IJCST Logo

 

INTERNATIONAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY (IJCST)
VOL 5.3 SPL-1, July to September, 2014


International Journal of Computer Science and Technology Vol 5.3 SPL-1

S.No. Research Topic Paper ID Download
01

Educational Knowledge Management System Framework: A Higher Educational Institution (HEI) Approach.

Dr. Anubhav Kumar, Dr. Arvind K Sharma, Anuradha

Abstract
Enterprise Resource Planning (ERP) technology has been created a great impact in the business world. Several multinational companies and organisations have been using ERP technology for the improvements in their productivity and scalability. Presently, this technology is being used in Higher Educational Institutions (HEIs) as a replacement of their legacy system to achieve their mission and vision. There are numerous educational ERP systems available in the market, but still there are higher failure rates and these failure rates can be reduced by integrating further technology like Knowledge Management (KM) with it. In this paper, we are focusing on a framework of Enterprise Knowledge Management System(ERP) through which knowledge of the faculty can be captured and stored and later on it can be explored and shared by other faculties. By using this framework their teaching learning process can be enhanced and improved. The obtained results will be helpful for the overall development of the students in Higher Educational Institutions (HEIs).
Full Paper
IJCST/53/spl1/A-101
02

The G Forces of the GPS Measurement Accuracy.

Zoltan Horvath, Ildiko Jenak

Abstract
The present research was directed to examine how G forces effecting the devices influence the accuracy of measurement results, respectively to find out whether the extent of forces correlate with the bigness of measurement errors. Since G sensors are built in nearly every smartphone, we can trace the bigness of the force affecting the device.
Full Paper
IJCST/53/spl1/A-102
03

A Study on Secure Routing Protocols for Wireless Sensor Networks (WSN).

Ishu Gupta, Dr. Harsh Sadawarti, Dr. S.N. Panda

Abstract
Wireless Sensor Network (WSN) is a collection of randomly distributed sensor nodes which mutually recognize and gather the information within the network that dynamically self-organizes in arbitrary and temporary network topologies without relying on pre-existing fixed network infrastructure. Due to unreliable wireless media and limitation of node resources in terms of storage, communication bandwidth and range, many challenges arise in ensuring the security of sensor nodes. Many techniques have been proposed to ensure the security in wireless networking. In this paper, various secure routing protocols have been studied where main considerations are on factors like RSSI, energy consumption and also the vulnerability of the nodes.
Full Paper
IJCST/53/spl1/A-103
04

A Comparitive Analysis of the Cloud Platform Over Job Scheduling Approaches.

Gurpreet Singh Sandhu, Dr Sawtantar Singh Khurmi, Dr. I.S.Hudiara

Abstract
The term cloud computing has come into this world as an evolution of the century. An idea to keep the entire data of a user over one server so that the user can access it from anywhere has taken a tremendous step towards the safety and security of the user’s data. A cloud data center is termed as sophisticated architecture where users can relies over the preservations of the data from external theft. The cloud computing server has its disadvantages also. For a server to contain the entire data of millions of users in a safe manner is a hectic job. In the same manner, if a process is given to the cloud server, the way it responds is a major concern in rating up the servers for the performance evaluation. This paper focuses on the analysis of the different cloud computing platforms over different aspects and this paper also deals with the scheduling algorithms which are common for the last couple of years.
Full Paper
IJCST/53/spl1/A-104
05

A Framework for Developing an Alumni Interactive System of Private Higher Educational Institutions Using Data Mining Techniques.

Dr. Arvind K Sharma, Dr. Anubhav Kumar

Abstract
Student Alumni Engagement is a novel emerging trend among the Universities, Colleges, Higher Educational Institutions (HEIs) in India. In the same way the private Higher Educational Institutions (PHEIs) and Private Universities are implementing these systems to associate and utilize their pass out students in the best useful way. We believe that every student alumni will be the key function of an organization. Today it is very essential to bring together the student alumni of an organization to harness the power of student alumni relations. In this paper, we have been proposed a framework to develop student’s alumni intelligent system in Higher Education Institutions (PHEIs) using data mining techniques.
Full Paper
IJCST/53/spl1/A-105
06

Traditional and Automatic Drug Delivery System: A Review.

Naveen Kumar, Dr. S.N.Panda

Abstract
Abstract Drug Delivery is a process of administrating a pharmaceutical compound in human beings to achieve theraputical effects. Drug can be delivered through many ways e.g. through mouth, skin (topical), nasal (transmucosal), and inhalation routes etc. It may include a target area in the body concerned with quantity and duration of drug presence. Drug Delivery methods become an important factors as this decides the important target area so user often chose a delivery method that gets them higher, faster.Automated Drug Delivery consists of electronic/mechanical instruments to provide and maintain rate of drug without the human intervention. Two methods may be applied for automated drug delivery system: Model Base (Open Loop Control) and Close Loop Control. Both Open and Closed Loop required a set point, but in Closed loop feed back signal is added along with set point as a control signal to achieve Target Concentration.
Full Paper
IJCST/53/spl1/A-106
07

A Study of Various Bot Detecting Techniques in Massively Multiplayer Online Games.

