Forthcoming articles


International Journal of Enterprise Network Management


These articles have been peer-reviewed and accepted for publication in IJENM, but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.


Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.


Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.


Articles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.


Register for our alerting service, which notifies you by email when new issues of IJENM are published online.


We also offer RSS feeds which provide timely updates of tables of contents, newly published articles and calls for papers.


International Journal of Enterprise Network Management (33 papers in press)


Regular Issues


  • Investigation on effect of geometric, material and load parameters on strength of composites with cutouts   Order a copy of this article
    by Anoop Kumar S, Rajesh R 
    Abstract: Composite applications require presence of multiple holes for mechanical fasteners or cutouts in laminates. Holes and cutouts help in lightening composite laminates used as aerospace structures. Unlike isotropic materials, composite materials experience change in stress values due to different parameters such as geometric, material and loading parameters. The present study is devoted to primarily determine whether geometric, material or loading parameters have dominant influence on strength of composite laminates. Geometric parameters such as cutout shape, size, orientation, proximity (in case of multiple holes) as well as edge interaction are taken into consideration. Among material parameters, fiber material, fiber orientation and stacking sequence are varied. Numerical study using ABAQUS CAE software is employed for the analyses. Experiment on Open Hole Tension specimen as per ASTM standards is also conducted to validate the numerical model. Results reveal that geometric parameters have much significant influence on stress concentration factor and thereby the strength of composite laminates, when compared to material parameters. Among the geometric parameters, edge interaction is the most critical factor affecting the stress concentration. An elliptical cutout is seen to have comparatively more adverse effect on strength of laminate, when compared with other cutout shapes. Further, effect of load parameters in-plane tension, compression and shear, is also studied. However, no effect was evidenced in stress concentration factor due to load parameters.
    Keywords: Stress Concentration Factor; Composite Laminate; Edge Interaction; Open Hole Tension; Geometrical parameters; Material parameters; Load parameters.

  • Experimental Study on the Influence of Fiber Surface Treatments and Coconut shell Powder addition on the Compressive strength, Hardness and Tribological properties of Sisal fiber-Natural Rubber Composites.   Order a copy of this article
    by Gopakumar R Nair, Rajesh R 
    Abstract: In the contemporary age of global imbalance and disasters, toxic wastes and their waste disposal is a major concern for the humankind. Development and utilization of natural materials as a viable replacement for synthetic materials in product design and development is the only long-term solution for this problem. This work aims to design and develop an elastomer composite material using 100% natural materials only- natural rubber composite reinforced with sisal fibers with improved tribological and compressive properties. Since rubber products are widely applied in industries and automotive parts, the developed material can find its place in elastomer components. A total of six composites are made with sisal natural fibers subjected to various surface modifications as reinforcement and a 10%w/w coconut shell powder as fillers in a natural rubber matrix. Sisal fibers used are raw fiber, Alkalized fibers, rubber pre-impregnated raw fibers and Rubber Pre-impregnated Alkalized fiber. The specimens are tested for wear resistance, compressive strength and hardness. It is found that sisal is a good reinforcement for enhancing the above properties of natural rubber. Maximum wear resistance exhibited by the Alkalized pre-impregnated Sisal-Rubber composite, followed by raw pre-impregnated-Coconut shell powder-Rubber Composite. The hardness of the composites Raw Sisal-Rubber and Raw Pre-impregnated improved by 228% than pure rubber (25 Shore A). Compressive strengths also improved to a notable level. The Composite raw Sisal-Coconut Shell powder-Rubber has the best compressive strength.
    Keywords: Natural Rubber; Sisal fibers; Elastomer Composite; Hardness; Tribology; Compressive Strength; Bushes.

  • Combined Economic and Emission Dispatch using Whale Optimization Algorithm (WOA)   Order a copy of this article
    by Faseela C K, H. Vennila 
    Abstract: This paper highlight the use of latest Whale Optimization meta heuristic algorithm for solving economic dispatch problem efficiently. This is used to solve the combined economic and emission dispatch problems for standard 3 generators system and 30 bus IEEE system. The Whale Optimization algorithm was found to provide optimum results with easy convergence in comparison with other algorithms like PSO algorithm. Fuel cost and emission costs are combined to derive better result for economic dispatch. For checking the effectiveness of the algorithm, the results obtained using the same are compared with the results of Particle Swarm Optimization (PSO) and analyzed the same against minimum generation cost and easy convergence. The results are found to be excellent for the systems considered.
    Keywords: Particle Swan Optimization (PSO); Whale Optimization Algorithm (WOA); Economic and Emission Dispatch (EED); optimum; solution; fuel cost; emission cost; optimization methodology.

