An Improved Fuzzy Logic System for Handoff Controller Design in Micro Cellular Mobile Network
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.1-5, Jul-2015
Abstract
Wireless and mobile networks are rapidly extending their capabilities . The continuation of an active call is the most important quality measurements in cellular systems. Handoff process provides such a facility for cellular system. Handoff is the mechanism which provides the service of transferring the ongoing call from one Base station (BT) to another when the mobile terminal (MT) crosses the coverage boundary of two networks in order to avoid call termination .Handoff controller takes decision by periodically checking the measurement criteria (parameters) for continuation of an Active Call .To address Better Handoff Controller, The Best Approach is to have more checking parameters (measurement criteria) into account for taking handoff decision .This Paper Represents the use of two more meaning full parameters along with the existing parameters using the fuzzy logic (ANFIS). With this Handoff Decision Improved and Problems such as more network load and interference are removed and Number of Handoffs are Reduced.
Key-Words / Index Term
Handoff, Cellular networks, Fuzzy Logic, QoS , Signal strength, Network load, SIR
References
[1] Dayal C. Sati1, Pardeep Kumar2, Yogesh Misra3 , “Fuzzy Logic Based Handoff Controller for Microcellular Mobile Networks. IJCEM International Journal of Computational Engineering & Management”, Vol. 13, July 2011
[2] Hongxia Zhao†, Rongsheng Huang‡ , Jietao Zhang† and Yuguang Fang, “Handoff for wireless networks with mobile relay stations”. IEEE WCNC 2011 – Network
[3] 1, Krupa Rasane , 2, Nayan Jadhav, “implementation of fuzzy logic controller for mobile handoff on FPGA”. (IJES) ||Volume||2 ||Issue|| 5 ||Pages|| 120-125||2013||.
[4] M.SAZEEDA KAUSAR, DHANARAJ CHEELU, “Context Aware Fuzzy Rule Based Vertical Handoff Decision Strategies for Heterogeneous Wireless Networks”. International Journal Of Engineering And Science Vol.3, Issue 7 (August 2013).
[5] Ferdinand Christopher,Dr. M. K. Jeyakumar, “A Novel Congestion based Approach for Vertical Handover” International Journal of Latest Trends in Engineering and Technology (IJLTET). Vol. 2 Issue 2 March 2013.
[6] Girish Kumar Verma , “Study and Survey on handoff failure in cellular Network and its minimization techniques” International Journal of Engineering and Technical Research (IJETR)ISSN: 2321-0869, Volume-2, Issue-12, December 2014
[7] Prof. Satish Deshpande , Trima Piedade Fernandes , “Implementation of Fuzzy Logic Model for Mobile Handover.” 2010 The 3rd International Conference on Machine Vision .
[8] A. Iera, A. Molinaro and S. Marano, “Handoff Management with Mobility Estimation in Hierarchical Systems”, IEEE Transactions on Vehicular Technology, vol. 51, Sept. 2002, pp. 915-934.
[9] Ali Safa Sadiq, Kamalrulnizam Abu Bakar, and Kayhan Zrar Ghafoor, “A Fuzzy Logic Approach for Reducing Handover Latency in Wireless Networks” Network Protocols and Algorithms ISSN 1943-3581 2010, Vol. 2, No. 4
[10] Nasif Ekiz, Tara Salih, Sibel Kucukoner and Kemal Fidanboylu, “An Overview of Handoff Techniques in Cellular Networks” International Journal of Information Technology Volume 2 Number 2, 2003, pp. 1207-1212
Citation
Gurpreet Singh and Amanpreet kaur, "An Improved Fuzzy Logic System for Handoff Controller Design in Micro Cellular Mobile Network," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.1-5, 2015.
Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.6-11, Jul-2015
Abstract
Disconnected MANETs have been called as challenged networks and Delay-Tolerant Network (DTN). A DTN provides interoperable communications with and among challenged environments. A challenged network is defined as a network that has one or more of the following characteristics: high end-to-end path latency; end-to-end disconnection meaning a path between a node pair may never exist; limited resources or limited life expectancy either due to lack of battery power, such as in sensor networks, or node damage as may occur in battlefield deployments. Such networks may never have an end-to-end path from source to destination at a given time. Security concerns for delay-tolerant networks vary depending on the environment and application, though authentication and privacy are often critical. The proposed model implements trust and security management protocols for delay tolerant and self contained message forwarding applications based on information centric networks architecture. Further, it is aimed to test the dynamic trust management protocol design on other trust based DTN applications for showing better utility of the algorithm.
