Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Shoaib, Umar
- Cloud based E-Learning, Security Threats and Security Measures
Abstract Views :150 |
PDF Views:0
Authors
Affiliations
1 Faculty of Computing and Information Technology, University of Gujrat, Gujrat - 50700, PK
2 Department of Chemical Engineering and Technology, University of Gujrat, Gujrat - 50700,, PK
1 Faculty of Computing and Information Technology, University of Gujrat, Gujrat - 50700, PK
2 Department of Chemical Engineering and Technology, University of Gujrat, Gujrat - 50700,, PK
Source
Indian Journal of Science and Technology, Vol 9, No 48 (2016), Pagination:Abstract
Objective: The purpose of this paper is to rectify the aspects that leads the acceptance of cloud based E-learning services and why it is plagued by security issues despite its numerous advantages and find out the possible solutions to the problems. So this study highlights the security threats with cloud based e-learning and the precaution acquired recently on those problems. Method: This paper used both theoretical and empirical studies. Empirical study is done by the information congregated using numerous cloud based e-learning solution vendors websites. On the other hand, theoretical study is made by examining several research articles linked to our theme areas. Based on this analysis it identify different security threats in cloud service delivery model through the object to recommend a solution in the procedure of security measures related to the cloud based e-learning. Projected practice certifies data availability and offers solution to secure essential data from the invaders. Findings: The project edupshot of this study is to highlight the vital security threats and concerns occupied on when executing the cloud computing for e-learning systems. We do attempt to exploit the security concerns that e-learners and the end-users of cloud based e-learning solutions desire to acquire it from the cloud based e-learning solution vendors. This study finds diverse security issues in cloud service by an object to advocate a resolution in the form of security dealings linked to the cloud based e-learning. Traditional E-Learning approaches are merged with cloud computing technology to give enormous benefits to the academic users but it compromises on security facets. This study of E-Learning advocate’s users to acquire the data in the cloud via a secured layer using the internet. Cloud based E-Learning is a way to lessen cost and density of data retrieving, which are handled by third party services. Improvements: The study does not explore negative aspects that may deject acceptance of cloud-based services. However, we have just discussed cloud computing and its service and have presented ways by which the present security issues in cloud computing can be resolved.Keywords
Cloud Service, Data Availability, Measures, Security Risk, Solution, Threats.- A Recommendation System for Cloud Services Selection based on Intelligent Agents
Abstract Views :239 |
PDF Views:0
Authors
Affiliations
1 Faculty of Computer Science and IT, University of Gujrat, PK
1 Faculty of Computer Science and IT, University of Gujrat, PK
Source
Indian Journal of Science and Technology, Vol 11, No 9 (2018), Pagination:Abstract
Objectives: To provide a recommendation system for cloud services selection based on intelligent agents. Methods/ Statistical Analysis: There have been many assortments of research, frameworks, and systems that discussed in many kinds of literature for selection of most advantageous service to fulfill the requirements of consumers. QoS parameters in addition to cloud service related QoS parameters have been used, but an agent-based cloud computing system has been introduced now that facilitate the CSS for better usage and service for the consumer. In this study, we proposed a service selector system on computer trust merit of the cloud purveyor. In previous studies, the authors had used the QoS model to solve the problem of cloud service vendor selection in multidimensional technique but this was not practically approachable. But we implement the multi-agent system (MAS) approach where one agent is liable to intermingle with the client for unambiguous service. MAS have very supple and self-directed nature, due to this quality MAS is the very authentic approach for users. Findings: In this proposal a selection and recommendation methodology implemented using multi-agents paradigm, has been proposed that recommends the most aspirant service from similar grouped services. The experimental output confirms that the proposed methodology can effectively select an optimal required service for end users. Cloud computing system with the help of multi-agents offer better agent-based intelligent cloud solutions for complex computational tasks. Application/Improvements: Multi-agents can be employed as key components for the selection and recommendation of intelligent cloud applications, making cloud infrastructure more autonomous, adaptive, and flexible in resources management, services provisioning and in running large-scale applications.Keywords