  • Comparative Study of Machine Learning Techniques for Breast Cancer Identification/Diagnosis   Order a copy of this article
    by Ganapathy G, Sivakumaran N, M. Punniyamoorthy, Surendheran R, Srijan Thokala 
    Abstract: This study is sought to determine closely and analyse the results of the diagnostic procedural steps for accurate decision making. The number of new cases of female breast cancer was 124.9 per 100,000 women per year. The number of deaths was 21.2 per 100,000 women per year. It calls for an urge to increase the awareness of breast cancer and very accurately analyse the causes which may differ in minute variations. Also, the significance of classifying the cancer patients based on their tumour types and levels is growing. This is why the application of computation techniques are widely increasing to support the Diagnostic results. In this work, we present the application of several Machine Learning techniques and models like Neural Networking, SVM in machine learning to quantify the classifications. The techniques that are most reliable, accurate and robust are emphasised. It gives a plethora of explorations into the research field for developing predictive models. To achieve higher reliability on the data, we present the comparison of various Machine Learning techniques which has not been done before on a dataset that is available on the website Kaggle with the goal to model the attributes of cancer risk patients to determine the outcome.
    Keywords: Breast Cancer; Machine Learning; Neural Network; FNA; SVM; Kernel; KNN; Naïve Bayes.

  • Automatic Detection and Classification of Brain Tumors using k-Means Clustering with Classifiers   Order a copy of this article
    by Hema Rajini Narayanan 
    Abstract: A brain tumor detection and classification system has been designed and developed. This work presents a new approach to the automated detection and classification of astrocytoma, medulloblastoma, glioma, glioblastoma multiforme and craniopharyngioma type of brain tumors based on k-means clustering and texture features, which separate brain tumor from healthy tissues in magnetic resonance images. The magnetic resonance feature image used for the tumor detection consists of T2-weighted magnetic resonance images for each axial slice through the head. The application of the proposed method for tracking tumour is demon
    Keywords: Magnetic resonance imaging; k-Means clustering; Segmentation; Gray level co-occurrence matrix; Tumor.

  • An Automatic Construction of Domain Ontology to Analyze Competence Prerequisites of Jobs   Order a copy of this article
    Abstract: In many industries, the hiring process is a critical task, where many applicants will be applied for the single position, so it is required to analyze their qualification which ought to suit the requirement. Identifying feasible candidate with the required knowledge and skills is the difficult task which is faced by the organizations. In the earlier work, Job-Know Ontology (JKO) is built, which gives interlink connection among the job, skills and the competence level of the particular job. Nevertheless, this ontology can be utilized to know only the specific job position where various ontologies were required to be built for the various jobs. It is very difficult to make the students start their feasible career. The ontology requires updating manually for time being to adjust the existing competence level. In the proposed work, this issue is rectified through Domain Ontology Construction Framework (DOCF) from the job knowledge thesis and the job requirements details, which are obtained from online. The obtained documents were clustered regarding the content and conceptual similarity based clustering method. From those clustered documents Job-Know ontology will be built. So it is easy to create the information requirements about the job search phase by both candidates and the Human resources (HR) of the industries. It is proved that proposed research method leads to give better result when compared with the existing research method in terms of increased accuracy rate.
    Keywords: Job Requirement Analysis; Competence Level Finding; Domain Ontology Construction; Conceptual Similarity.

  • Performance and Emission Characteristics of a DI Diesel Engine using Diestrol Blends and diesel as fuel   Order a copy of this article
    by BIBIN CHIDAMBARANATHAN, Seeni Kannan Pauldurai, Devan Ponnusamy Kumarasami, Rajesh Rajamoni 
    Abstract: Biofuels, namely, biodiesel and ethanol produced from renewable energy sources are used as fuels in the blended form along with diesel to investigate the performance and emission characteristics of a DI diesel engine. Diestrol blend consists of diesel, biodiesel/methyl ester and ethanol. In diestrol blends, ethanol percentage is steadily elevated with an incremental factor of 5% culminating into three blends with a maximum percentage of 15% by volume and named as EB5, EB10 and EB15 respectively. A comprehensive analysis of engine performance characteristics such as brake thermal efficiency, brake specific fuel consumption, exhaust gas temperature and emission characteristics such as Carbon monoxide, Carbon dioxide, unburned hydrocarbon, oxides of nitrogen and Smoke opacity were carried out. From the above investigation, it was found that brake thermal efficiency increased by 3%, 5% and oxides of nitrogen emission decreased by 23%, 24.5% when compared to diesel and B20 respectively.
    Keywords: diesel engines; diestrol; ethanol; emissions; methyl esters; punnai oil; performance; ternary blends.

