International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1243
Ear Biometrics in Human Identification System
Статья научная
Biometrics is physical or behavior characteristics that can be used for human identification. We propose the ear as a biometric and investigate it with both 2D and 3D data. The ICP-based algorithm also demonstrates good scalability with size of dataset. These results are encouraging in that they suggest a strong potential for 3D ear shape as a biometric. Multi-biometric 2D and 3D ear recognition are also explored. The proposed automatic ear detection method will integrate with the current system, and the performance will be evaluated with the original one. The investigation of ear recognition under less controlled conditions will focus on the robustness and variability of ear biometrics. Multi-modal biometrics using 3D ear images will be explored, and the performance will be compared to existing biometrics experimental results.
Бесплатно
Early Detection and Classification of Melanoma Skin Cancer
Статья научная
Melanoma is a form of cancer that begins in melanocytes (cells that make the pigment melanin). It can affect the skin only, or it may spread to the organs and bones. It is less common, but more serious and aggressive than other types of skin cancer. Melanoma can be of benign or malignant. Malignant melanoma is the dangerous condition, while benign is not. In order to reduce the death rate due to malignant melanoma skin cancer, it is necessary to diagnose it at an early stage. In this paper, a detection system has been designed for diagnosing melanoma in early stages by using digital image processing techniques. The system consists of two phases: the first phase detects whether the pigmented skin lesion is malignant or benign; the second phase recognizes malignant melanoma skin cancer types. Both first and second phases have several stages. The experimental results are acceptable.
Бесплатно
Early Formalization of AI-tools Usage in Software Engineering in Europe: Study of 2023
Статья научная
This scientific article presents the results of a study focused on the current practices and future prospects of AI-tools usage, specifically large language models (LLMs), in software development (SD) processes within European IT companies. The Pan-European study covers 35 SD teams from all regions of Europe and consists of three sections: the first section explores the current adoption of AI-tools in software production, the second section addresses common challenges in LLMs implementation, and the third section provides a forecast of the tech future in AI-tools development for SD. The study reveals that AI-tools, particularly LLMs, have gained popularity and approbation in European IT companies for tasks related to software design and construction, coding, and software documentation. However, their usage for business and system analysis remains limited. Nevertheless, challenges such as resource constraints and organizational resistance are evident. The article also highlights the potential of AI-tools in the software development process, such as automating routine operations, speeding up work processes, and enhancing software product excellence. Moreover, the research examines the transformation of IT paradigms driven by AI-tools, leading to changes in the skill sets of software developers. Although the impact of LLMs on the software development industry is perceived as modest, experts anticipate significant changes in the next 10 years, including AI-tools integration into advanced IDEs, software project management systems, and product management tools. Ethical concerns about data ownership, information security and legal aspects of AI-tools usage are also discussed, with experts emphasizing the need for legal formalization and regulation in the AI domain. Overall, the study highlights the growing importance and potential of AI-tools in software development, as well as the need for careful consideration of challenges and ethical implications to fully leverage their benefits.
Бесплатно
Early Stage Disease Diagnosis System Using Human Nail Image Processing
Статья научная
Human's hand nail is analyzed to identify many diseases at early stage of diagnosis. Study of person hand nail color helps in identification of particular disease in healthcare domain. The proposed system guides in such scenario to take decision in disease diagnosis. The input to the proposed system is person nail image. The system will process an image of nail and extract features of nail which is used for disease diagnosis. Human nail consist of various features, out of which proposed system uses nail color changes for disease diagnosis. Here, first training set data is prepared using Weka tool from nail images of patients of specific diseases. A feature extracted from input nail image is compared with the training data set to get result. In this experiment we found that using color feature of nail image average 65% results are correctly matched with training set data during three tests conducted.
Бесплатно
Early and Accurate Diagnosis of a Neurological Disorder Epilepsy Using Machine Learning Techniques
Статья научная
An epileptic seizure is a type of seizure induced by aberrant brain activity caused by an epileptic condition, which is a brain Central Nervous System disorder (CNS). CNSs are relatively prevalent and include a wide range of symptoms, including loss of awareness, and strange behaviour. These symptoms frequently result in injuries as a result of walking imbalance, tongue biting, and hearing loss. For many researchers, detecting a prospective seizure in advance has been a difficult undertaking. In this research work we have used non-imaging data and applied supervised learning algorithms to determine the classification of epilepsy and try to improve the efficiency of the model, compared to the existing ones. Random Forest algorithm was found to have highest accuracy compared to other machine learning models. The paper can be helpful in diagnosing high-risk brain diseases and predicting diseases such as Alzheimer's with symptoms challenging to predict and diseases with overlapping symptoms and overlapping symptoms and attribute values. The scope of the research work can be further extended to determine at which stage the epilepsy is present in a patient, in order to provide a correct diagnosis and medical treatment.
