archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • A Threshold Secure Data Sharing Scheme for Federated Clouds
    Abstract Cloud computing allows users to view computing in a new direction as it uses the existing technologies to provide better IT services at low cost To offer high QOS to customers according SLA cloud services broker or cloud service provider uses individual cloud providers that work collaboratively to form a federation of clouds It is required in applications like Real time online interactive applications weather research and forecasting etc in which the data and applications are complex and distributed In these applications secret data should be shared so secure data sharing mechanism is required in Federated clouds to reduce the risk of data intrusion the loss of service availability and to ensure data integrity So In this paper we have proposed zero knowledge data sharing scheme where Trusted Cloud Authority TCA will control federated clouds for data sharing where the secret to be exchanged for computation is encrypted and retrieved by individual cloud at the end Our scheme is based on the difficulty of solving the Discrete Logarithm problem DLOG in a finite abelian group of large prime order which is NP Hard So our proposed scheme provides data integrity in transit data availability when one of host providers are not available during the computation References Cited By Recommendations of National Institute of Standards and Technology online Available http csrc nist gov publications nistpubs 800 145 SP800 145 pdf Cloud computing Wikipedia online Available at http en wikipedia org wiki Cloud computing July 2010 Cloud Computing Use Cases A white paper produced by the Cloud Computing Use Case Discussion Group Version 4 0 online Available http cloudusecases org Rajkumar Buyya Rajiv Ranjan and Rodrigo N Calheiros InterCloud Utility Oriented Federation of Cloud Computing Environments for Scaling of Application Services ICA3PP 2010 Part I LNCS 6081 Springer 2010 pp 13 31 doi 10 1007 978 3 642 13119 6 2 S Subashini and V Kavitha A survey on security issues in service delivery models of cloud computing Journal of Network and Computer Applications 2011 pp 1 11 doi 10 1016 j jnca 2010 07 006 Cloud Security Alliance Security Guidance for Critical Areas of Focus in Cloud Computing V2 1 2009 Dec 2011 Federated identity management Online Available http en wikipedia org wiki Federated identity management Xiao Zhang Hong tao Du Jian quan Chen Yi Lin Lei jie Zeng Ensure Data Security in Cloud Storage Network Computing and Information Security NCIS International Conference IEEE vol 1 14 15 May 2011 pp 284 287 doi 10 1109 NCIS 2011 64 David Villegas Norman Boboroff Ivan Rodero Javier Delgado yanbin Liu Aditya D Liana Fong S Masoud Sajadi ManishP Cloud federation in a layered service model Journal of Computer and System sciences Elsevier 2012 doi 10 1016 j jcss 2011 12 017 M A AlZain and E Pardede Using Multi Shares for Ensuring Privacy in Database as a Service 44th Hawaii International Conference on System Sciences HICSS 2011 pp 1 9 doi 10 1109 HICSS 2011 478 David Bernstein DeepakVij Intercloud Security

    Original URL path: http://www.ijorcs.org/manuscript/id/44/kvenkataramana/a-threshold-secure-data-sharing-scheme-for-federated-clouds (2016-05-01)
    Open archived version from archive


