scispace - formally typeset
Search or ask a question

Showing papers in "Computer Engineering and Intelligent Systems in 2015"


Journal Article
TL;DR: A new OCCEM congestion control mechanism is introduced in multi-homing mode, based on an Active Queue Management (AQM) method, which can decrease packet loss, increase the amount of transmissions and stabilize queue length, as compared with standard O CCEM.
Abstract: In this paper, a new OCCEM congestion control mechanism is introduced in multi-homing mode. Congestion in each route can be avoided or can be controlled, based on an Active Queue Management (AQM) method. Also, routers compute probability of congestion for the sources on the paths and then notify them. Therefore, the sources can adjust their sending rates on each path effectively and if necessary, can switch to an alternate path to prevent congestion. Simulations have been conducted with Opnet linked with NS2. The simulation shows that the new method can decrease packet loss, increase the amount of transmissions and stabilize queue length, as compared with standard OCCEM. Keywords: OCCEM; AQM; congestion control

35 citations


Journal Article
TL;DR: Web usage mining is the data mining technique to mine the knowledge of usage of web data from World Wide Web for better understanding and serve the people for better web applications.
Abstract: World Wide Web is a vast collection of unstructured web documents like text, images, audio, video or Multimedia content. As web is growing rapidly with millions of documents, mining the data from the web is a difficult task. To mine various patterns from the web is known as Web mining. Web mining is further classified as content mining, structure mining and web usage mining. Web usage mining is the data mining technique to mine the knowledge of usage of web data from World Wide Web. Web usage mining extracts useful information from various web logs i.e. users usage history. This is useful for better understanding and serve the people for better web applications. Web usage mining not only useful for the people who access the documents from the World Wide Web, but also it useful for many applications like e-commerce to do personalized marketing, e-services, the government agencies to classify threats and fight against terrorism, fraud detection, to identify criminal activities, the companies can establish better customer relationship and can improve their businesses by analyzing the people buying strategies etc. This paper is going to explain in detail about web usage mining and how it is helpful. Web Usage Mining has seen rapid increase towards research and people communities.

9 citations


Journal Article
TL;DR: The paper proposed an approach to show how the ant colony optimization (ACO) can be applied to the MTSP with ability constraint.
Abstract: Ant Colony Optimization (ACO) is a heuristic algorithm which has been proven a successful technique and applied to a number of combinatorial optimization (CO) problems. The traveling salesman problem (TSP) is one of the most important combinatorial problems. Multiple traveling salesman problem (MTSP) is a typical computationally complex combinatorialOptimization problem, which is an extension of the famous traveling salesman problem (TSP). The paper proposed an approach to show how the ant colony optimization (ACO) can be applied to the MTSP with ability constraint. There are several reasons for the choice of the TSP as the problem to explain the working of ACO algorithms: it is an important NP-hard optimization problem that arises in several applications; it is a problem to which ACO algorithms are easily applied; it is easily understandable, so that the algorithm behavior is not obscured by too many technicalities; and it is a standard test bed for new algorithmic ideas as a good performance on the TSP is often taken as a proof of their usefulness. Keywords — Ant colony optimization, Traveling salesman problem

9 citations


Journal Article
TL;DR: Two important performance metrics are downtime and total migration time that the users care about most, because these metrics deals with service degradation and the time during which the service is unavailable.
Abstract: Cloud computing is an emerging computing technology that maintains computational resources on large data centers and accessed through internet, rather than on local computers. VM migration provides the capability to balance the load, system maintenance, etc. Virtualization technology gives power to cloud computing. The virtual machine migration techniques can be divided into two categories that is pre-copy and post-copy approach. The process to move running applications or VMs from one physical machine to another, is known as VM migration. In migration process the processor state, storage, memory and network connection are moved from one host to another.. Two important performance metrics are downtime and total migration time that the users care about most, because these metrics deals with service degradation and the time during which the service is unavailable. This paper focus on the analysis of live VM migration Techniques in cloud computing. Keywords: Cloud Computing, Virtualization, Virtual Machine, Live Virtual Machine Migration.

