International Journal on Information Sciences and Computing最新文献

筛选
英文 中文
ANALYSIS OF ONTOLOGY ALIGNMENT ON DIFFERENT DOMAINS: A CROSS ONTOLOGICAL APPROACH 不同领域本体对齐分析:一种跨本体方法
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50136
S. Vigneshwari, M. Aramudhan
{"title":"ANALYSIS OF ONTOLOGY ALIGNMENT ON DIFFERENT DOMAINS: A CROSS ONTOLOGICAL APPROACH","authors":"S. Vigneshwari, M. Aramudhan","doi":"10.18000/IJISAC.50136","DOIUrl":"https://doi.org/10.18000/IJISAC.50136","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DEFENDING AGAINST DENIAL OF SLEEP ATTACK IN B-MAC PROTOCOL IN WIRELESS SENSOR NETWORK 无线传感器网络中b-mac协议对拒绝睡眠攻击的防御
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/ijisac.50138
M. Vc, Sasi Kumar
{"title":"DEFENDING AGAINST DENIAL OF SLEEP ATTACK IN B-MAC PROTOCOL IN WIRELESS SENSOR NETWORK","authors":"M. Vc, Sasi Kumar","doi":"10.18000/ijisac.50138","DOIUrl":"https://doi.org/10.18000/ijisac.50138","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mechanism for Dynamic Weight Assignment by Inferring Processing Requirement of an Application 一种通过推断应用程序的处理需求来动态分配权重的机制
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50013
L. JyothiV, Srivatsa S.K
{"title":"A Mechanism for Dynamic Weight Assignment by Inferring Processing Requirement of an Application","authors":"L. JyothiV, Srivatsa S.K","doi":"10.18000/IJISAC.50013","DOIUrl":"https://doi.org/10.18000/IJISAC.50013","url":null,"abstract":"Systems need to run a larger and more diverse set of applications, from real time to interactive to batch, on uniprocessor & multiprocessor platforms. The tasks that are scheduled using proportional share concept, assigns a weight randomly. This paper suggests a mechanism which assigns a weight based on the resource requirement of an application. The problem of inferring application resource requirements is difficult because the relationship between application performance and resource requirement is complex and workload dependent. We present a measurement-based approach to resource-inference employing online measurements of workload characteristics and system resource usage to estimate application resource requirements. These requirements are translated to appropriate weights and to modify these weights dynamically by employing weight readjustment algorithm.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124439135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An optimal inventory model for a deteriorating item with time - dependent quadratic demand and delay in payment for two warehouses 具有二次需求和付款延迟的两个仓库的变质物品最优库存模型
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50143
P. Muniappan, R. Uthayakumar, S. Ganesh
{"title":"An optimal inventory model for a deteriorating item with time - dependent quadratic demand and delay in payment for two warehouses","authors":"P. Muniappan, R. Uthayakumar, S. Ganesh","doi":"10.18000/IJISAC.50143","DOIUrl":"https://doi.org/10.18000/IJISAC.50143","url":null,"abstract":"This paper deals with an optimal inventory model for a deteriorating item with time dependent quadratic demand. When products are seasonal or when supplier provide price discounts for bulk orders, the retailer purchase more items and store it in their warehouses. There are two different types of warehouses. In one, the retailer owns the warehouse, and the other is rented. In this model the retailer first dispose the items in the rented warehouse and then the items present in the own warehouse because of economic reasons. Here permissible delay in payments is allowed. The model is solved analytically to minimize the total inventory cost. The result is illustrated with numerical example for the model.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120943771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IMPROVING ARCHITECTURE LEVEL PERFARMANCE OF WEB APPLICATION BASED ON MIDDLEWARE TECHNOLOGY 基于中间件技术提高web应用程序的体系结构级性能
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50108
K. Mani
{"title":"IMPROVING ARCHITECTURE LEVEL PERFARMANCE OF WEB APPLICATION BASED ON MIDDLEWARE TECHNOLOGY","authors":"K. Mani","doi":"10.18000/IJISAC.50108","DOIUrl":"https://doi.org/10.18000/IJISAC.50108","url":null,"abstract":"A web application is a software system that contains the computing and networking technologies required for use through web browsers on the Internet Web application. The fundamental feature of web applications is that its behavior is specified by the interaction between the environment and the system. One of the major platforms to build web applications is J2EE based on the MVC model such as Struts Framework. Struts framework based on MVC has brought the best code reuse and the legible code structure in entire system by far, but it has some problems such as complicated program, high coupling among layers and hard maintenance because its model part adopts JDBC to connect databases directly. In this paper we propose middleware technology such as Struts2 based on MVC2, Spring and Hibernate Frameworks which is the kernel and key to the simplify the software development, improve the software performance and quickly construct the Web Application of the good expansibility, maintainability. This Framework is analyzed on designing E-Commerce System.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Equilin Multi-Clustering Algorithm for Constructing Numeric Clusters 一种用于构造数值聚类的改进Equilin多聚类算法
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50161
A. JoyChristy, S. HariGanesh
{"title":"An Enhanced Equilin Multi-Clustering Algorithm for Constructing Numeric Clusters","authors":"A. JoyChristy, S. HariGanesh","doi":"10.18000/IJISAC.50161","DOIUrl":"https://doi.org/10.18000/IJISAC.50161","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114265961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