Key-Words / Index Term
Verification and Validation; Delay Tolerant Networking; Secure Routing; Performance Analysis
References
[1] Ing-Ray Chen, Fenye Bao, “Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 5, MAY 2014, pp.1200-1210.
[2] W. Stallings, Network Security Essentials: Applications and Standards. Prentice Hall Pearson Education Inc., 2003.
[3] P. Windley, Digital Identity. O'Reilly, 12, Aug. 2005.
[4] R. S. Sandhu and P. Samarati, Access Control: Principles and Practice," IEEE Communications Magazine, vol. 32, no. 9, pp. 40{48, 1994.
[5] R. Sinnott, D. W. Chadwick, T. Doherty, D. Martin, A. J. Stell, G. Stewart, L. Su, and J.Watt, Advanced Security for Virtual Organisations: Exploring the Pros and Cons of Centralised vs Decentralized Security Models," in 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid), Lyon, France, May 2008, May 2008.
[6] T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.1." Request for Comments RFC 4346, April 2006.
[7] S. Shirasuna, A. Slominski, L. Fang, and D. Gannon, Performance Comparison of Security Mechanisms for Grid Services," in GRID '04: Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, (Washington, DC, USA), pp. 360{364, IEEE Computer Society, 2004.
[8] National Institute of Standards and Technology, Secure Hash Standard (SHS), FIPSPUB 180-1." http://www.itl.nist.gov/_pspubs/_p180-1.htm, 1995. (Visited December 2008).
[9] M. Benantar, Access Control Systems: Security, Identity Management and Trust Models. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2005.
[10] S. P. Marsh, “Formalising Trust as a Computational Concept,” Department of Computing Science and Mathematics, University of Stirling, Stirling, UK, 1994.
[11] E. Aivaloglou, and S. Gritzalis, “Trust–Based Data Disclosure in Sensor Networks,” IEEE International Conference on Communications, 2009, pp. 1-6.
Citation
M. Arshiya Shajareen and S.Vasundra , "Trust and Security Management Protocol for Delay Tolerant Networks Using Information Centric Network Architecture (ICNA)," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.6-11, 2015.
Hybrid Parallel Multithreading Encryption
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.12-20, Jul-2015
Abstract
Cloud computing is a new area for the field of research. In the current scenario the server and client architecture is advanced giving rise to speed and reliability and is been shifting from distributed or cluster to cloud architecture since cloud architecture maintains the server in various number of features. The main part of this research relies on a robust architecture which deals with Cloud Storage as a Service (SAAS) and comparative security measures of improvement and modifications. Various security measures have been studied during this research which is briefly described in various sections of this report. The main motive of shifting the platform to cloud is its “popularity” and “portability”. Smart phone devices are booming in market and it covers most of the works of people which was earlier used to done by the help of computer. We can read mails with push notifications facility, we can communicate and store large number of data in mobile devices thus the technology is shifting from distributed to cloud platform. Client Server Architecture- this method is a first part of study of this thesis which was needed to be developed before moving onto the next levels of Cloud Computing. The client section was a simple application for user which was made on Socket Programming in Java. Application connection was made with Server which is a LAN based server on which data is to be uploaded and downloaded. Analyzing RSA and NTRU in parallel computing environment is developed, then it needs to be secured with a particular algorithm or technique. The algorithm studied is known as RSA key oriented algorithm which offers dynamic security on client and server level during communication. The other technique for advancing the level of scalability and improvement alone the network layer we used is NTRU encryption.
Key-Words / Index Term
RSA, LOSSY, SAAS
References
[1] B. Padmavati and S. Ranjitha Kumari “Security and performance analysis of DES, RSA and RSA algorithm with LSB substitution technique” International Journal of Computer Science Vol-2, Issue-4, Page No.170-174, April-2013
[2] Dr. C. Sunil Kumar, J. Seetha, S.R Vinotha “Security implications of Distributed parallel cloud database management system models” International Journal of Software Computing and Software Engineering, Vol-2, Issue-11,Page no-20-28, 2012.
