Journal of Computer & Information Technology

Papers

Voulume: 1
Issue: 2
Journal Paper Splitter
Article No. 1
Mobile Agent Technology -Security Threats and Measures
M A Rizvi1, R K Kapoor2, M M Malik3 and Sanjay Sharma4

1National Institute of Technical Teachers Training and Research, Bhopal India

2National Institute of Technical Teachers Training and Research, Bhopal India

3 Department of Physics Maulana Azad National Institute of Technology Bhopal India

4Depatment of Computer Applications Maulana Azad National Institute of Technology, Bhopal India

Email:-marizvi@hotmail.com

Abstract :

 Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can start its execution on a host computer that provides the necessary computational environment to run that agent, suspend its execution on the host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. Incarnations of current generation agent can be characterized in a number of ways varying from simple distributed objects to highly organized software with embedded intelligence. A mobile agent is a particular type of agent with the ability to migrate from one host to another where it can resume its execution.

Thus, as the sophistication of mobile software has increased, the associated threats to security have also increased. This paper provides an overview of the variety of threats that are being faced by the designers of agent platforms and the developers of agent based applications. The paper also identifies generic objectives of agent security, and presents a range of measures for countering the identified threats and fulfilling these security objectives.

Keyword : Mobile agent Technology
DOI :
Download Count : 1197
View Count : 1281
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 2
Improving Requirement Specification Task
Vivek Mishra

Lecturer Department of MCA I.E.T. Dr. R.M.L. University Faizabad India

 

Abstract :

Improvement in traditional paper based R S Task is basically improvement in requirement specification tools by which the R S Tasks does its work. The improvement in R S Tools will not only enable better Requirement Management; but it also enable the automatic generation of consistent, current and audience specific Request Specification that for meet the demand of their individual looker-on. 
 

Keyword :  BLOB, CaliberRM, DOORS, CASE, IDE.
DOI :
Download Count : 1143
View Count : 1252
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 3
"Re-Pro-active vs Hybrid Protocols": A Simulation study between different routing approaches using traversing in Wireless Ad-hoc network
Akhilendra S. Bhadoria, Sanjeev Sharma, Manisha Bhadoria and Rajesh Wadhwani

Department of Computer Science, MANIT Bhopal India

Abstract :

Ad-hoc networking is a concept in computer communications, which means that users wanting to communicate with each other form a temporary network, without any form of centralized administration. A node roaming in a particular network is a challenging task for any network management and key aspects is how we can deploy its information through routing protocols to the base station or destination. In this paper, we use to analyze the performance and comparison of good combination of Reactive, Proactive and Hybrid routing protocol5 for CBR in wireless ad-hoc network. We compare four routing protocols: Zone routing protocol (ZRP)9, which comprises in Hybrid protocol, Optimized link state routing (OLSR), comes in Proactive routing protocol, and ad hoc on-demand distance vector (AODV) and Dynamic MANET on-demand routing protocol (DYMO), which is in Reactive protocol. We simulate the performance of these routing protocols using QualNet Simulator of Scalable Networks. 
 

Keyword :  Wireless Ad-hoc network, QualNet, routing protocols.
DOI :
Download Count : 1067
View Count : 1179
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 4
Intelligent Computing Methods in Medical Diagnosis
1Noor Maizura Mohamad Noor1, Fatihah Mohd, 2Zainab Abu Bakar, 3Zainul Ahmad Rajion and 3Rajan Saini

1Computer Sciences Department , University Malaysia Terengganu (UMT)

2faculty of Computer Science and Mathematics, Universiti Teknology MARA Malaysia

3School of Dental Sciences, University Sains Malaysia Kelatan Malaysia

 

Abstract :

 Disease diagnoses are a complex tasks in medical practice, especially for medical students and new apprentice staff. One of the most promising fields in bioinformatics is medical decision support system. Various artificial intelligent approaches are now being applied to enhance decision making of the clinicians such as using artificial neural networks, fuzzy logic, Bayesian networks, expert system and genetic algorithm. Numerous artificial intelligent techniques are integrated into hybrid intelligent medical informatics in order to produce most effective results in diagnostic tasks. 

