Current Issue: June 2019, Volume 11, Number 3

 International Journal of Computer Science and Information Technology (IJCSIT)

 ISSN: 0975-3826(online); 0975-4660 (Print)  

http://airccse.org/journal/ijcsit.html 

Current Issue: June 2019, Volume 11, Number 3 — Table of Contents

 http://airccse.org/journal/ijcsit2019_curr.html

Swedish Student-Teachers In Digital Activities: Digital Competence Through Development-Oriented Thesis Projects

Peter Karlsudd

Department of Pedagogy and Learning, Linnaeus University, Kalmar, Sweden

Abstract

This article defines attempts using development-oriented thesis projects to increase teachers’ and pupils’ digital capability. To offer a more practice-oriented focus in the teacher education, the elementary school student-teachers were stimulated to participate in thesis projects with the purpose of developing the school events.Thirteen of the development-oriented thesis projects carried out during 2015-2018 involved testing the student-teacher’s ability to study and formulate the competence needs regarding digital learning at the practicum-school, as well as the results of carrying out activities for increasing the digital competence. The investigation is based on a review of completed thesis projects, process journals, and presentations and discussions in subsequent reports. An initial analysis of the thirteen development projects reveals two clear goal directions. One focus is on traditional knowledge goals and the other on more social goals. The outcomes clearly show that development-oriented thesis projects can be an effective way to increase the digital skills of teachers and pupils. Projects with distinct goals for collaboration and shared learning have reached further goal attainment than the projects focused more on discrete instruction and learning.When digital tools were used as a means to work with another area, for example, physical activity or democracy issues, the developed competence in digital skills became more pronounced and lasting. Digital competence is an important development area for school activities, and this study shows that development-oriented thesis projects can be an effective means toward a successful project.

Keywords

Development-oriented, Digital tools, Teacher education, Teacher training, Thesis projects

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit01.pdf

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html

REFERENCES

[1]        Riis, U. (2000). IT iskolanmellan vision ochpraktik: enforskningsöversikt [IT in school between vision and practice: A research overview]. Stockholm: Skolverket.

[2]        Karlsohn, T. (2009). Teknik – retorik – kritik: om IT-bubblanochdatoriseringenav den svenskaskolan [Technology – rhetoric – criticism: The IT-bubble and the digitalization of the Swedish school]. Stockholm: Carlsson.

[3]        Karlsson, L. (2015). Framgångsfaktorer i PIM – Praktisk IT- och mediekompetens. En enkät- och intervjustudie av Myndigheten för skolutvecklings- och Skolverkets fortbildningssatsning på ITkompetens för Sveriges pedagoger 2006 – 2014 [Successfactors in PIM – Practical IT – and mediaskills. A survey and interview study by the Authority for School Development and the Swedish National Agency for Education, In-service training of IT-skills for Swedish educators 2006-2014]. Magisteruppsats, Institutionen för Didaktik och Pedagogisk Profession. Göteborg: Göteborgsuniversitet.

[4]        Ahlbäck, T. (2018). Digitala skrivtavlor – till vad, hur och varför?: En studie om den digitala skrivtavlans betydelse för grundskolans digitalisering utifrån ett lärarperspektiv [Digital writing tablets – what, how and why?: A study on the digital writing tablet importance for elementary school digitalization based on a teacher perspective]. Doctoral Thesis. Växjö, Linnaeus University Press. 195.

[5]        Karlsudd, P. (2015). ICT and Learning in School. Journal of Emerging Trends in Computing and Information Sciences, 6(12), 677–684.

[6]        Wastiau, P., Blamire, R., Kearney, C., Quittre, V., Van de Gaer, E. &Monseur, C. (2013) The use of ICT in education: A survey of schools in Europe. European Journal of Education 48(1), 11–27.

[7]        Bebell, D., O’Dwyer, L.M., Russell, M. & Hoffmann, T. (2010). Concerns, Considerations, and New Ideas for Data Collection and Research in Educational Technology Studies. Journal of Research on Technology in Education, 43(1), 29–52.

[8]        Olofsson, A.D., Lindberg, O.J., Fransson, G. & Haugh, T.E. (2011). Uptake and Use of Digital Technologies in Primary and Secondary Schools: a Thematic Review of Research Uptake and Use of Digital Technologies in Primary and Secondary Schools: a Thematic Review of Research. Nordic Journal of Digital Literacy, 6(4), 207–225.

[9]        Aldunate, R. & Nussbaum, M. (2013). Teacher adoption of technology. Computers in Human Behavior, 29(3), 519–524.

[10]      Karlsudd, P. (2010). For benefit or oblivion?: From idea and vision to the implementation and support of Learning Applications. International Journal of Advanced Research in Computer Science. 1. 79– 89.

[11]      V. &Karlsudd, P. (2014). Learning by playing: Searching after a connection between computer games. Journal of Emerging Trends in Computing and Information Sciences. 5. 371–376.

[12] Vetenskapsrådet, 2017 Forskningsetiskaprinciperinomhumanistisk-samhällsvetenskapligforskning  [Principles of research ethics in Humanities and Social Sciences research]. Stockholm: Vetenskapsrådet.

[13]      Malmsten, L. & Hedlund, S. (2013). IKT på fritidshemmet – ett socialt och kulturellt fenomen [ICT in the leisure-time center – a social and culturalphenomenon]. Skolportens numrerade artikelserie för utvecklingsarbete i skolan. Artikelnummer 2/2013.

[14]      SOU (2015: 28) Gör Sverige i framtiden – digital kompetens [Make Sweden for the future – digital skills]. Delbetänkande av Digitaliseringskommissionen. Stockholm:

[15]      Hylén, J. (2013). Digitalisering i skolan [Elektronisk resurs]: en kunskapsöversikt [Digitalization in schools [Electronic resource]: A knowledgeoverview]. Stockholm: Ifous.

[16]      Oxstrand, B. (2013). Från media literacy till mediekunnighet: lärares uppfattning och förståelse av begreppen mediekunnighet och IKT i skolan och deras syn på medieundervisning [From media literacy to media proficiency: Teachers’ perceptions and understandingof the conceptof media proficiency and ICT in school and theirviewof media instruction]. LicentiatavhandlingGöteborg: Göteborgsuniversitet.

[17]      Håkansson Lindqvist, M. (2015). Conditions for technology enhanced learning and educational change: a case study of a 1:1 initiative. Diss. Umeå: Umeå University.

[18] Klerfelt, A. (2007). Barns multimedia laberättande: enlänkmellanmediakulturochpedagogiskpraktik [Children’s multimedia storytelling: A link between media culture and pedagogical practice]. Diss. (sammanfattning) Göteborg: Göteborgs universitet, 2007. Göteborg.

