scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Computer and organization Trends in 2016"


Journal ArticleDOI
TL;DR: An intuitionistic fuzzy optimization approach considering non-linear membership and nonmembership function for optimizing the design of plane truss structure with single objectives subject to a specified set of constraints shows that the IFO approach is very efficient in finding the best discovered optimal solutions.
Abstract: In this paper, we have developed an intuitionistic fuzzy optimization (IFO) approach considering non-linear membership and nonmembership function for optimizing the design of plane truss structure with single objectives subject to a specified set of constraints. In this optimum design formulation, the objective functions are the weight of the truss; the design variables are the cross-sections of the truss members; the constraints are the stresses in members. A classical truss optimization example is presented here in to demonstrate the efficiency of the Intuitionistic fuzzy optimization approach with non-linear membership function. We made a comparative study of linear and non-linear membership and non-membership function to see its impact on intuitionistic fuzzy optimization and to get to the depth of such optimization process. The test problem consists of a two-bar planar truss subjected to a single load condition. This single-objective structural optimization model is solved by intuitionistic fuzzy optimization approach with nonlinear membership and non-membership function. Numerical example is given to illustrate our approach. The result shows that the IFO approach is very efficient in finding the best discovered optimal solutions. Keywords— Intuitionistic fuzzy optimization, Nonlinear membership function, Non-linear nonmembership function, Structural design.

4 citations


Journal ArticleDOI
TL;DR: In this paper, the authors developed a system that analyses the spatial behavior of the individual and train the ones with poor spatial visualization and navigation skills in an optimal way so that they can maintain orientation during navigation.
Abstract: The studies of topographic disorientation from brain injury focus on describing impairments, specifying neuroanatomical correlates of topographic disorientation, and categorizing types of topographic disorientation. Models of environmental cognition have been applied in some studies of topographic disorientation. The study is done here to develop a system that analyses the spatial behaviour of the individual and train the ones with poor spatial visualization and navigation skills in an optimal way so that they can maintain orientation during navigation. Virtual Reality provides the best tool for the rehabilitation and assessment of topographical disorientation. Therefore, using virtual reality technique, a virtual environment has been created as the part of study and the subjects have been exposed to it in order to treat the spatial impairment. For creating the virtual environment, Unity Game engine is used.

3 citations



Journal ArticleDOI
TL;DR: From the experimental results, it is found that convergence activity and convergence duration is maximum for OSPF and minimum for RIP.
Abstract: In this paper an attempt has been made to analyze the steady state behavior of RIP and OSPF routing protocols for WAN in terms of convergence duration with respect to simulation time in the context of link failure and recovery using OPNET simulator. The time that is required for the network to converge is referred to as convergence duration. Convergence is one of the key factors that determine the performance of the routing protocol. From the experimental results we found that convergence activity and convergence duration is maximum for OSPF and minimum for RIP. Keywords— RIP, OSPF, WAN, OPNET

3 citations


Journal ArticleDOI
TL;DR: In this article, the authors examined the relationship between service quality, employees resistant to change, employees' engagement, and outsourcing in a telecom environment and found that service quality and resistant-to-change were significant contributors to outsourcing behavior.
Abstract: The purpose of this quantitative correlational study was to examine the relationship between service quality, employees resistant to change, employees’ engagement, and outsourcing in a telecom environment. While managers adopt outsourcing as a strategy that benefits organization, engagement of employees to achieve efficiency results to resistance to outsourcing. Porter's theory of competitive advantage complimented the relational explanation of the variables. A random sample of 95 information technology employees from telecom service companies in the United States participated in an online survey. The results from a multiple linear regression model were significant in predicting the outsourcing behavior of the employees. Service quality and resistant to change were significant contributors to outsourcing behavior; the findings indicated moderate R as the p-value was significant. The introduction of other organizational related variables by future researchers might enhance the effectiveness of the model. The practical implications for change includes the potential to enhance telecom managers appreciate factors that influence employee behavior during outsourcing.