[3] Dr. Lokanatha C. Reddy “A Review on Data mining from Past to the Future”, International Journal of Computer Applications (0975 – 8887), Vol-15, Issue-7, Page No. 19-22, February - 2011.
[4] Gupta V.K., Sheetlani Jitendra, Gupta Dhiraj and Shukla Brahma “Data concurrency control and security issues of Distributed parallel cloud database transaction” NIMS University, Jaipur, Rajasthan, INDIA Vol-1, Issue-2, Page No. 70-73, August-2012.
[5] Gurkamal Bhullar and Navneet Kaur “Concurrency and security control with NTRU” International Journal of Innovative Research in Computer Science and Communication Engineering Vol-2, Issue 3, March 2014.
[6] He.Debiao, Chen Jianhua and Hu Jin “Random Number Generator based on the NTRU Cryptosystem” Maejo Int. J. Science Technology Vol-4, Issue-3, Page No. 428-434, 2010.
[7] Ilker Kose “Data and Network Security” Springer, 2002 GYTE, Computer Science, Page No. 1-9.
[8] Kalyam M Raval, “Data Mining Techniques”, Advanced Research in Computer Science and Engineering Vol-I, Issue IV, Page No. 1-7, Sep 2014.
[9] Manpreet “Concurrency control in Distributed parallel cloud database system” International Journal of advanced research Vol 3, July 2013.
[10] MD. Tabrez Quasim “Security issues in Distributed parallel cloud database system model” International Journal of Advanced Computer Science Department Vol-2, Issue 12, Page No. 396-399, December 2013.
[11] Navjot Kaur and Jaspreet Kaur Shaiwal “Efficient k mean algorithm, using ranking algorithm”, International Conference in Computer Engineering and Technology Vol- 1, Issue 3, May 2012.
[12] Obaidan A.Rawashdeh, “Optimistic approach in Distributed parallel cloud database concurrency control” Journal Conference on Computer Science in Amman University in year 2013.
[13] Parsi Kalpana and Sudha Singaraju, ”Data security in cloud computing using RSA algorithm, International Journal of Research in Computer and Communication Technology,Vol-1,Issue-4,Pageno-143-146,September 2012.
[14] Ranjit Ranjan, Dr.A.S Baghel, Sushil Kumar “improvement of NTRU cryptosystem” international journal of advanced research in computer science Vol-2, Issue-9, Page No. 79-84 September 2012.
[15] Ran Vijay Singh and M.P.S Bhatia , “Data Clustering with Modified K-means Algorithm”, IEEE International Conference on Recent Trends in Information Technology, ICRTIT, Vol-3, Issue-11, Page No. 1283-1286, Nov 2013.
[16] Shashi Mehrotra Seth and Rajan Mishra “Comparative Analysis of Encryption Algorithm for Data Communication”, International Journal of Computer Science and Technology, Vol-4, Issue-8, Page no-348-354, August 2014.
[17] Sheetlani Jitendra and Gupta V.K. "Concurrency Issues of Distributed Advance Transaction Process”, Res. J. Recent Sci., Issue-1(ISC-2011), Page No. 426-429 , 2012
[18] Subedari Mithila, P. Pradeep Kumar, Subedari Mithila et al “Data Security through Confidentiality in Cloud Computing Environment”,(IJCSIT) International Journal of Computer Science and Information Technologies, Vol-2 , Page No.1836-1840, 2011
[19] Swadeep Singh and Anupriya Grag “Comparison of cryptographic algorithm ECC and RSA”, International Journal of Computer Science and Communication Engineering, Vol-6, June 2013.
[20] Vishma Gupta and Gajendra Singh “Advanced cryptography algorithm for improving data security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol-2 Issue-1, January 2012.
[21] YashPal Mote and Shekhar Gaikward, “Superioer Security Data Encryption Algorithm”, International Journal of Computer Scienece, Vol- 6, Page no-171-181 , July 2012.
Citation
Deepali and Namita Kakkar , "Hybrid Parallel Multithreading Encryption," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.12-20, 2015.
