Volume 8, Issue 5, May 2016

 

 

 

Adoptive Approach of DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET

Pages: 71-78 (8) | [Full Text] PDF (739 KB)
HP Patidar, M Gocher
Department of Computer Science Govt. Engineering College, Ajmer, Rajasthan

Abstract -
An ad hoc wireless network consists of mobile networks which prevents a fundamental architecture for communication without the support of traditional fixed-position routers. Nevertheless, the architecture must preserve communication routes although the hosts are mobile and they have restricted transmission range. There are different protocols for controlling the routing in the mobile environment. In MANET, the mobile nodes can perform the roles of both hosts and routers. Various MANET applications use for Military strategic communications and Disaster recovery mostly depended on secure node communication. For Secure Communication we use several Logical Hierarchy key protocol in Mobile Ad-hoc Network. But group key administration looks many problems because of unreliable media, less energy resources, mobile node failure. In this paper we analysis new logical key with Optimal Probabilistic Technique. In this key all node shaped in tree structure. OPLKH decreases the rekey cost and routing energy consumption in Mobile ad hoc network. In simulation we calculated the no. of rekeys cost, total energy consumption at server, key generation of energy consumption.
 
Index Terms - Automatic-Configuring Infrastructure, Energy Consumption, Rekey Cost

Citation - HP Patidar, M Gocher. "Adoptive Approach of DSR and OLSR Routing Protocols using Optimal Probabilistic Logical Key Hierarchy in MANET." International Journal of Computer Engineering and Information Technology 8, no. 5 (2016): 71-78.

 

Novel Data Analysis Approaches to Enhance the Quality of Customer Service in Saudi Government Sector

Pages: 79-84 (6) | [Full Text] PDF (235 KB)
A Baz
Computer Engineering Department, College of Computer and Information Systems, Umm Al-Qura University

Abstract -
All people in this world require others to provide them with different services during all stages of their live. Some services are provided by government to all citizens or residents, which are called public services and some others are provided by some people to some other, which are called private services. Both types differ from country to country and from region to region. In Saudi Arabia, public services include education, health, police, trading, and environmental services. It is the aim of all government agencies in Saudi Arabia and other countries around the world to offer more services to their customers, improve the quality of their customer service, and enhance the existing services. Nowadays, most government agencies developed Information Systems (ISs) to help their customers in applying for services and help their employees in processing the services. However, hardly a government agency utilize the data in the employed IS to improve the quality of its customer service. This paper is dedicated to address this gap by proposing a number of data analysis techniques that can be utilized to improve the quality of customer service and enhance the existing services in the Saudi government sector. These data analysis techniques are based on a database structure that are proposed as well in this research paper.
 
Index Terms - Data Analysis, Information Systems, Saudi Government, Enhance the Quality

Citation - A Baz. "Novel Data Analysis Approaches to Enhance the Quality of Customer Service in Saudi Government Sector." International Journal of Computer Engineering and Information Technology 8, no. 5 (2016): 79-84.

 

A New Technique for Optimal Data Manipulation through WANs

Pages: 85-89 (5) | [Full Text] PDF (362 KB)
AM Ahmed, HM El-bakry
Faculty of Computer Science & Information system, Mansoura University, EGYPT

Abstract -
One of the most familiar challenges of the cloud computing is the availability of the service or connectivity issues like internet speed or poor infrastructure, so in this paper we will present a new technique in data transformation through Wide Area Network (WAN) to accelerate the traffic between two or more data centers to get the high level of maturity of our cloud services, so the proposed algorithm will inspect the original data in high level archichture and running specific reference indexing technique to convert the original data to meta data after that the algorithm with run compression technique to compress the metadata itself this is from the source datacenter, on another side we the compressed metadata will transferred to destination datacenter then the algorithm will decompressed the file to metadata then convert back the metadata file by using the referencing table to original file, so this algorithm will assist us to transfer a lot of data between datacenters through poor WAN links rapidly.
 
Index Terms - Datacenters, Reference-table, Metadata, DBMS and SHA-1

Citation - AM Ahmed, HM El-bakry. "A New Technique for Optimal Data Manipulation through WANs." International Journal of Computer Engineering and Information Technology 8, no. 5 (2016): 85-89.