Бесплатно
Educational data mining: a case study perspectives from primary to university education in Australia
Статья научная
At present there is an increasing emphasis on both data mining and educational systems, making educational data mining a novel emerging field of research. Educational data mining (EDM) is an attractive interdisciplinary research domain that deals with the development of methods to utilise data originating in an educational context. EDM uses computational methodologies to evaluate educational data in order to study educational questions. The first part of this paper introduces EDM, describes the different types of educational data environments, diverse phases of EDM, the applications and goals of EDM, and some of the most promising future lines of research. Using EDM, the second part of this paper tracks students in Australia from primary school Year 1 through to successful completion of high school, and, thereafter, enrolment in university. The paper makes an assessment of the role of student gender on successive rates of educational completion in Australia. Implications for future lines of enquiry are discussed.
Бесплатно
Статья научная
Project management information systems have their proven position as an effective tool for achieving project management success in terms of the successful realization of the project regarding time, cost and quality. Recent research results have indicated that quality of project management information system output information is positively and significantly related to project management information system application and project management factors and revealed the empirical support. However, getting the reporting quality of the project status report, monthly generated from the project management information system based on the information timely maintained by the project managers, responsible for ERP implementation up to the satisfactory level at any time, can be problematic without having a systematic approach implemented. This article is to discuss how the continuous quality improvement based on the plan-do-check-act cycle was conducted on the reporting quality of the project status report from project management information system generated by the project managers, for achieving project management success in ERP projects implemented by a solution provider for their customers in the various industries in Japan. The results of the study indicate that the continuous improvement on the reporting quality of project management information system was found to be effective in achieving quality of project management information system output information to help managers in decision making, planning, organizing and controlling the project. It was also found to be effective in positively influencing achievement of project management success in terms of respecting the time, cost and quality.
Бесплатно
Effective use of lessons learned to conduct the project review for ERP implementation
Статья научная
According to a recent study, it has been said that “lessons learned” is one of the most important and “value added” aspects of the project management lifecycle. However, it has been reported that it is often the most ignored part of finishing a project. Various reasons have been offered for this phenomenon. This article describes the systematic approach to initiate the project review on the specific project identified for requiring the formal quality audit based on the use of project management information system for having the execution date fixed by the independent quality reviewer with the project manager. Then, the project review process is started by retrieving the lessons learned data from the lessons learned repository, which were collected from the previous project reviews for the relevant ERP implementation projects, for the preparation of conducting the project document review and project stakeholder interviews. A case study methodology was applied to the historical lessons learned data of the ERP implementation projects conducted by the solution provider for their customers in the various industries in Japan, which were retrieved for a period of four years from 2014 to 2017 to analyze how the lessons learned collected from the project reviews of the earlier projects were reused in those of the succeeding projects conducted during the period. Use of lessons learned based on the past project review results was found to be effective in focusing on the specific areas projected for improvement during the processes of conducting the project document review and project stakeholder interviews, as well as putting together the practical recommendations for the findings to finalize the results of the project review, which were to be formally presented and submitted to the customer as the results of the quality audit.
Бесплатно
Efficient Algorithm for Destabilization of Terrorist Networks
Статья научная
The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining or in general Terrorist Network Mining. The SNA defined centrality measures have been successfully incorporated in the destabilization of terrorist network by deterring the dominating role(s) from the network. The destabilizing of the terrorist group involves uncovering of network behavior through the defined hierarchy of algorithms. This paper concerning the destabilization of terrorist network proposes a pioneer algorithm which seems to replace the already available hierarchy of algorithms. This paper also suggests use of the two influential centralities, PageRank Centrality and Katz Centrality, for effectively neutralizing of the network.
Бесплатно
Efficient Analysis of Pattern and Association Rule Mining Approaches
Статья научная
The process of data mining produces various patterns from a given data source. The most recognized data mining tasks are the process of discovering frequent itemsets, frequent sequential patterns, frequent sequential rules and frequent association rules. Numerous efficient algorithms have been proposed to do the above processes. Frequent pattern mining has been a focused topic in data mining research with a good number of references in literature and for that reason an important progress has been made, varying from performant algorithms for frequent itemset mining in transaction databases to complex algorithms, such as sequential pattern mining, structured pattern mining, correlation mining. Association Rule mining (ARM) is one of the utmost current data mining techniques designed to group objects together from large databases aiming to extract the interesting correlation and relation among huge amount of data. In this article, we provide a brief review and analysis of the current status of frequent pattern mining and discuss some promising research directions. Additionally, this paper includes a comparative study between the performance of the described approaches.
