Thursday, 3 November 2011

Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption


AuthorAderemi A. Atayero, Oluwaseyi Feyisetan
ISSN2079-8407
On Pages546-552
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsCloud computing, Cryptography, Data security, Homomorphic encryption, RSA


Abstract

The prominence of the place of cloud computing in future converged networks is incontestable. This is due to the obvious advantages of the cloud as a medium of storage with ubiquity of access platforms and minimal hardware requirements on the user end...

Download Link:



Examining the Effect of Technology Acceptance Model on ICT Usage in Nigerian Tertiary Institutions


AuthorOye, N. D, Noorminshah, A., NorZairah Ab. Rahim
ISSN2079-8407
On Pages533-545
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsComponent; ; UTAUT-Constructs; Tertiary institutions; ICT; Acceptance; Usage; Behavioral intention. Introduction


Abstract

This paper examines the effect of technology acceptance model on ICT usage in Nigerian tertiary institutions. The study was conducted at the university of Jos Plateau state, Nigeria as a pilot study....

Download Link:


Classification of Artificial Intelligence IDS


AuthorN.Ugtakhbayar , Sh.Sodbileg
ISSN2079-8407
On Pages529-532
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsClassification, Decision Tree, Intelligence IDS, IDS


Abstract

Many methods have been developed to secure the network infrastructure and communication over the Internet. Intrusion detection is relatively new addition to such techniques....

Download Link:


A Perceptually Approach for Speech Enhancement Based on Mmse Error Estimators and Masking in an Auditory System


AuthorT.Raghavendra Vishnu, P.S.Brahamanandam, Raghava Yathiraju, Naga Himaja Alla, K.PhaniSrinivas, B.T.P.Madhav,sRadhika Chinaboina, Usha Mallaparapu
ISSN2079-8407
On Pages525-528
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsAuditory masked threshold (AMT), denoising, generalized minimum mean square error (GMMSE) AMT, log minimum mean square error (MMSE), noise suppression, speech enhancement, Weiner filte.


Abstract

Speech processing is used widely in every application that most people take for granted, such as network wire lines, cellular telephony, telephony system and telephone answering machines. Due to its popularity and increasing of demand, engineers are trying various approaches of improving the process. One of the methods for improving the process is MMSE based Wiener filter....

Download Link:

Investigation and Addressing Unfairness in Wireless Mesh Networks


AuthorM. I. Gumel, N Faruk, A.A Ayeni
ISSN2079-8407
On Pages514-524
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsWireless Mesh Networks (WMN), Medium access Control, MAC layer, Qos


Abstract

Unfairness is one of the major problems in WMN as each node operates not only as a host but also as a router, forwarding packets on behalf of other nodes that may not be within the direct wireless transmission range of their destinations and thereby adding delay and affecting the throughputs of the node. ..

Download Link:

Performance Comparison of Two Dynamic Routing Protocols: RIP and OSPF


AuthorFatima A. Hamza, Amr M. Mohamed
ISSN2079-8407
On Pages509-513
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsDynamic Routing Protocols, RIP, OSPF, NS2


Abstract

There are two main classes of adaptive routing protocols in the internet: distance vector and link state. This paper presents the comparison between distance vector and link state....

Download Link:

Comparative Assessment of Genetic and Memetic Algorithms


AuthorH. A. Sanusi, A. Zubair , R. O. Oladele
ISSN2079-8407
On Pages498-508
Volume No.2
Issue No.10
Issue DateOctober 01, 2011
Publishing DateOctober 01, 2011
KeywordsOptimization, Accuracy, Convergence, Evolutionary Algorithm, Iteration


Abstract

This work investigates the performance of two Evolutionary Algorithms Genetic Algorithm and Memetic Algorithm for Constrained Optimization Problem. In particular, a knapsack problem was solved using the two algorithms and their results were compared. 

Download Link: