Volume 6, Issue 2, February 2015

Detection and Avoidance Deadlock for Resource Allocation in Heterogeneous Distributed Platforms
Pages: 1-6 (6) | [Full Text] PDF (388K)
Ha Huy Cuong Nguyen and Van Son Le
Department of Information Technology, QuangNam University, Tam Ky City, Viet Nam
Department of Information Technology, Da Nang University of Education, Da Nang, Viet Nam

Abstract -
In a heterogeneous distributed platforms large problem is distribute among the processors (such as among the computers of distributed computing system or among the computers of parallel computing system etc.) to make it cost effective and less time consuming instead of a computer system with single processor. There are more general types of resource allocation problems than those we consider here. In this paper, we present an approach for improving detection and avoidance algorithm, to schedule the policies of resource supply for resource allocation on heterogeneous. We propose an algorithm for allocating multiple resources to competing services running in virtual machines platforms.
 Index Terms - Cloud Computing, Resource Allocation, Heterogeneous Distributed Platforms, Deadlock Detection and Avoidance Deadlock
Information Technology Models for Project Management of Education Development
Pages: 7-9 (3) | [Full Text] PDF (160K)
Olena Kryvoruchko, Yevgeniy Borodavka and Mykola Tsiutsiura
National University of Trade and Economy, Kyiv 02156, Ukraine
Kyiv National University of Construction and Architecture, Kyiv 03680, Ukraine

Abstract -
This article is dedicated to the problem of the information technology models development for the innovative projects management of the educational sector modernization and development. The problems, which arise at each stages of the project lifecycle, were considered. The stages of the modernization and IT development and implementation for the educational institution were distinguished. The conditions, which are describing readiness of the educational institution to providing modernization, restructuring and development, were given. The deductive and inductive approaches to problems solving are considered. Two types of the information technology models are presented: the model “as is” and the model “as should be”.
 Index Terms - The Modernization and Development Projects for the Educational Sector, Stages of the Modernization and Development of IT, Business Process, The Information Technology Models and Project Management of Education Development
Proposed C.E.M (Cost Estimation Metrics): Estimation of Cost of Quality in Software Testing
Pages: 10-14 (5) | [Full Text] PDF (339K)
Latika Kharb
Faculty of IT (MCA), Jagan Institute of Management Studies (JIMS), Sector-5, Rohini, Delhi, India

Abstract -
Reliability in software is produced by controlling its quality within budget. Over the time, researchers and practitioners have expressed their inability to accurately estimate costs associated with software development and it has become even more problematic as costs associated with development continue to increase. As a result, a lot of research attention is now directed towards gaining a better understanding of the software development process as well as evaluating software metrics for cost estimation in the process of software testing. An effective software testing cost measurement and/or evaluation technique requires a metrics that could not only increase the reliability, reusability, correctness and maintainability but also measures the quality and productivity of software development process within budget. Keeping this goal in mind, we’ve provided a set of three useful Cost Estimation Metrics (CEM) that could be effectively implemented to evaluate costs of testing the software products, for improvement in overall software product reliability, and also become one of the metrics used for the measurement of overall expenses incurred during the process of software testing and thus make way towards a reliable and quality oriented software system in recent future.
 Index Terms - Cost Estimation Metrics, Quality Improvements, Quality Software System, Quality within Budget and Quality Oriented Software System
New Methods for TVWS Database Protocol
Pages: 15-21 (7) | [Full Text] PDF (667K)
Mubark A. Elmubark, Rashid A. Saeed, Mohamed Awad Elshikh and Rania A. Mokhtar
Blue Nile University and Sudan University of Science and Technology (SUST), Sudan

Abstract -
In this paper, we study the authentication in the IEEE protocols (802.11-802.X1-802.11i-802.16e 802.22) and show the weakness and the problems that will arise when we use them and what efforts are done to overcome these problems. And also we analyze the database authentication. We find that IEEE 802.22 is the best protocol to use in the TVWS, because it is defined as the first wireless protocol for cognitive radio in WRAN. Finally, we explain the new idea to enhance this protocol to be more suitable in TVWS database authentication. This paper introduces new integrated security framework that ensures closing the gap between security sublayer at lower layers and upper layers at session layer and above. The new protocol is supported with all recommended functions from various standards.
 Index Terms - IEEE Standard, Security, Protocol and Geolocation Database
Enhanced Secure Model for Single Sign-On Across Open Cloud Federation
Pages: 22-26 (5) | [Full Text] PDF (506K)
Asif Iqbal, Haroon Ur Rashid and Muazzum Khattak
University of Malakand
CECOS University, KPK, Pakistan
NUST, Islamabad, Pakistan

Abstract -
Cloud computing enables users to get their resources on pay per-use basis using internet. There are many advantages of it but security is the main concern too. One powerful user-name password scheme shall far better than dozen ordinary ones. Remembering so many schemes is very difficult and Single Sign-On (SSO) is a way to solve this problem. This paper focuses on and extends the concept of SSO, to avail the services of not only Home cloud-Service-Provider (HSP), but also of Foreign cloud-Service-Provider (FSP), using credentials stored on the HSP site. A scenario is explored along with algorithm that will show this concept works to make users more efficient, by utilizing the services of HSP and different FSPs. This paper is an effort to remove the problems in Open Cloud Computing Federation that were mostly pointed out by Arvind D. Meniya et al. [3] through a new idea.
 Index Terms - Cloud Computing, Cloud Service Providers, Open Cloud Computing Federation, Single Sign On and Home Cloud Service Providers