IOSR Journal of Computer Engineering (IOSR-JCE)

Volume 7 - Issue 2

Paper Type : Research Paper
Title : Requirement Engineering for Service Based Systems
Country : India
Authors : T.Priyaradhikadevi , Dr. R. M. S. Parvathi
: 10.9790/0661-0720108       logo
Abstract:Requirements engineering for business solutions have dealt with the elicitation, specification, validation, management and change to information systems to be accessed through PCs and workstations. As service based systems have many challenges to access the information. Thus there are many problems in security purpose so we have proposed objectiver approach tool which have been improve the authority. In this paper we also provide the application of online bank service to access the transaction of amount and encryption to user account. This paper summarizes some of the challenges and points to areas for research that should receive the attention of the RE community.
Keywords: Encryption, Objective approach tool, Requirement Engineering, Quality, Service

[1] Binde Luo, Zhiyong Shi, Dawei Ma, YIN Shi-ping. Design and Capacity Analysis of PoC Service based on TD-SCDMA Network, The 6th International Conference on Wireless Communications, etworking and Mobile Computing[C], 2010.
[2] Vehmas A. "Service adoption for push over cellular"[EB/OL], 2004, web page:

[3] D. Roman, J. Scicluna, C. Feier, M. Stollberg & D. Fensel, ―Ontology-based Choreography and Orchestration of WSMO Services‖,, (online accessed= Jan 2011)

[4] Kevin Carey, Vincent Wade,‖ Realizing Adaptive Web Services through Automated Policy Refinement‖, IEEE, 2007

[5] Qiao Xiaoqiang, Wei Jun, "A Decentralized Services Choreography Approach for Business Collaboration, IEEE International Conference on Services Computing (SCC'06), 2006.

[6] M.P Papazoglou , P. Traverso, Schabram Dustdar & F. Leymann, (2007) ," Service-Oriented Computing: State of the Art and Research Challenges", Journal of Innovative Technology for Computer Professionals, IEEE Computer Society, November 2007.

[7] Erradi A., "Policy-Driven Framework for Manageable And Adaptive Service-Oriented Processes", PhD thesis, The school of Computer Science and Engineering(CSE), University of New South Wales(UNSW), June 2008.

[8] Martin, D., et al.,(Nov 2004), OWL-S: Semantic Markup for Web Services. DAML White Paper Release.

[9] Pahl,"Dynamic Adaptive Service Architecture .Towards Coordinated Service Composition", Lecture Notes in Computer Science, Software Architecture. M. Babar I.Gorton, Springer Berlin / Heidelberg. 6285:472-475, 2010, [doi: 10.1007/978-3-642-15114-9_43] [10] Souttar, J. Three Clicks and it's gone. Eye, The international review of graphical design, No. 36, Vol. 9, summer 2000, p.86

Paper Type : Research Paper
Title : Cloud Mining: Web usage mining and user behavior analysis using fuzzy C-means clustering
Country : India
Authors : M.Rathamani, Dr. P.Sivaprakasam
: 10.9790/0661-0720915       logo
Abstract:There is a rapid development of World Wide Web in its volume of traffic and the size and complexity of web sites. In this paper, a new approach is presented based on hybrid clustering methods for Web Usage Mining (WUM). The WUM process contains three steps: pre-processing, data mining and result analysis. First, it gives a brief description of the WUM process and Web data, then the presentation of the pre-processing step and the data warehouse that were employed. The hybrid clustering methods based on Fuzzy C-means clustering are used for analyzing and the Web logs taken from the real world Web servers. The results obtained after applying these methods and the corresponding interpretations are also presented. Furthermore, this paper also described web usage mining through cloud computing i.e. cloud mining. The Future work of web mining is to introduce a hierarchy on the information about the website.
Keywords: Clustering, Web Usage Mining, WWW, Web logs, pre-processing, Data Warehouse, Cloud Computing
[1] Bamshad Mobasher, "Data Mining for Web Personalization," LCNS, Springer-Verleg Berlin Heidelberg, 2007.
[2] Jaideep Srivastave, Robert Cooley, Mukund Deshpande, Pang-Ning Tan, "Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data," SIGKDD Explorations. ACM SIGKDD,2000.
[3] Pierrakos. D, "Web usage mining as a tool for personalization: a survey", User Modeling and User-Adapted Interaction, 13(4), pp. 311-372.
[4] Ralph Kimball. Entrepots de donnees. Editions Vuibert, 2001.
[5] Luotonen. The common log file format. Logging.html, 1995.
[6] R. Cooley. Web Usage Mining: Discovery and Application of Interesting Patterns from Web Data. PhD thesis, University of Minnesota, May 2000
[7] M. Spiliopoulou, L. C. Faulstich, and K. Winkler. A data miner analyzing the navigational behaviour of web users. In Proc. of the Workshop on Machine Learning in User Modeling of the ACAI'99 Int. Conf., Creta, Greece, July 1999.
[8] M. Perkowitz and O. Etzioni. Adaptive web sites: Automatically synthesizing web pages. In AAAI/IAAI, pages 727{732, 1998.
[9] V. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White. Visualization of navigation patterns on a web site using model-based clustering. In In Proceedings of the sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 280{284, Boston, Massachusetts, 2000.
[10] Mobasher, H. Dai, T. Luo, and M. Nakagawa. Discovery and evaluation of aggregate usage profiles for web personalization. Data Mining and Knowledge Discovery, 6(1):61{82, January 2002.

