Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 669

Creating an Innovative Home Decor Shopping Experience: Planning, Developing, and Potential Impact of an E-commerce Marketplace for Home Décor in a Developing Country

Creating an Innovative Home Decor Shopping Experience: Planning, Developing, and Potential Impact of an E-commerce Marketplace for Home Décor in a Developing Country

Syed Danish Rizvi, Waqas Mahmood

Статья научная

This paper proposed a possible next-generation e-commerce “Home Décor Marketplace” system with web 3.0 capabilities to disrupt the traditional furniture and home décor retail market in developing countries like Pakistan. This project involves the development of a B2B and B2C furniture and home décor e-commerce marketplace application. The platform will allow manufacturers and retailers to list and sell their products directly to consumers as well as to other businesses. One of the main objectives of the project is to provide a convenient and efficient platform for both buyers and sellers in the furniture and home decor industry. The document describes the research work, analysis, design, and development of the platform. The proposed e-commerce marketplace has been developed based on market research. The application has been designed to be compatible with various platforms such as Web, iOS, and Android, utilizing the Google Flutter development tool. It is secured using user authentication, and the features have been carefully chosen to meet the market demands and requirements. This research paper will discuss all the technologies and tools used to build and implement an Innovative Home Decor Shopping Experience-based e-commerce platform.

Бесплатно

Cybercrimes during COVID -19 Pandemic

Cybercrimes during COVID -19 Pandemic

Raghad Khweiled, Mahmoud Jazzar, Derar Eleyan

Статья научная

COVID-19 pandemic has changed the lifestyle of all aspects of life. These circumstances have created new patterns in lifestyle that people had to deal with. As such, full and direct dependence on the use of the unsafe Internet network in running all aspects of life. As example, many organizations started officially working through the Internet, students moved to e-education, online shopping increased, and more. These conditions have created a fertile environment for cybercriminals to grow their activity and exploit the pressures that affected human psychology to increase their attack success. The purpose of this paper is to analyze the data collected from global online fraud and cybersecurity service companies to demonstrate on how cybercrimes increased during the COVID-19 epidemic. The significance and value of this research is to highlight by evident on how criminals exploit crisis, and for the need to develop strategies and to enhance user awareness for better detection and prevention of future cybercrimes.

Бесплатно

DFI-ADR: Fuzzy Logic-Driven Information Retrieval and Machine Learning for Environmental and Crop Prediction to Optimize Farming Decisions

DFI-ADR: Fuzzy Logic-Driven Information Retrieval and Machine Learning for Environmental and Crop Prediction to Optimize Farming Decisions

Surabhi Solanki, Seema Verma

Статья научная

This paper proposes DFI-ADR (Dynamic Fuzzy Information System with Agriculture Decision Retrieval) aimed at improving agricultural decision-making through case-based reasoning and precise information retrieval. This approach uses fuzzy logic and machine learning techniques, such as IndRNN, to compute similarity scores between historical agricultural cases and new queries. This enables dynamic classification of cases as "distinct," "similar," or "highly comparable" based on fuzzy membership values. These values significantly enhance the accuracy of decisions related to agricultural factors like crop yield, soil quality, and irrigation. The methodology outperforms traditional methods in terms of accuracy, recall, and precision, proving highly effective for agricultural analysis and decision-making. In experiments with the Agriculture Dataset Karnataka, DFI-ADR achieved an accuracy of 95%, a precision of 100%, and an F1-score of 94.74%, significantly outperforming traditional methods by a margin of 10-15% across these metrics. These values demonstrate its effectiveness for agricultural analysis and decision-making.

