Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 3Ali ObiedThe design of systems, or agents, situated in dynamic environments is of considerable practical and theoretical importance. This paper describes experiments examining the efficacy of dynamic sensing policy when the time cost of processing sensor information is significant. Extending the TILEWORLD experiments performed earlier by Obied, et al. in [1] this article produce interesting development of EBDI-POMDP agent by integrating among knowledge base models, decision theory and Self-Organizing system. This article clear distinguishes between sensing policy and sensing cost, since; it described experiments examining the efficacy of dynamic sensing policy when the time cost of processing sensor information is significant. It is demonstrates that several expected features of sensing cost and planning cost do arise in empirical tests. In particular, it is trying to answer the question is how would scalability of agent improve' The observations that for a given sensing cost and degree of world dynamism, an optimal sensing rate exists and, it is shows how this optimal rate is affected by changes in these parameters.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 3Subash ThotaBusiness Intelligence (BI) & Data Analytics deals with integrated approaches to management support. Currently, there are constraints to data management for business intelligence these limitations are the integrated infrastructures that are subject to BI have become complex, costly, and inflexible, the effort required consolidating and cleansing enterprise data and Performance impact on existing infrastructure / inadequate IT infrastructure. So, in this article Cloud computing will be used as a possible remedy as Cloud computing also enables organizations to analyze terabytes of data faster and economically than ever before. When we define data, information and analytics as services, we see traditional methodology, which is mainly time and cost driven, which do not work well. Organizations need to consider the value of service level and quality in addition to the cost and duration of delivered services. CLOUD enables scale, scope and speed economies. Many believe that Cloud will reshape the entire industry as a revolution. In this paper, we aim to pinpoint the challenges and issues of Cloud computing. This study highlights that organizations face various challenges using BI cloud. The research objectives of this study are a conceptualization of the BI cloud issue and an investigation of some benefits and risks of BI cloud. The results of this research can be used by IT and business leaders as they plan and develop BI cloud in their organizations.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 3Moses A. Agana, Affiku Julius AkoloThis Study was designed to model a legal proceedings portal for Nigerian High Courts. The purpose is to complement or seamlessly replace the vortex of law reporting books in the legal industry. The platform lays credence to the contributions of the High Courts in Nigeria to the judiciary and public at large. The study was designed using object-oriented technique. The design was implemented using JQuery (A JavaScript library, bootstrap framework, and XAMPP server (Apache, MySQL, PHP and Perl) and was test-run on a local host. The results showed that the portal can provide a platform to access the proceedings of the High Courts in Nigeria and would be a repository for legal research.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Merril Roshini Mathias, Rayan Rahul D’Souza, Sanjana Bhat H., Savina Jassica Colaco, Renuka TantryA wireless ad hoc network (WANET) or MANET is a decentralized type of wireless network and it does not rely on a pre-existing infrastructure. Instead, each node participates in routing by forwarding data for other nodes, so the determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use. The Temporally-Ordered Routing Algorithm (TORA) is an adaptive, distributed, loop-free routing protocol for multi-hop networks which has minimum overhead against topological changes. Quality of Service (QoS) support for MANET in TORA has become a challenging task due to its dynamic topology. This paper proposes QoS enabled Temporally Ordered Routing Algorithm using Ant Colony Optimization called AntTORA. ACO algorithms have shown to be a good technique for developing routing algorithms for ad hoc networks. ACO based routing is an efficient routing scheme based on the behaviour of foraging ants. The collective behaviour of ants helps to find the shortest path from the nest to a food source, by deposition of a chemical substance called pheromone on the visited nodes. ACO technique is used in TORA protocol to optimize multiple QoS metrics like end-to-end delay, throughput, jitter and so on. The performance of TORA and AntTORA are analysed using network simulator-2. The results presented in the end also help the researchers to understand the differences between TORA and AntTORA, therefore to choose appropriate protocol for their research work. Our simulation study shows how this approach has significantly improved the performance of the ad hoc networks.