- Все статьи 611
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 611
A Novel Model for Cloud Based Mobile Learning System
Areej Omar Baalghusun, M. Rizwan Jameel Qureshi
Статья научная
Mobile learning (M-learning) becomes revolutionary way to educate the world with the mass advancement in information and communications technology (ICT). It is difficult to deal with m-learning due to increasing number of users, services, education contents and resources and modes to deploy. Cloud computing, with its dynamic scalability and virtualized resources usage, is widely deployed for several applications in many organizations. It has a significant impact in the educational and learning environment. This paper presents a new model for mobile learning system in cloud computing environment that is enriched with high performance computing (HPC) and graphical processing unit (GPU) cluster infrastructure. This model aggregates the power with new technologies to implement M-leaning process more effective with high performance and quick response.
Бесплатно
A Novel Probability based Approach for Optimized Prefetching
Arvind Panwar, Achin Jain, Manish Kumar
Статья научная
As the World Wide Web carries on to grow up rapidly in size and popularity, web traffic and network bottlenecks are more important issues in the networked world. The continued enhancement in demand for items on the World Wide Web causes severe overloading in many sites, network congestion, delay in perceived latency and network bottleneck. Many users have no patience in waiting more than a few seconds for downloading a web page, that's why Web traffic reduction system is very necessary in today World Wide Web for accessing the websites efficiently with the facility of existing networks. Web caching is an effective method to improve the performance of the World Wide Web but in today's World Wide Web caching method alone is not enough because of World Wide Web has grown quickly from a simple information-sharing mechanism to a rich collection of dynamic objects and multimedia data. The web prefetching is used to improve the performance of the proxy server. Prefetching predict web object that is expected to be requested in the near future and store them in advance, thus the response time of the user request is reduced. To improve the performance of the proxy server, this paper proposed a new framework which combines the caching system and prefetching technique and also optimize the prefetching with the help of probability. In this paper, we use the dataset for the experiment which is collected from ircache.net proxy server and give the result with the comparison of other technique of prefetching.
Бесплатно
A Parallel-SQLIA Detector for Web Security
Pankaj Kumar, C.P. Katti
Статья научная
An SQL injection attack compromises the interactive web based applications, running database in the backend. The applications provide a form to accept user input and convert it into the SQL statement and fire the same to the database. The attackers change the structure of SQL statement by manipulating user inputs. The existing static and dynamic SQLIA detectors are being used for accurate detection of SQL injection, but it ignores the efficiency of the system. These detectors repeatedly verify the same queries inside the system, which causes unnecessary wastages of system resources. This paper contains the design approach of a parallel algorithm for the detection of SQL injection. The Algorithm uses the concept of Hot Query Bank (HQB) to cooperate with the existing SQLIA detectors (e.g. AMNESIA, SQLGuard, etc) and enhances the system performance. It simply keeps the information of previously verified queries in order to skip the verification process on the next appearance. The system performance has been observed by conducting a series of experiments on multi core processors. The experimental results have shown that parallel-SQLIA detector is 65% more efficient in term of time complexity. Further this design can be implemented in real web application environment; and the design interface can be standardized to cooperate with web application and the SQLIA detectors.
Бесплатно
A Passengers Safety Assistance System during a Transport Riding Event Using Machine Learning
Uchhas Dewan, Mahfuzulhoq Chowdhury
Статья научная
The rise in popularity of ride-sharing services and ride-booking systems has created new opportunities and challenges for security and safety. A useful system for passenger safety assistance using machine learning and mobile applications is missing from the existing work. This paper develops a data set regarding suspicious activity detection using a questionnaire. This paper selects a suitable machine learning model for suspicious activity prediction during a transport ride by examining support vector classifiers (SVC), random forest, MLP classifiers, decision trees, KNN, logistic regression, and Gaussian naive Bayes classifiers. The results showed that the SVC is most suitable, with 97% accuracy, for classifying suspicious activity predictions during transport riding. This paper provides a passenger safety mobile application with passenger and driver verification, application rating, suspicious activity prediction, suggestions regarding safety, location mapping, and trip booking features. The application evaluation results based on users’ comments showed that more than 55 percent of users supported the application's usability and effectiveness nature.