Бесплатно

DSNFyS: Deep Stacked Neuro Fuzzy System for Attack Detection and Mitigation in RPL based IoT

DSNFyS: Deep Stacked Neuro Fuzzy System for Attack Detection and Mitigation in RPL based IoT

Prashant Maurya, Vandana Kushwaha

Статья научная

The Routing Protocol for Low-Power and Lossy Networks (RPL) is a widely adopted protocol for managing and optimizing routing in resource-constrained Internet of Things (IoT) environments. RPL operates by constructing a Destination-Oriented Directed Acyclic Graph (DODAG) to establish efficient routes between nodes. This protocol is designed to address the unique challenges of IoT networks, such as limited energy resources, unreliable wireless links, and frequent topology changes. RPL's adaptability and scalability render it particularly suitable for large-scale IoT deployments in various applications, including smart cities, industrial automation, and environmental monitoring. However, the protocol's vulnerability to various security attacks poses significant threats to the reliability and confidentiality of IoT networks. To address this issue, a novel deep-stacked neuro-fuzzy system (DSNFyS) has been developed for attack detection in RPL-based IoT. The proposed approach begins with simulating RPL routing in IoT, followed by attack detection processing at the Base Station (BS) using log data. Data normalization is accomplished through the application of min-max normalization techniques. The most crucial features are then identified through feature selection, utilizing information gain and Support Vector Machine-Recursive Feature Elimination (SVM-RFE). Attack detection is subsequently performed using DSNFyS, which integrates a Deep Stacked Autoencoder (DSA) with an Adaptive Neuro-Fuzzy Inference System (ANFIS). Upon detection of an attack, mitigation is carried out employing a DSA trained using the Hiking Optimization Algorithm (HOA). The proposed DSNFyS demonstrated exceptional performance, achieving the better accuracy of 97.41%, True Positive Rate (TPR) of 97.60%, and True Negative Rate (TNR) of 97.12%.

Бесплатно

Damage Measurement of Collision Attacks on Performance of Wireless Sensor Networks

Damage Measurement of Collision Attacks on Performance of Wireless Sensor Networks

Mina Malekzadeh, Sadegh Ebady, M.H. Shahrokh Abadi

Статья научная

Wireless sensor networks (WSN) are widely developed to monitor different phenomena in a variety of areas including nature, medical centers, home automation, industrial and military applications. Such development in many different fields, raises important security issues related to the reliability of the WSNs. Due to the resource constrained nature of the WSNs, these networks are the target of many different types of attacks and prone to failure. In this paper, we consider the collision attack. An attempt has been made to measure the impact of the collision attack on the performance of WSNs under variety scenarios performed by the attackers. The main contribution of this paper is to present that although the attack does not consume much energy of the attacker, it can highly disrupt the normal operation of the target sensor networks. The implementation of the proposed attack model has been done by using NS2 network simulator.

Бесплатно

Dark Web Monitoring as an Emerging Cybersecurity Strategy for Businesses

Dark Web Monitoring as an Emerging Cybersecurity Strategy for Businesses

Ashwini Dalvi, Sunil Bhirud

Статья научная

The increasing frequency and sophistication of cyberattacks targeting institutions have necessitated proactive measures to prevent losses and mitigate damages. One of these measures is to monitor the dark web. The dark web is a complex network of hidden services and encrypted communication protocols, with the primary purpose of providing anonymity to its users. However, criminals use the dark web to sell stolen data, launch zero-day attacks, and distribute malware. Therefore, identifying suspicious activity on the dark web is necessary for businesses to counter these threats. An analysis of dark web monitoring as an emerging trend in cyber security strategy is presented in this article. The article presents a systematic review of (a) why dark web surveillance enhances businesses' cybersecurity strategies, (b) how advanced tools and technologies are used to monitor dark web data in the commercial sector, (c) the key features of threat monitoring frameworks proposed by researchers, and (d) the limitations and challenges associated with dark web monitoring solutions. In summary, the proposed work involves analyzing various sources of information related to the topic and presenting a thorough assessment of the need and challenges of dark web surveillance to enhance the security measures of businesses.

