Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 642

Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure

Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure

Girish Wali, Chetan Bulla

Статья научная

The financial sector is grappling with significant challenges in detecting cyber attacks, leading to potential short- and long-term financial losses for banks and other institutions. The statistical and machine learning methods have been effective in identifying suspicious activities, they have struggled to achieve a balance between recall and precision. To improve accuracy, this paper introduces a novel approach that employs deep learning and bio-inspired algorithms to detect suspicious activities. The proposed model analyzes transactional patterns, quantities, and temporal aspects using a carefully curated dataset of labeled transactions. The model shows promising results in distinguishing between legitimate and fraudulent operations, achieving a balance between recall and precision. Further, many in the industry are transitioning to cloud computing infrastructures to enhance application performance. However, these infrastructures are not ideal for delay-sensitive applications, such as those in the medical and finance sectors. To address communication delays, fog computing has emerged as a new paradigm. The proposed model was simulated using Python and the Google Colab framework, and experimental results shows that improved accuracy and a balanced recall and precision.

Бесплатно

Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses

Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses

Mukesh Kumar, Vivek Bhardwaj, Karan Bajaj, Nandini Modi, Ahmed Qtaishat

Статья научная

This paper presents the implementation and evaluation of a Multi-key Multi-modalities Biometric Encryption System designed for business enterprises, leveraging cloud storage for secure and scalable data management. The system integrates multiple biometric modalities fingerprint, iris scan, and face recognition to enhance data security through advanced multi-key encryption techniques, utilizing algorithms such as Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA). The encrypted biometric data is securely stored in the cloud, providing enterprises with efficient storage solutions. The system's performance was evaluated across several parameters including encryption/decryption time, biometric match accuracy, data transfer speeds, energy consumption, cost, and user satisfaction. The results demonstrate that multi-modal systems offer superior accuracy and security compared to single-modality systems, reducing error rates and enhancing reliability. However, multi-modal authentication incurs higher costs, energy consumption, and slightly longer processing times. Despite these trade-offs, the system achieved high user satisfaction, particularly in high-security environments where data protection is a priority. The findings indicate that the proposed system is a viable solution for businesses seeking a secure, scalable, and efficient method of protecting sensitive data.

Бесплатно

Sustainable E-waste Management at Higher Education Institutions’ Data Centres in Zimbabwe

Sustainable E-waste Management at Higher Education Institutions’ Data Centres in Zimbabwe

Vusumuzi Maphosa

Статья научная

The study’s objective was to examine the management of data centre electronic waste (e-waste) by Zimbabwean universities to ensure environmental sustainability and reduce the epidemiological effect of indiscriminate disposal of e-waste. The 21st century has seen universities adopting Information and Communication Technology (ICT) to automate processes and support technology-based learning, raising demands for data centre infrastructure to run applications and store data. In developing countries, obsolete ICT equipment is indiscriminately discarded with municipal waste into landfills and often scavenged to extract valuable metals using rudimentary methods such as heating, burning, and leaching, causing environmental and epidemiological crises. E-waste is the fastest growing stream of solid waste that contains scarce rare earth minerals and toxic elements, presenting an opportunity and a crisis during disposal. The study utilised the descriptive study design through a quantitative questionnaire to collect data from ICT Directors and Managers from Zimbabwean universities. Results show that a fifth of the participants had operational procedures for handling e-waste. A tenth of the participants knew of the existence of national policies. Obsolete equipment was kept in storerooms, while some were discarded with municipal trash. Most respondents were aware of the effect of e-waste, which is attributed to responsible management. Most participants redeployed decommissioned data centre equipment to less intense processing environments; 28% had labelled bins and designated e-waste collection points. In reducing their carbon footprint, three-quarters of the participants virtualised servers and stored data on the cloud, and 10% of the institutions practised take-back schemes and located data centres onsite. Universities should legislate the management of data centres to control carbon emissions, energy and e-waste and contribute to green initiatives. Partnerships with developed countries for data centre design and high-end recycling should be encouraged, thus creating employment, generating income for institutions and reducing the epidemiological effects.

Бесплатно

Systematic Analysis of Virtual Reality & Augmented Reality

Systematic Analysis of Virtual Reality & Augmented Reality

Asif A. Laghari, Awais K. Jumani, Kamlesh Kumar, M. Ameen Chhajro

Статья научная

Nowadays, users are moving from old 2D screens to modern devices such as 3D screens and virtual reality devices to enjoy videos and games like real-world experience, and this demand increased further development. Virtual Reality (VR) is based on the creation of a simulated environment of real-world with computer creation, and Augmented Reality (AR) is based on the addition of simulation components (environment) in the real-world scene. In this paper, systematic analysis of relationships and features both VR and AR varies by outline, arrangement, administrations, and devices for associations and clients. This paper provides a difference between AR and VR, advantages, future, and open research issues.

Бесплатно

Technical Study on Low Power VLSI methods

Technical Study on Low Power VLSI methods

T.Kapilachander, I.Hameem Shanavas, V.Venkataraman

Статья научная

In recent days every application must need power management. In this paper we presented a various techniques to handle the power management in IC. Power dissipation in a IC is base on power used by the IC and also by heat dissipation. To reduce energy use or to minimize heat dissipation some of the techniques are briefly discussed in this paper. Power management is becoming an increasingly urgent problem for almost every category of design and application, as power density, measured in watts per square millimeter, rises at an alarming rate. Power needs to be considered at the very early stages of a design, when the opportunity to save power is at a maximum. At the same time, making a design extremely power efficient results in trading off area and/or timing. For a Integrated Circuit (IC) perspective, effective energy management for a SoC (System-on-a-chip) must be built into the design starting at the architecture stage; and low-power techniques need to be employed at every stage of the design, from RTL (Register Transfer Level) to GDSII. This paper explains about the combination of techniques used for low power approach in integrated circuits (IC) or Chip

Бесплатно

Technical issues in E-governance initiatives in Satara district in Maharashtra state (India)

Technical issues in E-governance initiatives in Satara district in Maharashtra state (India)

Laxman L. Kumarwad, Rajendra D. Kumbhar

Статья научная

Maharashtra is one of the biggest states in India. The state as well as the central government is spending millions of rupees for providing the online services. However, their efforts and large investments result into launching various e-governance projects in the country. Common Service Centre, Public Distribution System and Land Record System, three projects are very important as citizen’s centric services concern. These projects are implemented by the state government through their subsidiary offices. Collector office is one of them. At the district level, Collector office is responsible for implementing and smoothly running of the e-governance projects. A rapid change in the technology is forcing new changes to be accepted in the e-governance domain. Considering these changes, government is slow in redefining the Government Process Reengineering, citizens’ relation, employee relationship. There are a lot of issues arise at the ground level in the implementation of the projects. Issues can be categorized as technical, administrative, financial, managerial etc. This research paper focuses on technical development and technical issues found in Satara district at the ground level while developing, implementing, delivering the services to the citizens, business and government and sustaining the projects.

Бесплатно

Technologies Ensuring the Sustainability of Information Security of the Formation of the Digital Economy and their Perspective Development Directions

Technologies Ensuring the Sustainability of Information Security of the Formation of the Digital Economy and their Perspective Development Directions

Alovsat Garaja Aliyev

Статья научная

The article is devoted to the technologies to ensure the sustainability of information security in the formation of the digital economy and their prospects. It has been shown that the digital transformation of the economy and society is a priority for the advanced countries of the world. It was argued that the safe and sustainable formation of an intellectual society and economy based on new information, knowledge and technology is one of the main goals. The features of the transition from an industrial economy to a new ICT-based information economy were analyzed. The issues of digital transformation of real economic sectors were considered. It was noted that ensuring the development of the modern economy on the basis of digital technologies, the development of high-tech sectors is one of the main goals. Potential areas for digitization of the economy have been identified. The economic features of the main technologies that shape the digital economy have been studied. The stages of analysis of the secure development of the digital economy sectors have been developed. Many concepts of the digital economy are systematized and approaches to its features are explained. Forecast options for the impact of the digital economy on GDP in the countries of the world are given. Mechanisms to ensure economic security, investment forecasts made by different countries to ensure economic cybersecurity are given. Research on the level of economic security and the main threats to the economy was analyzed. The main directions of security of the national economy and the main factors affecting the economic security of the country have been identified. Current approaches to economic security are summarized. The main types of economic security are given and a system of indicators is defined. The structural elements of the system of indicators for the analysis of economic security are proposed. System indicators have been developed to analyze the sustainability of economic security. Criteria for assessing the sustainability of regional economic security have been proposed. The assessment of the cybercrime market in the world is one of the most important issues and the most common types of cyber attacks are shown. An analysis of the state of growth in the field of cyberattacks in different years and the main stages of the evolution of cybersecurity are described. Proposals and recommendations have been developed in accordance with the experience of advanced countries on intelligent cybersecurity technologies.

Бесплатно

Technology Forecasting: A Case Study of Software Technology Product Families

Technology Forecasting: A Case Study of Software Technology Product Families

Amol C. Adamuthe, Abhaysinh V. Surve, Gopakumaran T. Thampi

Статья научная

With increasing use of computers, information and communication technologies, some software technologies products become part of everyday life. Many reports shows that use of desktop and mobile operating systems, search engines, web browsers, web servers and programming languages are increasing rapidly. This paper focuses on forecasting growth pattern of selected software technology product families using market share as indicator. Results of four growth curve methods namely Logistic, Gompertz, Log Logistic and Mono-Molecular are compared using MAD and RMSE error measures. For the period under consideration, majority software product families follow increasing / decreasing growth pattern. Results indicate that industry of respective technology product remain dominated by few providers for year 2025. Monopoly or oligopoly market structure will lead to long increasing period for the top providers.

Бесплатно

Test Cases Reduction and Selection Optimization in Testing Web Services

Test Cases Reduction and Selection Optimization in Testing Web Services

Izzat Alsmadi, Sascha Alda

Статья научная

Software testing in web services environment faces different challenges in comparison with testing in traditional software environments. Regression testing activities are triggered based on software changes or evolutions. In web services, evolution is not a choice for service clients. They have always to use the current updated version of the software. In addition test execution or invocation is expensive in web services and hence providing algorithms to optimize test case generation and execution is vital. In this environment, we proposed several approach for test cases' selection in web services' regression testing. Testing in this new environment should evolve to be included part of the service contract. Service providers should provide data or usage sessions that can help service clients reduce testing expenses through optimizing the selected and executed test cases.

Бесплатно

Text to speech synthesis for bangla language

Text to speech synthesis for bangla language

Khandaker Mamun Ahmed, Prianka Mandal, B. M. Mainul Hossain

Статья научная

Text-to-speech (TTS) synthesis is a rapidly growing field of research. Speech synthesis systems are applicable to several areas such as robotics, education and embedded systems. The implementation of such TTS system increases the correctness and efficiency of an application. Though Bangla is the seventh most spoken language all over the world, uses of TTS system in applications are difficult to find for Bangla language because of lacking simplicity and lightweightness in TTS systems. Therefore, in this paper, we propose a simple and lightweight TTS system for Bangla language. We converted Bangla text to Romanized text based on Bangla graphemes set and by developing a bunch of romanization rules. Besides, an xml-based data representation is developed as a feature of the system. It gives the flexibility to modify the data representation, parsing data and create speech based on one’s own dialect. Our proposed system is very lightweight which takes less processing time and produces a good understandable speech.

Бесплатно

Texture Features based Blur Classification in Barcode Images

Texture Features based Blur Classification in Barcode Images

Shamik Tiwari, Vidya Prasad Shukla, Sangappa Biradar, Ajay Singh

Статья научная

Blur is an undesirable phenomenon which appears as image degradation. Blur classification is extremely desirable before application of any blur parameters estimation approach in case of blind restoration of barcode image. A novel approach to classify blur in motion, defocus, and co-existence of both blur categories is presented in this paper. The key idea involves statistical features extraction of blur pattern in frequency domain and designing of blur classification system with feed forward neural network.

Бесплатно

The Behavior Change of Intelligent Agent Using Finite State Machine in “Save Karang Mumus” Game

The Behavior Change of Intelligent Agent Using Finite State Machine in “Save Karang Mumus” Game

Syafei Karim, Ida Maratul Khamidah

Статья научная

Save Karang Mumus is a learning game about caring for the environment. This game is an educational game that can provide knowledge to players so that players are expected to learn while playing. Save Karang Mumus Game uses a role-playing game genre where players must play a role to complete the mission of the game. Multimedia Development Life Cycle development method is used for the development of this game starting from concept, design to distribution. This research focuses on the behavior of NPCs that change based on certain conditions using the Finite State Machine (FSM) method. NPCs will chase players based on the variable amount of trash collected and Health Points. The game is tested using alpha test and beta test. Based on the results, the game can be played well and get a percentage value of 65.66% of the respondents' test results. An application can be said to be good if it is more than 61% and less than 80%. It can be concluded that Save Karang Mumus Game is successful and worthy to be played.

