Time filter

Source Type

Kumar B.,Modern College of Business and Science | Al Hasani M.H.S.,Modern College of Business and Science
2016 1st IEEE International Conference on Computer Communication and the Internet, ICCCI 2016 | Year: 2016

In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even at a greater extent to generate severe security complications. The purpose of this paper is to highlight and identify the multi facets of attacks on a database and apply the effective and efficient methods to deflect attacks, through focusing on the delicate issues of data implication to transform a successful database implementations and operations. © 2016 IEEE.


Gonzalez E.A.,Jardine Schindler Elevator Corporation | Presto R.S.,Jardine Schindler Elevator Corporation | Remacha A.C.,Jardine Schindler Elevator Corporation | Santos A.N.,Modern College of Business and Science
2015 IEEE 8th GCC Conference and Exhibition, GCCCE 2015 | Year: 2015

Hazard identification is a very crucial part in any safety management system since it is the stage where a worker detects, recognizes and evaluates hazardous conditions in his/her work environment. From there, the worker is then able to perform necessary risk assessments and evaluate control measures that could be employed to ensure that the risks around him/her are minimized. There have been numerous researches circulated as well in the sole objective of improving the hazard identification effectiveness of a worker. However, all of them concentrate on leadership and management aspects, and in most cases, focusing on guidelines, policies and procedures. In this paper, a simple mathematical model that could be used to describe and measure a worker's hazard identification effectiveness is proposed. It is argued that hazard identification is executed under three psychological stages: 1) signal detection of potential hazards; 2) recognition of potential hazards; and 3) evaluation of signal based on stock knowledge. The resulting model, although just a simple probability rule, may suggest that in order to improve the effectiveness of a worker's hazard identification skills, the worker must: 1) be educated by increasing the knowledge base; and 2) improve his/her skills by performing continuous practice and coaching. © 2015 IEEE.


Bourdoucen H.,Sultan Qaboos University | Al Naamany A.,Modern College of Business and Science
Journal of Electrical Engineering | Year: 2013

Performance evaluation of WDM transmission systems for external electrooptic modulated codes is considered. This has been done for two popular line codes which are return-to-zero (RZ) and nonreturn-to-zero (NRZ) formats operating at bit rates of 10 and 40 Gbps. The optical channel consisting of a standard single mode fiber was compensated for chromatic dispersion at 1550 nm by a dispersion compensation fiber. Signal attenuation occurring in both fibers has been compensated by adequate optical amplifiers. Performance of considered systems has been evaluated via the analysis of quality factor profiles. Numerical simulations reveal that external modulation using Mach-Zehnder devices affects more RZ coded systems than NRZ coded ones. This is for the case where the average power and data bit rates are the same for the two codes. The overall results show a net superiority of NRZ modulation scheme over RZ scheme for different fiber spans at various data bit rates.


Bourdoucen H.,Sultan Qaboos University | Al-Azani F.,Sultan Qaboos University | Al-Naamany A.,Modern College of Business and Science
Journal of Computing and Information Technology | Year: 2013

Combining transmission of both voice and data on the same network infrastructure was a challenging task which required an advanced network architecture which needs to be scalable and simple. This resulted in a new approach for Ethernet systems where Differentiated Service (Diff-Serv) was introduced to respond to this need and in addition, improve Quality of service (QoS) as a way of providing class of services for different end users. Therefore, optimizing the use of the network available bandwidth is a primgoal of this work which is focused on investigating the impact of implementing a fuzzy logic controller of the crucial factors affecting the performance of the network. These external or internal factors will be controlled by the developed Fuzzy Logic system that will act as bandwidth broker (BB) to provide each user with his optimal Code Point (CP). Within the scope of this work, the CP will not only involve packet loss rate as an external factor to check the network congestion, but in addition, it will consider the internal factors; which are a combination of both service-level agreement (SLA) and the type of user application used, as external factors as well. The Code Point will be marked in the transmitted packets, where it will be possible to the router to check it, and will treat it as per the agreement between the user and the administrator.


Al-Maimani M.,Oman Air | Salim N.,University of Technology Malaysia | Al-Naamany A.M.,Modern College of Business and Science
Journal of Theoretical and Applied Information Technology | Year: 2014

Web2.0 has contributed tremendously towards the rapid growth of web contents which ensures that customers utilize existing blogs, discussion forums, e-commerce and many other sites to express their opinions and read reviews of other people on different products and services which they plan to procure. Such an online wealth of information over the web has helped customers, firms, manufacturers, service providers, social and government units to take proper decision to procure or enhance various products and services. This practice has triggered the need to enhance existing methods and techniques to extract and summarize opinions from different online reviews. This paper surveys recent and leading methods and techniques that are used for opinion mining and then outlines available resources which have been developed in this regard. The paper also presents few challenges and open issues that need to be addressed and researched in more depth in order to improve the way opinions are extracted and summarized to users and other interested groups. © 2005 - 2014 JATIT & LLS. All rights reserved.