  • Academic Talent Model Based on Human Resource Data Mart
    supervision conferences research and others Apart from the talent attribute collected the forecasting talent academician model developed using the classification technique involving 14 classification algorithm in the experiment for example J48 Random Forest BayesNet Multilayer perceptron JRip and others Several experiments are conducted to get the highest accuracy by applying discretization process dividing the data set in the different interval year 1 2 3 4 no interval and also changing the number of classes from 24 to 6 and 4 The best model is obtained 87 47 accuracy using data set interval 4 years and 4 classes with J48 algorithm References Cited By H H A Talib and K R Jamaludin Aplikasi Teknologi Maklumat IT Dalam Pengurusan Organisasi Sorotan Kajian Jurnal Teknikal dan Kajian Sosial Jilid 1 pp 89 105 2003 M Armstrong A Handbook of Human Resource Management Practice 10th Edition pp 1 957 2006 A Mehta Human Capital Management A Comprehensive Approach to Augment Organizational Performance Review of Management Vol 1 No 2 April June 2011 ISSN 2231 0487 vol 1 pp 44 57 2011 P M Powell et al Talent Management in the NHS Managerial Workforce National Institute for Health Research NIHR pp 1 216 2012 B Davies and B J Davies Talent management in academies International Journal of Educational Management vol 24 pp 418 426 2010 doi 10 1108 09513541080000452 T Perrin Talent Management The State of the Art A TP Track Research Report pp 1 17 2005 Q Shi and M Chen Design and Development of Management System for Reserve Talents of Volleyball Athletes in Multimedia and Information Technology MMIT 2010 Second International Conference on 2010 pp 151 154 L Shi and Q Bai Design a New Coherent Framework for Human Resource Personnel Evaluation Information System Based on Tasks Management International Conference on Business Computing and Global Informatization pp 479 481 2011 doi 10 1109 BCGIn 2011 126 C F Chien and L F Chen Data mining to improve personnel selection and enhance human capital A case study in high technology industry Expert Systems with Applications vol 34 pp 280 290 2008 doi 10 1016 j eswa 2006 09 003 H Jantan et al Classification and Prediction of Academic Talent Using Data Mining Techniques Knowledge Based and Intelligent Information and Engineering Systems vol 6276 R Setchi et al Eds ed Springer Berlin Heidelberg 2010 pp 491 500 C Mulin and H Reen Arkadin develops employee talent through e learning Strategic HR Review vol 9 pp 11 16 2010 H Jantan Framework of Intelligent Decision Support System for Talent Management p 286 2011 C Chen Fu and C Li Fei Using Rough Set Theory to Recruit and Retain High Potential Talents for Semiconductor Manufacturing Semiconductor Manufacturing IEEE Transactions on vol 20 pp 528 541 2007 V Mohanraj et al Intelligent Agent Based Talent Evaluation Engine Using a Knowledge Base in Advances in Recent Technologies in Communication and Computing 2009 ARTCom 09 International Conference on 2009 pp 257 259 doi 10 1109 ARTCom 2009 214 N Goonawardene

    Original URL path: http://www.ijorcs.org/manuscript/id/45/mahani-saron/academic-talent-model-based-on-human-resource-data-mart (2016-05-01)
    Open archived version from archive

  • A Comparative Study of Image Compression Algorithms
    DWT are discussed for image compression and their performance is evaluated in terms of Peak Signal to Noise Ratio PSNR Mean Square Error MSE and Compression Ratio CR The experimental results obtained from the study shows that the Hybrid DCT DWT technique for image compression has in general a better performance than individual DCT or DWT References Cited By Anil Kumar Katharotiya Swati Patel Mahesh Goyani Comparative Analysis between DCT DWT Techniques of Image Compression Journal of Information Engineering and Applications Vol 1 No 2 2011 R K Rao P Yip Discrete Cosine Transform Algorithms Advantages and Applications NY Academic 1990 G Joy Z Xiang Reducing false contours in quantized color images Computer and Graphics Elsevier Vol 20 No 2 1996 pp 231 242 doi doi 10 1016 0097 8493 95 00098 4 T H Yu S K Mitra Wavelet based hybrid image coding scheme Proc IEEE Int Circuits and Systems Symp Vol 1 1997 pp 377 380 doi 10 1109 ISCAS 1997 608746 U S Mohammed W M Abd elhafiez Image coding scheme based on object extraction and hybrid transformation technique International Journal of Engineering Science and Technology Vol 2 No 5 2010 pp 1375 1383 R Singh V Kumar H K Verma DWT DCT hybrid scheme for medical image compression Journal of Medical Engineering and Technology Vol 31 No 2 2007 pp 109 122 doi 10 1080 03091900500412650 R K Rao P Yip Discrete Cosine Transform Algorithms Advantages and Applications NY Academic 1990 Suchitra Shrestha Hybrid DWT DCT Algorithm for Image and Video Compression applications A Thesis University of Saskatchewan Electrical and Computer Engineering Dept Canada 2010 doi 10 1109 ISSPA 2010 5605474 K A Wahid M A Islam S S Shimu M H Lee S Ko Hybrid architecture and VLSI implementation of the Cosine Fourier Haar transforms Circuits Systems and Signal Processing Vol 29 No 6 2010 pp 1193 1205 Suchitra Shrestha Khan Wahid 2010 Hybrid DWT DCT Algorithm for Biomedical Image and Video Compression Applications Proceeding 10th International Conference on Information Science Signal Processing and their Applications ISSPA 2010 Swastik Das and Rasmi Ranjan Sethy Digital Image Compression using Discrete Cosine Transform and Discrete Wavelet Transform B Tech Dissertation NIT Rourkela 2009 Rupinder Kaur Nisha Kaushal Comparative Analysis of various Compression Methods for Medical Images National Institute of Technical Teachers Training and Research Panjab University Chandigarh Rehna V J Jeya Kumar M K Hybrid Approach to Image Coding A Review International Journal of Advanced Computer Science and Applications Vol 2 No 7 2011 Mulla Afshan Namrata Gunjikar and Radhika Naik Comparison of Different Image Compression Techniques International Journal of Computer Applications 70 28 2013 Bansal Nikita Image Compression Using Hybrid Transform Technique Journal of Global Research in Computer Science 4 1 2013 13 17 Sekaran KC Chandra and K Kuppusamy Efficiency of Gaussian Pyramid Compression Technique for Biometric Images International Journal of Computer Science Issues IJCSI 11 3 2014 77 Ranparia Mital and Falgun Thakkar Wavelet based Abnormality Detection and Compression of MRI Images International Journal