Cloud Service Selection, Intelligent Agents, MAS- Analysis of Query Optimization Components in Distributed Database
Abstract Views :191 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Faculty of Computing and Information Technology, University of Gujrat, Gujrat, Punjab, PK
2 Department of Computer Science, Faculty of Computing and Information Technology, University of Gujrat, Gujrat, Punjab
1 Department of Information Technology, Faculty of Computing and Information Technology, University of Gujrat, Gujrat, Punjab, PK
2 Department of Computer Science, Faculty of Computing and Information Technology, University of Gujrat, Gujrat, Punjab
Source
Indian Journal of Science and Technology, Vol 11, No 18 (2018), Pagination:Abstract
Objectives: This paper brings to light different query optimization components and their optimizing functionalities which are helpful to improve the response time of query and the efficiency of distributed database. A cache based optimization is also analyzed to highlight the query optimization process. Methods: As data is the most valuable asset for any organization due to this they want to get access and use it efficiently and in a timely manner. To evaluate the efficiency of query optimization its different components e.g. search space, search strategy and cost model are evaluated with the help of examples, tables and diagrams. By comparing the different results, a cache based optimization technique is also evaluated. Findings: It is observed that in search space generated plans are equivalent in the sense they provide same results but their operation, implementation and performance is different. Different algorithms of search strategy are also examined to get the quicker and accurate results and notice that movement of search strategy is greatly depend upon join ordering and cost model. It is also observed that the cost model is helpful to select the best query execution plan but it depends upon the different parameters for example queue length, sever distance, server capacity and load. The latest cache based query optimization technique is also examined and noted that it is key to improve the response time of query as its computational cost is very low. It will be more helpful if it is placed at each site. Applications and Future Improvements: Currently cache based query optimization is applicable only for homogeneous distributed databases. In future this technique can also be implemented for heterogeneous type of databases.Keywords
Distributed Database, Query Processing, Query Optimization, Search Space, Search Strategy, Cost Model, Centralized Database, Cache- Ergonomics Estimation and Dimensions of ATM Usage in Pakistan
Abstract Views :218 |
PDF Views:0
Authors
Affiliations
1 Hafiz Hayyat Campus, University of Gujrat, Jalalpur Jattan Road, Gujrat, PK
1 Hafiz Hayyat Campus, University of Gujrat, Jalalpur Jattan Road, Gujrat, PK
Source
Indian Journal of Science and Technology, Vol 11, No 24 (2018), Pagination: 1-11Abstract
Objectives: Currently different models with different dimensions of Automated Teller Machine installed in Pakistan. This research finds problems in existing ATM’s dimensions and their suitability will be evaluated by applying ergonomics principles on anthropometric measurement of Pakistan population. Methods/Statistical Analysis: We measured the different dimensions of ATMs used in Pakistan and anthropometric measurements of Pakistani people. We will consider the neutral and awkward postures of elbow, shoulder, wrist, spine, neck and back. The last step is to compare the ATM machine’s dimensions used in Pakistan and anthropometric measurement of people of Pakistan, apply ergonomic rules in order to reduce the gap between ATM users of Pakistan and ATM machines used in Pakistan. Findings: By including all dimensions of ATM’s, anthropometric measurements, calculating mean and standard deviation we have come to know that there is a huge difference between dimensions of ATM’s currently used in Pakistan and dimensions that are recommended in this paper. This difference leads us to make a standard that is suitable especially for people of Pakistan. Application: It is strongly recommended to adopt this standard which is based on anthropometric measurements of Pakistani people.References
- Nuthan K, Nagarathna B, Nayaka S, Rathna V. An automated teller machine: literature review. International Journal of Novel Research in Computer Science and Software Engineering. 2015; 2(1):43–5.
- Meena R. Automated Teller Machine its benefits and challenges. International Journal of Commerce, Business and Management. 2015; 4(6):1–7.
- Zhang M, Wang F, Deng H, Yin J. A survey on human computer interaction technology for ATM. International Journal of Intelligent Engineering and Systems. 2013; 6(1):20–9. Crossref.
- Naseem Z, Saleem Y, Zagham S, Muhammad A, Shafiq M, Saleem M. Analysis of different ATM interfaces in Pakistan to minimize cognitive burden for interaction. Pakistan Journal of Science. 2013; 65(1):73–81.
- Thatcher A, Shaik F, Zimmerman C. Attitudes of semi-literate and literate bank account holders to the use of Automatic Teller Machines. International Journal of Industrial Ergonomics. 2005; 35(2):115–30. Crossref.
