Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The IUP Journal of Information Technology
ISSN: 0973-2896
A ‘peer reviewed’ journal indexed on Cabell’s Directory,
and also distributed by EBSCO and Proquest Database

June'18

Previous Issues

The IUP Journal of Information Technology is a quarterly journal that seeks to update the readers with latest developments in the rapidly changing field of Information Technology. IJIT provides articles on emerging tools, technologies and paradigms relating to various aspects of IT. Apart from these, it also provides IT certification details and book reviews. It also provides articles dealing with programming and testing tools.

Privileged access to Online edition for Subscribers.
Editorial Board
Information to Authors
  • Database Systems
  • Programming Languages
  • Software Engineering and Project Management
  • Web Technologies
  • Mobile Computing
  • Network and Distributed Computing
  • Computer Security
  • Intelligent Systems
Articles
   
Price
(INR)
Buy
Smart System to Avoid Railway Accidents
FogBDA: Incorporating Data Analytics in Fog Layer for Real-Time Applications
An Efficient Context Management Approach for IoT
A Dynamic Load Balancing and Task Scheduling Strategy in Cloud Computing
Load Balancing Techniques in Cloud Computing: A Survey
Iris Recognition Using Gabor Filter and SURF Feature Detection Technique
A Comparative Study of a Complex Social Network
Security Issues in Software-Defined Networks
Public Key Searchable Encryption Using Elliptic Curve Diffie-Hellman Cryptography
A Move-To-Head-or-Tail (MTHT) Algorithm for the List Accessing Problem
Select/Remove All    
Contents
(June'18)

Smart System to Avoid Railway Accidents

--Kshitija Kulkarni, Sandip Kumar Yadav, Nilesh Unde and Sidharth Kaul

The objective of this paper is to implement smart ways to prevent railway accidents and to minimize the loss of life and money. Faulty equipment, improper maintenance of tracks and train conductor negligence are some of the causes of train accidents. The paper provides a way to detect the major cause of rail derailment which is the presence of cracks in rails. It eliminates most of the flaws in the current system of crack detection in railway tracks using IoT-based modern system, which can significantly reduce the cost, time and manpower without compromising accuracy. It also solves this problem by detecting the presence of cracks in rail and notifying the concerned railway authority about the location of the crack. The detection is performed using IoT-based modern system and transducer. Angle beam techniques are utilized employing common angle beam transducer assemblies aligned so as to direct sound energy into the test piece at selected angle; the administrator couples the transducer to the test piece and finds the refracted waves and after that utilizes Global Positioning System (GPS). Global System for Mobile (GSM) technology specialists are informed about the location of cracks.

FogBDA: Incorporating Data Analytics in Fog Layer for Real-Time Applications

--Divyaraj

Despite the expansive utilization of Fog computing, most of the real-time applications and quality services have not still benefitted from this computing paradigm due to cohesive problem of latency, location-awareness and lack of mobility support and awareness about the device condition. As a result, FogBDA has emerged as an encouraging platform to provide flexible resources at the edge of network. The paper discusses the current paradigm of Fog computing and proposes an extensive architecture. It also analyzes the designing goals and challenges in the FogBDA platform and presents the platform design with several illustrative applications. Further, a simulation model is illustrated in order to measure the efficacy of the proposed model. The simulated results depict the decreased response time and cost as compared to cloud.

An Efficient Context Management Approach for IoT

--Kumari Renuka, Satya Narayan Das and K Hemant Reddy

The proliferation of the Internet of Things (IoT), which connects billions of devices and things, is remarkably transforming the current applications of IoT from standalone, i.e., vertical applications to cross vertical applications or services. Cross vertical applications like the integration of smart grid and smart home can unlock new business models of IoT and can transform IoT business processes. The paper proposes an efficient context management approach in order to provide a service within minimum service delay by employing context sharing approach over cross vertical application of IoT. The performance of the proposed model presents the efficacy of the model.

A Dynamic Load Balancing and Task Scheduling Strategy in Cloud Computing

--Rahul Ranjan Pandey, Lakshya Mudaliar, Ashutosh Panda and Gaurav Kumar

Instead of upfront investment in infrastructure, many organizations have moved towards cloud computing to fulfill their computational resource needs, as cloud computing model provides on-demand, scalable resources on pay-as-you-go basis. In cloud computing, it is not possible to predict the volume of user requests in the future, so cloud computing models must be capable of handling thousands of concurrent user requests. An efficient load balancing technique plays an important role in distributing the workload evenly among the servers, so that no server is overloaded or underloaded. The paper proposes a load balancing and task scheduling algorithm, Dynamic VM Load Balancer (DVLB). While making a load balancing decision, DVLB takes both the server processing power and request (task) processing requirement into consideration. The algorithm is implemented using cloudsim 3.0.2 tool, and its performance is compared with two existing load balancing methods, Round Robin and Equally Spread Current Execution (ESCE) algorithm.