Special Issue on: TAMMIE Advances in Supply Chain Operations in Emerging Economies

  • Modelling and analysis of a four stage supply chain under fuzzy environment   Order a copy of this article
    by S. Hemalatha, K. Narayana Rao, G. Rambabu, K. Venkatasubbaiah 
    Abstract: In today's competitive arena, the success of supply chain depends on its managerial ability to integrate and coordinate all stages of the supply chain. The supply chain predominantly consists of four stages in a typical industry, namely: suppliers, manufacturing plants, warehouses, and retailers. Supply chain shall be viewed as multi-objective decision making problem. The objectives include minimisation of cost at suppliers, plants, warehouses and retailers. Fuzzy goal programming approach is useful to solve multi-objective decision making problems. In this paper, the multiple objectives of the supply chain are aggregated using Werner's (1998) compensation operator (γ) and compromise solutions on the decisions of the supply chain is arrived. Risk analysis is performed over the optimised model and the effect of uncertainty in terms of increase in suppliers' price is studied. Fuzzy goal programming model was solved using LINGO 8 software.
    Keywords: supply chain; multi-objective programming; fuzzy logic.
    DOI: 10.1504/IJENM.2018.10014845
  • Lean management planning in Indian cement industries and its effect on industrial psychology   Order a copy of this article
    by B.T.D. Praveen Varma, Dalveer Singh 
    Abstract: Cement industries are one of the growing large scale industries which play as a backbone for developing countries. This paper discusses the analysis of losses and wastage in cement manufacturing process and its rectification using lean tools and methodology mathematically. Employee's psychology varies with every new management planning, so psychology towards new lean management planning is also analysed through questioner to correlate lean management planning satisfaction to stress, job satisfaction, and safety improvement individually using Karl Pearson correlation in SPSS software. The data has been collected from various cement industries at each stage and analysed. Lean management planning resulted in a reduction of wastage in the transportation of mining, over processing and increase in efficiency of the separator in grinding mills, kiln quality control, packing plant efficiency improvement. The correlation analysis also resulted in stress reduction, improvement in job satisfaction and safety conditions with new lean management planning. Finally the result concludes that new lean management planning has positive correlation with the employee's psychology.
    Keywords: lean tools; Karl Pearson correlation; SPSS analysis; organisational culture.
    DOI: 10.1504/IJENM.2018.10014846
  • Elements of a computer aided emergency management system   Order a copy of this article
    by N.M. Sivaram 
    Abstract: Past and recent disasters, both man made (technological) and natural (non-technological) have produced innumerable casualties and unimaginable harm to life and property. Though the management of factories and the authorities has responded to the challenge and introduced number of measures to minimise the hazards, the real fact is that accident cannot be completely eliminated. For this purpose, it is necessary to prepare an emergency preparedness plan for every administrative or industrial area by the competent authorities. With the help of computer simulation models, knowledge of chemicals'; it's behaviour and availability of input data, it is possible to predict the area affected under different emergency scenarios. Keeping in view the plotting requirement along with linkages of various databases, it has been considered appropriate to use computer aided emergency management system for effective mitigation and response during an industrial disaster. This paper proposes a composition of a computer aided emergency management system.
    Keywords: industrial disaster; emergency preparedness; computer aided emergency management system.
    DOI: 10.1504/IJENM.2018.10014847
  • Multi-objective optimisation for the vehicle routing problem using metaheuristics   Order a copy of this article
    by Sonu Rajak, P. Parthiban, R. Dhanalakshmi, S. Sujith 
    Abstract: The capacitated vehicle routing problem is a combinatorial optimisation problem that determines a set of routes of minimum distance to deliver the goods, using a fleet of identical vehicles with restricted capacity. The objective of this article it to optimise the total distance required to deliver the goods and also the workload imbalance in terms of distances travelled by the vehicles and their loads. Due to the combinatorial in nature, it requires metaheuristic to solve these types of problems and this is a rapidly growing field of research. Here two metaheuristics such as ant colony optimisation (ACO) and simulated annealing (SA) are proposed and analysed for solving this multi-objective formulation of the vehicle routing problem. The results obtained from these two methods were compared and found that the ACO gives better results than the SA for the VRP.
    Keywords: vehicle routing problem; VRP; K-means clustering algorithm; simulated annealing; ant colony optimisation; ACO.
    DOI: 10.1504/IJENM.2018.10014848
  • Analysis of lean manufacturing in an automobile industry - a case study   Order a copy of this article
