{"title":"Emerging Trends in Cloud Computing","authors":"D. Tara, Pooja Thakur","doi":"10.17010/IJCS/2016/V1/I2/106762","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I2/106762","url":null,"abstract":"As we are adopting internet technology in most of our day to day processes and it is considered to be somewhat more than a mere medium of communication, new technologies of distributed computing are emerging to take the businesses to a new platform. Cloud computing has become the hottest pick for practitioners and researchers. Everyone today is talking about cloud. A considerable amount of research has been done in this direction to identify the applications of cloud in businesses. Cloud computing is an umbrella term to define the services that are remotely hosted, always available from anywhere and are co-modified. Every IT industry is migrating to cloud to meet high computational requirement and that too at very low cost. This paper gives an idea of the services offered by cloud. A brief summary of the emerging services expected to be provided by cloud is also presented.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114502734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Marketing Strategy: Mobile Applications as Marketing Tools in Airports","authors":"L. Florido-Benítez","doi":"10.17010/IJCS/2016/V1/I2/106757","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I2/106757","url":null,"abstract":"Mobile applications (apps) on smartphones are being increasingly used to access news, entertainment, weather forecast, etc. As apps gain a stronger footing in the 21st century, large airports are taking advantage of this new marketing outlet by developing apps for branding and business communication. In recent years, this marketing model has established itself as a communication tool because of its multi- functionality, which provides added-value to the service content offered. This aims of the research were twofold. First, to evaluate how an airport app is having a direct and positive influence on passengers' sense of security. Second, to analyze how this tool can improve passengers' satisfaction and their perceived image of an airport. To analyze the influence an app has on passengers-users at airports, 103 passenger-users were surveyed. The results are particularly relevant for passengers as they are more efficient during their leisure time in terminals, and their stress levels decreases. Besides, by having a mobile app, airports can improve their brand image as well as enrich the experience of passengers within the airport.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132179983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benchmarking, Estimation & Productivity Assessment Framework for IT Implementation","authors":"C. Jha","doi":"10.17010/IJCS/2016/V1/I2/106760","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I2/106760","url":null,"abstract":"The dependence and fusion of Information Technology in modern organizations has led to the development of extremely mature service delivery models in recent years. Business units are augmenting their IT budget/spending to encapsulate & leverage the latest technology innovations thus empowering their product/service portfolio. Subsequently, technology sector is witnessing wide variance in service offerrings of IT firms offering a bouquet of solutions to meet business requirements. This beckons the need of a robust 'benchmarking and estimation' framework for analyzing the efficacy of vendor solution and accomplish savings in the procurement phase leading to enhanced operational efficiency. Further, a proficient logical model is also needed to measure the productivity of the IT vendor vis-a-vis Industry standards at the end of implementation. In this paper, we would discuss the intricacies of the procurement phase and devise a reformed benchmarking, estimation & productivity assessment framework for IT Implementations.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"529 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130264880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sales Tracking System for CPG Giant- Business Intelligence System","authors":"Vignesh K. Aiyer, Sujaan Choksi, A. Murali","doi":"10.17010/IJCS/2016/V1/I2/106751","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I2/106751","url":null,"abstract":"Business intelligence commonly known as BI may be referred to as a set of technologies, applications and practices for the collection, integration, analysis, and presentation of business information to support better business decision making.BI systems are basically data driven Decision Support System (DSS). BI can be used to support a wide range of business decisions ranging from operational decisions that include product positioning or pricing to strategic business decisions including priorities, goals, and directions at the broadest level. When combined, external data (data derived from the market in which a company operates) and internal data (data from sources internal to the company such as financial and operations data) can provide a more complete picture, which creates 'intelligence' that cannot be derived by any singular set of data. Hence BI techniques are going to be used to analyze an insurance company's data and see how we are going to make the data mean something more. In this case it will be used to make decisions regarding formulation of new policies, termination of old policies, and analyzing the route of credit and debit of the company.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126548071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICT, Good Governance, and Development","authors":"Neena Jindal, Ashok Kishtwal, Anil Sehrawat","doi":"10.17010/IJCS/2016/V1/I1/101495","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I1/101495","url":null,"abstract":"E-governance demand is increasing rapidly in the whole world. India is also not an exception to this demand. The main aim of egovernance is to nourish good governance through information communication and technology (ICT) and widening the participation of public. As we know, people in developing countries are living at the minimum cost of $ 1 per day, so, with the establishment of ICT it can be seen that the goals of good governance can be achieved. E-governance has no magical trick to achieve this. To strengthen the effective, efficient and transparent government system, the plan of action of ICT has been initiated to enhance the condition of the country. The present article is an attempt to examine the significance of e-governance in refreshing good governance.