Volume 7, Issue 7, October 2016

Risks and Threats Facing Information Security in the Age of Knowledge Society
Pages: 1-5 (5) | [Full Text] PDF (302K)
Mozamel M. Saeed
Department of Computer Science, Collage of Science, Prince Sattam Bin Abdul-Aziz University, KSA

Abstract -
Information Security in Automated Systems is considered to be one of the most interesting topics that attract researchers and those dealing with such systems. It is well known that the popularity and persistent existence of computers in information systems management played a great role in developing and raising the efficiency of these systems, however, their dependability, reliability, and their ability to protect confidential information against intrusion together with their ability in managing these systems persistently and accurately remains under consideration. The major objective of this paper is to review the threats and attacks faced by information environment, and to propose scientific mechanisms and means that can help raising security efficiency and providing information protection that commensurate with the information technologies in the current times.
 Index Terms - Information Security, Knowledge Society, Risks, Threat and Internet
Security Threats and Remedies in E-learning System
Pages: 6-10 (5) | [Full Text] PDF (316K)
Ms. Aakanksha Chopra and Ms. Ankita Chopra
Jagan Institute of Management Studies, Affiliated to GGSIPU, Dwarka Sector-16C, Delhi, India

Abstract -
E-Learning can be defined as the use of available information and communication technologies to facilitate learning process. E-Learning is the combination of learning and the Internet technology. In the modern world, education has become more global, and people are looking for learning with ease and interest. Through this paper, we will understand and discuss how e-learning systems can provide quality education and also discuss security threats and remedies in the E-learning system. We will all focus on harmful E-Threats, E-Risks, how e-threats leads are dangerous to assets and will also discuss various e-remedies to avoid all the E-Threats. We will also understand six categories of information security threats to our E-learning system by STRIDE model.
 Index Terms - E-Learning, Education, E-Threats, Assets, E-Risk, E-Remedies and STRIDE Model
ATM usage Optimization Framework for Rural Areas in Nigeria
Pages: 11-18 (-) | [Full Text] PDF (K)
Osahenvemwen, A.,
Faculty of Engineering and Technology, Ambrose Alli University, Ekpoma, Nigeria

Abstract -
This study presents Automated Teller Machine (ATM) usage optimization framework for rural area, aim at create a better quality of service for banking customers using ATM services. Data were obtained from Nigeria banks and Questionnaire was used to obtained relevance information from customers for a period of two years from June 2014 to July 2016. Two different locations were considered in this study, urban (Benin City) and rural area (Ekpoma). Optimization framework was developed using queuing theory technique. In addition, security tips that will improve the quality of service and ATM queuing characteristics were highlighted in this study. The average numbers of customer per each hour and days of the week were determined for both urban area (Benin City) and rural area Ekpoma. It was observed, that the queue key characteristics for rural area values overweight the values obtained from the urban area such as the average or expected number of customers in the system (Ls), the average or expected number of customers in the queue or the average length of the queue (Lq), the average waiting time of a customer in the system (Ws), the average waiting time of a customer in the queue (Wq), the probability that system is idle (P0), the Probability that a customer must wait before he/her gets service and utilization rate. The values between the urban area and rural area are in variant, which means that low quality of service was witnessed at the rural area base on the result obtained. It was observed that single server (ATM) values obtained are higher than the values from multiple servers (ATMs) from the corresponding locations, which imply that good quality of service was associated with multiple servers. In addition; the security level should be improved on by introduction of facial and finger print as security password to boost the customers’ confidence.
 Index Terms - Waiting Time, Arrival Rate, Service Time and Queue Technique
An Improved Data Mining Technique and Online Mining for Energy Efficiency in Wireless Sensor Networks: A Comparative Review
Pages: 19-24 (6) | [Full Text] PDF (698K)
Mohd Muntjir, Ahmad Tasnim Siddiqui and Mohd Rahul
College of Computers and Information Technology, Taif University Taif, Kingdom of Saudi Arabia

Abstract -
Data mining in large sensor networks just starts to attract interest. Finding patterns in such an environment is both compelling and challenging. We also outline our preliminary proposal of solutions to these problems. There has recently been a considerable amount of research work done on using data compression techniques to minimize the volume of the transmitted traffic, and the consequently assist in reducing power consumption levels in Wireless Sensor Networks. A Wireless Sensor Network is the network of small sensor nodes, which are energy constraint devices and have limited data computational and transmission control. The nodes are organized in the form of cluster around a Base Station. In this paper we have define how to improve the energy efficiency of the network by using data mining technique by discovery, usage, and understanding of patterns and knowledge, mining moving object data, mining text, Web, and other unstructured data.
 Index Terms - Wireless Sensor Network, Data Mining, Clustering and Energy Efficiency
A Survey on Web Cache Replacement Technology
Pages: 25-29 (5) | [Full Text] PDF (382K)
Mohammed Salah Abdalaziz Khaleel, Saif Eldin Fattoh Osman and Hiba Ali Nasir Sirour
Faculty of Computer Studies, International University of Africa, Khartoum, Sudan
Emirates College of Technology, Faculty of Computer Studies IUA, Khartoum, Sudan

Abstract -
Loading a document, an image, a voice recording, or a video on the Internet can cause jamming signals and overload on the network traffic and performance. These happen as a result of the speedy growth of the browsing web site pages. Web caching policies are popular techniques that have played a key role in improving performance by increasing the hit ratio. There are more web cache policies that are used to solve the problems and increase the performance of the internet like web cache replacement techniques. This paper highlights some of the policies and compares them, using the hit ratio, performance matrix, latency time and byte hit ratio.
 Index Terms - Intelligent Caching, Proxy Cache, Removable Policies, Web Caching Performance, Hit Ratio, Byte Hite Ratio and Latency Time