[19]      Karlsudd, P., Tågerud, Y. (2008). Bridging the Gap – Taking the Distance out of e-Learning. EJEL Electronic Journal of e-Learning. 6. 43-53

[20] Perselli, A.K. (2014). Fråndatasal till en-till-en:  Enstudieavlärareserfarenheteravdigitalaresurseriundervisningen [From computer room to one-on-one: A study of teachers’ experiences of digital resources in instruction]. Härnösand: Mittuniversitetet.

[21]      Willermark, S. (2018). Digital didaktisk design: Att utveckla undervisning i och för en digitaliserad skola [Digital didactic design: Developing instruction in and for a digitalizedschool]. Diss. (sammanfattning). 2018. Trollhättan: Högskolan Väst.

[22]      Blomgren, J. (2016). Den svårfångade motivationen: elever i en digitaliserad lärmiljö [Hard-tocapture motivation: pupils in a digitalizedlearningenvironment]. Diss. Göteborg: Göteborgsuniversitet (2016).

[23]      AngéliiGenlott, A. &Grönlund, Å. (2016). Closing the gaps – Improving literacy and mathematics by ICT-enhanced collaboration. Computers & Education, 99, 68–80.

[24]      Penuel, W.R. (2006). Implementation and effects of one-to-one computing initiatives: A research synthesis. Journal of Research on Technology in Education, 38(3), 329–348.

[25]      Lindstrand, P. &Brodin, J. (2006) ICT somenintegrerandelänkför barn ochunga med rörelsehinder [ICT as an integrating link for children and youths with physical disabilities]. Rapport nr 45, Teknik, Kommunikation & Handikapp. Stockholm: Lärarhögskolan i Stockholm.

[26]      Samuelsson, U. (2014). Digital (o)jämlikhet?: IKT-användning i skolan och elevers tekniska capital [Digital (in)equality?: ICT-use in school and pupils’ technologycapital]. Diss. Jönköping: Högskolan I Jönköping.

[27]      Ottenbreit-Leftwich, A T., Glazewski, K. D., Newby, T. J., &Ertmer, P. A. (2010). Teacher value beliefs associated with using technology: Addressing professional and student needs. Computers and Education, 55 (3), 1321-1335.

[28]      Karlsudd, P. (2018b). Cheating or legitimate support?: Student‐Teachers’ attitudes toward digital tools in school. Support for Learning. 33. 338-359.

[29]      Karlsudd, P., Dahl, M., Willén-Lundgren, B. (2017). Less tradition for more profession: an attempt with thesis projects in practical development. Problems of Education in the 21st Century. 75. 252– 262.

[30]      Högskoleverket. (2005). Utvärdering av den nya lärarutbildningen vid svenska universitet och högskolor, Del 1 [Evaluationof the new teachereducation program in Swedish universitiesand colleges, Part I]. Högskoleverketsrapportserie 2005:17R. Stockholm: Högskoleverket.

[31]      Reis-Jorge, J. (2007). Teacher’s conceptions of teacher-research and self-perceptions as enquiring practitioner: A longitudal case study. Teaching and Teacher Education, 23 (4), 402–417.

[32]      Gustafsson, C. (2008). Degree projects in higher education. In I. Mattsson, I Johansson & B. Sandström (Eds.), Examining praxis assessment and knowledge construction in teacher education 17– 34). Rotterdam: Sense.

[33]      Råde, A. (2014). Ett examensarbete för både yrke och akademi: en utmaning för lärarutbildningen [A thesisproject for both profession and academia: A challenge for teachereducation]. Högre utbildning, 4 (1), 19–34.

[34]      Casson, A. (2015). Högskolans ansvar: Principer för utveckling av den högre utbildningen [University responsibility: Principles for developmentofhighereducation]. London: Ubiquity Press.

[35]      Dyste, O. (2002). Professors as mediators of academic text cultures: An interview study with advisors and master degree students in three disciplines in a Norwegian university. Written Communication, 19 (4), 493–544.

[36]      Sköld, B. (2016). Samverkan och utbildningskvalitet [Cooperation and educationquality]. HELIX årsrapport 16:001. Linköping: Linköpings universitet.

[37]      Maslow, A.H. (1954). Motivation and Personality. New York: Harper & Brothers.

[38]      Piaget, J. (1959). The language and thought of the child. London: Routledge.

[39]      Utbildnings departementet. (2017a). Nationell digitaliseringsstrategi för skolväsendet [National digitalizationstrategy for the education system]. Dnr U2017/04119/S. Stockholm: NorstedtsJuridik AB. 

AUTHORS

Professor Peter Karlsudds (1958) research interests are centered on the fields of special needs education, flexible learning and teaching and learning in higher education. He took his doctorate in education at Lund University in 1999 with the thesis entitled ‘Children with intellectual disability in the integrated school-age care system’. He finished his doctoral thesis in informatics, ‘Support for learning? Possibilities and obstacles in learning applications, 2011. This thesis describes in a number of articles work with webbased learning applications and the difficulties of successfully implementing such applications and projects in organizations. 

Design and Implementation of a Raspberry-Pi Based Home Security and Fire Safety System

 Sajid M. Sheikh1, Modise K. Neisoand Fatma Ellouze3 

1,2Department of Electrical Engineering, Faculty of Engineering and Technology, University of Botswana, Gaborone, Botswana

3MIRACL Laboratory, Univeristy of Sfax, Airport Road, BP 1088, 3018 Sfax, Tunisia

Abstract

Fire alarms and building security systems are currently separate systems and are liable to monthly fees. Video recording for closed-circuit television (CCTV) is done locally subsequently requiring high storage space. Whenever there is a break-in, the footage records can be stolen consequently losing data. To address high data storage space, monthly premium subscriptions, cost of separate systems and data loss issues of the aforementioned systems, we design and implement a Raspberry-pi based fire and intrusion detection systems in this work. The system sends an SMS in the case of an intrusion or fire detection, and then records and uploads the surveillance videos. The system used a GSM modem for sending SMSs, a video, a PIR sensor to detect motion and a smoke or heat sensor to detect fire. The system is a low cost combined home security and fire detection Raspberry-pi system intended for home and small offices use.

Keywords

Raspberry-Pi, PIR, GSM, Security

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit02.pdf 

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html 

REFERENCES

[1] “Undetermined Fire Losses.” [Online]. Available: http://clmmag.theclm.org/home/article/Undetermined Fire Losses. [Accessed: 05-May-2019].

[2]        G. Gridling and B. Weiss, “Introduction to Microcontrollers,” 2007.

[3]     R. Zwelsoot, VOLUME 2 PROJECTS BOOK FROM THE MAKERS OF THE OFFICIAL RASPBERRY PI MAGAZINE of coding & creating 200 PAGES. Cambridge: Raspberry Pi (Trading) Ltd.

[4]     Karri Lehtonen, “What is system integration?” [Online]. Available: https://www.youredi.com/blog/what-is-system-integration. [Accessed: 12-Apr-2018].