    Original URL path: http://www.ijorcs.org/manuscript/id/46/kiran-bindu/a-comparative-study-of-image-compression-algorithms (2016-05-01)
    Open archived version from archive

  • Secure Electronic Lock using PIC 16f628a Microcontroller
    16f628a Microcontroller International Journal of Research in Computer Science 2 no 5 2012 43 47 doi 10 7815 ijorcs 25 2012 047 Close Abstract The proposed system implements an electronic embedded lock that provides a great benefit over a traditional lock which uses only a manual key If in case the key is lost or stolen then anyone can open the lock using the key On the other hand losing a long and complex password or getting it stolen is harder as compared to a traditional key Further a combination of both the manual key with a computerized password makes the system more secure A longer password will reduce the possibilities of getting the code broken and opening the lock Our system comprises of a keypad and HD44780 20x2 LCD along with a PIC16f628a microcontroller The firmware controls these components in such a way that interaction with keypad is very easy and smooth The LCD provides user with messages and notifications to inform about the current system state User can perform operations such as opening and closing the lock changing the current password in the microcontroller EEPROM and clearing a single digit while entering the password when wrong digit entered back space The proposed system s firmware is developed using assembly language with MPLAB development environment It is tested and implemented at the actual hardware level with proper functioning of the system and it is completely bug free References Cited By Milan Verle PIC Microcontrollers mikroElektronika 1st edition 2008 Nebojsa Matic PIC Microcontrollers on line MikroElektronika 2000 Microchip PIC16F628x Data Sheet Microchip Hitachi LCD HD44780 datasheet Hitachi Peter JAKAB Electronic Combination Lock based on PIC Online Available http jap hu electronic combination lock html DAT Simple Combination lock Project with keypad and LCD Online Available http www 8051projects net download

    Original URL path: http://www.ijorcs.org/manuscript/id/47/muhanad-hayder-mohammed/secure-electronic-lock-using-pic-16f628a-microcontroller (2016-05-01)
    Open archived version from archive