Бесплатно
A Progressive Key Administration for Block-Chain Technology with Lagrange Interpolation
Pradeep Kumar, Ajay Kumar, Mukesh Raj, Priyank Sirohi
Статья научная
Block chain is a computerized data set containing data (like records of monetary exchanges) that can be at the same time utilized and shared inside an enormous decentralized, openly open organization. Block chain development has been a prominent occurrence of changing the statutes of wellbeing in money related trades and information exchange. It offers an extraordinary development for data integration with security. Block chain relies upon the norms of understanding, decentralization, and cryptography for following the trust in trades. In any case, block chain security issues have continued to agitate various affiliations and early adopters. It is sure that, even the grounded block chain new organizations experience burdens in block chain security. Without a doubt, block chain innovation has seen a far-reaching adaption lately. Aside from beginning adaption into digital currencies, today it is being utilized in medical care, land, shrewd contacts, and so forth. The ill-advised execution of innovation has been the reason for some block chain block protection concern, which can put the block chain vulnerable and can permit the aggressors to play out a few noxious exercises. To address the secrecy to the sensitive information in the Block chain organization, a proposed method namely progressive secure key administration for Block-Chain Technology with Lagrange Interpolation (PKABCLI) has been presented in this paper.
Бесплатно
Sabyasachi Chakraborty, Kashyap Barua, Manjusha Pandey, Siddharth Rautaray
Статья научная
Big Data which is one of the newest technologies in the present field of science and technology has created an enormous drift of technology to a salient data architecture. The next thing that comes right after big data is Hadoop which has motivated the complete Big Data Environment to its jurisdiction and has reinforced the complete storage and analysis of big data. This paper discusses a hierarchical architecture of Hadoop Nodes namely Namenodes and Datanodes for maintaining a High Availability Hadoop Distributed File System. The High Availability Hadoop Distributed File System architecture establishes itself onto the two fundamental model of Hadoop that is Master-Slave Architecture and elimination of single point node failure. The architecture will be of such utilization that there will be an optimum load on the data nodes and moreover there will be no loss of any data in comparison to the size of data.
Бесплатно
A Proposal of Expert System to Select Components for the Product Line Software Engineering
M. Rizwan Jameel Qureshi, Nora Farraj
Статья научная
Programming companies in last decades have started to depend more and more on software components in developing their systems in order to save development time and increase the productivity of the company. However, this led to dramatically increase in the number of components, and selecting the appropriate component becomes a tough task. In this paper the authors propose an expert system to help developers choosing the best component fit their requirements. A survey is done to evaluate the efficiency of this proposed solution.
Бесплатно
A Proposed Model for Vehicle Registration Using Blockchain
Md. Zawad Hossain Rifat, Md. Shakil, Rifat Md. Iftakhar Hasan, F. A. Zidan, Dip Nandi
Статья научная
Systems for registering vehicles are essential for keeping track of ownership changes. However, severe flaws in the current systems permit vehicles that have been stolen or illegally sold to be registered. Inefficient verification techniques, drawn-out administrative processes, and dishonest employees cause these problems. This paper introduces a transparent system to prevent denial, alteration, or unauthorized manipulation. The proposed method employs hybrid blockchain architecture, distinguishing between confidential and non-confidential data. Personal information is stored privately, while vehicle-related data is maintained as public information. The adoption of blockchain technology is driven by its robust security features, transparency, and traceability, as well as its immutability and ability to handle many users effectively.
