Laptop tracking mechanism using GSM/GPS technology
In this paper we explain, the need of Organizations facing the real problem on physical, mechanism to protect their IT systems such as Laptops or notebooks and palmtaps. All IT systems ,have become difficult to protect because they can easily be stolen. Not only in companies but also in universities and colleges, social places it became a major problem for students, staff and people. Even though the laptops are password protected, that type of security is not providing any kind of use in finding the laptops once they are stolen. This is a method which gives better way in finding the laptops and also catching the thieves. In this paper, we are designing an anti-theft security system to track the location of the laptop. By using the GSM/GPS module connected to laptop the current location of the laptop is read and it is sent through message to the owner. By which it is possible to get back our laptops. As result we can reduce the laptop thefts.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Network proxy log mining: association rule based security and performance enhancement for proxy server
Network Proxy Logs contain useful user access patterns that are waiting to be discovered. By analyzing those logs, it is possible to discover various kinds of knowledge, which can then be applied to improve the performance of proxy server. Association Rule mining, by using Proxy logs, aims to discover interesting user access patterns. This paper proposes a novel approach for proxy log mining. In our approach, the Apriori Algorithm is used to extract important or useful Rules from proxy server ACCESS logs. Our paper’s aim is to mine patterns from the Network Proxy Logs and show the difference that some unauthorized clients somehow getting access to information and some authorized clients are not getting access to information. Clients who are unauthorized might be an intruder.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Pareto Type IV Software Reliability Growth Model
Software quality depends upon Software Reliability as it is one of its most important characteristics. Software Reliability is an important attribute of software quality, together with functionality, usability, performance, serviceability, capability, installability, maintainability, and documentation. It is hard to be achieved, because the complexity of software tends to be high. The development of many Software Reliability Growth Models (SRGMs) over the last several decades have resulted in the improvement of software facilitating many engineers and managers in tracking and measuring the growth of reliability. This paper proposes Pareto type IV based Software Reliability growth model with interval domain data. The unknown parameters of the model are estimated using the maximum likelihood (ML) estimation approach. Reliability of a software system using Pareto type IV distribution, which is based on Non-Homogenous poisson process (NHPP) is presented through estimation procedures. Comparison is also made between the Pareto type II model and Proposed model. The performance of the SRGM is judged by its ability to fit the software failure data. How good does a mathematical model fit to the data is also being calculated. Besides, an analysis of two software failure data sets is included.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Survey on On-Demand Routing Techniques in MANET
Mobile Ad Hoc Network (MANET) is collection of multi-hop wireless mobile nodes that communicate with each other without centralized administration or fixed infrastructure or permanent topology. Routing protocols developed for wired networks are inadequate as they not only assume mostly permanent topology but also having high overheads. This problem leads to several routing algorithms/proposals specifically for ad hoc networks. However, some of these proposals are optimized variants of protocols designed for wired networks. This paper focused on various On Demand Routing protocols known as reactive protocols such as DSR, AODV, TORA, ABR, DYMO, LMR, LAR, SSA CBRP, RDMAR, MSR, AOMDV, ARA and their comparison with advantages and disadvantages.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Health Care System with Audio and Video Facilities
In this paper, Smart Card based Online Health Care System with low cost Audio and Video Facilities have been discussed. For providing a good quality of treatment to the patients in the hospital, it is required to automate and integrate the hospitals of country via internet. After registration, patient will get a smart card with 10 digits unique registration number/ PatientID with personal information in the hospital. All the doctor prescriptions, test reports (blood, urine etc), images (MRI, CT-Scan, ECG etc.) will be stored in the databases of the hospital server (local server) as per the PatientID. All the local servers of hospitals are connected with one centralized server and time to time all the patient data from the local hospital server will be transferred to main centralized server. Patient information, doctor information and hospital information etc. can be retrieved from any hospital of any patient as per the PatientID. There may be a situation where patient is present in a rural hospital where sufficient expert doctors are not available. In such situations, doctor present in the remote hospital may need to contact an expert to take his advice for better treatment of the patient. In this work, a Graphical User Interface for low cost Videoconferencing System for Online Health Care System is also discussed, specifically to support consultations among remotely placed Patients, rural health workers and specialists in the urban cities and provide a secure access to remote patient records. A low-cost web-based Videoconferencing System using Open Source Technologies such as Red5 etc. has been developed. We have used live video/audio, text chat and video recording/archiving tools and features for the same. Online Health Care System application has been developed as front end in DOT NET [4] and back end in SQL Server. SQL Server tuning & other features are implemented for fast retrieval of patient data while designing the application of Health Care System.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Impacts of information and communication technology (ICT) in facilitating the education of students with visual impairment
This research focused on the impacts of information and communication technology in facilitating the education of students with visual impairment. This work reviews the existence of information and communication technology (ICT) in educating the students with visual impairment in Federal College of Education (Sp.), Oyo, Oyo State, Nigeria, and to investigate further, the impact of ICT on academic performance of students with visually impaired. Fifty (50) students with visual impairment at the Federal College of Education (Sp.), Oyo, State, Nigeria were randomly selected and questionnaires were administered to them. Data were extracted from the questionnaires and analyzed. The results showed that students with visual impairment greatly benefited from integration of ICT with visually impaired education. Integration of ICT with visually impaired education significantly enhanced the academic performance of students with visual impairment. Government should support education of students with visually impaired so that they can have independent and meaningful lives and to put a stop to roaming about the streets begging for survival.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Zero Wire Authentication System in ATMs Using GSM Technology
Due to public location and permanent availability multiple people depends on the automated teller machine (ATM). Due to that they can easily fall victim to manipulation. Frauds and security attacks based on observation by person or via various cameras also get increased. So, new methods for authentication mechanisms get developed to reduce the ATM security problems related to personal identification numbers (PIN). The user’s mobile phones play a central role in the trust establishment. Shift PIN entry away from possibly insecure ATMs PIN pad towards the user’s mobile phones & then transmit it securely for authentication. Dual tone modulated frequency (DTMF) plays a major role in this technique.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Innovative Assistive Technology used in Analysis and Treatment of Autism Spectrum Disorders
This paper discusses the potential of using technologies in the diagnosis, study and intervention treatments of autism. The first part of paper introduces background information on autism spectrum disorder. The second part deals with review of literature survey. The third part summarizes our proposed research work on the connected topic. The fourth part concludes our work as whole.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Program slicing: A Review
Program Slicing is a method for automatically decomposing programs by analyzing their data flow and control flow. Slicing reduces the program to a minimal form called “slice” which still produces that behavior. Program slice singles out all statements that may have affected the value of a given variable at a specific program point. Slicing is useful in program debugging, program maintenance and other applications that involve understanding program behavior. This paper is a review paper on program slicing.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Aggrandizement of Big Data Analytics beyond the Batch to Real time
Data worldwide is growing 40 percent per year, a rate of growth that is daunting for any organization. Big Data Analytics is becoming an increasingly important part of every aspect, batch processing system like Hadoop had evolved for excellent offline data processing platform for Big Data. There are many use cases across various domains which require real-time / near real-time response on Big Data for faster decision making. This paper describes beyond batch processing system towards Real-Time and Streaming.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]