Archives
Editorial Board
S.No.

Volume 1, Issue 2, November 2013 (Title of Paper )

Page No.
1.

Digital Assurance Trends - Search Relevance Testing

Authors: Venkat Ramesh Atigadda, Sandru Veerabhadraiah

Abstract- There is no doubt that the amount of information on the Internet has increased. Many people have tried to utilize this enormous information either to enhance their knowledge or searching for information which will suffice their needs. But results which are mostly irrelevant are being displayed, especially in the area of Information retrieval. So verification of the Information or search results which are displayed as per the keyword is very important. This paper brings in some of the key business drivers for search relevance, key dimensions of search, verification aspects for search relevance testing, classification of search results, evaluation of search results, tools and best practices.

Keywords- Search Relevance Testing, Relevancy Testing, Search Testing, Search Relevance, Best Practices

References-

[1] Internet Growth Statistics

[2] Mobile Internet Users will Overtake Fixed Users in 2013

[3] Mobile Search Usage

[4] Ecommerce Sales Topped $1 Trillion for First Time in

[5] US Digital Ad Spending

1-7
2.

EtransQ A Logistic Solution

Author: Chirag Joshi

Abstract- The transport industry in India lacks in the involvement of IT. Business is still carried using the traditional methods. Suppliers, Transporters and Agents have a limited business domain. In transport industry, clients have long term relationships. The only reason because of which suppliers and transporters loose the best deals available in market is the limited scope for searching new service providers. Tenders are available only in newspapers. Every tender is not suitable for every transporter. Sorting and searching is not possible manually, the solution to all these problems is given by E-transQ. E-TransQ is an information system, focused on transport industry to enhance the capabilities of the suppliers, transporters and agents (STA). It aims to provide an innovative, profitable, knowledge based service to its users. The solution helps in increasing STA’s business domain and profits. E-TransQ embeds Internet based technologies with internal operating structures for earning business. E-TransQ is user friendly 24*7 available and provides a secured and trustworthy environment. It provides a single platform where users can communicate, share information, increase knowledge and business capabilities

Keywords— Agent, Association, Logistic, Offer, Supplier, Transporter, Tender

References-

[1] TOGAF 9 (www.opengroup.org)

[2] Modern Database Management, 8/e Hoffer • Prescott • McFadden ISBN-10: 0132212110 ISBN-13: 9780132212113 Publisher: Prentice Hall

[3] TOGAF Crash Course (http://www.slideshare.net/crabypatty/togafcc)

[4] The cognitive dynamics of computer science, ISBN: 978-0-471- 97047-7 Wiley-IEEE Computer Society Press. [5] Knowledge management and IT strategies by MiltiAdis

8-10
3.

Inhibition of Copper Corrosion in The Presence of Synthesized (E)-2-(4-Bromophenoxy)-N'-(2,4-Dihydroxybenzylidene)
Acetohydrazide in Polluted and Unpolluted Salt Water

Authors: A. M. El-Shamy, Samir T. Gaballah, A. E. El Meleigy

Abstract- (E)-2-(4-Bromophenoxy)-N'-(2,4- dihydroxybenzylidene) acetohydrazide (BDA) was synthesized in the laboratory and characterized by spectroscopic tools and evaluated as a corrosion inhibitor for copper in 3.5% NaCl by electrochemical studies. Results obtained revealed that BDA was a very good inhibitor with efficiency of about 82%, 57% in unpolluted polluted media respectively. Potentiodynamic polarization curves showed that BDA is a cathodic inhibitor. The ability of the studied inhibitor to inhibit the corrosion of copper was due to the presence of two nitrogen atoms and four oxygen atoms on its structure. Surface analyses were also carried out, to establish the mechanism of the corrosion inhibition of copper polluted and unpolluted salt water. The promising results were achieved in polluted sulfide media with good inhibition efficiency with regards to the film stability.

Keywords- Corrosion inhibitors, Copper Corrosion, (E)-2- (4-Bromophenoxy)-N'-(2,4-dihydroxybenzylidene) acetohydrazide Inhibition efficiency, Polarization curves, Surface analysis

References-

[1] Yu I Kuznetsov 1996. Organic Inhibitors of Corrosion of Metals New York: Plenum.

[2] V S Sastri 1998. Corrosion Inhibitors. Principles and Applications (Chichester, New York: Wiley).

[3] Yu I Kuznetsov Usp. Khim. 2004. 73-79 [Russ. Chem. Rev. 2004. 73-75.

[4] Reviews on Corrosion Inhibitor Science and Technology 2004. Vol. 3 (Eds A Raman, P Labine) (Houston: NACE International)

[5] C. Fiaud, 1995. in: Proceedings of the Eighth European Symposium on Corrosion Inhibitors, Ann. Univ. Ferrara 929.