Media Performance Analysis to increase the Audio quality in Multimedia Services
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.21-26, Jul-2015
Abstract
Mobile communication has drastically increased in the software industry. Multimedia services in mobile communication has also increased its importance. Circuit Switched is now replaced by packet switched by most of the industries. These packets transmission is affected by the varied network parameters. The Audio is also transmitted in packets. The loss of packet or delay of the packet reduces the audio quality on the receiver side. To manage the packets and to maintain smooth audio quality various jitter buffer algorithms are implemented. The Performance of the jitter buffer algorithm affects the quality of audio. Our system analysis the jitter buffer management algorithm used on the receiver side to manage the packets arrived out of order, packet loss or duplicate packets received. The Media Performance Analysis System/tool checks the performance for varied network condition, different audio codecs and for different network profiles. It helps in easy analysis for the performance of the JBM .
Key-Words / Index Term
Jitter buffer management, Amr-NB, Amr-WB, SIP, RTP, MTSI, Forward Error Correction VOIP
References
[1] Enhanced Adaptive Playout Scheduling and Loss Concealment Techniques for Voice over IP Networks. Dinei Florencio and Li-Wei He Microsoft Research One Microsoft Way, Redmond, WA 98052 I. F. Akyildiz, and X. Wang, “A Survey on Wireless Mesh Networks”, IEEE Radio Communications, Vol.43, Issue-3, 2005, pp.23-30.
[2] ITU-T Recommendation H.323 : Packet-Based Multimedia Communications Systems. February 1998.
[3] ITU-T Recommendation H.225.0 : Media Stream Packetization and Synchronization on Non- Guaranteed QualityofServiceLANs.November.
[4] A System for Buffer Management in Voice Communication. World Applied Sciences Journal 21 (9): 1305-1308, 2013 ISSN 1818-4952 © IDOSI Publications, 2013 DOI: 10.5829/idosi.wasj.2013.21.9.2886
[5] On Packet Loss Performance under Varying Network Conditions with Path Diversity Richard Haywood and Xiao-Hong Peng Electronic Engineering Aston University Birmingham, United Kingdom haywoorj@aston.ac.uk
[6] Dynamical Management of Dejitter Buffers Based on Speech Quality. Raquel F. do Valle, Leandro S. G. de Carvalho, Regeane B. Aguiar, Edjair S. Mota, Dio´genes Freitas Computer Science Department – Federal University of Amazonas (UFAM) Manaus – Amazonas – Brazil
[7] Technical Specification Group Services and System Aspects (2006), IP Multimedia Subsystem (IMS), Stage 2, TS 23.228, 3rd Generation Partnership Project
[8] Alexander Harrowell, Staff Writer (October 2006), A Pointless Multimedia Subsystem?, Mobile Communications International, archived from the original on September 2010.
[9] Rajinder Singh, “4G By WiMAX2 and LTE-Advance”, International Journal of Computer Sciences and Engineering, Volume-01, Issue-03, Page No(36-38).
Citation
Sheela D and Anil Kumar K M , "Media Performance Analysis to increase the Audio quality in Multimedia Services," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.21-26, 2015.
E-Governance Status in India
Review Paper | Journal Paper
Vol.3 , Issue.7 , pp.27-31, Jul-2015
Abstract
E-governance refers to the delivery of government information and services via the Information and communications technology (ICT) to citizens or businesses or governmental agencies. The purpose of this paper is to present the status of e-Governance in India. The paper discusses the initiatives taken by Government of India to computerize Government to Citizen (G2C), Governance to Business (G2B) and Government to Government (G2G) services. The important G2C services like National Rural Employment Guarantee Scheme (NREGS) and Dial.Gov; G2B services like Ministry of Corporate Affairs and e-Biz and G2G services like SmartGov of Andhra Pradesh and e-Office are presented in detail. Tools and Technologies are adopted for providing e-Governance services are explained. The issues in digital governance like Cyber Crime and lack of Citizen Unique Identity are also mentioned. Government projects in pipeline and future projects are also included. It is concluded that e-Governance in India enables people to have efficient, effective, transparent and accountable services.
Key-Words / Index Term
Intelligent Search Engine, E-office, E-services, NEGP, E-governance
References
[1] J. C. Bertot, P. T. Jaeger, and C. R. Mcclure, “Citizen-centered E-Government Services : Benefits, Costs, and Research Needs,” Annual International Digital Government Research Conference: 137-142. Montreal, Canada, May 18-211, 2008.
