<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title>ADCAIJ, Vol.9, n.3</title>
<link>http://hdl.handle.net/10366/145969</link>
<description/>
<pubDate>Sat, 09 May 2026 16:06:13 GMT</pubDate>
<dc:date>2026-05-09T16:06:13Z</dc:date>
<item>
<title>Secure Data Transmission in BPEL (Business Process Execution Language)</title>
<link>http://hdl.handle.net/10366/146106</link>
<description>In the world of computation, the encryption is a technique by which the plaintext or any type of data which is converted from the readable form is transformed into an encoded form. That encoded form can only be read by another entity if they have corrected key for decryption. The proposed technique providing the security to the data in inefficient way that can be further use in implementation in new upcoming task and enhancement in current running projects of SOA (Service Oriented Architecture) BPEL (Business Process Execution Language).
</description>
<pubDate>Sun, 08 Nov 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146106</guid>
<dc:date>2020-11-08T00:00:00Z</dc:date>
</item>
<item>
<title>Staff</title>
<link>http://hdl.handle.net/10366/146107</link>
<pubDate>Wed, 30 Dec 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146107</guid>
<dc:date>2020-12-30T00:00:00Z</dc:date>
</item>
<item>
<title>An access control and authorization model with Open stack cloud for Smart Grid</title>
<link>http://hdl.handle.net/10366/146104</link>
<description>In compare to Authentication for identification and relationship of an identity of a user with its task and process within the system, authorization in access control is much anxious about confirming that user and its task in the form of system process, access to the assets of any particular domain is only approved when proven obedient to the identified policies. Access control and authorization is always an area of interest for researchers for enhancing security of critical assets from many decades. Our prime focus and interest is in the field of access control model based on Attribute base access control (ABAC) and with this paper we tried to integrate ABAC with openstack cloud for achieving finer level of granularity in access policies for domain like smart grid. Technical advancement of current era demands that critical infrastructure like traditional electrical grid open ups to the modern information and communication technology to get the benefit in terms of efficiency, scalability, accessibility and transparency for better adaptability in real world. Incorporation of ICT with electric grid makes it possible to do greater level of bi-directional interaction among stake holders like customer, generation units, distribution units and administrations and these leads international organization to contribute for standardization of smart grid concepts and technology so that the realization of smart grid becomes reality. Smart grid is a distributed system of very large scale by its nature and needs to integrate available legacy systems with its own security requirements. Cloud computing proven to be most efficient approach for said requirements and we have identified openstack as our cloud platform. We have integrated ABAC approach with default RBAC approach of openstack and provide a frame work that supports and integrate multiple access control polices in making authorization decisions. Smart grid domain in considered as case study which requires support of multiple access policies (RBAC, ABAC or DAC etc) with our model for access control and authorization.
</description>
<pubDate>Wed, 04 Nov 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146104</guid>
<dc:date>2020-11-04T00:00:00Z</dc:date>
</item>
<item>
<title>Awjedni: A Reverse-Image-Search Application</title>
<link>http://hdl.handle.net/10366/146103</link>
<description>The abundance of photos on the internet, along with smartphones that could implement computer vision technologies allow for a unique way to browse the web. These technologies have potential used in many widely accessible and globally available reverse-image search applications. One of these applications is the use of reverse-image search to help people finding items which they're interested in, but they can't name it. This is where Awjedni was born. Awjedni is a reverse-image search application compatible with iOS and Android smartphones built to provide an efficient way to search millions of products on the internet using images only. Awjedni utilizes a computer vision technology through implementing multiple libraries and frameworks to process images, recognize objects, and crawl the web. Users simply upload/take a photo of a desired item and the application returns visually similar items and a direct link to the websites that sell them.
</description>
<pubDate>Sun, 13 Sep 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146103</guid>
<dc:date>2020-09-13T00:00:00Z</dc:date>
</item>
<item>
<title>Intelligent Traffic Light for Ambulance Clearance</title>
<link>http://hdl.handle.net/10366/146105</link>
<description>Human life is a serious matter, so we should not neglect anything that might threaten it. It must be protected in all possible ways. Consequently, all health services such as hospitals, medicines, ambulances and so on need to evolve continuously to overcome life-threatening problems. Since many people could lose their life because of an ambulance delay. We proposed a system that provides a way to overcome the ambulance delay problem. With the current traffic light system, the ambulance can get stuck in the traffic or may cause an accident while it crosses the red light. To avoid that, the proposed system enables the ambulance to control the traffic light. Thus, the system will facilitate the ambulance movement to save people's life. The hardware used to implement this project includes Arduino UNO and mega with network shield (ZigBee). We have used C++ language and Arduino IDE to program the Arduino and the ZigBee.
