Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1195

Grid Approach with Metadata of Messages in Service Oriented Architecture

Grid Approach with Metadata of Messages in Service Oriented Architecture

Jamal S. M. Khalid, Asif M.

Статья научная

Service Orientation Architecture is playing a vital role in the middleware and enterprise organizations through its key design principles and there are many benefits of it as well. Loose Coupling between services is one of its design principles that help system or architecture to maintain its efficiency because services are less dependent on each other. Stopping of one service could not affect other service and system but there is a fact that services have less knowledge of other services that’s why services cannot be able to properly communicate with each other and Service Oriented Architecture is totally based on communicative messages between services in order to perform their functionality. This paper provides a basic solution to control the messaging criteria between services. This paper holds the brief description of messaging criteria of services in service oriented architecture by defining the process of message that fulfills the guaranteed delivery of message to its other end while communicating or asking for a service.

Бесплатно

Groundwater Arsenic and Health Risk Prediction Model using Machine Learning for T.M Khan Sindh, Pakistan

Groundwater Arsenic and Health Risk Prediction Model using Machine Learning for T.M Khan Sindh, Pakistan

Sobia Iftikhar, Sania Bhatti, Mohsin A. Memon, Zulfiqar A. Bhatti

Статья научная

Arsenic is a natural element of the earth’s crust and is commonly distributed all over the environment in the air, water and land. It is extremely poisonous in its inorganic form. Arsenic (As) contamination is one of the leading issues in the south Asian countries, ground water is major sources of drinking water. The highest risk to public health from arsenic originates from polluted groundwater. Arsenic is naturally present at high levels in the groundwater of south Asian countries. Pakistan also one of them which is highly affected by this toxic element, especially rural areas of Sindh Pakistan, where Ground water is the only source of drinking. Due to climates changes day by day value of arsenic is increased in Ground water, that effects the human health in form of many diseases like skin cancer, blood cancer. The purpose of this study is to figure out the increasing level of Arsenic and Cancer rate in Tando Muhamad Khan Sindh Pakistan for next coming five years. For this we have developed model using Microsoft Azure Machine learning Techniques and algorithms including Bayesian Linear Regression (BLR), support vector machine (SVM), Linear Regression (LR), Boosted Decision tree (BDT), exponential smoothing ETS, Autoregressive Integrated Moving Average (ARIMA). Developed model will help us to forecast the increasing rate of Arsenic and its effects on human health in form of cancer.

Бесплатно

HIV/AIDS healthcare information delivery in Tanzania using integrated mobile application and web-based system: system’s functional and non-functional requirements

HIV/AIDS healthcare information delivery in Tanzania using integrated mobile application and web-based system: system’s functional and non-functional requirements

Ibrahim A. Mwammenywa, Shubi F. Kaijage

Статья научная

This study examines the functional requirements (FR) and non-functional requirements (NFR) for development of an integrated mobile application and a web-based system for enhancement of HIV/AIDS healthcare information delivery in Tanzania. The study was conducted in Dar es Salaam city in Tanzania. The unstructured interview was carried-out involving 45 people, among them, there were selected relevant users of the proposed system, Information Technologists, System Administrators and HIV/AIDS healthcare practitioners from the HIV/AIDS Care and Treatment Centers (CTCs) in district referral hospitals in Dar es Salaam. The captured requirements were classified into functional and non-functional requirements, the functional requirements were then graphically analyzed using the use case diagram, which was done by using starUML computer software. These findings can be used as the foundation’s building block for the development of a mobile application and web-based system for HIV/AIDS healthcare information delivery services.

Бесплатно

Health informatics system for screening arboviral infections in adults

Health informatics system for screening arboviral infections in adults

Chinecherem Umezuruike, Wilson Nwankwo, Samuel O. Okolie, Adewale O. Adebayo, Joshua V. Jonah, Habiba Ngugi

Статья научная

Health Informatics (HI) has played vital roles in the management of several diseases especially in the tropics. It has revolutionized the mainstream healthcare and healthcare delivery system. This paper applies the principle of Health Informatics to addressing the detection and management of arboviruses particularly Zika and Dengue viruses around which the aetiology of Zika Virus Disease and Dengue fever revolves. In this paper, the object-oriented approach was employed to study the fundamental procedures in the detection and management of arboviral infections. The study culminated into modelling of knowledge-based prototype system for screening patients in incidence areas. Existing knowledge on the management of arbovirus infections was complemented with purposive sampling of two specialist infectious diseases facilities in Nigeria. The health informatics prototype is christened NCliniSoft Diagnostic ZikaSol and is composed of five components validated through expert-driven differential diagnostic procedures. The prototype was evaluated to test for usability, diagnostic consistency, user acceptance and satisfaction. The prototype performs a differential screening between Dengue fever and Zika Virus disease using the Bayesian probabilities complemented by situational constructs. The result of each screening process is an automated diagnostic report that shows the status of the patient. Computed result showed high level of efficiency and acceptability.

