IJMECS Vol. 7, No. 8, Aug. 2015
Cover page and Table of Contents: PDF (size: 665KB)
In classical cooperative game theory one of the most important principle is defined by Shapley with three axioms common payoff fair distribution’s Shapley value (or Shapley vector). In the last decade the field of its usage has been spread widely. At this period of time Shapley value is used in network and social systems. Naturally, the question is if it is possible to use Shapley’s classical axiomatics for lexicographic cooperative games. Because of this in the article for dimensional lexicographic cooperative game is introduced Shapley’s axiomatics, as the principle of a fair distribution in the case of dimensional payoff functions, when the criteria are strictly ranking. It has been revealed that axioms discussed by Shapley for classical games are sufficient in lexicographic cooperative games corresponding with the payoffs of distribution. Besides we are having a very interesting case: according to the proved theorem, Shapley’s classical principle simultaneously transforms on the composed scalar games of a lexicographic cooperative game, nevertheless, games could not be superadditive.[...] Read more.
The System is a Java Desktop Application designed by the integration of Java and MySQL to help provide a platform whereby computer-based tests can be organized and performed. The basic idea behind designing the system to have a fluid outlook and functional over a Wi-Fi network is simply to offer an operational scheme that is easy to implement by high schools, tertiary institutions and examination bodies with the intention of downloading and adapting it for their own use. Also, to provide a platform whereby prospective CBT examinees can have continuous practice and prior acquaintance with the nitty-gritty of computer based testing in general. This paper concludes by surveying and analyzing the impact of this initiative (being freely available for use and adaptation) on prospective CBT candidate’s test performance.[...] Read more.
Advances in computer mediated communication technologies have sparked and continue to facilitate the proliferation of online courses, degree programs, and educational institutions. Leading the way with these advances has been the use of asynchronous discussion forums. However merely setting up a discussion forum does not always ensure quality participation and interaction. The way the course is managed has an impact on the participation as well. This paper compares the difference in course management over four study periods and discusses the resulting consequences on the participation and achievement of the students. This paper also investigates the quality of interaction as perceived by fully online students. The main benefits of this research are that it provides a guideline regarding what course management factors can make the difference in online participation in fully online courses, and how the quality of interaction can be designed.[...] Read more.
Cloud computing has played much important role in comparison to other fields of IT, in providing Data storage, Data security, Quality of Services (QoS) etc. In the last few years, it had emerged and evolved so quickly due to its number of facilities and advantages to the organizations and end users. Many data security factors have also increased due to this fast evolution of cloud in the IT industry. Therefore several security models and trust establishing techniques have been deployed and are been in execution for providing more security to the data, especially the sensitive data. Despite of that much security, many of the models/techniques lacks in one or more security threat measures. In this paper a new model have been designed and proposed which introduces Security Aware Cloud. First the trust of the user or organization is established successfully on cloud than the security to the data is granted through privacy and encryption module. Level of quality of service and security are achieved under the Contract Trust layer while the Authentication and Key Management are covered under Internal Trust layer. For critical data privacy and encryption, Homomorphism mechanism is used. By the use of proposed trust and security model, we can enhance Return on Investment factor in the cloud for the data security and service provided by it.[...] Read more.
The idea of using ontologies in the field of software engineering is not new. For more than 10 years, the Software Engineering community arouse great interest for this tool of semantic web, so to improve; their performance in production time and realisation complexity on the one hand, and software reliability and quality on the other hand. The standard ISO / IEC 24744, also known as the SEMDM (Software Engineering – Meta-model for Development Methodologies), provides in a global perspective, a conceptual framework to define any method of software development, through the integration of all methodological aspects related to the followed procedures, as well as, products, people and tools involved in the conception of a software product. The purpose of this article is to create domain ontology for ISO / IEC 24744 using an MDA process. This ontology will serve as semantic reference in order to assist for a better interoperability between the different users of the standard (human, software or machine).[...] Read more.
Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) based techniques have become prominently used in watermarking research. DCT based technique replacing the older ones have made digital watermarking based e-commerce a part of almost all business transactions. It is also being used in business communications and different solutions through computer network. DCT based technique is considered as a secured communication between two users. Verification is being provided for the origin of a watermark that traverses from sender to receiver. The cost per transmission has also reduced as the watermark is encoded in the digital watermarking itself. Here the key size is also small thus making it suitable for key exchange application. Also the security level in fragile watermark is better compared to discrete data integrity verification or authentication for the same bandwidth and key size In this paper, we have compared various geometric attacks based techniques in terms of PSNR and Attack Recovery time.[...] Read more.
Volume of web pages and information on the web is constantly increasing. In this paper, we presented a system to retrieve pages relevant to a query, that can be used by the search engines. The design of our proposed system, content, Page content of neighbors, Connectivity (link analysis) features were used and the methods of fuzzy Sugeno and adaptive fuzzy neural network methods considered .Results showed that the neural method, the error is less than other methods, in the retrieval of web pages tailored to the users search query on the Web, can increase the efficiency of search engines.[...] Read more.