Бесплатно

Data Center Strategy to Increase Medical Information Sharing in Hospital Information Systems

Data Center Strategy to Increase Medical Information Sharing in Hospital Information Systems

Karim Zarour, Nacereddine Zarour

Статья научная

The sharing of medical information among healthcare providers is a key factor in improving any health care system. By providing opportunities for sharing and exchanging information and knowledge, data center, agent and ontology play a very important role in the field of medical informatics. In this paper, we propose a design of architecture and data center for the development of a Hospital information system (HIS) based on agents and ontology.

Бесплатно

Data Deduplication-based Efficient Cloud Optimisation Technique: Optimizing Cloud Storage through Data Deduplication

Data Deduplication-based Efficient Cloud Optimisation Technique: Optimizing Cloud Storage through Data Deduplication

Ranga Kavitha, Mahaboob Sharief Shaik, Narala Swarnalatha, M. Pujitha, Syed Asadullah Hussaini, Samiullah Khan, Shamsher Ali

Статья научная

Effective storage management is crucial for cloud computing systems' speed and cost, given data's exponential increase. The significance of this issue has increased as the amount of data continues to increase at a disturbing pace. The act of detecting and removing duplicate data can enhance storage utilisation and system efficiency. Using less storage capacity reduces data transmission costs and enhances cloud infrastructure scalability. The use of deduplication techniques on a wide scale, on the other hand, presents a number of important obstacles. Security issues, delays in deduplication, and maintaining data integrity are all examples of difficulties that fall under this classification. This paper introduces a revolutionary method called Data Deduplication-based Efficient Cloud Optimisation Technique (DD-ECOT). Optimising storage processes and enhancing performance in cloud-based systems is its intended goal. DD-ECOT combines advanced pattern recognition with chunking to increase storage efficiency at minimal cost. It protects data during deduplication with secure hash-based indexing. Parallel processing and scalable design decrease latency, making it adaptable enough for vast, ever-changing cloud setups.The DD-ECOT system avoids these problems through employing a secure hash-based indexing method to keep data intact and by using parallel processing to speed up deduplication without impacting system performance. Enterprise cloud storage systems, disaster recovery solutions, and large-scale data management environments are some of the usage cases for DD-ECOT. Analysis of simulations shows that the suggested solution outperforms conventional deduplication techniques in terms of storage efficiency, data retrieval speed, and overall system performance. The findings suggest that DD-ECOT has the ability to improve cloud service delivery while cutting operational costs. A simulation reveals that the proposed DD-ECOT framework outperforms existing deduplication methods. DD-ECOT boosts storage efficiency by 92.8% by reducing duplicate data. It reduces latency by 97.2% using parallel processing and sophisticated deduplication. Additionally, secure hash-based indexing methods improve data integrity to 98.1%. Optimized bandwidth usage of 95.7% makes data transfer efficient. These improvements suggest DD-ECOT may save operational costs, optimize storage, and beat current deduplication methods.

Бесплатно

Data Mining Based Hybrid Intelligent System for Medical Application

Data Mining Based Hybrid Intelligent System for Medical Application

Adane Nega, Alemu Kumlachew

Статья научная

Hybrid intelligent system is a combination of artificial intelligence (AI) techniques that can be applied in healthcare to solve complex medical problems. Case-based reasoning (CBR) and rule based reasoning (RBR) are the two more popular AI techniques which can be easily combined. Both techniques deal with medical data and domain knowledge in diagnosing patient conditions. This paper proposes a hybrid intelligent system that uses data mining technique as a tool for knowledge acquisition process. Data Mining solves the knowledge acquisition problem of rule based reasoning by supplying extracted knowledge to rule based reasoning system. We use WEKA for model construction and evaluation, Java NetBeans for integrating data mining results with rule based reasoning and Prolog for knowledge representation. To select the best model for disease diagnosis, four experiments were carried out using J48, BFTree, JRIP and PART. The PART classification algorithm is selected as best classification algorithm and the rules generated from the PART classifier are used for the development of knowledge base of hybrid intelligent system. In this study, the proposed system measured an accuracy of 87.5% and usability of 89.2%.

Бесплатно

Журнал