• Linked-OWL: A new approach for dynamic linked data service workflow composition

      Ahmad, Hussien; Dowaji, Salah; Damascus University (Webology, 2013-06-01)
      The shift from Web of Document into Web of Data based on Linked Data principles defined by Tim Berners-Lee posed a big challenge to build and develop applications to work in Web of Data environment. There are several attempts to build service and application models for Linked Data Cloud. In this paper, we propose a new service model for linked data "Linked-OWL" which is based on RESTful services and OWL-S and copes with linked data principles. This new model shifts the service concept from functions into linked data things and opens the road for Linked Oriented Architecture (LOA) and Web of Services as part and on top of Web of Data. This model also provides high level of dynamic service composition capabilities for more accurate dynamic composition and execution of complex business processes in Web of Data environment.
    • Open Source Library Management Softwares

      Randhawa, Sukhwinder (2013-05)
      Open source software are those which permit execution, copy, read, distribution and improvement of the software without any restrictions. Library Management Software (LMS), is an enterprise resource planning system for a library, used to track items owned, orders made, bills paid, and patrons who have borrowed. Commercial library management software are very expensive. Therefore, open source library management system can be appropriate alternatives for automatic library systems. This paper discusses features of open source library management software, criteria of selection of best open source library management software, their, advantages and limitations. Open source library management software is a solution to reduce that cost. The paper describes in brief about the feature of some of the open source library management software like Koha, NewGenlib, Evergreen, SENAYAN, ABCD, and BiblioteQ.
    • Design and Development of Multimedia Based User Education Program: The Advantages of YouTube

      Ram, Shri; Paliwal, Nitin; Jaypee University of Information Technology, Solan (KBD Publications, 2013-04-23)
      User education is one of the essential activities of the library to optimize the use of library services. This paper discusses the use of multimedia based videos for the promotion of library services and activities with the help of emerging trends and technologies and the power of Web 2.0 especially YouTube. Through this paper, it is tried to demonstrate the procedural aspects of promoting user education through developing multimedia based user education program and utilizing the services of YouTube as media of marketing and communication at Jaypee University of Information Technology, Solan, Himachal Pradesh, India.
    • Other People's Money: Adapting Entrepreneurial Techniques to Build Capital in Challenging Economic Times

      Farrell, Robert; Lehman College, City University of New York (2013-04-23)
      Drawing on the “predator” model of ntrepreneurship put forward by Villette and Vuillermot in their 2009 book “From Predators to Icons,” this article argues that challenging economic times reveal that self-funded, collaborative information literacy models have in many cases unsustainably overstretched staff and budgets. In such circumstances, it is necessary for librarians to shift to an entrepreneurial approach that seeks profitable opportunities funded by parties other than the library in order to build capital for current and future instructional services. Following Villette and Vuillermot, the article seeks to refute a cultural myth that sees the entrepreneur as someone who is first and foremost a “do-gooder” or marketer of helpful products, and it also advocates that librarians adopt a view of the entrepreneur as one who preys on unexploited, lowcost/high-profit opportunities to leverage “other people’s money” to build capital for later innovation. The article considers the economics of information literacy and library instruction programs, provides historical context for what has come to be known as the “collaborative imperative,” points to the economic shortsightedness of many collaborative and “embedded librarian” partnerships, and details six examples from information literacy programs that model successful entrepreneurship of the sort argued for.
    • Making Change Happen in the Middle

      Robert Farrell; Lehman College, City University of New York (2013)
      This paper seeks to provide library managers with a theoretical framework for thinking about how change is effected by those in middle management positions. Starting from the principles that change takes place within socio-culturally bounded contexts and is most successful when approached indirectly, two scenarios characteristic of many situations requiring change middle managers commonly face are then put forward. Following each scenario, a possible solution or path towards change is advanced in order to provide the reader with models for putting into practice the theoretical ideas presented. A methodology that combines theoretical frameworks and practical scenarios is adopted in order to ground theory in practice and thereby lead readers toward what might be called a “praxis” of change making.
    • Mapping of World-wide Camel Research Publications: A Scientometric Analysis

