8 research outputs found

    r-TOLA: an architecture for real time open learning application for universities

    Get PDF
    Obtaining degree from university requires rigorous findings and research. Some subjects/courses are very challenging that made it essential to form study groups among students. Besides attending regular lectures, it is demanding to manage time for study groups. As a result, most of the time, students perform below expectation in their academic activities. meanwhile, managing a central real time open learning application will help in maintaining group study easily as well as improve studentsโ€™ academic performance. Hence, this paper proposes a Real Time Open Learning Application for University (r-TOLA) which consists of huge academic study groupโ€™s history that will, help students to dig into archives, search case studies, questions, projects and answers. This will also benefit lecturer to know the trend in studentsโ€™ performance

    An empirical study of the evolution of PHP MVC framework

    Get PDF
    Commercial, social and educational importance of web technology has tremendously increased research activities in web programming/scripting. Several methods for writing PHP codes such as Object Oriented Programming (OOP), Procedural PHP coding and Model View Controller (MVC) pattern have been proposed. Model View Controller (MVC) which is one of the most powerful method for developing PHP application has many variant such Laravel, Symfony, CodeIgniter, CakePHP etc. However, selection of best MVC framework among the variants is of concern to the programmers as well as project managers, especially when managing big applications. Hence, performance evaluation criterions are required. This paper discusses the MVC based most famous PHP frameworks, evaluate their performance and it was found that Laravel outperforms other MVC framework, hence Laravel is proposed as the most suitable PHP framework for future web technology

    A cloud-based bus tracking system based on internet-of-things technology

    Get PDF
    The technological rise in public transportation is on the horizon, but the bus network structure and intelligent bus tracking system should first be in place. Bus transport service is on the edge of digital revolution, generating real-time tracking information about the bus service using smartphones. In this paper, a cloud-based bus tracking system based on IoT is proposed to reduce human intervention, waiting time and energy. The exact location and arrival time of the bus can be tracked dynamically by using a mobile application to provide better and efficient bus service. Furthermore, passengers can buy tickets without queueing and book the available seats by making online payments. The proposed scheme allows more flexibility and user satisfactory service to the rider in terms of time loss and encourages more people to ride by providing real-time bus tracking information to improve passenger satisfaction. The main objective is to minimize the unnecessary waiting and queueing time uncertainty of passengers. Riders can utilize their waiting time more productively by choosing the nearest route and alternative transportation. The sustainability of public transport service can be maintained by providing noteworthy benefits to the passengers using the proposed IoT-based bus tracking system

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion

    No full text
    One of the problems in cloud computing data security is injected object during data movement from one state to another. Mostly, the Man In The Middle (MITM) attack happens in this stage by hijacking active session variables, manipulating files and objects. Although there are few algorithms for data protection in the Cloud, However, such algorithms are still prone to attack, especially in real-time data movement due to the mechanism employed. This paper proposes a secure autodetection of an injected object based on hash function labelling; a one-time security header for transferable files that protects an unauthorized injection. The labelling header allows two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgement immediately after file modification. Two encryption functions in PHP has been used for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detecte

    LiFi based automated shopping assistance application in IoT

    No full text
    Urban people minimize shopping time in daily life due to time constrain. From that point of view, the concept of supermarket is being popular while consumers can buy different items from same place. However, customer spends hours and hours to find desired items in a large supermarket. In addition, itโ€™s also required to be queued during payment at counter that is also time consuming. As a result, a customer has to spend 2-3 hours for shopping in a large superstore. This paper proposes an Internet of Things and Li-Fi based automated application for smart phone and web to find items easily during shopping that can save consumerโ€™s time as well as reduce man power in supermarket

    I-VRenewal: A cloud based system for VISA renewal: A case study of IIUM

    No full text
    Getting visa or its renewal is one of the important elements for International students studying abroad. Each and every year students need to renew their visa, to extend their studentship in order to stay in a particular country. In Malaysia, in order to process visa renewal faster, Education Malaysia Global System (EMGS) was introduced by Malaysian Government. Since the implementation of EMGS in April 2015 at International Islamic University Malaysia (IIUM), however renewal process has become complex and lengthy. As a result, many international students faced difficulties in visa application which cost lot of money, time and resources. This paper evaluates the current system of student visa application at IIUM and proposes an intelligent cloud-based system for visa renewal that is more efficient

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects

    Get PDF
    The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithmsโ€™ for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected

    Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing

    No full text
    Cloud Computing is an emerging technology nowadays. Due to the accessibility, availability, and cost effectiveness, cloud computing has became essential computing system in both, private and public sectors. However, secure data transfer is still a big question where transferring link between user and server are not stabilized yet. As a result, many cloud users lost their valuable data. However, this paper proposes as integrated service of Advanced Quantum Cryptography with Cloud Computing. To ensure the secure Cloud Environment between sender and receiver, Quantum Cryptography proposes the use of photons and physics to generate cryptographic keys
    corecore