New management system design: stressing on data statistics and analysis
The paper is to lay special emphasis on study to design new management system into current information management in order to expand a method such as a library management information system. Studying data resources on hand and a new system model for information service management have been formed and realized, and at the same time problems of the hidden dangers of data redundancy get solved. The new system is called as a post-information management and the current system called as a pre-information management system. Whole information management system (IMS) consists of two systems, PrIMS and PoIMS. PoIMS is main foundations of statistics and analysis data. We offer a post-information management system which focuses on design system at data statistics and analysis with formulas. It is applied the retrieval combined models under multi-restrictive conditions and theories to the lending book rates in a library with PoIMS.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Ranking information system success factors in mobile banking systems with VIKOR
Mobile banking system plays a major role in mobile commerce. As wireless networks are existed, today new generation of electronic commerce applications are emerged and expanded, that are known as mobile commerce. In this field one of services that served in bank industry with cell phones is mobile banking. Although many studies have been conducted to assess users’ satisfaction with mobile applications, none has focused on ranking the effective alternatives. So the goal of this article is to extract the effective alternatives of user’s satisfaction and rank them with VIKOR. The research extract 42 alternatives based on Delone and McLean’s Revised Model and chooses 21 effective alternatives by expert’s ideas and then ranking them. VIKOR shows that data accuracy and security are ranked as first and second alternatives.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
PRNG Implementation Based on Chaotic Neural Network (CNN)
AbstractIn this work, a neural network with chaos activation function has been applied as a pseudo-random number generator (PRNG). Chaotic neural network (CNN) is used because of its noise like behaviour which is important for cryptanalyst to know about the hidden information as it is hard to predict. A suitable adaptive architecture was adopted to generate a binary number and the result was tested for randomness using National Institute of Standard Technology (NIST) randomness tests. Although the applications of CNN in cryptography have less effective than traditional implementations, this is because these systems need large numbers of digital logic or even a computer system. This work will focus on applications that can use the proposed system in an efficient way that minimize the system complexity.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
QOS Aware Privacy Preserving Location Monitoring in Wireless Sensor Network
Sensor networks have been widely employed in many real-time applications. One of the most obvious challenges appearing to threaten the successful deployment of sensor networks is privacy issues including source-location privacy which can not be adequately addressed by general security mechanisms. Focusing on this important kind of privacy, among many approaches proposed in literatures, self-adjusting phantom routing is a very successful one. But it still has some weaknesses. In this paper, we propose an improved version of it to enhance its performance. This method can decrease energy consumption and communication cost while increase the accuracy of the aggregate locations by minimizing their monitored areas.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
|
215. Smart impact of Schools the depth and speed of learning |
| Vahid Doostei, Yousry Ranjbar, Shayan Rezaei, Ali Abasi, Metra Omidi, Mohammad Zahedi, Nasir Saeed Yanni, Mohammad Amin Shakerim, Hadi Bazani, Hajir Rostami, Milad Rostami and Nasseh Moloudi |
|
Abstract |
Pdf
|
Category : Computing and Informatics | Sub Category : Information Technology |
Smart impact of Schools the depth and speed of learning
The purpose of this study was to investigate the influence of intelligent classroom and deepen student's learning speed. This analytical method and the method of data collection tools and library resources, articles and scientific sites are used. The results showed that the use of multimedia content in a wide range of senses of the students involved in the teaching and learning process is deepening. In other words, in addition to increasing the performance of various classes of applications due to the use of audio-visual senses to help students learn. The system allows students to move beyond their curricula and more emphasis on thinking skills and deep learning students. The intelligent interaction between students and teachers of the school, more intelligent, and this can lead to a higher share successful experiences between them. So schools by creating platforms for intelligent classes can take advantage of this training method used.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Soft computing in intelligent multi – modal systems
As man has started using computers to track the work of machines, the flexibility with which the humans communicate and request information from the computers must increase. There arises a need for the computers to understand and process the ambiguous queries put forth by authorized persons. This has been accomplished in this paper by introducing soft computing in multi – modal systems. This architecture first uses vascular pattern recognition to identify whether the user is an authorized person or not by using the image of his blood vessels obtained by using near – infrared light. Then the architecture consists of six main components - a reasoner, a speech system, a vision system, a non intrusive neural network based gaze tracking system, an integration platform and an application interface, using which we can process speech, text, face images, gaze information and simulated gestures. Fuzzy and probabilistic techniques have been used in the reasoner to establish temporal relationships and learn interaction sequences. This architecture can be used in Process control and Instrumentation where the authorized users can query the values of some physical parameters (pressure, temperature etc). The ambiguities of these queries are resolved using gaze tracking. Example: Query (recognized by speech): show me this of that machine. (That machine is pointed using mouse) Ambiguity: this (physical parameter) - identified by where the user’s gaze is fixed on the screen. Final query: show parameterA of machineB.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Comparison of several cloud computing providers
An important transition in IT service delivery today is buzzword Cloud Computing. The tools, building blocks and best practices are evolving for cloud computing which in turn increases challenges to deploy the best suited cloud solutions. Initially the big players like Google, Microsoft, Amazon set the stage for how to deploy web applications & pay for their use on the web. Thus with number of platforms and services available to for a cloud it is hard to make a reasonable choice for at least a novice who has just entered into cloud. The paper is intended to provide an insight into few cloud providers’ services with respect to their features and scenarios. This comparison may help in the selection of a platform and may leverage as a starting point for a researcher.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Distributed virtual machine allocation using DRR algorithm in cloud computing
In private cloud during FFCS registration large amount of students are trying to register their subject at same time from different places so heavy load is departing to server due to this heavy load to resources the server unable to give where response to students which lead to the problem student can’t register properly within given time or wait for long time until server recover from this problem. This problem can be solved by allocating the resources properly to server this comes under the infrastructure as a service (IaaS) we can use and allocate a various kind of resources. This paper proposed solved this problem efficiently according virtual machine is distributed in hierarchical architecture using dynamic round robin algorithm[DRR] , resources will be allocate efficiently so the load will be distributed to various virtual machine then student need not to wait for long time and they can register properly within a given time. Finally implemented on Simulator Cloudsim 3.0. Experiment result show DRR can achieved resource allocation efficiently in cloud computing.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Do the sentiments on the net really matter?
Our information-gathering behavior has always been to find out what other people think. Opinion-rich resources such as online review sites and personal blogs are growing rapidly which provide new opportunities and challenges, as people can actively use information technologies to seek out and understand the opinions of others. People share their experiences on-line, express their opinions, frustrations about anything. The huge amount of available data creates opportunities for automatic mining and analysis. It can be considered as a classification task: their feelings can be positive, negative or neutral. People don’t directly express sentiment, They can also use a diverse range of other methods to express their emotions. Authors may mix objective and subjective information about a topic, or write down psots about other topics than the one we are investigating. And also there is a lot of noise in the data gathered from the Web pages. Due to this the task of automatic recognition of the sentiment in on-line text becomes more difficult. The content we are interested in this paper is, what is sentiment analysis, how the sentiment analysis was useful for a bank, how can it be applied in market intelligence and what are the challenges that could be faced in Indian scenario.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Energy Saving Scheme for Wormhole Detection & Prevention in MANET & Sensor Networks
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of the prominent security threats wormhole attack is considered to be a very serious security threat over MANET. In wormhole two selfish node which is geographically very far away to each other makes tunnel between each other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count method.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]