- Al-Saleh K, Bendak S. An ergonomics evaluation of certain ATM dimensions. International Journal of Occupational Safety and Ergonomics: JOSE. 2013; 19(3):347–53. Crossref. PMid:24034878
- Pheasant S, Christine MH. Body space: Anthropometry, ergonomics and the design of work. 3rd ed. London, UK: Taylor & Francis; 2005. p. 1–352.
- Banks offer only seven ATMs for 100,000 adults in Pakistan. Available from: https://www.pakistantoday.com.pk/2014/11/29/banks-offer-only-seven-atms-for-100000-adults-in-pakistan/
- Statistical look at payment system and retail banking of Pakistan for 2014-15. Available from: https://propakistani.pk/2015/09/07/statistical-look-at-payment-system-and-retail-banking-of-pakistan-for-2014-15/
- Nina M, Mohammad S. Factors of workplace environment that affect employee's performance: A case study of Miyazu Malaysia. International Journal of Independent Research and Studies. 2013; 2(2):66–78.
- Te-Hsin P, Kleiner B. New developments concerning the occupational safety and health act. Journal of Managerial Law. 2001; 43(1/2):138–46. Crossref.
- Valinejad M, Shakiba A, Rasoulijavaheri A. Ergonomics principles and utilizing it as a remedy for probable work related injuries in construction projects. International Journal of Advances in Engineering and Technology. 2013; 6(1):232–45.
- Ajala E. The influence of workplace environment on workers' welfare, performance and productivity. The African Symposium: An Online Journal of the African Educational Research Network. 2012; 12(1):141–9.
- Robertson M, Huang Y, Larson N. The relationship among computer work, environmental design, and musculoskeletal and visual discomfort: Examining the moderating role of supervisory relations and co-worker support. International Archives of Occupational and Environment Health. 2015; 89(7):22–67.
- Office ergonomics guideline. Queensland: Department of Education Training and Employment; 2013. p. 1–15.
- Britain G. Ergonomics and human factors at work: A brief guide. UK: Health and Safety Executive; 2014. p. 1–10.
- Ergonomics: The study of work. U.S. Department of Labour Occupational Safety and Health Administration (OSHA 3125); 2000. p. 1–14.
- Smith T. Occupational ergonomics: Principles and applications, (Manufacturing Systems Engineering Series); 1997. p. 1–452. PMCid:PMC2125555
- Hameed A, Amjad S. Impact of office design on employees' productivity: A case study of banking organizations of Abbottabad, Pakistan. Journal of Public Affairs, Administration and Management. 2009; 3(1):1–13.
- Nunes IL. FAST ERGO_X - A tool for ergonomic auditing and work-related musculoskeletal disorders prevention. Work. 2009; 34(2):133–48. PMid:20037227
- Average height for men by country. Available from: http://www.averageheight.co/average-male-height-by-country
- Average female height by country. Available from: www.averageheight.co/average-female-height-by-country
- Choi SD. Safety and ergonomic considerations for an aging workforce in the US construction industry. Work. 2009; 33(1):307–15.
- Moore S, Janet K, Lisa S. Practical demonstrations of ergonomic principles. Report of Investigations 9684. Department of Health and Human Services; 2011. p. 1–66.
- The forward head posture fix listed on its website about muscle that FIXES ugly forward head posture. Trouble Sleeping, Text Neck and Back Pain. Available from: http://forwardheadposturefix.com
- Workspace planner, find the right position for workstation components. Available from: http://www.chairlines.com/ergonomics-tips-tricks/ergotrons-workplace-planner/
- A Review on Customer Churn Prediction Data Mining Modeling Techniques
Abstract Views :199 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, University of Gujrat, PK
1 Department of Computer Science, University of Gujrat, PK
Source
Indian Journal of Science and Technology, Vol 11, No 27 (2018), Pagination: 1-7Abstract
Objectives: To find one of the best data mining techniques in telecommunication especially in customer churn prediction. Methods/Statistical Analysis: This paper presents a review of customer’s churn prediction in the telecommunication. The study shows a large number of attributes that are used to put into practice to develop customer churn prediction model by the large number of reviewer. These attributes are segmentation, account info, billing info, call dialup types, line-info, and payment info, and complain info, service provider info, and services info. In this study appropriate modeling techniques such as LR, NNM, DT, FL, CMC, SVM and DME are discussed for the churning purpose. Findings: The Review shows that to find customer churn prediction depends on the objectives of decision maker’s e.g. DT and SVM with a low ratio used, if interested in the true churn rate and false churn rate. The Logistic Regressions might be used if looking for the churn probability. DMEL modeling technique is impractical and ineffective for churn prediction on a large dataset with high dimension. Application/Improvements: The Technique proposed in this paper will overcome discussed issues and it will be applied on those customers who want to leave in near future and predict them based on some parameters.References
- Howard R, Idriss S, Amanat O. Research base for the high-level group report analysis on media. Alliance of Civilizations Secretariat, United Nations, New York; p. 1–35.
