IJCST Logo

International Journal of Computer Science and Technology
Vol 6.3 (AETM July to September 2015)

S.No. Research Topic Paper ID Download
1

Factors Incompatibility of Selection and Implementation of ERP Systems for Construction Organizations – Lessons from Sri Lanka

Kanishka Samudaya Nanayakkara, Prasad Perera, Asoka Perera

Abstract

Information and Communications Technology (ICT) and Information Systems (ISs) compose a critical role in today’s organization environment. Enterprise Systems (ESs) such as Enterprise Resource Planning (ERP), Customer Relationship Management (CRM) systems are the most cutting-edge IS in present corporate world. ERP system bridges the organization’s different functions together into single large integrated system and it makes an extra opportunity for growth and increased productivity. Enterprise system usage in manufacturing companies is well established. However, the available studies relating to the use of ERP systems in project based companies such as construction organizations is comparatively low and success rate is also limited. The literature illustrates that there are many factors that affect selecting and implementation of ERP systems.
Full Paper

IJCST/63/AETM 2015/001
2

Inaccuracy of Smartphone Sensors

Zoltan Horvath, Ildiko Jenak, Ferenc Brachmann, Sandor Jenei

Abstract

Nowadays for almost everybody smartphones are available, which are fitted with more and more sensors. These sensors can assist us in navigation either indoor or outdoor. This is why it is a question of grave importance that how precise, reliable data these sensors provide the users. We shouldn’t forget the factors influencing measurement results; even if terminating their influence appears impossible, we can moderate it.

Full Paper

IJCST/63/AETM 2015/002
3

Spectrum of Cyber World Security Issues and Analysis of its Effects on Sustainability of ICT

Narinder Singh Rana, Dr S.N Panda

Abstract

This paper is a survey of the fancies of the multi-dimensional cyber world, and the security issues effecting the sustainable development of the ICT sector. The authors have defined sustainability as a multi-facet entity, which has social and economic progress as its independent and mutually reinforcing pillars. The paper also analyzes the reasons for the digital divide which is found to be primarily caused by the security issues that are inherent part of the cyber world. These security issues are affecting the sustainable growth of the ICT sector and various other sectors dependent on it. The authors have also suggested some precautionary measures and best practices that can be followed by the individual and organizations which can ebb the fears of users and help in long term and sustainable development of ICT sector.

Full Paper

IJCST/63/AETM 2015/003
4

Study of Linux Kernel Parameters to Enhance TCP Performance

Sudhakar Mishra, Shefali Sonavane, Anil Gupta, Sweta Anmulwar, Tarun Batra

Abstract

Ethernet has grown from 10 Mbps to 10 Gbps surpassed the growth of microprocessor performance in mainstream servers and computers. Kernel parameter responsible for throughput comes with per-determined value. Network throughput can be increased if these values are assigned to the best possible values. Study of these parameters called as TCP tuning which adheres to find out the value for these parameters to achieve optimum performance. This paper describes parameters and their tuning through which system performance can be increased. Experiments carried out on 10 Gbps link with these setting to check the throughput performance gain.

Full Paper

IJCST/63/AETM 2015/004
5

Hash Key Based Effective Algorithm for Security in Cloud Infrastructure

Sachin Gupta, Dr. S.N. Panda, Dr. Bharat Bhushan

Abstract

Cloud computing is one of the growing domain in which remote resources are used on demand basis without having the physical infrastructure at the client end. In cloud computing, the actual resources are installed and deployed at remote locations. These resources are accessed remotely with different network based protocols. Cloud Computing technology is considered as a metaphor for Internet/Web Based Services in which there is the provision of Computational Resources On-Demand and hides enduser knowledge of the physical location and configuration of server. This paper underlines assorted aspects of cloud technology and simulation including the implementation of secured dynamic key based algorithm in cloud infrastructure.

Full Paper

IJCST/63/AETM 2015/005
6

Green Cloud Computing: “A Boon to Technology”

Gurpreet Singh Sandhu, Dr. Sawtantar Singh Khurmi, Dr. I.S.Hudiara

Abstract

Cloud computing is the whole new paradigm in the field of information technology and moving towards a cloud based system increases day by day because of this cloud base data center are growing really which leads to high energy utilization every day and also the emission of CO2 by these data centers greatly affect the environment. To conquer this trouble Green Computing came into subsistence. The main goal of green computing is to reprocess and use again. Green Computing help to obtain the similar computing speed at reduce energy utilization. In this paper I discussed about how green computing can be achieved by various algorithms which can reduce the energy consumption of cloud data centers which will in turn reduce the low emission of CO2. That arises research challenges when such energy-saving techniques are required to minimize the impact of Cloud computing on the environment.

Full Paper

IJCST/63/AETM 2015/006
7

E-Governance: Benefits and Challenges of Cloud Based Architecture

Inderpreet Kaur, Kiran Bala

Abstract

Cloud computing is a method of computing which is designed from the development of technologies for distributed computing, parallel computing and service-oriented architecture. And its aim is to provide communication and storage resources in a protected environment to deliver the services as fast as possible, which is provided via Internet platform. The provided Services in e-government are available through Internet, thus cloud computing can be used in the implementation of e-government architecture and provide better service with the lowest cost using its benefits. In this study, the cloud computing in e-government has been explained and it’s been attempted to identify the challenges and benefits of the cloud to get a better environment to implement new technology.
Full Paper

IJCST/63/AETM 2015/007
8

Cloud Computing Environment: A Review

Anil Raman

Abstract

Cloud computing is a new computing technique whose aim is to convert computing into utility. In this software or infrastructure is provided by various utility providers and user need not to purchase their own software and hardware. Here the customer will lease computing resources as a service, and take advantage of processing power and storage capabilities of a big centralized infrastructures rather using small client infrastructure. This is a great advantage for small organization and individuals who need to use computer services temporarily and don’t want to invest in dedicated infrastructure.Clouds can be Public, Private, Hybrid and Community depending on their location. Clouds can also be classified on the bases of services provided by them as IaaS, PaaS and SaaS. Beside this,there are various challenges like security, compliance, standards etc in cloud environment.

Full Paper

IJCST/63/AETM 2015/008
9

Time Based Resource Allocation in Cloud Computing

Ajesh Chopra, Malti Rani, Er. Tulika Mehta

Abstract

With the advancement in technology and to stay abreast in the technological world, cloud computing emerged as a new paradigm in the business market. It is a utility based model which offers Pay Per use. The increasing cloud computing services offer great opportunities for clients to find the maximum service and finest pricing, which however raises new challenges on how to select the best service out of the huge group, now to find the most appropriate node for our completion of task which is at quite a larger scale is challenging. Cloud Analyst is a tool that helps developers to simulate large-scale Cloud applications with the purpose of understanding performance of such applications under various deployment configurations

Full Paper

IJCST/63/AETM 2015/009
10

An Analytical Study on the Role of ICT in e-Governance

Resham Dhillon, Dr Vijay Laxmi

Abstract

The developments in the field of Information and Communication Technologies (ICT) have helped a lot to the governments and the people. The people have been able to use the services provided by the governments with ease. The government has been able to administer the services meant for the people efficiently after implementing ICT. The very first application using IT tools helped in managing information for planning and monitoring. With the introduction of internet/intranet the efficiency and effectiveness of government services improved.

Full Paper

IJCST/63/AETM 2015/010
11

A Comprehensive Study on the Security Framework in Cloud Computing

Satinder Kaur, Dr. Sawtantar Singh Khurmi

Abstract

Service Level Agreement (SLA) is defined as a legal agreement between the service provider and customer, the dynamic nature of Cloud Computing needs to continue monitoring of the services. Design of such agreement aim is to maximize the profit to provider as well as assured availability of services to customer. However the restricted choice of appropriate parameters in SLA affects the interacting of end user with cloud services and creates risks of user data.End users are concerned about their data and how it will be stored in cloud and how the data is recovered in the case of failure of disaster. However in reality, none of the SLA considers user perspective while conducting SLA.This paper will discuss about importance of the Parameter while conducting SLA.
Full Paper

IJCST/63/AETM 2015/011
12

A Framework of Online Handwritten Gurmukhi Script Recognition

Gurpreet Singh, Manoj Sachan

Abstract

The field of Pattern Recognition contributed up to a great extent in the Computer Vision and Machine Vision applications. Handwriting Recognition is one of the area under Pattern recognition. The current topic under handwriting recognition is Online mode of handwriting recognition. In this case user input the handwritten characters with the help of electronic devices like Digitizer Tablets and simultaneously a software system convert these handwritten characters to digital form. This recognition process totally depends on the complexity associated with the language in which text is written.

Full Paper

IJCST/63/AETM 2015/012
13

A Novel Design of Microstrip Fractal Antenna for IEEE 802.11 WLAN

Ram Krishan, Dr. Vijay Laxmi

Abstract

This paper presents a novel design of microstrip fractal antenna for IEEE 802.11 WLAN (Wireless Local Area Network). The proposed fractal antenna is designed using X shape slots with different sizes. This antenna can be used for frequency band of 2.4GHz. The fractal antenna is designed with substrate as FR4 Glass Epoxy with dielectric constant εr = 4.4 and thickness of 1.6 mm. Antenna achieves a good gain of 7.2db at resonant frequency of 2.49GHz. The simulation of fractal antenna is done with HFSS simulation software. Antenna result includes radiation pattern, VSWR and return loss are presented and discussed.
Full Paper

IJCST/63/AETM 2015/013
14

An Approach to Evaluate the Software Test Matrix Over Cloud Network

Pallavi Narang, Dr. I.S.Hudiara, Dr. Sawtantar Singh Khurmi

Abstract

Software Matrix computation has always been a hot issue since the development of software has taken place. A software matrix defines how effective a software could be in the provided conditions. A software matrix may include the costing of the software, the performance measure, time to evaluate a particular result and the effectiveness of the result produced. Here in this paper, a software has been analyzed in terms of costing which includes the consumption of the RAM (Random Access Memory), allocation time of tasks provided to the system and time to compute the same. This paper also presents a future scenario of the work process. The written segment code has been tested on the MICROSOFT cloud computing network WINDOW’S AZURE.

Full Paper

IJCST/63/AETM 2015/014
15

Testing Requirements for Mobile Applications

Dr. Rajnish Talwar, Dr. Bharat Bhushan, Rakesh Gupta

Abstract

Wireless networks have contributed to the technological advance that popularized the use of mobile devices, and fostered the development of applications targeted to these devices. However, issues such as mobility and communication intermittency, as well as processing, storage and battery constraints demand changes in the traditional software testing process. This paper aims to present testing requirements that are specific to applications developed for mobile devices. We also show that these requirements can improve productivity and efficacy in the testing process of an application.

Full Paper

IJCST/63/AETM 2015/015
16

E-Governance- Combating Corruption Strategy

Sapanjeet Kaur

Abstract

This paper defines the e-government strategy to reduce corruption. How e-government increase the transparency, efficiency, and accountability in all the government services. This study focus on different projects of e-government that is helpful to reduce corruption. This paper explore these projects are really decrease the level of corruption in different states. The e-governance projects combating corruption in different departments of government. The services of government become online, that help to reduces corruption.

Full Paper

IJCST/63/AETM 2015/016
17

Applications and Damage Penetration of WSN: A Review

Rina Sharma, Dr. Himani

Abstract

All future application and Internet of Things will have high dependency on Wireless Sensor Network (WSN) it is an emerging technology showing a great promise to mass public, military and other relevant sectors like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios.In every aspects of life security is essential. In this paper we focus on the utilization of WSN technology in one part and in another part we focus on the review of some security considerations which shows the damage penetration on different kind of attacks. It is still very early in the lifetime of WSN because many different challenges exist.

Full Paper

IJCST/63/AETM 2015/017
18

Open Source Software-Its Impact on Software Industry in India

Harmaninder Jit Singh Sidhu, Dr. Sawtantar Singh Khurmi

Abstract

The numbers of open source (OS) projects are increasing day by day and are increasingly funded by commercial sector that wish to make profits from their investments. This is made possible by bundling OS software with proprietary products like cell phones and services such as technical support. The need of the hour is to acclimatize traditional OS institutions by private industry in its commercial setting. But, as far as OS software development is concerned there is a big difference in development conditions prevailing in developed and developing countries. It is a common belief that developing country means high level of illiteracy, poor standards of living, limited infrastructure and a low gross domestic product.

Full Paper

IJCST/63/AETM 2015/018
19

Optimisation of Wireless Local Area Network

Kaur Sumanpreet, Dr. Sawtantar Singh Khurmi

Abstract

While installing WLAN (Wireless Local Area Network) at any place, the industry trend is in promoting the quick and easy methodology of one Access Point (AP) per room, without proper analysis of the need and c-channel interference of signals and other problems. The present approach adopted by the vendors, or installation engineers to define and design WLAN is lazy, greedy and is wrong. The shortcomings and extra financial expenditure without any fruit come to knowledge only in post-installation validation surveys. There is need to complete analysis and proper design process including defining requirements to meet needs of users and validate it after installation. We will take the example of an educational institute to discuss the case here.
Full Paper

IJCST/63/AETM 2015/019
20

A Comparative Analysis of Recommender System For Social Networking Sites: A Case Study of Facebook, Twitter, Jeevansathi and Amazon in Punjab

Ramanpreet Kaur, Dr. Sawtantar Singh Khurmi

Abstract

With the advent of computers and other means for mass digital storage, we started collecting and storing all sorts of data. Today, we have far more information than we can handle. Information retrieval is simply not enough anymore for decision-making. Confronted with huge collections of data, we have now created new needs to help people make better managerial choices. Recommender Systems are the tool and techniques which provide suggestions for the services and information of use. The systems are achieving widespread success in social networking sites nowadays.

Full Paper

IJCST/63/AETM 2015/020
21

A Review of Adoption of Cloud Computing in the Higher Education Institutions

Rekha Rani, Dr. Sawtantar Singh Khurmi

Abstract

Information technology has changed the old era of education and its methods. One of the key factor of is cloud computing which puts tremendous applications in quality of education in form of advance Services. cloud computing provides virtual resource on demand self- Services, broad network access, resource pooling, rapid elasticity, measured service are the most essential Characterstics. Beside all of above there are many important and serious concerns which are related with higher education for campus students like policy and control issues.

Full Paper

IJCST/63/AETM 2015/021