      Rathinasabapathy, G; Rajendran, L; Tamil Nadu Veterinary and Animal Sciences University (e-Science World, 2013)
      This paper analyses publication output in the field of camel research as indexed in CAB Direct Online database covering the period 1963 – 2012. It reports on India’s comparative strength in world science and technology (S&T) output in this field. It is observed that a total of 4,923 publications were published during the year 1963 to 2012 as per CAB Direct Online. The average number of publications published per year was 98 papers. The highest number of papers i.e. 256 was published in the year 2012. The spurt in literature output was reported during 2000-2012. India is the top producing country with 354 papers (7.19%) followed by Egypt with 284 papers (5.76%). The top five most preferred journals by the scientists were: Journal of Camel Practice and Research with 641 papers (13.02%) followed by Assiut Veterinary Medical Journal with 193 papers 3.92%), Indian Journal of Animal Sciences with 186 papers (3.77%), Indian Veterinary Journal with 164 papers (3.33%) and Revue d’Ejevage et de Medecine Veterinaire des Pays Tropicaus with 92 papers 1.87%). The top medium of communication is journal article with 4,164 papers (84.58%) followed by conference papers with 209 papers (4.25%). English was the most predominant language used by the scientists for communication with 4496 papers (91.32%). The prolific author is Gahlot, T.K. who contributed 173 papers (3.51%) followed by Faye, B. with 108 papers (2.19%).
    • Effectively Visualizing Library Data

      Phetteplace, Eric; Chesapeake College (American Library Association, 2012-12-20)
      As libraries collect more and more data, it is worth taking some time to analyze the data we collect and effectively present it. This article details how to use visualization to investigate trends and make compelling arguments with data.
    • Actionable Knowledge Discovery using Multi-Step Mining

      DharaniK; Kalpana Gudikandula; Department of CS, JNTU H, DRK College of Engineering and Technology Hyderabad, Andhra Pradesh, India; Department of IT, JNTU H, DRK Institute of Science and Technology Hyderabad, Andhra Pradesh, India (International Journal of Computer Science and Network (IJCSN), 2012-12-01)
      Data mining is a process of obtaining trends or patterns in historical data. Such trends form business intelligence that in turn leads to taking well informed decisions. However, data mining with a single technique does not yield actionable knowledge. This is because enterprises have huge databases and heterogeneous in nature. They also have complex data and mining such data needs multi-step mining instead of single step mining. When multiple approaches are involved, they provide business intelligence in all aspects. That kind of information can lead to actionable knowledge. Recently data mining has got tremendous usage in the real world. The drawback of existing approaches is that insufficient business intelligence in case of huge enterprises. This paper presents the combination of existing works and algorithms. We work on multiple data sources, multiple methods and multiple features. The combined patterns thus obtained from complex business data provide actionable knowledge. A prototype application has been built to test the efficiency of the proposed framework which combines multiple data sources, multiple methods and multiple features in mining process. The empirical results revealed that the proposed approach is effective and can be used in the real world.
    • Privacy Preserving Data Mining Operations without Disrupting Data Quality

      B.Swapna; R.VijayaPrakash; Department of CSE, SR Engineering College Warangal, Andhra Pradesh, India; Associate Professor in Department of CSE SR Engineering College Warangal, Andhra Pradesh, India (International Journal of Computer Science and Network (IJCSN), 2012-12-01)
      Data mining operations help discover business intelligence from historical data. The extracted business intelligence or actionable knowledge helps in taking well informed decisions that leads to profit to the organization that makes use of it. While performing mining privacy of data has to be given utmost importance. To achieve this PPDM (Privacy Preserving Data Mining) came into existence by sanitizing database that prevents discovery of association rules. However, this leads to modification of data and thus disrupting the quality of data. This paper proposes a new technique and algorithms that can perform privacy preserving data mining operations while ensuring that the data quality is not lost. The empirical results revealed that the proposed technique is useful and can be used in real world applications.
    • Policies Based Intrusion Response System for DBMS

      Nayeem, Fatima; Vijayakamal, M.; Dept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, India; Dept of CSE, JNTU H, Sridevi Womens Engimeering College Hyderabad, Andhra Pradesh, India (IJCSN, 2012-12-01)
      Intrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies. We have developed an interactive language that helps database administrators to determine the responses to be provided by the response system based on the malicious requests encountered by relational database. We also maintain a policy database that maintains policies with respect to response system. For searching the suitable policies algorithms are designed and implemented. Matching the right policies and policy administration are the two problems that are addressed in this paper to ensure faster action and prevent any malicious changes to be made to policy objects. Cryptography is also used in the process of protecting the relational database from attacks. The experimental results reveal that the proposed response system is effective and useful.
    • Perceptions Towards On-line Banking Security: An Empirical Investigation of a Developing Country`s Banking Sector, how secure is On-line Banking

      Bongani Ngwenya; Khanyisa Malufu; Dean, faculty of Business, Solusi University Bulawayo, +263, Zimbabwe; Department of Computers and Information Systems Solusi University, Bulawayo, +263, Zimbabwe (IJCSN, 2012-12-01)
      The increase in computer crime has led to scepticism about the move made by the banks to introduce on-line banking. Some view this as a noble move which has made the banking system more efficient, reliable and secure, while others view it as a risky and insecure way of banking. The aim of this study was to assess whether on-line banking in the developing countries is secure or not. The researcher chose a descriptive-quantitative research design. Data was collected using a self constructed questionnaire. Convenience sampling and stratified random sampling techniques were used to select the main subjects of the study. Generally on average there was no significant difference between the perceptions of management bank personnel and non-management bank personnel on the security of on-line banking. The study recommends further future studies on the security of on-line banking in developing countries based on the perceptions of the customers themselves, who are using on-line banking services, the Common Criteria for Information Technology Security and also a study of the latent dimensions of on-line banking security as extracted by factor analysis, how they differ from elements of information security as derived from the theoretical framework and literature.
    • Open Source Software for Creation of Digital Library: A Comparative Study of Greenstone Digital Library Software & DSpace

      Randhawa, Sukhwinder (Red Flower Publication Pvt. Ltd., 2012-12)
      Softwares now-a-days have become the life line of modern day organizations. Organizations cannot think of doing their tasks effectively and efficiently without softwares. The extremely competitive environment, zero deficiency and enhanced productivity has made it mandatory for the organizations to carefully choose the appropriate software after comprehensive needs assessment. Softwares simply their tasks and saves a lot of precious time which can be utilized in managing other important issues. Libraries also need softwares if they want to create a parallel digital library with features which we may not find in a traditional library. There are several open source softwares available to create a digital library. For this, firstly the library professionals should be aware of the advantages of open source software and should involve in their development. They should have basic knowledge about the selection, installation and maintenance. Open source software requires a greater degree of computing responsibility than commercial software. Digitization involves huge money to create and maintain and the OSS appears to be a means to reduce it. Among these, DSpace and Greenstone are becoming more popular in India and abroad. This paper deals with the comparison of these two popular OSS from various points of view. The comparative table may help the professionals who are planning to create a digital library.
    • Design and Development of Multimedia Based User Education Program: The Advantages of YouTube

      Ram, Shri; Paliwal, Nitin; Jaypee University of Information Technology, Solan (KBD Publication, 2012-10-26)
      User education is one of the essential activities of the library to optimize the use of library services. This paper discusses the use of multimedia based videos for the promotion of library services and activities with the help of emerging trends and technologies and the power of Web 2.0 especially YouTube. Through this paper, it is tried to demonstrate the procedural aspects of promoting user education through developing multimedia based user education program and utilizing the services of YouTube as media of marketing and communication at Jaypee University of Information Technology, Solan, Himachal Pradesh, India.
    • Impact factors of Indian open access journals rising

      Gunasekaran, Subbiah; Arunachalam, Subbiah; CSIR-Central Electrochemical Research Institute, Karaikudi 630 006, India; Centre for Internet and Society, #194, 2nd C Cross, Domlur 2nd Stage, Bangalore 560 071, India (Current Science Association in collaboration with Indian Academy of Sciences, India, 2012-10-10)
    • Use of e-resources in the Guru Nanak Dev Engineering College, Ludhiana : A Study.

      Singh, Manpreet (Arihant Prakashan p. Ltd., New Delhi, 2012-08-12)
      Library is a repository of resources. Adequate electronics resources facilities empower and enrich the higher education system in meeting the best academic needs. Users are use e-resources in the library or any where. The silicon age that led the computer revolution has significant changed in the libraries. The present paper examine the existing of various e-resources in GNE College, Ludhiana and its uses by students.
    • Staffing by Design: A Methodology for Staffing Reference

      Ward, David; Phetteplace, Eric; University of Illinois; Chesapeake College (Taylor & Francis, 2012-08-10)
      The growth in number and kind of online reference services has resulted in both new users consulting library research services as well as new patterns of service use. Staffing in person and virtual reference services adequately requires a systematic analysis of patterns of use across service points in order to successfully meet fluctuating patron needs. This article examines an assessment methodology for examining patron use of in person and virtual reference services, and designing variable staffing models which balance the observed needs of each mode of communication and patron type.
    • RELIABILITY ORIENTED TRANSPORT PROTOCOL IN WSN

