Special Issue October 2010
View Full Text Document | ||
Author(s) | Title | Pages |
Janet L.W., William B |
Using Context-awareness to Support Adaptive Multimodal Mobile Notification |Abstract
In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the Fiege-Fiat-Shamir that authenticate an entity anonymously. We present a revised Feige-Fiat-Shamir ZKP scheme for the Airborne Networks (ANs) that reduces the ping-pong effect in the scheme and speeds up the growth of the Verifier trust of the Prover, thus making the authentication process faster and more efficient. |
11-19 |
Jean V., Magda H. |
Investigating E-government Knowledge Base Ontology Supporting Development Projects Monitoring in Sub Saharan Africa|Abstract
In networks and entity groupings that have sensitive resources, user identification is a crucial requirement for secure access, communication and transactions involving those resources. However, there are networks and entity groupings that require entity authentication while preserving the privacy of the entity being authenticated. There are several zero-knowledge protocols (ZKP) including the Fiege-Fiat-Shamir that authenticate an entity anonymously. We present a revised Feige-Fiat-Shamir ZKP scheme for the Airborne Networks (ANs) that reduces the ping-pong effect in the scheme and speeds up the growth of the Verifier trust of the Prover, thus making the authentication process faster and more efficient. |
20-29 |
Ernest M.,John Q |
Finding Predictive Relationships between Notifiable Diseases with Markov Blanket Discovery |Abstract
As the number of queries grows over time it becomes necessary that Information Retrieval (IR) system provides high query processing rate i.e. high query throughput. In IR systems, there are three types of data partitioning, namely term-based, document-based, and hybrid partitioning. In document-based and hybrid partitioning, query is sent to all nodes and thus high level of parallelism is achieved but low query throughput. In term-based partitioning, a given query is divided into sub-queries and each sub-query is directed to the relevant node. This provides high query throughput and concurrency but poor parallelism and load balance. In this paper, the Moderate Distributed IR System (MDIRS) is proposed to improve the query throughput and load balance of hybrid partitioning. MDIRS inherits the advantage of documentbased partitioning i.e. it provides moderate level of parallelism and the advantage of term-based partitioning. In other words, it provides moderate level of query throughput and load balance. Results from this paper showed that the MDIRS improved the query throughput and the total query response time of hybrid partitioning by 64% over the baseline system. |
30-36 |
Paul B., Jude T. L., Kathy L. |
Mobile Learning Objects Deployment and Utilization in Developing Countries |Abstract
This paper presents hardware solutions for accelerating IEEE 802.11i. Several experiments were applied on the low-cost Cyclone II FPGA by using various architectures with different number of threads. The FPGA offloads the process of AES encryption from the master CPU. In addition, it offers the possibility of using several threads to run the AES encryption. Different optimizations have been applied on the hardware architecture of AES and on the basic unit of AES, in order to satisfy different constraints in terms of latency, area occupation and speed. Their performances are compared to AES software implemented on a NIOS II processor. A strong focus is devoted for the achievement of high throughput, which is required to support security requirements for the high bandwidth applications. |
37-46 |
Darelle van Greunen, Alta van Der Merwe & Paula Kotze. |
Factors Influencing BPM Tools: The Influence on User Experience and User Interfaces |Abstract
The paper discusses the influence of propagation environment in a GSM mobile network. It considers the measurement and prediction results for a special case of propagation, that is, the harmattan, in a live network. The harmattan precipitation intensity may be so great that visibility at ground level is reduced to less than a hundred meters by dust clusters. In this paper, the path loss during harmattan in N’djamena (Chad) is computed from the received signal strength at various distances for three major roads. The Hata and Free-space models were applied, and compared with received signal measurement data. The results indicate that measurement data and the Hata prediction model agree closely while the free space model generally underestimates the path loss phenomena. The significance here is that various forms of precipitation such as rain, snow, cloud and fog absorb and scatter electromagnetic energy leading to attenuation in its signal strength. The study indicates that harmattan precipitates do inflict attenuation significantly. |
47-57 |
Fridah K.,Thomas H. |
Fsm2 and the Morphological Analysis of Bantu Nouns – First Experiences from Runyakitara |Abstract
This paper looks at the utilization of the Internet among teachers and students in connected rural and urban secondary schools in Kenya. A conceptual framework composed of variables which can explain Internet utilization in Kenyan secondary schools is established and measured. Instruments based on this framework were used in the survey and covered 11 schools with school principals, teachers and students as respondents. Findings show that use of the Internet and its integration in teaching and learning in secondary education is increasing with its use more pervasive among students and teachers as a means of communication and for information searching. Internet access rates for teachers and students have been observed to be much higher in educational institutions that have made effective ICT investments in education, translating into better utilization of ICT related technologies. Strategies are suggested on how to utilize the Internet to improve educational outcomes, and recommendations given on issues that touch on ICT access and infrastructure; human resources and training; policy environment; financing and ICT investment; curriculum development and locally relevant content. |
58-69 |
Ruth M. M., Idris .A.Rai. |
An Integrated Victim-based Approach against IP Packet Flooding Denial of Service |Abstract
This paper looks at the utilization of the Internet among teachers and students in connected rural and urban secondary schools in Kenya. A conceptual framework composed of variables which can explain Internet utilization in Kenyan secondary schools is established and measured. Instruments based on this framework were used in the survey and covered 11 schools with school principals, teachers and students as respondents. Findings show that use of the Internet and its integration in teaching and learning in secondary education is increasing with its use more pervasive among students and teachers as a means of communication and for information searching. Internet access rates for teachers and students have been observed to be much higher in educational institutions that have made effective ICT investments in education, translating into better utilization of ICT related technologies. Strategies are suggested on how to utilize the Internet to improve educational outcomes, and recommendations given on issues that touch on ICT access and infrastructure; human resources and training; policy environment; financing and ICT investment; curriculum development and locally relevant content. |
70-80 |
Joseph M. Kizza, Lindsay Bramlett and Elizabeth Morgan. |
Using Subgraph Isomorphism as a Zero Knowledge Proof Authentication in Timed Wireless Mobile Networks |Abstract
This paper looks at the utilization of the Internet among teachers and students in connected rural and urban secondary schools in Kenya. A conceptual framework composed of variables which can explain Internet utilization in Kenyan secondary schools is established and measured. Instruments based on this framework were used in the survey and covered 11 schools with school principals, teachers and students as respondents. Findings show that use of the Internet and its integration in teaching and learning in secondary education is increasing with its use more pervasive among students and teachers as a means of communication and for information searching. Internet access rates for teachers and students have been observed to be much higher in educational institutions that have made effective ICT investments in education, translating into better utilization of ICT related technologies. Strategies are suggested on how to utilize the Internet to improve educational outcomes, and recommendations given on issues that touch on ICT access and infrastructure; human resources and training; policy environment; financing and ICT investment; curriculum development and locally relevant content. |
81-91 |
IJCIR Menu
- IJCIR Home
- About IJCIR
- Editorial Board
- Call for Papers
- Submit Papers
- Author Instructions
- Editorial Policies
- Webmail