International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1211

Статья научная
Gender classification method based on Gait Energy Motion: GEM derived through wavelet analysis of human gait moving pictures is proposed. Through experiments with human gait moving pictures, it is found that the extracted features of wavelet coefficients using silhouettes images are useful for improvement of gender classification accuracy. Also, it is found that the proposed gender classification method shows the best classification performance, 97.63% of correct classification ratio.
Бесплатно

Generating database schemas from business artifact models
Статья научная
Business Artifacts, as an alternative approach to Business Process Modeling, combines both process and data aspects of a Business into the same model. Many works in the literature have focused on defining Artifact-centric processes and graphical modeling notations. But, to the best of our knowledge, no prior work has directly tackled the problem of generating Database Schemas from Business Artifact Models. In this paper, we propose an algorithm that generates Database Schemas from Business Artifact Models (BAMs). The proposed algorithm not only takes into consideration the different data attribute types of Artifacts’ Information Models, but also supports different Artifacts relationships. We also validate our work with a prototype implementation of a Business Artifact Models Modeler and a Database Schema Generator.
Бесплатно

Статья научная
Using digital signal processing in genomic field is a key of solving most problems in this area such as prediction of gene locations in a genomic sequence and identifying the defect regions in DNA sequence. It is found that, using DSP is possible only if the symbol sequences are mapped into numbers. In literature many techniques have been developed for numerical representation of DNA sequences. They can be classified into two types, Fixed Mapping (FM) and Physico Chemical Property Based Mapping (PCPBM (. The open question is that, which one of these numerical representation techniques is to be used? The answer to this question needs understanding these numerical representations considering the fact that each mapping depends on a particular application. This paper explains this answer and introduces comparison between these techniques in terms of their precision in exon and intron classification. Simulations are carried out using short sequences of the human genome (GRch37/hg19). The final results indicate that the classification performance is a function of the numerical representation method.
Бесплатно

Статья научная
Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing its historical data and learning from it. However data warehouse concept is still maturing as a technology. In order to effectively design and implement a data warehouse for an organization, its goal needs to be understood and requirement must be analyzed in the perspective of the identified goal. In this paper we present a goal structured model for requirements engineering that also enables its users to manage traceability between the goals, decisions, business strategy and the corresponding business model.
Бесплатно

God Class Refactoring Recommendation and Extraction Using Context based Grouping
Статья научная
Code smells are the indicators of the flaws in the design and development phases that decrease the maintainability and reusability of a system. A system with uneven distribution of responsibilities among the classes is generated by one of the most hazardous code smells called God Class. To address this threatening issue, an extract class refactoring technique is proposed that incorporates both cohesion and contextual aspects of a class. In this work, greater emphasis was provided on the code documentation to extract classes with higher contextual similarity. Firstly, the source code is analyzed to generate a set of cluster of extracted methods. Secondly, another set of clusters is generated by analyzing code documentation. Then, merging these two, a final cluster set is formed to extract the God Class. Finally, an automatic refactoring approach is also followed to build newly identified classes. Using two different metrics, a comparative result analysis is provided where it is shown that the cohesion among the classes is increased if the context is added in the refactoring process. Moreover, a manual inspection is conducted to ensure that the methods of the refactored classes are contextually organized. This recommendation of God Class extraction can significantly help the developers in minimizing the burden of refactoring on own their own and maintaining the software systems.
Бесплатно

Graph Based Data Governance Model for Real Time Data Ingestion
Статья научная
Data governance is one of the strongest pillars in Data management program which goes hand in hand with data quality. In industrial Data Lake huge amount of unstructured data is getting ingested at high velocity from different source systems. Similarly, through multiple channels of data are getting queried and transformed from Data Lake. Based on 3Vs of big data it's a real challenge to set up a rule based on traditional data governance system for an Enterprise. In today's world governance on semi structured or unstructured data on Industrial Data lake is a real issue to the Enterprise in terms of query, create, maintain and storage effectively and secured way. On the other hand different stakeholders i.e. Business, IT and Policy team want to visualize the same data in different view to analyze, imposes constraints, and to place effective workflow mechanism for approval to the policy makers. In this paper author proposed property graph based governance architecture and process model so that real time unstructured data can effectively govern, visualize, manage and queried from Industrial Data Lake.
Бесплатно

