Abstract: Image steganography is the best aspect of information hiding. In this, the information is hidden within an image and the image travels openly on the Internet. The Least Significant Bit (LSB) is one of the most popular methods of image steganography. In this method, the information bit is hidden at the LSB of the image pixel. In one bit LSB steganography method, the total numbers of the pixels and the total number of message bits are equal to each other. In this paper, the LSB method of image steganography is used for watermarking. The watermarking is an application of the steganography. The watermark contains 80*88 pixels and each pixel requirs 8 bits for its binary equivalent form so, the total number of bits required to hide the watermark are 80*88*8(56320). The experiment was performed on standard 256*256 and 512*512 size images. After the watermark insertion, histogram analysis was performed. A noise factor (salt and pepper) of 0.02 was added to the stego image in order to evaluate the robustness of the method. The watermark was successfully retrieved after insertion of noise. An experiment was performed in order to know the imperceptibility of stego and the retrieved watermark. It is clear that the LSB watermarking scheme is robust to the salt and pepper noise.
Abstract: In this paper, an approach is presented to investigate the performance of Pixel Factor Mapping (PFM) and Extended PMM (Pixel Mapping Method) through the qualitative and quantitative approach. These methods are tested against a number of well-known image similarity metrics and statistical distribution techniques. The PFM has been performed in spatial domain as well as frequency domain and the Extended PMM has also been performed in spatial domain through large set of images available in the internet.
Abstract: Net Neutrality (NN) is the principle of treating all online data the same without any prioritization of some over others. A research gap in current scholarship about “violations of NN” and the subsequent ethical concerns paves the way for the following research question: To what extent violations of NN entail ethical concerns and implications for Internet stakeholders? To answer this question, NR is examined using the two major action-based ethical theories, Kantian and Utilitarian, across the relevant Internet stakeholders. First some necessary IT background is provided that shapes how the Internet works and who the key stakeholders are. Following the IT background, the relationship between the stakeholders, users, Internet Service Providers (ISPs) and content providers is discussed and illustrated. Then some violations of NN that are currently occurring is covered, without attracting any attention from the general public from an ethical perspective, as a new term Net Regularity (NR). Afterwards, the current scholarship on NN and its violations are discussed, that are mainly from an economic and sociopolitical perspectives to highlight the lack of ethical discussions on the issue. Before moving on to the ethical analysis however, websites are presented as digital entities that are affected by NR and their happiness is measured using functionalism. The analysis concludes that NR is prone to an unethical treatment of Internet stakeholders in the perspective of both theories. Finally, the current Digital Divide in the world is presented to be able to better illustrate the implications of NR. The implications present the new Internet divide that will take place between individuals within society. Through answering the research question using ethical analysis, it attempts to shed some light on the issue of NR and what kind of society it would lead to. NR would not just lead to a divided society, but divided individuals that are separated by something greater than distance, the Internet.
Abstract: Nowadays, big companies such as Google, Microsoft,
which have adequate proxy servers, have perfectly implemented
their web crawlers for a certain website in parallel. But due to
lack of expensive proxy servers, it is still a puzzle for researchers
to crawl large amounts of information from a single website in
parallel. In this case, it is a good choice for researchers to use
free public proxy servers which are crawled from the Internet. In
order to improve efficiency of web crawler, the following two issues
should be considered primarily: (1) Tasks may fail owing to the
instability of free proxy servers; (2) A proxy server will be blocked
if it visits a single website frequently. In this paper, we propose
Proxisch, an optimization approach of large-scale unstable proxy
servers scheduling, which allow anyone with extremely low cost to
run a web crawler efficiently. Proxisch is designed to work efficiently
by making maximum use of reliable proxy servers. To solve second
problem, it establishes a frequency control mechanism which can
ensure the visiting frequency of any chosen proxy server below the
website’s limit. The results show that our approach performs better
than the other scheduling algorithms.
Abstract: Today Internet has very important role to promote products and services all over the world. Companies and destinations in tourism industry use Internet to sell and to promote their core products to directly potential tourists. Internet technologies have redefined the relationships between tourists, tourism companies, and travel agents. The new relationship allows for accessing and tapping tourism information and services. Internet technologies ensure new opportunities to available for the tourism industry, including travel accommodation, and tourist destination organizations. Websites are important devices to the marketing of a destination. Most people make a research about the destination before arriving via internet. Governments have a considerable role in the process of marketing tourism destinations. Governments make policies and regulations; furthermore, they help to market destinations to potential tourists. Governments have a comprehensive overview of the sector to see changes in tourism market and design better policies, programs and marketing plans. At the same time, governments support developing of alternative tourism in the country with regulations and marketing tools. The aim of this study is to analyse of an Internet website of governmental tourism portal in Turkey to determine effectiveness about gastronomy tourism. The Turkish government has established a culture portal for foreign and local tourists. The Portal provides local and general information about tourism attractions of cities and Turkey. There are 81 official cities in Turkey and all these cities are conducted to analyse to determine how effective marketing is done by Turkish Government in the manner of gastronomy tourism. A content analysis will be conducted to Internet website of the portal with food content, recipes and gastronomic feature of cities.