    by S. Mahendran, A. Senthilkumar, R. Jeyapaul 
    Abstract: The automobile industries are more competitive and customer demand is volatile. The customers are willing to buy the product at low cost with high quality. So common principle is created to reduce the wastage and increase the efficiency of the industry. Lean manufacturing is the best principle to adopt the manufacturing industry. The main aim of this project is reduce the wastage, cost and increase the productivity of the industry. Using lean tools just in time (JIT), kanban, value stream mapping (current and future state) and man machine chart (current and future) for reduce wastage and cost. In current state value stream map, the waste area is identified. Finally, non-value added time is reduced to 28.7%. The value added time is reduced to 27.84%. The percentage value addition is increased from 3.25% to 3.29%, the total inventory is reduced to 25.07% and man machine ratio is improved as 1.52: 1.26.
    Keywords: value stream mapping; man machine chart; 5S; just in time; JIT; value addition; value added time; non-value added time; man machine ration; kanban; automobile industry.
    DOI: 10.1504/IJENM.2018.10014849
  • Frame work of conceptual model for quality management in small and medium enterprises   Order a copy of this article
    by S. Gopinath, V.R. Alagu Sundaram, R. Sheshathri, K. Narashiman 
    Abstract: Small and medium enterprises (SMEs) are the backbone of the developing economy, a pushing force the economy all over the globe involving a large workforce. This study aims to explore the obstacles to implement the effective quality system in Indian SMEs. The current scenario of SMEs, detailed literature survey and experts opinion, initiated the authors to design a conceptual model with six critical factors as an independent variables such as quality tools and techniques, total productive maintenance, quality assurance and control, quality certification, employee training and involvement, safety and environment and two dependent variables such as internal customer satisfaction and external customer satisfaction. The moderating variables are also introduced such as top management commitment and supplier relationship management to study the impact of moderator on the relationship between independent variables and dependent variables. The authors are suggesting this conceptual model implement in SMEs, enhance their overall efficiency and responsiveness.
    Keywords: small and medium enterprises; SME; quality management; QM; gross domestic product; GDP; conceptual model; ministry of micro; small and medium enterprises; MSME.
    DOI: 10.1504/IJENM.2018.10014850
  • A case study on hazard evaluation on catering service in educational institution   Order a copy of this article
    by K. Kanaga Sundara Satishwaran, M. Sivasubramanian, S. Aravind Raj 
    Abstract: Hazard evaluation plays a decisive role in the catering service. In order to intensify the safety of the catering service, a hazard assessment and its evaluation is conducted in educational institution. Safety audit is a formal procedure for assessment of the accident potential and expected safety performance for any service or system. Safety audit is being performed with appropriate checklists including occupational hygiene, worker safety, storage and handling and general working conditions. Fault tree analysis (FTA) is a method that directly focuses on the modes of failure. This paper presents FTA for chance of fire accident due to leakage of liquefied petroleum gas (LPG) in storage yard of catering service. Correlation and regression analysis were used to get the lines of regression in order to place it in normal distribution. The probability of fire accident due to leakage of LPG is being calculated and substantial suggestions are provided.
    Keywords: safety audit; fault tree analysis; catering service; educational institution.
    DOI: 10.1504/IJENM.2018.10014851
  • Selection of suppliers using Swara and Copras-G   Order a copy of this article
    by G. Rajesh, P. Malliga 
    Abstract: In order to optimise a supply chain, the effective management of suppliers plays a key role. Firms seeking competitive advantage are participating in cooperative supply chain arrangements, such as strategic partnerships, which combine their individual strengths and unique resources. Supplier selection is a multi-criteria decision making problem which includes both qualitative and quantitative factors. In the present scenario environmental criteria should also be given due importance, this further increases the challenge of supplier selection. Generally, decision makers' judgments are often uncertain and cannot be estimated by an exact numerical value. The grey systems theory is a powerful tool to deal with uncertain information. This paper presents a structured model for evaluation and selection of strategic supplier. Stepwise Weight Assessment Ratio Analysis (SWARA) is applied to decision making in order to calculate the relative importance of the criteria. The COmplex PRoportional ASsessment of alternatives with grey relations (COPRAS-G) method is used for supplier evaluation and selection of strategic supplier. A case study is presented to demonstrate the applicability of the proposed model to select a strategic green supplier.
    Keywords: strategic supplier selection; COPRAS-G; SWARA; MCDM; green supplier selection.
    DOI: 10.1504/IJENM.2018.10014852

