8 research outputs found
r-TOLA: an architecture for real time open learning application for universities
Obtaining degree from university requires rigorous findings and research. Some subjects/courses are very challenging that made it essential to form study groups among students. Besides attending regular lectures, it is demanding to manage time for study groups. As a result, most of the time, students perform below expectation in their academic activities. meanwhile, managing a central real time open learning application will help in maintaining group study easily as well as improve studentsโ academic performance. Hence, this paper proposes a Real Time Open Learning Application for University (r-TOLA) which consists of huge academic study groupโs history that will, help students to dig into archives, search case studies, questions, projects and answers. This will also benefit lecturer to know the trend in studentsโ performance
An empirical study of the evolution of PHP MVC framework
Commercial, social and educational importance of web technology has tremendously increased research activities in web programming/scripting. Several methods for writing PHP codes such as Object Oriented Programming (OOP), Procedural PHP coding and Model View Controller (MVC) pattern have been proposed. Model View Controller (MVC) which is one of the most powerful method for developing PHP application has many variant such Laravel, Symfony, CodeIgniter, CakePHP etc. However, selection of best MVC framework among the variants is of concern to the programmers as well as project managers, especially when managing big applications. Hence, performance evaluation criterions are required. This paper discusses the MVC based most famous PHP frameworks, evaluate their performance and it was found that Laravel outperforms other MVC framework, hence Laravel is proposed as the most suitable PHP framework for future web technology
A cloud-based bus tracking system based on internet-of-things technology
The technological rise in public transportation
is on the horizon, but the bus network structure and
intelligent bus tracking system should first be in place. Bus
transport service is on the edge of digital revolution,
generating real-time tracking information about the bus
service using smartphones. In this paper, a cloud-based bus
tracking system based on IoT is proposed to reduce human
intervention, waiting time and energy. The exact location
and arrival time of the bus can be tracked dynamically by
using a mobile application to provide better and efficient bus
service. Furthermore, passengers can buy tickets without
queueing and book the available seats by making online
payments. The proposed scheme allows more flexibility and
user satisfactory service to the rider in terms of time loss and
encourages more people to ride by providing real-time bus
tracking information to improve passenger satisfaction. The
main objective is to minimize the unnecessary waiting and
queueing time uncertainty of passengers. Riders can utilize
their waiting time more productively by choosing the nearest
route and alternative transportation. The sustainability of
public transport service can be maintained by providing
noteworthy benefits to the passengers using the proposed
IoT-based bus tracking system
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
One of the problems in cloud computing data security is injected object during data movement from one state to another. Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. This paper proposes a secure autodetection of an injected object based on hash function labelling; a one-time security header for transferable files that protects an unauthorized injection. The labelling header allows two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgement immediately after file modification. Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detecte
LiFi based automated shopping assistance application in IoT
Urban people minimize shopping time in daily life due to time constrain. From that
point of view, the concept of supermarket is being popular while consumers can buy different
items from same place. However, customer spends hours and hours to find desired items in a
large supermarket. In addition, itโs also required to be queued during payment at counter that is
also time consuming. As a result, a customer has to spend 2-3 hours for shopping in a large
superstore. This paper proposes an Internet of Things and Li-Fi based automated application
for smart phone and web to find items easily during shopping that can save consumerโs time as
well as reduce man power in supermarket
I-VRenewal: A cloud based system for VISA renewal: A case study of IIUM
Getting visa or its renewal is one of the important
elements for International students studying abroad. Each and
every year students need to renew their visa, to extend their
studentship in order to stay in a particular country. In
Malaysia, in order to process visa renewal faster, Education
Malaysia Global System (EMGS) was introduced by Malaysian
Government. Since the implementation of EMGS in April 2015
at International Islamic University Malaysia (IIUM), however
renewal process has become complex and lengthy. As a result,
many international students faced difficulties in visa
application which cost lot of money, time and resources. This
paper evaluates the current system of student visa application
at IIUM and proposes an intelligent cloud-based system for
visa renewal that is more efficient
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
The recent paradigm shift in the IT sector leading to cloud computing
however innovative had brought along numerous data security concerns. One
major such security laps is that referred to as the Man in the Middle (MITM)
attack where external data are injected to either hijack a data in transit or to
manipulate the files and object by posing as a floating cloud base. Fresh
algorithmsโ for cloud data protection do exist however, they are still prone to
attack especially in real-time data transmissions due to employed
mechanism. Hence, a validation protocol algorithm based on hash function
labelling provides a one-time security header for transferable files that
protects data in transit against any unauthorized injection. The labelling
header technique allows for a two-way data binding; DOM based
communication between local and cloud computing that triggers automated
acknowledgment immediately after file modification. A two layer encryption
functions in PHP was designed for detecting injected object; bcrypt methods
in Laravel and MD5 that generate 32 random keys. A sum total of 1600
different file types were used during training then evaluation of the proposed
algorithm, where 87% of the injected objects were correctly detected
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
Cloud Computing is an emerging technology nowadays. Due to the accessibility, availability, and cost effectiveness, cloud
computing has became essential computing system in both, private and public sectors. However, secure data transfer is still
a big question where transferring link between user and server are not stabilized yet. As a result, many cloud users lost
their valuable data. However, this paper proposes as integrated service of Advanced Quantum Cryptography with Cloud
Computing. To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the
use of photons and physics to generate cryptographic keys