

The Role of Contingency Factors in the Implementation of Strategic Management Accounting (SMA) in Private Universities/Colleges (PTSes) under Kopertis Region V of Yogyakarta |
Pages: 374-378 (5) | [Full Text] PDF (201 KB) |
Sriyono and Rahmawati |
Pembangunan Nasional University Veteran Yogyakarta-IndonesiaSebelas Maret University Solo-Indonesia |
Abstract - Strategic Management Accounting (SMA) is an interesting subject to study since differences exist in views on the concept of SMA and the fact that studies on public sector organization in Indonesia remain somewhat rare. Contingency theory holds that organizational structure and system represent function of environment and a company-specific factor. Therefore, the development of SMA in organizations needs to take contingency factors into account. While the results of analysis indicate that private universities/colleges (subsequently abbreviated to PTS) under Coordinating Body for Private Colleges (subsequently referred to as Kopertis) Region V of Yogyakarta have implemented SMA, they have not fully considered the contingency factors. Strategic-type contingency factors and market orientation have significant effect on SMA at 5% and 10%, respectively. On the contrary, Deliberate Strategy has no significant effect on SMA in PTSes under Kopertis of Region V of Yogyakarta. |
Index Terms - Contingency, Strategic Management Accounting, Deliberate, Market Orientation |
A Secure Job & Demand Based Steganography |
Pages: 379-385 (7) | [Full Text] PDF (294 KB) |
Mustafa Alfayoumi |
College of Computer Engineering & Sciences, Salman Bin Abdulaziz University, Saudi Arabia |
Abstract - Steganography is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves on and will illustrate distributed framework based on job based architecture, on which a logical transparent steganographic layer is developed and have related work on steganography and its anatomy is semantically studied and broken down into some independent services which are allocated on a network infrastructure. This structure not only distributes the overall load of the process, it also considers some important system attributes such as reusability, simplicity, outsourcing, maintainability, flexibility and availability. Because of the open structure of the system, varieties of steganography algorithms can be supported for varieties of secrets, according to an evaluation strategy which is also considered as a service on the network. To clarify the proposed approach, the related ADL model together with an example scenario is expressed. |
Index Terms - Steganography, ADL Model, Network Infrastructure, Job based Architecture |
Role of WAN Optimization Solutions in overcoming limitations of TCP performance in Ad-Hoc Networks |
Pages: 386-391 (6) | [Full Text] PDF (221 KB) |
ANIKET DESHPANDE |
Dept. of CSE, Mewar University, Rajasthan, India |
Abstract - Ad-hoc network is a temporary network that is designed for a special purpose and is developed as soon as the various devices are connected to each other. This type of network degrades the performance of TCP or transmission control protocol which is the core element of internet protocol. The performance of TCP can be enhanced by using various optimization techniques. This paper focuses on the feasibility, advantages and disadvantages of making use of contemporary WAN optimization technologies to overcome the challenges of degrading the performance of TCP in Ad-Hoc Networks. Moreover, the paper will also highlight the significance of the use of Ad-hoc networks by end users in accessing various cloud based services. |
Index Terms - Ad-Hoc Network, Transmission Control Protocol, WAN optimization & Cloud based services |
Performance Analysis of Multi-hop and Cluster Based Routing Protocols for Mobile Heath Monitoring |
Pages: 392-399 (8) | [Full Text] PDF (615 KB) |
MARYAM EL AZHARI, AHMED TOUMANARI and RACHID LATIF |
ESSI, National School of Applied Sciences, Ibnou Zohr University, Agadir Morocco |
Abstract - This paper aims to depict the performance of cluster based routing protocol (Leach protocol) and multipath routing protocol (Multipath Ring Routing protocol) for Wireless Body Sensor Networks where the mobility is a crucial constraint to handle. Previous works mainly dedicate the above mentioned protocols to Wireless Sensor Networks where the topology is static and support hundreds of sensors, however, their performance is expected to highly degrade when it comes to a mobile environment including a limited number of sensors. The results proved that multipath routing performs better than cluster based routing in both static and mobile topology. |
Index Terms - Wireless Body Sensor Networks, Routing Protocols, Cluster Based Protocol, Multipath Routing Protocol, Mobile Networks |
Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks |
Pages: 400-413 (14) | [Full Text] PDF (313 KB) |
MOHAMED ELHOSENY, HAMDY K. EL-MINIR, A. M. RIAD and XIAOHUI YUAN |
Department of Computer Science and Engineering, University of North Texas, U.S.ADepartment of Information Systems, Mansoura University, EgyptDepartment of Electrical Engineering, Kafr El-Sheikh University, Egypt |
Abstract - Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. The ubiquitous WSNs make security a prime issue, and new technologies have been developed recently. In this article, we review the most recent secure clustering protocols in WSNs. We start with a description of the security requirements for WSNs and discuss the existing security schemes. We analyze to what extend they have been applied to the clustering structure of WSNs. Then, we review secure clustering protocols in emerged recent years. Finally, we present a set of criteria which must be applied to build a secure clustering algorithm. |
Index Terms - Wireless Sensor Networks, Secure Cluster Formation, Secure Routing, Secure data Aggregation, Security Attacks |