Volume 4 Issue 1- January 2014


S.No Title Page
1. Security Challenges in Cloud Computing: A Comprehensive Study
Nilotpal Chakraborty , Raghvendra Singh Patel

In today’s advanced computing era, where all the organizations are looking to cut their operational cost, alongside increasing their efficiency and productivity, cloud computing is the most viable solution to their needs. Cloud computing offers prominent and efficient services in terms of software, hardware, server, databases etc in a more flexible, highly-scalable and cost-effective manner than the traditional mode of in-housing computational infrastructure. But as with the case of traditional computing, cloud computing also has some serious challenges regarding its security. Before migrating to cloud infrastructure, one needs to be clear about the risks and security issues associated with it and the necessary actions to be taken in order to mitigate the problems. As the cloud infrastructure and service attain maturity, the number of security attacks is also increasing exponentially. In this paper, we discuss about the major security threats that can hamper cloud and computing infrastructure and what protection mechanism needs to be taken to withstand the attacks.

Keywords— Cloud computing, cloud security, security threats, cloud cryptography, cloud security controls.

Full Text PDF
2. Human Gait Cycle Recognition Using MTI Principles and PCA
Bayan M. Sabbar, Anas A. Al-Sumaily

Security today depend on biometrics principles rather than classical password e.g. fingerprint, person signature, iris recognition, face recognition, voice recognition and gait cycle recognition. Gait cycle recognition concept became important in the last years, it depend on extraction moving objects (human) from the background, in our propose method we used Moving Target Indicator (MTI) principle to extract human from the background, this technology depend on the previous capture because it work by subtract next capture from previous capture to find moving human. In addition, we used Principle Component Analysis (PCA) to compression and decompression the capture after finding Signal Eigen vectors and Noise Eigen vectors. Finally, we will use these vectors to separate noise from the capture.

Keywords- Gait Recognition, Moving Target Indicator, Principle Component Analysis, Object Extraction, Signal Eigen Vector, Noise Eigen Vector.

Full Text PDF
3. The Implementation of FOAF Ontology for an Academic Social Network
Mumtaz M. Ali Al-Mukhtar, Ahmed T. Abbass Al-Assafy

In this paper develop a semantic web application based on FOAF ontology as a part of an academic social network where researchers can find collaborators and share research results with others. Ontology has been used to describe users and their profiles and skills, their activities and their relations to other users and objects; consequently thereafter friends can be searched based on their interests that have been described by FOAF files. This assists to build virtual groups and expand social graph within social network without reverting to the database. This would support such applications as knowledge outsourcing and online communities.             

Keywords— Social graph, FOAF ontology, Semantic social network, FOAF syntax.

Full Text PDF
4. The Working Principle and Functioning of a Namaste Robot
P.Sai Sriram, N. Sai Jyotsna

This paper introduces a service robot which performs the repetitive task of welcoming people graciously both by a sweet recorded message and hand gesture representing “Namaste” – an Indian traditional method wishing of people. Most commonly we observe people dressed in the imitation costumes of Mickey mouse, Donald duck, Teddy bear etc., near schools, colleges, offices, in parties and marriages  etc. Here the people wear only costume and performs the task of wishing unfamiliar people mechanically which is really a mind-numbing task.  In this paper we designed a service robot that acts as a host in receiving people and performs the same task for hours without getting weary. This is a low cost flexible robot which can be designed and constructed without difficulty.        

Keywords: Cobots, Namaste Ping Sensor, Arduino, servos, Relays.

Full Text PDF
5. A Review of I-SEAD Routing Protocol for Mobile Ad Hoc Networks
PJ. Triveni, Dr Syed Umar, P. Varshitha, K. Bhargaveelatha

Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of a centralized access point. Secure Efficient Ad hoc Distance Vector (SEAD) is a proactive routing protocol, based on the design of Destination Sequenced Distance Vector routing protocol (DSDV). SEAD provides a robust protocol against attackers trying to create incorrect routing state in the other node. However, it does not provide a way to prevent an attacker from tampering the next hop or the destination field in route update. In this paper, we propose an I-SEAD protocol to solve the problem. A series of simulation experiments are conducted to evaluate the performance.

Keywords—Routing protocols, MANETS. Adhoc networks

Full Text PDF