Special Issue on: Enterprise Network Management Technologies and Tools for E-commerce, Mobile Commerce and Social Commerce Frameworks

  • SaaS Multitenant Performance Testing Over Social Networks   Order a copy of this article
    by Parthiban M 
    Abstract: Recent years, cloud computing is description for facilitating suitable on-demand network access. In cloud, computing multi-tenancy plays a significant role on software as a service (SaaS). Structure of SaaS multi-tenant cloud aware applications initiates several new challenges the central one being a tenant. In cloud testing, tenant applications need to be tested in addition to performance testing be used. At the same time as numerous performance-testing techniques exist; most of them produce only fixed progressions of test configurations. This paper focuses on the challenges for Multi-tenancy testing in SaaS and analyses the configuration dynamically in which SaaS testing differs from testing conventional applications. The paper proposes performance testing and fittest function of each tenant. For fitness function, GASE algorithm is used which combines a Genetic algorithm and a Symbolic execution. This proposed algorithm uses the above performance testing values for obtaining the best of each tenant, in the form of fitness generations. A real experimentation is proposed using a multiple tenants on Open Stack cloud computing environment over Social networks.
    Keywords: SaaS Cloud; Multi-tenant Testing; Software Testing; Performance Testing; Fitness Generations.

    by Manivannan Ramanathan 
    Abstract: Todays global technology has various security treats which made the identity protection essential among users for establishing communication over internet. Generally these identity protecting network were well known as anonymous communication networks. Mix networks are multistage systems which provide efficient mechanisms for anonymous communication over internet. According to which these networks have various traffic analysis attacks which need to compromise the identities of users. The major objective of this paper is to present a diversity mix techniques against traffic analysis attacks, disclosure attack and spam attack. In this work, we propose traffic re-allocation which involves in varying the size as well as number of messages in the network. By means of enabling this bursting and blending of messages among the network nodes the attacker get confused with the varied message count and sizes. The performance of our proposed work is examined against the three attacks in order to check its security and anonymity. The obtained result proves the effectiveness of our proposed techniques.
    Keywords: Mix networks; Disclosure attacks; Spam Attack; Traffic analysis attacks; Burst Mix and Blend Mix.

  • Entropy a new measure to gauge search engine optimization   Order a copy of this article
    by Batri Krishnan 
    Abstract: This article tries to analyze, and measure the uncertainty associated with the relevant document selection in web-search engines. The web-search engines process, organize the web-documents based on their index term's occurrence frequency. The number of index terms, and their occurrence frequency influences the relevance calculation. The variation in term frequency either in processed web documents or in users' query influences the relevance calculation. This leads to an uncertainty associated with the document selection, and its relevance calculation. In this article, we proposed a new measure called Entropy, to calculate the uncertainty associated with the document selection. The Entropy can be measured by varying the documents' term frequency or user's query term frequency. As the web documents can't be changed, we used variation in user's query term frequency to measure the uncertainty associated with the document selection in web-search engines. The experiments are conducted on two search engines namely 'Google', and 'Bing'. The query's term frequency is varied and given to the search engines. Based on our proposed method, the uncertainty is calculated for the search engines. The high Entropy value indicates the high uncertainty associated with the document selection. The high uncertainty gives scope for search engine optimization. From the high uncertainty search engines, we can extract more relevant documents. It can be used as a performance indicator.
    Keywords: web search engines; uncertainty; entropy; document selection; Google; Bing; Search Engine optimization.

    by RAVISHANKAR Sathasivam, S. KUPPUSAMY 
    Abstract: The major worldwide corporations have been rising to the challenge that the talent management is more complicated and entangled. This study is mainly emphasized on the success of organization due to obtain talent management and also retain the talent employees in the best way of highlighting selected IT companies. The aim of this research is mainly spotlight on retain the employees by the way of managing their talent in selected IT companies. The sample size has been taken as 150 by using simple random basis. For proofing the hypotheses setting, percentage analysis, mean score analysis, Anova analysis, Chi-square analysis and Correlation analysis have been used in this research. This study also emphasized regarding the employees are benefited and more equipped with the programmes related to talent management. And also in this research, the additional calculations are revealed the understanding of the programs helps to retain the employees. The analysis mainly focused that majority of the respondents are satisfied with the result of this program. Nearly all the employees stated that the programs related to talent management are enhancing the good working output and also decrease the employee turnover in the organization. The majority of the respondents are highly satisfied towards the talent management program helps to show out the strength and weakness of the employees.
    Keywords: Talent Management Practices; IT companies; Retention; Satisfaction.

  • Classification Approach to Avoid Link Failures in Wireless Sensor Networks in Mobile Virtual communities and teleworking   Order a copy of this article
    by Manthandi Periannasamy Subramanian 
    Abstract: Security issues are the primary issues in Wireless Sensor Networks (WSN) due to its large network coverage and number of nodes. The attackers in WSN attack the particular node which has low energy level and converts this node into malicious node. The formation of malicious node is the primary reason for link failures between nodes. This paper proposes an efficient methodology to detect the malicious nodes in WSN using feed forward back propagation neural netwok classifier. This classifier differentiates the malicious node from trusty node based on the extracted features of the test node. The performance of the proposed malicious node detection system is analyzed interms of detection rate, Packet Delivery Ratio (PDR) and latency. The experimental results are compared with state-of-art methods
    Keywords: Security; malicious nodes; features; PDR; link failures.

