Version-1 (Jan-Feb 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Optimization Algorithm for Cost-Aware Test Suite Minimization in Software Testing |
Country | : | Saudi Arabia |
Authors | : | FaizBaothman |
: | 10.9790/0661-2001010108 |
Abstract: Regression testing value is optimized by reducing subsets of check cases from a check suite while not compromising the check demand. Researchers have given varied test-suite reduction techniques mistreatment coverage metrics and greedy search algorithms. Besides greedy algorithms, optimizationbased algorithms have contend a significant role in check suite reduction. consequently, we tend to developed a brand new optimisation rule, rule to handle the variety drawback in generating new solutions whereas finding the optimum check cases. Here, a fitness operate is developed to pick the check cases optimally through the rule mistreatment 2 constraints, satisfying the complete check demand and minimizing the value live............
Keywords: BAT algorithm, Optimization, Test case, Test suite, Greedy, Objective based, minimization.
[1]. J.Campos, R.Abreu, "Encoding Test Requirements as Constraints for Test Suite Minimization", in Proceedings of 10th International Conference on Information Technology: New Generations, 2013. [2] C-T. Lin, K-W. Tang, G.M. Kapfhammer, "Test Suite reduction methods that decrease regression testing costs by identifying
[2]. irreplaceable tests", Information and Software Technology, vol. 56, pp. 1322– 1344, 2014.
[3]. J.A. Jones and M.J. Harrold, Test-Suite Reduction and Prioritization for Modified Condition/Decesion Coverage. IEEE Trans. On Software Engineering, Vol. 29, no. 3, pp. 195-209, Mar. 2003.
[4]. G. Rothermel and M.J. Harrold, A Safe, Efficient Regression Test Selection Technique. ACM Trans. Software Eng. And Methods, vol. 6, no. 2, pp. 173-210, Apr. 1997.
[5]. X-y.Ma, B-k. Sheng, and C-G. Ye, "Test- Suite Reduction Using Genetic Algorithm", LNCS 3756, pp. 253–262, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Framework for Web-Based and Desktop-Based Telemedicine System |
Country | : | Nigeria |
Authors | : | Olayinka,T.C. || Olayinka A.S || Oladimeji O.R. |
: | 10.9790/0661-2001010914 |
Abstract: The continuous decline in quality medical healthcare delivery to rural communities in developing countries is what necessitated this study. Most patients in remote areas cannot afford transportation to the nearest healthcare facility providing the necessary medical services relevant to their situation. Provision of support services and continuous medical education for those healthcare professionals working in rural areas are extremely difficult. Telemedicine is a feasible tool to address these issues. In this paper, we proposed a framework for web-based and desktop-based telemedicine system were remote medical centre can access the medical resources available in urban medical centres through the internet. The web-based telemedicine application is database driven...........
Keywords: Patients, healthcare, audio-visual, ICT, framework.
[1]. Sullivan, J.R. (2008): A-Z of skin: Teledermatology, Available from: http://www.dermcoll.asn.au/public/az_of_skin-teledermatology.asp
[2]. Norrish, A. C. (2002). Essentials of Telemedicine and Telecare. West Sussex, England, New York. John Wiley & Sons, Ltd.
[3]. Allen, A. and Wacheter, G. (1996):Peripheral Devices. Telemedicine Research Center, Telemedicine Today.
[4]. Bashshur, R.L., Sanders, J.H. and Shannon, G.W. (1997): Telemedicine: Theory and Practice. Charles C. Thomas Publishers.
[5]. Martin, C., Alvarez, I., Fowler, S. and Johnson, S. (2006). Telemedicine Reimbursement Handbook. California Telemedicine & e-Health, Center. 5.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Perception Of Farmers And Consumers On Pesticide Use In Brinjal |
Country | : | India |
Authors | : | Premlata kumari || Basavaraja H |
: | 10.9790/0661-2001011521 |
Abstract: Brinjal is an important vegetable crop of India and accounted for 9 per cent of the total vegetable production in the country. The present study was conducted during the year 2014-15 in the Belagavi district of Karnataka with the objective to study the perception of farmers and consumers on health hazards due to pesticide use. The study was based on primary data obtained from brinjal growing farmers. Brinjal fruit and shoot borer was one of the most important insects causing yield loss in brinjal in the study area. Organophosphates, AnthralinicDiamides, Carbamates, Spinosyns, Organochlorines, Benzene Dicarboxamides, Benzoylureas, Pyrethroids, and fungicides were major groups of pesticide used by farmers in the study area.
