- Все статьи 642
-
Подпишитесь, чтобы получать уведомления о публикации новых выпусков
International Journal of Information Engineering and Electronic Business @ijieeb
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 642

Nafiz Ahmed, Anik Kumar Saha, Mustafa Ahmad Arabi, Sheikh Talha Jubayer Rahman, Dip Nandi
Статья научная
An Enterprise Resource Planning (ERP) system is a software application that serves as a centralized platform to streamline and automate organizational functions and share real-time data, facilitating efficient communication and collaboration. It provides an all-inclusive approach to managing and optimizing business processes, boosting efficiency, fostering cooperation, and giving an overall picture of how the organization is operating. However, the traditional centralized databases in ERP systems pose security concerns. Blockchain Technology can be an appealing alternative as it comes with immutable and decentralized data as well as enhanced security. This study focuses on two methods of securing data management in ERP systems: Organizing the distributed information using The Ralph Kimball data model and optimizing an individual block using Database Sharding. This study does an extensive examination to determine the effectiveness of both suggested strategies, comprising a detailed evaluation that highlights the benefits and limitations of both techniques. This paper intends to patch the security holes in ERP systems to safeguard sensitive data and mitigate risks.
Бесплатно

URLGuard: A Holistic Hybrid Machine Learning Approach for Phishing Detection
Pradip M. Paithane
Статья научная
The fast growth of Internet technology has significantly changed online users’ experiences, while security concerns are becoming increasingly overpowering. Among these concerns, phishing stands out as a prominent criminal activity that uses social engineering and technology to steal a victim’s identification data and account information. According to the Anti-Phishing Working Group (APWG), the number of phishing detections increased by 46 in the first quarter of 2018 compared to the fourth quarter of 2017. So to overcome these situations below paper introduces a phishing detection system using a hybrid machine learning approach based on URL attributes. It addresses the growing threat of phishing attacks that exploit email manipulation and fake websites to deceive users and steal sensitive data. The study employs a phishing URL dataset with over 11,000 websites, extracted from a reputable repository. After pre-processing, a hybrid machine learning model, which includes Decision Tree, Random Forest, and XGB is employed to safeguard against phishing URLs. The proposed approach undergoes evaluation with key metrics such as precision, accuracy, recall, F1-score, and specificity. Results demonstrate that the proposed method surpasses other models, achieving superior accuracy and efficiency in detecting phishing attacks.
Бесплатно

USSD System for Monitoring and Management of Employee Leave in Higher Educational Institution
Adamu Abubakar, Amit Mishra, Aliyu Yahaya Badeggi, Abubakar Abdulkadir
Статья научная
Unstructured supplementary service data also referred to as feature code or quick code has become a monumental part of services and products offered by Telecommunication Operators, and its application to various areas of telecommunication and real-world scenarios. It is a protocol of communication utilized by global system for mobile communications cell phones to communicate with mobile telecommunication network operators and applicable to various areas of trend in modern information technology sectors such as Wireless Application Protocol browsing, mobile-money services, prepaid call back services, menu-based information services, location-based content services, paid content portal, voting surveys, and product promotion. This system was designed by integrating the designed unstructured supplementary service data channel for employee leave management system into the standard global system for mobile communications architecture. The architecture consists of three parts; the front end, the middle end, and the back end. The system is implemented using PHP for the overall programming, MySQL for the database, and Windows 7 operating system as a development environment with Adobe dream weaver CS3 IDE. Apache TOMCAT webserver was used to host the system locally. Two interfaces were developed; one side with the mobile operators, which requires setting up of SS7 stack and the unstructured supplementary service data application over the stack. On the other side, HTTP-basedAPIs were used for the unstructured supplementary service data application. Several types of leaves exist and their usage depends on educational institution policies. An employee may apply for study leave like maternity leave, sick leave, and annual leave. Paper-based work is time consuming, USSD based activities are very simple and effective. This research work was conducted to solve the leave management in an academic institution using the USSD. Using the developed system, 1326 USSD sessions were recorded, 1238 sessions were successful, 59 were incomplete, and 29 failed. Cumulative findings from the 41 respondents reveal that the system is faster, more convenient, and user-friendly than the manual method of applying and managing employee leave, which indicates 94% of the success of the system. Thus, it can be concluded that the system was able to manage the leave management very well and very effectively.
Бесплатно