Gagandeep Singh, Vikrant Sharma

Abstract
In this paper we study various techniques that are used to detect the bots in Massively Multiplayer Online Games (MMOGs). We discussed how these techniques work and how they were successful in detecting bots in online games and the flaws in these techniques and about the future scope in this field.
Full Paper
IJCST/53/spl1/A-107
08

Aspect of Reusability in CBSE.

Vaneet Kaur Bhatia, Dr. D.S Dhaliwal, Dr. Sawtantar Singh

Abstract
The Component-Based Software Engineering (CBSE) or Component-Based Development (CBD) emphasizes the development of applications based on components so that the applications are easy to maintain, and extend. CBSE is a process that aims to design and construct software systems using reusable software components. Component-Based Software Engineering (CBSE) refers to the construction of large software systems from existing parts. The main idea of using componentbased development is reusability. The biggest challenge facing component based software reuse is managing a large number of stored reusable components efficiently to allow fast allocating and retrieving. A software repository is a storage location from which software packages may be retrieved and installed on a computer. Repositories built with reuse in mind can be considered as special-purpose information systems, required to support powerful semantic modeling, flexible retrieval of varied software descriptions and efficiency optimization directed towards a large variety of classes rather than large populations per class.
Full Paper
IJCST/53/spl1/A-108
09

An Effective Implementation of Load Balancing Investigation in Cloud Frameworks.

Sachin Gupta, Dr. S.N. Panda, Dr. Bharat Bhushan

Abstract
Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because of the opportunities it is offering.The market research and analysis firm IDC suggests that the market for Cloud Computing services was $16billion in 2008 and will rise to $42billion/year by 2012. It has been estimated that the cost advantages of Cloud Computing to be three to five times for business applications and more than five times for consumer applications. According to a Gartner press release from June 2008, Cloud Computing will be “no less influential than e-business”. Cloud computing evokes different perceptions in different people. To some, it refers to accessing software and storing data in the “cloud” representation of the internet or a network and using associated services. To others, it is seen as nothing new, but just a modernization of time-sharing model that was widely employed in 1960s before the advent of relatively lower-cost computing platforms. This development eventually evolved to the client/server model and to the personal computer, which placed large accounts of computing power at people’s desktops and spelled the demise of time-sharing systems. In this manuscript, we have simulated a cloud environment with different parameters including data centers, bandwidth, network speed, user bases and locations throughout the globe.
Full Paper
IJCST/53/spl1/A-109
10

Advanced Information Communication Technologies for Delivering Education: A Review.

Ramneek Kaur, Dr.Sawtantar Singh

Abstract
Education plays a key role in the economic, social and cultural development of developed and developing nations. It cannot be denied that drastic changes in the world economy leaded by latest Information Technologies. ICT driven education overcomes barriers of time and place for providing anytime or from anywhere access for learning. The benefits of ICT for students includes – Increased access, Flexibility of content and delivery, Combination of work and education, Learner-centered approach, Higher quality of education and new ways of interaction. Education is the basic source of human capital and poor quality of education can create income disparities.
As return on human capital is directly dependent upon good quality of education so government has developed policies and accordingly plans for initiating efforts to improve education system, so as to reduce such income inequalities for economic growth of the country.In this paper the impact of EDUSAT on education system and other methods used for e-learning at international/national level is discussed taking into various research studies conducted in previous years.
Full Paper
IJCST/53/spl1/A-110
11

The Cognitive Ergonomics of Efficient User Interface Design for Widows OS.

Ronda Madhu S R

Abstract
There has been radical shift in presentation layer for current Microsoft windows (desktop) applications. The traditional application centric user interface is dispensed with giving way to user centric interface design. This facilitates many advances into the psychological science of better work study. Its ready impact on human memory improving quality and hence efficiency of man hours at work can’t be undervalued. Thus it can be emphatically generalized to say that the better interface of software designed for users aids better work for organizations.
Full Paper
IJCST/53/spl1/A-111
12

Development of an Embedded Circuit and a Prototype Bucket Aeroponic System for Bitter Gourd Production.

Gagandeep Kaur, Dilip Kumar, Sukhwinder Singh

Abstract
The critical conditions for Bitter guard growers are pests and diseases. R&D efforts to protect this medicinal value plant were carried out in this research paper. Soil is main platform for pests and diseases to grow. A prototype bucket aeroponic system was developed and an embedded system using sensors were designed for this research work. This embedded system includes monitoring and control system. The prototype system was successfully tested in Central Potato Research Station (CPRS), Jalandhar, Punjab, India.
Full Paper
IJCST/53/spl1/A-112
13

Service Level Agreement for Cloud Computing Services: A Review Paper.

Dr. Sawtantar Singh Khurmi, Satinder Kaur

Abstract
Cloud computing is principally used as utility wherever cloud user hires services on pay-per usage mode. The understanding between user and repair supplier is through Service Level Agreement (SLA). In recent years, intensive analysis has been conducted within the space of Service Level Agreement (SLA). It’s a proper contract between the service supplier and user wherever all the terms and conditions square measure mentioned. The service supplier is liable for providing Quality of Service (QoS) to the user. Elementary issue is that the management of SLAs. Many languages and framework has been developed as solutions; but, there’s no overall classification for the intensive work. Therefore, the aim of this paper is to gift elaborate description concerning SLA; however SLA square measure created, managed and employed in cloud computing atmosphere.
Full Paper
IJCST/53/spl1/A-113
14

Exploring the Scope of Software Engineering in Cloud Computing.

Pallavi Narang, Dr. I.S.Hudiara, Dr. Sawtantar S Khurmi

Abstract
This paper describes cloud computing in depth, a computing platform for the next generation of the Internet. The paper defines clouds along with it explains the benefits of cloud computing as well as outlines cloud types and its major horizons in field of software engineering. This paper also presents a small glance of a new perspective of cloud computing.The growth of cloud computing in the area of software engineering with the help of SAAS is described. This paper also includes the advantages and future scope of cloud computing.
Full Paper
IJCST/53/spl1/A-114
15

Image Quantization Using HSI Model Based on Honey Bee Optimization.

Sunil Khullar, Dr. Chanderkant Verma

Abstract
Honey Bee Optimization is nature-inspired optimization has drawn the attention of researchers because of its efficiency in solving real-world optimization problems arising in several application domains. Color image quantization is an important process of representing true color images using a small number of colors. Existing color reduction techniques tend to alter image color structure and distribution. Thus the researchers are always finding alternative strategies for color quantization. The HSI color space is very important and attractive color model for image processing applications because it represents colors similarly how the human eye senses colors. The HSI color model represents every color with three components: hue (H), saturation (S), intensity (I). The objective of the research work is to investigate the performance of Honey Bee Optimization on color image quantization, compare the designed algorithm with other quantization techniques, test and implement the proposed algorithm.
Full Paper
IJCST/53/spl1/A-115
16

SWOT Analysis of Projects: An Indian Experience.

Resham Dhillon

Abstract
The e-governance is a new technology where information technology (IT) driven platform guides government to make information easily available to its citizens. Many projects are developed with the help of this technology. IT reinvents the government and makes it more transparent. The deep analysis of these projects shows that these technologies are having many strengths and weaknesses. This paper reviews the strengths, weaknesses, opportunities and threats (SWOT analysis of e-governance projects implemented in India. Not only that people interests in learning IT skills and getting good structural jobs strengthen the use of IT, but there are many weaknesses in utility of IT services because of local language, lack of awareness of public services, illiteracy, skill shortage, competition with private sector, brain drain of IT skilled people after training, influence of other culture, resistance of people digital divide, corruption, bureaucracy, maintaining disorder and no transparency like problems. As this technology is low cost and thus it makes e-governance more relevant to (a poor country) while compared with many developed countries.
Full Paper
IJCST/53/spl1/A-116
17

Personnel Surveillance Through Mobile Phone Tracking.

Arpita Singla, Dr. Sawtantar Singh

Abstract
Mobile penetration in India has reached 74% with a subscriber base of 898.02 million mobile phone subscribers as of December 2013. In India, as in most other developing countries, nearly all teenagers and working-age adults carry a mobile phone. When these phones communicate with the network they reveal their location to be within the coverage area of the base station antenna that received their transmission. This location data, if it were collected, could be used to derive movement information for most of the population. Such information does not currently. Location tracking is one of the killer applications available on the mobile devices. In this paper, various location tracking techniques are compared on the basis of how difficult it is to extract location information, how frequently it is generated, and the spatial accuracy when it is used to locate a mobile handset. A new model of an indoor location tracking system has been proposed that uses the existing on campus Wi-Fi infrastructure and signal strength to determine a user’s location. The model presented is cost effective; it does not require any additional hardware resources and is transparent to GSM operators in the country.
Full Paper
IJCST/53/spl1/A-117