Search
Keywords
For:
Log
Member Login
Username
Password
Forgot Password?
Follow Us

Issues

Home>>Issues Member>>Issues of Journal of Computer Science & Application
Journal of Education Journal of Management Journal of Computer Science & Application

Issues of Journal of Computer Science & Application

Table of Content

Learning Paradigm To Develop Secure E-commerce System Author: Amit Garg, Aman Gupta and Rahul Bansal

From people’s attention security issues are arising with the rapid growth in the field of E-commerce. Security issues & threats in E-commerce environment are varied and can be caused intentionally and unintentionally by both insiders & outsiders. Transaction security in business management is the key issue of e-commerce so as to improve the environment for the development of E-Commerce and promote the further development of IT.

Keywords- E-commerce, Security issues, Cryptography, public and private key,message digest



Author: Amit Garg, Aman Gupta and Rahul Bansal
Download Full Paper || View HTML

Multipath Routing Algorithm For Multimedia Applications In Ad Hoc Wireless Networks Author: Neha Ramanandi

Abstract: In the next years, one of the most significant technological developments that will lead to the new broadband wireless generation is the communication via Multiple-Input Multiple-Output (MIMO) systems. MIMO systems are known to provide an increase of the maximum rate, reliability and coverage of current wireless communications, without additional bandwidth or transmit power.

Keywords- MIMO systems, MIMO detection, coordinated MU-MIMO, SCM, SNR




Author: Neha Ramanandi
Download Full Paper || View HTML

Performance Analysis Of Shared Memory Model In A Multiprocessor Environment Author: Pankaj Gupta & Garima Verma
As we know that transition from single processor to multi-processors presents some challenges for shared memory design and implementation these are: keeping caches coherent and maintaining memory consistency. The problem of cache coherency occurs when any one processor tries to access a region of shared memory which has been modiûed in another processor’s private cache, but not yet written back to main memory, which results in a read to memory which is out of date. Memory Consistency Model is needed for a shared memory system to define the ordering in which reads and writes must be performed, both relative to each other in the same program and to other reads and writes by another program on another processor. The programmer must know the memory consistency model used by the hardware in order to ensure program correctness. Though there are many solutions to the problem, each memory consistency model has its own advantages and disadvantages and it is not always clear which protocol works the best for a particular system and application. Here we presented the unifying framework by which we describe, understand and compare the sequential and total store order memory model using MATLAB. Performance of the models here is based on the memory cycle count.

Keywords – Shared Memory, Multiprocessor, Memory Consistency Models, SC, TSO, Machine cycle.


Author: Pankaj Gupta & Garima Verma
Download Full Paper || View HTML

Overview Of Data Mining Technique For Data Gathered Using Wireless Sensor Network Author: Disha J. Shah, Harshal A. Arolkar
Abstract: In today’s era, Wireless Sensor Networks (WSN) is used in various application areas like home, health, agriculture to name a few. WSN comprises of large number of tiny sensor nodes. The main tasks of a node in WSN is to sense data, process and communicate with other nodes. When used in large numbers, large amount of data is generated during its lifetime operation. This data at times needs to be transferred from a node to the base station. Transferring a large scale of data consumes more energy because of long transmission time. Wireless Sensor Network’s data is concern with different data classes and different data formats. Data needs to be converted in different formats for generating information which results in data mining. Recent innovation in data mining technique receives attention in extracting knowledge from data gathered using WSN. In this paper, we have given an overview of wireless sensor network and data mining. We have also listed some WSN applications and looked at how various techniques of data mining have been used in WSN applications. Finally, we have recommended a data mining technique that can be used on monitoring data collected through WSN.

Keywords- Wireless Sensor Network, Data Mining, Classification, Cluster Analysis, Association Rule.



Author: Disha J. Shah, Harshal A. Arolkar
Download Full Paper || View HTML

Learning Paradigm To Develop Secure E-commerce System Author: Amit Garg, Aman Gupta & Rahul Bansal
From people’s attention security issues are arising with the rapid growth in the field of E-commerce. Security issues & threats in E-commerce environment are varied and can be caused intentionally and unintentionally by both insiders & outsiders. Transaction security in business management is the key issue of e-commerce so as to improve the environment for the development of E-Commerce and promote the further development of IT.
Keywords- E-commerce, Security issues, Cryptography, public and private key,message digest


Author: Amit Garg, Aman Gupta & Rahul Bansal
Download Full Paper || View HTML

Risk And Control In Erp Implementation Author: Mayank Kushwaha, Shivam Kushwaha, Vipin Kumar Shukla
Abstract-This project study firstly examines the current literature concerning to ERP related issues during the development and implementation time and analyze the probable cause of the problem. Then Identify the main risk behind the ERP system failure by using multiple research study and its discussion describes why risk mitigation is important while implementation phase. The aim of this project is to define the new controls and strategies to mitigate the implementation risk and to know what are the best practices are being using during the software development. Some of the main challenges have been find out which incorporated with business process re-engineering, poor management response, the issues
of using external consultant and integrating their application specific knowledge. The recommendation will help to frame a risk prevention and mitigation tactics.

Keywords- Risk, Enterprise Resources Planning, ERP, Control, Types of Risk, Risk Mitigation, BPR.


Author: Mayank Kushwaha, Shivam Kushwaha, Vipin Kumar Shukla
Download Full Paper || View HTML

Fuzzy Technique For Software Quality Measurement Author: *Vishal Choudhary, **P.K. Bharti
Abstract: The software quality prediction is a major issue these days. In order to develop software quality prediction model, one must first identify the factors that strongly influence software quality and the number of residual errors.


Author: *Vishal Choudhary, **P.K. Bharti
Download Full Paper || View HTML

Simulation Of Wsn Based Vehicle Monitoring For Brts Corridors Using Ptolemy Ii Author: Harshal Arolkar, Kashyap Dhamecha & Darshan Patel
Wireless sensor network (WSN) have become most interesting area of research since last decade. The nodes in wireless sensor networks are capable of monitoring the conditions and co-operatively communicate to the network. Each node in the network has critical impact on the system behaviour, so it is important to simulate the functioning of the nodes before its deployment in real world. In this paper we have simulated a vehicle monitoring system using WSN for Bus Rapid Transit System (BRTS).
This paper is divided into five sections. Introduction of BRTS and wireless sensor network is given in section I, overview of proposed architecture and its solution is discussed in section II, information of the tool used for simulation is given in section III. Simulation work of proposed architecture is shown in section IV. Finally conclusion is given in section V.

Keywords: BRTS, Ptolemy II, VisualSense, WSN


Author: Harshal Arolkar, Kashyap Dhamecha & Darshan Patel
Download Full Paper || View HTML

Simulation And Comparative Analysis Of Single Path And Multipath Routing Protocol For Manet Author: Tarunpreet Bhatia, A. K. Verma
Abstract: The basic challenge in MANET is to design robust routing protocol adaptable to frequently changing network topology. On-demand ad hoc routing protocols uses a flooding based route discovery technique to find routes when needed. Since each route discovery incurs high routing overhead and latency, the frequency of such route discoveries must be kept low. On-demand multipath protocols compute multiple paths in a single route discovery to reduce overhead. In this paper, we simulated unipath Ad-hoc On-demand Distance Vector (AODV) routing protocol and On-demand Multi path Distance Vector (AOMDV) routing protocol. AOMDV is efficient when node mobility is high since it provides better statistics for packet delivery and throughput. But if routing overhead is a major concern, then AODV is preferred.