STUDY OF MODIFIED GENETIC ALGORITHM-SIMULATED ANNEALING FOR THE ESTIMATION OF SOFTWARE EFFORT AND COST 改进遗传算法-模拟退火算法在软件工作量和成本估算中的应用
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50154
I. Thamarai, S. Murugavalli
{"title":"STUDY OF MODIFIED GENETIC ALGORITHM-SIMULATED ANNEALING FOR THE ESTIMATION OF SOFTWARE EFFORT AND COST","authors":"I. Thamarai, S. Murugavalli","doi":"10.18000/IJISAC.50154","DOIUrl":"https://doi.org/10.18000/IJISAC.50154","url":null,"abstract":"I.Thamarai.1, S. Murugavalli.2 1Research Scholar, Sathyabama University, Chennai, India, 2Supervisor, Sathyabama University, Chennai. Email: 1ilango.thamarai@gmail.com, 2murugavalli26@rediffmail.com Abstract Software Effort Estimation is very crucial estimation task because of the intangible nature of software but it is very essential for developing a software application. Numerous approaches are available in software estimation method such as non-algorithmic models and algorithmic models. The main problems of SE prediction are identification of components of software project and feature selection between the projects. In this paper Modified Genetic Algorithm-Simulated Annealing (MGASA) is proposed to predict the software effort and cost estimation. In MGASA, the estimation of software is based on similar projects. Modified Genetic Algorithm (MGA) is a stochastic search algorithm. The adaptive search process has been effectively utilized in different types of challenging numerical optimization problems. The Simulated Annealing (SA) is an analogy between the way, in which the metal freezes and cools into a minimum energy crystalline structure. The main advantage of using Modified Genetic Algorithm-Simulated Annealing (MGASA) tool is to enhance the accuracy of software effort estimation.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122801132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algebraic Conservative Petri Nets Based on Symmetric Groups 基于对称群的代数保守Petri网
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50029
R. Rajeswari, K. Thirusangu
{"title":"Algebraic Conservative Petri Nets Based on Symmetric Groups","authors":"R. Rajeswari, K. Thirusangu","doi":"10.18000/IJISAC.50029","DOIUrl":"https://doi.org/10.18000/IJISAC.50029","url":null,"abstract":"ð ={ð ,ð ,ð ,ð ð } and ð’ ={ð , ð ,ð , ð , . . . , ð } 1 2 3 4, 5 1 2 3 4 84 ði","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132610244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRIVACY PRESERVING DATA ACCESS CONTROL USING PUBLIC KEY ENCRYPTION IN CLOUD 云环境中使用公钥加密保护隐私的数据访问控制
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50149
S. Hussain, V. Yuvaraj
{"title":"PRIVACY PRESERVING DATA ACCESS CONTROL USING PUBLIC KEY ENCRYPTION IN CLOUD","authors":"S. Hussain, V. Yuvaraj","doi":"10.18000/IJISAC.50149","DOIUrl":"https://doi.org/10.18000/IJISAC.50149","url":null,"abstract":"Cloud security is one of the most important ongoing research, technology of the day to day life where the information stored in the cloud must be restricted to the unauthorized users and also it can be protected on the cloud server. In the existing Certificate less Public Key Encryption, it uses expensive pairing operations during each and every time, when a user wants to share the data in the public cloud. It is inefficient because it takes longer time to store and retrieve data in the public cloud. Hence, in this work it uses pairing free operations. The centralized public cloud used as both secure storage and also key generation centre. By considering the users public keys, the data administrator upload the sensitive information to the cloud. Finally authorized users decrypt the same encrypted information from the public cloud. This technique has greater performance and security than the earlier one. Keywords— Certificateless encryption, Public key cryptography, Access Control .","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problem Centric Objectives for E_Learning Modules E_Learning模块以问题为中心的目标
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50005
G. SambanthanT, M. Suriakala, P. Malliga, M. MohamedIpbalT
{"title":"Problem Centric Objectives for E_Learning Modules","authors":"G. SambanthanT, M. Suriakala, P. Malliga, M. MohamedIpbalT","doi":"10.18000/IJISAC.50005","DOIUrl":"https://doi.org/10.18000/IJISAC.50005","url":null,"abstract":"Sharable Content Object Reference Model (SCORM) is in vogue for developing and launching courses in E_Learning environment. After the introduction of several Information and Communication Technology (ICT) based courses, launched in E_Learning environment, conflict with respect to same course contents of different nomenclatures, has led to misunderstanding of individual course objectives. Course Objectives play an important role in the TeachingLearning process of Technical courses, in particular to ICT courses offered in the E_mode. This paper as a result of a few research studies, attempts to explore the application of Problem Centric approach for specifying Instructional objectives for such conflicting courses. As a case study, the paper presents a survey report, derived through a Ph.D research work, using feedbacks on course objectives, for two conflicting courses, namely M.Sc (CS) and MCA courses. Feedbacks were obtained from both Academic experts as well as Managers of ICT Industries. Concluding remarks have been drawn from both the feedbacks received on the Instructional objectives of these courses.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114803613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信