Бесплатно
A Reengineering based Framework for Integration of e-Governance Portal of Various State
Ganesh Chandra, Sachin Sahu, Sanjay K. Dwivedi
Статья научная
One of the most important purposes of e-Governance is to increase the satisfaction level of citizens. A single window system often helps in great way to access various government services. However, many e-Governance portals lack in integration and interoperability. Often individual state/local governments use their own portal for providing various e- services to its citizens which at times require integration and coordination with similar portals of other states for the information sharing. Lack of this feature restricts the usages of services. The realization towards this came from our previous case studies of two such portals (namely SPST and Jansunwai) of the state of Uttar Pradesh to understand the issues therein. This paper presents a general framework and guidelines for e-Governance which may be considered for implementation to overcome the existing limitations identified during the period of this study and research. The roadmap shown can improve the services, scope and functionality of certain portals. Central to this skeleton is the interconnection and integration of similar e-services being offered by different government in the country.
Бесплатно
A Review Study of Function-as-a-Service for Small Scale Businesses in Pakistan
Muhammad Fahad, Syed Muhammad Taha Rizvi, Waqas Mahmood
Статья научная
In today’s digitally driven world, many small to medium Scale Enterprises (SMEs) find it difficult to manage or scale businesses due impediments in procuring and managing digital and software services. Many SMEs are unable to purchase the off-the-shelf software, as they are not tailor-made for their specific business use-cases and at times may not even fulfill the requirements. Creating custom software applications is an expensive undertaking and is difficult to maintain and scale. Further, the cost of deployment of these applications and ensuring availability either on premises or on cloud becomes a major hurdle. To overcome these hindrances, in this paper we propose the use of function-as-a-service technology in comparison to other options like micro-services and Service Oriented Architecture (SOA) and have highlighted the benefits in terms of ease of development and managing further we have put forth some economic benefits they have. FaaS can prove to be a major game changer service as it follows the model of pay-as-you-use and at idle time it can even scale to zero usage. This paper mainly discusses the option of using FaaS to help SMEs scale their application while cutting down on initial cost as well as economic impact in long run as compared to the other more traditional digital software service delivery models such as SaaS, ERP and custom application development.
Бесплатно
A Review of Applications of Linear Programming to Optimize Agricultural Solutions
Alanoud Alotaibi, Farrukh Nadeem
Статья научная
Quantitative methods help farmers plan and make decisions. An apt example of these methods is the linear programming (LP) model. These methods acknowledge the importance of economizing on available resources among them being water supply, labor, and fertilizers. It is through this economizing that farmers maximize their profit. The significance of linear programming is to provide a solution to the existing real-world problems through the evaluation of existing resources and the provision of relevant solutions. This research studies various LP applications including feed mix, crop pattern and rotation plan, irrigation water, and product transformation; that have the main role to enhance various facets of the agriculture sector. The paper will be a review that will probe into the applications of the LP model and it will also highlight the various tools that are central to analyzing LP model results. The review will culminate in a discussion on the different approaches that help optimize agricultural solutions.
Бесплатно
A Review of Data Security Challenges and their Solutions in Cloud Computing
Isma Zulifqar, Sadia Anayat, Imtiaz Khara
Статья научная
Cloud computing is the newest web based computing network that offers the users with convenient and flexible resources to access or function with different cloud applications. Cloud computing is the availability of the computer network services, mainly storing data and computational power, without explicit user active control. The data in cloud computing is stored and accessed on a distant server by using cloud service provider’ applications. Providing protection is a main issue because information is transferred to the remote server through a medium. It is important to tackle the security issues of cloud computing before implementing it in an organization. In this paper, we call attention to the data related security issues and solution to be addressed in the cloud computing network. To protect our data from malicious users we can implement encryption. We have discussed the advantages of cloud computing in our paper.