Keywords-Ad-hoc Networks, AODV, AOMDV, Multipath, MANET


Author: Tarunpreet Bhatia, A. K. Verma
Download Full Paper || View HTML

Li-fi: Data Onlight Instead Of Online Author: Ruchi Garg

The demand for wireless data is increasing at an exponential rate hence to cater the demand, various technology options are to be looked for and need to be implemented. An emerging technology using Visible Light Communications (VLC) for high speed wireless communications is Light Fidelity dubbed as Li-Fi. To provide high speed communication, light is modulated without interfering the main purpose of lamp that is of illumination. LEDs are considered as a key component to be used in transmission because of its low cost and Omni-presence. In this paper in section II, brief  history related to the development of this technology has been discussed. The aim of this paper is show the potential  of using light source and to exploit this as a medium for providing communication. Various applications where Li-Fi  has been put to use already are discussed. 

Keywords- Visible Light Communications, Light Fidelity (Li-Fi), LED, Omni-presence



Author: Ruchi Garg
Download Full Paper || View HTML

Cloud Computing: A Concept Of Computing Resources On Internet And Its Designing Author: Sudeep Srivastava, Ruchi Garg
Abstract: Cloud computing has been developed as a new model for hosting and transporting services over the Internet. Cloud computing is beautiful to industry owners as it eliminates the necessity for employers to plan in advance, and lets enterprises to begin with small scale and increase the supply only when there is a escalation in demand. However, regardless of the fact that cloud computing presents huge openings to the IT industry, the growth of this technology is currently at its beginning, as many issues still exists to be addressed. In this paper, an analysis of cloud computing is presented to stress on its key ideas, architectural principles, and state of the art operation as well as research challenges. This paper intends to provide a better perceptive of design concepts of cloud
computing and to recognize important research directions in this increasingly upcoming area.

Keywords-Cloud Computing, Data Centers,Virtualization, Internet, Research challenges, PaaS,
IaaS, SaaS


Author: Sudeep Srivastava, Ruchi Garg
Download Full Paper || View HTML

Role Of Multimedia And Internet In Higher Education Author: Upasana Garg & Rishipal
Internet technologies are changing our lives and educational systems in many ways. Multimedia is an integral part of the educational environment. Today academic institutes and their libraries are using internet for creating an environment which is continuously changing the teaching learning process. The awareness of academic community allows potential uses of Internet. For this we need to evaluate the purpose of utilizing Internet sources in order to provide relevant services. Such studies on Internet information usage pattern also facilitate professionals to provide effective services by modifying old information provision process by using electronic tools. The impact of integrating multimedia, internet and education provides substantial benefits, some drawbacks and unresolved questions. Most sources agree on the necessity of good instructional design and development for multimedia use in higher education
In this we are trying to highlight the various problems and issues in handling multimedia and internet in higher education. We also provide suggestions to improve the services to meet the demands of the users and education system.

Keywords: ICT,Interanet, Internet, e-resources, CD-ROM, e-journals, web sites


Author: Upasana Garg & Rishipal
Download Full Paper || View HTML

Data Mining: The Mushroom Database Author: Hemendra Pal Singh
Abstract: This study will focus on the use of Data Mining techniques on previously analyzed data sets.The data mining tool Weka will be used. Weka stands for Waikato environment for knowledge analysis, and “is a popular suite of machine learning software written in Java, developed at the University of Waikato. WEKA is free software available under the GNU General Public License”. The purpose of the study is to extend previous studies by running new data sets of stylometry, keystroke capture, and mouse movement data through Weka using various data mining algorithms. The study will also extend previous research atPace University into the uses of a human- machine interface to increase the accuracy of machine learning. To this end, the study will use a nominal data set, the Mushroom Database.

Keyword-Data Mining, Mouse Movement, Keystroke Capture, Mushroom Database, Stylometry.


Author: Hemendra Pal Singh
Download Full Paper || View HTML

Web Analytics: The Way Of Data Analysis Author: Sudeep Srivastava

Web Analytics has become a critical component of many business decisions. In this paper, I describe the importance and intricacies of summarization for analytics and report generation on web log data. I specifically elaborate on how summarization is exposed in Organization and discuss analytics search design trade-offs. 

Keywords- summarization, analysis, analytics, data, and organization, design, critical, summery, web site, web, log



Author: Sudeep Srivastava
Download Full Paper || View HTML