8 citations


Journal Article
TL;DR: Results will show that fuzzy logic can realize faster results, superior features, and better end product performance with respect to overshoots, oscillations and response time.
Abstract: In this paper, the modelling and simulation of a water tank level controller using fuzzy logic approach has been achieved. This project is aimed at the design and simulation of a fuzzy logic based controller that will provide a stabilized output response. In order to successfully achieve this project, emphasis was made on two areas; the foundational knowledge of fuzzy logic and the fuzzy inference system, and the definition of the tank system model and its parameters. The design was implemented using Fuzzy Logic Toolbox package and SIMULINK environment which can be found in MATLAB software. For the purpose of analysis, the controller was simulated using a variety of rules in order to test the effect of the rules on the fuzzy logic controller. Results will show that fuzzy logic can realize faster results, superior features, and better end product performance with respect to overshoots, oscillations and response time. Keywords: Fuzzy logic, Control System Design, Matlab, Simulink

5 citations


Journal Article
TL;DR: A new approach for attendance management is proposed to be used specifically for ordinary level schools using different technologies from mobile application development and RFID technologies.
Abstract: Mobile application development and RFID technologies are becoming popular in different applications. Mobile phone technology has continued to evolve in terms of computation power, speed, memory capacity and screen size. Many mobile applications for different activities especially on the Android platform as the free software are being developed. On the other hand, RFID technology is becoming the popular technology in tracking and detecting objects for the purpose of locating and ensuring security of movable equipments. This paper discusses different systems proposed for attendance management using different technologies. Based on this discussion a new approach for attendance management is proposed to be used specifically for ordinary level schools Keywords: RFID, Radio Frequency Identification, Attendance management system, Android Mobile application, Secondary Schools.

5 citations


Journal Article
TL;DR: A prototype of a microcontroller-based control car garage ATMEGA 8535, which can be controlled by using the remote control, keypad and infrared sensors and which is a password, so that car garage open and close system can still be used even if not using theRemote.
Abstract: In this study have designed a prototype of a microcontroller-based control car garage ATMEGA 8535. The workings of this car garage can be controlled in three ways. First by using the remote control, both by means of pressing the keypad, the third by using infrared sensors. The first is the use of remote control, remote control that has been made to control the garage door to open and close the car from a maximum distance of 30 meters. The second is the use of control keypad, keypad is used to control the opening and closing car garage in close proximity so that the user can embroider the keypad button corresponding to the data / bits that have been specified. The third is the use of control infrared sensors, infrared sensors can control car garage open and close automatically to the car objects directly. The remote control as the control system works by encoding the data bits / binary sent and received microcontroller ATMEGA 8535 after passing the lopping on the microcontroller. While the door sensor control system uses an infrared LED and photodiode transceiver as receiver for detecting cars that will exit / entry garage, so when detected car passing through the infrared sensor, the control system will open car garage. In addition to using the remote control system such as control, keypad and infrared sensors, controllers car garage is a password, so that car garage open and close system can still be used even if not using the remote. Keyword : ATmega8535 microcontroller, remote control, keypad, infrared sensors, car garage, infra red LED, photodiode.

4 citations


Journal Article
TL;DR: This paper introduces an algorithm for task scheduling based on assigning priorities for tasks according to their profits, where examples of usage of the algorithm are provided and it is compared to some of the traditional cloud scheduling algorithms.
Abstract: Cloud computing is based on the pay-per-use; hence, the price of usage is one of the main factors for cloud services’ customers when selecting the cloud provider to rent the service from. Hence, cloud providers need to provide competitive costs of the services for the users. Therefore, the cloud providers, in addition to optimize the utilization of the resources, aim to provide the service with the competitive cost at the same time. In order to achieve this, there is a need for a new set of economical task scheduling algorithms for the cloud. This paper introduces an algorithm for task scheduling based on assigning priorities for tasks according to their profits, where we provided examples of usage of the algorithm and compared it to some of the traditional cloud scheduling algorithms . Keywords: Cloud Computing, Scheduling, Priority, Resource Utilization.