Keywords: High yielding variety, fruit and shoot borer in brinjal, willingness to pay
[1]. Anonymous, Horticulture statistics Karnataka state at a glance, Department of Horticulture, Government of Karnataka,2013.
[2]. Anonymous,Indian Horticulture Database, National Horticulture Board, Ministry of Agriculture, Government of India, Gurgaon,2013.
[3]. G.L. Nigam and , K.S.Murthy, An optimum use of pesticides in integrated pest management technology. Pesticides Information, 25(1), 2000, 6-9.
[4]. S. Dasgupta, C. Meisner, and Mainul-huq, Health effects and pesticide perception as determinants of pesticide use: Evidence from Bangladesh. WPS3776, 2006,The World Bank.
[5]. [5] M. R. Langham and W. FEdwards, Externalities in pesticide use. American J. Agric. Econ., 51,1969, 1195-1201.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Introduction: Blunt abdominal trauma is regularly encountered in the emergency department. The presence of distracting injuries or altered mental status can make these injuries difficult to diagnose and manage. Patients are frequently kept for observation following blunt abdominal trauma, despite initially negative evaluations. Blunt abdominal trauma accounts for the majority (80%) of abdominal injuries seen in emergency department, and is responsible for substantial morbidity and mortality. The prevalence of intraabdominal injuries among patients presenting to emergency department with blunt injury abdomen is approximately 13-15% (3). In this study a conscious attempt is made to develop a score by correlatimg clinical findings and investigations to diagnose intraabdominal injuries and decide on management of blunt injury abdomen.Even by using screening technology such as laboratory evaluations, ultrasound, computed tomography, it is unclear and there is always a debate about whether patients require conservative management or laparotomy.........
Keywords: Blunt Injury Abdomen, Peritonitis,Clinical Laboratory And Radiologicalfindings Of Blunt Injury Abdomen
[1]. John L Kendall, MD,Andrew M Kestler, MD, Jason S Haukoos, MD, Blunt Abdominal Trauma Patients Are at Very Low Risk for Intra-Abdominal Injury after Emergency Department Observation, West J Emerg Med. Nov 2011; 12(4): 496–504.
[2]. Shojaee M., Gholamreza Faridaalae, Mahmoud Yousefifard, Mehdi Yaseri, Ali Arhami Dolatabadi, Anita Sabzghabaei, Ali Malekirastekenari, New scoring system for intra-abdominal injury diagnosis after blunt trauma, Chin J Traumatol. 2014;17(1):19-24
[3]. Nabachandra H., Meera Th, A Study of Pattern and Injury Severity Score in Blunt Thoraco-abdominal Trauma cases in Manipal, J Indian Acad Forensic Med. Vol. 5, No. 2 ( 2005-06)
[4]. Mousami Singh, Amit Kumar, Anoop Kumar Verma, Sanjeet Kumar, Abhas Kumar Singh Abdominal Organ Involvement in Blunt Injuries, J Indian Acad Forensic Med. Jan- March 2012, Vol. 34, No. 1 ISSN 0971-0973
[5]. Oliver Karam, MD, Oliver Sanchez, MD, Christophe Chardot, MD, Giorgio La Scala, MD, Blunt Abdominal Trauma in Children: A Score to Predict the Absence of Organ Injury, J Pediatr. 2009 Jun;154(6):912-7.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on: Cyber Crime & Information Security |
Country | : | India |
Authors | : | Hardik Runwal || Pooja Akulwar |
: | 10.9790/0661-2001013034 |
Abstract:Cybercrime is not escapable and is highly linked with different parts of criminal environment. As there is vast use of internet users, abusage of technology is increasing which leads to cybercrime. Cybercrime is basically illegal act which leads to criminal activity. Cyber security is a mechanism by which computer data and equipment are protected from unauthorized access. This paper is mainly focused on cybercrime and its impact on society. It also describes cybercrime forms, causes and cyber security concept in detail.