[2] Dr. Sanjay Kumar Dwivedi, Ajay Kumar Bharti, E-GOVERNANCE IN INDIA – PROBLEMS AND ACCEPTABILITY, Journal of Theoretical and Applied Information Technology, 2010
[3] A.SHRABAN KUMAR, G.JAYARAO, A Model for Component Based E-governance Software Systems, International Journal of Application or Innovation in Engineering & Management, ISSN 2319 – 4847, Volume 2, Issue 11, November 2013
[4] R. K. Das and M. R. Patra, “A Service Oriented Design Approach for E-Governance Systems,” International Journal of Information Technology Convergence and Services (IJITCS) Vol.3, No.3, June 2013
[5] U. Waziri, J. Dan, S. Danjuma, M. J. Usman, and A. Aliyu, “Online Integrated Information System For Demography In Nigeria Based On Browser- Server Structure,” vol. 3, no. 2, International Journal of scientific & technology research, 2014.
[6] N. Pandey, “National E-Governance Plan Revisited : Achievements and Road Ahead,” CSI.
[7] Rajagopalan M.R, Solaimurugan vellaipandiyan, Big Data Framework for National e-Governance Plan, IEEE, ISSN 978-1-4799-2295, 2013
[8] A. Gilmore and C. D. Souza, “Service excellence in e-governance issues : An Indian case study,” vol. 1, no. 1, pp. 1–14, 2006.
[9] http://deity.gov.in/content/research-development
[10] Shailendra Singh , D. Singh Karaulia, " E-Governance: Information Security Issues," International Conference on Computer Science and Information Technology (ICCSIT'2011) Pattaya Dec. 2011
[11] A. Krishnan, K. Raju, and A. Vedamoorthy, “Unique IDentification (UID) based model for the Indian Public Distribution System (PDS) implemented in Windows embedded CE,” 13th Int. Conf. Adv. Commun. Technol., pp. 1441–1445, 2011.
[12] S. C. J. Palvia and S. S. Sharma, “E-Government and E-Governance : Definitions / Domain Framework and Status around the World,” Computer Society of India, New York, pp. 1–12, 2007.
[13] G. P. Kumari, B. Kandan, and A. K. Mishra, “Experience sharing on SOA based heterogeneous systems integration,” Proc. - 2008 IEEE Congr. Serv. Serv. 2008, vol. PART 1, pp. 107–108, 2008.
[14] R. Anane, R. Freeland, and G. Theodoropoulos, “e-Voting Requirements and Implementation,” 9th IEEE International Conference on E-Commerce Technology, 2007.
[15] http://negp.gov.in/index.php
[16] http://dial.gov.in
[17] http://eoffice.gov.in
[18] http://www.cert-in.org.in
[19] http://vidcon.nic.in
[20] http://attendance.gov.in
[21] U. Nations, E-Government Survey 2014. 2014
Citation
Ajay Dutta and M. Syamala Devi , "E-Governance Status in India," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.27-31, 2015.
A Survey on Security in Mobile Ad-Hoc Network and Solutions
Survey Paper | Journal Paper
Vol.3 , Issue.7 , pp.32-36, Jul-2015
Abstract
Ad hoc networks are temporary networks connection established for a small session, self-configured and organized networks without any fixed infrastructure. In Ad hoc networks, topology is dynamic as nodes communicate the network “on the fly” for a special purpose (such as transferring data between one computer to another). A Mobile Ad hoc network (MANET) is a dynamically arrangement of wireless Mobile nodes, communicate directly or using intermediate nodes without any predefined infrastructures. In the absence of any predefined infrastructures in networks become vulnerable to number of attacks and high level security becomes a major issue. In this survey paper, we first discuss the introduction to Mobile Ad hoc network. The second section discusses weaknesses or vulnerabilities in Mobile Ad hoc network. The third section discusses the types of attack in Mobile Ad hoc network. The fourth section discusses the security goals of Mobile Ad hoc network. Finally the last section discusses the security solutions to prevent the attacks and provide a high level security to Mobile Ad hoc networks.
Key-Words / Index Term
Mobile Ad Hoc Networks, Attacks, Security, Solutions
References
[1]. Marco Conti, Body, Personal and Local Ad Hoc Wireless Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 1), CRC Press LLC, 2003.
[2]. M. Weiser, The Computer for the Twenty-First Century, Scientific American, September1991.
[3]. [3] M.S. Corson, J.P. Maker, and J.H. Cernicione, Internet-based Mobile Ad Hoc Networking, IEEE Internet Computing, pages 63–70, July-August 1999.