4 citations


Journal Article
TL;DR: In this article, the design and realization of LINEARELY POLARIZED and DUAL FREQUENCY RECTANGULAR MICROSTRIP PATCH ANTENNA in S band at 2.42 GHz is reported.
Abstract: Design and realization of LINEARLY POLARIZED AND DUAL FREQUENCY RECTANGULAR MICROSTRIP PATCH ANTENNA in S band at 2.42 GHz is reported in this project paper. It is shown that the design adopted for different antennas is quite accurate. By using the conventional MIC fabrication technology compact, light weight microstrip antennas can be realized. The desired narrow band is achieved for the microstrip antennas. Antennas are designed and fabricated on the substrate of dielectric constant 4.22 and thickness 1.6mm. Simulation is done using the microwave software to achieve the desired results.At a frequency of 2.42 GHZ return loss is -27.0 dB. Also from smith chart it is seen that at a frequency of 2.42 GHz impendence offered by the antenna is resistive as well as inductive. From VSWR plot it is seen that VSWR offered by the antenna is 1.1 at a frequency of 2.42 GHz. Key w ords : Cavity model, VSWR, return loss, smith chart.

4 citations


Journal Article
TL;DR: The paper discusses the design, construction and operation of a program controlled power change over system that allows users to select the mode they would prefer to have their change over operate.
Abstract: Power failure is a key issue in many developing countries of the world. To sustain development, the need for alternative power supply becomes necessary. Changing between the main supply line and the alternative supply poses yet another problem. Many attempts have been made to develop automatic power changeover but without due consideration of the fact that there could be times when we need to regulate the behavior of the automatic change over. This paper therefore presents the design and construction of microcontroller based programmable automatic power change over. The paper discusses the design, construction and operation of a program controlled power change over system that allows users to select the mode they would prefer to have their change over operate. Three modes were achieved, including auto mode, timed mode and manual mode, which were selected from push buttons. LCD interface was used for the output display. 8051 microcontroller was used to implement the control program while modular methodology was adopted. Keywords: Microcontroller; power; change over; Programming; Automatic; Relay; Kick start; LCD.

4 citations


Journal Article
TL;DR: Results showed that DWRR outperforms the various types of Round Robin(Weighted Round Robin and Round Robin with server affinity )algorithms in terms of execution time (makespan) with the least complexity.
Abstract: Cloud Computing is a newly paradigm in computing that promises a shift from an organization required to invest heavily for limited IT resources that are internally managed, to a model where the organization can buy or rent resources that are managed by a cloud provider, and pay peruse. With the fast growing of cloud computing one of the areas that is paramount to cloud computing service providers is the establishment of an effective load balancing algorithm that assigns tasks to best Virtual Machines(VM) in such a way that it provides satisfactory performance to both, cloud users and providers. Among these load balancing algorithms in cloud environment Round Robin (RR) algorithm is one of them. In this paper firstly analysis of various Round Robin load balancing algorithms is done. Secondly, anew Virtual Machines (VM) load balancing algorithm has been proposed and implemented; i.e. ‘Divisible Weighted Round Robin(DWRR) Load Balancing Algorithm’. This proposed load balancing algorithm utilizes the Divisible Load Scheduling Theorem in the Round Robin load balancing algorithm. In order to evaluate the performance of this proposed algorithm (DWRR) the researcher used a simulator called CloudSim tool to conduct a test on the performances between the proposed algorithm (DWRR) and the types of Round Robin algorithms. After a thoroughly comparison between these algorithms, the results showed that DWRR outperforms the various types of Round Robin(Weighted Round Robin and Round Robin with server affinity )algorithms in terms of execution time (makespan) with the least complexity. Keywords: Scheduling Algorithm, performance, cloud computing, load balancing algorithm, Divisible Load scheduling Theory.