[5]     “Republic of Botswana – Government portal,” 2011. [Online]. Available: http://www.gov.bw/en/Ministries–Authorities/Local-Authorities/Jwaneng-Town-Council/Tools-and-Services/Services/FIRE-DEPARTMENT/. [Accessed: 24-Aug-2018].

[6]     T. National Assembly of Botswana and  the C. Botswana Government Printer Exploitation right sin the are held by Juta Law with the approval of the Government of Botswana, “LAWS OF BOTSWANA.”

[7]     “Intrusion Detection System,” 2011. [Online]. Available: https://share-ng.sandia.gov/itc/assets/08_intrusion-detection.pdf. [Accessed: 15-Sep-2018].

[8]     “inel Security.” .

[9]     V. Shukla, G. K. Singh, and D. P. Shah, “Automatic Alert of Security Threat through Video Surveillance System,” no. November, 2015.

[10]   BSIA, “A Guide to Integrated Security Management Systems,” 2007.

[11]   K. Kumar, N. Sen, S. Azid, and U. Mehta, “A Fuzzy Decision in Smart Fire and Home Security System,” Procedia Comput. Sci., vol. 105, pp. 93–98, Jan. 2017.

[12]   “DVR vs. NVR – What’s the Difference? | Swann Security.” [Online]. Available: https://www.swann.com/blog/dvr-vs-nvr-whats-the-difference/. [Accessed: 18-Oct-2018].

[13]   “Claims explained.” [Online]. Available: http://understandinsurance.com.au/claims-explained. [Accessed: 01-Oct-2018].

[14]   M. Saifudaullah and B. Bahrudin, Development of Fire Alarm System using Raspberry Pi and Arduino Uno. .

[15]   S. S. Sheshai, “University of Nairobi Department of Electrical and Information Engineering Raspberry Pi Based Security System Prj Index 156,” 2016.

[16]   A. Pawar and V. M. Umale, “Internet of Things Based Home Security Using Raspberry Pi,” in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), 2018, pp. 1–6.

[17]   C. Lewis, “Fire and security products 2016,” 2016. [Online]. Available: https://www.chrislewis.co.uk/fireandsecurity/wp-content/uploads/sites/2/2016/04/The-real-benefits-of-fire-and-security-integration.pdf. [Accessed: 03-Apr-2019].

[18]   P. G. Smith, “Fire-detection and alarm systems,” Wiring Install. Supplies, vol. 1977, no. 3, p. 9, 2010.

[19]   “Smoke Alarms – UK Fire Service Resources.” [Online]. Available: https://www.fireservice.co.uk/safety/smoke-alarms/. [Accessed: 05-May-2019].

[20]   S. Monk, Raspberry Pi Cookbook. 2016.

[21]   A. Industries, “PIR motion sensor,” US Pat. 7,579,595, 2009.

[22]   Waveshare, “MQ-135 Gas Sensor User Manual.” [Online]. Available: https://www.robotshop.com/media/files/pdf/MQ-135-Gas-Sensor-UserManual.pdf. [Accessed: 05-May-2019].

[23]   Components101, “MQ-135 Gas Sensor Pinout, Features, Alternatives, Datasheet & Uses Guide,” 2018. [Online]. Available: https://components101.com/sensors/mq135-gas-sensor-for-air-quality. [Accessed: 05-May-2019].

[24]   “DHT11 Sensor Pinout, Features, Equivalents & Datasheet.” [Online]. Available: https://components101.com/dht11-temperature-sensor. [Accessed: 05-May-2019].

[25]   “Insight – Working Principle of Piezo Buzzer | How Piezo Buzzer works.” [Online]. Available: https://www.engineersgarage.com/insight/how-piezo-buzzer-works. [Accessed: 05-May-2019].

[26]   “OwnCloud on Raspberry Pi.” [Online]. Available: https://eltechs.com/owncloud-on-raspberry-pi/. [Accessed: 05-May-2019].

[27] “What is a GSM Modem? | NowSMS.” [Online]. Available: https://www.nowsms.com/faq/what-is-a-gsm-modem. [Accessed: 05-May-2019].

Authors            

Dr. Sajid M. Sheikh is an academic, researcher and consultant. He is currently a Senior Lecturer in the Department of Electrical Engineering, Faculty of Engineering and Technology, University of Botswana. He is also the MSc Coordinator in the Department of Electrical Engineering, Faculty of Engineering and Technology, University of Botswana, Cisco Instructor at the UB-FET Cisco Academy at University of Botswana and IEEE Secretariat for the Botswana IEEE Subsection.  Dr. S. M. Sheikh holds qualifications of PhD in Electrical Engineering from University of Stellenbosch (South Africa), MSc in Electronic Systems Engineering from the University of Botswana, BEng  in Electrical and Electronic from the University of Botswana, CCNA 1, 2, 3 and 4 Instructor qualification Courses from University of Botswana Cisco Academy, IT Essentials Instructor qualification Course from Sci-Bono ICT Academy in New Town, Johannesburg and IT Essentials Instructor Training Qualification from the Networking Academy Instructor Trainer Cisco Systems (South Africa), South Africa. He also holds professional memberships of Institute of Electrical and Electronic Engineers (IEEE) as a Senior Member and Botswana Institute of Engineers (BIE) as a member. He is a registered Professional Engineer (PrEng) with Engineering Registration Board (ERB) (Botswana) in the discipline of Electrical and Electronic Engineering. He is also an accredited Assessor with Botswana Qualifications Authority.  He is an author of many international journal papers, international peer reviewed conference papers and book chapters. He has been / is the reviewer of many international conferences such as IEEE AFRICON 2017; International Conference on Information Society and Smart Cities (ISC 2018); International Conference on Mobile Systems and Pervasive Computing (MobiSPC-2017, 2018); Southern Africa Telecommunication Networks and Applications Conference (SATNAC) for 2017, 2018 and 2019 and so on.

Mr. Modise K Neiso is a final year student in the BENG Electrical and Electronic Engineering at the University of Botswana. His strong areas are in digital communications, computer networking and digital systems design engineering applications. His research interests are in Internet of Things, precisely Smart Homes is my interest.

Dr, Fatma Ellouze recieved her PhD in Computer Science from the Faculty of Economics and Management of the University of Sfax, Tunisia, in September 2018. She is a member of the Multimedia, Information systems and Advanced Computing Laboratory, since 2013. Her current research interests include Business process management, Process modeling, Context Modeling, Ontologies and Information systems.

An Approach To Extracting Distributed Data From The Integrated Environment Of Web Technologies Based On Set Theory

 Cheikh Ould El Mabrouk and Karim Konaté

 Department of Mathematics and Computing, University Cheikh Anta DIOP,

Dakar – Senegal

Abstract

The composition and extraction of the information distributed by the different web technologies allow a design of a multifunction imported data environment. However, the problems of integration and communication between the heterogeneous data web always (lodges) on distributed servers.

