IJMECS Vol. 4, No. 5, May. 2012
Cover page and Table of Contents: PDF (size: 679KB)
REGULAR PAPERS
In this paper the authors present a new integrated symmetric-key cryptographic method, named SJA, which is the combination of advanced Caesar Cipher method, TTJSA method, Bit wise Rotation and Reversal method. The encryption method consists of three basic steps: 1) Encryption Technique using Advanced Caesar Cipher, 2) Encryption Technique using TTJSA Algorithm, and 3) Encryption Technique using Bit wise Rotation and Reversal. TTJSA Algorithm, used in this method, is again a combination of generalized modified Vernam Cipher method, MSA method and NJJSAA method. Nath et al. already developed some symmetric key encryption methods namely MSA, DJSA, DJJSA, modified DJJSA, NJJSA, TTJSA, TTSJA, DJMNA, UES-I, UES-II etc. The cryptanalysis shows that TTJSA is free from standard cryptographic attacks such as differential attack, plain text attack or any brute force attack. In the present method the authors have used advanced modified Caesar Cipher method where the authors have modified the standard Caesar Cipher method and then they applied TTJSA method to make the entire crypto system very hard to break. The present method has been tested on different plain text specially with repeated character and the spectral analysis of the plain text and the encrypted is also been shown. The spectral analysis shows that the present cryptography method, SJA can not be broken with any kind of standard cryptography attack. The authors propose that the present method will be most suitable for password, SMS or any kind of small message encryption.
[...] Read more.In this paper, we present a robust and novel strategic invisible watermarking scheme which can be used in the field of copyright protection. The novelty of our algorithm lies in the creation of a compound watermark image using the target image and the key image, where both of them are self encrypted. The self encryption concept adds an extra level of data security along with the security supported by the watermarking technique. Again, our method results a single invisible watermarked image which will be sent to the recipient and from that image, both the key and the target image can be extracted with no distortion using only the proposed extraction algorithm. Results of exhaustive experimentation using standard input color images demonstrate the robustness and efficiency of our approach.
[...] Read more.Straight forward meaning of On-Line Evaluation is that, few questions are extracted from the question bank and user is asked to "mark" the response. Normally, questions are assumed to be of "objective type". In this paper, this traditional idea is extended and abstract concept of "Item Bank" is introduced. The researchers have developed and tested Item Bank software earlier. The guidelines discussed in the paper are the outcome of this real life experience. The scope of the Item bank would not be confined only the Evaluation of competency of respondents but it covers assessment of the person for fresh recruitments/ Assignments or for the Reward or to Accredit the achievement of the employee performance with the use of client server architecture.
[...] Read more.In this paper, we prove two common fixed point theorems. In first theorem, we prove common fixed point theorem for two weakly compatible self maps of type (A) satisfying an integral type contractive condition in intuitionistic fuzzy metric space. In the second theorem, we prove common fixed point theorem for two weakly compatible maps satisfying an integral type contractive condition in intuitionistic fuzzy metric space. These results are proved without exploiting the notion of continuity and without imposing any condition of t-norm and t-conorm.
[...] Read more.The human behavior is a combination of several feelings. There are two cases whether a person likes other individual or not. The liking of an individual leads to love and finally happiness. The feelings of love may be in different forms but here considered to be partners' love. There are three aspects of love for the partner: forgetting process (oblivion), the pleasure of being loved (return), and the reaction to the appeal of the partner (instinct). Along with that the appeals and the personalities of the two individuals do not vary in time. This model proves that if the geometric mean reactive-ness to love is smaller than the geometric mean forgetting coefficient and the system is asymptotically stable if the ratio of appeals is greater than the reciprocal of ratio of mutual intensiveness coefficient.
[...] Read more.Remote laboratory is an innovative approach to create and provide laboratory experience to geographically dispersed students from anywhere at any time. One of the most important aspects of remote laboratories is to provide the user maximum mobility and freedom to perform experiments. Apart from the PC-based remotely triggered laboratories to enhance technical education, mobile devices can play a major role in wider implementation of the laboratory for hardware-based remote experimentation. In this paper, different techniques, such as, Adobe Flash Lite, HTML5 and SMS for developing platforms for mobile devices are studied and compared.
[...] Read more.E-Learning is referred to as teaching and learning by using electronic media. This methodology supports the use of networking and communications technology in teaching and learning. E-Learning is generally meant for remote learning or distance learning, but can also be used in face-to-face mode. In this paper we have made study about the awareness and impact of E-Learning in selected rural areas in India, the providers and learners ratio and an analysis on the collected data has been made to find the advantages of E-Learning resources and their affect on social and mental development of the individuals belonging to rural areas.
[...] Read more.This study aims at investigating the effect of post-task activities on the TEFL students' fluency and accuracy in oral production. In particular, the study seeks to discover the effect of different types of repeated performance (i.e., public and private) as post-task activities on fluency and accuracy of oral production. Our premise is in line with Ellis's (1994) idea that these types of activities can promote learning. The participants were all TEFL students studying at Iranian universities and institutes. They were assigned into four groups. They all participated in pre and post interview sessions. The students in group A repeated their performance in private. The students in group B repeated their performance in front of the class and the students in group C as the last experimental group repeated their performance both in public and private. The students in group D as the control group didn't have any repeated performance. The results indicated that group B outperformed all other groups in fluency. Concerning accuracy, the students in group C outperformed the students in all other groups.
[...] Read more.