Journal Article
TL;DR: The results imply that students do access the online video lectures for learning purposes, however, more should be done, so as to approach near-optimal lengths of video lectures that facilitate a complete viewing of the learning material.
Abstract: Recent research has focused on the impact of video lectures on students’ academic performance rather than the viewing behavior of learners. In this study, we investigate the learners’ preferences of video lectures in terms of the length as well as the devices used to access the online learning material. We published two versions of video lectures on two YouTube channels. The online material was produced by recording a real face-to-face class context at the Arab Open University. The video recorded material belongs to a first level course offered to students at the Faculty of Computer Studies. The first version of the online lectures comprised 7 videos and is, hence, called long-run version. The second version, termed as short-run version, consisted of 28 video lectures. Video contents are identical in both versions. Total recording time amounted to 528 minutes in both video versions with an average of 75 and 19 minutes in long-run and short-run versions, respectively. We found that though students alternated between the use of mobile phones, tablets and desktops, however, they mainly accessed the online material through desktops. Moreover, students spent a total of 43765 minutes in viewing the long-run videos compared with 4766 minutes spent on the short-run ones. Considering the number of views (3143 for the long-run and 846 views for the short-run videos) yields average viewing times of 13.92 and 5.63 minutes per views for the long-run and short-run videos, respectively. This is interesting, for these results show that students are willing to spend approximately 14 minutes when viewing an approximately 75 minutes long video lecture, but when offered a 22 minutes long alternative, the time they spend in viewing does not exceed 6 minutes on average. Our results imply that students do access the online video lectures for learning purposes. However, more should be done, so as to approach near-optimal lengths of video lectures that facilitate a complete viewing of the learning material. Keywords: Video lectures, Blended learning, Viewing behavior, Big data analysis

Journal Article
TL;DR: The rain attenuation calculation from the updated ITU model was incorporated into the link budget to improve GSM communication during rainfall to predict a reliable communication ranges for the design and implementation of future G SM communication systems.
Abstract: This paper describes the various basic parameters necessary to determine a high level link budget for radio communication operating at 900MHz spectrum band. It considers a typical Lagos terrain by using the Okumura and Hata prediction model in calculating the path loss between a transmitter and mobile receivers. In this paper, the rain attenuation calculation from the updated ITU model was incorporated into the link budget to improve GSM communication during rainfall. These parameters can be used to predict a reliable communication ranges for the design and implementation of future GSM communication systems. Keywords: 900MHz Spectrum Band, Prediction model, Link-budget, Path loss, Rain attenuation, Communication ranges, GSM Communication.

Journal Article
TL;DR: This paper will give an awareness regarding cloud computing security issue through encryption and decryption methods when it is explored, and proposed solution regards troubleshooting how to store secure data storage over the cloud with some encryption methods.
Abstract: Cloud computing is a technology of delivering facilities such as software, and hardware (virtual as well) and bandwidth over the internet or network to the customers worldwide. Mobile devices are enabled in order to explore especially, Smartphone. Apple, Google, Facebook and Amazon with rich user. The mobile cloud computing technology is growing rapidly among the customers and at the same time it aware us the new security threats. Customers can access their data in any time, at any place, even with any device including mobile devices by using the cloud storage services, although these properties offers flexibility and scalability in controlling data, security issues are overcomes by proper handling. This paper, will give an awareness regarding cloud computing security issue through encryption and decryption methods when it is explored. If a cloud is performing a task of storage and encryption and decryption of data over the cloud then there can be chance of getting access to the private information without authorization result whole process creates risk of security. I proposed solution regards troubleshooting how to store secure data storage over the cloud with some encryption methods hacker or unauthorized cannot access confidential data owing to encrypted form. Keywords:cloud computing, security, data security, AES Encryption, Eclipse IDE.