      Bejoy, B.J.; Paramasivan, B.; Department of CSE, P.S.R Engineering College, Sivakasi, Virudhunagar dist, Tamilnadu, India; Department of CSE, National Engineering College, Kovilpatti, Thoothukudi dist, Tamilnadu, India (IJCSN Journal, 2012-06-01)
      Wireless sensor network is a special form of wireless networks dedicated to surveillance and monitoring applications Reliability in wireless sensor network is application specific. The specific form of reliability might change from application to application. Our idea is to generate reliability based transport protocol that is customizable to meet the needs of emerging reliable data applications in sensor networks and is also adaptive when the nodes are mobile. In our approach, clusters are formed for minimizing energy dissipation. The nodes maintain a neighbor list to forward data and any changes in the local topology can trigger updates to a node’s neighbor list. If a node notices that its neighbor list has changed, it can spontaneously re-advertise all of its data thus providing reliable transport in mobility conditions also. Our approach has five phases-setup, relaying, relay initiated error recovery, selective status reporting and node supervising. Our simulation results prove that the proposed approach can outperform existing related techniques and is highly responsive to the various error and mobility conditions experienced in sensor networks.
    • Real Time Health Monitoring Using GPRS Technology

      Verulkar, Shubhangi M.; Limkar, Maruti; EXTC Department, K.C. College of Engg., Nerul, Mumbai University.; Electronics Department, Terna College of Engg., Nerul, Mumbai University (IJCSN Journal, 2012-06-01)
      Advances in sensor technology, personal mobile devices, and wireless broadband communications are enabling the development of an integrated personal mobile health monitoring system that can provide patients with a useful tool to assess their own health and manage their personal health information anytime and anywhere. Personal mobile devices, such as PDAs and mobile phones, are becoming more powerful integrated information management tools and play a major role in many people's lives. Here I focus on designing a Mobile health-monitoring system for people who stay alone at home or suffering from Heart Disease. This system presents a complete unified and mobile platform based connectivity solution for unobtrusive health monitoring. Developing a hardware which will sense heart rate and temperature of a patient, using Bluetooth modem all information lively transmitted to smart phone, from smart phone all information transmitted to server using GPRS. At server the received data compared with the standard threshold minimum and maximum value. The normal range of heart rate is 60 to 135 and the temperature of the patient is said to be normal above 95^F and below 104^F. If at all the rate increases above 145 or decreases below 55,it may be fatal and if it crossed this threshold limit then SMS will be sent to the relative of patient and Doctors along with measured values. The build-in GPS further provides the position information of the monitored person. The remote server not only collects physiological measurements but also tracks the position of the monitored person in real time. For transmitting data from Smartphone to the server using GPRS, here we need to create a website on data will be continuously transmitted from Smartphone to the website and from website data will be downloaded continuously on the server. Thus the system helps in tracking down the patient without getting the patient into any sort of communication. Undue mishaps can be avoided within the golden hours after a patient is struck with a heart attack.
    • High-speed Multiplier Design Using Multi-Operand Multipliers

      Nezhad, Mohammad Reza Reshadi; Navi, Kaivan; Department of Electrical and Computer engineering, Shahid Beheshti University, G.C., Tehran, Tehran 1983963113, Iran; Faculty of Department of Computer engineering, University of Isfahan, Isfahan, Isfahan 8174673440, Iran (IJCSN, 2012-04-01)
      Multiplication is one of the major bottlenecks in most digital computing and signal processing systems, which depends on the word size to be executed. This paper presents three deferent designs for three-operand 4-bit multiplier for positive integer multiplication, and compares them in regard to timing, dynamic power, and area with classical method of multiplication performed on today architects. The three-operand 4-bit multipliers structure introduced, serves as a building block for three-operand multipliers in general
    • A Novel Authenticity of an Image Using Visual Cryptography

      Koshta, Prashant Kumar; Thakur, Shailendra Singh; Dept of Computer Science and Engineering, M. Tech. Fourth Semester, RGPV Bhopal- 462 036,Madhya Pradesh, India; Dept of Computer Science and Engineering, GGCT Jabalpur - 482001, Madhya Pradesh, India (IJCSN, 2012-04-01)
      A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.