International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1265
Development of aggression detection technique in social media
Статья научная
Due to the enormous growth of social media the potential of social media mining has increased exponentially. Individual users are producing data at unprecedented rate by sharing and interacting through social media. This user generated data provides opportunities to explore what people think and express on social media. Users exhibit different behaviors on social media towards individuals, a group, a topic or an activity. In this paper, we present a social media mining approach to perform behavior analytics. In this research study, we performed a descriptive analysis of user generated data such as users’ status, comments and replies to identify individual users or groups which can be a potential threat. Tokenization technique is used to estimate the polarity of the behavior of different users by considering their comments or feedbacks against different posts on Facebook. The proposed approach can help to identify possible threats reflected by the user’s behavior towards a specific event. To evaluate the approach, a data set was developed containing comments on the Facebook from different users in different groups. The dataset was divided into different groups such as political, religious and sports. Most negative users’ in different groups were identified successfully. In our research, we focused only on English content; however, it can be evaluated with other languages.
Бесплатно
Development of an Electronic Secure Students' Industrial Works Experience Scheme Placement System
Статья научная
This research developed a secured student industrial work experience scheme (SIWES) placement system to take care of the security challenges of the existing automated systems. There are attempts by researchers to ameliorate the challenges associated with the scheme by developing various systems. However, the developed systems are subjected to security vulnerabilities. This research, in an attempt to avert the security challenges associated with the existing automated systems, designed a new scheme which includes security architectures in the kernel and application layers. This new system was able to achieve two important tasks; first, the system automation and second, the inclusion of security architectures to cubs the application’s vulnerabilities. The present process involves students manually seeking placement to undergo the program, and due to this, students end up applying at organizations that are not relevant to what they are studying. Despite the fact there are no much existing systems that digitally caters for this component of the scheme, the available existing systems are subjected to security vulnerability. Therefore, leveraging on secure web application technologies using Unified Modelling Languages for design, HTML, CSS, JavaScript, PHP for its implementation and user privilege and password hash to ensure its security, this project developed a secure solution to this pertinent challenge. The system is tested using unit testing component of each design, integration testing and general system testing. The implementation shows the system works according to the design, by ensuring all units of the development perform necessary functions of data storage, data retrieval, error alerting, and interface/server appropriate communication. In addition, the security architecture, design and implementation of the system’s design are better than the existing ones.
Бесплатно
Статья научная
Autism Spectrum Disorder (ASD) is a neuro developmental disorder that affects a person's ability to communicate and interact with others for rest of the life. It affects a person's comprehension and social interactions. Furthermore, people with ASD experience a wide range of symptoms, including difficulties while interacting with others, repeated behaviors, and an inability to function successfully in other areas of everyday life. Autism can be diagnosed at any age and is referred to as a "behavioral disorder" since symptoms usually appear in the life's first two years. The majority of individuals are unfamiliar with the illness and so don't know whether or not a person is disordered. Rather than aiding the sufferer, this typically leads to his or her isolation from society. The problem with ASD starts in childhood and extends into adolescence and adulthood. In this paper, we studied 25 research articles on autism spectrum disorder (ASD) prediction using machine learning techniques. The data and findings of those publications using various approaches and algorithms are analyzed. Techniques are primarily assessed using four publicly accessible non-clinically ASD datasets. We found that support vector machine (SVM) and Convolutional Neural Network (CNN) provides most accurate results compare to other techniques. Therefore, we developed an interactive dashboard using Tableau and Python to analyze Autism data.
Бесплатно
Статья научная
The article presents the science, technologies and innovations as foundations of modern economic development. The purpose of establishing complex-structured innovation structure and their functions are analyzed. An effective organizational-economic structural model is proposed for the management of their performance. Production functions, allowing central management institution to use the resources effectively and enterprises within the institution to operate with the whole production strength, are developed. Parameters that cannot be assessed directly as innovation, innovation capacity, science capacity and environmental availability are included in the modeling process. Hierarchic models are developed corresponding to the problems posed to each structure. Among models with various levels, a conceptual algorithm is developed for the purpose of finding a coordinated solution on product/service output based on the efficient utilization of scarce resources. Some suggestions have been given on the basis of modeling the activity of innovative enterprises of different levels with complex structure on its perspective development directions.
Бесплатно
Development of the Model of Dynamic Storage Distribution in Data Processing Centers
Статья научная
The paper reviews dynamic distribution of storage resources among the users in data processing centers. The process of changing memory usage state was revealed to be the process of Markov. The paper proposes the development of stochastic model of the memory and computing usage distribution and the development of probability density functions over practical data. Parameters of probability density functions were defined with the help of stochastic model and practical data. The calculation of the developed model and the parameters of the probability density function is realized dynamically during the ongoing process. At the beginning of each time interval, it is forecasted that the process will be shifted to which state with which maximum probability. The adequacy of the previous forecasts is monitored. Note that, over the time, the quality of the forecast and the level of adequacy increases. The model is used in the virtualization of storage resources usage process and ensures the use of storage resources without wasting. Structure of visualization base is given. The base enables to monitor all stages of the process. Using monitoring base the issues can be resolved to analyze different aspects of the process. Recommendations are given on the use of obtained results.