[6] E.M.M. Sutter, F. Ammeloot, M.J. Pouet, C. Fiaud, R. 1999. Couffignal, Corros. Sci. 41-105.

[7] D. Tromans, R. Hong-Sun, J. 1991. Electrchem. Soc. 138 () 3235.

[8] S. Ferina, M. Loncar, M. Metikos-Hocovic, 1993. in: Proceedings of the Eighth European Symposium on Corrosion Inhibitors, Ann. Univ. Ferrara 1-1065.

[9] B. Trachli, Cotutelle 2001. Thesis, P&M Curie University–Kénitra University, November.

[10] B. Trachli, M. Keddam, A. Srhiri, H. Takenouti, 2002. Corros. Sci. 44 () 997.

[11] H. Otmaˇci´c, E. Stupnišek-Lisac, 2003. Electrochim. Acta 48-985.

[12] S. El Issami, L. Bazzi, M. Hilali, R. Saloghi, S. Kertit, 2002. Ann. Chim. Sci. Mat. 27 () 63.

[13] . Dafali, B. Hammouti, R. Makhlisse, S. Kertit, 2003. Corros. Sci. 45 () 1619.

[14] N. Huynh, S.E. Bottle, T. Notoya, A. Trueman, B. Hinton, D.P. Schweinsberg, 2002. Corros. Sci. 44-1257.

[15] A. Laachach, 1991. Thesis, Mohamed V University, Rabat.

[16] A. Laachach, A. Srhiri, M. Aouial, A. Benbachir, 1992. J. Chim. Phys. 89-201.

[17] Damaskin, B. B., Petrii, O. A. and Batrakov, V. V. 1971. Adsorption of Organic Compounds on Electrodes, Plenum Press.

[18] M. Fleischman, I. R. Hill, G. Mongoli, M. M. Musiani, 1983. Electrochim. Acta, 28, 1325–1333.

[19] D. Kuron, H. J. Rother, R. Holm, S. Storp, 1986. Werkstoffe und Korrosion, 37, 83–93.

[20] M. Beier, J. W. Schultze, 1992. Electrochim. Acta, 37, 2299– 2307.

[21] Syrett B. C. 1981. Protection of copper alloys from corrosion in sulfide polluted sea water. Mater. Perform. 20(5): 50-53 [22] Rahmouni K., M. Keddam, A. Srhiri and H. Takenouti. 2005.

[22]Corrosion of copper in 3% NaCl solution polluted by sulphide ions. Corrosion Science, 47: 3249–3266.

[23] Sathisha, K. R.; Khanum, S. A.; Chandra, J. N. N. S.; Ayisha, F.; Balaji, S.; Marathe, G. K.; Gopal, S.; Rangappa, K. S. 2011. Bioorganic & Medicinal Chemistry, 19, 211.

[24] Williams, A. B.; Hanson, R. N. 2012. Tetrahedron, 68, 5406.

[25] F.M. Alkhrafi, A. M. El-Shamy and B. G. Ateya 2009. Effect of 3- aminotriazole on the corrosion of copper in polluted and unpolluted media. Journal of Chemistry and Chemical Engineering Oct. volume 3, No. 10 (serial No. 23).

[26] F. M. Alkhrafi, A. M. El-Shamy and B. G. Ateya 2009. comparative Effect of Tolytrialzole and Benzotriazole against Sulfide Attack on Copper. Int. J. Electrochem. Sci., 4 1351-1364.

[27] D. Nalini and R. Rajalakshmi 2013 Inhibition of Mild Steel Corrosion in the Presence of p-Nitrophenyl-2-Imidazoline, NACE international conference, paper No. 2198

 

11-18
4.

A Plug in Implementation for Phishing Attacks Using C4.5 Algorithm

Authors: Akanksha Upadhyaya, Jitendra Dangra, Dr. M. K Rawat

Abstract- Rapid increase in the size of web users. Users enter sensitive information such as passwords, their personal and professional information into scam web sites. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, for some illegitimate purpose. Such scam sites cause substantial damages to individuals and corporations. These attacks can be analyzed through this work, and a plug in is designed which provide security from the fake websites . This work is improved by using decision tree c4.5 over id3 and a comparison is drawn. The objective of this work is to optimize the work ,done by ID3 algorithm before, using C4.5 for designing anti phishing toolbar by designing a new toolbar with improved accuracy, search time and less memory consumption and then give comparitive results for ID3 and C4.5.

Keywords--ID3, C4.5, phishing

References-

[1] Amir Herzberg2 and Ahmad Jbara :Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks1: Computer Science Department Bar Ilan University.(2006).