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Windows Password Vulnerability and Preventive Measures","authors":"Dinesh N. Patil, B. Meshram","doi":"10.17010/IJCS/2016/V1/I1/101493","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I1/101493","url":null,"abstract":"With the rise in the use of the Internet, cyber crimes have also increased. One of the most prominent attack that can cause a breach in the security of sensitive system is hacking the password hashes. This paper discusses the window password hashes used in the Windows NT-based operating systems and the loopholes in them. The paper also covers various attacking techniques used by attackers in order to gain access to the password . The experiment carried out to identify and extract the password hashes from the volatile memory is also discussed. Finally the paper suggests mechanism for password protection.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126640795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local Wireless File Sharing with Live Share and Browse with Social Network with File Replication Using Structured P2P Approach in MANNET","authors":"V. Sarathi, S. Amudha","doi":"10.17010/IJCS/2016/V1/I1/101494","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I1/101494","url":null,"abstract":"Smart file sharing is the software used to share files between the two or many devices. Wireless file sharing with current wireless sharing approaches lack in giving sufficient features to users who frequently share files, so it cannot satisfy both senders and receivers. Sharing process between cross platform might not result in good performance due to device constraints or result in poor user experience due to various Operating System versions and hardware configurations in low end wireless Smart Phones. Security is a major risk with live sharing feature. In order to avoid hacking of files by unauthorized users this software method will make the user place a file to transfer one time and many users can have access to it from their mobile device so that sender need notsend the same file to multiple users. This system acts like a temporary cloud (or) like a buffet system. This file sharing is mainly focused on media files sharing through Wi-Fi Bluetooth in wireless device like smart phone devices. This software will learn the environment of each data which needs to be shared and will decide what should be sent and what should be authenticated, and who can access a particular file. This software will notify each transaction for getting it verified by senders. The most important new feature is that receivers can browse the files in sender's devices from their own devices using Live Sharing feature to select whatthey need. This process of file sharing is applicable for sharing file with enterprises corporate industries, social network communities etc.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125430723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining the Factors Influencing Use of Mobile Marketing by Industrial Firms : An Empirical Investigation of Jordanian Industrial Firms","authors":"B. Eneizan, K. A. Wahab, K. A. Wahab","doi":"10.17010/IJCS/2016/V1/I1/101496","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I1/101496","url":null,"abstract":"One of the most powerful aspect of marketing that facilitates marketing experiences is mobile marketing (m-marketing).The expeditious advancements in ICT (information & communication technology) and mobile technology have brought about the development of various new services and applications. This creates a substantial need to look into factors that influence use of m-marketing by industrial firms in Jordan. The present study examined three models and theories, Technology Acceptance Model (TAM), Theory of Reasoned Action (TRA) and Unified Theory of Acceptance and Use of Technology (UTAUT). The basis of this study is a survey which was conducted across distinct groups of industries which belong to a range of industrial firms. In all, the survey questionnaires were distributed to 300 respondents to gather the pertinent data. The study found that aspects like the respondents perceived self efficacy and facilitating conditions showed significant and positive effect on adoption of m-marketing by industrial firms. Meanwhile, the aspect perceived quality of service did not show any significant impact on the implementation of m-marketing among industrial firms in Jordan.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121029994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unlocking the Prospects of Disruptive Technology : A Comparative Learning Case","authors":"Sandeep Bhattacharjee","doi":"10.17010/IJCS/2016/V1/I1/101497","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I1/101497","url":null,"abstract":"Technology and humans coexist in the modern era. Both are dependent on each other. Human growth and development depends upon the use of better technology. This synergistic relationship has been existing since the dawn of humankind, with the inventionof simple apparatus and continues into modern technologies such as the printing press and computers, laptops, supercomputers and so on. The rate of growth of technology is increasing manifolds. Something surprising today may be a thing of the past in the future. In this research paper, we tried to understand such fast, non-conventional growth of certain raw designs that support out of the box thoughts.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Krishnaveni, B. Jothi, J. Jeyasutha, S. Sivamohan
{"title":"iCare: Personal Health Assistant Using Microsoft Azure Cloud","authors":"S. Krishnaveni, B. Jothi, J. Jeyasutha, S. Sivamohan","doi":"10.17010/IJCS/2016/V1/I1/101492","DOIUrl":"https://doi.org/10.17010/IJCS/2016/V1/I1/101492","url":null,"abstract":"Nowadays healthcare becomes a critical problem due to lack of availability of expert doctors.In order to overcome this problem we are proposing a personal health Assistant system which will be unified with cloud computing. This paper proposes the iCare Personal Health Assistant from a technical perspective and its benefits for users. iCare personal health assistant monitors patient'shealth in a very appropriate manner and produces a warning when the patient's vital parameters exceeds the normal value. The histological patient data is transferred to the Azure cloud storage that can be accessed by expert doctors and patients via iOS mobile app. iOS 8 App which can read various health data parameters provided by iOS Health Kit Framework and an Azure Web application which collectively stores all the data to perform simple analytics and report on health conditions for a specific time. The Azure Web application will be developed using ASP.NET and hosted in Microsoft Azure Cloud. Azure Web services and Azure Mobile Services are used to send push notifications. Thus, users get the latest health report along with few suggestive actions to remedy that health condition, if any, and this allows users to adjust their nutrition and activities accordingly.","PeriodicalId":127788,"journal":{"name":"International Journal in Computer Simulation","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}