Статья научная
Reasoning is the fundamental capability which requires knowledge. Various graph models have proven to be very valuable in knowledge representation and reasoning. Recently, explosive data generation and accumulation capabilities have paved way for Big Data and Data Intensive Systems. Knowledge Representation and Reasoning with large and growing data is extremely challenging but crucial for businesses to predict trends and support decision making. Any contemporary, reasonably complex knowledge based system will have to consider this onslaught of data, to use appropriate and sufficient reasoning for semantic processing of information by machines. This paper surveys graph based knowledge representation and reasoning, various graph models such as Conceptual Graphs, Concept Graphs, Semantic Networks, Inference Graphs and Causal Bayesian Networks used for representation and reasoning, common and recent research uses of these graph models, typically in Big Data environment, and the near future needs and challenges for graph based KRR in computing systems. Observations are presented in a table, highlighting suitability of the surveyed graph models for contemporary scenarios.
Бесплатно

Статья научная
The article provides an approach of getting optimal time through graph for Simple step stress accelerated test of inverse weibull distribution. In this we estimate parameters using log linear relationship by maximum likelihood method. Along with this, asymptotic variance and covariance matrix of the estimators are given. Comparison between expected and observed Fisher Information matrix is also shown. Furthermore, confidence interval coverage of the estimators is also presented for checking the precession of estimator. This approach is illustrated with an example using software.
Бесплатно

Great Deluge Algorithm for the Linear Ordering Problem: The Case of Tanzanian Input-Output Table
Статья научная
Given a weighted complete digraph, the Linear Ordering Problem (LOP) consists of finding and acyclic tournament with maximum weight. It is sometimes referred to as triangulation problem or permutation problem depending on the context of its application. This study introduces an algorithm for LOP and applied for triangulation of Tanzanian Input-Output tables. The algorithm development process uses Great Deluge heuristic method. It is implemented using C++ programming language and tested on a personal computer with 2.40GHZ speed processor. The algorithm has been able to triangulate the Tanzanian input-output tables of size 79×79 within a reasonable time (1.17 seconds). It has been able to order the corresponding economic sectors in the linear order, with upper triangle weight increased from 585,481 to 839,842 giving the degree of linearity of 94.3%.
Бесплатно

Grid Approach with Metadata of Messages in Service Oriented Architecture
Статья научная
Service Orientation Architecture is playing a vital role in the middleware and enterprise organizations through its key design principles and there are many benefits of it as well. Loose Coupling between services is one of its design principles that help system or architecture to maintain its efficiency because services are less dependent on each other. Stopping of one service could not affect other service and system but there is a fact that services have less knowledge of other services that’s why services cannot be able to properly communicate with each other and Service Oriented Architecture is totally based on communicative messages between services in order to perform their functionality. This paper provides a basic solution to control the messaging criteria between services. This paper holds the brief description of messaging criteria of services in service oriented architecture by defining the process of message that fulfills the guaranteed delivery of message to its other end while communicating or asking for a service.
Бесплатно

Статья научная
Arsenic is a natural element of the earth’s crust and is commonly distributed all over the environment in the air, water and land. It is extremely poisonous in its inorganic form. Arsenic (As) contamination is one of the leading issues in the south Asian countries, ground water is major sources of drinking water. The highest risk to public health from arsenic originates from polluted groundwater. Arsenic is naturally present at high levels in the groundwater of south Asian countries. Pakistan also one of them which is highly affected by this toxic element, especially rural areas of Sindh Pakistan, where Ground water is the only source of drinking. Due to climates changes day by day value of arsenic is increased in Ground water, that effects the human health in form of many diseases like skin cancer, blood cancer. The purpose of this study is to figure out the increasing level of Arsenic and Cancer rate in Tando Muhamad Khan Sindh Pakistan for next coming five years. For this we have developed model using Microsoft Azure Machine learning Techniques and algorithms including Bayesian Linear Regression (BLR), support vector machine (SVM), Linear Regression (LR), Boosted Decision tree (BDT), exponential smoothing ETS, Autoregressive Integrated Moving Average (ARIMA). Developed model will help us to forecast the increasing rate of Arsenic and its effects on human health in form of cancer.
Бесплатно

