODV, broadcast.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
9. Paper 31011210: A Novel Hybrid Intelligent Model for Classification and Pattern Recognition Problems (pp. 55-63)
Full Text: PDF

.
Vivek Srivastava, B K Tripathi, V K Pathak,
Department of Computer Science & Engg., Harcourt Butler Technological Institute, Kanpur, India

.
Abstract -- In this paper, a new hybrid intelligent model comprising a cluster allocation and adaptation component is developed for solving classification and pattern recognition problems. Its computation ability has been verified through various benchmark problems and biometric applications. The proposed model consists of two components: cluster distribution and adaptation. In first module, mean patterns are distributed in to the number of clusters based on the evolutionary fuzzy clustering, which is the basis for network structure selection in next module. In second module, training & subsequent generalization is performed by the syndicate neural networks (SNN). The Number of SNNs required in the second module will be same as the number of clusters. Whereas, each network contains as many output neurons as the maximum number of members assigned to each cluster. The proposed novel fusion of evolutionary fuzzy clustering with neural network yields superior performance in classification and pattern recognition problems. Performance evaluation has been carried out over wide spectrum of benchmark problems and real life biometric recognition problems. Experimental results demonstrate the efficacy of the methodology over existing ones.
.
Keywords- Hybrid Intelligence; Evolutionary Fuzzy Clustering; Syndicate Neural Network.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
10. Paper 31011213: Image Watermarking Based on Simplified Significant Wavelet Tree Quantization (pp. 64-70)
Full Text: PDF

.
S. MaruthuPerumal, Research Scholar, Dr. MGR University Chennai, Associate Professor, IT Department, GIET Rajahmundry, India
Dr. V. Vijayakumar, Dean Computer Sciences, Head-Srinivasa Ramanujan Research Forum, GIET, Rajahmundry, India
L. Sumalatha, AssociateProfessor & Head,Dept. of CSE University College of Engg., JNTUK, Kakinada, India

.
Abstract — This paper proposes an image watermarking scheme using wavelet tree quantization. The proposed approach embeds a watermark with visual recognizable patterns, such as binary or gray, in images by modifying the frequency part of the images. In the proposed approach, an original image is decomposed into wavelet coefficients. Then, image watermarking scheme based on the Simplified Significant Wavelet Tree (SSWT) is used to achieve the robustness of the watermarking. Unlike other watermarking techniques that use a single casting energy, SSWT adopts adaptive casting energy in different resolutions. The wavelet coefficients of the host image are grouped into wavelet trees and each watermark bit is embedded using trees. The trees are so quantized that they exhibit a large enough statistical difference, which will later be used for watermark extraction. Each watermark bit is embedded in all frequency bands, which renders the mark more resistant to attacks that remove certain frequency components. The performance of the proposed watermarking is robust to a variety of signal distortions, such as image cropping, adding noise, and filtering, and compression attacks.
.
Keywords - Simplified Significant Wavelet Tree, Wavelet Tree, watermarking, DWT.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
11. Paper 31011216: Speech Recognition using Transform Method (pp. 71-76)
Full Text: PDF

.
Dr H. B. Kekre, Computer Engineering, NMIMS University, Vileparle (W) Mumbai – 400056, India
Dr. Archana B. Patankar, Computer Engineering, TSEC, Bandra (w), Mumbai 400-050, India
Grishma Sharma, Computer Engineering, KJSCE, Vidyavihar (E), Mumbai – 400077, India

.
Abstract — This paper presents a novel method for isolated English word recognition based on transform method. This isolated word recognition method consists of two phases, feature extraction phase and recognition phase. In feature extraction, discrete Fourier transform and discrete cosine transform is used for extracting the features of speech samples and feature vector of different dimensions is obtained. In Recognition phase, Euclidean distance is calculated between test sample feature vector and all reference speech samples. Speech sample with minimum average distance is selected. For testing, 30 different words are used, spoken by male and female both, 25 utterances of each word are recorded. Results are compared with different feature vector dimensions. Experimental results showed that the maximum recognition rate of 94% is obtained.
.
Keywords - Isolated word Recognition, Feature Extraction, Discrete Fourier Transform (DFT), Discrete Cosine transform (DCT), Euclidean distance.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
12. Paper 31011217: Mobile Scientific Calculator (pp. 77-80)
Full Text: PDF