Load Balancing Techniques in Cloud Computing: A Survey

--Subhadra Bose Shaw and Chandan Kumar

The long-dreamed vision of ‘computing as a utility’ has finally taken shape in the form of cloud computing. This paradigm shift is the biggest buzz in today’s computer world. The pay-as-you-go model of cloud attracts more and more customers towards it. As a result, the workload of the data center is increasing enormously. So load balancing is the major issue in cloud data center. The main goal of load balancing in cloud computing is to reduce energy consumption and Service Level Agreement (SLA) violation by distributing the load from overloaded host to the underloaded hosts in cloud data center. There exists many load balancing algorithms in cloud. The paper analyzes some of these load balancing algorithms and also proposes a new method for load balancing.

Iris Recognition Using Gabor Filter and SURF Feature Detection Technique

--Abhisek Ray, Nivedita Mahapatra, Soumya S Das and Annapurna Mishra

The paper presents an iris recognition system using Gabor filter and SURF feature detection technique. Several image preprocessing techniques have been performed followed by extraction of the iris image from the image of the eye. This process is followed by normalization and filtering for extraction. Convolution method has been deployed for the filtering process with the aid of Gabor filters. Finally, the SURF feature detection technique has been employed for comparing the results. The proposed method is simple and effective and has been implemented using MATLAB.

A Comparative Study of a Complex Social Network

--Debolina Mahapatra

A social network is a group of individuals having some pattern of interactions between them. Social network analysis is used to study such social structures by identifying local and global patterns, locating influential entities and examining network dynamics. Social networks evolve over time. Individuals create and deactivate social ties, thereby altering the structure of the social network in which they participate. Most of the social networks display patterns of interaction between their elements that are neither purely regular nor purely random. Such networks are called complex networks. Two well-known classes of complex networks are scale-free networks and small-world networks. A number of random graph models are available which can be used to represent these two classes of a complex network effectively. The Barabasi-Albert preferential attachment model generates scale-free networks and the Watts-Strogatz model produces networks having small-world properties. The paper studies Facebook network using the Barabasi-Albert model and the Watts-Strogatz model. The average centralities, the clustering coefficient and the degree-distribution have been obtained for the respective random graph models and then compared with that of the original graph. To enhance this comparative study, the classical Erdos-Renyi random graph model, which generates a purely random graph, has also been used.

Security Issues in Software-Defined Networks

--Rohit Kumar Gupta and Bibhudatta Sahoo

Software-Defined Networking (SDN) is dynamic in nature for future intelligent networks and function applications with reduced operating cost through simplified software, hardware and management. The SDN challenges are performance, security, scalability and interoperability combined with the proposal in potential solutions direction. The Distributed-Denial of Service (DDoS) attack rate is growing year by year. In 2016, the largest attack rate was 800 Gbps. There exists a contradictory relationship between SDN and DDoS attacks. On the one hand, it is easy to detect DDoS attacks in SDN, but on the other hand, SDN itself becomes, a victim of DDoS attacks and potential DDoS vulnerabilities. The good thing with SDN is, it is a good tool to defeat and react against DDoS attack. An SDN survey says it provides a big research opportunity for security and can greatly impact networks security research in different ways. The paper shows some security challenges, with the various threats possible at different parts of SDN. It also, shows DDoS attacks on different SDN layers and its available security solutions, and discusses some directions for detection and mitigation mechanism of DDoS attack in SDN. In future, security policies will be built over the controller to make a tolerant system for DDoS attacks.

Public Key Searchable Encryption Using Elliptic Curve Diffie-Hellman Cryptography

--Akshay Pakhle, Animesh Barmukh, Jitendra Rajpurohit and Saurav Kanchan

The recent emergence of cloud computing has completely altered everyone’s perception of infrastructure architecture. This rapid transition towards cloud has fueled concern on the critical issue of information system’s security. Cloud server’s security cannot be compromised. Hence data is encrypted before outsourcing to the cloud. As search over encrypted data is not possible, searchable encryption techniques are employed. The verifiable public key searchable encryption scheme is one of the techniques which enables one to search for encrypted keywords without compromising the security of the stored information. The paper addresses four important issues of the verifiable public key searchable encryption scheme. This scheme allows any person to generate a trapdoor; cipher text can be easily modified, the key pair is generated by the users themselves, and the identities of the users are encrypted leading to unnecessary inefficiency. So a ‘public key searchable encryption scheme’ is proposed. The proposed version provides the highest level of security and efficiency which makes this system apt for cloud security.

A Move-To-Head-or-Tail (MTHT) Algorithm for the List Accessing Problem

--Sasmita Tripathy, Animesh Behera, Shibashankar Naik and Rasmi Ranjan Bhoi

Move-To-Front (MTF) algorithm has been proved to be the best performing online list accessing algorithm for the List Accessing Problem (LAP) till date. It was shown experimentally in 2010 that an Improved-Move-To-Front (IMTF) algorithm performs better than MTF algorithm. A modified linked list data structure is used to define a new cost model for list accessing algorithm. Using the new cost model, a Move-To-Head-or-Tail (MTHT) algorithm is proposed for the LAP. An experiment is being conducted by generating two different types of dataset and MTF, IMTF and MTHT algorithms were implemented with the datasets. The experimental analysis shows that the performance of the proposed MTHT algorithm is better than MTF and IMTF algorithms.

 

 

Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...