[2] Lorrie Carnor, Serge Egelman, Jason Hong ,Yue Zhang :Phinding phish-an evaluation of anti phishing toolbar: Carnege Melon University.(2006).

[3] Juan Chen,ChuanxiongGuo,”Online Detection and Prevention of Phishing Attacks”,2006 - ieeexplore.ieee.org .

[4] Ponnurangam Kumaraguru, Justin Cranshaw, Alessandro Acquisti, Lorrie Cranor, Jason Hong, Mary Ann Blair, Theodore Pham: School of Phish: A Real-Word Evaluation of Anti-Phishing Training March 9, 2009 CMU-CyLab-09-002.(2009).

[5] Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, and Suku Nair, A Comparison of Machine Learning Techniques for Phishing Detection, October 4-5, 2007, Pitts-burgh, PA, USA.

[6] Ian Fette, Norman Sadeh,Anthony Tomasic, “Learning to Detect Phishing Emails”,2007, May 8–12, 2007, Banff, Alberta, Canada. ACM 978-1-59593-654-7/07/0005.

[7] Collin Jackson, Daniel R. Simon, Desney S. Tan, and Adam Barth,An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks,Microsoft Research, Redmond, WA,2007 – Springer, http://usablesecurity.org/papers/jackson.pdf.

[8] SergeEgelman, Lorrie Faith Cranor, Jason Hong,“You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings”,Copyright 2008 ACM 1-59593-178-3/07/0004.

[9] Steve Sheng, Mandy Holbrook Ponnurangam Kumaraguru. Lorrie Cranor, Julie Downs1 1Carnegie :Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions Mellon University,2Indraprastha Institute of Information Technology [email protected], [email protected], [email protected], [email protected], [email protected].(2010).

[10] IndraneelMukhopadhyay, MohuyaChakraborty, SatyajitChakrabarti, “A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems”,Journal of Information Security, 2011, 2, 28-38

19-22
5.

Analysis of Traffic Congestion and Remedial Measures at Traffic Mor in Pabna City, Bangladesh

Authors: Ashish Kumer Saha, Bulbul Ahmed, Motiur Rahman, Tahmina Tasnim Nahar

Abstract- The economic development of a country mostly depends on the good transportation system. Development of new transportation system involve huge amount of money and time. Most of the cases the invested money is irreversible. The developing country like Bangladesh the best approach is to improvement of existing facilities we have. Pabna, one of the rising cities in Bangladesh. As a result the population in Pabna increasing day by day, so as the traffic congestion. Traffic Mor is one of the major intersection in Pabna city. In overall context Traffic Mor road intersection plays an important role in existing traffic system of the city. Traffic Mor road intersection is tee type road intersection at level. Traffic flow of this intersection is mixed traffic flow and both way is two way. In this study an attempts are made to investigate the geometric elements, traffic congestion, and traffic control devices at Traffic Mor road intersection.

Keywords- Traffic congestion, geometric elements, traffic volumes, PCU, Traffic control device

References-

[1] Sing G.C (1996), “Highway Engineering”, Standard Publishers Distribution, Delhi, India.

[2] Khanna S.K. & JOSTO C.E.G (2001), “Highway Engineering”, Nem Chand & Bros, Roorkee, India.

[3] Kadiyali L.R. (1997), “Traffic Engineering & Transportation Planning”, Khanna Publishers, Nai Sarak, Delhi, India.

[4] Gupta B.L (2003), “Roads Railway Bridges Tunnels And Harbour-Doc Engineering”, Standard Publishers Distributers, Delhi, India.

[5] Bindra S.P. (1982), “A course in Highway Engineering”, Danpat Rai & Sons, Delhi, India.

[6] Sarma S.K. (1985), “Principles, practice and design of Highway Engineering”, S.Chande & Company ltd, New Delhi, India.

[7] Seonyeong Cheong, Saed Rahwanji, and Gang-Len Chang, (2008), “Comparison of Three UnconventionalArterial Intersection Designs: Continuous Flow Intersection, Parallel Flow Intersection, and Upstream Signalized Crossover”.

[8] Ashish Kumer Saha & Md. Abdus Sobhan, “Features & Facilities at C&B Road Intersection: A Case Study”, IJASETR Research Paper ISSN: 1839-7239, August, 2012.

[9] Minseok Kim, Gang-Len Chang, SaedRahwanji, “Unconventional Arterial Intersection Designs Initiatives”, IEEE Conference on Intelligent Transportation Systems, Seattle, 2007.

[10] S. Sharmin, “Solid Waste Generation in Paban” by, unpublished thesis paper, Department of Civil Engineering, PSTU, Pabna, 2013.

23-26