</description>
<pubDate>Sat, 07 Nov 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146105</guid>
<dc:date>2020-11-07T00:00:00Z</dc:date>
</item>
<item>
<title>The Impact of IEEE 802.11 Contention Window on The Performance of Transmission Control Protocol in Mobile Ad-Hoc Network</title>
<link>http://hdl.handle.net/10366/146102</link>
<description>A Mobile Ad-hoc Network (MANET) is a group of nodes connected via ad-hoc fashion for communicating with each other through wireless interface. The communication among the nodes in such network take place by using multi-hop in the absence of fixed infrastructure. TCP faces some hurdles and complexities in multi-hop ad-hoc networks particularly congestion and route failures. The incompatibility between the MAC and TCP are previously noticed by the research community. This research study focuses on the impact of MAC layer contention window on TCP in MANET by using variation in network density and velocity of nodes respectively. Simulation has been carried out to quantify and analyze the impact of Contention Window (CW) sizes that affects the performance of TCP by using NS-2 simulator. The impact of CW is investigated on TCP in multi-hop networks by means of performance evaluation parameters i.e. average delay, average packet drops and average throughput.
</description>
<pubDate>Fri, 07 Aug 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146102</guid>
<dc:date>2020-08-07T00:00:00Z</dc:date>
</item>
<item>
<title>Sentiment Analysis with Machine Learning Methods on Social Media</title>
<link>http://hdl.handle.net/10366/146100</link>
<description>Social media has become an important part of our everyday life due to the widespread use of the Internet. Of the social media services, Twitter is among the most used ones around the world. People share their opinions by writing tweets about numerous subjects, such as politics, sports, economy, etc. Millions of tweets per day create a huge dataset, which drew attention of the data scientists to focus on these data for sentiment analysis. The sentiment analysis focuses to identify the social media posts of users about a specific topic and categorize them as positive, negative or neutral. Thus, the study aims to investigate the effect of types of text representation on the performance of sentiment analysis. In this study, two datasets were used in the experiments. The first one is the user reviews about movies from the IMDB, which has been labeled by Kotzias, and the second one is the Twitter tweets, including the tweets of users about health topic in English in 2019, collected using the Twitter API. The Python programming language was used in the study both for implementing the classification models using the Naïve Bayes (NB), Support Vector Machines (SVM) and Artificial Neural Networks (ANN) algorithms, and for categorizing the sentiments as positive, negative and neutral. The feature extraction from the dataset was performed using Term Frequency-Inverse Document Frequency (TF-IDF) and Word2Vec (W2V) modeling techniques. The success percentages of the classification algorithms were compared at the end. According to the experimental results, Artificial Neural Network had the best accuracy performance in both datasets compared to the others.
</description>
<pubDate>Thu, 17 Sep 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146100</guid>
<dc:date>2020-09-17T00:00:00Z</dc:date>
</item>
<item>
<title>Modelling and Simulation of Queuing Models through the concept of Petri Nets</title>
<link>http://hdl.handle.net/10366/146101</link>
<description>In recent years Petri Nets has been in demand due to its visual depiction. Petri Nets are used as an effective method for portraying synchronization, a concurrency between different system activities. In queuing models Petri networks are used to represent distributed modeling of the system and thus evaluate their performance. By specifying suitable stochastic Petri Nets models, the authors concentrate on representing multi-class queuing systems of various queuing disciplines. The key idea is to define SPN models that simulate a given queue discipline 's behavior with some acceptable random choice. Authors have find system queuing with both a single server and multiple servers with load-dependent service rate. Petri networks in the queuing model have enhanced scalability by combining queuing and modeling power expressiveness of 'petri networks.' Examples of application of SPN models to performance evaluation of multiprocessor systems demonstrate the utility and effectiveness of this modeling method. In this paper, authors have made use of Stochastic Petri nets in queuing models to evaluate the performance of the system.
</description>
<pubDate>Tue, 06 Oct 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146101</guid>
<dc:date>2020-10-06T00:00:00Z</dc:date>
</item>
<item>
<title>Index</title>
<link>http://hdl.handle.net/10366/146099</link>
<pubDate>Wed, 30 Dec 2020 00:00:00 GMT</pubDate>
<guid isPermaLink="false">http://hdl.handle.net/10366/146099</guid>
<dc:date>2020-12-30T00:00:00Z</dc:date>
</item>
</channel>
</rss>
