Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sood, Manu
- Gender based Analysis of using Virtual Learning Environment
Abstract Views :199 |
PDF Views:0
Authors
Virender Singh
1,
Manu Sood
2
Affiliations
1 Department of Information Technology, GGDSD College, Sector-32, Chandigarh - 160030, Punjab, IN
2 Department of Computer Science, Himachal Pradesh University, Summer Hill, Shimla - 171005, Himachal Pradesh, IN
1 Department of Information Technology, GGDSD College, Sector-32, Chandigarh - 160030, Punjab, IN
2 Department of Computer Science, Himachal Pradesh University, Summer Hill, Shimla - 171005, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: To perform a gender analysis on the usage of Virtual Learning Environment (VLE) of simulation based e-learning in the field of Software Engineering in specific reference to the dynamic complexity, a modeling framework for Software Engineering Simulation based e-Learning Environment (SESeLE) tool is needed and has been proposed. Method/Statistical Analysis: A questionnaire based survey has been carried out twice on the learners enrolled in Computers and Information Technology based courses at tertiary levels in and around the city of Chandigarh in north India. The learners were provided an interactive single-learner environment of the SESeLE which was accessible through the internet by using a standard web-browser. In all, 392 students of tertiary level were included as subjects and were made to respond twice on the issues like their practical knowledge of software handling, interest and knowledge in software project management and impact of e-learning on their knowledge in software project management through questionnaire survey. The questionnaire was first got filled up from the subjects without any exposure to the SESeLE and subsequently after a training session on the SESeLE. ANOVA test was performed to find out the significant differences in various learning styles on post-training test scores overall and in both male and female students as well. Findings: This study is unique and one of its own kind. It has been used to analyse the impact of using VLE tools by the learners/students on their learning and also for the gender analysis on various parameters. The web based learning style has been found to be the most preferred learning style among female students and the second most preferred style of learning among male students. Reading textbooks was not significantly popular among female students as compared to male students. About half of the students agreed to participate in any kind of seminar on software project management. The post-training test score on the knowledge about typical patterns observed in software project management issues has been found to be significantly higher from pre-training test scores. No significant difference has been found among the average response of the male and female students on all issues related to their Interest in Software Project Management. The post-training test scores of male and female students on both the issues of simple and difficult software project management were significantly different; the pre- and post-training test scores of the students on both the issues were different significantly; and lastly, significant difference was found between the post-training test scores on both the issues among students categorized according to their preferred choice of learning. Application/Improvements: It will be interesting to evaluate, in future, the effectiveness of SESeLE for the learners.Keywords
ANOVA, Gender Analysis, Impact of Learning Styles, SESeLE, Virtual Learning Environment.- Software Defined Networks (S.D.N): Experimentation with Mininet Topologies
Abstract Views :198 |
PDF Views:0
Authors
Deepak Kumar
1,
Manu Sood
1
Affiliations
1 Department of Computer Science, Himachal Pradesh University, Summer Hill, Shimla – 171005, Himachal Pradesh, IN
1 Department of Computer Science, Himachal Pradesh University, Summer Hill, Shimla – 171005, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Traditional networks were complex and difficult to manage. S.D.N is the future of programmable networks. Our objective is to find out how host communicates in realistic networking environment. Methods/Statistical Analysis: In order to find out how actual network works. We have used an emulator i.e. mininet. We have compared various mininet topologies. Finally we have used one of the topology to find out how host communicate in mininet environment. We have made one of host as the server and other may serve as a clients. Client host will request to the server to download particular. We have used the wget linux feature to make this possible. Findings: Today S.D.N has become an important part of networking. So it is important to emulate its behaviour. Mininet provides us with the inbuilt hosts, switches and controller. Each of these hosts assigned with unique IP address. Each host also corresponds to xterm display option. We can use these xterm display to make particular host as a server. Similarly we can use other xterm display for client hosts to connect to the server through wget commands. Our finding are novel because this works has not been done before. The works we have done shows that how client request and how server respond. When request is made by client to download particular file. One of the advantage of using emulator is that, application that works on emulator can be easily deployable in realistic networks. As S.D.N is a new platform so it enable the chances for the innovation of new research. As each past work helps us to make further research. So this work also benefit other researcher somewhere. Application/ Improvements: We can make use of S.D.N in various areas like in campus area, Labs, cellular networks etc. There is always a chance of improvement and betterment, as S.D.N is new paradigm so chances of improvement are much more. As there are risk of security. So there are wide areas of improvements.Keywords