Abstract: The research aimed to study the satisfaction of Suan Sunandha Rajabhat University students towards the university radio station which broadcasts in both analog on FM 97.25 MHz and online via the university website. The sample used in this study consists of undergraduate students year 1 to year 4 from 6 faculties i.e. Faculty of Education, Faculty of Humanities and Social Sciences, Faculty of Management Science and Faculty of Industrial Technology, and Faculty of Fine and Applied Arts totaling 200 students. The tools used for data collection is survey. Data analysis applied statistics that are percentage, mean and standard deviation. The results showed that Suan Sunandha Rajabhat University students were satisfied to the place of listening service, followed by channels of broadcasting that cover both analog signals on 97.25 MHz FM and online via the Internet. However, the satisfaction level of the content offered was very low. Most of the students want the station to improve the content. Entertainment content was requested the most, followed by sports content. The lowest satisfaction level is with the broadcasting quality through analog signal. Most students asked the station to improve on the issue. However, overall, Suan Sunandha Rajabhat University students were satisfied with the university radio station broadcasted online via the university website.
Abstract: Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.
Abstract: Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.
Abstract: This research aims to develop ways of lodging
business management of Bang Khonthi community in Samut
Songkram province that are appropriate with the cultural context of
the Bang Khonthi community.
Eight lodging business owners were interviewed. It was found that
lodging business that are family business must be done with passion,
correct understanding of self, culture, nature, Thai way of life,
thorough, professional development, environmentally concerned,
building partnerships with various networks both community level,
and public sector and business cohorts. Public relations should be
done through media both traditional and modern outlets, such as
websites and social networks to provide customers convenience,
security, happiness, knowledge, love and value when travel to Bang
Khonthi. This will also help them achieve sustainability in business,
in line with the 10 Home Stay Standard Thailand.
Suggestions for operators are as follows: Operators need to
improve their public relations work. They need to use technology in
public relations such as the internet. Management standards must be
improved. Souvenir and local products shops should be arranged in
the compound. Product pricing must be set accordingly. They need to
join hands to help each other. Quality of the business operation
should be raised to meet the standards. Educational measures to
reduce the impact caused by tourism on the community such as
efforts to reduce energy consumption.
Abstract: In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.
Abstract: The Internet of Things (IoT) field has been applied in
industries with different purposes. Sensing Enterprise (SE) is an
attribute of an enterprise or a network that allows it to react to
business stimuli originating on the Internet. These fields have come
into focus recently on the enterprises, and there is some evidence of
the use and implications in supply chain management, while
finding it as an interesting aspect to work on. This paper presents a
revision and proposals of IoT applications in supply chain
management.
Abstract: Since the advances in digital imaging technologies have led to
development of high quality digital devices, there are a lot of illegal copies
of copyrighted video content on the Internet. Also, unauthorized editing is
occurred frequently. Thus, we propose an editing prevention technique for
high-quality (HQ) video that can prevent these illegally edited copies from
spreading out. The proposed technique is applied spatial and temporal gradient
methods to improve the fidelity and detection performance. Also, the scheme
duplicates the embedding signal temporally to alleviate the signal reduction
caused by geometric and signal-processing distortions. Experimental results
show that the proposed scheme achieves better performance than previously
proposed schemes and it has high fidelity. The proposed scheme can be used
in unauthorized access prevention method of visual communication or traitor
tracking applications which need fast detection process to prevent illegally
edited video content from spreading out.
Abstract: Recently, numerous documents including large
volumes of unstructured data and text have been created because of the
rapid increase in the use of social media and the Internet. Usually,
these documents are categorized for the convenience of users. Because
the accuracy of manual categorization is not guaranteed, and such
categorization requires a large amount of time and incurs huge costs.
Many studies on automatic categorization have been conducted to help
mitigate the limitations of manual categorization. Unfortunately, most
of these methods cannot be applied to categorize complex documents
with multiple topics because they work on the assumption that
individual documents can be categorized into single categories only.
Therefore, to overcome this limitation, some studies have attempted to
categorize each document into multiple categories. However, the
learning process employed in these studies involves training using a
multi-categorized document set. These methods therefore cannot be
applied to the multi-categorization of most documents unless
multi-categorized training sets using traditional multi-categorization
algorithms are provided. To overcome this limitation, in this study, we
review our novel methodology for extending the category of a
single-categorized document to multiple categorizes, and then
introduce a survey-based verification scenario for estimating the
accuracy of our automatic categorization methodology.
