Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: Quality of Service (QoS) Routing aims to find path between source and destination satisfying the QoS requirements which efficiently using the network resources and underlying routing algorithm and to fmd low-cost paths that satisfy given QoS constraints. One of the key issues in providing end-to-end QoS guarantees in packet networks is determining feasible path that satisfies a number of QoS constraints. We present a Optimized Multi- Constrained Routing (OMCR) algorithm for the computation of constrained paths for QoS routing in computer networks. OMCR applies distance vector to construct a shortest path for each destination with reference to a given optimization metric, from which a set of feasible paths are derived at each node. OMCR is able to fmd feasible paths as well as optimize the utilization of network resources. OMCR operates with the hop-by-hop, connectionless routing model in IP Internet and does not create any loops while fmding the feasible paths. Nodes running OMCR not necessarily maintaining global view of network state such as topology, resource information and routing updates are sent only to neighboring nodes whereas its counterpart link-state routing method depend on complete network state for constrained path computation and that incurs excessive communication overhead.
Abstract: The objective of this research work is to discuss the concept of “green growth” in the Republic of Kazakhstan introduced by its government in the “National Sustainable Development Strategy” with the objective of transition to a resource-efficient, “green economy.” We believe that emerging economies like Kazakhstan can pursue a cleaner and more efficient development path by introducing an environmental tax system based on resource consumption rather than only income and labor. The key issues discussed in this article are the eco-efficiency, which refers to closing the gap between economic and ecological efficiencies, and the structural change of the economy toward “green growth.” We also strongly believe that studying the experience of East Asian countries on “green reform” including eco-innovation and “green solutions” in business is essential to the case of Kazakhstan. All of these will raise the status of Kazakhstan to the level of one of the thirty developed countries over the next decades.
Abstract: Implementing Information Technology/ Information
System (IT/IS) is critical for every industry as its potential benefits
have been to motivate many industries including the Malaysian
construction industry to invest in it. To successfully implement IT/IS
has become the major concern for every organisation. Identifying the
critical success factors (CSFs) has become the main agenda for
researchers, academicians and practitioners due to the wide number
of failures reported. This research paper seeks to identify the CSFs
that influence the successful implementation of IT/IS in construction
industry in Malaysia. Limited factors relating to people issue will be
highlighted here to showcase some as it becomes one of the major
contributing factors to the failure. Three (3) organisations have
participated in this study. Semi-structured interviews are employed as
they offer sufficient flexibility to ensure that all relevant factors are
covered. Several key issues contributing to successful
implementations of IT/IS are identified. The results of this study
reveal that top management support, communication, user
involvement, IT staff roles and responsibility, training/skills, leader/
IT Leader, organisation culture, knowledge/ experience, motivation,
awareness, focus and ambition, satisfaction, teamwork/ collaboration,
willingness to change, attitude, commitment, management style,
interest in IT, employee behaviour towards collaborative
environment, trust, interpersonal relationship, personal characteristic
and competencies are significantly associated with the successful
implementations of IT/IS. It is anticipated that this study will create
awareness and contribute to a better understanding amongst
construction industry players and will assist them to successfully
implement IT/IS.
Abstract: Web usage mining has become a popular research
area, as a huge amount of data is available online. These data can be
used for several purposes, such as web personalization, web structure
enhancement, web navigation prediction etc. However, the raw log
files are not directly usable; they have to be preprocessed in order to
transform them into a suitable format for different data mining tasks.
One of the key issues in the preprocessing phase is to identify web
users. Identifying users based on web log files is not a
straightforward problem, thus various methods have been developed.
There are several difficulties that have to be overcome, such as client
side caching, changing and shared IP addresses and so on. This paper
presents three different methods for identifying web users. Two of
them are the most commonly used methods in web log mining
systems, whereas the third on is our novel approach that uses a
complex cookie-based method to identify web users. Furthermore we
also take steps towards identifying the individuals behind the
impersonal web users. To demonstrate the efficiency of the new
method we developed an implementation called Web Activity
Tracking (WAT) system that aims at a more precise distinction of
web users based on log data. We present some statistical analysis
created by the WAT on real data about the behavior of the Hungarian
web users and a comprehensive analysis and comparison of the three
methods