[4]. Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003.
[5]. Lidong Zhou and Zygmunt J. Hass, Securing Ad Hoc Networks, IEEE Networks Special Issue on Network Security, November/December 1999.
[6]. Yongguang Zhang and Wenke Lee, Security in Mobile Ad-Hoc Networks, in Book Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer, 2005.
[7]. Panagiotis Papadimitraos and Zygmunt J. Hass, Securing Mobile Ad Hoc Networks, in Book The Handbook of Ad Hoc Wireless Networks (Chapter 31), CRC Press LLC, 2003.
[8]. Yi-an Huang and Wenke Lee, A Cooperative Intrusion Detection System for Ad Hoc Networks, in Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, 2003, pp. 135 – 147.
[9]. Data Integrity, from Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Data_integrity.
[10]. P. Papadimitratos and Z. J. Hass, Secure Routing for Mobile Ad Hoc Networks, in Proceedings of SCS Communication Networks and Distributed Systems
Citation
Navneet Kumar, "A Survey on Security in Mobile Ad-Hoc Network and Solutions," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.32-36, 2015.
Square of An Enormously Large Number
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.37-44, Jul-2015
Abstract
In this world of extremely fast and effective manipulations and calculations, the requirements for the time taken by a computation needs to be nailed down to the extreme low as possible. The time required for calculations doesn't come up as an issue unless you type in a really huge number, like a number including 100-digits or so. When this kind of number is required to be processed upon, our computer systems take quite a while to process upon the operations being performed on the number. A process for quick and easily manipulated computations is required to be produced, in order to increase the productivity, convenience, ease of use and fairly deal with budgetary concerns. This document provides general practices, procedures and tools for creating a faster computation of square of extremely large numbers. It is aimed for engineers, Mathematical gurus, algorithm geeks, who are assumed to possess basic knowledge regarding what is meant by square of a number. It addresses basic knowledge about how to calculate the square using conventional means and how the improvement can be made to save time.
Key-Words / Index Term
Square of a number, Time-Complexity, Algorithm Design
References
[1] Dive Into Python, Mark Pilgrim, Published 20th May 2004
Citation
Harsh Bhardwaj, "Square of An Enormously Large Number," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.37-44, 2015.
E-recruitment Tiered Architecture in Feasibility Study Role
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.45-51, Jul-2015
Abstract
One of the very important complement for feasibility study after log to connect to the recruitment management process is refers to study of feasibility in order to find out it’s feasible or not! For example; Traditional recruitment (TR) is not as feasible as the one tier architecture (1TA) recruitment due to the unordinary problematic-output results of TR and hazard create to health and safety. 1TA recruiting is computerized but it is run over dump-client/server based connection and the output result is better than TR, but its again not optimized output results. Nevertheless the intelligent-client/server based connection over (2TA, 3TA and NTA) systems are more feasible then the 1TA as simplicity- output results with excellent time-consume, while the personal computers (PCs) become more popular and powerful as smart terminals. Hence, the today’s users (especially youngster society) neither satisfied with the TR processes nor 1TA recruitment processing. After problem identifying and going toward to feasibility study to sort out of: What feasibility study type used from the TELOS (TELOS: five factors are collectively known as Technology, Economic, legal, operational, and Schedule) to achieve recruitment system over tiered architecture? But another important factor as a new contribution in this paper are used namely quality of output in the respect of time-consume by response time in mille-seconds measurement unit. Both Two tier architecture (2TA) and three tier architecture (3TA) are more feasible than the 1TA and TR due to implantation of feasibility study with those five factors been mentioned and some other factors. In this paper, the quality of output and Design architecture of the system are another factor for deciding the level of system feasible. There is a direct relation between (output result and Design architecture) with feasibility study. The five mentioned factors are working collectively for providing better output result time. This paper shows the role of feasibility study in Tiered architecture design by response time or load time recruitment system.
Key-Words / Index Term
Feasibility study, Tier Architectures, Recruit, Quality of Output, Performance
References
[1] Ankita Aggrawal, Neha Chaturvedi, Devendra Singh Sisodia,“Supermarket Billing System”, International School of Informatics & Management, Jaipur, India ,2010
[2] P. G. Chaitanya, Dr. K.V.Ramesh,” Feasibility study on component based software architecture for large scale software systems”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 201.