In fact, Web technologies have been proposed to meet certain needs related to heterogeneous and distributed information systems for communicating and exchanging computerized data on the Web. Further more, web generations go through client-server communication (from a static, dynamic and semantic web human client) to server-server communication.

For this purpose, Web services are technology application integration by excellence across the Internet. They operate independently of the heterogeneities of the system components on which they are based and are weakly coupled software components interacting with each other.

This paper aims to achieve a management approach to extracting and modeling distributed information based on set theory and calculate the execution time of a query to this distributed data

Keywords

Web Technologies, Data, Distribution, Integration, Modeling, Query, Optimization

 For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit03.pdf

 Volume Link: http://airccse.org/journal/ijcsit2019_curr.html

REFERENCES 

[1]     Nabil Ahmed Sultan, The Evolving Model for Software Delivery: The Case of Web   and Semantic Services International Journal of Web Services Practices, Vol. 3, No.1-2 (2008), pp. 57-65

[2]     Anderson, P. (2007). All That Glisters Is Not Gold’ — Web 2.0 And The Librarian. Journal of Librarianship and Information Science, 39 (4), 195–198.

[3]     Isaías, P., Miranda, P., & Pífano, S. (2009). Critical Success Factors for Web 2.0 – A Reference Framework. Heidelberg: Springer-Verlag Berlin.

[4]     Web 1.0 à Web 3.0 les étapes d’évolution, 2008, L’Atelier Informatique  –  Référencement – Création de sites http://www.atelier-informatique.org/internet/evolution-web-10-web-20-web-30/358/  

[5]     Macnamara, Jim (2010). University of Technology Sydney, Public communication practices in the Web 2.0-3.0 mediascape: The case for PRevolution. PRism 7(3): http://www.prismjournal.org

[6]     Le monde du web Gérard Savoie, 2010 http://gerardsavoie.ca/web.html

[7]     Laurence Allard, Revue MediaMorphoses n°21, septembre 2007, Armand Colin/INA Synthèses sur le Web 2.0

[8]     Sankar, K., & Bouchard, S. A. (2009). Enterprise Web 2.0 Fundamentals. Indianapolis: Cisco Systems, Inc,.

[9]     Boulakfouf, S., & Zampunieris, D. (2008). Integrating Web 2.0 Features into a Learning Management System. Paper presented at the 7th European Conference on e-Learning (ECEL’08), (pp. 127-133). Cyprus.

[10]   Myhill, M., Shoebridge, M., & Snook, L. (2009). Virtual research environments – A Web 2.0 cookbook? Library Hi Tech , 27 (2), 228-238.

[11]   Dwivedi, Yogesh; Williams, Michael; Mitra, Amit; Niranjan, Suraj; and Weerakkody, Vishanth, “Understanding advances in web technologies: evolution from web 2.0 to web 3.0” (2011). ECIS 2011 Proceedings. Paper 257.

[12]   Principles of Distributed Database Systems M. T. Ozsu and P. Valduriez.: Second Edition. Prentice Hall, 1999.

[13]   Techniques d’optimisation des requêtes dans les data warehouses Ladjel Bellatreche LISI/ENSMA, 2003

[14]   Optimisation de requêtes OLAP en entrepôts de données Approche basée sur la fragmentation génétique, El houssain ZIYATI, 2010

[15]   Pearson Education France – Optimisation des bases de données – Laurent Navarro, 2010 http://www.pearson.fr/resources/titles/27440100612040/extras/2412_chap06.pdf

[16]   Abdul Mateen, Basit Raza, Mian Muhammad Awais, Muhammad Sher Selection of the Best DBMS: A Fuzzy based Multi-objective Decision Making Approach, Proceedings of the International MultiConference of Engineers and Computer Scientists 2011 vol I IMECS 2011, March 16 – 18, Hong Kong

[17]   D. Litan, M. Velicanu, L. Copcea (Teohari), M. Teohari, A. M. Mocanu (Virgolici), I. Surugiu, and O. Raduta, Business’ New Requirement:Information Systems Integration – Methods and Technologies, INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS Issue 3, Volume 5, 2011

[18]   Inter systèmes Ensemble: Intégration pour l’entreprise en évolution rapide d’aujourd’hui, livre blanc, Sandra Rogers, IDC, Décembre 2003.

[19]   BARR Mohamed, BELLATRECHE Ladjel, Approche dirigée par les fourmis pour la fragmentation horizontale dans les entrepôts de données relationnels, Nature & Technologie, page, 16 – 24, 2012 https://www.univ-chlef.dz/revuenatec/art_06_02.pdf

[20]   Web Services in Distributed Information Systems: Availability, Performance and Composition; Zhao Xia, and al.,International Journal of Distributed Systems and Technologies, one (1), 1-16, January-March 2010 1

[21]   Erl T., “Service-Oriented Architecture – A Field Guide to Integrating XMLand Web Services“. Printice Hal., 2004.

[22]   A.M. LAW & W.D. KELTON, Simulation Modelling and Analysis. Edition Mac Graw Hill Book Company, 1999

[23]   FROM PLM TO ERP : A SOFTWARE SYSTEMS ENGINEERING INTEGRATION            Nafisa Osman1 and Abd-El-Kader Sahraoui    AlmedtechInc..and University SUST Khartoum, Sudan  2LAAS-CNRS, Université de Toulouse, UT2J, Toulouse, France International Journal of Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018

[24] DISTRIBUTED DBMS – DESIGN STRATEGIES HTTPS://WWW.TUTORIALSPOINT.COM/DISTRIBUTED_DBMS/DISTRIBUTED_DBMS_DESIGN_STRATEGIES.HTM

[25]   DATA WAREHOUSE AND BIG DATA INTEGRATION Sonia Ordoñez Salinas and Alba Consuelo Nieto Lemus Faculty of Engineering, Distrial F.J.C University, Bogotá, Colombia, International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April 2017

Comparative Analysis Of Fcfs, Sjn & Rr Job Scheduling Algorithms

Luhutyit Peter Damuut1 and Pam Bulus Dung2

                     1Computer Science Department, Kaduna State University, Nigeria;

2Computer Department, FCE Pankshin, Nigeria

Abstract 

One of the primary roles of the operating system is job scheduling. Oftentimes, what makes the difference between the performance of one operating system over the other could be the underlying implementation of its job scheduling algorithm. This paper therefore examines, under identical conditions and parameters, the comparative performances of First Come First Serve (FCFS), Shortest Job Next (SJN) and Round Robin (RR) scheduling algorithms. Simulation results presented in this paper serve to stimulate further research into the subject area.

Keywords

Scheduling; Task; Thread; Process; Algorithm; Operating Systems; Scheduling

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit04.pdf 

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html

REFERENCES

[1]   A. S. Tanenbaum, Modern Operating System, Pearson Education, Inc, 2009.

