{"title":"ANALYSIS OF ONTOLOGY ALIGNMENT ON DIFFERENT DOMAINS: A CROSS ONTOLOGICAL APPROACH","authors":"S. Vigneshwari, M. Aramudhan","doi":"10.18000/IJISAC.50136","DOIUrl":"https://doi.org/10.18000/IJISAC.50136","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEFENDING AGAINST DENIAL OF SLEEP ATTACK IN B-MAC PROTOCOL IN WIRELESS SENSOR NETWORK","authors":"M. Vc, Sasi Kumar","doi":"10.18000/ijisac.50138","DOIUrl":"https://doi.org/10.18000/ijisac.50138","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mechanism for Dynamic Weight Assignment by Inferring Processing Requirement of an Application","authors":"L. JyothiV, Srivatsa S.K","doi":"10.18000/IJISAC.50013","DOIUrl":"https://doi.org/10.18000/IJISAC.50013","url":null,"abstract":"Systems need to run a larger and more diverse set of applications, from real time to interactive to batch, on uniprocessor & multiprocessor platforms. The tasks that are scheduled using proportional share concept, assigns a weight randomly. This paper suggests a mechanism which assigns a weight based on the resource requirement of an application. The problem of inferring application resource requirements is difficult because the relationship between application performance and resource requirement is complex and workload dependent. We present a measurement-based approach to resource-inference employing online measurements of workload characteristics and system resource usage to estimate application resource requirements. These requirements are translated to appropriate weights and to modify these weights dynamically by employing weight readjustment algorithm.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An optimal inventory model for a deteriorating item with time - dependent quadratic demand and delay in payment for two warehouses","authors":"P. Muniappan, R. Uthayakumar, S. Ganesh","doi":"10.18000/IJISAC.50143","DOIUrl":"https://doi.org/10.18000/IJISAC.50143","url":null,"abstract":"This paper deals with an optimal inventory model for a deteriorating item with time dependent quadratic demand. When products are seasonal or when supplier provide price discounts for bulk orders, the retailer purchase more items and store it in their warehouses. There are two different types of warehouses. In one, the retailer owns the warehouse, and the other is rented. In this model the retailer first dispose the items in the rented warehouse and then the items present in the own warehouse because of economic reasons. Here permissible delay in payments is allowed. The model is solved analytically to minimize the total inventory cost. The result is illustrated with numerical example for the model.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPROVING ARCHITECTURE LEVEL PERFARMANCE OF WEB APPLICATION BASED ON MIDDLEWARE TECHNOLOGY","authors":"K. Mani","doi":"10.18000/IJISAC.50108","DOIUrl":"https://doi.org/10.18000/IJISAC.50108","url":null,"abstract":"A web application is a software system that contains the computing and networking technologies required for use through web browsers on the Internet Web application. The fundamental feature of web applications is that its behavior is specified by the interaction between the environment and the system. One of the major platforms to build web applications is J2EE based on the MVC model such as Struts Framework. Struts framework based on MVC has brought the best code reuse and the legible code structure in entire system by far, but it has some problems such as complicated program, high coupling among layers and hard maintenance because its model part adopts JDBC to connect databases directly. In this paper we propose middleware technology such as Struts2 based on MVC2, Spring and Hibernate Frameworks which is the kernel and key to the simplify the software development, improve the software performance and quickly construct the Web Application of the good expansibility, maintainability. This Framework is analyzed on designing E-Commerce System.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Equilin Multi-Clustering Algorithm for Constructing Numeric Clusters","authors":"A. JoyChristy, S. HariGanesh","doi":"10.18000/IJISAC.50161","DOIUrl":"https://doi.org/10.18000/IJISAC.50161","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STUDY OF MODIFIED GENETIC ALGORITHM-SIMULATED ANNEALING FOR THE ESTIMATION OF SOFTWARE EFFORT AND COST","authors":"I. Thamarai, S. Murugavalli","doi":"10.18000/IJISAC.50154","DOIUrl":"https://doi.org/10.18000/IJISAC.50154","url":null,"abstract":"I.Thamarai.1, S. Murugavalli.2 1Research Scholar, Sathyabama University, Chennai, India, 2Supervisor, Sathyabama University, Chennai. Email: 1ilango.thamarai@gmail.com, 2murugavalli26@rediffmail.com Abstract Software Effort Estimation is very crucial estimation task because of the intangible nature of software but it is very essential for developing a software application. Numerous approaches are available in software estimation method such as non-algorithmic models and algorithmic models. The main problems of SE prediction are identification of components of software project and feature selection between the projects. In this paper Modified Genetic Algorithm-Simulated Annealing (MGASA) is proposed to predict the software effort and cost estimation. In MGASA, the estimation of software is based on similar projects. Modified Genetic Algorithm (MGA) is a stochastic search algorithm. The adaptive search process has been effectively utilized in different types of challenging numerical optimization problems. The Simulated Annealing (SA) is an analogy between the way, in which the metal freezes and cools into a minimum energy crystalline structure. The main advantage of using Modified Genetic Algorithm-Simulated Annealing (MGASA) tool is to enhance the accuracy of software effort estimation.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122801132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PRIVACY PRESERVING DATA ACCESS CONTROL USING PUBLIC KEY ENCRYPTION IN CLOUD","authors":"S. Hussain, V. Yuvaraj","doi":"10.18000/IJISAC.50149","DOIUrl":"https://doi.org/10.18000/IJISAC.50149","url":null,"abstract":"Cloud security is one of the most important ongoing research, technology of the day to day life where the information stored in the cloud must be restricted to the unauthorized users and also it can be protected on the cloud server. In the existing Certificate less Public Key Encryption, it uses expensive pairing operations during each and every time, when a user wants to share the data in the public cloud. It is inefficient because it takes longer time to store and retrieve data in the public cloud. Hence, in this work it uses pairing free operations. The centralized public cloud used as both secure storage and also key generation centre. By considering the users public keys, the data administrator upload the sensitive information to the cloud. Finally authorized users decrypt the same encrypted information from the public cloud. This technique has greater performance and security than the earlier one. Keywords— Certificateless encryption, Public key cryptography, Access Control .","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. SambanthanT, M. Suriakala, P. Malliga, M. MohamedIpbalT
{"title":"Problem Centric Objectives for E_Learning Modules","authors":"G. SambanthanT, M. Suriakala, P. Malliga, M. MohamedIpbalT","doi":"10.18000/IJISAC.50005","DOIUrl":"https://doi.org/10.18000/IJISAC.50005","url":null,"abstract":"Sharable Content Object Reference Model (SCORM) is in vogue for developing and launching courses in E_Learning environment. After the introduction of several Information and Communication Technology (ICT) based courses, launched in E_Learning environment, conflict with respect to same course contents of different nomenclatures, has led to misunderstanding of individual course objectives. Course Objectives play an important role in the TeachingLearning process of Technical courses, in particular to ICT courses offered in the E_mode. This paper as a result of a few research studies, attempts to explore the application of Problem Centric approach for specifying Instructional objectives for such conflicting courses. As a case study, the paper presents a survey report, derived through a Ph.D research work, using feedbacks on course objectives, for two conflicting courses, namely M.Sc (CS) and MCA courses. Feedbacks were obtained from both Academic experts as well as Managers of ICT Industries. Concluding remarks have been drawn from both the feedbacks received on the Instructional objectives of these courses.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114803613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}