  • A Conceptual Model for Ontology Based Learning
    to describe the proposed model s functionality Utilizing learning ontology to improve the proposed conceptual model can be used also as a guide to model learning and also can be useful in different learning models comparison So that the key concepts which can be used for considered learning model will be determined Furthermore an example based on proposed ontology and definition features is explained References Cited By Y Bar Yam Dynamics of Complex Systems Addison Wesley 1997 J H Miller and S E Page Complex Adaptive Systems An Introduction to Computational Models of Social Life Princeton University Press 2007 T Banirostam and M N Fesharaki Effect of Learning and Database in Robustness of Security Tools Based on Immune System Modeling European Modeling Symphosium EMS 2011 Madrid Spain 2011 pp 47 52 J B Tenenbaum Bayesian modeling of human concept learning Advances in Neural Information Processing Systems 11 Cambridge MA MIT Press 1999 K R Canini M M Shashkov and T L Griths Modeling Transfer Learning in Human Categorization with the Hierarchical Dirichlet Process Proceedings of the 27th International Conference on Machine Learning Haifa Israel 2010 M J Prince R M Felder Inductive Teaching and Learning Methods Definitions Comparison and Research Bases J Engr Education 95 2 2006 pp 123 138 Encyclopedia Britannica Micropedia Vol 6 1978 New Webster Dictionary of the English language Delair Publication 1985 G A Kimble Hilgard and Marquis Conditioning and learning 2nd Edition New York Appleton Century Crofts 1961 1 Y Tsypkin Adaptation and Learning in Autonomic Control Academic Press New York 1971 M I Shlesinger Learning of Image Recognition Encyclopedia of Cybernetics Vol 2 Kiev 1975 H A Simon Why should machines Learn Machine Learning An Artificial Intelligence Approach Vol 1 Tioga Palo Alto CA 1983 M Minsky The Society of Mind Simon and Schuster New York 1985 R S Michalski Understanding the Nature of Learning Issues and research directions Machine Learning An artificial Intelligence Approach Vol 2 Los Altos CA 1986 P S Churchland Neurophilosophy Toward a Unified Science of the Mind Brain MIT Press Cambridge 1986 A M Mestel and J S Albus Intelligent Systems Architecture Design and Control Chapter 10 Wiley Interscience New York 2002 T Altiok and B Melamed Simulation Modeling and Analysis with ARENA Academic Press 2007 J A Sokolowski C M Banks Principles of Modeling and Simulation A Multidisciplinary Approach A John Wiley Sons 2009 T Kuhne What is a Model Language Engineering for Model Driven Software Development in Dagstuhl Seminar In Dagstuhl Seminar Dagstuhl Seminar Proceedings 04101 March 2005 J M Epstein Why Model Journal of Artificial Societies and Social Simulation vol 11 no 4 12 2008 H Stachowiak Allgemeine Modelltheorie Springer Verlag Wien and NewYork 1973 doi 10 1007 978 3 7091 8327 4 J G Johnson Cognitive Modeling of Decision Making in Sports Elsevier Psychology of Sport and Exercise 7 2006 pp 631 652 doi 10 1016 j psychsport 2006 03 009 A Gemino and Y Wand A framework for empirical evaluation of conceptual modeling techniques

    Original URL path: http://www.ijorcs.org/manuscript/id/50/touraj-banirostam/a-conceptual-model-for-ontology-based-learning (2016-05-01)
    Open archived version from archive

  • Ontology Based Information Extraction for Disease Intelligence
    researchers on the subject to try out different solutions for curing diseases References Cited By Berners Lee T Hendler J Lassila O 2001 The Semantic Web Scientific American 284 34 43 Visser P R S van Kralingen R W and Bench Capon T J M 1997 A method for the development of legal knowledge systems In Proceedings of the Sixth International Conference on Artificial Intelligence and Law ICAIL 97 Melbourne Australia Introduction to Semantic Web Tutorial 2011 Semantic Technologies Conference 6th of June 2011 San Francisco CA USA Ivan Herman W3C OWL Working Group Available http www w3 org 2007 OWL wiki OWL Working Group Accessed 29 May 2011 OWL 2 Web Ontology Language Primer Available http www w3 org TR 2009 REC owl2 primer 20091027 Accessed 19 May 2011 Universal Resource Identifiers Axioms of Web Architecture Available http www w3 org DesignIssues Axioms html Tim Berners Lee December 19 1996 Accessed 15 May 2011 Resource Description Framework RDF Available http www w3 org RDF Accessed 19 June 2011 OWL 2 Web Ontology Language Primer Available http www w3 org TR 2009 REC owl2 primer 20091027 Accessed 19 June 2011 SNOMED CT Available http www ihtsdo org index php id snomed ct0 Accessed 9 June 2011 An Introduction to the Gene Ontology Available http geneontology org GO doc shtml Accessed 15 June 2011 About NCBO Available http www bioontology org about ncbo Accessed 15 June 2011 Ruttenberg A Clark T Bug W Samwald M Bodenreid er O Chen H et al 2007 Advancing translational research with the Semantic Web BMC bioinformatics 8 Suppl 3 S2 doi 10 1186 1471 2105 8 S3 S2 Semantic Web Health Care and Life Sciences HCLS Interest Group Available http www w3 org 2001 sw hcls Accessed 6 May 2011 Du montier M Villanueva Rosales N 2009 Towards pharmacogenomics knowledge discovery with the semantic web Briefings in Bioinformatics 10 2 153 163 Annotating the human genome with Disease Ontology Available http www biomedcentral com 1471 2164 10 S1 S6 Accessed 9 May 2011 Medical Subject Headings MeSH Available http www nlm nih gov pubs factsheets mesh html Accessed 14 May 2011 PubMed Help Available http www ncbi nlm nih gov books NBK3827 pubmedhelp PubMed Quick Start Accessed 10 May 2011 http www nlm nih gov pubs factsheets medline html Accessed 19 May 2011 Uschold M and King M 1995 Towards a methodology for building ontologies In Workshop on Basic Ontological Issues in Knowledge Sharing held in conjunction with IJCAI 95 Montreal Canada doi 10 1017 S0269888900007797 Gruninger M and Fox M S 1995 Methodology for the Design and Evaluation of Ontologies In Proceedings of the Workshop on Basic Ontological Issues in Knowledge Sharing IJCAI 95 Montreal Uschold M and Gruninger M 1996 Ontologies Principles Methods and Applications Bernaras A Laresgoiti I and Corera J 1996 Building and reusing ontologies for electrical network applications In Proceedings of the European Conference on Artificial Intelligence ECAI 96 Gomez Perez A 1996 A framework to verify knowledge sharing technology