Статья научная
This study examines the functional requirements (FR) and non-functional requirements (NFR) for development of an integrated mobile application and a web-based system for enhancement of HIV/AIDS healthcare information delivery in Tanzania. The study was conducted in Dar es Salaam city in Tanzania. The unstructured interview was carried-out involving 45 people, among them, there were selected relevant users of the proposed system, Information Technologists, System Administrators and HIV/AIDS healthcare practitioners from the HIV/AIDS Care and Treatment Centers (CTCs) in district referral hospitals in Dar es Salaam. The captured requirements were classified into functional and non-functional requirements, the functional requirements were then graphically analyzed using the use case diagram, which was done by using starUML computer software. These findings can be used as the foundation’s building block for the development of a mobile application and web-based system for HIV/AIDS healthcare information delivery services.
Бесплатно

Health informatics system for screening arboviral infections in adults
Статья научная
Health Informatics (HI) has played vital roles in the management of several diseases especially in the tropics. It has revolutionized the mainstream healthcare and healthcare delivery system. This paper applies the principle of Health Informatics to addressing the detection and management of arboviruses particularly Zika and Dengue viruses around which the aetiology of Zika Virus Disease and Dengue fever revolves. In this paper, the object-oriented approach was employed to study the fundamental procedures in the detection and management of arboviral infections. The study culminated into modelling of knowledge-based prototype system for screening patients in incidence areas. Existing knowledge on the management of arbovirus infections was complemented with purposive sampling of two specialist infectious diseases facilities in Nigeria. The health informatics prototype is christened NCliniSoft Diagnostic ZikaSol and is composed of five components validated through expert-driven differential diagnostic procedures. The prototype was evaluated to test for usability, diagnostic consistency, user acceptance and satisfaction. The prototype performs a differential screening between Dengue fever and Zika Virus disease using the Bayesian probabilities complemented by situational constructs. The result of each screening process is an automated diagnostic report that shows the status of the patient. Computed result showed high level of efficiency and acceptability.
Бесплатно

Heterogeneous Energy Efficient Protocol for Enhancing the Lifetime in WSNs
Статья научная
In this paper, we propose a 3-level heterogeneous network model for WSNs to enhance the network lifetime, which is characterized by a single parameter. Depending upon the value of the model parameter, it can describe 1-level, 2-level, and 3-level heterogeneity. Our heterogeneous network model also helps to select cluster heads and their respective cluster members by using weighted election probability and threshold function. We compute the network lifetime by implementing HEED protocol for our network model. The HEED implementation for the existing 1-level, 2-level, and 3-level heterogeneous network models are denoted as HEED-1, HEED-2, and HEED-3, respectively, and for our proposed 3-level heterogeneous network model, the SEP implementations are denoted as hetHEED-1, hetHEED-2, and hetHEED-3, respectively. As evident from the simulation results, the hetHEED-3 provides longer lifetime than that of the HEED-3 for all cases.
Бесплатно

Heuristic optimization technique to locate and avoid buried landmines: drone-based approach
Статья научная
Landmines detection and removal are one of the biggest problems that faced many countries throughout the world. The procedures of landmines detection and removal are slow, dangerous and labor intensive. Some countries are currently involved in peacekeeping forces, where troops are in constant danger from landmines placed along roads and tracks. Accordingly, such traps are considered as an effective weapon in threatening troop’s lives, and preventing their movements. From this perspective, to meet the need for a fast way to locate landmines, and to offer the highest level of safety for military forces without the risk of triggering them during any mission; a lightweight aerial system that implements a heuristic optimization technique is proposed in this paper. The system is structured with five units: Hexacopter unmanned aerial vehicle (UAV), landmine detector, hands free flight controller, emergency flight controller, and the main on-board flight controller. Drone is equipped with a landmine detector, emergency flight controller, and the main on-board flight controller. Based on the feedback from the landmine detector, Drone will guide the leader of the troop through the communication channel established between the hands free flight controller and the emergency flight controller. The system has been simulated using the MATLAB and the overall concept shows promise. Additionally, experiments are carried out successfully on the real hardware.
Бесплатно

Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity
Статья научная
Individual Chinese characters are identified mainly by their skeleton structure instead of texture or color.In this paper, an approach based on skeleton similarity for Chinese calligraphic characters retrieval is proposed.By this approach,first,the skeleton of the binarized individual characters are acquired by an improved multi-level module analysis algorithm.Second,the first round of skeleton matching based on the invariant moment-descriptor guarantees the recall rate;the second round of skeleton matching based on the comprehensive characteristic difference in the polar coordinates system guarantees the retrieval precision.Finally,different styles of the same Chinese characters are ranked and displayed according to the two rounds of matching score.Besides,the efficiency of our approach is manifested by the preliminary experiment.
Бесплатно

High Performance Network Security Using NIDS Approach
Статья научная
Ever increasing demand of good quality communication relies heavily on Network Intrusion Detection System (NIDS). Intrusion detection for network security demands high performance. This paper gives a description of the available approaches for a network intrusion detection system in both software and hardware implementation. This paper gives a description of the structure of Snort rule set which is a very popular software signature and anomaly based Intrusion Detection and prevention system. This paper also discusses the merit of FPGA devices to be used in network intrusion detection system implementation and the approaches used in hardware implementation of NIDS.
Бесплатно

Hike the performance of collaborative filtering algorithm with the inclusion of multiple attributes
Статья научная
At a recent time, digital data increases very speedily from small business to large business. In this span of internet explosion, choices are also increases and it makes the selection of products very difficult for users so it demands some recommendation system which provides good and meaningful suggestions to users to help them to purchase or select products of their own choice and get benefited. Collaborative filtering technique works very productive to provide personalized suggestions. It works based on the past given ratings, behavior and choices of users to provide recommendations. To boost its performance many other algorithms and techniques can be combined with it. This paper describes the method to boost the performance of collaborative filtering algorithm by taking multiple attributes in consideration where each attribute has some weight.
Бесплатно

Homogeneous densities clustering algorithm
Статья научная
Clustering based-density is very attractive research area in data clustering. DBSCAN (Density-Based Spatial Clustering of Applications with Noise) algorithm is the pioneer in this area. It can handle varied shaped and sized clusters. Also, it copes with noise and outliers efficiently, however it fails to handle clusters with varied densities due to the global parameter Eps. In this paper, we propose a method overcomes this problem, this method does not allow large variation in density within a cluster and use only two input parameters that will be called minpts and maxpts. They govern the minimum and maximum density of core objects within a cluster. The maxpts parameter will be used to control the value of Eps (neighborhood radius) in original DBSCAN. By allowing Eps to be varied from one cluster to another based on density of region this make DBSCAN able to handle varied density clusters and discover homogeneous clusters. The experimental results reflect the efficiency of the proposed method despite its simplicity.
Бесплатно

Hybrid Communication System Based on OFDM
Статья научная
A Hybrid architecture between terrestrial and satellite networks based on Orthogonal Frequency Division Multiplexing (OFDM) is employed here. In hybrid architecture, the users will be able to avail the services through the terrestrial networks as well as the satellite networks. The users located in urban areas will be served by the existing terrestrial mobile networks and similarly the one located in rural areas will be provided services through the satellite networks. The technique which is used to achieve this objective is called Pre-FFT adaptive beamforming also called time domain beamforming. When the data is received at the satellite end, the Pre-FFT adaptive beamforming extracts the desired user data from the interferer user by applying the complex weights to the received symbol. The weight for the next symbol is then updated by Least Mean Square (LMS) algorithm and then is applied to it. This process is carried out till all the desired user data is extracted.
Бесплатно