  • Wireless system for flight safety industry   Order a copy of this article
    by Kavitha V 
    Abstract: Many parameters can be measured and stored in the black box. The details stored in the black box are essential for the analysis of causes of the accident. In the formal black box, data is stored and it can be retrieved only after the identification of black box after crash. So it is very difficult to identify the exact location of the black box after a crash. Many leading officials and famous personalities died in air crashes and it takes a lot of time to identify the location of crash. It leads to wastage of money and time. Saving human life is the basic nature of humanity. In this article, black box data is transmitted to an earth station. The details are updated to the base station through wireless medium. It is transmitted to selected base stations by calculating the shortest path between them using ad hoc algorithm. Ad hoc algorithm is a multi hop network algorithm which switches to various stations by calculating its distance. Thus black box data is updated to base station wirelessly using ad hoc algorithm.
    Keywords: Flight data recorder; Ad hoc algorithm; wireless communication; black box; on board data.

  • An Anomaly-based Network Intrusion Detection System using Ensemble Clustering   Order a copy of this article
    by Jackins V 
    Abstract: Due to the rapidly increasing use of internet services and computer applications all over the world, the numbers of hacking and intrusion incidents are increasing year on year as technology rolls out. Therefore, Intrusion Detection Systems (IDS) are the prime need in todays scenario [1]. Misuse detection can detect previously known attacks but cannot detect new types of attacks[24]. To overcome this limitation Anomaly detection techniques are often used and proven to be an effective method. Anomaly detection can make use of unsupervised techniques to identify new types of attacks [12]. In this paper, an unsupervised technique is used for Anomaly detection based on hybrid clustering algorithms. The technique uses two algorithms in order to obtain accurate and high detection rate of attacks. [15] Incremental Support Vector Machine (ISVM) algorithm is used to preprocess the dataset. After Preprocessing, Fuzzy C Means (FCM) algorithm is adopted to detect the anomalies. FCM algorithm isolates the normal and abnormal data effectively. The processed data is fed to the DBSCAN algorithm for further detection of anomalies. The results of the detection system are communicated to the Intrusion Prevention System (IPS) which is responsible for sharing a suitable response to an anomalous request. The proposed hybrid algorithm is applied for KDD Cup 1999 dataset, Gure Kdd Cup data base (2008) and the results shows high detection rates and low false positive alarms. Further, the technique is tested with a real time data and it is observed that a high detection rate of anomalies with enhanced true positive rate.
    Keywords: Intrusion Detection System (IDS); Intrusion Prevention System (IPS).

  • Power Efficient Digital Circuits for ECG Front End Data Acquisition Mobile System   Order a copy of this article
    by Sasi Kala 
    Abstract: The electrical motion of the heart is characterized by the ECG signal. ECG elucidation can be used to detect the heart syndrome. This technology has an efficient diagnostic tool, due to the high regard of portable electronic products, low power system has fascinated more consideration in recent years. This work presents digital ECG data acquisition system to diminish the power consumption .In the proposed work, analog block are not used, they convert the input voltage into a digital code by delay lines. This digital architecture is capable of operating with a low supply voltage such as 0.3 V and 0.1 V. In this architecture analog blocks such as low-noise amplifier (LNA) and filters are not used. A digital feedback loop is employed to cancel the impact of the dc offset on the circuit, which eliminates the requirements for coupling capacitors. The circuit is implemented in 130nm and 65nm CMOS process. The simulation results illustrate that the front-end circuit of digital architecture for 130nm consumes 18.9pW and 65nm consumes 109pW of power.
    Keywords: ECG; analog; digital; acquisition; delay; offset.

  • Three phase optimization for Qualified and Secured VMs for Resource Allocation   Order a copy of this article
    by Dhanya D Aidhan, Arivudainambi D 
    Abstract: Cloud computing services enable the users to use required computing resources for the required period which thereby permit the users to build a flexible information system. Choosing genuine and secured Virtual Machines (VM) among thousands of virtual machines is one of the main challenges in resource allocation to achieve higher accuracy. In this paper, VM optimization techniques namely match making algorithm, memory aware VM and cuckoo technique is incorporated to select the best and secured virtual machine from cloud. In the proposed technique the first two are combined to select the best VM, where cuckoo is used to provide optimized resources to the finest VM. During the selection of finest VM from above techniques, it is necessary to select secured VMs to achieve an optimum result during resource allocation. To select secured VM, signature based detection and secure counters are employed to analyze network traffic and to monitor the data transactions.
    Keywords: Virtual machine; resource allocation; match making algorithm; memory aware scheduling; cuckoo optimization technique.