- Priya PI, Ghosh DK. A survey on different clustering algorithms in data mining technique. 2013; 3(1):267–74.
- Rey TD. The dow chemical company chip wells, SAS Institute Inc. Justin Kauhl, Tata Consultancy Services Using Data Mining in Forecasting Problems; 2013. p.1–85.
- Liao SH, Chu PH, Hsiao PY. Data mining techniques and applications. A decade review. Expert Systems with Applications. 2012; 39(12):11303–11. Crossref
- Yun L, Hangzhou. Fast Co-clustering Using Matrix Decomposition. IEEE. 2009; 2:201–4.
- Yang F, Sun F, Zhang C. An efficient hybrid data clustering method based on K-harmonic means and particle swarm optimization. Expert Systems with Applications. 2009; 36(6):9847–52. Crossref
- Cheng F, Tsai, Huang TW. QIDBSCAN a quick density based clustering technique idea. International Symposium on Computer. 2012; 3(1):1–322.
- Esfandani G, Mohsen S, Amin N. GDCLU: A new grid density based clustering algorithm; 2012. p. 102–7.
- Kaur AM, Kaur N. Review paper on clustering techniques. Global Journals Inc. (USA) Online. 2013; 13(5):1–7.
- Bhattacharya M. Telecom sector in India: Vision, IES (Deputy Director General (Finance), Department of Telecommunications, Ministry of Communications & IT, Government of India; 2020. p. 1–33.
- Rasmusson E. Complaints can build relationships. Sales and Marketing Management. 1999; 151(9):89–90.
- Athanassopoulos A. Customer satisfaction cues to support market segmentation and explain switching behavior. Journal of Business Research. 2000; 47(3):191–207. Crossref
- Bhattacharya C. When customers are members: Customer retention in paid membership contexts. Journal of the Academy of Marketing Science. 1998; 26(1):31–44. Crossref
- Colgate M, Stewart K, Kinsella R. Customer defection: A study of the student market in Ireland. International Journal of Bank Marketing. 1996; 14(3):23–29. Crossref
- Mizerski R. An attribution explanation of the disproportionate influence of unfavourable information. Journal of Consumer Research. 1982; 9:301–10. Crossref
- Stum D, Thiry A. Building customer loyalty. Training and Development Journal. 1991; 45(4):34–6.
- Reichheld F. Learning from customer defections. Harvard Business Review. 1996; 74(2):56–69.
- Zeithaml V, Berry L, Parasuraman A. The behavioural consequences of service quality. Journal of Marketing. 1996; 60(2):31–46. Crossref
- Paulin M, Perrien J, Ferguson R, Salazar A, Seruya L. Relational norms and client retention: External effectiveness of commercial banking in Canada and Mexico. International Journal of Bank Marketing. 1998; 16(1):24– 31. Crossref
- Ganesh J, Arnold M, Reynolds K. Understanding the customer base of service providers: An examination of the differences between switchers and stayers. Journal of Marketing. 2000; 64(3):65–87. Crossref
- Idris A, Rizwan M, Khan A. Churn prediction in telecom using Random Forest and PSO based data balancing in combination with various feature selection strategies. 2012; 38(6):1808–19.
- Verbeke W, Martens D, Mues C, Baesens B. Building comprehensible customer churn prediction models with advanced rule induction techniques. 2011; 38(3):2354–64.
- Chandrasekhar S. Predicting the Churn in Telecom Industry; 2015.
- Ondrus J, Pigneur Y. Coupling mobile payments and CRM in the retail industry; 2004. p. 1–8.
- Hung S, Yen DC, Wang H. Applying data mining to telecom churn management. Expert Systems with Applications. 2006; 31:515–24. Crossref
- den Poel VD, Lariviere B. Customer attrition analysis for financial services using proportional hazard models. European Journal of Operational Research. 2004; 157(1):196–217. Crossref
- Jhon H. A customer profiling methodology for churn prediction; 2008. p. 1–313.