2 citations


Journal ArticleDOI
TL;DR: A novel technique is proposed to overcome link failure in MANET, a self configuring network which has no fixed infrastructure and changes frequently in topology.
Abstract: MANET is a self configuring network which has no fixed infrastructure. Topology in MANET changes frequently. During data transmission, there is a problem of link failure which degrade the performance of the network. The nodes are deployed in the network and path is established according to EAOMDV protocol from source to destination. There are some nodes in the path having much movement than other nodes. Due to these nodes link failure problem occurs. So link failure problem is responsible for performance degradation and low reliability of the network. In this paper, a novel technique is proposed to overcome link failure

2 citations


Journal ArticleDOI
TL;DR: A new framework is proposed by integrating random forest decision tree for pattern analysis that has better accuracy compare to existing approaches and allows estimating on topmost features to assess the class prior probability and estimates the chance of misleading false positive patterns.
Abstract: Knowledge discovery is an essential mechanism for the intelligent data analiysis to transform data in to meaniful information that will support for decision making. Data mining approaches support automatic exraction of data, and attempts to discover the hidden rules and patterns in data, and also detact relevant decision rules from the high dimensional dataset. Classification from imbalanced data is significantly affected the performance of the algorithm due to noise and high dimensionality. Sparsity and high dimensionality of the classifier algorithm becomes a major problem in many traditional decision tree models on medical datasets. A novel decision trees allows estimating on topmost features to assess the class prior probability and estimates the chance of misleading false positive patterns. In this research work, a new framework is proposed by integrating random forest decision tree for pattern analysis. Experimental results show that proposed model has better accuracy compare to existing approaches.

2 citations


Journal ArticleDOI
TL;DR: In this article, the authors examined correlational relationship between employees support for creativity and innovation as exemplified by the use of telecommuting in telecom environment, organizational commitment, and organizational citizenship behaviour.
Abstract: Telecommuting innovate telecom organizations towards reduction in cost of operations. I examined correlational relationship between employees support for creativity and innovation as exemplified by the use of telecommuting in telecom environment, organizational commitment, and organizational citizenship behaviour. Moreover, this study was explained in context of diffusion of innovation theory. To examine the hypothesis in the study, I used the data from 324 randomly sampled telecom telecommuters to conduct a multiple regression analysis between the variables in the study. The results from the multiple linear regression were significant in predicting employee organizational citizenship behaviour. The findings indicated that Support for creativity and innovation, and organizational commitment were significant contributors to employees’ organizational citizenship behaviour. The implications for change are also discussed. Keywords— Telecommuting, Innovation, Diffusion, Employees’ Commitment, Organizational behaviour.

1 citations



Journal ArticleDOI
TL;DR: Though the cloud computing has great features such as on demand self service, resource pooling and rapid elasticity there is a shortage in cloud computing because it hasn't provided a unique semantic ground as that of Semantic Web so, in order to provide an environment for automatic searching of services, resources ontology is used.
Abstract: During the past few years, cloud computing has become a key IT buzzword. Although the definition of cloud computing is still “cloudy”, the trade press and bloggers label many vendors as cloud computing vendors, and report on their services and issues. Cloud computing is in its infancy in terms of market adoption. However, it is a key IT megatrend that will take root. Though the cloud computing has great features such as on demand self service, resource pooling and rapid elasticity there is a shortage in cloud computing because it hasn't provided a unique semantic ground as that of Semantic Web . So, in order to provide an environment for automatic searching of services, resources ontology is used. These are some of the areas where Ontology is used in Cloud Computing. Ontology based registries are used for dynamic discovery of cloud computing resource across various cloud computing platforms, It can be used to provide intelligent customization framework for Saas and easing the design of security system by proving role based access control using ontology.

1 citations


Journal ArticleDOI
TL;DR: Simulation results show that Random deployment model perform better than grid and circular deployment models for Open shortest path first (OSPF) by using OPNET Simulator (v14.5).
Abstract: Mobile Ad-hoc Networks (MANETs) are wireless network with mobile nodes. Mobile means the nodes are free to move themselves randomly, which may cause the rapid and unpredictable change of the network topology. Ad-hoc means that each node is willing to forward data for other nodes. In this paper we investigate the impact of three node deployment models namely grid, random and circular on the performance of Open shortest path first (OSPF) by using OPNET Simulator (v14.5). Simulation results show that Random deployment model perform better than grid and circular deployment models.