  • Determinants of Smartwatch Adoption among IT professionals An Extended UTAUT2 Model for Smartwatch Enterprise   Order a copy of this article
    by Kranthi Kumar Alampuri, Asraar Ahmed 
    Abstract: Smartwatches these days have gained popularity in recent past under wearable device category. The main objective behind this current study is to identify the determinants of smart watch. To accomplish this objective, the present study has employed Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model as its theoretical background. To suit the context the present study has extended UTAUT2 model by incorporating self-efficacy (SEF), personal innovativeness (PINNO), social media influence (SMI), social image (SIMG), aesthetics (AES) and external social influence (ESI). Structural equation modeling is done using Smart PLS 2.0 in order to check the explanatory power in extended UTAUT2 model. The results obtained in this study concludes that the extended UTAUT2 model has a better explanatory power on behavioral intention towards smartwatch adoption. Effect size (f2) and predictive relevance (Q2) for the extended UTAUT2 model are discussed.
    Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT2); smartwatch; social image; social media influence; wearable device.

  • A Framework for Antecedents of Trust in Social Commerce   Order a copy of this article
    by Radwan Al-Dwairi, Emad Abu-Shanab, Mohammad Daradkeh 
    Abstract: Trust is essential in social commerce environment, where consumers rely on feedback and advice that they collect from social platforms. Despite the importance of trust in virtual environments, there are a limited number of studies in this field. Research need to identify the main drivers that establish trust in social commerce domain. To this end, this study reviewed the literature related to trust in social commerce environment and proposed a framework for the antecedents of trust in social commerce. The proposed framework suggests two main components: social networking site and social company. The results supported nine hypotheses out of ten excluding the relationship between perceived-ease-of-use (PEOU) and content quality. Word-of-mouth, communication, perceived ability, after sale service, trust in transaction, and perceived usefulness were found as key factors that significantly impacted trust in social commerce. The model explained 33.2% of the variance in trust in social commerce.
    Keywords: Social commerce; trust; web 2.0; social media; ability; after sale service; communication; word-of-mouth.

  • Authentication as a service in cloud from a fuzzy perspective   Order a copy of this article
    by S. Vijayalakshmi, G.R. Karpagam 
    Abstract: In a cloud based online voting system, the life cycle starts with voter registration, authentication, voting and counting. The election process is a secret process as whole democratic administration is centralised on voting. Authentication, confidentiality, integrity, scalability, speeds and accuracy these are few important criteria to be satisfied by an online voting system. Authentication can be considered as the most critical issue among all the above. So the voters should be kept at the highest priority to make the voting process fair and effective. Through some of the literatures that deal with the issue of authentication mechanisms, the proposed method conceals the original biometric template such that it is impossible to recover the biometric template even when the stored data in the system is open to an attacker. We assess the system with relativity matrix between security requirements, issues, techniques and mechanisms.
    Keywords: authentication; cloud security; fuzzy commitment; online voting system.

  • An Empirical Study on Customer Adoption of Mobile Payment Application in India   Order a copy of this article
    by James Joseph, Sriram K V, Lewlyn L. R. Rodrigues, Asish Oommen Mathew, Gana K C 
    Abstract: Digital economy is becoming a reality. Business all over the world is moving towards digital platform and so is the payment option. Mobile application is becoming one of the easiest and fastest option for making payments and is predicted to have a very large potential in the days to come.This paper discusses the customer adoption of mobile payment application. The study reveals that the factors like Usefulness, Pervasiveness, Ease of Use, Offers & Cash back and Service assume a vital role in encouraging adoption of mobile payment applications. Results show customers have greater preference towards mobile payment applications over the mobile web browsers, which is a clear sign of awareness among the customers. The study also showed that teenagers are more aggressive in embracing mobile payment application than the older age groups.Compared to other modes of payments, mobile payment with 14.5% preference among customers is low and there is a need for aggressive promotions and marketing campaigns. The study throws light into the customer adoption factors which can act as guidelines for improving customer adoption and awareness of mobile payment applications.
    Keywords: Mobile Payment Application;Customer adoption; Smart Phone; Merchant Acquisition; Digital Payment; Ease of Use; Usefulness; Service.

