IJIEEB Vol. 6, No. 5, Oct. 2014
Cover page and Table of Contents: PDF (size: 123KB)
Trust has been reported as a key role in e-business, especially for a monetary based system like e-commerce. Therefore, many previous studies have been conducted to investigate the antecedents and consequences of consumer trust. But there has been little work done on establishing sensible solutions for leveraging consumer trust. Furthermore, previous studies in managerial trust have not demonstrated trust management that can illustrate a method to link their solutions with the consumers' point of view. In this paper, we therefore propose a practical roadmap for establishing trust management strategy that is consistent with consumer perceptions. Within this roadmap, firstly, a component extraction is performed on survey data in order to identify the quality criteria that actually impact buying decision process. Based on these criteria, the sensible factors for establishing trust and satisfaction are discovered from the regression analysis. Then, the prediction equations for trust and satisfaction are generated. After that the results of prediction equations are applied with a fuzzy linguistic approach in order to convert these results in linguistic terms. Finally, trust management strategy is established. By using our proposed method, website managers can identify which are the quality criteria that are consistent with their customer perceptions and they can use these criteria as a basis for improving trust and satisfaction in their websites.[...] Read more.
The number of Internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for ordinary users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers' snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user's browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack success, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution is successful in preventing this type of attack.[...] Read more.
In order to accomplish the targets of specified levels for reducing the hardware requirements of digital systems, innovative techniques are required to be implemented either at the device level, architectural level or gate level designs. In this paper one of the evolutionary techniques i.e. Particle Swarm Optimization Algorithm has been used to optimize digital circuits at the gate level on VHDL platform to draw an automatic, generalised and reliable technique to find optimum solutions with reduced gate count for the designing of digital systems.[...] Read more.
Global software development (GSD) is one of the emerging areas of software engineering. Stakeholders are distributed located that brings into several challenges to coordinate and collaborate effectively. Scrum is one the widely practiced agile methodologies. Majority of the software development companies showed a great interest from last few years to apply Scrum methodology in distributed development to solve the coordination and communication problems. Although Scrum contains good features and strengths but still there are improvement possibilities to solve the problems of coordination and collaboration in GSD. Majority of software development companies face the problems of coordination and communication in GSD projects. This paper proposes a novel solution to mitigate the coordination and communication challenges of GSD projects. The survey is used as a research methodology to evaluate the proposed solution. The proposed solution is supported by 62.24%. We anticipate that the proposed solution will help the software development companies to mitigate the coordination and communication challenges of GSD projects.[...] Read more.
The minimum rule base Proportional Integral Derivative (PID) Fuzzy hybrid guidance Controller for three dimensions spherical motor is presented in this research. A three dimensions spherical motor is well equipped with conventional control techniques and, in particular, various PID controllers which demonstrate a good performance and successfully solve different guidance problems. Guidance control in a three dimensions spherical motor is performed by the PID controllers producing the control signals which are applied to systems torque. The necessary reference inputs for a PID controller are usually supplied by the system's sensors based on different data. The popularity of PID Fuzzy hybrid guidance Controller can be attributed to their robust performance in a wide range of operating conditions and partly to their functional simplicity. PID methodology has three inputs and if any input is described with seven linguistic values, and any rule has three conditions we will need 343 rules. It is too much work to write 343 rules. In this research the PID-like fuzzy controller can be constructed as a parallel structure of a PD-like fuzzy controller and a conventional PI controller to have the minimum rule base. Linear type PID controller is used to modify PID fuzzy logic theory to design hybrid guidance methodology. This research is used to reduce or eliminate the fuzzy and conventional PID controller problem based on minimum rule base fuzzy logic theory and modified it by PID method to control of spherical motor system and testing of the quality of process control in the simulation environment of MATLAB/SIMULINK Simulator.[...] Read more.
Performance of a cloud is a critical issue and dependent on various factors that include load balancing used to distribute the load at data center. Proliferation of the cloud paradigm is profoundly dependent on the performance of the cloud. Therefore, to examine the cloud performance, it is significant to identify the factors that govern cloud performance. This work is focused to identify the factors that may have significant impact on the cloud performance. To identify the performance factors, we have reviewed the major publications of the last five years as well as the major real time cloud performance tools offered. Study revealed that response time is the major factor that has the significant impact on cloud computing performance. Finally, we have conducted an experiment to establish the dependency of response time on various load balancing techniques and number of data center. Experiment revealed that the round robin is directly proportional to the number of data center[...] Read more.
Media Access Control (MAC) layer protocols have a critical role in making a typical Wireless Sensor Network (WSN) more reliable and efficient. Choice of MAC layer protocol and other factors including number of nodes, mobility, traffic rate and playground size dictates the performance of a particular WSN. In this paper, the performance of an experimental WSN is evaluated using different MAC layer protocols. In this experiment, a WSN is created using OMNeT++ MiXiM network simulator and its performance in terms of packet delivery ratio and mean latency is evaluated. The simulation results show that IEEE 802.11 MAC layer protocol performs better than CSMA, B-MAC and IEEE 802.15.4 MAC layer protocols. In the considered scenario, IEEE 802.15.4 is ranked second in performance, followed by CSMA and B-MAC.[...] Read more.
This paper presents fuzzy model-based designs for control and synchronization of new chaotic system. The T–S fuzzy models for new chaotic systems are exactly derived. Then the asymptotic stability and synchronization are achieved by generalized backstepping method. On the other hand, this paper presents fuzzy model-based designs for synchronization of another chaotic system. Based on the T–S fuzzy new chaotic models, the fuzzy controllers for two different chaotic synchronization are designed via the active control technique. Numerical simulation results are presented to show the effectiveness of the proposed method.[...] Read more.