Journal ArticleDOI
TL;DR: In this paper comparative study of MDMA method and OFSTF method is discussed concluding this with MDMA is better than OfSTF for proposed pay off matrix.
Abstract: In this paper comparative study of MDMA method and OFSTF method is discussed concluding this with MDMA is better than OFSTF for proposed pay off matrix

Journal ArticleDOI
TL;DR: The main objectives is to analyse the duty cycle at which S-MAC protocol is energy efficient and the energy consumption and its effect on data transmission using Sensor Medium Access Control (S-MAC) protocol.
Abstract: Wireless Sensor Network (WSN) is a promising technology that has a wide range of potential applications. Such network consists of large number of distributed nodes that organized themselves into multihop WSN. Each node collects information as required and sends it to base stations.Analyze the energy consumption and its effect on data transmission using Sensor Medium Access Control (S-MAC) protocol. Analyzed energy consumption with different duty cycles in S-MAC protocol and its effect on throughput of network. The main objectives is to analyse the duty cycle at which S-MAC protocol is energy efficient.

Journal ArticleDOI
TL;DR: From the results it is found that Secure LAR(S-LAR) with ECC provides security with minimum energy consumption.
Abstract: MANET is a collection of mobile nodes connected by wireless links without infrastructure. Due to inherent properties of MANETs like limited resources, dynamic topology, wireless medium, the possibility of attacks is more. So, there is a need for provisioning of security in Manets. Different cryptographic algorithms are investigated and Secure LAR is designed. From the results it is found that Secure LAR(S-LAR) with ECC provides security with minimum energy consumption.

Journal ArticleDOI
TL;DR: The main motive of the online banking system is to provide customer with alternative that is more responsive and less expensive also time saving and to make the password strong so that the attackers can not guess the password easily.
Abstract: Online Banking Services are accessible to all the customer who have their valid user and id allocated by the bank. The System provides the different facilities like Balance enquiry, Funds transfer to another account in same or different bank, Request for cheque book, change in address, stop payment of cheques, viewing monthly and annual statements. Online Banking System has attractred the attentions of banks, securities, insurance companies in developing nations sice the 1990s and the rapid and significant growth in electronic sectors and commerce. The main motive of the online banking system is is to provide customer with alternative that is more responsive and less expensive also time saving. Online banking system is the most important financial activity which is now a days mostly carried out by any person who has an account in the bank. Not only unique id and password is allocated with that an new UPI code system is added as a security the bank.If a wrong password is given thrice in the session, that account gets locked and the customer is not able to use their account and an warning is pop up that the account is locked and the same locking system goes with UPI code. Whenever we deal with the Online banking system services the main concern of the customer is always related to the security regarding to the banking transaction and account login activities. The E-Banking services now deals with the single sign-in log on and it is not secured . Authentication is now an proposed system, in this activity of linking an individual process on the basis of username and password and basically the password is consist of characters, numbers, alphanumeric values, special character and etc.. to make the password strong so that the attackers chould not guess the password easily it might be difficult to remember the password but the strong password are mandatory otherwise the software shows the message as the password is weak and it doesnot accept that weak password until we create the strong password.

Journal ArticleDOI
TL;DR: Investigation of the impact of three node deployment models, namely Grid, Random and Circular with different simulation time for TORA routing protocol of QoS metrics using the OPNET 14.5 simulator reveals that Random node deployment model outperforms circular and grid nodes deployment model.
Abstract: A MANET is a collection of autonomous mobile devices. In MANETs, the nodes are mobile the network may change unpredictably over time. In this paper, we investigate the impact of three node deployment models, namely Grid, Random and Circular with different simulation time for TORA routing protocol of QoS metrics using the OPNET 14.5 simulator. Simulation results reveal that Random node deployment model outperforms circular and grid node deployment model.

Journal ArticleDOI
TL;DR: The aim of this paper is to achieve total participation of the user with their concerned doctor by means of suitable communication method and to automate all these features which provides excellent and easy to access means of communication medium between doctors and its patients.
Abstract: A TOTAL HEALTH Care System is an online facility by which user/doctor can view the diagnose information of a person related to his/her health for better analyzed medicine and medical treatments. This system helps in disease management and preventive services. It is an online service by which user can see their details and health measures by viewing their reports online. Lab tests Results, etc. each user can have his own rule and his own conditions and can decide if he wants to be alerted for the patient meeting the rule. These features helps user regarding their bright healthy future and precautions to be taken in future by viewing their report at any stage and at any time period. So this paper is concentrated around all the issues related to the is to achieve total participation of the user with their concerned doctor by means of suitable communication method and to automate all these features which provides excellent and easy to access means of communication medium between doctors and its patients.