Бесплатно
A Review of Electronic Voting Systems: Strategy for a Novel
Adewale Olumide S., Boyinbode Olutayo K., Salako E. Adekunle
Статья научная
The voting system in the world has been characterised with many fundamental challenges, thereby resulting to a corrupt contestant winning an election. Researchers have been emotionally, physically, socially and intellectually concerned about the election malpractices recorded at various levels of electing a representative. Questions on how corrupt stakeholders in elections could be prevented from fraudulent activities such as rigging and impersonation called for discussion and answers. Consequences of declaring a corrupt contestant as a winner are bad governance, insecurities and diversification of public funds for personal gains. There must be approaches to tackle the problems of voting systems. This paper focused on a comprehensive review of electronic voting systems by different scholars as a platform for identifying shortcomings or drawbacks towards the implementation of a highly secured electronic voting system. The methods used by different scholars were technically reviewed so as to identify areas that need improvement towards providing solutions to the identified problems. Furthermore, countries with history on the adoption of e-voting systems were reviewed. Based on the problems identified from various works, a novel for future work on developing a secured electronic voting system using fingerprint and visual semagram techniques was proposed.
Бесплатно
Enesi Femi Aminu, Ishaq Oyebisi Oyefolahan, Muhammad Bashir Abdullahi, Muhammadu Tajudeen Salaudeen
Статья научная
The success of machine represented web known as semantic web largely hinges on ontologies. Ontology is a data modeling technique for structured data repository premised on collection of concepts with their semantic relationships and constraints on domain. There are existing methodologies to aid ontology development process. However, there is no single correct ontology design methodology. Therefore, this paper aims to present a review on existing ontology development approaches for different domains with the goal of identifying individual methodology’s weakness and suggests for hybridization in order to strengthen ontology development in terms of its content and constructions correctness. The analysis and comparison of the review were carried out by considering these criteria but not limited to: activities of each method, the initial domain of the methodology, ontology created from scratch or reuse, frequently used ontology management tools based on literature, subject granularity, and usage across different platforms. This review based on the literature showed some approaches that exhibit the required principles of ontology engineering in tandem with software development principles. Nonetheless, the review still noted some gaps among the methodologies that when bridged or hybridized a better correctness of ontology development would be achieved in building intelligent system.
Бесплатно
A Review on Search and Discovery Mechanisms in Social Networks
Shabnam Hassanzadeh Sharif, Shabnam Mahmazi, Nima Jafari Navimipour, Behzad Farid Aghdam
Статья научная
Social search is a variant of information retrieval where a document or website is considered relevant if individuals from the searcher’s social network have interacted with it. To the best of our knowledge, there is no new detailed paper which covers discovery method in social network; therefore, in this paper we surveyed searching methods in social network which have been presented so far. We classified the existing methods in four main categories: people search, job search, keyword search and web service discovery. Also we conclude the paper with some implications for future research and practice.
Бесплатно
Rath Jairak, Prasong Praneetpolgrang, Nivet Chirawichitchai
Статья научная
Trust has been reported as a key role in e-business, especially for a monetary based system like e-commerce. Therefore, many previous studies have been conducted to investigate the antecedents and consequences of consumer trust. But there has been little work done on establishing sensible solutions for leveraging consumer trust. Furthermore, previous studies in managerial trust have not demonstrated trust management that can illustrate a method to link their solutions with the consumers' point of view. In this paper, we therefore propose a practical roadmap for establishing trust management strategy that is consistent with consumer perceptions. Within this roadmap, firstly, a component extraction is performed on survey data in order to identify the quality criteria that actually impact buying decision process. Based on these criteria, the sensible factors for establishing trust and satisfaction are discovered from the regression analysis. Then, the prediction equations for trust and satisfaction are generated. After that the results of prediction equations are applied with a fuzzy linguistic approach in order to convert these results in linguistic terms. Finally, trust management strategy is established. By using our proposed method, website managers can identify which are the quality criteria that are consistent with their customer perceptions and they can use these criteria as a basis for improving trust and satisfaction in their websites.
Бесплатно
A Robust Approach for R-Peak Detection
Amana Yadav, Naresh Grover
Статья научная
Electrocardiogram (ECG) is very crucial and important tool to detect the cardiac problems. For ECG analysis, it is essential to measure ECG parameter accurately. It is very critical in all types of ECG application. The accurate R Peaks detection is starting step in extracting ECG features which is necessary for the other ECG performance stages. It is very essential to detect these R-peaks accurately and efficiently to detect heart diseases or anomalies which create primary source of death in the universe. Hence automatic R-peaks detection in a lengthy duration ECG signal is very meaningful to diagnose the cardiac disorders. Here a latest R-peak exposure algorithm depended on Shannon energy envelope estimator and logic to find peaks has been proposed which uses the simple threshold of Shannon energy.