Al-Maimani M.,Oman Air | Salim N.,University of Technology Malaysia | Al-Naamany A.M.,Modern College of Business and Science
Journal of Theoretical and Applied Information Technology | Year: 2014

In recent years the amount of opinions and reviews available on the web has grown tremendously and therefore the role of sentiment analysis is even more crucial than before. Given the very ambiguous and imprecise nature of sentiments and of their expressions, this study focuses on the review of semantic and fuzzy aspects of opinion mining. Opinions are fuzzy in nature and dealing with the semantic part of the expressed sentiments possesses many challenges and require effective techniques to properly extract and summarize people's views. Previous studies have often reflected that the use of fuzzy logic techniques have proved to be beneficial in mining reviews. This paper presents a review covering the semantic and Fuzzybased logic techniques and methods in sentiment analysis and challenges appear in the field. © 2005 - 2014 JATIT & LLS. All rights reserved.


Dulay A.E.,De La Salle University - Manila | Astillero R.I.R.,De La Salle University - Manila | Rosa P.G.P.L.,De La Salle University - Manila | Tan R.J.L.L.,De La Salle University - Manila | And 2 more authors.
2016 3rd MEC International Conference on Big Data and Smart City, ICBDSC 2016 | Year: 2016

This paper evaluates the transmission of narrow-band PLC signals using the G3 PLC standard as it passes through transformers which is crucial in automatic meter reading and demand side applications deployment for Smart Grid. Three typical laboratory step down transformers with different secondary voltages are utilized to compare the modem performance at various modulation schemes with SNR, BER and data rate used as the metric. The PLC modem utilized and configured to operate in the G3-PLC standard is C2000 from Texas Instrument. The tests done include file transfer through single and paired transformer using BPSK, QPSK, D8PSK, and ROBO modulation schemes, distance test, and gain test. It was observed that transmission through a step down transformer with lower secondary voltage generated higher SNR and RSSI. It is also noted that transmission from high voltage side to the low voltage side (downlink) of the transformer provides better SNR and BER than transmitting from low to high side (uplink). This is due to the unequal impedance seen by the two modems, one is seeing an impedance Z, while the other is seeing an impedance equal to the impedance Z at the other side times the square of the turns ratio. This is validated in the transmission on paired transformers, where both modems see the same impedance, hence, successful transmission is achieved. Thus, it is advisable to design the coupling circuit of the modem that would match the impedance of the power line where the signal is expected to pass through a single transformer only. The other remedy is to use the ROBO modulation scheme, a repeated BPSK transmission, that shows successful transmission in both uplink and downlink transmission of the modem. Although it is relatively slower than the other modulation schemes, it maintains a constant value up to a modem-to-modem distance of 100 m. © 2016 IEEE.


Nair J.B.,Modern College of Business and Science | Mukherjee S.,Jiwaji University | Mukherjee S.,State Technical University of Harayana
International Review on Computers and Software | Year: 2013

Cryptanalysis on GSR fair exchange protocol to study and analyse the robustness of the protocol. In order to perform the cryptanalysis, heuristic attacks are to be over the protocol. The heuristic attacks can be termed as the attacks, which are artificially generated by various heuristic search algorithms. This work intend to use renowned heuristic search algorithms such as Genetic algorithm (GA) and Particle Swarm Optimization Algorithm (PSO) and a latest search algorithm such as cuckoo search (CS). GA and PSO have been applied for cryptanalysis of various protocols and encryption standards. CS is an emerging search algorithm and it proved the performance in solving optimization problems. Based on the aforesaid peculiarities, perform cryptanalysis based on such algorithms. Under various algorithm parameters, attacks will be made over the protocol and the performance will be studied. The protocol and the search algorithms will be implemented in MATLAB and the results will be analysed in depth to study the robustness of the protocol under such security issues. © 2013 Praise Worthy Prize S.r.l. - All rights reserved.


Sangeetha J.,Modern College of Business and Science
Journal of Internet Banking and Commerce | Year: 2012

The objective of this paper is to develop a service quality scale by identifying the dimensions affecting the service quality across various technology interfaces in retail banking. The paper examines the literature involving the various technology interfaces and aims to propose a conceptual model involving dimensions that affect the perceptions of service quality of the technology interfaces used in banks. The paper also seeks to establish the psychometric properties of the scale thus arrived. The literature review reveals that the models currently available to measure the service quality of the technology interfaces are limited in their focus, encompassing mostly one electronic channel - the internet - and few others studying the ATM and telephone banking channels. However, there is a gap with regard to the study of other technology interfaces like call centers and queue systems used in the branches. In this study, an attempt is being made to explore the influence of the various technology interfaces on banks' service quality like the ATM, telephone banking, call center services, queue systems in the branches etc. which the customers use in combination and thereby to develop a scale to measure technology interface service quality (TISQ). © Jaya Sangeetha, 2012.


Modern College of Business and Science | Entity website

The IT Support Services division is responsible for the efficient delivery of technical services, solutions, practices and guidelines for the Modern College of Business and Science. Members of IT Support Services are certified professionals, who constantly plan ways to improve the technology available, increase efficiency and reduce downtime and support costs for MCBS ...

Loading Modern College of Business and Science collaborators
Loading Modern College of Business and Science collaborators