[3] Simon Horsburgh, John D Langley,“Recruitment and retention of farm owners and workers for a six-month prospective injury study in New Zealand: a feasibility Study”, Journal of Occupational Medicine and Toxicology, New Zealand, 2011.
[4] Joseph Fong, Riemann Hui,” Application of middleware in the three tier client/server database design methodology”, Brazil, 1999.
[5] Kamaran Faraj, “Automated recruitment system”, University of Sulamani, 2010.
[6] S. Somasegar, S. Guthrie. Patterns & practices Application Architecture Guide Layer Diagrams, 2010.
[7] Dr.kamran.Faraj, Gheyath.Osman” Tiered Architecture Analysis of Web Based Healthcare Systems, 2014.
Citation
Kamaran Hama Ali. A. Faraj, "E-recruitment Tiered Architecture in Feasibility Study Role," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.45-51, 2015.
Performing Efficient Phishing Webpage Detection
Research Paper | Journal Paper
Vol.3 , Issue.7 , pp.52-56, Jul-2015
Abstract
Along with deployment of internet, saving financial and sensitive information becomes more inconvenient. One of the problems faced today is growing number of phishing websites. Phishing websites are fake webpage shaped and used by phishers to copy the web pages of legitimate websites which results in lack of faith in internet based services and causes financial loss to the internet users. So it has become crucial to search for useful solution applicable for such phishing websites. Therefore, establishing useful solution for mitigating phishing websites is essential to reduce the incident of being victimized by phishing attack. This research paper employs approach that uses fuzzy logic with classifiers like SVM, NMC and Gaussian. Fuzzy based detection system provides effective aid in detecting phishing websites. It successfully resulted in low false positive and high true positive for classifying phishing websites.
Key-Words / Index Term
Phishing;SVM;Gaussian; Fuzzy Logic;Feature Collection
References
[1]Aburrous, M., Hossain, M.A.; Thabatah, F.; and Dahal, K. (2008): Intelligent phishing website detection system using fuzzy techniques. Information and Communication Technologies: From Theory to Applications. ICTTA. April 7-11, 2008, pp.1-6.
[2] Cyren report
[3] The Economic Times news
[4] Andrew H.Sung, Ram Basenet, Srinivas Mukkamala.(2008) “Detection of Phishing Attacks: A machine Learning Approach”. InB. Parsad, editor, Springer ,Soft Computing Applications in Industry, Studies in Fuzziness and Soft Computing, volume 226, pages 373–383.
[5] Anh Le,Athina Markopoulou,Michalis Faloutsos:PhishDef: URL Names Say it All.
[6] Santhana Lakshmi V, Vijaya MS, (2012) : Efficient prediction of phishing websites using supervised learning algorithms, Procedia Engineering 30 pp.798 – 805.
[7] Jiang, Hansi; Zhang, Dongsong; and Yan, Zhijun (2013):A Classification Model for Detection of Chinese Phishing E-Business Websites, PACIS Proceedings, Paper 152.
[8] Rami M. Mohammad, Fadi Thabtah.(2012): An assessment of features related to phishing websites using an automated technique. Internet Technology and Secured Transactions, pp-492-497.
[9] Adi Sutanto, Jui-Lin Lai, Muhammad Khurram Khan, Mingxing He, Pingzhi, Rong-Jian Chen,, Ray-Shine Run, Shi-Jinn Horng,(2011):An efficient phishing webpage detector. Expert Systems with Applications,38, pp.12018–12027.
[10] Comparison of generalization properties of statistical and neural classifiers available at< http://www.mif.vu.lt/~valdas/PhD/TEXT/CHAPTER4.pdf>.
[11] PhishTank. [Online]. Available from: http://www.phishtank.com/.
[12] Antiphishing Working Group, Available from: www.antiphishing.org/reports/apwg-reports.
[13] Zhang, Y., Hong, J., and Cranor, L. (2007). CANTINA: A Content-Based Approach to Detecting Phishing Websites. Proceedings of the 16th International Conference on World Wide Web. pp. 639-648.
[14] Rashmi Gupta, Nivit Gill. (2013): Token Based Security for Prevention of Phishing Attack at Client Side. International Journal of Emerging Technologies in Computational and Applied Sciences, pp.184-189.