Unified Domain Adaptation with Discriminative Features and Similarity Preservation
Obsa Gilo, Jimson Mathew, Samrat Mondal
Статья научная
In visual domain adaptation, the goal is to train effective classifiers for the target domain by leveraging information from the source domain. In unsupervised domain adaptation, the source domain provides labeled data while the target domain lacks labels. However, it is crucial to recognize that the source and target domains have different underlying distributions despite sharing the same label space. Directly applying source domain information to the target domain often leads to poor performance due to the distribution gap between the two domains. Unsupervised do- main adaptation aims to bridge this gap and improve performance. We introduce a comprehensive UDADFSP (Unified Domain Adaptation with Discriminative Features and Similarity Preservation) de- signed explicitly for unsupervised domain adaptation to tackle these challenges. Our framework focuses on incorporating discriminative and invariant features. We employ clustering with entropy regularization on the unlabeled target domain to refine the neighbor relationships. This step significantly enhances the alignment between the target and source domains, facilitating a more effective adaptation. Furthermore, we seamlessly incorporate discriminative features while preserving similarity in the source and target domains. We carefully balance the discrimination and similarity aspects by considering linear and non-linear data representations. Extensive testing demonstrates that learning discriminative and similarity features in the same feature space yields significant improvements over several state-of-the-art domain adaptation techniques. In a comparative evaluation, our approach surpasses several existing methods across four diverse cross-domain visual tasks and the Amazon re- view sentiment analysis task.
Бесплатно

User story based information visualization type recommendation system
Liu Xu
Статья научная
To help users to determine the most appropriate visualization type is a useful feature of business visualization tools. Existing systems often give preliminary suggestions based on data sources but usually cannot make practical final decision. User stories are generalizations of user requirements. To recommend visualization type based on user stories can make better use of human experience to achieve automated decision making. One approach discussed in the paper is using machine learning techniques to model existing visualization types with corresponding user stories, and then use this model to predict recommended visualization type for new user story. This paper designs and implements a recommendation system prototype ReViz to verify the feasibility of this approach. As a typical web application, Modeling, Input Processing and Predicting components of ReViz are programmed using Python with Flask framework and Anaconda package set, and user interface is implemented using HTML, JavaScript and CSS with Bootstrap front-end library. The evaluation results show that ReViz can give recommended visualization type based on user story keywords. As a data-based intelligent software development technology achievement, visualization type recommendation system can also be integrated into larger business information management systems.
Бесплатно

Using publications linked open data to define organizational policies
Muhammad Ahtisham Aslam
Статья научная
Researchers around the world are publishing their scientific research results in different forms such as books, journal articles, reference works and project reports. Publishers of these scientific documents usually describe them by using metadata for organizational purposes. This metadata provides a rich information about scientific documents that can be used for analysis purposes such as measuring the impact of researchers and research centers. It can also be used to find scientific documents published in domain of some ones interest, which ultimately can be used to raise the state of the art to the next level. Scientific publications metadata can also be used to analyze the quality and directions of common and highly cited individuals and organizations, and based on this analysis other individuals and organizations can define directions for their future work and research. However, the main limitation of this metadata is that it is available in different formats that might not facilitate the analysis of scientific documents. Therefore, in this paper we clarify that how our SPedia knowledge base (a semantic based knowledge base of scientific publications metadata which we extracted by using SpringerLink as information source) facilitates the analysis of scientific data for policy making. We discuss different kind of questions that can be answered through SPedia knowledge base and we show that how results of these questions can be used to analyze the performance of individuals as well as organizations. We also show that how results of such analysis can help in making organizational policies regarding future research directions.
Бесплатно

