Volume 7, Issue 1, December 2015

 

 

 

Overview, Demand and Implementation of 5 G with respect to Current Era

Pages: 125-132 (8) | [Full Text] PDF (759 KB)
EF Ali, R Ullah, EN Muslim, EN Ahmad, EF Aslam
Department of Computer science University of Peshawar, Pakistan
Electrical Engineering Department Sarhad University of Science and IT, Peshawar Pakistan

Abstract -
Adaptations in field of technology is now become a key requirement for the purpose globalization of world, and business communication etc. The main point of success in w-less is the quality of service in different field with different categories. From beginning the revolution of w-less technology, each birth of generation (old G to current G) have proved themselves italicized for their user in all fields of w-less technology. Currently these successfully categories in w-less utilize the user with many applications like video conferencing, access to their require information and other massive services but today technology still consist of some demerits which paralyzed their user lives. The knowledge of this research consist of comparison of Generations from old to younger G, their demerits and what are expectation from the upcoming G. How it will recover current problems and challenges will face by it in future. This paper will also provide the techniques that how tomorrow G will overcome today lengthy upgrades and services with news program daily.
 
Index Terms - Today technology services, tomorrow technology services, 0-5G

Citation - EF Ali, R Ullah, EN Muslim, EN Ahmad, EF Aslam. "Overview, Demand and Implementation of 5 G with respect to Current Era." International Journal of Computer Engineering and Information Technology 7, no. 1 (2015): 125-132.

 

Evaluating NoSQL Databases with Fuzzy Decision Making

Pages: 133-141 (9) | [Full Text] PDF (617 KB)
B Hindawi, H M.El-Bakry, M Abu-Elkheir
Faculty of Computer and Information Sciences, Mansoura University, Mansoura, Egypt

Abstract -
NoSQL databases are widely used to handle and store data for large scale applications. Database system performance is an important quality attribute to develop software and applications because it is related to the other qualitative attributes such as availability, reliability, functionality and so on. There are no tools or software in the market to accurately measure the performance of NoSQL databases. As a result of having various levels of performance within NoSQL databases, it is important to evaluate and compare their performances to identify potential strategies. Because the evaluation process is subject to various degrees of expert opinions and preferences, it is difficult to assign the performance priorities and specify how NoSQL databases can be ranked. We propose a Fuzzy evaluation scheme that provides evaluation degrees with more precise. This scheme depends on conducting the pairwise comparisons between the alternatives in terms certain criterion. This paper implement fuzzy scheme and preliminary results will be showed clearly by total performance for each database. The numerical values are represented in the results to be easier during the ranking. This study allows the developers and system analysts to specify the most suitable database due to the application needs.
 
Index Terms - Consistent Fuzzy Preference Relation(CFPR), fuzzy AHP, Multi criteria Decision Making(MCDM), fuzzy LinPreRa, Fuzzy Linguistic Assessment Variables(FLAV)

Citation - B Hindawi, H M.El-Bakry, M Abu-Elkheir. "Evaluating NoSQL Databases with Fuzzy Decision Making." International Journal of Computer Engineering and Information Technology 7, no. 1 (2015): 133-141.

 

AUTHENTICATION AND ACCESS CONTROL FOR MULTI KEYWORD RANKED SEARCH OVER ENCRYPTED DATA-AMRSED

Pages: 142-146 (5) | [Full Text] PDF (230 KB)
M Baraskar, KR Kolhe
Department of Information Technology MAEERS MIT, Savitribai Phule Pune University

Abstract -
Owner of data driven to allow their composite data management systems from local places to the commercial open cloud for remarkable economic savings and flexibility .Keyword search on cloud having numerous advantages, as the owner of data will get powerful tool to precisely describe his informational need . But for protecting data confidentiality, sensitive data have to be encrypted before subcontracting, which obsoletes traditional utilization of data based on keyword query search. Thus, permitting an encrypted cloud data search service is of vital prominence. In this paper we define and try to solve the stimulating problem of authentication and access control for multi keyword ranked search over encrypted data in cloud computing, and to establish a set of strict confidentiality requirements for such a secure cloud data utilization system, between numerous multi-keyword semantics, and to choose the efficient similarity quota of coordinate matching , as numerous contests as possible, to capture the relevance of data documents to the search query. Auxiliary use “internal product resemblance” to quantitatively assess such resemblance measure. In this project first to propose a basic idea for the AMRSED based on secure inner product computation, and then give two significantly improved AMRSED schemes to achieve various stringent confidentiality requirements in two dissimilar risk models. To improve search information of the data search facility, further extend the two schemes to support more search semantics. Extensive performance evaluations have shown that the projected system can achieve better productivity in terms of the functionality and computation upstairs associated with existing approaches. For the future work, to examine on the authentication and access control issues in searchable encryption technique.
 
Index Terms - AMRSED, Blind Storage, Cloud Computing

Citation - M Baraskar, KR Kolhe. "AUTHENTICATION AND ACCESS CONTROL FOR MULTI KEYWORD RANKED SEARCH OVER ENCRYPTED DATA-AMRSED." International Journal of Computer Engineering and Information Technology 7, no. 1 (2015): 142-146.