[15] Ram B. Basnet, Andrew H. Sung, Quingzhong Liu.(2014): Learning to detect phishing urls. IJRET: International Journal of Research in Engineering and Technology, pp.11-14.
[16] Mingxing He, Horng SJ, Fan P, Khan MK, Run RS, Lai JL, Chen RJ.(2011) “An efficient phishing webpage detector. Expert Systems with Applications”, An International Journal. pp. 12018-12027.
Citation
Samanjeet Kaur and Sukhwinder Sharma, "Performing Efficient Phishing Webpage Detection," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.52-56, 2015.
Clustering Algorithms in Data Mining: A Comprehensive Study
Review Paper | Journal Paper
Vol.3 , Issue.7 , pp.57-61, Jul-2015
Abstract
Distribution of dataset into a set of homogeneous clusters is the elementary operation in data mining. Clustering is the key technique of distribution in data mining. Clustering is the method of grouping data objects in such a way that the data objects in the same cluster are more similar (intra-cluster similarity) to each other and are less similar to data objects in other cluster (inter-cluster similarity). Clustering can be done with different algorithms. In this review paper, a survey of clustering and its different techniques is done. This paper covers some of the partitioning and hierarchical clustering algorithms.
Key-Words / Index Term
Clustering, Clustering Techniques, Partitioning Clustering, Hierarchical Clustering, K-Means, K-Medoid, Birch
References
[1] K.Kameshwaran, K.Malarvizhi, “Survey on Clustering Techniques in Data Mining”, 2014 International Journal of Computer Science and Information Technologies, Vol. 5 (2) , 2014, 2272-2276
[2] Deepti Sisodia, Lokesh Singh, Sheetal Sisodia, Khushboo saxena, “Clustering Techniques: A Brief Survey of Different Clustering Algorithms” 2012 International Journal of Latest Trends in Engineering and Technology, Vol. 1, Issue 3 ,September 2012
[3] Saurabh Shah,Manmohan Singh, “Comparison of A Time Efficient Modified K-mean Algorithm with K-Mean and K-Medoid algorithm”, 2012 IEEE International Conference on Communication Systems and Network Technologies.
[4] Shalove Agarwal, Shashank Yadav, Kanchan Singh, “K-means versus K-means ++ Clustering Technique”, 2012 IEEE Second International Workshop on Education Technology and Computer Science
[5] Shi Na , Liu Xumin, Guan yong , “Research on k-means Clustering Algorithm An Improved k-means Clustering Algorithm”, 2010 IEEE Third International Symposium on Intelligent Information Technology and Security Informatics.
[6] NidalIsmael, Mahmoud Alzaalan , WesamAshour, “Improved Multi Threshold Birch Clustering Algorithm” 2014 International Journal of Artificial Intelligence and Applications for Smart Devices, Vol.2 , No.1 (2014), pp.1-10.
[7] J. Han and M. Kamber,“Data Mining: concepts and techniques”, Beijing: China Machine Press, Third Edition (2012).
[8] R.Xu, “Survey of Clustering Algorithms” 2005 IEEE Trans.Neural Networks.
[9] Archana Singh, Avantika Yadav, Ajay Rana, “
K-means with Three different Distance Metrics”, 2013 International journal of computer Applications.
[10] S. N. Alsaleh, R. , Yue Xu, "Grouping people in social networks using a weighted multi-constraints clustering method ", 2012 IEEE InternationalConference on Fuzzy Systems (FUZZ-IEEE), pp. 1-8, 2012
[11] Yogita Rani, Manju , Harish Rohil, “ Comparative Analysis of BIRCH and CURE Hierarchical Clustering Algorithm using WEKA 3.6.9” , 2014 The SIJ Transactions on Computer Science Engineering & its Applications, (CSEA) Volume 3, Number 10 (2013), pp. 1115-1122.
[12] RichaDhiman, ShevetaVashisht, “A Cluster analysis and Decision Tree Hybrid Approach in Data Mining to Describe Tax Audit”, International Journal of Computers & Technology Volume 4 No. 1, Jan-Feb, 2013
[13] Manpreet Kaur, Usvir Kaur, “ Comparison Between K-Mean and Hierarchical Algorithm Using Query Redirection” 2013 International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 7, July 2013
Citation
Jaskaranjit Kaur and Gurpreet Kaur , "Clustering Algorithms in Data Mining: A Comprehensive Study," International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.57-61, 2015.