IJEME Vol. 7, No. 3, May. 2017
Cover page and Table of Contents: PDF (size: 561KB)
REGULAR PAPERS
Early in 2008, it was emphasized that sending messages through public networks will draw the attention of third parties such as attackers, perhaps causing attempts to break and reveal messages. Thus, cryptography was initially used to send a text message by producing cipher text. Although cryptography provides confidentiality for sent message, but the cipher text that is generated appears nonsense for the attacker, which leads to being identified as the sensitive information. In order to overcome this problem, this paper introduces a novel mobile steganography technique, based on using emoticons to deliver sensitive information as a daily emotion monitoring application. Based on achieved result, 88 characters can be embedded and sent to the recipient successfully in a hidden way.
[...] Read more.Cloud Computing is a promising and emerging technology that is rapidly being adopted by many IT companies due to a number of benefits that it provides, such as large storage space, low investment cost, virtualization, resource sharing, etc. Users are able to store a vast amount of data and information in the cloud and access it from anywhere, anytime on a pay-per-use basis. Many users are able to share the data and the resources stored in the cloud. Hence, there arises a need to provide access to the data to only those users who are authorized to access it. This can be done by enforcing access control schemes which allow only the authenticated and authorized users to access the data and deny access to unauthorized users. In this paper, a comprehensive review of all the existing access control schemes has been discussed along with the analysis of these schemes.
[...] Read more.These days cloud computing is a main concern for small and medium enterprises. The major concern for these enterprises is about security and privacy. This paper defines privacy and concept of identity management that may help to increase trust in the cloud environment privacy. Cloud computing brings us on-demand service by reduction of hardware costs, but it also suffers from reduction of security. Enterprises scruple to decide which provider is a proper cloud provider by understanding the different types of IDM. IDMs have a major role in applying privacy in various services in cloud computing. Thus, it is vital to have a vision about accessing resources in a secure manner. This paper focused on the SaaS (Software as a Service) and communication on cloud computing environment.
[...] Read more.The software quality can be enhanced with the awareness and compassionate about the software faults. We acknowledge the impact of threshold of the object-oriented metrics on fault-proneness. The prediction of fault-prone classes in early stage of the life-cycle assures you to allocate the resources effectively. In this paper, we proposed the logistic regression based statistical method and metric threshold to reduce the false alarm for projects that fall outside the risk range. We presented the threshold effects on public datasets collected from the NASA repository and validated the use of threshold on ivy and jedit datasets. The results concluded that proposed methodology achieves the speculative results with projects having similar characteristic.
[...] Read more.High quality of teaching is fundamental purpose and basic task of a university, as well as a foothold in the university. We introduce in this paper a university teaching evaluation. This system is used by students and experts via Servlet+JavaBean+ORACLE on campus network with the foundation of the system published by the teaching affairs bureau of university. The target system is divided into student evaluation, expert evaluation and management modules. The evaluation system is divided into two subsystems, namely, expert evaluation and student evaluation of courses. Database is the core of the whole system. It serves all the information processing modules. The implementation of the system can fully improve the quality control of teaching and lower the cost. A teaching evaluation system is analyzed and designed in this paper.
[...] Read more.Technology innovations are having significantly importance in human life in general and in professional life in particular. The quick expansion of information technology has refined the life of millions of people. Banking is no exception these days. Considering the growing customer expectations at present time, banks and other financial institutions have incorporated online and mobile banking technology to ease customer's efforts. Innovations such as E-Banking technology have changed the critical structure of all banking system by lowering transaction cost. New E-Banking technology applications are used in mobile phones to check account balances, alerts and conduct other banking activities. The present study is based on to identify the factor affecting the Customer Attitude towards E-Banking Technology. One of the most important changes in the banking industry has been the customer movement from traditional branch banking to electronic banking such as E-Banking.
[...] Read more.