[2]   C. Sun, M. T. Wade, Y. Lee, J. S. Orcutt, L. Alloatti, M. S. Georgas, A. S. Waterman and M. B.R., “Single-chip Microprocessor That Communicates Directly Using Light,” Nature, p. 534, 2015.

[3]   A. Silberschatz, B. G. Peter and G. Greg, Operating System Concepts Essentials, John Wiley & Sons, Inc, 2014.

[4]   D. Dodge, A. Danko, S. Marineau-Mes, P. V. D. Veen, C. Burgess, T. Fletcher and B. Stecher, “Adaptive Partitioning for Operating System”. USA Patent 8,387,052, 26 February 2013.

[5]   S. Peter, J. Li, I. Zhang, D. R. Ports, D. Woos, A. Krishnamurthy, T. Anderson and T. Roscoe, “The Operating System is the Control Plane,” ACM Transactions on Computer Systems, p. 11, 2016.

[6]   M. A. Razzaque, M. Milojevic-Jevric, A. Palade and S. Clarke, “Middleware for Internet of Things: A Survey,” IEEE Internet of Things Journal, vol. 3, no. 1, pp. 70-95, 2016.

[7]   R. H. Arpaci-Dusseau and A. C. Arpaci-Dusseau, Operating Systems: Three Easy Pieces, Wisconsin: Arpaci-Dusseau Books, 2014.

[8]   N. B. Shah, K. Lee and K. Ramchandran, “When do Redundant Requests Reduce Latency?,” IEEE Transactions on Communications , pp. 715-722, 2016.

[9]   M.-A. Vasile, F. Pop, R.-I. Tutueanu, V. Cristea and J. Kołodziej, “Resource-aware Hybrid Scheduling Algorithm in Heterogeneous Distributed Computing,” Future Generation Computer Systems, pp. 61-71, 2015.

[10] B. Fataniya and M. Patel, “Survey on Different Method to Improve Performance of the Round Robin Scheduling Algorithm,” 2018.

Author

Luhutyit Peter Damuut received the B.Tech. degree in Computer Science from the Abubakar Tafawa Balewa University (ATBU), Bauchi, Nigeria, in 1999; M.Sc. degree in Computing from the Robert Gordon University (RGU), Aberdeen, UK, in 2004 and the Ph.D. degree in Computer Science from the University of Essex, UK in 2014, respectively. Currently, He is a Senior Lecturer at Kaduna State University (KASU) Nigeria. His teaching and research interests include computational intelligence, wireless sensor networks and mobile computing Dr. Damuut may be reached at luhutyit.damuutp@kasu.edu.ng.

Performance Evaluation Of Parallel Bubble Sort Algorithm On Supercomputer Iman1

Reem Saadeh and Mohammad Qatawneh

Department of Computer Science, King Abdullah II School for Information Technology, The University of Jordan, Amman, Jordan

Abstract

Parallel sorting algorithms order a set of elements USING MULTIPLE processors in order to enhance the performance of sequential sorting algorithms. In general, the performance of sorting algorithms are EVALUATED IN term of algorithm growth rate according to the input size. In this paper, the running time, parallel speedup and parallel efficiency OF PARALLEL bubble sort is evaluated and measured. Message Passing Interface (MPI) IS USED for implementing the parallel version of bubble sort and IMAN1 supercomputer is used to conduct the results. The evaluation results show that parallel bubble sort has better running time as the number of processors increases. On other hand, regarding parallel efficiency, parallel bubble sort algorithm is more efficient to be applied OVER SMALL number of processors.

Keywords

MPI, Parallel Bubble Sort, Parallel Efficiency, Speed Up. 

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit05.pdf

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html 

REFERENCES

[1]     A. I. Elnashar, (2011) “Parallel performance of mpi sorting algorithms on dual-core processor windows-based systems,” arXiv preprint arXiv:1105.6040.

[2]     M. Saadeh, H. Saadeh, and M. Qatawneh, “Performance evaluation of parallel sorting algorithms on iman1 supercomputer,” International Journal of Advanced Science and Technology, vol. 95, pp. 57–72, 2016.

[3]     M. Qatawneh, (2005) “Embedding linear array network into the tree-hypercube network,” European Journal of Scientific Research, vol. 10, no. 2, pp. 72–76.

[4]     N. Islam, M. S. Islam, M. Kashem, M. Islam, and M. Islam, (2009), “An empirical distributed matrix multiplication algorithm to reduce time complexity,” in Proceedings of the International Multi Conference of Engineers and Computer Scientists, vol. 2, pp. 18–20.

[5]     M. Qatawneh, (2011) “Multilayer hex-cells: a new class of hex-cell interconnection networks for massively parallel systems,” International journal of Communications, Network and System Sciences, vol. 4, no. 11, p.704.

[6]     M. Qatawneh, (2011) “Embedding binary tree and bus into hex-cell interconnection network,” Journal of American Sciences, vol. 7, no. 12, p. 0.

[7]     M. Qatawneh, (2016) “New efficient algorithm for mapping linear array into hex-cell network,” International Journal of Advanced Science and Technology, vol. 90, pp. 9–14.

[8]     M. Qatawneh, “Adaptive fault tolerant routing algorithm for tree hypercube multicomputer,” Journal of computer Science, vol. 2, no. 2, pp. 124–126, 2006.

[9]     M. Qatawneh, A. Alamoush ,J. Al Qatawneh, (2015)  “Section Based Hex-Cell Routing Algorithm (SBHCR),” International Journal of Computer Networks &Communications, vol. 7, no. 1, p. 167.

[10]   M. Qatawneh and H. Khattab, (2015), “New routing algorithm for hex-cell network,” International Journal of Future Generation Communication and Networking, vol. 8, no. 2, pp. 295–306.

[11]   N. Sismanis, N. Pitsianis, and X. Sun, (2012), “Parallel search of k-nearestneighbors with synchronous operations,” in 2012 IEEE Conference onHigh Performance Extreme Computing. IEEE, 2012, pp. 1–6.

[12]   Mm. Jiang and D. Crookes. (2006), “High-performance 3D median filter architecture for medical image despeckling”. Electronics Letters. 2006. 42(24): p. 1379-1380.

[13]   Kale V, Solomonik E. (2010), “Parallel sorting pattern. In Proceedings of the 2010 Workshop on Parallel Programming Patterns. p. 10. ACM.

[14]   Pasetto D, Akhriev A. (2011) “Parallel sorting pattern. In Proceedings of the 2010 Workshop on Parallel Programming Patterns.. p. 203-204. ACM.

[15]   M. Qatawneh, A. Sleit, W. Almobaideen. (2009), “Parallel Implementation of Polygon Clipping Using   Transputer”. American Journal of Applied Sciences 6 (2): 214-218, 2009.

[16]   O. Surakhi, M. Qatawneh, H. Al ofeishat, (2017), “A Parallel Genetic Algorithm for Maximum Flow problem”. International Journal of Advanced Computer Science and Applications, Vol. 8, No. 6, 2017.