Бесплатно
A Safety Data Model for data analysis and decision making
Ilyasu Anda, Isah Omeiza Rabiu, Enesi Femi Aminu
Статья научная
The systems related to safety are becoming more and more important and are dependent on complex data both in terms of volume and variety. This is especially of importance in applications demanding data analysis, intensive maintenance and focuses on the potential threats due to possible data errors, such as railway signaling, traffic management etc. Errors in analysis of data could result in loss of many lives and financial loss such as the cases of Annabella container ship- Baltic Sea accident (United Kingdom Merchant Shipping, Regulations 2005 – Regulation 5). Despite these potential errors in data leading to accidents or mishaps, this part of the system has been ignored; this study focuses on the integrity of data in safety critical applications. It did so by developing a method for building metadata through a data chain, mining this metadata and representing it in such a way that a consumer of the data can judge the integrity of the data and factor this into the decision-making aspect of their response. This research proposes a design, implementation and evaluation of a safety data model that helps to ensure integrity of data use for data analysis and decision making to prevent loss of lives and properties. Modern and sophisticated ETL software tools including Microsoft SQL Server 2012 Data Tools and Microsoft SQL Server Management Studio were explored. The data were extracted from Safety Related Condition Reports (SRCRs) dataset and used data mining techniques to transform and filter unsafe and hazardous data from the extracted data and stored the safe data into the Data Warehouses (DWs). The prototype was able to load data into designated DWs. The success of the developed model proved that the prototype was able to extract all datasets, transform and load data into the DWs and moved extracted files to archive folder within 7.406 seconds.
Бесплатно
A Smart IoT Device for Child’s Safety Real Time Monitoring System
Vinod Kumar B., Sangeetha J.
Статья научная
The IoT technology is used to monitor the child’s safety in the real time. The overall system is controlled by the Raspberry pi 3 module and it is connected to all the IoT devices. The child’s body temperature and pulse rate values are extracted through sensors. Whenever child experiences any abnormal feelings or unusual activities like fear, anxiety, etc. the temperature and pulse rate values reach above threshold and when child speaks with a specific keyword (i.e. “Help Me” or “Save Me”) then the voice recognition system gets activated. The child’s input voice will be converted into text format. When these text formats gets matched with the keywords then immediately pi camera captures the image of an attacker and sends an E-mail alert and at the same time even SMS alert is sent to the parents/guardians. The parents can also watch the live video streaming of the attacker in the YouTube channel from their remote location. This safety system also sends SMS alert message through Twilio in the local language (i.e. Kannada and Hindi) to the registered phone numbers (i.e. surrounding/neighbors of the victim), so that any local citizen can read and understand the message to save the child.
Бесплатно
A Stochastic Model for Document Processing Systems
Pierre Moukeli Mbindzoukou, Jocelyn Nembe
Статья научная
This work is focused on the stationary behavior of a document processing system. This problem can be handled using workflow models; knowing that the techniques used in workflow modeling heavily rely on constrained Petri nets. When using a document processing system, one wishes to know how the system behaves when a new document enters in order to give precise support to the manager's decision. This requires a good analysis of the system's performances. But according to many authors, stochastic models, specifically waiting lines should be used instead of Petri nets at a strategic level in order to lead such analysis. The need to study a new model comes from the fact that we wish to provide tools for a decision maker to lead accurate performance analysis in a document processing system. In this paper, amodel for document management systems in an organization is studied. The model has a static and a dynamic component. The static one is a graph which represents transitions between processing units. The dynamic component is composed of a Markov processes and a network of queues which model the set of waiting-lines at each processing unit. Key performance indicators are defined and studied point-wise and on the average. Formulas are given for some example models.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2024 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.