Validation lamina for maintaining confidentiality within the Hadoop
Raghvendra Kumar, Dac-Nhuong Le, Jyotir Moy Chatterjee
Статья научная
In the white paper we strive to cogitate vulnerabilities of one of the most popular big data technology tool Hadoop. The elephant technology is not a bundled one rather by product of the last five decades of technological evolution. The astronomical data today looks like a potential gold mine, but like a gold mine, we only have a little of gold and more of everything else. We can say Big Data is a trending technology but not a fancy one. It is needed for survival for system to exist & persist. Critical Analysis of historic data thus becomes very crucial to play in market with the competitors. Such a state of global organizations where data is going more and more important, illegal attempts are obvious and needed to be checked. Hadoop provides data local processing computation style in which we try to go towards data rather than moving data towards us. Thus, confidentiality of data should be monitored by authorities while sharing it within organization or with third parties so that it does not get leaked out by mistake by naïve employees having access to it. We are proposing a technique of introducing Validation Lamina in Hadoop system that will review electronic signatures from an access control list of concerned authorities while sending & receiving confidential data in organization. If Validation gets failed, concerned authorities would be urgently intimated by the system and the request shall be automatically put on halt till required action is not taken for privacy governance by the authorities.
Бесплатно

Value-Risk Analysis of Crowdsourcing in Pakistan’s Perspective
Muhammad Saady, Qurat-ul-Ain, Sidra Anwar, Sadia Anayat, Samia Rafique
Статья научная
The benefits of crowdsourcing are enabled by open environments where multiple external stakeholders contribute to a firm's outcomes. In recent years, crowdsourcing has emerged as a distributed model of problem-solving and market development. Here, model assignments are assigned to networked individuals to complete so that the manufacturing expense of a business can be minimized considerably. The main objective of this research is to develop a methodology which will capture the value generation process in the presence of uncertainties (Risk factors) in crowdsourcing context. This study is designed to make an important contribution to the field of practice and knowledge. Value-Risk Analysis of crowd souring is one of the under studies Worldwide, especially in Pakistan. Provided the need, we have discussed the crowdsourcing as business process and presented an understanding of the risks associated with crowdsourcing use and possible strategies that can be used to maximize the value and minimize the identified risks. For the better understanding of crowdsourcing practices in Pakistan, three case studies were conducted based on three well reputed organizations of Pakistan and results gathered to help understand its practices, some of the risks associated with it and how they manage those risks.
Бесплатно

Variable Structure Control on Active Suspension of 4 DOF Vehicle Model
Chuanbo Ren, Cuicui Zhang, Lin Liu
Статья научная
In this paper, the theory of a variable structure model following control (VSMFC) is employed to the design of the controller for an active suspensions of 4-degree-of-freedom (4-DOF) automobile model. The sliding mode equation is derived by applying VSMFC theory and the parameters of the switching function are obtained by using the method of pole assignment; a hierarchical algorithm with control variables started in sequence is applied to solve the active force; a method of exponential approach law is used to improve the dynamic performance of the controller. The efficacy of the controller is verified by simulation carried out with the help of Matlab/ Simulink. The results show that the active suspension controller based on VSMFC theory is superior in both robustness and performance.
Бесплатно

Vulnerabilities Assessment of Emerging Web-based Services in Developing Countries
Abdus Satter, B M Mainul Hossain
Статья научная
To cope up with the pace of digitalization all over the world, like developed countries, developing countries are also offering services to its citizens through various online portals, web applications and web sites. Unfortunately, due to the lack of consideration on vulnerability issues during the development phase, many of those web based services are suffering from serious security threats. For these developing countries, vulnerability statistics are required to have insight about the current security status of the provided web services. That statistical data can assist the stakeholders to take appropriate actions against cyberattacks. In this work, we conduct a survey to observe the responses of web based services against four most commonly found web attacks called Man in the Middle, SQL Injection, Cross Site Scripting and Denial of Service. We carry out the survey for 30 websites (applications) of Bangladesh as the country has been focusing on digitalization of government services for the last few years and has already been offering various online services to its citizens. Among the 30 websites of several categories, result shows that approximately 77% sites are vulnerable to Man in the Middle attack whereas 3% are vulnerable to SQL Injection and Cross Site Scripting.
Бесплатно

