International Journal of Information Science and Computing
Category - Research Article
Download PDF
Title:
Object Oriented Metrics Based Analysis of DSA algorithm for authentication of Study material in E-learning
Abstract:

With the increasing popularity of e-learning, the organizations, those are providing the facility of e-learning, facing too many challenges regarding the security. In case of e-learning, the main area, where the security is so much needed, is the transmission of any online documents like marks sheets, study materials, registration numbers, admit cards and so many other learning related documents. To provide authenticity in case of these kinds of transmission of documents, organizations can use Digital Signature Algorithm (DSA). The object oriented analysis and design of any system makes it better in sense of understandability, maintainability, code re-usability, it reduces time and cost of the system development and improves the quality of the system. There are mainly two kinds of metric analysis, those are complement to each other: Chidamber and Kemerer (CK) metric and Metric for Object Oriented Design (MOOD) metric. We will analyze the value for these two metrics using the class hierarchy diagram of the DSA algorithm regarding the transmission of study materials from the administrator to student in an e-learning system.

Category - Research Article
Download PDF
Title:
Research Paper on Media Responsibility in Nation Development
Abstract:

The media, with specific reference to the collective entity of newspapers, radio, television and the International Network (Internet), play a very important role in development. It involves changes or advancement in a nation aimed at improving the political, economic and social lives of the people. The real influence of the media in development will depend on the media themselves, the societies in which they operate, and the audience they reach. None of these factors are the same everywhere, at all times, or under all conditions. The media in dictatorships, for example, media is not likely to exercise the same influence as it has to work in social development and do media complete its responsibility in nation development. This paper focuses on the role of media in nation development. The paper mentioned the role of media in development of society is depend upon their independence, freedom, and the ability to effectively communicate objective, balanced, fair and professional information to both government and the general public. There is no doubt that the topic is very wide, therefore analysis will be limited to conventional media: newspapers, radio, television and the Internet. The paper involves a comparative analysis of media contents, methods or styles of presentation, and the environment in which the media operate

Category - Research Article
Download PDF
Title:
Quantum Information Science: Current Scenario and Future Prospects with Possible Academic Potentiality in Indian Educational Context
Abstract:

Quantum Information Science [QIS] is an important interdisciplinary domain with much potential in industry, institution, educational sector, health and medical sector and so on. Quantum Information Science is a result of integration of Quantum Science and Information Science. Quantum Information Science is a new field which is responsible for faster and advanced communication system powered by QBit. Quantum Information Science is a combination of many other domains also. The periphery is increasing day by day. Today’s super computer as well as in future computing, Quantum Information Science has great potentials. Academic programmes on Quantum Information Science are still limited than that of its requirement. Thus design and development of academic programme on Quantum Information Science becomes important. This hectic process is to be completed with high quality collaborative educational strategies. This paper illustrates many aspects of Quantum Information Science including role, need, characteristics and especially academic potentials in Indian Universities.

Category - Research Article
Download PDF
Title:
Exploratory Factor Analysis: Development of Perceived Peer Pressure Scale
Abstract:

This article is mainly focusing on the procedure adopted to develop and validate a tool to study higher secondary students' perceived peer pressure. Based on the review of related literature and group discussion, initially the researcher generated 50 items on perceived peer pressure and subsequently modified in to 35 items on the basis of experts' opinion. The first try-out on 100 higher secondary students resulted in selection of 30 items and Cronbach’s Alpha value was found to be 0.942. Again the tool was administered to 300 higher secondary students and based on the factor analysis the 30 items were categorized under three dimensions. The dimensions are: Yielding to Peer Pressure, Resistance to Peer Pressure and Peers Encouragement. The reliability and validity value of the final tool was found to be 0.942 and 0.971 respectively. Hence, the perceived peer pressure scale is found to be valid for application.

Category - Research Article
Download PDF
Title:
Trust Based Routing for Mitigating Greyhole Attack in MANET: A Rethinking Approach
Abstract:

Mobile Adhoc Network (MANET) is a temporarily formed network created and operated by the nodes themselves without having any centralized infrastructure. Nodes cooperate with each other by passing data and packets from one hop to another. Every nodes act as a router itself for communication. Different protocols have been developed for such type of network. Since the network is dynamic, the topology changes frequently and the network are open to attack and unreliability. Nodes misbehavior due to malicious intention could significantly degrade the performance of MANET. This study reveals with a new Dynamic Source Routing Protocol for MANET based on trust model to mitigate Greyhole attack. Trust is calculated based on trust function. Nodes are selected based on the values of trust function and threshold value. The modified DSR protocol can effectively detect the Greyhole nodes and isolate them from taking part on routing.