    Original URL path: http://www.ijorcs.org/manuscript/id/51/prabath-chaminda-abeysiriwardana/ontology-based-information-extraction-ford-disease-intelligence (2016-05-01)
    Open archived version from archive

  • Can Feature be used to Model the Changing Access Control Policies ?
    security in Proceedings of the International Conference on the Unified Modeling Language UML 2002 2002 pp 426 441 T Priebe E Fernandez J Mehlau and G Pernul A Pattern System for Access Control in Proceedings of Conference on Data and Application Security 2004 pp 22 28 doi 10 1007 1 4020 8128 6 16 Steve Barker Security Policy Specification in Logic in Proceedings of the International Conference on Artificial Intelligence ICAI 2000 Las Vegas NV 2000 pp 143 148 Steve Barker and Arnon Rosenthal Flexible security policies in SQL in Proceedings of the fifteenth annual working conference on Database and application security Niagara Ontario Canada 2001 pp 167 180 Elisa Bertino Piero Andrea Bonatti and Elena Ferrari TRBAC a temporal role based access control model in RBAC 00 Proceedings of the fifth ACM workshop on Role based access control Berlin Germany 2000 pp 21 30 doi 10 1145 501978 501979 Fang Chen and Ravi S Sandhu Constraints for role based access control in RBAC 95 Proceedings of the first ACM Workshop on Role based access control 1995 p Article No 14 doi 10 1145 270152 270177 R J Hayton J M Bacon and K Moody Access control in open distributed environment in In IEEE Symposium on Security and Privacy Oakland CA 1998 pp 3 14 doi 10 1109 SECPRI 1998 674819 Michael Hitchens and Vijay Varadharajan Tower A Language for Role Based Access Control in POLICY 01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks Bristol U K 2001 pp 88 106 doi 10 1007 3 540 44569 2 6 S Jajodia P Samarati and V S Subrahmanian A Logical Language for Expressing Authorizations in IEEE Symposium on Security and Privacy pages Oakland CA 1997 pp 31 42 doi 10 1109 SECPRI 1997 601312 R Ortalo A Flexible Method for Information Systems Security Policy Specification in Proceedings of the 5th European Symposium on Research in Computer Security Louvain la Neuve Belgium 1998 doi 10 1007 BFb0055856 J A Hoagland R Pandey and K N Levitt Security Policy Specification Using a Graphical Approach Computer Science Department University of California Davis Technical Report 1998 OASIS 2002 Available http www oasis open org committees xacml C Ribeiro A Zuquete and P Ferreira SPL An Access Control Language for Security Policies with Complex Constraints in roceedings of the Network and Distributed System Security Symposium San Diego CA 2001 I Ray N Li R B France and D K Kim Using UML to visualize role based access control constraints in Proceedings of the Symposium on Access Control Models and Technologies SACMAT 2004 pp 31 40 doi 10 1145 990036 990054 I Ray N Li D K Kim and R B France Using parameterized UML to specify and compose access control models in Proceedings of the 6th IFIP TC 11 WG 11 5 Working Conference on Integrity and Internal Control in Information Systems IICIS 03 Lausanne Switzerland 2003 2003 doi 10 1007 1 4020 7901 X 4 R Filman T Elrad S