Keywords: Fraud, Cybercrime, hackers, Security methods, privacy
[1]. Steven Malby, Robyn Mace, Anika Holterhof, Comprehensive Study on Cybercrime draft by united nation, feb 2013
[2]. NS Safa, R Von Solms, An information security knowledge sharing model in organizations, Computers in Human Behavior, Elsevier 2016
[3]. Ammar Yassir and Smitha Nayak, Cyber Crime: A threat to Network Security, IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012
[4]. Jacob, G., Filiol, E., Debar, H.: Formalization of viruses and malware through process algebras, International Conference on Availability, Reliability and Security (ARES 2010). IEEE 2010.
[5]. Sunakshi Maghu, Siddharth Sehra ,Avdesh Bhardawaj," Inside of Cyber Crimes and Information Security: Threats and Solutions", International Journal of Information & Computation Technology, ISSN 0974-2239 Volume 4, Number 8, 2015.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A mobile ad hoc network (MANET) is an infrastructure-less network where the one mobile device link with other device wirelessly. Each device in MANET changes its movement and links in any direction often. Routing in MANET is the process of sending the information from source to destination node. During routing process, energy consumption and load balancing are the demanding issue to improve the network lifetime. In addition, security plays main part during the data transmission from source node to destination. Secured routing is process of preserving the information from unauthorized users during data transmission in MANET. In existing works, there are many methods for energy efficient and secured routing in MANET. But, the energy consumption and security level was not improved. Our main objective of the paper is to study the existing issues for energy efficient and secured routing in MANET..
Keywords: Mobile ad hoc network (MANET), data transmission, secured routing, infrastructure-less network, energy consumption.
[1]. Waheb A. Jabbar, Mahamod Ismail and Rosdiadee Nordin, "Energy and mobility conscious multipath routing scheme for route stability and load balancing in MANETs", Simulation Modelling Practice and Theory, Elsevier, Volume 77, 2017, Pages 245–271
[2]. Santosh Kumar Das and Sachin Tripathi, "Intelligent energy-aware efficient routing for MANET", Wireless Networks, Springer, 2017, Pages 1-21
[3]. Jipeng Zhou, Haisheng Tan, Yuhui Deng, Lin Cui and Deng Deng Liu, "Ant colony-based energy control routing protocol for mobile ad hoc networks under different node mobility models", EURASIP Journal on Wireless Communications and Networking, Springer, Volume 2016, Issue 105, 2016, Pages 1-8
[4]. Santosh Kumar Das and Sachin Tripathi, "Energy efficient secured routing protocol for MANETs", Wireless Networks, Springer, Volume 23, Issue 4, May 2017, Pages 1001–1009
[5]. Hasan Abdulwahid, Bin Dai, Benxiong Huang, and Zijing Chen, "Scheduled-Links Multicast Routing Protocol in MANETs", Journal of Network and Computer Applications, Elsevier, Volume 63, March 2016, Pages 56–67.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparison study between LSB and DCT Based Steganography |
Country | : | Iraq |
Authors | : | AlaaAbdulhussein Daleh Al-magsoosi |
: | 10.9790/0661-2001014752 |
Abstract: Information security is one of the most interested topic in computer science filed.is art of hiding data in cover media like audio, image ,etc . In this paper I will focus on two different methods hiding based on least significant bit and discrete cosine transform and compare between the result based on some measurement that calculated MSE , PSNR and SSIM. And based on those factors the result of hiding based on DCT achieve result better than LSB as shown MSE of LSB =16.1722 when hide 3 bits, PSNR of LSB =36.0771 and SSIM of LSB=0.9872 compare with Discrete Cosine transform MSE of DCT =7.981when hide 3 bits, PSNR of DCT =41.001and SSIM of DCT =0.901 as shown above the result of` hiding based on DCT is better than LSB.
Keywords: DCT, LSB,security, steganography and hiding.
[1]. El Abbadi, N., Hassan, A. M., & AL-Nwany, M. M. (2013). Blind Fake Image detection. International Journal of Computer Science Issues, 10(4), 180-186.
[2]. Hussein, M. A. A. H. (2014). Video Data Steganography Based on Discrete Cosine Transform Method (Doctoral dissertation, University of Baghdad).
[3]. Singla, D., &Syal, R. (2012). Data security using LSB & DCT steganography in images. International Journal Of Computational Engineering Research, 2(2), 359-364.
[4]. Awad, W. S. (2013). Information Hiding Using Ant Colony Optimization Algorithm. Technology Diffusion and Adoption: Global Complexity, Global Innovation: Global Complexity, Global Innovation, 289.