Бесплатно
Digital IIR Filter Design using Real Coded Genetic Algorithm
Статья научная
The paper develops a technique for the robust and stable design of digital infinite impulse response (IIR) filters. As the error surface of IIR filters is generally multi-modal, global optimization techniques are required to design efficient digital IIR filter in order to avoid local minima. In this paper a real-coded genetic algorithm (RCGA) with arithmetic-average-bound-blend crossover and wavelet mutation is applied to design the digital IIR filter. A multicriterion optimization is employed as the design criterion to obtain the optimal stable IIR filter that satisfies the different performance requirements like minimizing the Lp-norm approximation error and minimizing the ripple magnitude. The proposed real-coded genetic algorithm is effectively applied to solve the multicriterion, multiparameter optimization problems of low-pass, high-pass, band-pass, and band-stop digital filters design. The computational experiments show that the proposed method is superior or atleast comparable to other algorithms and can be efficiently used for higher order filter design.
Бесплатно
Digital Image Enhancement with Fuzzy Interface System
Статья научная
Present day application requires various version kinds of images and pictures as sources of information for interpretation and analysis. Whenever an image is converted from one form to another, such as, digitizing, scanning, transmitting, storing, etc. Some form of degradation occurs at the output. Hence, the output image has to undergo a process called image enhancement which consist of a collection of techniques that seeks to improve the visual appearances of an image. Image enhancement technique is basically improving the perception of information in images for human viewers and providing 'better' input for other automated image processing techniques. This thesis presents a new approach for image enhancement with fuzzy interface system. Fuzzy techniques can manage the vagueness and ambiguity efficiently (an image can be represented as fuzzy set). Fuzzy logic is a powerful tool to represent and process human knowledge in form of fuzzy if-then rules. Compared to other filtering techniques, fuzzy filter gives the better performance and is able to represent knowledge in a comprehensible way.
Бесплатно
Digital firm: requirements, recommendations, and evaluation the success in digitization
Статья научная
One of the most attractive goals for the contemporary companies is to be called a Digital Firm. Achieving this goal means for the company, university, school, factory or hospital that it is one of the most modern and developed in the world. To achieve such an attractive goal, firms have to fulfill some requirements. In this research paper, author introduces many important ideas about the characteristics that the digital firm has to have to deserve to be called digital. Those characteristics are followed by some recommendations about IT-tools that the firm can use to comply with a specific characteristic. Moreover, author introduces some questions that have to be answered to judge correctly about the level of firm’s digitalization that will help evaluating the firm’s success in digitization. This research is unique because it draws attention of the developers of the contemporary Information Systems (IS) to some aspects that are usually not taken into consideration such as the best characteristics of the elements of the workplace that is appropriate for the use of IT tools to help the users make less mistakes and gives the use of original software the importance that it deserves. In addition, it is important for many researchers nowadays who care about studying the contemporary IS and their usage in the contemporary firms to have knowledge about the main elements of IS that take into consideration all aspects of the Hardware, Software, workplace conditions and laws.
Бесплатно
Discovering the maximum clique in social networks using artificial bee colony optimization method
Статья научная
Social networks are regarded as a specific type of social interactions which include activities such as making somebody’s acquaintance, making friends, cooperating, sharing photos, beliefs, and emotions among individuals or groups of people. Cliques are a certain type of groups that include complete communications among all of its members. The issue of identifying the largest clique in the network is regarded as one of the notable challenges in this domain of study. Up to now, several studies have been conducted in this area and some methods have been proposed for solving the problem. Nevertheless, due to the NP-hard nature of the problem, the solutions proposed by the majority of different methods regarding large networks are not sufficiently desirable. In this paper, using a meta-heuristic method based on Artificial Bee Colony (ABC) optimization, a novel method for finding the largest clique in a given social network is proposed and simulated in Matlab on two dataset groups. The former group consists of 17 standard samples adopted from the literature whit know global optimal solutions, and the latter group includes 6 larger instances adopted from the Facebook social network. The simulation results of the first group indicated that the proposed algorithm managed to find optimal solutions in 16 out of 17 standard test cases. Furthermore, comparison of the results of the proposed method with Ant Colony Optimization (ACO) and the hybrid PS-ACO method on the second group revealed that the proposed algorithm was able to outperform these methods as the network size increases. The evaluation of five DIMACS benchmark instances reveals the high performance in obtaining best-known solutions.