Journal Article
TL;DR: In this paper, a web page of interest application is developed for evaluating the quality and effectiveness of the discovered knowledge, which is then used for matching and generating web links for online recommendations.
Abstract: The continuous growth of the World Wide Web imposes the need of new methods of design and determines how to access a web page in the web usage mining by performing preprocessing of the data in a web page and development of on-line information services. The need for predicting the user’s needs in order to improve the usability and user retention of a web site is more than evident now a day. Without proper guidance, a visitor often wanders aimlessly without visiting important pages, loses interest, and leaves the site sooner than expected. In proposed system focus on investigating efficient and effective sequential access pattern mining techniques for web usage data. The mined patterns are then used for matching and generating web links for online recommendations. A web page of interest application will be developed for evaluating the quality and effectiveness of the discovered knowledge. Keyword: Webpage Prediction, Web Mining, MRF, ANN, KNN, GA.

Journal Article
TL;DR: Results showed that a WCAG compliant eGovernment website failed to satisfy the requirements of a sample of blind users, and attempts to understand cognition and perception thoughts of a blind user while interacting with a web-based environment.
Abstract: The use of internet and other communication technologies has become predominantly common in the life of normal sighted users. In order to have a fair level of equality in the society, blind people must also be able to use these facilities with equal ease and effectiveness. Recent studies showed that the usage and acceptance rate of online applications among the blind community is not up to the expectations. The aim of this article is to investigate the accessibility issues faced by blind people during online interaction like eGovernment portals. Results showed that a WCAG compliant eGovernment website failed to satisfy the requirements of a sample of blind users. This article is part of on-going research aimed to uncover accessibility problems that could be faced by blinds during online interaction and are not addressed in accessibility standards. It attempts to understand cognition and perception thoughts of a blind user while interacting with a web-based environment. Keywords : Blindness, Web Accessibility, WCAG

Journal Article
TL;DR: The process of checking the biopsy data for consistency with complex rules provided by an expert, as well as mining of new rules using interpretable rule-based classification methods, discovered interesting rules and relationships between features with respect to T-cell mediated rejection, antibody-mediated rejection, interstitial fibrosis and tubular atrophy, and polyoma virus nephropathy.
Abstract: One of the grave problems after kidney transplantation is the recipient body’s immune rejection of the transplanted organ. T -cells and antibodies attack the organ, which in the worst case can lead to graft failure. Biopsy is an important diagnostic tool to evaluate a rejection episode. TBase© includes a biopsy protocol that can easily be filled out by the physician, which helped to collect and store 1447 biopsy cases in the TBase© database. With respect to different kinds of rejections, there exist some basic rules for the entered data that are enforced during completion of the protocol. Nevertheless, because so much biopsy data was entered in by hand, it was necessary to check the quality and plausibility of existing data with respect to more complex rules that were not enforced during protocol completion. In this paper, we present the process of checking the biopsy data for consistency with complex rules provided by an expert, as well as mining of new rules using interpretable rule-based classification methods. We discovered interesting rules and relationships between features with respect to T-cell mediated rejection (TCMR), antibody-mediated rejection (AMR), interstitial fibrosis and tubular atrophy (IF/TA), and polyoma virus (BKV) nephropathy, with negative results concerning acute tubular necrosis (ATN). The discovered rules further support the quality and plausibility of the data, and open avenues for further research. Keywords: Electronic patient record, nephrology, biopsy, data mining.

Journal Article
TL;DR: The enhanced model indicates that perceived privacy, security and trust, proclivity to give and get information, content of Online Social Networking Sites(SNS) are some of the key factors that influence seniors to use online social networks.
Abstract: The use of Online Social Networks is higher among the youth as compared to the use of the same by seniors in Kenya. Online social networking has the potential to enrich the lives of seniors by providing them with an easy way to stay in touch with friends and family. Software Engineers and designers are anxious to capture the needs of this demographic through this new channel. Yet very little is known about what influences seniors to use online social networks in relation to development and design of this online social networks.This study uses results from a pilot study conducted in some Universities in Kenya as well as theory and literature to identify and examine what key factors influence seniors to accept and use online social networks then map the factors to enhance an already existing model Unified Theory of Acceptance and Use of Technology (UTAUT) used to explain Acceptance and Use of technology. The enhanced model that emerged describes the key factors that influence acceptance and use. Specifically the model indicates that perceived privacy, security and trust, proclivity to give and get information, content of Online Social Networking Sites(SNS) are some of the key factors that influence seniors to use online social networks. The enhanced model is a first step of an ongoing research project that aims to provide software engineers and designers with the requirements of seniors in Online Social Networks. Keywords: Online Social Networks, Elderly, UTAUT, SNS, Online Social Networking Use and Acceptance

Journal Article
TL;DR: The introduction of the pre-paid metering system has increased the revenue collection and hence, reduced the revenue generation of the local government area because of the reliability nature of the meetering system.
Abstract: Electricity is one of the basic requirements for people and they are widely used for domestic, industrial and agricultural purposes Every meter is a device that measures the amount of electrical energy consumed by a residence, business or an electrically powered device This paper presents the impact of prepaid energy metering system on electricity consumption in Ogbomoso South Local Government Area of Oyo state The results of the paper revealed that about 95% of the pre-paid meter users in the local government area are conscious of electricity management, about 74% of the post-paid meter users were just wasting the energy The introduction of the pre-paid metering system has increased the revenue collection and hence, reduced the revenue generation of the local government area because of the reliability nature of the metering system The pre-paid metering system has created a positive impact on the electricity consumption as well as the increment in the price tariff of the electricity Keywords: Energy metering system, Electricity consumption, Post-paid metering system, Pre-paid metering system, Solid state electronic meters (SSEM)

Journal Article
TL;DR: In this article, the adverse effects of cyber crimes on e-retail and financial transactions in e-banking sector, the present need to formulate policy framework, national legislation and independent investigation authority to penalize such criminals.
Abstract: The Information and Communication Technology (ICT) has revolutionized almost every aspect of human endeavor. Increased use of ICT such as computers, cellular phones, internet and other associated technologies are the routes which gave emergence to a lot of constructive as well as destructive work. The constructive work includes simplicity in business transactions provided convenient, effective, speedy and smooth processes. The destructive activities are considered as “electronic or cyber crimes” such as Identity theft, credit card and ATM frauds, criminal activities, spamming, phishing and other web-based crimes. This study will identify the adverse effects of the cyber crimes on e-retailing, effects of cyber crimes on financial transactions in e-banking sector, the present need to formulate policy framework, national legislation and independent investigation authority to penalize such criminals. Keywords: ATM, E-Banking, E-Commerce, EFT, E-Payment, ICT, M-Banking, PECO

Journal Article
TL;DR: Different machine learning approaches for classification of different canola seeds which provide opportunity to people or farmer to identify differentCanola seeds are introduced to introduce the best percentage for classification and provide more accuracy for farmer and other people.
Abstract: Agriculture plays an important role on Pakistan economy. Canola is the major crop of Pakistan. There are different varieties of canola crop. It fulfills the requirement of oil. It is the difficult task to identify best canola seeds for sowing due to different varieties of canola seeds. In this paper we are try to introduce different machine learning approaches for classification of different canola seeds which provide opportunity to people or farmer to identify different canola seeds. Canola seeds verities implementing by the computer vision image processing tool. We have the 4 different varieties which names as Gobhi Sarson (A), Barassica comp (B), Sathri (C) and Rocket Herbof (D) canola seeds and take the images of canola seeds from these different varieties. Each variety has 10 images and we have total 10*4 =40 images of canola seeds. we take the train and test data results of all kinds of canola seeds. then train and test data results will be compare for pattern classification and apply the nearest neighbor and k-nearest neighbor algorithms for final classification in computer image processing tool. We achieved in nearest neighbor 85% and 76% average and k-nearest neighbor 90% and 73% average as a final pattern classification results. These are the best percentage for classification and provide more accuracy. These are important for farmer and other people for identify the different canola seeds. Keywords: Features, Pattern classification, nearest neighbor, k-nearest neighbor

Journal Article
TL;DR: An analysis on the security of Directed Diffusion, a protocol used for routing in wireless sensor networks, and the various attacks possible on this routing protocol and the possible counter-measures to prevent theses attacks are presented.
Abstract: The aim of this paper is to discuss secure routing in Wireless Sensor networks. I have made an endeavor to present an analysis on the security of Directed Diffusion, a protocol used for routing in wireless sensor networks. Along with this the paper also discusses the various attacks possible on this routing protocol and the possible counter-measures to prevent theses attacks.

Journal Article
TL;DR: In this article, the hand detection using model or classification is to build a decision rule that will discriminate between skin and non-skin pixels and all external factors will be eliminated to detect the hand and its color in the image in complex background.
Abstract: Natural Human Computer Interaction (HCI) is the demand of today’s technology oriented world. Detecting and tracking of face and hands are important for gesture recognition. Skin detection is a very popular and useful technique for detecting and tracking human-body parts. It has been much attention mainly because of its vast range of applications such as, face detection and tracking, naked people detection, hand detection and tracking, people retrieval in databases and Internet, etc. Many models and algorithms are being used for detection of face, hand and its gesture. Hand detection using model or classification is to build a decision rule that will discriminate between skin and non-skin pixels. Identifying skin color pixels involves finding the range of values for which most skin pixels would fall in a given color space. All external factors will be eliminated to detect the hand and its color in the image in complex background. Keywords: image segmentation, hand detection, hci, computer vision, RGB, HSV

Journal Article
TL;DR: A framework for effective educational process using Data Mining techniques to uncover the hidden trends and patterns and making accuracy based predictions through higher level of analytical sophistication in students counseling process is proposed.
Abstract: Competence based Management through Data mining approach helps academia to improve research and academic decision making through uncovering hidden trends and patterns that predicts using a combination of explicit knowledge base, sophisticated analytical skills and academic domain knowledge. The paper proposes a framework for effective educational process using Data Mining techniques to uncover the hidden trends and patterns and making accuracy based predictions through higher level of analytical sophistication in students counseling process. Keywords : Faculty; Faculty Assessment; Faculty; Competence Management; Data Mining; Patterns.

Journal Article
TL;DR: This paper addresses the various techniques of detecting fraud, giving the limitations of each technique and proposes random rough subspace-based neural network ensemble method for effective fraud detection.
Abstract: Fraud has been very common in the society and it affects private enterprises as well as public entities. Telecommunication companies worldwide suffer from customers who use the provided services without paying. There are also different types of telecommunication fraud such as subscription fraud, clip on fraud, call forwarding, cloning fraud, roaming fraud and calling card fraud. Thus, detection and prevention of these frauds are the main targets of the telecommunication industry. This paper addresses the various techniques of detecting fraud, giving the limitations of each technique and proposes random rough subspace-based neural network ensemble method for effective fraud detection. Keywords : Fraud, Fraud detection, Random rough subspace, Neural network, Telecommunications

Journal Article
TL;DR: Improvement index to resolve the problem of difficult to differentiate performance between authors is suggested, called dgh-index, that gives new features to g-index and h-index that give us real number not an integer.
Abstract: Of the most important indicators such as the h-index ,a method of measuring the productivity and impact of an academic's work, is often used as a component or metric in the ranking of higher education institutions and their staff then proposed the g index as a modification of the h index. So the g-index, have been Trying to develop and improve the disadvantage in h-index. and although the g-index can provide a more comprehensive measure of scientific contribution, but value g-index is integer where two authors or more than may be get the same g-index value although different number of citations and papers, making it difficult to differentiate performance between authors so in paper we suggest improvement index to resolve this problem is called dgh-index that gives new features to g-index and h-index that give us real number not an integer .