Бесплатно

The Decentralized Shariah-Based Banking System in Bangladesh Using Block-chain Technology

The Decentralized Shariah-Based Banking System in Bangladesh Using Block-chain Technology

Oishi Chowdhury, Md. Al Samiul Amin Rishat, Md. Al-Amin, Md. Hanif Bin Azam

Статья научная

Shariah-based banking aims to apply Islamic finance while adhering to Shariah principles. The primary distinction between conventional and Islamic finance is that Sharia law explicitly forbids several of the activities and principles applied in conventional banking. According to Sharia law, “Paying or charging an interest (Riba)” lending with interest payments as an exploitative practice that benefits the lender at the expense of the borrower, “investing in businesses engaged in banned activities" like producing and selling alcohol or pork, “speculation or gambling(Maisir)” That means financial institutions are prohibited from participating in contracts where the ownership of goods depends on an unpredictable future event, and Participation in contracts with a high level of risk or uncertainty is referred to as "uncertainty and risk (Gharar)", which are strictly prohibited. As a result, consumers must be aware of whether they are taking Riba, Gharar, Maisir or if their money is invested in a halal firm. Because of its qualities, blockchain would be useful in this situation. This research tries to determine how blockchain technology can be used to make investments and profit or loss returns more transparent, more secure, Immutable and sharia compliant. Blockchain networks can be utilized in the financial industry, such as banking, to provide safe sharia banking.

Бесплатно

The Direct and Indirect Influence of Gamification on Learning Engagement: The Importance of Learning Goal Orientation (A Preliminary Study)

The Direct and Indirect Influence of Gamification on Learning Engagement: The Importance of Learning Goal Orientation (A Preliminary Study)

Soepriyatna, Christian Haposan Pangaribuan

Статья научная

With the widespread use of digital gaming, there is a growing need to determine how games and its components might be used for learning and teaching. The majority of study in this topic has taken place in more economically established and developed regions, leaving a research void in emerging country situations. To gain a deeper understanding of the learning engagement, it is of significance to examine the gamification perceived ease of use as well as a dive into the learning goal orientation. This study examines the moderating effect of learning goal orientation that influences the relationship between gamification application and learning engagement. The theoretical model was tested in a quantitative study using structural equation modelling based on a PLS-SEM approach, conducted in Jakarta, with actual local college students. The findings of this investigation noted that gamification perceived ease of use was positively related to learning engagement, and learning goal orientation partially mediated this positive relationship. The value of this research may aid educators and practitioners in determining which factors may influence the adoption of gamification in formal higher education.

Бесплатно

The Dominance of Organizational Culture towards the Effectiveness of System Based on Islamic Values

The Dominance of Organizational Culture towards the Effectiveness of System Based on Islamic Values

Syaifullah, Tengku Khairil Ahsyar

Статья научная

Organizational culture is the dominant value or habit that becomes the driving force for an organization. Values, thoughts, and symbols based on Islam that influence the norms of behavior, attitudes, habits, and habits of a person in various fields become the culture of Islamic organizations that are believed to be true. The fundamental problem in this research is that organizations do not understand what the dominant organizational culture is today, how effective the system users are with these cultural conditions, and whether the current level of effectiveness of the dominant culture follows Islamic values. Previous research shows the relationship between organizational culture and effectiveness, while this study adds new variables, and proves the relationship of organizational culture dominance model with system effectiveness based on Islamic values on practical contribution, and creates a new model on theoretical contribution. The research phase begins with finding the current dominant organizational culture using the Organizational Culture Assessment Instrument and the Cultural Values Framework Instrument. Next, look for the relationship between the current dominant organizational culture and the effectiveness of the system by using the Delone and Mclean Is Success Model. Then combine the second model based on Islamic values using Structural Equation Modeling (SEM) - Partial least square (PLS). The result of this research is that there is a relationship between the dominance of the current organizational culture and the effectiveness of information systems. This is because the dominant organization is a clan that is familial in reaching an agreement, commitment between members in communicating, increasing the intensity of members in using information systems, systems that are easy to reach and use, and the quality of information systems that are easy, effective, and accountable. Meanwhile, the dominance of organizational culture on the effectiveness of information systems based on Islamic values has not been fully proven. This means that the dominance of organizational culture on the effectiveness of the Islamic values information system still needs to be adjusted to the four indicators on the Islamic values variable showing the closeness of values.

Бесплатно

The Effect of Relocation the Country’s Capital on Poverty Rates Using System Dynamics (Case Study: Balikpapan City)

The Effect of Relocation the Country’s Capital on Poverty Rates Using System Dynamics (Case Study: Balikpapan City)