[5]. Shamsudin, R., Taujuddin, M., &Afifi, N. S. (2010). Text hiding using Discrete Cosine Transformation (DCT.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Preventing User Becoming Vulnerable By Measuring the User Behavior in OSN |
Country | : | India |
Authors | : | S. Revathi || Dr.M.Suriakala |
: | 10.9790/0661-2001015360 |
Abstract: Social Media propagates many information, but everything that is distributed in facebook, twitter etc need to be trustful. Before accepting news from a recipient we need to know whether the information is from a friend or vulnerable persons. After sharing information which is private between user and his/her friend, and it has been made public by his/her own friend which is a great threat to the privacy o f the user, then a decision has to be made whether to make him/her continue has a friend or not. User vulnerability must be checked. The validity of a user is determined by how much a user is active in Online Social Network (OSN), so more active he is more vulnerable. Previous methodologies reveal that by measuring the visibility of a user in OSN, vulnerability check can be estimated. But exclusion of user behavior in measuring user visibility is a drawback in previous methodology which we are going to take into account in this paper
Keywords: User vulnerability, Visibility, User behavior, Information Provenance, Community.
[1] Altshler, Y.Elovici, A,B.Cremers, N.Aharony,and A.Pentland, "Security and Privacy in Social Networks" Springer NewYork, 2013.
[2] D.Irani, M.Balduzzi, D.Balzorotti, E.Kir da, and C.Pu, " Reverse Social Engineering Attacks in Online Social Networks" detection of intrusions and malware and vulnerability assessment, PP.55-74, 2011
[3] M.Conti, R.Poovendran, and, M.Secchiero, " Fake Book: Detecting Fake Profiles in Online Social Networks" Advanced in Social Network Analysis and Mining (ASONAM), 2012,IEEE/ACM International Conference on Pages, 1071-1078.
[4] A.Singh, A,H.Toderici, k.Ross, and M.Stamp, "Social Networking for Botnet Command and Control", MECS,I.J.Computer Network and Information Security,2013, 6,pp 11-17.
[5] A Kumar, S.K Guptha, A.K Rai, S Sinha, (2013), "Social Networking Sites and Their Security Issues", International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The Legality of Ethical Hacking |
Country | : | |
Authors | : | OMOYIOLA Bayo Olushola |
: | 10.9790/0661-2001016163 |
Abstract: The legality of ethical hacking has been a topic of debate. Over the years, malicious hacking has given hacking a bad name but from the beginning hacking was not intended to be a criminal activity. Though hacking could be malicious, it could also be ethical, legal and acceptable. In this paper, we analyse the legality and acceptability of ethical hacking and why it is not a criminal activity.
Keywords: Hacking, Ethical hacking, Computer crime, Criminal activity, Malicious hacking, Crime.
[1]. Bowles, M. (2012). The business of hacking and birth of an industry. Bell Labs Technical Journal, 17(3), pp.5-16. doi: 10.1002/bltj.21555
[2]. Broadhurst R. (2006). Developments in the global law enforcement of cyber‐crime. Policing: An International Journal of Police Strategies & Management, 29(3), pp.408-433. doi: 10.1108/13639510610684674
[3]. Caldwell T. (2011). Ethical hackers: Putting on the white hat. Network Security. 2011(7), pp.10-13. doi: 10.1016/s1353-4858(11)70075-7
[4]. Choo K.R. (2011). The cyber threat landscape: Challenges and future research directions. Computers & Security, 30(2011), pp.719-731. doi:10.1016/j.cose.2011.08.004.
[5]. Conrad J. (2012). Seeking help: The important role of ethical hackers. Network Security. 2012(8), pp.5-8. doi:10.1016/s1353-4858(12)70071-5
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Automated Garbage Monitoring System Using Arduino |
Country | : | Ethiopia |
Authors | : | Fetulhak Abdurahman || Sileshi Aweke || Chera Assefa |
: | 10.9790/0661-2001016476 |
Abstract: Today, one of the challenges of most cities and towns are confronting is the decline in condition of cleanness of the environment regarding the garbage management. This occurs due to the mismanagement of the garbage collection. This mismanagement creates the spread of garbage in community which in turn creates unhealthy condition in the immediate area. It also stimulates several serious diseases amongst the people in close proximity and degrades the beauty of the area. To avoid mismanagement of the garbage and to improve the cleanness of the society, Garbage monitoring system is designed. In the proposed system, the level of the garbage is detected with the help of ultrasonic.........
