Volume 1, Issue 1, September 2010

Introduction and Analysis of Transition Strategies to Internet Protocol Version 6 (IP-v6)

M. Junaid Arshad and M. Asif Naeem

Department of Computer Science and Engineering, U.E.T., Lahore-Pakistan
Department of Computer Science, The University of Auckland, New Zealand

Abstract– During construction of transition scenario, it is often discovered that there are other ways than protocols designed above IPv6 which help to migrate a network to IPv6. In this research work, we present the issue of addressing scheme design, which is essential for network administration, expansion and numbering. Next, we give overview of important link-level technologies and how they interact with IPv6 from the perspective of transition to IPv6. We also study and give a comparative analysis of transitions strategies from IP-v4 to IP-v6.

Keywords—Virtual Private Networks, Quality of Services, BGP and IP (version-6)

Download full paper PDF format (Page: 1-4)

A Security Model in PaaS for Data Intensive Applications

Khalid Bashir and Rubab Fatima

School of Agriculture and Resource Economics
University of Western Australia

Abstract– The need to secure information for data intensive applications has given rise to reliability and security concerns. Platform as a service tends to be more vulnerable due to exposure of its services to various vendors. Hence there is a need to provide high data security to end users and gain confidentiality to fully gain its benefits. A security model having three dimensions is proposed. P-RAID manages data duplication issues by the mirroring. Data isolation and availability is ensured by decentralization and cipher encryption technique helps to keep the data secure.

Keywords—Data Availability, Data Decentralization, PaaS, RAID and Security Model

Download full paper PDF format (Page: 5-9)

An Effective eLearning System for Teaching the Fundamentals of Computing and Programming

Imran Sarwar Bajwa, Amjad Farooq and Amna Khan

Department of Computer Science, University of Birmingham, UK
Department of Computer Science and Engineering, U.E.T., Lahore-Pakistan

Abstract– The great enhancement in the current available technology from past recent years has shown its tremendous effect on the quality of education. From past many years students of the first year chemical engineering courses are offered a course of computing and programming to enhance their logical thinking capabilities, to improve their problem solving skills along with the hands on experience on current computer technology. The problem arises with the fact that most of the students belong to rural areas and have no or very little computer related knowledge. This paper is an effort to purpose an effective eLearning system for teaching programming to the students so that their computational and programming skills along with the basic concepts gets improved.

Keywords—eLearning, Programming, Education, Teaching and Student Learning

Download full paper PDF format (Page: 10-14)

Design and Development of a Web Content Management System

Amjad Farooq, Mahwish Fatima and Abuzar Fahim

Department of Computer Science and Engineering
University of Engineering and Technology, Lahore-Pakistan

Abstract–The Web Content Management Systems that are already working on the Web have lots of nice features and most of them are full of customization options. But the problem with having so many customization options is that it makes it very difficult for a non-technical user to understand and operate on such complex, full of customization and configuration options. Even the developers require training to understand some of these available systems. A naïve user, who wants just some basic set of functionalities, cannot manage all functions of these systems. In this paper, we design and develop a user-friendly web content management system.

Keywords—Web Application, Content Management System, Web Engineering and Web-Users

Download full paper PDF format (Page: 15-21)

Important Considerations for Single Sign-On Solution

Khalid Bashir and Saman Asif

School of Agriculture and Resource Economics
University of Western Australia

Abstract–Single Sign-On is a central component of the centralized architecture of an organization. In IT, there is a slight misconception that it is expensive to deploy an enterprise single sign-on solution that is secure, scalable and importantly well-suited to meet variety of applications in place. Conversely, there is ongoing awareness rising in IT management about the fruitfulness of its implementation. Over the years, many successful implementations of intranet single sign-on have been achieved. Scaling them to internet level is still an issue. This paper is related to similar domain; provide a single sign on that is equally secured and compatible to match the environment versatility at enterprise and internet level. The paper begins with a comprehensive high level summary of the single sign on. We then swim through the knowledge of some issues that are often unintentionally overlooked when designing and making choice of SSO products. And finally the reader will take a ride through the solutions of ensuring a complete product. This paper aims to provide guidance to professionals struggling to supply their organization a secured Single Sign-On solution making them easy to understand what is actually required in a beneficial SSO. The target audience is the solution designers and developers, and decision makers who need to know what factors to consider when evaluating a single sign on solution. The Single Sign-On considerations shared on are based on strong security actions other than typical user and password authentication mechanism. The lessons learnt from research, are made public, as well as further reading recommendations are included at the end.

Keywords—Single Sign-On, Centralized Architecture, Intranet Single Sign-On and Decision Makers

Download full paper PDF format (Page: 22-27)

Utility Based Agent for Test Paper Generation

*Memoona Naz, M. Aslam and Ehtesham-ul-haq Dar

Department of Computer Science, UET, Lahore-Pakistan
Technical University of Vienna, Institute of Software Technology and Interactive System, Austria

Abstract–The questionnaire generation for admission in various level of education is one of the most preliminary requirements. Most subsisting systems automate test paper generation by randomly selecting question items from knowledgebase/database. Unlike the existing test paper generators, our utility based agent test paper generator chooses question items in such a way that the difficulty level of each question items takes part in computing exact difficulty level of test paper. So test papers on the same level are different on basis of preferred difficulty level. In design phase, posed utility based model for test paper generation first develops a knowledgebase of question items on which our selection algorithm operates. The utility theory is used in assigning difficulty level of question items. The question items are states which are acting as roads for reaching our goal. Later, a test paper is produced by test paper generator according to difficulty level specified by examiner. Here, selected difficulty level is for the entire paper. Finally, it is implemented, executed, and tested to ensure the feasibility of this approach.

Keywords—Automation, Test Paper, Utility-Based Agent and Knowledgebase

Download full paper PDF format (Page: 28-32)

Multi-agent Based University Time Table Scheduling System (MUTSS)

M. P. Tariq, M. Waqar Mirza and R. Akbar

Department of Computer and Information Sciences

Abstract–This paper presents a multi-agent based approach for the development of time table scheduling system for educational institutes. The information capturing and saving agent captures data from user and saves it into the database. The information publishing agent publishes information on the web site or sends to the users’ inboxes. The environment monitoring and processing agent monitors the environment. An algorithm for the development of time table is presented which shows the collaboration and cooperation of the three agents.

Keywords—Multi-agent, Intelligent Agents, Time Table and Course Scheduling

Download full paper PDF format (Page: 33-39)