Paper Type : Research Paper
Title : An Empirical Study on Human Resource Management Practices With Reference To Job Satisfaction at Hyderabad.
Country : India
Authors : Mr. Uvais. M
: 10.9790/0661-0721622       logo
Abstract:The employee Job satisfaction represents one of the most complex areas facing today's managers when it comes to managing their Employees. It is the most important area which must be given maximum concentration by the organization. Unless and until each and every organization spares no effort to find out the particular problems which affect not only their satisfaction but the entire performance, it will make oodles of disturbance. The particular study about the Human Resource Management Practices with special reference to job satisfaction gets relevance on this corner.
Keywords:Job satisfaction, Human Resource Management Practices
[1] Armstrong Michael, Human Resource Management, New Delhi, Kogan Page India 2003, 9th edition
[2] Aswhthappa, Human Resource and Personnal Management, New Delhi, Tata Mc Graw-Hill, 3rd edition
[3] Bhattacharya Kumar Diapk, Human Resource Management, , New Delhi, Excel Books 2002, 1ST edition
[4] Monoppa & Saiyadain, Personnel Management, Tata McGraw Hill, New Delhi.
[5] Patnayak, Biswajeet, Human Resource Management, ed. iii, 2006, P.H., New Delhi
[6] Pramod Verma, Management of Industrial Relations, Vora Prakashan, Ahmedabad.
[7] Sinha, PRN, Sinha IB and Shekhar SP, Industrial Relations, Trade Unions and Labour
[8] Armstrong, M. (2006). A Handbook of Human resource Management Practice, Tenth Edition, Kogan Page Publishing, London.
[9] Arvey, R. D., Bouchard, T. J., Segal, N. L., & Abraham, L. M. (1989). Job satisfaction: Environmental and genetic components. Journal of Applied Psychology, 74, 187–192

Paper Type : Research Paper
Title : Eagle i-Bot: An Eye-controlled System
Country : Bangladesh
Authors : Mohona Gazi Meem , Onindita Afrin , Md. Mahabub Hassan Farazul Haque Bhuiyan , Md Khalilur Rhaman
: 10.9790/0661-0722328       logo
Abstract:Hundreds of millions of people in the world are hand impaired in some way, and for many, there is no absolute solution. Operation of computers by physically disabled people; especially with hand impairment was quite impossible till now because use of hands plays a vital role in the use of mouse, touch pad and keyboard. We proposed a new system named as "Eagle i-Bot - An eye-controlled system" which has come with a feasible solution for this scenario. With this system, computers and robots can be controlled by the pair of eyes' movement or iris movement and voice commands control all the mouse events. This system works with image processing system based on Voila-Jones algorithm and modified Ada-boost algorithms along with java robot class and sphinx-4 frameworks. In this paper, this system is described including software and hardware aspects, algorithms that are used and scopes where Eagle i-Bot can be used.
Keywords:eye-controlled system, iris detection, micro-controller, real time eye detection, voice recognition
[1] Nashruddin, OpenCV Eye Detection, , Last visited July 2012
[2] Face Detection using OpenCV, , Last visited July 2012
[3] Sphinx-4,
[4] Sphinx-4, A speech recognizer written entirely in the JavaTM programming language,
[5] Puneet Kalra, Speech Recognizer In Java,
[6] java.awt - Class Robot,
[7] Iris Detection,
[8] J. Daugman. How iris recognition works. IEEE Transactions on circuits and systems for video technology, 14(1):21{30, 2004}
[9] N. Otsu. A threshold selection method from gray-level histograms. Automatica, 11:285{296, 1975}
[10] Boyd, Carmaciu, Giannaros, Payne, Snell, Gillies, Iris Recognition, Imperial College London, March 19, 2010.

Paper Type : Research Paper
Title : Investigating the use of a Website as a Promotional Tool by Matjhabeng Non-Profit Organizations
Country : South Africa
Authors : Molefi Motsoenyane
: 10.9790/0661-0722934       logo
Abstract:The profit & non-profit organizational long-term success of promotional campaigns and marketing communication are affected by the effective use if information technology (IT). Web presence allows organizations to put all sorts of media, visual, text, sound, video and animation to promote their services. The purpose of this study is to examine how Non-Profit Organizations (NPO's) utilise their websites as a public relations tool. To accomplish this, a research was conducted utilising questionnaires. From the analysis made, the researcher found that more organizations deemed their primary promotion tool to be telephones and cell phones and a large population of NPOs do not use email and internet because of a low level on internet literacy among them .
Keywords:Website, Website promotion, Non-Profit Organization, NPOs, Public Relations

[1] R. Benson, T. L. Bugnitz, and W. B. Walton, From Business Strategy to IT Action. Right Decisions for better bottom line (New Jersey: John Wiley & Sons, Inc, 2004)

[2] R. Stair, G. Reynolds, and T. Cheney, Principles of Business Information Systems. (London: Cengage Learning EMEA, 2008)

[3] J. Napoli, M. T. Ewing, and L. F. Pitt, Factors affecting the adoption of the Internet in the public sector, Journal of Non-profit & Public Sector Marketing, Vol. 7 (4), 2000, 77-88.

[4] J. C. Pinho, and I. M. Macedo, The Benefits and Barriers Associated with the use of the internet within the Non-Profit Sector, Journal of Nonprofit & Public Sector Marketing, Vol. 16 (1/2), 2006, 171-184.

[5] H. M. Yeon, Y. Choi, and S. Kiousis, Interactive Communication Features on Nonprofit Organizations' Webpages for the Practice of Excellence in Public Relations. Journal of Website Promotion, 2005, 61-81

. [6] M. Kinnel, and J. MacDaugall, Marketing in the Not-for-Profit Sector (Oxford: Butterworth-Heinemann, 1997)

[7] D. Chaffey, F. Ellis-Chadwick, K. Johnston, and R. Mayer, Internet Marketing Strategy, Implementation and Practice (Essex: Pearson Education Limited, 2006).

[8] D. Vrontis, D. Ktoridou, and Y. Melanthiou, Website design and development as an effective and efficient promotional tool: a Case study in the Hotel Industry in Cyprus. Journal of Website Promotion, Vol. 2, 2004, (3/4).

[9] H. P. Tuckman, P. Chatterjee, and D.Muha, Nonprofits Websites: Prevalence, Usage and Commercial Activity. Journal of Non-profit & Public Sector Marketing, Vol. 12, 2004, (1).

[10] T. Shimp, Integrated Marketing Communication in Advertising and Promotion. (South-Western: Cengage Learning, 2010).

Paper Type : Research Paper
Title : Securing Data using Pre-filtering and Traceback Method
Country : India
Authors : G.Vaithiyanathan, V.Sridevi, S.Supriya, B.Divya, Ashfaq Ahmed.R
: 10.9790/0661-0723540       logo
Abstract:In this paper, we propose RegEx-Filter(pre-filtering approach) and IP traceback method to trace an unauthorized access incidents in the Internet, The current control technologies cannot stop specific way of access. The basic idea is to generate the RegEx print from RegEx set and use it in prefiltering most unmatched items and trace out the unauthorized user by means of traceback method. There are two key challenges in RegEx: the generation of RegEx print and the matching process of RegEx print. The generation of RegEx is tricky as it needs to tradeoff between two conflicting goals: filtering effectiveness, which means to filter out as many unmatched items as possible, and matching speed, which means that we want RegEx print to be as high as possible. Here we describe the development and the evaluation of our prototype system. The main features of our proposed method are the RegEx-Filter which filters the unmatched items. Packet feature, which is composed of specific packet information contained in a packet for identification of an unauthorized packet. And the algorithm using datalink identifier to identify a routing of a packet. We show the development of the prototype system, RegEx-Filter equipped with tracing functions on routers and its processing result.
Keywords:RegEx, Traceback model, Network security, Threat.

