Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The IUP Journal of Information Technology

Mar'13
Focus

Classification is a fundamental data mining technique used to predict group membership for data instances. Conventional classifiers such as decision tree,

Articles
   
Price
(INR)
Buy
Internet-Based Configuration of Machine-to-Machine Communication for Information Distribution
DHCP-Enabled LAN Prone to Phishing Attacks
Queue Behavior of Statistical Multiplexers
Mobile Agent-Based Event-Driven Wireless Sensor Network (MAEDWSN) in Ring Frame Machine
Role of Service Level Agreements in SaaS Business Scenario
Select/Remove All    

Internet-Based Configuration of Machine-to-Machine Communication for Information Distribution

-- Ogwueleka Francisca Nonyelum

Lives and properties are lost daily to burglary, housebreaking, road accidents and fire accidents because of lack of quick emergency response by the agencies concerned as a result of poor communication method between the victims of the incidents and the agencies which currently is designed to be Human-to-Human (H2H). The distress caller is expected to make a call through a network to the respective agency for emergency response. For obvious reasons, this sometimes becomes impossible or ineffective. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication and computation to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M communication is all about enabling the flow of data between machines and machines and ultimately machines and people. The findings from the analysis showed that Internet-based architecture for M2M communication and computation is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

DHCP-Enabled LAN Prone to Phishing Attacks

--Swapan Purkait

Phishing is an Internet security issue the contour of which is still changing and the magnitude still increasing. Although researchers across the globe as well as the IT industry experts have identified the urgent need for anti-phishing solutions, we are still playing the catching up role with the phishers. In recent times, major web browsers and antivirus products added built-in filters which can prevent phishing. As of date, there are hundreds of free or paid security toolbars available on the Internet which claim to deter phishing attacks. In this laboratory-based study, we tested how easy it is too bypass all these security toolbars and filters with a rouge Dynamic Host Control Protocol (DHCP) server. The study shows how a determined phisher can use rogue DHCP to compromise a DHCP-enabled LAN and mount a successful phishing attack. In the IIT Kharagpur laboratory on a controlled environment, we tested two major web browsers, two security toolbars and an antivirus, and found that none of these countermeasures could detect the attack; more trouble is, all these toolbars gave a go-ahead for all the phishing sites we tested.

Queue Behavior of Statistical Multiplexers

--Johnson Adegbenga Ajiboye, Yinusa Ademola Adediran
and Mary Adebola Ajiboye

In a statistical multiplexer, packets are assumed to be arriving at the multiplexer with the inter arrival times being Independent and Identically Distributed (IID). The service time is also IID. The inter arrival times are generated from the corresponding probability distribution. When a packet arrives to an empty or idle system, the packet is immediately served; otherwise, it is queued. In this paper, the queue behaviors in the multiplexer’s buffer were examined. The results show that the average number of packets in the multiplexer queue increases in an exponential form with increase in utilization; and at high utilization, there is a dramatic increase in the number of packets in the multiplexer queue which may lead to packet loss when there is no sufficient buffering. Comparison of the simulation and analytical results for the mean number of packets in an M/M/1 Multiplexer Queue reveals that results are within ±23% for offered load of up to 90%.

Mobile Agent-Based Event-Driven Wireless Sensor Network (MAEDWSN) in Ring Frame Machine

-- G Sundari and P E Sankaranarayanan

Continuous monitoring of production of yarn is an important process requirement for good productivity in a ring frame machine in textile industry. So, collecting the data on yarn breakages using an appropriate Wireless Sensor Network (WSN) has been taken as a research problem in this work. The paper describes a method in which a mobile agent communicates wirelessly with the sensor network to collect the yarn breakage data which would serve the mobile end-user. With a view to reducing the energy consumption of the sensors and the end-to-end delay, a new approach, viz., Mobile Agent-Based Event-Driven Wireless Sensor Network (MAEDWSN), has been proposed. In this scheme, a new residual energy-based cluster creation algorithm for dynamic selection of cluster head has been proposed to save the energy constrained sensor nodes. An attempt has been made using mobile agent middleware called Java Agent DEvelopment framework (JADE) which facilitates the agent development. The collected yarn breakage data by the mobile agent has also been made available to the end-user with the help of ‘Android’ a virtual mobile device. The simulated results have been compared with the well-known client-server approach.

Role of Service Level Agreements in SaaS Business Scenario

--Vikas Kumar and Prasann Pradhan

Software-as-a-Service (SaaS) constitutes a major share in all the cloud computing offerings. Since the physical contact between the service provider and the customer is minimal, the Service Level Agreements (SLAs) are the only means of a formal understanding between the two parties. The present work discusses the composition and requirements of the SLAs for the SaaS environment. A number of major cloud services have been analyzed to outline the most focused components in the SLAs. This includes the social media services, e-mail services as well as the commercial services. Since the number and type of the cloud services is increasing day-by-day, the SLAs are becoming more and more complex and challenging. The challenges to the SLAs in view of next generation services have also been discussed in the paper.

Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
Information Technology