1) IRAJ is moving to next issue from 16th April 2015.
2) IRAJ Management has issued a thank you note to all the editors for their constant endeavours for enhancement for IRAJ.
3) Chief editor of IRAJ has achieved UGC Net qualification.
|VOLUME 14, ISSUE 1, 1 October, 2018 To 31 December, 2018|
|VOLUME 13, ISSUE 1, 1 April, 2017 To 30 June, 2017|
|VOLUME 12, ISSUE 1, 1 January, 2017 To 31 March, 2017|
|VOLUME 11, ISSUE 1, 16 October, 2016 To 31 December, 2016|
|VOLUME 9, ISSUE 1, 15 April, 2016 To 14 June, 2016|
|VOLUME 8, ISSUE 1, 15 January, 2016 To 14 April, 2016|
|VOLUME 7, ISSUE 1, 15 October, 2015 To 14 January, 2016|
|VOLUME 6, ISSUE 1, 15 July, 2015 To 14 October, 2015|
|VOLUME 5, ISSUE 1, 16 April, 2015 To 15 July, 2015|
|VOLUME 4, ISSUE 1, 16 January, 2015 To 15 April, 2015|
|VOLUME 2, ISSUE 1, 16 August, 2014 To 15 November, 2014|
|VOLUME 1, ISSUE 1, 15 June, 2014 To 15 August, 2014|
educational experiences-opinions, feelings, and concerns about the learning process are major area of discussion in the StudentsaETM informal conversations on social media (e.g., Twitter, Face book). This data from un-instrumented environments can provide valuable knowledge to inform student learning. Analysis of such data is challenging. The complexity of studentsaETM experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we developed a workflow to integrate both qualitative analysis and large-scale data mining techniques. We focused on engineering studentsaETM Twitter posts to understand issues and problems in their educational experiences.
a multi agent system is a flexible environment which provides high performance and accuracy. Many researchers have worked using the multi agent system in various fields of computing. Security has been a basic need for networking applications and focus on network security has always been important for the researchers. Network security with the application of Intrusion Detection System (IDS) has been worked in the past and undergoing regularly. Since IDS requires large amount of real time processing continuously, therefore data mining techniques are applied with it to get high accuracy. Application of data mining technique results in low performance of such system. Application of multi agent processing in IDS helps not only in accuracy but provides high performance as well. This work proposes to provide a multi agent processing of the networked system for implementation of IDS. The proposed system has multiple agents such as data loader, data poster, data receiver, Intrusion Detection agent and evaluation agent which processes the data and send it to alter system and result generation agent. The results evaluated are stored in database. The system will be tested for high performance and accuracy of the proposed system.
The subscriber management system is used by various companies to provide specific services to their clients, based on memberships taken by them for specific services. Some of the services are free and some are paid but both requires users to register online and login for availing the services. A mobile agent can be used to check the access level of the various subscribers along with their security checks in regular interval. Two agents can be created to serve the purpose when one shall provide the authentication and the other shall provide the authorization services. Application of multi-mobile agent in the trusted server environment is not only provides security as in the base paper but will enhance the security to a great extent. It will also enhance the performance of the system due to local processing over the end terminals. This work proposes to involve the mobile agent based security over the cloud and also provides a basic implementation of the proposed system using an example application of subscriber management system
Cloud Computing has been a buzz word in recent past in web industry and ease of use, implementation and low cost has made it flourishing in leaps and bounds. Different layered structure of Cloud Computing has added further in its growth. Layered architecture has increased convenience for researchers as well. With the expansion of Cloud, several challenges have also been introduced making it a big area of research for the researchers. Major challenge is security, authentication and access control which lead to tackle with different attacks such as fishing, DOS, non-repudiation etc. Various authors have made different algorithms and mechanisms to handle security issues over the cloud in past. This work introduces handling of access control. As the trust mechanism is being applied for the Cloud security, therefore storing access control details on the cloud makes the system vulnerable again. Porting access control on a different trust server can reduce the issue to a great extent.
The major problem seen Manet is the route discovery which is slow when a sender node does not have the trust value of its neighbors. For calculating value of trust nodes perform lot of calculations and transfer of packets among them, which will not only cause the slower performance but will also cause the possible congestion over the network due to introduction of trust evaluation packets over the network. In lieu of the problems enlisted for base paper work, I propose to calculate the trust value during the course of data transfer over the network, so as to avoid any possible delays and congestion over the network. In Manet various nodes comes nearby to each other and form a network and therefore security is a primary issue in such networks. Trust Based Security is being proposed in this work which will add a local information on each node to keep the trust of each node
DELAY-TOLERANT Networks (DTNs) are a relatively new class of networks, wherein sparseness and delay are particularly high. In conventional Mobile Ad hoc Networks (MANETs), the existence of end-to-end paths via contemporaneous links is assumed in spite of node mobility. It is also assumed that if a path is disrupted due to mobility, the disruption is temporary and either the same path or an alternative one is restored very quickly. Apart from the inherent challenges, mobility factor as the external challenge describes the variation of movement and plays an important role in routing performance. Therefore, it is desirable to emulate the movement pattern of the targeted real world applications in an appropriate way. In this work a ranking system is being proposed which works on the basis of the traffic any node passes through it successfully. This increases the reliability of the node and hence the network becomes more secured.