Anzor, Abdul Alimul Karim, Christopher Davito Prabandewa Hertadi

Статья научная

The relocation of the country's capital has a significant impact on the economy of the surrounding cities and caused rapid population growth and at the same time does not improve the city's environmental and planning capabilities. Data from the Central Statistics Agency shows that in the ten years from 2010 to 2020, the population of Balikpapan City increased by around 130,739 people and poverty in Balikpapan City in 2019 reached 15,780 people and in 2020 it reached 17,020 people. as many as 688,318 people. The increase in the number of poor people is caused by many factors, starting from inflation, Human Development Index (HDI), education, labor, unemployment rate, Gross Regional Domestic Product (GRDP), and average per capita expenditure. Dynamic systems have two main elements, namely Causal Loop Diagrams (CLD) and Stock Flow Diagrams (SFD). This research aims to determine the impact of moving the capital city from Jakarta to Nusantara on poverty levels in Balikpapan. The results obtained are based on the research graph, namely that moving the country's capital has a significant effect on the poverty level in the Balikpapan city, moving the country's capital resulted in population mobilization and an insignificant increase in the number of births. Along with increasing opportunities and employment opportunities. Minimize this condition, several efforts can be made, namely by carrying out campaigns on the use of contraceptives and family planning programs to reduce birth rates, especially for people who are classified as poor, as well as providing training and expanding job opportunities for local workers.

Бесплатно

The Generation system of Textile Pattern draft Based on Quasi-regular Pattern Theory

The Generation system of Textile Pattern draft Based on Quasi-regular Pattern Theory

Suyi Liu

Статья научная

The quasi-regular patterns generated from hamiltonian has unique balanced symmetry. The patterns are quite suitable for the textile fabric. However the number of patterns just generated from hamiltonian are limited. Therefore in this paper a 110 of functions built by the methods of hamiltonian of superposition, nesting, combination and parameter variations, and it can increase the type and quantity. All of functions can generate fine patterns suited for textile fabric after computer graphics. The system of textile pattern draft is generated by Visual basics for the computer. The system allows individual selection of function and parameters to change the pattern and the color conditioning. In this way, it successfully achieves the purpose.

Бесплатно

The Impact of Dots Representation in Recognition of Isolated Arabic Characters

The Impact of Dots Representation in Recognition of Isolated Arabic Characters

Nehad H A Hammad, Mohammed Elhafiz Musa

Статья научная

The Arabic Optical Characters Recognition (AOCR) is one of the challenging recognition tasks nowadays, as Arabic handwriting is cursive and contains many dots. Dots are a big challenge for Arabic recognizers, as writers sometimes connect them. Moreover, Dots are prone to be considered noise. This paper proposes a new divide and conquers based approach that tries to conquer dots problems. The novelty of the proposed approach is in its feature extraction method. The extracted features are used to train Artificial Neural Network (ANN) Feed-forward. The result is interesting and shows that this method should be further investigated.

Бесплатно

The Implementation Of ERP In Supply Chain Management On Conventional Woven Fabric Business

The Implementation Of ERP In Supply Chain Management On Conventional Woven Fabric Business

Julianty Surasma Surung, I. Putu Agung Bayupati, Gusti Agung Ayu Putri

Статья научная

The development of modern technology requires companies to increasingly compete. It does not only apply to big companies but also small companies like Micro, Small and Medium Enterprises (MSME). In Indonesia, most MSME runs without the use of information technology, one of which is the XYZ weaving conventional business. The XYZ Weaving Business is a manufacturing company that produces products in the form of Endek Fabrics and Custom Fabrics. Endek is a term for ikat woven fabric originating from the island of Bali. Endek woven fabric has a variety of unique motifs from sacred to reflect the feel of nature. Meanwhile, custom weaving is a term for woven fabric that has a homemade motif and usually comes from the wishes of the customer. The business has an income above 50 million rupiahs every month with a total production of 2000 meters of fabric, besides, their customers are from companies and individuals. However, their processes are still managed conventionally, resulting in internal problems such as unorganized data and information due to the lack of integration among company divisions. Furthermore, it also results in disrupted service to customers and the company could suffer losses. ERP is a very popular concept to use in companies because it has a functional area that suits the needs of the company. The ERP used in this study is based on Open source, namely Odoo. The results of research with the implementation of Odoo software by using the Sales, Purchase, Inventory and Manufacturing modules resulting in a more integrated business process change. A test was conducted by using the User Acceptance Testing method to 10 respondents consisting of marketing company employees, administrators, material purchases, warehouses, and production. The total score obtained is 713 and is located in the third quarter, which means the system is considered quite successful to be implemented in XYZ Weaving.

Бесплатно

The Implementation of 3D Scene Walkthrough in Air Pollution Visualization

The Implementation of 3D Scene Walkthrough in Air Pollution Visualization

Shigang Wang, Weitao Li

Статья научная

We present a practical and novel approach to implement 3D scene walkthrough for air pollution visualization. This approach includes volume rendering and clipping methods, which are used to visualize large-scale air pollution data. A new viewpoint-based volume clipping method is used while rendering, which is fast and more interactive than previous methods. We achieved expected experimental results and our research could benefit environment monitoring and many other applications associated with pollution visualization.

Бесплатно

Журнал