.
Mohammed Abdulrahim Hamdi, Software Engineering Department, College of Computer Science and Mathematics, Mosul University, Mosul, Iraq

.
Abstract - The mobile and wireless industry is entering an exciting time. Demand for mobile technology is growing at a tremendous rate. Corporations are deploying mobile applications that provide substantial business benefits, and consumers are readily adopting mobile data applications. We present scientific application for mobile phone in steps of software engineering project starting from data gathering, data analysis, designing, coding, packaging, testing and deploying, Mobile Scientific Calculator (MSC) enable user to compute any mathematical operation by using this application in mobile phone without needing to use the calculator. Scientific calculator offers three keys the four mathematic operations, the four systems of digits and offering many of functions such as angles functions, power, factorial and other functions. Scientific calculator is suitable for many mobile phones which don t have scientific calculator in its applications, it provide simple design for dealing with its functions for all users. It operated on more than one mobile phone model.
.
Keywords - mobile application, scientific calculator
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
13. Paper 31011220: Association Rule Mining with Hybrid- Dimension Datasets (pp. 81-84)
Full Text: PDF

.
Priyanka Pawar, Prof. Sachin Deshpande, Prof. Vipul Dalal
Computer Department, Vidyalankar Institute of Technology, Wadala, Mumbai, India
.
Abstract — Hybrid dimension association rules mining algorithm satisfies the definite condition on the basis of multidimensional transaction database. Boolean Matrix based approach has been employed to generate frequent item sets in multidimensional transaction databases. When using this algorithm first time, it scans the database once and will generate the association rules. Apriori property is used in algorithm to prune the item sets. It is not necessary to scan the database again; it uses Boolean logical operations to generate the association rules.
.
Keywords — Association rule, hybrid dimensional association rule, relational calculus, multidimensional transaction database.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
14. Paper 31011227: Computing the Efficiency of Decision-Making Units with FuzzyData Using Ideal and Anti-Ideal Decision Making Units (pp. 85-94)
Full Text: PDF

.
Mehrdad Nabahat, Sama Technical and Vocational Training School Islamic Azad University, Urmia branch, Urmia, Iran
Fardin Esmaeeli Sangari, Sama technical and vocational training school, Islamic Azad university, Urmia branch, Urmia, Iran

.
Abstract - Data Envelopment Analysis (DEA) is a nonparametrical, method for evaluating the efficiency of Decision Making Units (DMU) using mathematical programming. There are several methods for analyzing the efficiency of Decision Making Units, among which are Charnes Cooper Rodes (CCR) and Banker Charnes Cooper (BCC), which compute the efficiency of Decision Making Units using the linear programming or Wang’s method which evaluates the efficiency of Decision Making Units using Ideal Decision Making Unit (IDMU) and Anti-Ideal Decision Making Unit (ADMU) and ultimately performs the ranking of units. All these calculations occur when all data, that is the inputs and the outputs of Decision Making Units, are positive and crisp data. Now this question arises: if the data are Symmetric Triangular Fuzzy Number, how will be the method of computing the efficiency of Decision Making Units? In this article, we will introduce a method for evaluating the efficiency of Decision Making Units and also rank them using Ideal and Anti-ideal Decision-Making Units with Fuzzy Data. Finally, a numerical example is proposed to display the application of this method.
.
Keywords: Data Envelopment Analysis (DEA), Ideal Decision Making Unit (IDMU), Anti Ideal Decision Making Unit (ADMU), relative closeness (RC), Ranking
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
15. Paper 31011228: Variation of Boyer-Moore String Matching Algorithm: A Comparative Analysis (pp. 95-101)
Full Text: PDF

.
Ramshankar Choudhary, Prof. Akhtar Rasool, Dr. Nilay Khare
Department Of Computer Science and Engineering, Maulana Azad National Institute of Technology, Bhopal-462051, India

.
Abstract - String matching plays an important role in field of Computer Science and there are many algorithm of String matching, the important aspect is that which algorithm is to be used in which condition. BM(Boyer-Moore) algorithm is standard benchmark of string matching algorithm so here we explain the BM(Boyer-Moore) algorithm and then explain its improvement as BMH (Boyer-Moore-Horspool), BMHS (Boyer-Moore-Horspool-Sundays), BMHS2 (Boyer-Moore-Horspool-Sundays 2), improved BMHS( improved Boyer- Moore-Horspool-Sundays) ,BMI (Boyer-Moore improvement) and CBM (composite Boyer-Moore).And also analyze and compare them using a example and find which one is better in which conditions.
.
Keywords- String Matching: BM; BMH; BMHS; BMHS2; improved BMHS; BMI; CBM
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
16. Paper 31011229: Performance Evaluation of Speaker Identification using Spectrogram and Hartley Transform with Cropped Feature Vector (pp. 102-105)
Full Text: PDF

.
Dr. H. B. Kekre, Senior Professor, MPSTME, SVKM’s NMIMS University, Mumbai, 56, India.
Dr. Tanuja Sarode, Assistant Professor, TSEC, Bandra (W), Mumbai, 50, India.
Ms. Shachi Natu, Assistant Professor, Information Technology Department, Thadomal Shahani Engineering College (Mumbai)
Prachi Natu, Assistant Professor, GVAIET, Shelu, Karjat, 410201, India

.
Abstract — This paper presents a novel approach for speaker identification using spectrograms and Hartley transform. Performance of this approach is observed to be improving up to 88.34% as cropping of feature vector is done at the specific area of transformed spectrograms. Computational complexity of this technique is found to be same as the computational complexity of our previous work using DCT and spectrograms.
.
Keywords-Speaker Identification, Hartley Transform, Spectrogram
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
17. Paper 31011231: Normalized Cross- Correlation for Tracking Object and Updating the Template: Exploration with Extensive Dataset (pp. 106-112)
Full Text: PDF

.
M. H. Sidram, Department of E & EE, Sri Jayachamarajendra College of Engineering , Mysore , Karnataka, India
Nagappa. U. Bhajantri, Department of CS&E, Governement Engineering College, Chamarajanagar, Karnataka, India

.
Abstract — Tracking is the process explicitly dedicated to estimate the path of the object as it moves along the region of scene in the image plane. In other words it is a strategy to detect and track moving object through a sequence of frames. Here an attempt to enable the Normalized Cross-Correlation strategy for both matching and updating the template for tracking the object in an outdoor environment is made. The proposed method explores to consume extensive bench mark dataset. The evolved system critically exhibits the capability to track an object or multiple objects genuinely under varied illumination conditions. Evidently, the outcome reveals the worthiness of the proposed developed novel system.
.
Keywords- Object tracking, Normalized Cross-Correlation, Frame difference, Template updating.

.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
18. Paper 31011243: Mining Education Data to Predict Student’s Retention: A comparative Study (pp. 113-117)
Full Text: PDF

.
Surjeet Kumar Yadav, Research Scholar, Sri Venkateshwara University, J. P. Nagar, India
Brijesh Bharadwaj, Assistant Professor, Dept. of MCA, Dr. R. M. L. Awadh University, Faizabad, India
Saurabh Pal, Head, Dept. of MCA, VBS Purvanchal University, Jaunpur, India

.
Abstract — The main objective of higher education is to provide quality education to students. One way to achieve highest level of quality in higher education system is by discovering knowledge for prediction regarding enrolment of students in a course. This paper presents a data mining project to generate predictive models for student retention management. Given new records of incoming students, these predictive models can produce short accurate prediction lists identifying students who tend to need the support from the student retention program most. This paper examines the quality of the predictive models generated by the machine learning algorithms. The results show that some of the machines learning algorithms are able to establish effective predictive models from the existing student retention data.
.
Keywords — Data Mining, Machine Learning Algorithms, Retention Management, Predictive Models
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
19. Paper 31011244: Factors Affecting Information Communication Technology Acceptance in Public Organizations in Saudi Arabia (pp. 118-139)
Full Text: PDF