- Seo D, Ranganathan C, Babad Y. Two-level model of customer retention in the US mobile telecommunications service market. Telecommunications Policy. In Press, Corrected Proof. 2008; 32(3):182–96.
- Gotovac S. Modeling data mining applications for prediction of prepaid churn in telecommunication services. 2010; 51(3):275–83.
- Kim, Yoon C. Determinants of subscriber churn and customer loyalty in the Korean mobile telephony market. Telecommunications Policy. 2004; 28(9):751–65. Crossref
- Huang B, Kechadi MT, Buckley B. Customer churn prediction in telecommunications School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4, Ireland. 2012; 39:1414–25.
- lazarove V, Churn MC. prediction business analytics course. Tum Computer Science; 2007. p. 104–212.
- Coussement K, Van D, Poel D. Churn prediction in subscription services an application of support vector machines while comparing two parameter selection techniques. Expert Systems with Applications. 2008; 34:313–27. Crossref
- Kaur M, Mahajan P, Churn Prediction in telecom industry using R. International Journal of Engineering and Technical Research. 2015; 3(5):46–53.
- Georges D, Olle O, Cai S. A hybrid churn prediction model in mobile telecommunication industry. International Journal of e-Education, e-Business, e-Management and eLearning. 2014; 4(1):55–62.
- Hassouna M. Agent based modelling and simulation: An examination of customer retention in the UK mobile market; 2012. p. 1–173.
- Behara R, Fisher W, Lemmink J. Modelling and evaluating service quality measurement using neural networks. International Journal of Operations and Production Management. 2002; 22(10):1162–185. Crossref
- Chan C, Yao X. A novel evolutionary data mining algorithm with applications to churn prediction. 2003; 7(6):532–45.
- Vercellis C. Business Intelligence Data Mining and Optimization for Decision Making. Wiley; 2009. p. 1–420.
- Langley P, Iba W, Thompson K. An analysis of Bayesian classifiers. AAAI’92 Proceedings of the tenth national conference on Artificial intelligence; 1992. p. 223–8.
- Muata K, Bryson O. Evaluation of decision trees a multi criteria approach. Computers and Operational Research. 2004; 31:1933–45. Crossref
- Boser B, Guyon I, Vapnik V. A training algorithm for optimal margin classifiers. In Proceedings the 5th annual ACM workshop on computational learning theory Pittsburgh, PA: ACM Press; 1992. p. 144–52. Crossref
- Burges CJC. A tutorial on support vector machines for pattern recognition.1998; 2:121–67.
- Data Mining and Knowledge Discovery. Springer. 1997; 2(2):121–67.
- Selvi O. Traffic accident predictions based on fuzzy logic approach for safer urban environments. Case Study: Izmir Metropolitan Area; 2009. p. 1–131.
- Au W, Chan C, Yao X. A novel evolutionary data mining algorithm with applications to churn prediction. IEEE Transactions on Evolutionary Computation. 2003; 7:532–45. Crossref
- Dorigo M, Stützle T. Ant colony optimization. Cambridg. MA: MIT Press; 2004. p. 1–321.
- Dorigo M, Maniezzo V, Colorni A. Ant system optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man, and Cybernetics Part B Cybernetics. 1996; 26(1):29–41. Crossref. PMid:18263004
- Lariviere B, Van D, Poel, D. Predicting customer retention and profitability by using random forest and regression forest techniques. Expert Systems with Applications. 2005; 29(2):472–84. Crossref
- Vanthienen J, Mues C, Wets G, Delaere K. A tool-supported approach to inter-tabular verification. Expert Systems with Application.1998; 15(3):277–85. Crossref
- Babu S, Ananthanarayanan NR, Ramesh V. A survey on factors impacting churn in telecommunication using data mininig techniques. International Journal of Engineering Research and Technology. 2014; 3(3):1745–8.
- Abraham A, Ramos V. Web usage mining using artificial ant colony clustering. Congress on Evolutionary Computation; 2003. p. 1384–91. Crossref
- Handl J, Knowles J, Dorigo M. Ant-based clustering and topographic mapping. Artificial Life. 2006; 12(1)35–61. Crossref. PMid:16393450
- Churi A, Mayuri D, Sonal D, Prajakta K. Analysis of customer churn in mobile industry using data mining. International Journal of Emerging Technology and Advanced Engineering. 2015; 5(3):2250–459.