International Journal of Computer Networks and Communications Security

Volume 2, Issue 11, November 2014

 

 

 

The Role of Contingency Factors in the Implementation of Strategic Management Accounting (SMA) in Private Universities/Colleges (PTSes) under Kopertis Region V of Yogyakarta

Pages: 374-378 (5) | [Full Text] PDF (201 KB)
Sriyono and Rahmawati
Pembangunan Nasional University Veteran Yogyakarta-Indonesia
Sebelas Maret University Solo-Indonesia

Abstract -
Strategic Management Accounting (SMA) is an interesting subject to study since differences exist in views on the concept of SMA and the fact that studies on public sector organization in Indonesia remain somewhat rare. Contingency theory holds that organizational structure and system represent function of environment and a company-specific factor. Therefore, the development of SMA in organizations needs to take contingency factors into account. While the results of analysis indicate that private universities/colleges (subsequently abbreviated to PTS) under Coordinating Body for Private Colleges (subsequently referred to as Kopertis) Region V of Yogyakarta have implemented SMA, they have not fully considered the contingency factors. Strategic-type contingency factors and market orientation have significant effect on SMA at 5% and 10%, respectively. On the contrary, Deliberate Strategy has no significant effect on SMA in PTSes under Kopertis of Region V of Yogyakarta.
 
Index Terms - Contingency, Strategic Management Accounting, Deliberate, Market Orientation
 

A Secure Job & Demand Based Steganography

Pages: 379-385 (7) | [Full Text] PDF (294 KB)
Mustafa Alfayoumi
College of Computer Engineering & Sciences, Salman Bin Abdulaziz University, Saudi Arabia

Abstract -
Steganography is the science of hiding information. Whereas the goal of cryptography is to make data unreadable by a third party, the goal of steganography is to hide the data from a third party. In this article, I will discuss what steganography is, what purposes it serves on and will illustrate distributed framework based on job based architecture, on which a logical transparent steganographic layer is developed and have related work on steganography and its anatomy is semantically studied and broken down into some independent services which are allocated on a network infrastructure. This structure not only distributes the overall load of the process, it also considers some important system attributes such as reusability, simplicity, outsourcing, maintainability, flexibility and availability. Because of the open structure of the system, varieties of steganography algorithms can be supported for varieties of secrets, according to an evaluation strategy which is also considered as a service on the network. To clarify the proposed approach, the related ADL model together with an example scenario is expressed.
 
Index Terms - Steganography, ADL Model, Network Infrastructure, Job based Architecture
 

Role of WAN Optimization Solutions in overcoming limitations of TCP performance in Ad-Hoc Networks

Pages: 386-391 (6) | [Full Text] PDF (221 KB)
ANIKET DESHPANDE
Dept. of CSE, Mewar University, Rajasthan, India

Abstract -
Ad-hoc network is a temporary network that is designed for a special purpose and is developed as soon as the various devices are connected to each other. This type of network degrades the performance of TCP or transmission control protocol which is the core element of internet protocol. The performance of TCP can be enhanced by using various optimization techniques. This paper focuses on the feasibility, advantages and disadvantages of making use of contemporary WAN optimization technologies to overcome the challenges of degrading the performance of TCP in Ad-Hoc Networks. Moreover, the paper will also highlight the significance of the use of Ad-hoc networks by end users in accessing various cloud based services.
 
Index Terms - Ad-Hoc Network, Transmission Control Protocol, WAN optimization & Cloud based services
 

Performance Analysis of Multi-hop and Cluster Based Routing Protocols for Mobile Heath Monitoring

Pages: 392-399 (8) | [Full Text] PDF (615 KB)
MARYAM EL AZHARI, AHMED TOUMANARI and RACHID LATIF
ESSI, National School of Applied Sciences, Ibnou Zohr University, Agadir Morocco

Abstract -
This paper aims to depict the performance of cluster based routing protocol (Leach protocol) and multipath routing protocol (Multipath Ring Routing protocol) for Wireless Body Sensor Networks where the mobility is a crucial constraint to handle. Previous works mainly dedicate the above mentioned protocols to Wireless Sensor Networks where the topology is static and support hundreds of sensors, however, their performance is expected to highly degrade when it comes to a mobile environment including a limited number of sensors. The results proved that multipath routing performs better than cluster based routing in both static and mobile topology.
 
Index Terms - Wireless Body Sensor Networks, Routing Protocols, Cluster Based Protocol, Multipath Routing Protocol, Mobile Networks
 

Recent Advances of Secure Clustering Protocols in Wireless Sensor Networks

Pages: 400-413 (14) | [Full Text] PDF (313 KB)
MOHAMED ELHOSENY, HAMDY K. EL-MINIR, A. M. RIAD and XIAOHUI YUAN
Department of Computer Science and Engineering, University of North Texas, U.S.A
Department of Information Systems, Mansoura University, Egypt
Department of Electrical Engineering, Kafr El-Sheikh University, Egypt

Abstract -
Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. The ubiquitous WSNs make security a prime issue, and new technologies have been developed recently. In this article, we review the most recent secure clustering protocols in WSNs. We start with a description of the security requirements for WSNs and discuss the existing security schemes. We analyze to what extend they have been applied to the clustering structure of WSNs. Then, we review secure clustering protocols in emerged recent years. Finally, we present a set of criteria which must be applied to build a secure clustering algorithm.
 
Index Terms - Wireless Sensor Networks, Secure Cluster Formation, Secure Routing, Secure data Aggregation, Security Attacks