Бесплатно
Efficient Networks Communication Routing Using Swarm Intelligence
Статья научная
As demonstrated by natural biological swarm’s collective intelligence has an abundance of desirable properties for problem-solving like in network routing. The focus of this paper is in the applications of swarm based intelligence in information routing for communication networks. As we know networks are growing and adopting new platforms as new technologies comes. Also according to new demands and requirements networks topologies and its complexity is increasing with time. Thus it is becoming very difficult to maintain the quality of services and reliability of the networks using current Networks routing algorithms. Thus Swarm intelligence (SI) is the collective behavior of decentralized self-organized systems, natural or artificial. The concept is employed in work on artificial intelligence. A new class of algorithms, inspired by swarm intelligence is currently being developed that can potentially solve numerous problems of modern communications networks. These algorithms rely on the interaction of a multitude of simultaneously interacting agents. In this paper we give disadvantages of previously used network routing algorithms and how we can apply swarm intelligence to overcome these problems.
Бесплатно
Efficient Sensor-Cloud Communication using Data Classification and Compression
Статья научная
Wireless Sensor Network, a group of specialized sensors with a communication infrastructure for monitoring and controlling conditions at diverse locations, is a recent technology which is getting popularity day by day. Besides, cloud computing is a type of high-performance computing that uses a network of remote servers which simultaneously provides the service to store, manage and process data rather than a local server or personal computer. An architecture called sensor-cloud is also providing good services by combining the capabilities from both ends. In order to provide such services, a large volume of sensor network data needs to be transported to cloud gateway with a high amount of bandwidth and time requirement. In this paper, we have proposed an efficient sensor-cloud communication approach that minimizes the enormous bandwidth and time requirement by using statistical classification based on machine learning as well as compression using deflate algorithm with a minimal loss of information. Experimental results describe the overall efficiency of the proposed method over the traditional and related research.
Бесплатно
Electronic police ambush system via vehicles/drivers safety authentication system
Статья научная
The suggested system aims to develop the level of security for the Egyptian police ambushes and to decrease the overcrowding because the traditional police ambushes was depressing in the last decade in Egypt due to the actions of terrorism and the threatening of our nation security, which was causing a waste of human casualties and will decrease the income of the tourism and reputation of our nations. The direct interaction with the vehicles inside the police ambushes may cause an unnecessary overcrowding. The introduced system try to minimize the human element in the police ambush through utilizing RFID technology by specifying an RFID card for each vehicle and vehicle driver which will be like the electronic passport at the RFID Sensing check point before the ambush. After checking for the information saved on the RFID card supposed inside the vehicle and also registered previously on the system server results in giving the vehicle the “PASS” signal or “ARRESSTED” signal which required a capture photo shot for the vehicle. So that system aims to increase the security level and reduce casualties of police ambushes anywhere even if it is fixed or non-fixed.
Бесплатно
Empirical Estimation of Hybrid Model: A Controlled Case Study
Статья научная
Scrum and Extreme Programming (XP) are frequently used models among all agile models whereas Rational Unified Process (RUP) is one of the widely used conventional plan driven software development models. The agile and plan driven approaches both have their own strengths and weaknesses. Although RUP model has certain drawbacks, such as tendency to be over budgeted, slow in adaptation to rapidly changing requirements and reputation of being impractical for small and fast paced projects. XP model has certain drawbacks such as weak documentation and poor performance for medium and large development projects. XP has a concrete set of engineering practices that emphasizes on team work where managers, customers and developers are all equal partners in collaborative teams. Scrum is more concerned with the project management. It has seven practices namely Scrum Master, Scrum teams, Product Backlog, Sprint, Sprint Planning Meeting, Daily Scrum Meeting and Sprint Review. Keeping above mentioned context in view, this paper intends to propose a hybrid model naming SPRUP model by combining strengths of Scrum, XP and RUP by eliminating their weaknesses to produce high quality software. The proposed SPRUP model is validated through a controlled case study.
Бесплатно
Статья научная
IT industry in the present market situation faces high demand for performance and burgeoning user expectations; with the pressure manifesting itself in three forms – Development Cost, Time-to-market and Product Quality. Researchers have proposed several techniques to effectively deal with these conflicting scenarios and draw optimized output. One of the relevant techniques in this context is Component Based Software Development (CBSD) with a targeted and discriminative approach influencing all phases of development. Although, CBSD proposes a multi-faceted approach in complex scenarios, its prime focus lies in “write once and reuse multiple times” methodology with either no or minor modifications. The model has been markedly successful in large enterprise applications with companies deriving benefits from shorter development time, increased productivity and better quality product. This research paper focuses and discusses Empirical Study of an Improved Component Based Software Development (ICBD) Model using Expert Opinion Technique which covers both component based software development as well as Component development phases. ICBD Model tries to overcome some of the issues in the contemporary CBD Models. A case study was conducted to investigate and evaluate our model by experienced professionals working in the IT industry. Results have shown that our improved model registers significant improvement over previous models suggested by other researchers.