[17]   S. Hijazi and M. Qatawneh. (2017), “Study of Performance Evaluation of Binary Search on Merge Sorted Array Using Different Strategies”. International Journal of Modern Education and Computer Science, 12, 1-8.

[18]   O. AbuAlghanam, M. Qatawneh, H.al Ofeishat, O. adwan, A. Huneiti.  (2017), “A New Parallel Matrix Multiplication Algorithm on Tree-Hypercube Network using IMAN1 Supercomputer”. International Journal of Advanced Computer Science and Applications, Vol. 8, No. 12, 2017.

[19]   M. Haj Qasem and M. Qatawneh, (2018), “Parallel matrix multiplication for business applications,” vol. 662, 01 pp. 24–36.

[20]   A. Bany Doumi and M. Qatawneh. PERFORMANCE EVALUATION OF PARALLEL INTERNATIONAL DATA ENCRYPTION ALGORITHM ON IMAN1 SUPER COMPUTER. International Journal of Network Security & Its Applications (IJNSA) Vol. 11, No.1, January 2019.

[21]   H. Harahsheh and M. Qatawneh. (2018), “Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer”. International Journal of Computer Applications, Vol. 179 (50).

[22]   A.Al-Shorman, M. Qatawneh. (2018), “Performance of Parallel RSA on IMAN1 Supercomputer”. International Journal of Computer Applications, Vol. 180 (37)

[23]   M. Asassfeh ,M. Qatawneh, F.AL-Azzeh. (2018), “PERFORMANCE EVALUATION OF BLOWFISH ALGORITHM ON SUPERCOMPUTER IMAN1”. International Journal of Computer Networks & Communications (IJCNC), Vol. 10 (2), 2018.

[24]   D. Purnomo, J. Marhaendro , A. Arinaldi, D. Priyantini, A. Wibisono, and A.  Febrian. (2016), “mplementation of Serial and Parallel Bubble Sort on FPGA.” Jurnal Ilmu Komputer dan Informasi 9, no. 2: 113-120.

[25]   Azzam Sleit, Wesam Almobaideen, Mohammad Qatawneh, and Heba Saadeh. “Efficient processing for binary submatrix matching”. American Journal of Applied Science, Vol. 6(1), 2008.

[26]   Wesam Almobaideen, Mohammad Qatawneh, Azzam Sleit, Imad Salah and Saleh Al-Sharaeh. “Efficient Mapping Scheme of Ring Topology onto Tree-Hypercubes”. Journal of Applied Sciences 7(18), 2007.

Author

Professor Mohammad Qatawneh is a Professor at computer science department, the University of Jordan. He received his Ph.D. in computer engineering from Kiev University in 1996 and his M.Sc. degree in computer engineering from University of Donetsk – USSR in 1988. His research interests include: Wireless network, parallel computing, embedding system Computer and network security, Routing protocols, Internet of Things, Blockchain and Security.

Intrusion Detection System Classification Using Different Machine Learning Algorithms On Kdd-99 And Nsl-Kdd Datasets – A Review Paper

 Ravipati Rama Devi1 and Munther Abualkibash2

 1Department of Computer Science, Eastern Michigan University,

Ypsilanti, Michigan, USA

2School of Information Security and Applied Computing, Eastern Michigan University, Ypsilanti, Michigan, USA

Abstract

Intrusion Detection System (IDS) has been an effective way to achieve higher security in detecting malicious activities for the past couple of years. Anomaly detection is an intrusion detection system. Current anomaly detection is often associated with high false alarm rates and only moderate accuracy and detection rates because it’s unable to detect all types of attacks correctly. An experiment is carried out to evaluate the performance of the different machine learning algorithms using KDD-99 Cup and NSL-KDD datasets. Results show which approach has performed better in term of accuracy, detection rate with reasonable false alarm rate.

Keywords

Intrusion Detection System,  KDD-99 cup, NSL-KDD, Machine learning algorithms.

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit06.pdf

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html                                               

 REFERENCES

[1] DARPA98 attack description and schedule,” https://www.ll.mit.edu/ideval/docs/attacks.html, 1998, retrieved December 15, 2016.

[2]   L. Breiman, J. H. Friedman, R. A. Olshen, and C. J. Stone, Classification and Regression Trees, 1984.

[3]   D. A. Cieslak and N. V. Chawla, “A framework for monitoring classifiers’ performance: when and why failure occurs? “Knowledge and Information Systems, vol. 18, no. 1, pp. 83–108, 2009.

[4]   M. Fugate and J. R. Gattiker, “Anomaly detection enhanced classification in computer intrusion detection,” in Pattern Recognition with Support Vector Machines, vol. 2388, 2002, pp. 186–197.

[5]   M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani, “A detailed analysis of the KDD CUP 99 data set,” in IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, 2009.

[6]   J. McHugh, “Testing Intrusion detection systems: a critique of the 1998and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory,” ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262–294, 2000.

[7]   S. Sung, A.H. Mukkamala. “ ”. In Proceedings of the Symposium on Applications and the Internet (SAINT), pp. 209–216. IEEE.

[8]   H. Kayacik, A. Zincir-Heywood and M. Heywood. “Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets”. In Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST). 2005.

[9]   C. Lee, S. Shin and J. Chung. “Network intrusion detection through genetic feature selection”. In Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), pp. 109–114. IEEE Computer Society,2006.

[10] H. Zhang and J.Su., “Naive Bayes for optimal ranking”, Journal of Experimental and Theoretical Artificial Intelligence. 2008, 20: 79-93.

[11] Z. Muda, W. Yassin, M.N. Sulaiman, N.I. Udzir, “Intrusion Detection based on K-Means Clustering and Naïve Bayes Classification” 2011 7thInternational Conference on IT in Asia (CITA)”.

[12] Weiming Hu, Steve Maybank, “AdaBoost-Based Algorithm for Network Intrusion Detection”. In IEEE transaction on systems, MAN, and CYBERNETICS, APRIL 2008.

Smart Motorcycle Helmet: Real-Time Crash Detection With Emergency Notification, Tracker And Anti-Theft System Using Internet-Of-Things Cloud Based Technology

 Marlon Intal Tayag1 and Maria Emmalyn Asuncion De Vigal Capuno2

 1College of Information and Communications Technology  Holy Angel University, Angeles, Philippines

2Faculty of Information Technology Future University, Khartoum, Sudan

Abstract

Buying a car entails a cost, not counting the day to day high price tag of gasoline. People are looking for viable means of transportation that is cost-effective and can move its way through traffic faster. In the Philippines, motorcycle was the answer to most people transportation needs. With the increasing number of a motorcycle rider in the Philippines safety is the utmost concern. Today technology plays a huge role on how this safety can be assured. We now see advances in connected devices. Devices can sense its surrounding through sensor attach to it.  With this in mind, this study focuses on the development of a wearable device named Smart Motorcycle Helmet or simply Smart Helmet, whose main objective is to help motorcycle rider in times of emergency. Utilizing sensors such as alcohol level detector, crash/impact sensor, Internet connection thru 3G, accelerometer, Short Message Service (SMS) and cloud computing infrastructure connected to a Raspberry Pi Zero-W and integrating a separate Arduino board for the anti-theft tracking module is used to develop the propose Internet-of Things (IoT) device.