Abstract: E-retailing is the sale of goods online that takes place
over the Internet. The Internet has shrunk the entire World. World eretailing
is growing at an exponential rate in the Americas, Europe
and Asia. However, e-retailing costs require expensive investment,
such as hardware, software, and security systems. Cloud computing
technology is internet-based computing for the management and
delivery of applications and services. Cloud-based e-retailing
application models allow enterprises to lower their costs with their
effective implementation of e-retailing activities. In this paper, we
describe the concept of cloud computing and present the architecture
of cloud computing, combining the features of e-retailing. In
addition, we propose a strategy for implementing cloud computing
with e-retailing. Finally, we explain the benefits from the
architecture.
Abstract: Cloud computing has emerged as a promising
direction for cost efficient and reliable service delivery across data
communication networks. The dynamic location of service facilities
and the virtualization of hardware and software elements are stressing
the communication networks and protocols, especially when data
centres are interconnected through the internet. Although the
computing aspects of cloud technologies have been largely
investigated, lower attention has been devoted to the networking
services without involving IT operating overhead. Cloud computing
has enabled elastic and transparent access to infrastructure services
without involving IT operating overhead. Virtualization has been a
key enabler for cloud computing. While resource virtualization and
service abstraction have been widely investigated, networking in
cloud remains a difficult puzzle. Even though network has significant
role in facilitating hybrid cloud scenarios, it hasn't received much
attention in research community until recently. We propose Network
as a Service (NaaS), which forms the basis of unifying public and
private clouds. In this paper, we identify various challenges in
adoption of hybrid cloud. We discuss the design and implementation
of a cloud platform.
Abstract: Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having her own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.
Abstract: This paper deals with various questions related to
functionality and providing banking services in the European union
on the Internet. Due to the fact that we live in the information
technologies era, the Internet become a new space for doing
economic and business activities in all areas, and especially important
in banking. Accepting the busy tempo of life, in the past several years
electronic banking has become necessity and a must for most users of
banking services. On a sample of 300 web sites of the banks
operating in European Union (EU) we conduct the research on the
functionality of e-banking services offered through banks web sites
with the key objective to reveal to what extent the information
technologies are used in their business operations. Characteristics of
EU banks websites will be examined and compared to the basic
groups of business activities on the web. Also some
recommendations for the successful bank web sites will be provided.
Abstract: Despite the highly touted benefits, emerging
technologies have unleashed pervasive concerns regarding unintended
and unforeseen social impacts. Thus, those wishing to create safe and
socially acceptable products need to identify such side effects and
mitigate them prior to the market proliferation. Various methodologies
in the field of technology assessment (TA), namely Delphi, impact
assessment, and scenario planning, have been widely incorporated in
such a circumstance. However, literatures face a major limitation in
terms of sole reliance on participatory workshop activities. They
unfortunately missed out the availability of a massive untapped data
source of futuristic information flooding through the Internet. This
research thus seeks to gain insights into utilization of futuristic data,
future-oriented documents from the Internet, as a supplementary
method to generate social impact scenarios whilst capturing
perspectives of experts from a wide variety of disciplines. To this end,
network analysis is conducted based on the social keywords extracted
from the futuristic documents by text mining, which is then used as a
guide to produce a comprehensive set of detailed scenarios. Our
proposed approach facilitates harmonized depictions of possible
hazardous consequences of emerging technologies and thereby makes
decision makers more aware of, and responsive to, broad qualitative
uncertainties.
Abstract: Nowadays, the Web has become one of the most
pervasive platforms for information change and retrieval. It collects
the suitable and perfectly fitting information from websites that one
requires. Data mining is the form of extracting data’s available in the
internet. Web mining is one of the elements of data mining
Technique, which relates to various research communities such as
information recovery, folder managing system and simulated
intellects. In this Paper we have discussed the concepts of Web
mining. We contain generally focused on one of the categories of
Web mining, specifically the Web Content Mining and its various
farm duties. The mining tools are imperative to scanning the many
images, text, and HTML documents and then, the result is used by
the various search engines. We conclude by presenting a comparative
table of these tools based on some pertinent criteria.
Abstract: The use of IT equipment has become a part of every
day. However, each device that is part of cyberspace should be
secured against unauthorized use. It is very important to know the
basics of these security devices, but also the basics of safe conduct
their owners. This information should be part of every curriculum
computer science education in primary and secondary schools.
Therefore, the work focuses on the education of pupils in primary and
secondary schools on the Internet. Analysis of the current state
describes approaches to the education of pupils in security issues on
the Internet. The paper presents a questionnaire-based survey which
was carried out in the Czech Republic, whose task was to ascertain
the level of opinion pupils in primary and secondary schools on the
issue of communication in social networks. The research showed that
awareness of socio-pathological phenomena on the Internet
environment is very low. Based on the results it was proposed
appropriate ways of teaching to this issue and its inclusion a proposal
of curriculum for primary and secondary schools.