Journal ArticleDOI
TL;DR: Experimental results show that proposed model performed well against security and transmission power compared to traditional models.
Abstract: Device to device communications in cellular networks are promising frameworks for enhancing network spectrum, throughput and transmission delay. Cooperative network has been used to enhance efficiency and system coverage of adhoc networks.Cooperative communication allows terminals to collaborate with each other for data transmission. The challenge is to enhance performance with limited availability of resources.In this proposed work, a new secured data transmission mechanism is introduced for efficient communication between the sensor nodes. Experimental results show that proposed model performed well against security and transmission power compared to traditional models.

Journal ArticleDOI
TL;DR: A comparative study between 3G & 4G tells about the background and the vision for the 4G, and an overall 4G framework features, having the basic keys (diversity and adaptability) of the three targets (terminals, networks, and applications).
Abstract: Mobile communication is one of the warmest areas and it is emerging tremendously fast in present times, thanks to the advances of technology in all the fields of mobile and wireless communications. Nowadays the use of 3G mobile communication systems appear to be the standard, while 4G stands for the next generation of wireless and mobile communications. This comparative study between 3G & 4G tells about the background and the vision for the 4G. We first present a evaluation on the development history, characteristics, status of mobile communication and related 3G 4G perspectives. An overall 4G framework features, having the basic keys (diversity and adaptability) of the three targets (terminals, networks, and applications). We present it in both external and internal diversity of each target to illustrate the causes and solutions of the adaptability feature. Then, the 4G domain of each feature in the framework is discussed from technical point, showing techniques and possible research issues for sufficient support of adaptability. At the end, a summary on 4G visions and some of the issues this new technology may face. All radio access technologies have to solve the same problems: to divide the finite RF spectrum among multiple users as efficiently as possible. GSM uses TDMA and FDMA for user and cell separation. UMTS, IS95 and CDMA-2000 use CDMA. WiMAX and LTE use OFDM.


Journal ArticleDOI
TL;DR: The state of art related to the image and video quality is described by utilizing the some pre-existing quality metrics like PSNR, SSIM and VQM etc and it also gives emphasize on the human visual perception that describes the sensitivities of human eyes towards the images and
Abstract: Images and videos have become an essential part of day to day life, we observe the images and videos and draw the conclusion that a particular image or video is of good quality or bad quality as lots of time we say that the particular video is a high definition video so some questions arise how we assess the quality of an image and video? What are the factors and parameters that make the image of good or bad quality? How the images and videos are perceived by the human eyes? So this paper is concentrated around all the issues related to the quality assessment of the images and the videos. This letter describes the state of art related to the image and video quality by utilizing the some pre-existing quality metrics like PSNR, SSIM and VQM etc. And it also give emphasize on the human visual perception that describes the sensitivities of human eyes towards the images and

Journal ArticleDOI
TL;DR: This paper uses specific user-profiles to store the sequence of commands in a transaction and uses a prevention model for instant detection of malicious transactions and can detect malicious transactions before they are committed.
Abstract: Database Security is an concept that includes the following properties: authenticity (guarantees that a service or piece of information is authentic), confidentiality (absence of unauthorized disclosure of a service or piece of information), integrity (protection of a service or piece of information against illicit and/or undetected modification), and availability (protection of a service or piece of information against possible denials of service caused by malicious actions). Current intrusion detection systems use logs to detect malicious transactions. Logs are the histories of the transactions committed in the database. The disadvantage of using logs is that they need lot of memory. In addition to this sometimes even after a transaction is detected as malicious it cannot be rolled back. In this paper we present a method by which we can overcome the uses of logs and can detect malicious transactions before they are committed. We use specific user-profiles to store the sequence of commands in a transaction and use a prevention model for instant detection of malicious transactions.