Using quantitative method and descriptive type research, the researchers validated the results from the inputs of the participant who tested the smart helmet during the alpha and beta testing process.  Taking into account the ethical consideration of the volunteers, who will test the Smart Helmet. To ensure the reliability of the beta and alpha testing, ISO 25010 quality model was used for the assessment focusing on the device accuracy, efficiency and functionality. Based on the inputs and results gathered, the proposed Smart Helmet IoT device can be used as a tool in helping a motorcycle rider when an accident happens to inform the first-responder of the accident location and informing the family of the motorcycle rider.

Keywords

Smart Helmet, Internet of Things, Sensors, Real-Time Crash Detection, Emergency Notification, Tracker, Anti-Theft System Cloud Based Technology

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit07.pdf

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html

 REFERENCES

[1]     Mascarinas, E. M. (2016). Study in better safety measures for motorcycles urged – SUNSTAR. Retrieved December 11, 2018, from https://www.sunstar.com.ph/article/111646

[2]     L. Ramos. (2018). Road Accidents In The Philippines: Key Figures – eCompareMo – eCompareMo.Retrieved December 11, 2018, from https://www.ecomparemo.com/info/road-accidents-in-the-philippines-key-figures/

[3]     Nandu, R., & Singh, K. (2014). Smart Helmet for Two-Wheelers. Advances in Automobile Engineering, 03(01), 1–2. https://doi.org/10.4172/2167-7670.1000110

[4]     Sung, K.-M., Noble, J., Kim, S.-C., Jeon, H.-J., Kim, J.-Y., Do, H.-H., … Baek, K.-J. (2016). The Preventive Effect of Head Injury by Helmet Type in Motorcycle Crashes: A Rural Korean Single-Center Observational Study. BioMed Research International, 2016, 1–7. https://doi.org/10.1155/2016/1849134

[5]     J. Dodson. (n.d.). Motorcycle Crashes and Brain Injuries | Jim Dodson Law. Retrieved December 11, 2018, from https://www.jimdodsonlaw.com/library/motorcycle-crashes-and-brain-injuries.cfm

[6]     W. Tan. (2018). WHO PH: Over 90% of Motorcycle Deaths Didn’t Wear Helmets – Carmudi Philippines. Retrieved December 18, 2018, from https://www.carmudi.com.ph/journal/philippines-90-motorcycle-deaths-didnt-wear-helmets/

[7]     Lahausse, J. A., Fildes, B. N., Page, Y., & Fitzharris, M. P. (2008). The potential for automatic crash notification systems to reduce road fatalities. Annals of Advances in Automotive Medicine. Association for the Advancement of Automotive Medicine. Annual Scientific Conference, 52, 85–92. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/19026225

[8] M. Glasscoe. (n.d.). What is GPS? Retrieved December 11, 2018, from http://scecinfo.usc.edu/education/k12/learn/gps1.htm

[9]     Brodsky, H. (n.d.). Emergency Medical Service Rescue Time in Fatal Road Accidents. Retrieved from http://onlinepubs.trb.org/Onlinepubs/trr/1990/1270/1270-011.pdf

[10]   J. Porter. (2018). The History of IoT (Internet of Things) and How It’s Changed Today. Retrieved December 18, 2018, from https://www.techprevue.com/history-iot-changed-today/

[11]      Vishal, D., Afaque, H. S., Bhardawaj, H., & Ramesh, T. K. (2018). IoT-driven road safety system. International Conference on Electrical, Electronics, Communication Computer Technologies and Optimization Techniques, ICEECCOT 2017, 2018Janua, 862–866. https://doi.org/10.1109/ICEECCOT.2017.8284624

[12]      Dickenson. (2016). How IoT and machine learning can make our roads safer | TechCrunch. Retrieved December 18, 2018, from https://techcrunch.com/2016/07/13/how-iot-and-machine-learning-can-make-our-roads-safer/

[13] Faizan Manzoor, S. A. B. (2017). Faaz smart helmet, 6(6), 332–335.

[14] Hobby, K. C., Gowing, B., & Matt, D. P. (2016). Smart helmet, 5(3), 660–663.

[15]      Khaja, M., Aatif, A., & Manoj, A. (2017). Smart Helmet Based On IoT Technology, 5(Vii), 409–413.

[16] Motorcyclist age group and gender data – TAC – Transport Accident Commission. (n.d.). Retrieved April 20, 2019, from http://www.tac.vic.gov.au/road-safety/statistics/summaries/motorcycle-crash-data/motorcyclist-age-group-and-gender-data

[17]      Amir, G. (n.d.). Prototyping Model in Software Development and Testing. Retrieved January 22, 2019, from https://www.testingexcellence.com/prototyping-model-software-development/

[18]      The Importance of Alpha & Beta Testing Services | Software Testing Tips and Best Practices. (n.d.). Retrieved April 21, 2019, from https://blog.testmatick.com/2016/04/19/the-importance-of-alpha-beta-testing-services/

Authors

Dr. Marlon I. Tayag is a full-time Associate Professor at Holy Angel University and teaches Cyber Security subjects on Ethical Hacking and Forensic. He earned the degree of Doctor in Information Technology from St. Linus University in 2015 and is currently taking up Doctor of Philosophy in Computer Science at Technological Institute of the Philippines – Manila. Dr. Tayag is Cisco Certified Network Associate, 210-250 CCNA Understanding Cisco Cybersecurity Fundamentals and Fluke CCTTA – Certified Cabling Test Technician Associate. Microsoft Certified Professional and Microsoft Certified Educator.

Dr. Ma. Emmalyn A. V. Capuno is a currently the Dean of the Faculty of Information Technology of Future University Sudan with the academic rank of Associate Professor; a position she has been holding since 2009. She earned the degree of Doctor of Philosophy in Information Technology Management from Colegio de San Juan Letran – Calamba, Philippines in 2005. Her teaching and research expertise includes Operating Systems, Knowledge Management, Business Intelligence and many more.

A  Survey On Security Challenges Of Virtualization Technology In Cloud Computing

Nadiah M. Almutairy1 and Khalil H. A. Al-Shqeerat2

 1Computer Science Department, College of Sciences and Arts in Rass, Saudi Arabia

2Computer Science Department, Qassim University, Saudi Arabia

Abstract

Virtualization has become a widely and attractive employed technology in cloud computing environments. Sharing of a single physical machine between multiple isolated virtual machines leading to a more optimized hardware usage, as well as make the migration and management of a virtual system more efficiently than its physical counterpart. Virtualization is a fundamental technology in a cloud environment. However, the presence of an additional abstraction layer among software and hardware causes new security issues. Security issues related to virtualization technology have become a significant concern for organizations due to arising some new security challenges.