Keyword : Bayesian networks, decision support system, diagnosis, fuzzy logic, hybrid intelligent system, medical, neural network.
DOI :
Download Count : 1166
View Count : 1245
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 5
Discovery Mining on web Intelligence with SQL Inference
SUVANAM SASIDHAR BABU

Department of Computer University of Gondar, Gondar Ethiopia

Abstract :

When drilling for data via SQL injection there are three classes of attack in band, out-of-band and the relatively unknown inference attack. In band attacks extract data over the same channel between the client and the web server, for example, results are embedded in a web page via a union select. Out-of-band attacks employ a different communications channel to drill for data by using database mail or HTTP functions for example. Inference attacks stand alone in the fact that no actual data is transferred rather, a difference in the way an application behaves can allow an attacker to infer the value of the data. SQL Inference is the subject of this paper; this paper is the paper I promised I'd write after talking about this at the Blackhat Security Briefings in Europe in the March of 2005. Better late than never. Mining subtopics from web logs and analyzing their spatial temporal patterns have applications in multiple domains. In this paper, we define the novel problem of mining spatiotemporal theme patterns from web logs and propose a novel probabilistic approach to model the subtopic themes and spatiotemporal theme patterns simultaneously. The proposed model discovers spatiotemporal theme patterns by (1) extracting common themes from web logs; (2) generating theme life cycles for each given location; and (3) generating theme snap-shots for each given time period. Data mining holds the key to uncovering and cataloging the authoritative links, traversal patterns, and semantic structures that will bring intelligence and direction to our Web interactions.

Keyword : Spatiotemporal text mining, web logs, mixture model, theme pattern, Application Defined Query (ADQ)
DOI :
Download Count : 1046
View Count : 1282
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 6
Digital repository system: A study of School of management technology (smt), Abubakar Tafawa Balewa University, Bauchi (Nigeria)
Isa Ali Ibrahim and Hussaini Mamman

Information Technology Programme, School of Management  Technology, Abubakar Tafawa-Balewa University Bauchi Nigeria

Email:-Isapar.tani@yahoo.com

Abstract :

A digital repository, called Predire, was designed in this study to address the problem of preservation, accessibility and documentation of project reports at School Management Technology (SMT). System analysis and design methodology is used and the system is implemented using PHP, MySQL, HTML, CSS and Ajax

Keyword : Digital repository system
DOI :
Download Count : 1106
View Count : 1190
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 7
Prediction of Therapeutic Diet for Obese Subjects Based on Economic Status using Data Mining Techniques
Rashmi Tiwari1, Abha Wadhwa2 and Anjana Mishra3

1,3Govt Narmada P.G.College Hoshangabad India

2Govt. Home Sciene P.G. College Hoshangabad India

Abstract :

In our society people are suffering from obesity. The data related to patient is very large, therefore the need for efficient management of data was felt. The treatment of diseases is a vital and difficult job in medicine. The different types of therapies prevailing in our society emphasize on n types of suggestions. Among these diet therapy is most relevant therapy and it also deals with large databases, so using different Data Mining techniques like - classification, predictive data modeling, an association rule, clustering. Among which clustering technique is used for the classification of similar data in one group and dissimilar data in different groups. First grouping is accomplished by finding similarity between data according to the economic status characteristics of the actual patient data . These groups are the clusters of low, moderate and high. This paper focuses on the diet prediction based on economic status of Indian Society for obese subjects18 by correlating diet nutrients to different sections according to their financial capabilities.

Keyword : Data Mining, Data Mining Techniques, Diet Therapy, Clustering, Association Rule, Universal Set, Therapeutic diet
DOI :
Download Count : 947
View Count : 1269
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 8
Application of Information and Communication Technology in University Libraries
Dev Prakash Singh1 and Vinod Kumar Singh2

1Institute of Commerce and Management , Jiwaji University, Gwalior MP India

2Department of Library & Information Science, University of Delhi ,Delhi

Email:-dev_prakash86@yahoo.com

Abstract :

Information and Communication Technology (ICT) has revolutionised library and information services. Libraries are now expected to use various information technologies to provide information more expeditiously and exhaustively than before. The libraries have found it very difficult to acquire, arrange, process and disseminate information in traditional ways. Information and communication technology offers numerous possibilities to improve information management in libraries and therewith make better use of employees' knowledge. One of such options is use of intranet as internal information system of Universities, which is based on Internet protocols and services. It enables relatively inexpensive and simple storage, organization, processing, maintenance and sharing of information between the library users and library; all these tasks are essential for good information management. It could be possible easy use of libraries, very easy search of any book, research article, thesis, or any type of material in libraries because of the Information and Communication Technology. ICT presents use of various technologies such as computer, telecommunications, Internet, Intranet, application software, micrographic, reprographics, video recordings and other electronic devices for the storage, retrieval, reproduction and dissemination of information in a library environment.

Keyword : Library; Information Technology; Information and Communication Technology,
DOI :
Download Count : 1187
View Count : 1224
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 9
Using Quality Models to Engineer Quality Requirements
Vivek Mishra

Lecturer Department of MCA I.E.T. Dr. R.M.L.  Awadh University Faizabad India

Abstract :

It is known to all that quality requirements are of many kinds. A quality model gives a foundation based on structure. In this model I identify, analyze and give a special name to these quality requirements.
 

Keyword : Quality models, Quality factors, Quality criteria, Quality measures
DOI :
Download Count : 1258
View Count : 1265
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Ansari Education And Research Society
Facebook Google Plus Twitter