Journal ArticleDOI
TL;DR: The domination numbers, total domination number and bounds are determined for several classes of intuitionistic fuzzy graphs and the Nordhaus – Gaddum type result for these parameters is obtained.
Abstract: In this paper, we introduce the concept of some new kinds of connected domination number of an intuitionistic fuzzy graphs. We determine the domination numbers cs, ds ,lsc , rsc and the total domination number of tcs, tdsfor several classes of intuitionistic fuzzy graphs and obtain bounds for the same. We also obtain the Nordhaus – Gaddum type result for these parameters.

Journal ArticleDOI
TL;DR: Experimental results proved that the proposed integrity model has high accuracy compared to traditional data transmission models and is suitable for cloud computing.
Abstract: Cloud computing is a distribute network for storing and sharing information over internet with scalability. Information security is one the major issue faced by cloud users and service providers. Data retrieval and security are major issues which block clients to adopt clud computing. Also, cloud servers enables the clients to store information on remote servers thereby preventing third party attacks over this data. The main objective of our research work is to store,transmit and extract data in a secure channel.In this proposed model,secured data transmission model using data integrity approach was implemented. Experimental results proved that the proposed integrity model has high accuracy compared to traditional data transmission models.

Journal ArticleDOI
TL;DR: The target of the analysis work to make up the improved network algorithms those area unit for improvement in performance in large-scale systems is to develop new LEACH protocol within which knowledge is transmitted in confidential method with least energy consumption.
Abstract: Wireless detector Networks (WSNs) consists of very little nodes with sensing, calculation and wireless transportation capabilities. It is found that the most limiting think about LEACH protocol is energy. Knowledge gathering and forwarding is one amongst the necessary operations in WSNs and is main reason for energy consumption. We need to develop new LEACH protocol within which knowledge is transmitted in confidential method with least energy consumption and that too without decrypting the data at CH. Then the target of the analysis work to make up the improved network algorithms those area unit for improvement in performance in large-scale systems. MatLab 7.0 version has been utilised for the simulation job.

Journal ArticleDOI
TL;DR: This paper provides OTP and image captcha together which provides high security and has been shown to be stolen and vulnerable to different types of attacks.
Abstract: Data Security is that preventing from unauthorized disclosure and modification. The basic and old method of computer authentication is to use alphanumerical usernames and passwords. This method has been shown to have important drawbacks i.e., These passwords are prone to be stolen and vulnerable to different types of attacks. Then Captcha technology came into existence but again it fails as an individual. Then after graphical password came into existence and has its own drawbacks. This paper provides OTP and image captcha together which provides high security. Keywords— Captcha, Otp, User Authentication.

Journal ArticleDOI
TL;DR: This paper shows the user search results with images and presents a detailed architecture and design for implementation of search engine that takes into consideration the semantic meaning of each keyword to upgrade the retrieval accuracy.
Abstract: This paper shows the user search results with images. Based on the given query it retrieves the image from huge database, first we give the importance for content concepts and location concepts. And also users locations (positioned by GPS) are used insert the location concepts. For the user preference using ontology but it take into consideration the semantic meaning of each keyword that expected to upgrade the retrieval accuracy. Query results with an image based search sorted by the method of ranking to access more accurate results. We present a detailed architecture and design for implementation of search engine. Here the client collects and stores locally the clickthrough data to protect privacy of the users.

Journal ArticleDOI
TL;DR: The classical Multi-Objective Solid Transportation Problem (MOSTP), where the multiple interval objective functions are minimized and the order relations that represent the decision makers' preference between interval profits have been defined by the right limit, left limit, centre and half width of an interval is modeled.
Abstract: In this paper Dependent Chance Goal Programming Model (DCGPM) is mainly focused on the classical Multi-Objective Solid Transportation Problem (MOSTP), where the multiple interval objective functions are minimized and the order relations that represent the decision makers’ preference between interval profits have been defined by the right limit, left limit, centre and half width of an interval. Finally, the equivalent transformed problem has been modeled in this paper, so that it could be solved by using a evolutionary technique.

Journal ArticleDOI
TL;DR: This document presents a walkthrough of the general high-level steps of designing a hybrid cloud, highlighting typical options at each step and their applicability to sample scenarios, offer guidelines and points out relevant key areas.
Abstract: This document presents a walkthrough of the general high-level steps of designing a hybrid cloud, highlighting typical options at each step and their applicability to sample scenarios, offer guidelines and points out relevant key areas.