Бесплатно
Discrete Simulation of the Remote Access to the Resources of a Virtual Research Laboratory
Статья научная
This article discusses the problem of an evaluation of the remote access to the resources of a Virtual Research Lab (VRL) and information servicing investigation by using queuing model and program simulation. The results presented here are the final part of general investigation of proposed architecture of the VRL developed in the frame of two years scientific project. Some results from the initial phases of the investigation (functional, deterministic and stochastic modeling) are discussed in other publications of the author. The purpose of this article is to present a simulation organization and performance factors evaluation of the remote access and information servicing in the VRL. In this connection formalization and an abstract model are made. An extension of this formalization based on the queuing theory is made and a general queuing model for the simulation organization is developed. The program realization of the simulation experiments is made by using the system WebGPSS. Object of investigation is the user access to the resources and some variants are evaluated, for example ‘single-user access to a single resource’ and ‘multiple-user access to multiple resources’. Some experimental results are discussed. Different assessments for the components that take part in the remote access are calculated and presented (utilization, workload, waiting time, etc.)
Бесплатно
Статья научная
Focus of this paper is on energy heterogeneity and distributed algorithms for scheduling and adjustable range. The problem of lifetime enhancement of wireless sensor networks is dealt with the adjustment of transmission or sensing range of the sensor nodes and implementation of heterogeneous energy model. In this work, we deploy the sensor nodes in 2-D using triangular, square, and hexagonal tiles. The initial energies of the sensors and their positions along with the positions of targets are known. For this environment, we investigate the maximum achievable lifetime using heterogeneous deterministic energy efficient protocol with adjustable sensing range (HADEEPS) and heterogeneous load balancing protocol with adjustable sensing range (HALBPS). We observe that deploying the sensors in triangular tiles gives better lifetime.
Бесплатно
Diversity Through N-Version Programming: Current State, Challenges and Recommendations
Статья научная
N-version programming is a software development paradigm that draws upon the concept of diversity to increase the reliability of software. The central idea is to independently produce multiple functionally equivalent versions of a program, and execute them in parallel. If the versions fail independently, then the probability of multiple versions producing a faulty output on any given input is very small; much lower than the failure probability of any single version. In this paper, we examine and contrast various experiments that have been performed to evaluate the benefits of this approach and draw some conclusions. We find that for diversity to be effective, it must be introduced in a targeted and informed manner and encompass several phases of the software’s development.
Бесплатно
Domain Analysis and Visualization of NLRP10
Статья научная
NLRP10 is one of the members of NOD-like receptors (NLRs) family that is least characterized. It is a protein that takes part in pathogen sensing and responsible for the subsequent signaling propagation leading to immunologic response. In this study, computational tools such as algorithm, web server and database were used to investigate the domain of NLRP10 protein. The findings of this research may provide computational insights into the structure and functions of NLRP10, which in turn may foster better understanding of the role of NLRP10 in the immunologic defense.
Бесплатно
Doppler Shift Impact On The MIMO OFDM System In Vehicular Channel Condition
Статья научная
Vehicle-to-vehicle (V2V) communication systems will play an important role in intelligent transportation systems (ITS). But in high mobility road condition, orthogonal frequency division multiplexing (OFDM) is very sensitive to Doppler shift. In this scenario multiple input and multiple output (MIMO) system combined with OFDM, make MIMO -OFDM techniques very attractive and productive for vehicle-to-vehicle communications. This paper deals with the bit error rate (BER) performance analysis of MIMO-OFDM system in high way road condition which is modeled based on the Nakagami fading characteristic. The system performance is analyzed with the change in m value of Nakagami channel and also with the variation in the modulation schemes.
Бесплатно
Double Securing from Hackers in B2B E-commerce
Статья научная
Business to Business e-commerce is adopted by more and more companies all over the world. Many companies will be involved in doing business over internet among them some will act as manufacturer and other as suppliers of the sub products. Here we are going consider two types of hackers, the hackers who are outside the organization and the hackers present within the organization. The problem is how to identifying authentic supplier and to see that after authentication the data integrity, here we consider it as the number of sub product to be manufactured that should reach the authentic supplier in the presence of hacker within the organization. There is need for designing trusted security framework. In this paper we are designing a security framework which runs double securing algorithm by using keyless cryptography algorithm for finding the authentic supplier and to see that the order of sub product to be manufactured reaches correct supplier for this caser cryptography algorithm is used. The authentication solves the problem of outside hackers and uses of caser cryptography solve the problem of hacker within the organization. The double securing algorithm is implemented on MATLAB, CPU time is calculated to known the time taken to run the security mechanism.