Keywords: Arduino, Garbage, Monitoring, Sensor, System
[1]. Prof. R.M.Sahu, Akshay Godase, Pramod Shinde, Reshma Shinde,―Garbage and Street Light Monitoring System Using Internet of
[2]. Things‖ international journal of innovative research in electrical, electronics, instrumentation and control engineering, issn (oNLINE) 2321 –2004, vOL. 4, iSSUE 4, aPRIL 2016.
[3]. M. Al-Maadeed, N. K. Madi, Ramazan Kahraman, A. Hodzic, N. G. Ozerkan , An Overview of Solid Waste Management and Plastic Recycling in Qatar, Springer Journal of Polymers and the Environment, March 2012, Volume 20, Issue 1, pp 186-194
[4]. Islam, M.S. Arebey, M. ; Hannan, M.A. ; Basri, H,‖Overview for solid waste bin monitoring and collection system"Innovation Management and Technology Research (ICIMTR), 2012 International Conference, Malacca, 258 – 262
[5]. Md. Shafique Islam M.A Hannan, ―An overview for solid waste bin Monitoring System‖ Journal of Applied science research, 8(2): 879-886, February 2012
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The research entitled with "Integrated System for Efficient Human Resource Information Usage and Management: In case of Debre Markos University" focuses on choosing the best information systems integration approach and automating the human resource management (HRM) tasks. In the walk-through, an integrated human resource information management system (IHRIMS) is developed for the university by choosing business process integration oriented application integration (BPIOAI) approach. The IHRIMS integrates office, department, college, job and vacancy, selection and recruitment, employee profile, employee attendance, employee leave, employee efficiency, employee position, study leave agreement and file management subsystems. The system uses a central database to hold and provide consistent human resource management information for authorized users. This helps the users to have effective communication, do their jobs properly, make appropriate work analysis and decision. In general the new system improves satisfaction of stakeholders, makes resource utilization more efficient which in turn enhance the university productivity and competitiveness..
Keywords: IHRIMS, BPIOAI, Debre Markos University, Systems Integration, Employment Cycle, HRM
[1]. Smt. Shyamala. M., Human Resource Management (NSS College, Nemmara, 2014)
[2]. The human resource management function-Employment Life Cycle, url: https://www.wiley.com/legacy/Australia/PageProofs/BUS_MAN/3_4/c05TheHumanResourceManagementFunction-TheEmploymentCycle_WEB.pdf, Accessed: January 03, 2018
[3]. Richard T.Waston, Information Systems (University Of Georgia, 2007)
[4]. Zaitun Abu Bakar, Benefits of Systems Integration: Qualitative or Quantitative?, Malaysian Journal of Computer Science,16(2), 2003,38-46.
[5]. Andrey Vladimirovich Ostroukh, Dmitry Olegovich Gusenitsa, Valentina Borisovna Golubkova, and Petr FrancevichYurchik Integration of PDM and ERP systems within a unified information space of an enterprise, IOSR Journal of Computer Engineering (IOSR-JCE), 16(2), 2014, 31-33..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Unified Testing and Recruitment with customizable shortlisting parameters |
Country | : | |
Authors | : | Kuntal Biswas |
: | 10.9790/0661-2001019498 |
Abstract: While industrialization began as a movement in 1800s, we are still basking in the effects of the same. Jobs are strewn everywhere if a person is qualified enough. It was fulfilling up to a few decades ago, providing jobs and uplifting men from hereditary obligation, to deserving positions in the society, based on their education. While this should be a merit of the modern society, it is startlingly inefficient, as of today, when population is ever on the increase and the competition is cut-throat, almost literally. Taking India as an example, the 2017-18 report by a leading news organization, namely 'The Times of India', projects the unemployment rate at 3.4% for the year 2017, which remains stagnant at the same number for 2018. While this might not seem a lot in a single glance, the actual number rises to a staggering height of 17.8 million for 2017, which goes on to 18 million in 2018. This becomes even more alarming when delving into the details, where a simple Google search shows that 1.5 million engineering............. .
Keywords:..........
..................