  • Ontology based Effective Information Retrieval from the Social Web Using Concept aware User Profile Construction   Order a copy of this article
    Abstract: Improved utilization of network based communication enhances the amount of document generation from which discovery and taking back of user needed documents depends upon their requirements is a very complicated task. This could be solved by building the personalized user profile depending on their interest by utilizing which user needed documents that are alike to their inquiry could be got back. In the previous work, Information Retrieval System utilizing Differential Weighting Scheme (IRS-DWS) has been presented that builds the user profile with the point of subjects and recurrent terms exists in the user retrieved documents. On the other hand, this work does not focus on the idea of user queries and take back the documents wherein terms concerned more devoid of thinking the concept. In addition, the previous works do not concentrate on the identical demands from the numerous users where it will process individual user needs only, therefore it will result in more computational overhead. This issue is solved in this work by presenting Improved Information Retrieval System utilizing Cooperative Ontological based User Profile Construction (IIRS-COUPC). In this research work, cooperative ontology based user profile (COUP) is built to take back the documents from diverse ideas that matches with the users demand. In order to make simplicity of document looking for process and merges the numerous users with identical demands, documents clustering (DC) and Query Clustering (QC) is accomplished in this work independently. Lastly, Concept Mapping (CM) is accomplished to take back the documents which matches with the user needs proficiently. The whole assessment of the current research work is accomplished in the java simulation environment from which it is shown that the current research methodologies confirms its improved performance.
    Keywords: Keywords--- Information Retrieval; Similarity; Personalized Search; Clustering; Ontology Profile Construction.

    by Amiruddin Ahamat, Muhammad Sham Shahkat Ali, Nor Akmal Nabihah Zahari 
    Abstract: Today, online marketing is one of the most popular business trends. It has high demand and becomes one of the important tools to market products to the consumers by using the internet. Theres a rapid growth in online marketing over the last 10 years. Various applications were used to attract consumers to use it. In online marketing, brand image of the product was often highlighted. The brand image can give a huge impact to the marketer and the consumer as the buyer of the product. The brand image factor can also motivate consumer in their purchasing decision because the brand image may reflect the product itself. The purpose of this paper is to elaborate the relation between the awareness of a brand and the intention of buying a brand. There were several brand image factors highlighted in this research which is pricing, advertisement, brand name and quality of the product. A quantitative method was used through an online questionnaire in order to prove the factors that can affect the brand image in online marketing among university students. SPSS software was used to analyse and test the reliability and validity of data. Based on the results, several factors were identified as the contributing effect on a brand image which is the price of a product, advertisement of product and the quality of a product. This research was conducted in order to give the reader especially online marketer more information about various factors that can make people attracted to buy a product in online marketing.
    Keywords: Online marketing; Brand image; Brand image factors.

  • Multisite Aggregate Production and Distribution Planning: A Review   Order a copy of this article
    by Satya Prakash, Gunjan Soni, Vipul Jain, Gaurav Kumar Bhatodiya, Murari Lal Mittal 
    Abstract: Increase in the demand of products causes a company to change its manufacturing system from single-plant to multi-plant (or, multi-site) with an objective to gain competitive advantage in the global manufacturing scenario. Multi-site production and distribution (P-D) planning have been studied and practiced by the researchers and practitioners over the past two decades. A good size of literature has been published and trend is continuing. In the light of impact of multi-site manufacturing in gaining commercial advantage in global competition scenario, this review is dedicated to multi-site aggregate production planning (MSAPP) and multi-site aggregate P-D planning (MSAPDP). This review focuses on analyzing the major research gaps and unaddressed areas of MSAPP/MSAPDP. It has been felt that switching from discrete to continuous, and pure mathematical to simulation and agent based models along with consideration of economical and environmental aspects have become very important to effectively deal with real world MSAPP/MSAPDP problems.
    Keywords: Supply chain; Multi-site manufacturing; Aggregate production planning; Aggregate P-D planning.

  • Stress of new age entrepreneurs and its implications of affecting heart-alerting-heart using MIOT   Order a copy of this article
    by V.K. Ajay, L. Vijay, K. Manivel 
    Abstract: Cardiologists, across the globe, opine that 25% of death in the age band between 2570 years is mainly caused by high stress ambience they are subjected to in their work place especially professionals like first generation entrepreneurs. It is found that the common health issues like depression, anxiety, addiction, sleeping disorders are leading more and more of heart disease and heart attacks. The system proposed here uses an advanced technology called MIOT system in the form of a wristwatch to detect and analyse the parameter deviations on the person who is wearing this wristwatch.
    Keywords: stress; entrepreneurs; heart attack; internet of things; IOT.

  • Determinants of online consumer behaviour towards e-tailing in India   Order a copy of this article
    by Asma Khan, Asif Ali Syed 
    Abstract: Internet has brought a revolution in the way we live today. This paper aims to provide an overview of the e-tail scenario in India and study the factors that influence the online buying behaviour of e-consumers. It explores the various issues, opportunities and endeavours to draw an effective e-tailing strategy for Indian online sector based upon extensive the literature reviewed and factors assimilated on e-tailing models from Indian and global studies. The research also suggests ways in which the e-tailers can recuperate their virtual presence and enhance online consumer purchases and revisits. The contributions of the findings would attempt to assist policy makers, e-marketers and provide an insight for further research exploring the gaps in this important social and commercial economic discipline which impacts each and everyone of us.
    Keywords: e-consumers; e-tailing; e-shopper; e-marketing; India.