Vulnerabilities Assessment of Financial and Government Websites: A Developing Country Perspective
Md. Asif Khan Rifat, Yeasmin Sultana, B. M. Mainul Hossain
Статья научная
The growing number of web applications in a developing country like Bangladesh has led to an increase in cybercrime activities. This study focuses on measuring the vulnerabilities present in financial and government websites of Bangladesh to address the rising security concerns. We reviewed related works on web application vulnerability scanners, comparative studies on web application security parameters, surveys on web application penetration testing methodologies and tools, and security analyses of government and financial websites in Bangladesh. Existing studies in the context of developing countries have provided limited insight into web application vulnerabilities and their solutions. These studies have focused on specific vulnerabilities, lacked comprehensive evaluations of security parameters, and offered a limited comparative analysis of vulnerability scanners. Our study aims to address these gaps by conducting an in-depth analysis using the OWASP ZAP tool to scan and analyze risk alerts, including risk levels such as high, medium, low, and informational. Our investigation unveiled eight key vulnerabilities, including Hash Disclosure, SQL injection (SQLi), Cross-Site Request Forgery (CSRF), missing Content Security Policy (CSP) headers, Cross-Domain JavaScript File Inclusion, absence of X-Content-Type-Options headers, Cache-related concerns, and potential Cross-Site Scripting (XSS), which can lead to revealing hidden information, enabling malicious code, and failing to protect against specific types of attacks. In essence, this study does not only reveal major security weaknesses but also provides guidance on how to mitigate them, thereby playing a vital role in promoting enhanced cybersecurity practices within the nation.
Бесплатно

Web Application Performance Analysis of E-Commerce Sites in Bangladesh: An Empirical Study
Mahfida Amjad, Md. Tutul Hossain, Rakib Hassan, Md. Abdur Rahman
Статья научная
The users of e-commerce sites are growing rapidly day by day for easy internet access where the performance of web applications plays a key role to satisfy the end-users. The performance of these websites or web applications depends on several parameters such as load time, fully loaded (time), fully loaded (requests), etc. This research tries to investigate and find out the parameters that affects the web performance and it has been tested on e-commerce applications of Bangladesh, where eleven parameters are considered and these are fully loaded (requests), first CPU idle, speed index, start render, load time, fully loaded (time), document complete (time), last painted hero, first contentful paint, and first byte. According to the analysis some applications need to take care of or the developers need to re-modify it. As per the investigation of scanned information, the applications fall under three classes. To start with, the applications do not demonstrate acceptable records to be investigated. The second and third classification applications required medium and high reaction times at the user end separately. Also, the fully loaded (requests)’ and document complete (requests) show the most noteworthy required time at the user end, where maximum values are 347 and 344 seconds individually.
Бесплатно

Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity
Bello Alhaji Buhari, Afolayan Ayodele Obiniyi
Статья научная
It is a common requirement for modern web applications as many if not all services that need personalization and control of access move online. Due to increase in these services becoming online, login authentications become targets to attackers. Therefore, there is need for secure and efficient web application login authentication schemes to ensure users access control, security and privacy. Present schemes have limitations such as users spent a lot of time browsing to create image portfolios than to create passwords and PINs, subject to active impersonation attack, some will only suit well for financial transaction system due to the TIC involved, some may have hash collisions, some require addition BLE device to be install and available on the authentication systems and cannot be used for higher data rates and long distance unlike cellular and WiFi devices, some involves reuse of password at single or multiple service providers which may lead to a password reuse attack called domino effect and some work well in application that needs to share permission with other applications like social media applications inform of APIs and improvising of user anonymity. We propose an improved web application login authentication scheme using hybrid cryptography with user anonymity. The improved scheme used blowfish – the most efficient private key algorithm, Elgamal – very secure public key algorithm and SHA-2 hash function combined together to enable high performance and security. The methods are thoroughly discussed and its security evaluated to show that it provides password protection, user privacy, perfect forward secrecy, mutual authentication and security against impersonation attack.
Бесплатно

Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute
Md. Tofail Ahmed, Md. Humaun Kabir, Sujit Roy
Статья научная
Registration of new students’ academic information is essential for every educational institute to continue their education at every semester level and go through their whole student life. And this registration information is used when they do their form fill up of consecutive semesters. Nowadays, almost all educational institutes are using paper based registration and form fill up systems which is prone to many human errors and very time consuming for both students, teachers as well as other related administrative bodies. In this paper, we developed a web based application for academic purposes to control and save student registration and form fill up data that will be helpful for students, teachers and admin authority to make the process easier, less time consuming and error free. There are four main types of users who can use this system: student, department authority, students’ hall authority and administrator. The student can submit their registration and form fill up information by using a web form. Moreover, he/she can download their admit card and registration form after the approval of the concerned authority. The students also can be able to do other module activities. The hall and department authority can use the system to approve the students' registration, semester examination form and to provide the students' attendance data. In addition, the department and hall authority has a choice to see all students’ academic information. Moreover, the system administrator controls the system by managing (add, delete, update) student, hall and department authority, exam or registration date, subjects of a particular semester, notice board of the institute, module and programme data. The administrator can also add and remove the running and passed student data. The students also can pay their semester fees by using an online banking system.
Бесплатно

Web Performance Analysis: An Empirical Analysis of E-Commerce Sites in Bangladesh
Md. Tutul Hossain, Rakib Hassan, Mahfida Amjad, Md. Abdur Rahman
Статья научная
Performance testing of e-commerce site is important for upcoming improvement and making better user experience which is performed by several web performance testing tools available on online platform. There are several tools user can use to scan their site for performance testing. This paper presents a web based application to collect and compare performance parameters with results automatically by applying WebpageTest, PageSpeed Insights and GTmetrix tools. For doing the test comparison nine parameters are considered and these are Load Time, First Byte, Start Render, First Contentful Paint, Speed Index, Largest Contentful Paint, Cumulative Layout Shift, Total Blocking Time and Time to Interactive parameters. The framework is developed with PHP, MySQL, CSS and HTML, where user will provide intended site’s url to test performance. This paper presents the performance of ten e-commerce sites of Bangladesh. Among the three tools WebpageTest and Gtmetrix can collect the reports of all the parameters. 1.62 (site7), 3.25 (site4) and 1.89 (site7) seconds are reported as lowest value for tools WebPageTest, PageSpeed Insight and Gtmetrix respectively. The average results of three tools is measured where, the minimum value is shown as 0.03 seconds for ‘total blocking time’ by site7. And maximum value is shown as 17.78 seconds for ‘load time’ parameter recorded by site10.
Бесплатно

Web Portal Analysis of Asian Region Countries
Subhash Chander, Ashwani Kush
Статья научная
The number of online services provided by Government and private sectors is increasing these days. On the same pattern various countries have their own portals to provide basic services to the citizens and other people of the world. Analysis of portals in Asia is the main theme of the paper. There are various indicators or attributes necessary for the implementation of e-services .Some of the indicators may be frequency of use of services, number of users, visitors, site hits, searchable option, accessibility, language option, performance, functionality, broken links, traffic analysis, and feedback. Out of these metrics taken into consideration here are Traffic analysis, feedback, accessibility, security and language option. The countries taken into consideration are India, China and Pakistan. Web portals of these countries will be analyzed in detail.
Бесплатно

Web Search Customization Approach Using Redundant Web Usage Data Association and Clustering
N. Krishnaiah, G. Narsimha
Статья научная
The massive growth of web consists of huge number of redundant information in related to some context. Due to which the need of information through a search provide high number of duplicate results which makes user to navigate number of sites to find the needed information. Users often miss their search pages when they browse the large and complex navigation of the web. Web customization is based on the use of the web logs can take advantage of the knowledge necessary to study the content and the structure of the internet to support. Searching information can be improvised in support of the implicit information generated by the web server in form logs for various web documents visited by users. This paper proposes a web search customization approach (WSCA) using redundant web usage data association and hierarchal clustering. Association generates a multilevel association for redundant data in the web navigation sites and clustering generates a cluster of frequent access patterns. The approach will improvise the real-time customization and also cost requirement for generating customized resources. The experiment evaluation shows an improvisation in precision rate in relevant to different queries against existing clustering approach.
Бесплатно

Siddu P. Algur, Prashant Bhat
Статья научная
Nowadays YouTube becoming most popular video sharing website, and is established in 2005. The YouTube official website is providing different categories videos including Science and Technology, Films and Animation, News and politics, Movies, Comedy, Sports, Music etc. Each video hosted in website such as YouTube have its own identity and features. The identity and features of each video can be described by web video metadata objects such as- URL of each video, category, length of the video, rating information, view counts, comment information, key words etc. Using extracted web video metadata objects, we present an in-depth and systematic clustering study on the metadata objects of YouTube videos using Expectation Maximization (EM) and Density Based (DB) clustering approach. Distinct web video metadata object clusters are formed based on different category of web videos. The resultant clusters are analyzed in depth as a step in the KDD process.
Бесплатно

Web-Based Method to Connect Organizations and IT People Using Iterative Model
Muhammad Aqeel, Muhammad Imtiaz, Muhammad Sikander Shahbaz
Статья научная
Nowadays the actual problem is that there is not any proper platform where software houses can collaborate or any proper marketplace where people related to IT fields can get jobs. The people fear whether the organizations are real or fake or whether they are registered or not and the individuals are finding registered organizations to get jobs. This work is making a project to solve all these problems. This work has made this project solve these kinds of problems. This project has used the iterative model, the iterative model is used to do all steps of development iteratively. This model helps make a project step by step. This project consists of two breakthroughs first one is a mobile app and the second one is the web. In mobile apps and the web, this work has used the Iterative model, first, the admin panel is made where the organizations can be managed by the admin and after that, the user interface of a mobile app is designed and then the app relates to the database which is mongo dB and with backend which is made in node Js. Similarly, on the web, this work has first made the user interface and then it relates to the database and back end like mobile, and technologies used on the web are the same as mobile. This work has done great research work to make this system and our system better than the existing systems and has removed all flaws that were in the existing systems. This work has collected data from registered organizations. These organizations are real and registered. This work also made a feedback system from their people who can give their feedback and this work can improve our system according to their needs.
Бесплатно

Web-Based Student Opinion Mining System Using Sentiment Analysis
Olaniyi Abiodun Ayeni, Akinkuotu Mercy, Thompson A.F., Mogaji A.S.
Статья научная
Collecting feedback from a few students after the exams has been the norm in educational institutions. Forms are given to students to assess the course the lecturer has taught. The main purpose of developing student opinion mining system is to create a faster and easier method of collecting feedback from student, and also give lecturers and school administrators an easier way of analysing the feedback collected from students. The significance of this application is that it is less expensive and present a more confidential way of getting students opinion. The major tools used in developing this application are Python, Scikit learn, Textblob, Pandas and SQLite.. Django provides an in-built server that allows the application to run on the localhost.. In this project dataset gotten from online feedback form distributed to students was used for the sentiment analysi ,Chi-square was used for feature selection and the support vector machine algorithm was used for sentiment classification. The application will help the university administrators and lecturers to identify the strengths and weaknesses of the lecturer based on the textual evaluation made by the students.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2024 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.