Volume 5 Issue 3- March 2015
Page | Title | Full Text |
---|---|---|
35-39 | Factors Affecting Requirements Elicitation for
Heterogeneous Users of Information Systems Lilian Cherotich Ronoh, Geoffrey Muketha Muchiri, Franklin Wabwoba Abstract
Modern organizations keep up with the fast changing technology through successful information systems development and integration to automate their business operations. Among others, this can be achieved through effective requirements elicitation which a sub-phase of requirements engineering. It is recognized as one of the most critical, knowledge-intensive phase therefore determining the overall success or failure of the information system. In a setup whereby users are heterogeneous by nature, requirements elicitation becomes quite challenging. To improve the effectiveness of the requirements elicitation process from this type of users, the analysts should determine the factors that affect this process which are unique to this type of users. To address this issue, we have conducted research in two Kenyan public universities whereby information systems users are heterogeneous in nature. The objective of the study was to determine the factors that affect requirements elicitation process among heterogeneous user groups of information systems. Nine factors were identified by using multiple regression analysis namely, users’ availability, users’ and analysts’ diverse cultural background, users’ geographical distribution, communication issues, users’ awareness and training on the process, technique used, institutional politics and bureaucracy, requirements elicitation policy and user's cooperation & motivation. These factors form a practical guide that can help analysts to consider before carrying out requirements elicitation from heterogeneous users. Keywords: Requirements elicitation, requirements elicitation models, requirements engineering, software development, heterogeneous users |
Full Text PDF |
40-43 | Routing Protocols Convergence Activity and
Protocols Related Traffic Simulation With It's
Impact on the Network Mustafa Abdulkadhim Abstract
Routing protocols are the heart and soul of internetworking, routers uses routing protocols as their algorithms to decide the best path from a given source to a destination. That being said it is very critical to choose the right routing protocol for the topology as many parameters exists such as throughput, delay and QoS. Network convergence on the other hand is the state of set of routers having the same topological awareness about the network. Keywords-component; routing, convergence, EIGRP, OSPF
|
Full Text PDF |
44-47 | Anomaly Based Intrusion Detection Systems
Using SNMP Data Md. Ariful Hoque & Barnali Chakraborty Abstract
This paper discusses a statistical algorithm to detect DOS attacks on computer net- works. DOS attacks hamper the network by making resources unavailable to genuine users. The algorithm presented here use SNMP data in order to detect incoming flooding attack on a computer or network. The data to be monitored depends on the class of flooding attacks that is intended to be detected. In this paper we focus on detecting ICMP, UDP, TCP and IP type of flooding attacks on various network interfaces.
|
Full Text PDF |
48-50 | Digital Watermarking: Potential Challenges and
Issues Kiran, Kanwar Garg Abstract
-In the era of technology, Editing, manipulation, copying of digital multimedia has become prevalent and becoming a serious issue in the present scenario. Digital watermarking is one of the solution to deal with this problem. It is a technique in which pattern of bits are embedded into the digital data in such a way that it do not hinder the actual data. Thus it maintains its reliability. Digital watermarking can be applied in the variety of application areas such as copyright protection, fingerprinting, broadcasting monitoring, copy protection, medical application. In the present review paper, the author is pointing out challenges and issues which occurred while this technique is applied. Keywords: Digital Watermark, DWT, Imperceptibility, Robustness
|
Full Text PDF |
51-56 | An Efficient SRECRP Protocol for Secure Energy
Constraint Routing in MANET Nithya.S, Sivaraja.S & Sindhu.S Abstract
MANET consists of mobile platforms have a router with multiple hosts and wireless communications devices. Energy savings and security is the major problem in all kind of the networks. MANET is a network, which is very popular due to its unique characteristics from all the other types of networks. MANET is a network having tiny light weighted nodes, with no clock synchronization mechanisms. Generally, in this type of network the exhaustion of energy will be more and as well, the security is missing due to its infrastructure less nature. Due to the lack of energy, the link failure may occur and the network lifetime also gets affected. Similarly, the node causes cheating during the transmission process in the network Most MANET routing protocols are vulnerable to attacks that can freeze the whole network. Thus these may affects the performance of the network. To overcome these problems, we propose a new secured energy aware routing algorithm called SRECRP. This algorithm holds two mechanisms. Initially it makes all the active state nodes to sleep when not in use and then finds the energy based efficient path for reliable data transmission. Secondly, provides the security against attacks using a secured mechanism. By simulation based studies, we show that this algorithm effectively provides how its achieves higher security, less energy utilization, less overhead and less end to end delay. Keywords—SRECRP, Energy, Link failure, MANET, Network, Security.
|
Full Text PDF |
57-61 | A Big Data Analytics for Detection of Frauds in
Matrimonial Websites Vemula Geeta,,P. SivaJyothi,T.Venkat Narayana Rao Abstract
In India , online matrimonial websites plays a major role being trusted by millions of Indians globally. At the same time these act as the playground for the fraudsters and imposters duping thousands of victims by posting false and fraudulent profiles every year. Analytics is the future of big data because only transforming data into information gives them value and can turn data for social benefit. This paper investigates the benefits of Big Data technology and main methods of analysis that can be applied to the particular case of fraud detection in Indian Matrimonial Websites. Keywords—Big Data, Matrimonial Fraud Detection, Hadoop, Social Networks
|
Full Text PDF |
62-65 | Word Spotting in Scanned Tamil Land Documents
using K-Nearest Neighbor M.Malathi, M.Srividya Abstract
Word spotting is a technique which can extract the text from input image. Here, we implemented on scanned Tamil land documents. Using Gabor feature, we extract the feature values for the input image. The main goal is recognize the text from the document using K nearest neighbor classifier. The features were calculated and the features were combined. Using these features, we can classify and recognized a text using an unsupervised classifier. The Classifier needs training of a database. The database consists of some set of words (printed or scanned). For the classification of the feature vector the k nearest neighbor Classifiers were employed. Keywords: word spotting, recognition, text, feature, k nearest neighbor.
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net