.
Wael Sh. Basri, Northern Border University, Faculty of Business Administration, ArAr, Saudi Arabia
Professor Mohamed B. Sulaiman International Islamic University Malaysia, Faculty of Economics and Management Sciences, Kuala Lumpur, Malaysia

.
Abstract - Recent developments in information communication technology (ICT) have heightened the need of more study in this topic. There is a real risk of the acceptance of ICT by some and not others contributing to the rejection. The paper approaches the technology acceptance from the perspective of administration by examining the use of ICT and e-services in the public environment. The theoretical framework variables of the technology acceptance model (TAM) are examined. The study also investigated the effect of the model of organization readiness to change (MORC) Individual Differences “recipients' beliefs” as external variables, in addition subjective norm and volunteer as the mediating . the study tested the current usage as mediating variable between ICT believes and attitude behaviour. Most studies in ICT have been carried out in private sectors in Saudi Arabia. The survey instrument uses to collect the data is a self administrated questioner developed based on the technology acceptance questioner as used by Davis and Venkatesh. The research population is Saudi workers in public organization. The research tool is structure equation modelling (SEM), which required a minimum sample of 200 respondents.
.
Keywords: Technology Acceptance model; Information Communication Technology; ICT Usage, Public organization; structural equation modelling; Saudi Arabia and developing countries
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
20. Paper 31011247: Survey and selection of Energy Storage System for Low Power Embedded System (pp. 140-143)
Full Text: PDF

.
Meenu Nair, Ubiquitous Computing group, Centre for Development of Advanced Computing, Noida, U.P., India
Chandan Maity, Ubiquitous Computing group, Centre for Development of Advanced Computing, Noida, U.P., India
.
Abstract — Energy storage for portable low power Embedded System is one of the biggest challenges for a long time operation in present research and application. These systems are designed to operate the lowest possible energy at micro-watt or Milli-Watt range and the power is supplied from a small primary or secondary cell. In this paper an extensive study and latest survey has been shown to estimate and select the right suitable energy storage device in theoretical aspects and also commercially available cells. The alternative Super-Capacitor based storage solution also has been described as ready reference to estimate the requirements with trade-offs between cost, size, weight and other parameters with feasibility aspects.
.
Keywords — Low Power, Mathematical Modeling, Energy storage, Capacity, Form factor, Cost.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
21. Paper 30011203: E-Health: The Use of Mobile Computing In The Health Sector of Nigeria (pp. 144-148)
Full Text: PDF

.
Usman-Hamza F. E, Department of Physical Science (Computer Science unit), Al-hikma University, P. M. B 1601, Ilorin, Kwara-Nigeria.
.
Abstract - The health care system in Nigeria is nothing to write home about, this is due to the inadequate availability of medical and human resources. This inadequacy has led to enormous paper work, waste of time, life, and ineffective treatment procedures. This study takes a look at the use of mobile technology devices such Personal Digital Assistants, cell phones, personal laptops, palm top etc for health care delivery in Nigeria. It proposes to look at how healthcare application will improve the healthcare services by providing spatially the link between patient and primary health care .This link will provide easy access to medical information at the points of health-care delivery within health care centers. An E- Health model can be designed to solve this problem, the central idea behind this model is to use web languages to describe a user’s personal health environment and extend the web browser to use this document to support user mobility. This model enables users to access user-defined health environment from anywhere, at anytime and with any kind of Internet-connected computers. With the use Unified Modeling Language, mobile, and Java-based technologies for its development, E-Health is proposed to be a general solution to the current challenges in the health sector in Nigeria.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
22. Paper 31011250: A Dynamic Cyber Terrorism Framework (pp. 149-158)
Full Text: PDF