This paper aims to identify the main challenges and risks of virtualization in cloud computing environments. Furthermore, it focuses on some common virtual-related threats and attacks affect the security of cloud computing.

The survey was conducted to obtain the views of the cloud stakeholders on virtualization vulnerabilities, threats, and approaches that can be used to overcome them.

Finally, we propose recommendations for improving security, and mitigating risks encounter virtualization that necessary to adopt secure cloud computing.

Keywords

Cloud Computing, Virtualization, Security, Challenge, Risk

For More Details: http://aircconline.com/ijcsit/V11N3/11319ijcsit08.pdf

Volume Link: http://airccse.org/journal/ijcsit2019_curr.html

REFERENCES

[1]        B. Loganayagi and S. Sujatha, “Creating virtual platform for cloud computing,” in Proc. 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2010, pp. 1-4.

[2]        L. Garber, “The Challenges of Securing the Virtualized Environment,” Computer, vol. 45, no. 1, pp. 17-20, 2012.

[3]        Cloud Security Alliance, “Top threats to cloud computing V1.0,” CSA, 2010. [Online]. Available: https://cloudsecurityalliance.org/ topthreats/csathreats.v1.0.pdf. [Accessed: Nov.-2017].

[4]        Cloud Security Alliance,“The Notorious Nine. Cloud Computing Top Threats in 2013,” CSA, 2013. [Online]. Available: http://www.cloudsecurityalliance.org/topthreats.%5Cnhttp://www. cloudsecurityalliance.org. [Accessed: Oct.-2017].

[5]        G.Xiaopeng, W.Sumei, and C.Xianqin,“VNSS: A network security sandbox for virtual computing environment,” In Proc. 2010 IEEE Youth Conference on Information, Computing and Telecommunications, 2010, pp. 395–398.

[6]        N. Afshan,“Analysis and Assessment of the Vulnerabilities in Cloud Computing,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 2, 2017, pp. 2015–2018.

[7]        S. Bulusu and K, Sudia, “A Study on Cloud Computing Security Challenges,” Master thesis, School of Computing at Blekinge Institute of Technology, 2012.

[8]        H. Wu, Y. Ding, C. Winer, and L. Yao,“Network Security for Virtual Machine in Cloud Computing,” in Proc. 5th International Conference on Computer Sciences and Convergence Information Technology, 2009, pp. 18–21.

[9]        M. R. Anala, J. Shetty, and G. Shobha,“A frameIEEwork for secure live migration of virtual machines,” in Proc. Int. Conf. Adv. Comput. Commun. Informatics, ICACCI 2013, 2013, pp. 243–248.

[10]      A. Parashar and A. Borde, “Cloud Computing: Security Issues and its Detection Methods,” Int. J. of Engg. Sci. & Mgmt., vol. 5, no. 2, 2015, pp. 136–140.

[11]      J. Wei, X. Zhang, G. Ammons, V. Bala, and P. Ning,“Managing security of virtual machine images in a cloud environment,” in Proc. ACM workshop on Cloud computing security – CCSW ’09, 2009, p. 91.

[12]      Cloud Security Alliance, “Best Practices for Mitigating Risks in Virtualized Environments,” Downloads.cloudsecurityalliance.org, 2015. [Online]. Available: https://downloads.cloudsecurityalliance.org/whitepapers/Best_Practices_for%20_Mitigating_Risks _Virtual_Environments_April2015_4-1-15_GLM5.pdf. [Accessed: 11- Jan- 2017].

[13]      T. Garfinkel and M. Rosenblum,“When Virtual is Harder Than Real: Security Challenges in Virtual Machine Based Computing Environments,” in Proc. 10th Conf. Hot Top. Oper. Syst., 2005, pp. 20–25.

[14]      I. Studnia, E. Alata, Y. Deswarte, M. Kaâniche, and V. Nicomette, “Survey of Security Problems in Cloud Computing Virtual Machines,” in Proc. Computer and Electronics Security Applications Rendez-vous (C&ESAR), 2012, pp. 61–74.

[15]      Y. Azar, S. Kamara, I. Menache, M. Raykova, and B. Shepherd, “Co-Location-Resistant Clouds,” in Proc. 6th edition of the ACM Workshop on Cloud Computing Security, 2014, pp. 9-20.

[16]      V. Varadarajan, “Isolation in Public Clouds: Threats, Challenges and Defenses“, PhD thesis, University of Wisconsin–Madison, 2015.

[17]      I. Khalil, A. Khreishah, and M. Azeem,“Cloud Computing Security: A Survey,” Computers, vol. 3, no. 1, 2014, pp. 1–35.

[18]      Y. Xia, Y. Liu, H. Chen, and B. Zang, “Defending against VM rollback attack,” in Proc. IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012), 2012, pp. 1-5.

[19]      R.D. Londhe and S.S. Sherekar, “Imperial Analysis of Threats and Vulnerabilities in Cloud Computing,” International Journal of Advanced Research in Computer Science, vol. 5, no. 4 2014, pp. 12-17.

[20]      T. Brooks, C. Caicedo, and J. Park, “Security challenges and countermeasures for trusted virtualized computing environments,” In Proc. World Congress on Internet Security (WorldCIS-2012), 2012, pp. 117 – 122.

[21]      S. Luo, Z. Lin, X. Chen, Z. Yang, and J. Chen, “Virtualization security for cloud computing service,” in Proc. Int. Conf. Cloud Serv. Comput., 2011, pp. 174–179.

[22]      R. Schwarzkopf, (2015) “Virtual Machine Lifecycle Management in Grid and Cloud computing,” University of Marburg. [Online]. Available: http://archiv.ub.uni-marburg.de/diss/z2015/0407/pdf/ drs.pdf.  [Accessed: Aug.-2017].

[23]      V.K. Veeramachaneni, “Security Issues and Countermeasures in Cloud Computing Environment,” Int. J. Eng. Sci. Innov. Technol., vol. 4, no. 5, 2015, pp. 82–93.

[24]      K. Owens, “Securing Virtual Compute Infrastructure in the Cloud,” SAVVIS, 2009.[Online]. Available: http://viewer.media.bitpipe.com/1018468865_999/1296679360_880/Securing-Virtual-Compute-Infrastructure-in-the-Cloud.pdf. [Accessed: Jun-2017].

[25]      S. Z. I. Tariqul and D. Manivannan, “A Classification and Characterization of Security Threats in Cloud Computing,” Int. J. Next-Generation Comput., vol. 7, no. 1, pp. 1–17, 2016.

[26]      C. N. Modi and K. Acha,“Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review,” J. Supercomput., vol. 73, no. 3, 2017, pp. 1192-1234.

%d bloggers like this: