Volume-13 ~ Issue-3
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This primary effort of this research study was to highlight the needs of citizens in Pakistan. Since Pakistan is a developing country and day-per-day the demands and provisions of e-Services are being increased, therefore, this same research can be extended to the study of available e-Services in Pakistan in terms of respective levels of e-Services. This study might come up with the exact data, methods, policies, strengths and major weaknesses of continuous shifting of the e-Services from the bottom to the top level.
Keywords: e-service, ICT, transaction, globalization.
[1] Kayani, M. B., Ehsan ul Haq, Perwez, M. R., Humayun, H. Analyzing Barriers in e-Government Implementation in Pakistan. International Journal for Infonomics (IJI), Volume 4, Issue 3/4. 2011.
[2] Pak e-government strategy. 'E-Government Strategy and 5-Year Plan for the Federal Government'. 2005. Retrieved by ttp://202.83.164.29/egdsite05/downloads/EGovernment%20Strategy%20and%205-Year%20Plan%20(19[1].06.2005).pdf>. [Accessed 17/06/2013].
[3] Ahmad, M. O., Markkula, J., Oivo, M. Factors influencing the adoption of e-government services in Pakistan. European, Mediterranean & Middle Eastern Conference on Information Systems 2012 (EMCIS2012) June 7-8, Munich, Germany. 2012.
[4] UN. 'United Nation E-Government survey', Retrieved by <http://unpan1.un.org/ intradoc/ groups/public/documents/UN-DPADM/ UNPAN038853.pdf >, [Accessed 15.06.2013]. 2010.
[5] Shafique, F. Indicators of the Emerging Information Society in Pakistan. Information Development. vol. 24 no. 1 66-78. 2008.
[6] Tunio, M. N., Rashdi, P. I. S., Muhammad, Q., Abro, M., Sartaj, S., & Tunio, S. P. Social Impact of Virtual Communication on Nascent Society of Pakistan. IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 10, Issue 5, 2013, PP 68-74. e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.Iosrjournals.Org
[7] Tunio, M. N., Arain, N. R., & Tunio, S. P. Assessment of Computer Literacy at Secondary Education Level in Rural Areas of Sindh (Pakistan). International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-7, 2013
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery |
| Country | : | India |
| Authors | : | Ranjit Kumar Nukathati |
| : | 10.9790/0661-1330512 ![]() |
Abstract: Monitoring Internet topology was a tractable problem. Topology discovery systems are starting to be introduced in the form of easily and widely deployed software. Unfortunately, they have a problem of how to perform such measurements efficiently and in a network-friendly manner. When scaled up, such methods will generate so much traffic that they will begin to resemble distributed denial-of-service attacks. The existing Doubletree algorithm faces the problem of redundancy. To solve this, the Efficient Doubletree algorithm is proposed which reduces redundancy while maintaining nearly the same level of nodes and link coverage. Algorithm quantifies the amount of redundancy in classic Internet topology discovery approaches by taking into account the perspective of a single monitor (intramonitor) and that of an entire system (intermonitor). Efficient Doubletree simultaneously meets the conflicting demands of reducing intramonitor and intermonitor redundancy. In both the above cases a hop in the middle that is between monitor and destination will be selected by Hop Selection to increase efficiency.
Keywords: Distributed denial-of-service(DDoS) attack, Efficient Doubletree, forward probing, backward probing, stopping rule.
[1] V. Jacobsen "Traceroute UNIX," 1989. [Online]. Available: ftp://ftp.ee.lbl.gov/traceroute.tar.gz, man page. [2] R. Braden, "Requirements for internet hosts. communication layers," Internet Engineering Task Force, RFC 1122, Oct. 1989.
[3] E.C. Rosen, "Vulnerabilities of network control protocols: An examples", RFC 789, July 1981.
[4] Y. Rekhter, "BGP Protocol Analysis", RFC 1265, October 1991.
[5] D. Atkins and R. Austein. "Threat Analysis of the Domain Name System (DNS)". RFC 3833 (Informational), August 2004.
[6] S. Murphy. "BGP Security Vulnerable Analysis", RFC 4272 (Informational), January 2006.
[7] A. Retana, R. White, V. Fuller, and D. McPherson. "Using 31-Bit Prefixes on IPv4 Point-to- Point Links", RFC 3021 (Proposed Standard), December 2000.
[8] Y. Rekhter and T. Li, "A Border Gateway Protocol 4 (BGP-4)", RFC 1771 (Draft Standard), March 1995. Obsoleted by RFC 4271.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Hiding Text within Image Using LSB Replacement |
| Country | : | Iraq |
| hors | : | Nada Elya Tawfiq |
| : | 10.9790/0661-1331316 ![]() |
Abstract: Our digital world and its hyper connectivity makes securing the digital content a paramount. Information hiding has always been seen as a way to protect sensitive data from adversaries. This research paper utilizes a new algorithm to hide atextmessagewitha gray image to achievesecurity and maintain high quality results. The new algorithm was appliedtogenerate a random key in the range of (1 to 256) to increase the level of security. This random key was used to determine the binary value of each character within the text message. Next XOR operation was applied on the numbers and the key matrix.Then, the last two bits of the gray level value was ANDed with the first two bits of the matrix to generate a randomized plain text and embed it within the original image. The usage of XOR and AND operations ensures that the resultant image has the minimum number of errors which in turn increases the quality of the image.
[1] V. K. Pachghare, ―Cryptography and Information Security ― , PHI Learning Private Linited, 2009.
[2] William Stallings, ―Cryptography and Network Security‖, Prentice Hall, Boston Columbus Indianapolis, 2011.
[3] H. Motameni, M. Norouzi, ―Labeling Method in Steganography‖, World Academy of Science, Engineering and technology, 2007.
[4] http://en.wikipedia.org/wiki/Steganography#Data_embedding_security_schemes
[5] Pahati, OJ (2001-11-29). "Confounding Carnivore: How to Protect Your Online Privacy". AlterNet.Archived from the original on 2007-07-16.http://web.archive.org/web/20070716093719/http://www.alternet.org/story/11986/. Retrieved 2008-09-02.
[6] Atallah M. Al-Shatnawi. ―A New Method in Image Steganography with Improved Image Quality‖.Al-albayat University, Mafraq, Jordan.―data hiding fundamentals and applications‖ . 2004, HusrwSencar,
[7] Neil F. Johnson and SushilJajodia, ―Exploring Steganography Seeing the Unseen‖, George Mason Universit