[1] Lichuin Bao (2008) "Location Authentication Methods for Wireless Network Access Control", International conference on computer engineering and technology

[2] Yabin Liu, Huanguo Zhang , Huanguo Zhang and Bo Zhao(2009) Research on Unified Network Access Control Architecture 2009 IEEE Ninth International Conference on Computer and Information Technology. Regular Expression Matching for Deep Packet Inspection. In: Proc. ACM/IEEE ANCS. (2006) 93–102

[3] Ramaswamy, R., Kencl, L., Iannaccone, G.: Approximate Fingerprinting to Accelerate Pattern Matching. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. (2006) 301–306.

[5]. Liu, T., Yang, Y., Liu, Y., Sun, Y., Guo, L.: An Efficient Regular Expressions Compression Algorithm From A New Perspective. In: Proc. IEEE INFOCOM. (2011) 2129–2137 [4] Broder, A., Mitzenmacher, M., Mitzenmacher, A.: Network Applications of Bloom Filters: A Survey. In: Internet Mathematics, Citeseer (2002)

[6]. Kumar, S., Dharmapurikar, S., Yu, F., Crowley, P., Turner, J.: Algorithms to Accelerate Multiple Regular Expressions Matching for Deep Packet Inspection. In: Proc. ACM SIGCOMM. (2006) 339–350

[7]. Ficara, D., Giordano, S., Procissi, G., Vitucci, F., Antichi, G., Di Pietro, A.: An Improved DFA for Fast Regular Expression Matching. ACM SIGCOMM Computer Communication Review 38(5) (2008) 29–40..

Paper Type : Research Paper
Title : Addressing the Influencing Factors for Interoperability in a Global Domain
Country : India
Authors : Tanmaya Kumar Das, Dillip Kumar Mahapatra
: 10.9790/0661-0724148       logo
Abstract:Achieving interoperability in global context is difficult. Although the benefits of enabling systems to interoperate globally are significant, repeated failures to build working systems provide evidence that the tasks necessary to gain those benefits are poorly understood. Many organizations have addressed interoperability as primarily a technical issue [2]. However, to address the entirety of the interoperability challenge, development teams must also consider nontechnical factors that influence their efforts to meet interoperability goals. This report describes a proposed model through which one can understand interoperability in global context. With this model, system developers should characterize interoperability in six dimensions: Developers need to analyze interoperability requirements at the technical, semantic, and organizational levels, but they should also consider the legal, political, and socio-cultural issues with the system must also interoperate [5]. This paper explains some of the challenges associated with achieving interoperability in systems and presents some guidance on how to address interoperability requirements, with the goal of making both policy makers and system developers aware of the depth and breadth of enabling interoperability to provide many benefits, including improved efficiency, transparency, accountability, and access, as well as coordination of services at lower costs . However, repeated failures to build working systems show that the task is not only difficult but also poorly understood.
Keywords:Interoperability, Framework, Process agreement, Open standards, Catalogues.
[1] Wikipedia. Interoperability. (Apr. 26, 2011).
[2] Biddick, Michael .―Government IT Priorities,‖ InformationWeek Government. news /government/ enterprise-architecture/218500752 (July 18,2009).
[3] Wikipedia. Semantic Interoperability. (Feb. 23, 2010).
[4] Wikipedia. Ontology Engineering. (Feb. 19, 2010).
[5] Brownsword, L., Carney, D. J., Fisher, D., Lewis, G., Morris, E. J., Place, R. R., Smith, J., Wrage, L., & Meyers, B. C. Current Perspectives on Interoperability (CMU/SEI-2004-TR-009). Software Engineering Institute, Carnegie Mellon University, 2004.
[6] C4ISR Architectures Working Group. Levels of Information Systems Interoperability. U.S. DoD, OSD (C3I), CIO, Director for Architecture and Interoperability, 1998.
[7] Clark, T. & Jones, R. ―Organisational Interoperability Maturity Model for C2.‖ Proceedings of the 1999 Command and Control Research and Technology Symposium. Newport, RI, June 1999. CASOS, 1999.
[8] CS Transform. Beyond Interoperability: A New Policy Framework for e-Government. CS Transform, 2009.
[9] E-Government for Development Information Exchange. What Is eGovernment? University of Manchester's Institute for Development Policy and Management, 2008.
[10] Global Standards Collaboration. ―Resolution GSC-14/24: (IPRWG) Open Standards (Reaffirmed). ‖Presented at the 14th Global Standards Collaboration meeting, July 2009.