Mininet, OpenFlow, Openvswitch, SDN, Virtualization.- A Vampire Act of Sybil Attack on the Highest Node Degree Clustering in Mobile Ad Hoc Networks
Abstract Views :146 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering & Information Technology, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, IN
1 Department of Computer Science and Engineering & Information Technology, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objective: This paper aims at analyzing the devastating effect of Sybil attack in Mobile Ad hoc NETworks (MANETs) that use the Highest Node Degree based Clustering scheme for routing. Method/Analysis: A Sybil attack can disrupt the highest node degree based clustering scheme in MANETs by impersonating the identity of a legitimate node. An attacker will put all its efforts in forcibly electing its prey node as the leader of a cluster. In making its mission successful, an attacker uses a number of ghost identities to interact with the prey node, and hence increasing the connectivity of that prey node. It can achieve this by allowing its multiple Sybil nodes to communicate directly with a legitimate prey node. In other words, all the Sybil nodes contribute to increase the node degree of a particular prey node, so as to make it a cluster head. The Sybil attack can play the same trick on the same prey node in every cluster formation process by following the direction and movement the prey node. After making this prey node as a cluster head the multiple Sybil nodes can start sucking its battery by communicating with the bogus messages. Once the battery of the prey node is drained completely, the Sybil attacker can impersonate its identity to further disrupt the network system. Findings: We have used Java language to simulate the vampire act of Sybil attack in MANETs. All the results obtained from the experiments prove that a Sybil attack succeeded with high probability, in forcibly re-electing the same prey node as a leader of the cluster. Novelty: The vampire act of Sybil attack on the maximum connectivity based clustering is shown for the first time in this paper.Keywords
Highest Node Degree Clustering, Malicious Device, Mobile Ad Hoc Network, Sybil Attack, Sybil Node.- Is SDN the Real Solution to Security Threats in Networks? A Security Update on Various SDN Models
Abstract Views :149 |
PDF Views:0
Authors
Naveen Bindra
1,
Manu Sood
1
Affiliations
1 Department of Computer Science, Himachal Pradesh University, Summer Hill Shimla, Himachal Pradesh, IN
1 Department of Computer Science, Himachal Pradesh University, Summer Hill Shimla, Himachal Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: The concept of Software Defined Networks (SDNs) has changed the way the traditional networks used to function. The security mechanisms for these SDNs are evolving very fast. The objective of this paper is to evaluate existing significant security mechanism and to propose an inclusive secure architecture for this new generation networking. Method/Statistical Analysis: Network security requires a laser focused approach to tackle ever increasing vulnerabilities/threat perceptions. With significant advances in Software Defined Networks (SDNs) research, a number of network threat mitigation mechanisms have been proposed by the researchers. The authors have evaluated these security solutions along the three important dimensions namely area of focus, mitigation solutions and drawbacks. Findings: This paper has attempted to highlight the prevalent threat mitigation strategies, their strong point features and limitations for adoption of a mitigation strategy for corresponding SDN model (s). The study divulges that no single model can tackle all the prevalent security issues and thus there is need to develop a model which can tackle most, if not all security issues. This analysis has helped the authors to propose a generalized rational security model for SDNs. Application/Improvements: This paper intends to initiate a debate in the community of researchers and academicians, to build a consensus on the must have security ingredients of an inclusive SDN architecture. These must-ingredients can become basis of an inclusive SDN model.Keywords
SDN, SDN Model, SDN Architecture, Security Ingredients, Security Threats.- SDN in SCADA Based System for Power Utilities: A Case Study of Himachal Pradesh State Electricity Board Limited SCADA System
Abstract Views :157 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Himachal Pradesh University, Shimla, IN
1 Department of Computer Science, Himachal Pradesh University, Shimla, IN