International Journal of Enterprise Network Management最新文献

筛选
英文 中文
SaaS multitenant performance testing over social networks 社交网络上的SaaS多租户性能测试
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015775
M. Sumalatha, M. Parthiban
{"title":"SaaS multitenant performance testing over social networks","authors":"M. Sumalatha, M. Parthiban","doi":"10.1504/IJENM.2018.10015775","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015775","url":null,"abstract":"Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a genetic algorithm and a symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on open stack cloud computing environment over social networks.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"234-250"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47944197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication as a service in cloud from a fuzzy perspective 从模糊的角度看云中的身份验证服务
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015850
S. Vijayalakshmi, G. R Karpagam
{"title":"Authentication as a service in cloud from a fuzzy perspective","authors":"S. Vijayalakshmi, G. R Karpagam","doi":"10.1504/IJENM.2018.10015850","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015850","url":null,"abstract":"In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"352"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48150254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless system for flight safety industry 飞行安全行业无线系统
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015773
V. Kavitha, A. S. Lakshmi
{"title":"Wireless system for flight safety industry","authors":"V. Kavitha, A. S. Lakshmi","doi":"10.1504/IJENM.2018.10015773","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015773","url":null,"abstract":"Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"227"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43988018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multisite aggregate production and distribution planning: a review 多站点聚合生产和分配计划:综述
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015859
S. Prakash, G. Soni, V. Jain, G. K. Badhotiya, M. L. Mittal
{"title":"Multisite aggregate production and distribution planning: a review","authors":"S. Prakash, G. Soni, V. Jain, G. K. Badhotiya, M. L. Mittal","doi":"10.1504/IJENM.2018.10015859","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015859","url":null,"abstract":"Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analysing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"407"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45123736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An automatic construction of domain ontology to analyse competence prerequisites of jobs 自动构建领域本体分析工作能力前提
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015848
N. Kumaresh, J. A. Samath, M. Iqbal
{"title":"An automatic construction of domain ontology to analyse competence prerequisites of jobs","authors":"N. Kumaresh, J. A. Samath, M. Iqbal","doi":"10.1504/IJENM.2018.10015848","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015848","url":null,"abstract":"In many industries, the hiring process is a critical task, where many applicants will be applied for the single position, so it is required to analyse their qualification which ought to suit the requirement. Identifying feasible candidate with the required knowledge and skills is the difficult task which is faced by the organisations. In the proposed work, this issue is rectified through domain ontology construction framework (DOCF) from the job knowledge thesis and the job requirements details, which are obtained from online. The obtained documents were clustered regarding the content and conceptual similarity-based clustering method. From those clustered documents job-know ontology will be built. So it is easy to create the information requirements about the job search phase by both candidates and the human resources (HR) of the industries. It is proved that proposed research method leads to give better result when compared with the existing research method in terms of increased accuracy rate.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"441-454"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44278241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determinants of smartwatch adoption among IT professionals - an extended UTAUT2 model for smartwatch enterprise IT专业人士采用智能手表的决定因素——智能手表企业的扩展UTAUT2模型
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015843
A. Kranthi, K. Ahmed
{"title":"Determinants of smartwatch adoption among IT professionals - an extended UTAUT2 model for smartwatch enterprise","authors":"A. Kranthi, K. Ahmed","doi":"10.1504/IJENM.2018.10015843","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015843","url":null,"abstract":"Smartwatches these days have gained popularity under wearable device category. Consumers of smartwatches consider several factors while choosing smartwatches. On this premise, the current research is undertaken to identify the determinants of the smartwatch adoption. In order to arrive at this objective, the study has employed unified theory of acceptance and use of technology 2 (UTAUT2) model as a means and underpinning framework. To suit context, the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). To validate and check the explanatory power of the extended UTAUT2 model the study has considered Structural equation modelling using Smart PLS 2.0.The results arrived in this study has concluded that the extended UTAUT2 model has a better explanatory power on behavioural intention towards smartwatch adoption. Effect size (f2) and predictive relevance (Q2) for the extended UTAUT2 model are also discussed.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"294"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46675165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
An efficient protocol for power consumption in wireless enterprise ad hoc virtual community network with Triso framework 一种基于Triso框架的无线企业自组织虚拟社区网络功耗高效协议
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015836
R. Manivannan, M. Chinnadurai
{"title":"An efficient protocol for power consumption in wireless enterprise ad hoc virtual community network with Triso framework","authors":"R. Manivannan, M. Chinnadurai","doi":"10.1504/IJENM.2018.10015836","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015836","url":null,"abstract":"Today's global technology has various security treats which made the identity protection essential among user's for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"317"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44962376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An anomaly-based network intrusion detection system using ensemble clustering 一种基于异常的集成聚类网络入侵检测系统
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015839
V. Jackins, D. Punithavathani
{"title":"An anomaly-based network intrusion detection system using ensemble clustering","authors":"V. Jackins, D. Punithavathani","doi":"10.1504/IJENM.2018.10015839","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015839","url":null,"abstract":"The numbers of hacking and intrusion incidents are high due to the increasing use of internet services and computer application. Therefore, intrusion detection systems (IDS) are inevitable in today's scenario (Koruba et al., 2017). In this paper, an unsupervised technique based on hybrid clustering algorithms is used for Anomaly detection. Incremental support vector machine (ISVM) and C means (FCM) algorithms are applied to preprocess the data set and detect the anomalies respectively. Further, the processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the intrusion prevention system (IPS). The proposed hybrid algorithm is applied for KDD Cup 1999 dataset and Gure Kdd Cup data base (2008) and the results show high detection rates and low false positive alarms. Further, the proposed technique performs well with a real time data in detecting anomalies with enhanced true positive rate.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"251"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46291210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Power efficient digital circuits for ECG front end data acquisition mobile system 用于心电前端数据采集移动系统的节能数字电路
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.10015840
D. Sasikala, S. Muthukumar, R. Sivaranjani
{"title":"Power efficient digital circuits for ECG front end data acquisition mobile system","authors":"D. Sasikala, S. Muthukumar, R. Sivaranjani","doi":"10.1504/IJENM.2018.10015840","DOIUrl":"https://doi.org/10.1504/IJENM.2018.10015840","url":null,"abstract":"The electrical motion of the heart is characterised by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption. In the proposed work, analogue block is not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture, analogue blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130 nm and 65 nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130 nm consumes 18.9 pW and 65 nm consumes 109 pW of power.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"261"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42542115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical study on customer adoption of mobile payment application in India 印度客户采用移动支付应用的实证研究
International Journal of Enterprise Network Management Pub Date : 2018-09-13 DOI: 10.1504/IJENM.2018.094675
J. Joseph, K. Sriram, L. L. Rodrigues, A. O. Mathew, K. Gana
{"title":"An empirical study on customer adoption of mobile payment application in India","authors":"J. Joseph, K. Sriram, L. L. Rodrigues, A. O. Mathew, K. Gana","doi":"10.1504/IJENM.2018.094675","DOIUrl":"https://doi.org/10.1504/IJENM.2018.094675","url":null,"abstract":"Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest options for making payments and is predicted to have a very large potential in the days to come. This study focuses on the customer adoption of mobile payment application. The study reveals that the factors like usefulness, pervasiveness, ease of use, offers and cash back and service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups. Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.","PeriodicalId":39284,"journal":{"name":"International Journal of Enterprise Network Management","volume":"9 1","pages":"363-375"},"PeriodicalIF":0.0,"publicationDate":"2018-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1504/IJENM.2018.094675","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46804860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信