Journal Article
TL;DR: A framework that can be followed to easily share file residing on cloud with another cloud user and secure mechanism of generating key, sharing a key and validating use of key for given file is proposed.
Abstract: Term cloud computing has opened entire new domain of computability, reliability and efficiency. Organizations can now focus on providing targeted services to consumers rather than considering infrastructure and resource issues. Cloud consumers can enjoy ease of computing and power of reliability but cloud service providers have to ensure many measures to let cloud services be reality and reliable. Consumers can store their valuable data on cloud and can use them as and when required. This leads to some key points like security of cloud data should be considered, sharing of cloud data as per requirement should be done. Allocation of required resources to the consumers should be done efficiently and above all, cloud service providers should have opportunity to gain some economical values. This research paper is based on providing some mechanism to allow file sharing among various cloud users. This paper proposed a framework that can be followed to easily share file residing on cloud with another cloud user. In this framework, concept of cryptography has been used to generate secure key that can be shared among users. Cryptography allows encryption and decryption of different normal text to some cipher text that cannot be interpreted easily. This paper has proposed secure mechanism of generating key, sharing a key and validating use of key for given file. Most important aspect considered in this research paper is, the user who owns a file and wants to provide access to other user don’t have internet access at hand. Framework uses mobile technology to contact service providers and generate a key as and when needed. Keywords — Cloud computing, cryptography, AES, RSA, Security, Authentication, Validation, Application as a service

Journal Article
TL;DR: This Engineering report shows that as more access the DSSS – CDMA system simultaneously, the noise level and hence the error rate increases, only gradual does the system degrade to the point of an unacceptable error rate.
Abstract: Performance of Direct sequence spread spectrum code division multiple Access (DSSS – CDMA) under the presence of multiple users is addressed in this Engineering report. A system model for DSSS – CDMA, Quasi-orthogonal spreading code is developed. This Engineering report shows that as more access the system simultaneously, the noise level and hence the error rate increases, only gradual does the system degrade to the point of an unacceptable error rate increases, only gradual does the system degrade to the point of an unacceptable error rate. This property makes it more desirable than frequency Division multiple Access and Time Division multiple Access in cellular network that most have a fixed number of users.

Journal Article
TL;DR: The main aim of this research is to reduce misconduct both students, staffs and lecturers.
Abstract: This research and proposed system is deals with both student’s and lecturer’s bio data to check the deviant behavior of student’s and lecturer’s, NAB to validate authenticity of students certification with regards to admissions into the universities in Ghana. The bio data’s stored in the central point on this system. This shall mandatory for the Universities as a requirement from the NAB regulations. This gives the details of Lecturer’s and student’s upon request and a click of a button the eligibility of the candidates to be accepted in the tertiary institutions of Ghana. With all these records integrated on one central point, all tertiary institutions can access students and lecturers records from other institutions. Better still, there are portals for staff and students which monitors to ensure decent conduct and ethical conduct as the information on their employment can be accessed from these portals when there is misconduct in an intuition in Ghana. The government through the NAB/GES/MOE as well as WAEC in collaboration will monitor the behavior and conduct of both students and lecturers in the university. The main aim of this research is to reduce misconduct both students, staffs and lecturers. Keywords: Performance, e-learning, Computing

Journal Article
TL;DR: A novel algorithm is proposed for mixing the AES ciphertext and the SHA-512 hash obtained from plaintext, which is embedded into an image so that the attacker cannot separate them for applying cryptanalysis.
Abstract: In the present scenario the use of images increased extremely in the cyber world so that we can easily transfer data with the help of these images in a secured way. Image steganography becomes important in this manner. Steganography and cryptography are the two techniques that are often confused with each other. The input and output of steganography looks alike, but for cryptography the output will be in an encrypted form which always draws attraction to the attacker. This paper combines both steganography and cryptography so that attacker doesn’t know about the existence of message and the message itself is encrypted to ensure more security. The textual data entered by the user is encrypted using AES algorithm. After encryption, the encrypted data is stored in the colour image by using a hash based algorithm. We have proposed a novel algorithm for mixing the AES ciphertext and the SHA-512 hash obtained from plaintext, which is embedded into an image so that the attacker cannot separate them for applying cryptanalysis. Keywords - Steganography, Cryptography, Hashing, AES algorithm