Victor Onomza Waziri, Ismaila Idris, Department of Cyber Security Science, School of Information and Communication Technology, Federal University of Technology, Nigeria.
Mohammed Bashir Abdullahi, Department of Computer Science, School of Information and Communication Technology, Federal University of Technology, Nigeria.
Hahimi Danladi, Audu Isah, Department of Mathematics/ Statistics, School of Natural and Applied Sciences,Federal University of Technology, Nigeria.
Abstract— Aiming to develop an immune based system, the negative selection algorithm aid in solving complex problems in spam detection. This is been achieve by distinguishing spam from non-spam (self from non-self). In this paper, we propose an optimized technique for e-mail classification. This is done by distinguishing the characteristics of self and non-self that is been acquired from trained data set. These extracted features of self and non-self are then combined to make a single detector, therefore reducing the false rate. (Non-self that were wrongly classified as self). The result that will be acquired in this paper will demonstrate the effectiveness of this technique in decreasing false rate.
Keywords- Negative selection; E-mail Classification; Algorithm; Self, Non-Self, Artificial Immune System, Classification accuracy.
Department of Computer Science, University of Ibadan, Nigeria.
Abstract— Security is very important in data transmission. Data is transmitted through unsecured paths such as the air when two devices communicate over long distances. Encryption has been adopted for securing data as it moves between the two communicating devices. Encrypted data requires a key for decrypting the message. The management and availability of the key has determined the success and adoption of encryption systems over the years. This study proposes a new key management method for the Data Encryption Standard (DES). The model developed in this research uses the DES model with modifications in the key distribution pattern. The encryption key is divided and transmitted over several media from the sender of a message to the receiver. The model also allows encryption keys of variable length as opposed to keys of fixed length in DES. This will increase the time and amount of job done for any eavesdropper to break into any encryption security thus improving the security standard of the encryption model. The model developed is secure and practicable. It is suitable for encrypting messages sent through public or social media such as email, messages, tweets and status messages.
Keywords-encryption model; key management; computer security; DES; key length; communication.
Timur Mirzoev, David Hillhouse
Georgia Southern University, Statesboro, GA USA.
Bruce Benson, Armstrong Atlantic University, Savannah, GA USA.
Mickey Lewis, Southern Polytechnic State University, Marietta, GA USA.
Abstract— Due to the evolving Cloud Computing paradigm, there is a prevailing concern that in the near future data center managers may be in short supply. Cloud computing, as a whole, is becoming more prevalent into today’s computing world. In fact, cloud computing has become so popular that some are now referring to data centers as “cloud centers”. How does this interest in cloud computing translate into employment rates for data center (or cloud center) managers? The popularity of the public and private cloud models are the prevailing force behind answering this question. Therefore, the skill set of the datacenter manager has evolved to harness the on demand self-services, broad network access, resource pooling, rapid elasticity, measured service, and multi tenacity characteristics of cloud computing . Using diverse sources ranging from the Bureau of Labor and Statistics to trade articles, this manuscript takes an in-depth look at these employment rates related to the cloud and the determining factors behind them. Based on the information available, datacenter manager employment rates in the cloud computing era will continue to increase well into 2016.
Keywords- data center managers; unemployment rates; cloud computing; cloud models; IT trends.