.
Rabiah Ahmad, Dept of Computer System and Communication, Faculty of Information and Communication Technology, Universiti Teknikal Malaysia Melaka (UTeM), Melaka, Malaysia
Zahri Yunos, CyberSecurity Malaysia, Selangor, Malaysia

.
Abstract — Many nations all over the world have increased their dependency on cyberspace by maximizing the use of Information and Communication Technology (ICT). In this digital age, the concept of cyber terrorism or the use of cyberspace to carry out terrorist activities has emerged. Interestingly, there are many concepts of cyber terrorism provided by researchers, policy makers and individuals. This paper proposes a framework describing the core components of cyber terrorism. The authors have analyzed the data by using a grounded theory approach, in which the framework is drawn. The framework defines cyber terrorism from six perspectives: Target, motivation, method of attack, domain, action by perpetrator, and impact. In addition, the proposed framework provides a dynamic way in defining cyber terrorism as well as describing its influential considerations. Continued research in this area can be further conducted, which may lead to the development of strategic and technological framework to counter cyber terrorism.
.
Keywords-component; Cyber Terrorism, Cyberspace, ICT, Terrorism
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
23. Paper 30091152: Cooperative Cognitive Ecology in Self-organizing Networks: A Review Article (pp. 159-167)
Full Text: PDF

.
Dr. Mohsin Nazir, Prof. Dr. Farhat Saleemi
Department of Computer Science, LCW University, Pakistan

.
Abstract — This survey is based on the introduction, motivation, and proposed system for ecological treatment of self-organizing cooperative cognitive wireless communication. We introduced the application of related literature in the proposed wireless communication scenario. The cooperative cognitive system resembles with the symbiotic ecological model of sharing mutual resources. This philosophy is nature inspired and system evolves with autonomous mutual interaction without any centralized controller. In other words, we can say it as evolutionary game, because of the biological game being played among the analogous biological species. Therefore, an overview of related stuff for ecological modeling for CCWC is introduced as may be implementable in other engineering disciplines.
.
Index Terms—Cooperative Cognitive Ecology, Self-organizing Networks.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
24. Paper 30091155: Experimental Analysis of Performance of Wireless LAN (pp. 168-174)
Full Text: PDF

.
U. Ahmad, S.A. Raza, T. Mustafa, Department of Computer Science, University of Agriculture, Faisalabad
Dr. Mohsin Nazir, Dept. of Information and Communications Technologies, Lahore College for Women University

.
Abstract - Wireless local-area networks based on IEEE 802.11 a/b/g standards are growing rapidly. WLANs can provide the benefits of network connectivity without the restrictions of being tied to a location or restricted by wires. Despite the convenience of mobility, the performance of a WLAN must be addressed carefully before it can be adopted and deployed in any environment. In our research, we addressed the impact of various key parameters on the actual performance of IEEE 802.11g. We performed series of experiments to assess the performance of IEEE802.11g, in the presence of interferences, and finding the maximum through-put under realistic conditions. In addition the impact of co-channel, adjacent channel interferences and noises on the quality of WLAN speed was also exposed. Overall, we conducted independent set of experiments to measure the IEEE 802.11g’s effective application-level throughput. The analysis results and measurement provided insights into the required provisioning for 802.11g WLAN to ensure that it will provide the needed coverage and capacity for the intended users.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
25. Paper 30091156: Cooperative Cognitive Ecological System for Wireless Communications (pp. 175-180)
Full Text: PDF

.
Dr. Mohsin Nazir, Prof. Dr. Farhat Saleemi
Department of Information & Communications Technologies, LCW University, Pakistan

.
Abstract — This paper analyzes the cooperative cognitive wireless communication (CCWC) model based on biological mutualism (BM). In BM, different types of species help each other for mutual existence in the ecosystem. We tried to formulate our CCWC problem similarly like BM scenario, and examined how the bandwidth resource would be shared with each other for mutual existence, and the number of primary and secondary users which can coexist based on the available bandwidth resource.
.
Index Terms—Cooperative Cognitive Wireless Communications; Ecological Systems.
.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------






Comments