i-manager's Journal on Information Technology (JIT)


Volume 4 Issue 3 June - August 2015

Article

Barriers to the Adoption of Wearable Technology

Tom Page*
Senior Lecturer, Loughborough Design School, United Kingdom.
Page, T. (2015). Barriers to the Adoption of Wearable Technology. i-manager’s Journal on Information Technology, 4(3), 1-13. https://doi.org/10.26634/jit.4.3.3485

Abstract

This dissertation is an investigation into wearable technology. The aim is to discover why its adoption has been slow to date, if its adoption is likely to speed up, and what steps can be taken to aid its adoption by consumers. Through a literature review and interviews with consumers, evidence has been gathered that suggests that it's just a matter of time until wearables are widely adopted. However there are still improvements in design, which have been identified, that could be made to ease this adoption of wearable technology

Research Paper

Web Based Archiving System

Khalid W. Hameed* , Samer A. Ahmed**, Amir A.Mohammed***
* Assistant Lecturer, AL-Nahrain University, Iraq.
** Technical Engineer, Exceed IT Services, Iraq.
*** Automation & LV Technical Engineer, Iraq.
Hameed, K. W., Ahmed, S. A., and Mohammed, A. A. (2015). Web Based Archiving System. i-manager’s Journal on Information Technology, 4(3), 14-17. https://doi.org/10.26634/jit.4.3.3486

Abstract

Today, people are more interested in efficiency, speed and more importantly in cost, in every walk of life. The management of work, industries, trade etc. which is called "Office work" is one of these. The office work may include saving information on paper in an ordered manner such that it may return to them in future. In order to overcome the difficulty in managing paper inventory and difficulty in searching for a particular document, the authors have designed and implemented an archiving system to save the burden of hard copies. The requirements had been first identified by analyzing the work nature. Upon these requirements for both the manager and user sides, the system was designed by creating a facility for each requirement, which in overall comprises the system. The designed system is easy, simple and web based. It was designed primarily based on XAMPP application and PHP language.

Research Paper

Secure Data Hiding by Optimal Placement ofQueen Along Closed Knight Tour

Abhishek Bansal* , Sunil Kumar Muttoo**, Vinay Kumar***
* Assistant professor, Indira Gandhi National Tribal University, Amarkantak , Madhya Pradesh, India.
** Professor, Department of Computer Science, University of Delhi, Delhi, India.
*** Professor, Vivekananda Institute of Professional Studies, GGSIPU, Delhi, India.
Bansal, A., Muttoo, S. K., and Kumar, V. (2015). Secure Data Hiding by Optimal Placement of Queen Along Closed Knight Tour. i-manager’s Journal on Information Technology, 4(3), 18-24. https://doi.org/10.26634/jit.4.3.3487

Abstract

A knight tour starts from any square of the chessboard. A tour in which a knight visits every square on the board exactly once is called closed knight tour. A queen can move along column, row and diagonal in both forward and backward direction. In proposed method, the authors divide the cover image into non-overlapping 8x8 pixel blocks. For each block, they place a queen on a square and find the number of prime attacking positions by the queen along knight tour. Then the authors remove these attacking positions from the sequence of knight tour in 8x8 bytes block. They compute number of mismatches between bits in LSB position in 8×8 bytes blocks and corresponding number of bits from encrypted message to be hidden. The queen position that results in minimum distortion is chosen. The process is applied on each block in the cover image. The queen positions determined during embedding phase is recorded as the key and the same is used to extract the hidden message from stego cover. Experimental results performed on different images reveal that this method maintains high degree of imperceptibility. Randomization achieved through knight tour and queen moves provide another level of security against detection.

Research Paper

Defending Against Remote File InclusionAttacks on Web Applications

Bharti Nagpal* , Naresh Chauhan**, Nanhay Singh***
* Assistant Professor, Ambedkar Institute Of Advanced Communication Technology & Research, Delhi, India.
** Professor, YMCA University of Science & Technology, Haryana, India.
*** Assistant Professor, Ambedkar Institute Of Advanced Communication Technology & Research, Delhi, India.
Nagpal, B., Chauhan, N., and Singh, N. (2015). Defending Against Remote File Inclusion Attacks on Web Applications. i-manager’s Journal on Information Technology, 4(3), 25-33. https://doi.org/10.26634/jit.4.3.3488

Abstract

Web applications are the fundamental pillars of today's world. Society depends on them for business and day to day tasks. Because of their extensive use, web applications are under constant attack by hackers that exploit their vulnerabilities to disrupt business and thus access confidential information. Remote File Inclusion (RFI) is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The attackers operate independently of one another with the goal of seeking exploitable vulnerabilities on the web. Different reasons were found for attack such as use of user-supplied input without proper validation. This can lead to something as minimal as outputting the contents of the file or more serious events. From observations, it is apparent that the detection and blocking of such attacks can be prevented by creating a blacklist of attack sources and a black list of URLs of remotely included malicious scripts. Remote file inclusion is a technique which is used to attack web applications mainly php applications from a remote server. RFI attacks are extremely dangerous as they allow a client to force a vulnerable application to run their own malicious code by including a reference pointer to code from a URL located on a remote server. When an application executes the malicious code it may lead to a backdoor exploit or technical information retrieval. Attackers attempt to remotely include these within the web applications. While the scripts are hosted at many locations, many of them are duplicates of each other, so the number of actual scripts that are used in the attacks are very small.

Research Paper

Analysis of TCP Variants Over Variable Traffic

Varun Chauhan* , Rajesh Kumar**
* M.Tech Scholar Thapar University, Patiala, India.
** Associate Professor, Faculty of Computer Science & Engineering Department, Thapar University, Patiala, India.
Chauhan, V., and Kumar, R. (2015). Analysis of TCP Variants Over Variable Traffic. i-manager’s Journal on Information Technology, 4(3), 34-42. https://doi.org/10.26634/jit.4.3.3489

Abstract

In today’s scenario most of the work carried out is accomplished through the internet. Internet plays a vital role in day-today’s regular activities and hence has become the backbone of our society. In internet the data is transferred from one place to another with the help of most commonly used protocol known as Transmission Control Protocol (TCP). TCP possesses various variants and each one has different criteria such as TCP, Tahoe, Reno, New-Reno and so on. Each variant performs in a different routine for different networks based upon the various key parameters. In this paper we have simulated various TCP variants with respect to different network parameters such as variable packet size, bandwidth and buffer size. This paper analyses the throughput, packet drop, delay and jitter of TCP variants evaluated over the above mentioned network parameters.