Бесплатно
Empirical and theoretical validation of a use case diagram complexity metric
Статья научная
A key artifact produced during object oriented requirements analysis is Use Case Diagram. Functional requirements of the system under development and relationship of the system and the external world are displayed with the help of Use Case Diagram. Therefore, the quality aspect of the artifact Use Case Diagram must be assured in order to build good quality software. Use Case Diagram quality is assessed by metrics that have been proposed in the past by researchers, based on Use Case Diagram countable features such as the number of actors, number of scenarios per Use Case etc., but they have not considered Use Case dependency relations for metric calculation. In our previous paper, we had proposed a complexity metric. This metric was defined considering association relationships and dependency prevailing in the Use Case Diagram. The key objective in this paper is to validate this complexity metric theoretically by using Briand’s Framework and empirically by performing a Controlled experiment. The results show that we are able to perform the theoretical and empirical validation successfully.
Бесплатно
Energy Detection Performance of Spectrum Sensing in Cognitive Radio
Статья научная
Spectrum sensing is a challenging task for cognitive radio. Energy detection is one of the popular spectrum sensing technique for cognitive radio. In this paper we analyze the performance of energy detection technique to detect primary user (PU). Simulation results show that the probability of detection increases significantly when signal to noise ratio increases. It is also observed that the detection probability decreases when the bandwidth factor increases.
Бесплатно
Energy efficiency analysis by fine grained modification in link state routing protocol
Статья научная
A major concern in modern explosive development of information and communication technology, especially in wired networking is to reduce of unnecessary energy consumption. It is needed because of expected environmental impact and potential economic benefits. These issues are usually referred as “Green networking”. It is related to increase the awareness of energy consuming in routing protocols, in the devices, including the structure of the whole networking system. Here different issues will be described which is topically related and the possible impact in green networking field. Also, special attention will be monitored in the routing protocol and algorithm especially link state routing protocol which is generally used for calculating the shortest path. This research paper tries to find out a new technique or modified routing technique that will be more effective for every router in terms of energy efficiency.
Бесплатно
Energy efficient routing protocol for maximum lifetime in wireless sensor networks
Статья научная
Wireless sensor networks (WSNs) have become a popular research area that is widely gaining the attraction from both the researchers and the practitioner communities due to their wide area of applications. These include real time sensing for audio delivery, imaging, video streaming, environmental monitoring, industrial applications and remote monitoring. WSNs are constrained with limited energy due to their physical size. In order to maximize network lifetime, efficient use of limited sensor nodes energy resources is important. Energy efficient routing protocol for maximum lifetime in wireless sensor networks (EERPM) is proposed. Sensor nodes lifetime optimization models are formulated subject to energy consumption constraint, data flow conservation constraint, maximum data rate constraint and link capacity constraint. The models are used to solve mathematical models for the maximum lifetime routing problems. Sensor nodes transmit their data packets based on the link capacity that is inference free among the sets of links. Moreover, algorithms are developed for coverage of sensor nodes and maximization of lifetime for sensor nodes. Simulation results show that EERPM performs better than MLCS, MLCAL and AEEC protocols. It can reduce data gathering latency and achieve load balancing. Finally, the proposed method extends network lifetime compared to the related selected protocols.
Бесплатно
Energy-Efficient PSO and Latency Based Group Discovery Algorithm in Cloud Scheduling
Статья научная
Cloud computing is a large model change of computing system. It provides high scalability and flexibility among an assortment of on-demand services. To imporve the performance of the multi-cloud environment in distributed application might require less energy efficiency and minimal inter-node latency correspondingly. The major problem is that the energy efficiency of the cloud computing data center is less if the number of server is low, else it increases. To overcome the energy efficiency and network latency problem a novel energy-efficient particle swarm optimization representation for multi-job scheduling and Latency representation for the grouping of nodes with respect to network latency is proposed. The scheduling procedure is through on the basis of network latency and energy efficiency. Scheduling schema is the main part of Cloud Scheduler component, which helps the scheduler in scheduling decision on the base of dissimilar criterion. It also works well with incomplete latency information and performs intelligent grouping on the basis of both network latency and energy efficiency. Design a realistic particle swarm optimization algorithm for the cloud servers and construct an overall energy competence based on the purpose of the servers and calculation of fitness value for each cloud servers. Also, in order to speed up the convergent speed and improve the probing aptitude of our algorithm, a local search operative is introduced. Finally, the experiment demonstrates that the proposed algorithm is effectual and well-organized.
Бесплатно