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Aleena Abraham, Deeksha Alva, Hezil Anisha Dsouza, Jasmine Crasta, KavyashreeThis paper demonstrates to control and monitor the LAN network from a wireless handheld device i.e. cell phone from anywhere irrespective of distance. In concern, the computers are grouped together to form a network. To manage and control activities of network while in office is an easy task. While you are outstation/away from office to monitor and control the network, instead of depending on third party information, you can always have your cell phone serve the purpose, login anytime to application and see who is busy with what in the office. This paper provides the maximum details about the network to the administrator on their mobile phone, when administrator is away from office/goes out station.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Rekha Rao, Sahana B., Sahana V. Prabhu, Shamitha Ammanna, ChaithraLots of applications are developed to track a Smart Phone, but still it is a major concern. If ever the phone is lost, user has to manually report to the customer care to block the IMSI number of the lost phone. This work is reduced by our application. Our Android Application is deployed with initial registration of user mobile number, alternative mobile number, and passcode and email id. This application which runs in the background can be able to track the current location of the device. If the thief changes the SIM card, immediately SIM details, latitude and longitude of the location are sent to the alternative phone number of the original user through SMS. We can retrieve the contacts and critical files from the lost phone. We can retrieve important contacts by SMS and entire contact list through mail. We can also retrieve the critical files in the lost phone by using file transfer facility that is available in the application. Website provides location history of the phone and we can download the requested files.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Rashmi J. Nayak, Numreen, Salma Ahlam, Meera Savaliya, Vijetha U.For over a decade, Surveillance cameras have been the prime option to ensure security at places of interest. The main drawback of this system is that it simply stores video footage and fails to alert the concerned personnel in real-time about the ongoing crime. In this proposed system, Theft Detector, theft can be detected and notified to the user in real time. The system uses pi camera and PIR sensors connected to Raspberry pi to detect the intrusion in real time. On detecting an intrusion, the concerned person (victim) is notified about the theft via mail and SMS. The victim also receives an image of the intruder and has access to the video footage of the theft immediately. This system can prove to be beneficial in jewelry shops, home etc.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Sharyl Cutinha, Sonalia Rodrigues, Sanjay P., Supreetha R.Social media is more important today than ever before. Staying connected and informed has become the need of the hour for every individual. Social networking sites have become very popular avenues for people to communicate with family, friends and colleagues from around the corner or across the globe. Traditional social networks have all of the user’s contacts muddled into a single list offering everyone the same privileges. Connectify- The Social Network is a social networking website that intends to connect people in a more organized manner by categorizing the user’s connections according to his work, social and familial relations. This paper gives a brief overview of the project which focuses on the social network and its features which are extensively used today by a wide range of people.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Athokpam Bikramjit Singh, Sathyendra Bhat J., Ragesh Raju, Rio D’SouzaLoad Balancing is one of the most significant concepts in distributed environments. As Cloud Computing is considered to be one of the best platforms that gives storage of data at a minimal cost and is accessible all the time over the internet, load balancing for the cloud computing has turned into a very interesting and important study area. Load balancing aims at high user satisfaction and usage of resource ratio by guaranteeing a proficient and reasonable allocation of each computing resource. There are numerous difficulties in load balancing techniques such as security, fault tolerance etc which are prevalent in modern cloud computing environments. Many researchers have proposed several techniques to enhance load balancing and this paper too, portrays an overview on load balancing schemes in cloud environments. We explore the diverse types of algorithms that are proposed by a number of researchers to solve the problem of load balancing in cloud computing.
Abstract: Publication year: 2017Source: Advances in Computing, Volume 7, Number 2Aminath Haneena, Supreetha R.This paper presents a secure technique for the password protection which make use of distributed database. Security to the password has become a crucial problem in this generation as more and more attacks are focused on the password to get access to user’s confidential data. Here the password is split into parts and is stored in different database instead of storing the entire password string in one database. The password is stored after encryption, the encryption algorithm used is itself improvised by using a pseudorandom key generator. The encrypted string is split into three, the split is reversed and stored into separate databases. The paper shows the comparison of the improved algorithm made use. The technique of distributed storing enhances the security by making it difficult for the hacker to get the user password easily.