Бесплатно
Downlink and Uplink Physical Channels in Long Term Evolution
Статья научная
Long Term Evolution (LTE) defines a number of physical channels to carry information blocks received from the MAC and higher layers. This paper presents two types of Physical channels: the first type is downlink physical channels which consist of Physical Broadcast Channel (PBCH), Physical Downlink Shared Channel (PDSCH), Physical Multicast Channel (PMCH), Physical Downlink Control Channel (PDCCH), Physical Control Format Indicator Channel (PCFICH) and Physical Hybrid ARQ Indicator Channel (PHICH). The second type of Physical channels is uplink physical channels which consist of Physical Uplink Shared Channel (PUSCH), Physical Uplink Control Channel (PUCCH) and Physical Random Access Channel (PRACH). This paper also highlights the structure of PDSCH and PUSCH, discuss the algorithms of the two types of physical channel and each of its features. The aim of this paper is to discuss the well-designed PHY Channels which provide high cell-edge performance with specific features, such as dynamic bandwidth allocation to users, the design of reference signals and control channels. These channels take into account a more challenging path loss and interference environment at the cell edge.
Бесплатно
Driver Fatigue Estimation Using Image Processing Technique
Статья научная
A Fatigue Detection system has been developed using non-intrusive vision based approach. The system uses a Logitech USB camera which points towards driver's face and monitors face and eyes to detect driver fatigue. The system is developed on Linux operating system and used DM3730 processor as hardware. The algorithm is developed to estimate whether eyes are open or closed and fatigue is estimated using PERCLOS method. Normal human blinks eyes 12 times in a minute. If the eyes are closed for 15 consecutive frames in a minute or if PERCLOS > 80% than system issues warning to stop the vehicle. The algorithm is tested on 45 different persons i.e., 15 women, 15 men and 15 persons wearing spectacles and the detection rate is 99.2%. The system takes <5ms of time to detect whether eyes are open or closed and the hardware used is small in size and easily implementable.
Бесплатно
Drugs relationship discovery using hypergraph
Статья научная
Globally, the governments are concerned for saving human life but in recent days, the cost of medicine to save the human life grows rapidly, due to the different combination of the drugs sold by the drug store and based on the drugs availability in the drug store. As a regular routine, the Clinical physicians prescribe the drug name or druggist company name for the patient, instead of prescribing the brand name. For a particular drug name, more number of brand name both generic drugs and combination drugs were available. Almost all the physicians or druggist knows these generic drugs and combination drugs along with their dosage and recommends it for the patient. Since the patients are unaware about the brand name of the medicine, they are buying the costly drug without knowledge. At the same time the patients whoever provide the review on the drug consumed, mostly gives a negative review. On the other side, Government gives approval for every drug produced year by year and those drugs getting rejected for approval where sent for new alternative extension of chemical formula, as well government bans several combinations of drugs. There should be a database for awareness; it should help physicians, druggist and end user to look for banned and unbanned drug. We have identified that the drug details and their approvals were not maintained in the database. So, the proposed work is (i) to identify and classify the exact drug, which can be used as generic or combination and (ii) to create a banned drug model representation, which was unavailable. A hypergraph-based model named Drugs Relationship Discovery using Hypergraph (DRDH) was constructed as a preliminary design representation for drugs. Here, the drugs combination was considered as a hypervertex and the combination approved for manufacturing in the particular company was considered as an edge, having weight as the price of single dose usage based on Indian government listed drug. With this proposed model as a reference, the banned drugs are listed separately, manufacturing stopped drugs are highlighted with the weight of -1 and the physician or druggist can access the model to ensure the correct drug, their production, and usage. The Time complexity has been analyzed for the hypergraph, which was constructed based on the details of relationship identified among the drugs. Using the parameters of the list of drugs used in India on fever and the common cold, comparison over time taken to identify the relationship has also been done.
Бесплатно
Dual Amplitude-Width PPM for Free Space Optical Systems
Статья научная
The PPM (Pulse Position Modulation) is commonly used in Free Space Optic (FSO) systems owing to its power efficiency, but it shows a rapid decline in spectral efficiency with increase in the power efficiency and moderate data rate. In order to improve these two parameters, we present a modified modulation scheme of the existing PPM, on the basis of PPM, PAM (Pulse Amplitude Modulation) and PWM (Pulse Width Modulation). This modified version called DAWPPM (Dual Amplitude-Width PPM). The average power requirements, bandwidth efficiency and normalized data rate are studied after introducing symbol structure. The proposed scheme shows an improvement in terms of data rate and bandwidth efficiency, and when in come to power efficiency it shows lower efficiency compared to PPM. We present theoretical expressions of data rate, spectral efficiency, and normalized power requirements, and we present comparison results to PPM modulation scheme.
Бесплатно
Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication
Статья научная
In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.
Бесплатно