    Original URL path: http://www.ijorcs.org/manuscript/id/52/k-shantha-kumari/can-feature-be-used-to-model-the-changing-access-control-policies (2016-05-01)
    Open archived version from archive

  • Commentz-Walter: Any Better than Aho-Corasick for Peptide Identification ?
    Aho Corasick and Boyer Moore Large scale rapid and accurate peptide identification is critical in computational proteomics In this paper we have critically analyzed the time complexity of Aho Corasick and Commentz Walter for their suitability in large scale peptide identification According to the results we obtained for our dataset we conclude that Aho Corasick is performing better than Commentz Walter as opposed to the common beliefs References Cited By Kal S Bioinformatics Sequence alignment and Markov models McGraw Hill Professional 2008 Vidanagamachchi S M Dewasurendra S D Ragel R G Niranjan M Tile optimization for area in FPGA based hardware acceleration of peptide identification Industrial and Information Systems ICIIS 2011 6th IEEE International Conference 16 19 Aug pp 140 145 doi 10 1109 ICIINFS 2011 6038056 A V AHO M J CORASICK Efficient string matching an aid to bibliographic search Communications of the ACM Vol 18 No 6 1979 pp 333 340 doi 10 1145 360825 360855 Commentz Walter B A String Matching Algorithm Fast on the Average Automata Languages and Programming Springer Berlin Heidelberg 1979 pp 118 132 Boyer Robert S Moore J STROTHER A fast string searching algorithm Communications of the ACM Vol 20 No 10 1977 pp 762 772 doi 10 1145 359842 359859 Komodia 2012 Aho Corasick source code Available http www komodia com aho corasick Uniprot 2012 Uniprot Available http www uniprot org Zeeshan A KHAN R K PATERIYA Multiple Pattern String Matching Methodologies A Comparative Analysis International Journal of Scientific and Research Publications IJSRP Vol 2 No 7 2012 pp 498 504 Yoginder S DANDASS Shane C BURGESS Mark LAWRENCE and Susan M BRIDGES Accelerating String Set Matching in FPGA Hardware for Bioinformatics Research BMC Bioinformatics 2008 Vol 9 No 197 2008 Jung H J Baker Z K and Prasanna V K Performance of FPGA Implementation of Bit split Architecture for Intrusion Detection Systems Proceedings of the 20th international conference on Parallel and distributed processing ser IPDPS 06 2006 Washington DC USA IEEE Computer Society pp 189 189 Liu Y Yang Y Liu P and Tan J A table compression method for extended aho corasick automaton Proceedings of the 14th International Conference on Implementation and Application of Automata ser CIAA 09 2009 Berlin Heidelberg Springer Verlag pp 84 93 doi 10 1007 978 3 642 02979 0 12 Soewito B and Weng N Methodology for Evaluating DNA Pattern Searching Algorithms on Multiprocessor Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering 2007 pp 570 577 doi 10 1109 BIBE 2007 4375618 Tumeo A Villa O Chavarrı a Miranda D G Aho Corasick String Matching on Shared and Distributed Memory Parallel Architectures IEEE Transactions on Parallel and Distributed Systems 2012 pp 436 443 doi 10 1109 TPDS 2011 181 Kouzinopoulos C S Michailidis P D and Margaritis K G Experimental Results on Multiple Pattern Matching Algorithms for Biological Sequences Bioinformatics 11 2011 pp 274 277 Dan Gusfield Algorithms on Strings Trees and Sequences Computer Science and Computational Biology Cambridge University Press 1997

    Original URL path: http://www.ijorcs.org/manuscript/id/53/sm-vidanagamachchi/commentz-walter-any-better%20than-aho-corasick-for-peptide-identification (2016-05-01)
    Open archived version from archive



  •