IJIEEB Vol. 4, No. 3, Jul. 2012
Cover page and Table of Contents: PDF (size: 135KB)
This paper presents an methodology for providing high availability to the demands of cloud's clients. To succeed this objective, failover approaches for cloud computing using combined checkpointing procedures with load balancing algorithms are purposed in this paper. Purposed methodology assimilate checkpointing feature with load balancing algorithms and also make multilevel barrier to diminution checkpointing overheads. For execution of purposed failover approaches, a cloud simulation environment is established, which the ability to provide high availability to clients in case of disaster/recovery of service nodes. Also in this paper comparison of developed simulator is made with existing approaches. The purposed failover strategy will work on application layer and provide highly availability for Platform as a Service (PaaS) feature of cloud computing.[...] Read more.
E-commerce has been predicted to be a new driver of economic growth for developing countries. The SME sector plays a significant role in its contribution to the national economy in terms of the wealth created and the number of people employed. Small and Medium Enterprises (SMEs) in Egypt represent the greatest share of the productive units of the Egyptian economy and the current national policy directions address ways and means of developing the capacities of SMEs. Many factors could be responsible for the low usage of e-commerce among the SMEs in Egypt. In order to determine the factors that promote the adoption of e-commerce, SMEs adopters and non-adopters of e-commerce were asked to indicate the factors inhibiting the adoption of e-commerce. The results show that technical barriers are the most important barriers followed by legal and regulatory barriers, whereas lack of Internet security is the highest barrier that inhibit the implementation of e-commerce in SMEs in Egypt followed by limited use of Internet banking and web portals by SMEs. Also, findings implied that more efforts are needed to help and encourage SMEs in Egypt to speed up e-commerce adoption, particularly the more advanced applications.[...] Read more.
The choice of the modulation format is one of the principle factors in realizing a high performance wireless optical communication system at a reasonable cost and acceptable complexity. The purpose of this paper is to make a comparison between isochronous and anisochronous modulation scheme categories from Discrete (digital) pulse time modulations (PTM) through the simplest scheme in each family; PPM and DPIM respectively, in term of bandwidth requirement, power efficiency and transmission capacity. This is done to give a wider view on the performance of such schemas under wide range of design parameters.
In this paper, the properties of PPM and DPIM have been analyzed, from this analysis it has been shown that DPIM or anisochronous modulation schemes in general are strong candidates when synchronization and transmission capacity are taken into account, and when it comes to power performance PPM or isochronous modulations are better.
Soft computing cascade multilayer models were developed for predicting the shelf life of burfi stored at 30oC. The experimental data of the product relating to moisture, titratable acidity, free fatty acids, tyrosine, and peroxide value were input variables, and the overall acceptability score was the output variable. The modelling results showed excellent agreement between the experimental data and predicted values, with a high determination coefficient (R2 = 0.993499439) and low RMSE (0.006500561), indicating that the developed model was able to analyze nonlinear multivariate data with very good performance, and can be used for predicting the shelf life of burfi.[...] Read more.
Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.[...] Read more.
Waste management has to do with handling of solid refuse from their sources of generation through storage, collection, transportation, recovery and treatment processes to disposal This research developed a web based GIS waste disposal management system, with aim of achieving an effective waste management system and a spatial view of waste collection locations in any local government area in Nigeria. The system was developed using Extensive Hypertext Markup Language and Cascading Style Sheet (XHTML/CSS), and Asynchronous Java Scripting with XML (AJAX) and the software packages used for the development of the application are Adobe Dreamweaver and Adobe Fireworks, MySQL, Apache Server and PHP scripting. With this waste management system, the locations of all the waste collection tanks in any location will be, monitored, managed and maintained. The use of this system will ease the job of the waste management unit of the local government areas in Nigeria in achieving a clean environment and mitigate the spread of epidemic in a way to ensure safety of all and sundry.[...] Read more.
The process of finding the finest hotel in central location is time consuming, information overload and overwhelming and in some cases poses a security risk to the client. Some of the more advanced web sites allow for a search of the destination via a map for example hotelguidge.com and jamaica.hotels.hu. Booking of hotels is secured by the standard Secure Sockets Layer (SSL) to confirm the identity of a website or server, encrypt data during transmission, and ensure the integrity of transmitted data. Even with this in place, hackers have broken the Secure Sockets Layer (SSL) by targeting weaknesses in the MD5 algorithm.
Recently good amount of work been carried in the use of Intelligent agents towards hotel search on J2ME based mobile handset which still has some weakness. So taking the weakness in the current agent based system, smart software agents been developed that overcomes the weakness in the previous system In addition to smart agent based system been developed and published elsewhere, we here propose to extend the system with the booking capability that allows the user to book a hotel of choice where the authenticity of the client may be determined securely using biometric security and information transmitted using Secure Sockets Layer (SSL) (Server-Gated Cryptography (SGC)) on the internet which is novel and unique. This will be facilitated on Android 2.2-enabled mobile phone using JADE-LEAP Agent development kit.