Бесплатно

Heterogeneous Energy Efficient Protocol for Enhancing the Lifetime in WSNs

Heterogeneous Energy Efficient Protocol for Enhancing the Lifetime in WSNs

Samayveer Singh, Aruna Malik

Статья научная

In this paper, we propose a 3-level heterogeneous network model for WSNs to enhance the network lifetime, which is characterized by a single parameter. Depending upon the value of the model parameter, it can describe 1-level, 2-level, and 3-level heterogeneity. Our heterogeneous network model also helps to select cluster heads and their respective cluster members by using weighted election probability and threshold function. We compute the network lifetime by implementing HEED protocol for our network model. The HEED implementation for the existing 1-level, 2-level, and 3-level heterogeneous network models are denoted as HEED-1, HEED-2, and HEED-3, respectively, and for our proposed 3-level heterogeneous network model, the SEP implementations are denoted as hetHEED-1, hetHEED-2, and hetHEED-3, respectively. As evident from the simulation results, the hetHEED-3 provides longer lifetime than that of the HEED-3 for all cases.

Бесплатно

Heuristic optimization technique to locate and avoid buried landmines: drone-based approach

Heuristic optimization technique to locate and avoid buried landmines: drone-based approach

Abdel Ilah N. Alshbatat

Статья научная

Landmines detection and removal are one of the biggest problems that faced many countries throughout the world. The procedures of landmines detection and removal are slow, dangerous and labor intensive. Some countries are currently involved in peacekeeping forces, where troops are in constant danger from landmines placed along roads and tracks. Accordingly, such traps are considered as an effective weapon in threatening troop’s lives, and preventing their movements. From this perspective, to meet the need for a fast way to locate landmines, and to offer the highest level of safety for military forces without the risk of triggering them during any mission; a lightweight aerial system that implements a heuristic optimization technique is proposed in this paper. The system is structured with five units: Hexacopter unmanned aerial vehicle (UAV), landmine detector, hands free flight controller, emergency flight controller, and the main on-board flight controller. Drone is equipped with a landmine detector, emergency flight controller, and the main on-board flight controller. Based on the feedback from the landmine detector, Drone will guide the leader of the troop through the communication channel established between the hands free flight controller and the emergency flight controller. The system has been simulated using the MATLAB and the overall concept shows promise. Additionally, experiments are carried out successfully on the real hardware.

Бесплатно

Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity

Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity

Jie Chen, Fuxi Zhu

Статья научная

Individual Chinese characters are identified mainly by their skeleton structure instead of texture or color.In this paper, an approach based on skeleton similarity for Chinese calligraphic characters retrieval is proposed.By this approach,first,the skeleton of the binarized individual characters are acquired by an improved multi-level module analysis algorithm.Second,the first round of skeleton matching based on the invariant moment-descriptor guarantees the recall rate;the second round of skeleton matching based on the comprehensive characteristic difference in the polar coordinates system guarantees the retrieval precision.Finally,different styles of the same Chinese characters are ranked and displayed according to the two rounds of matching score.Besides,the efficiency of our approach is manifested by the preliminary experiment.

Бесплатно

High Performance Network Security Using NIDS Approach

High Performance Network Security Using NIDS Approach

Sutapa Sarkar, Brindha.M

Статья научная

Ever increasing demand of good quality communication relies heavily on Network Intrusion Detection System (NIDS). Intrusion detection for network security demands high performance. This paper gives a description of the available approaches for a network intrusion detection system in both software and hardware implementation. This paper gives a description of the structure of Snort rule set which is a very popular software signature and anomaly based Intrusion Detection and prevention system. This paper also discusses the merit of FPGA devices to be used in network intrusion detection system implementation and the approaches used in hardware implementation of NIDS.

Бесплатно

Hike the performance of collaborative filtering algorithm with the inclusion of multiple attributes

Hike the performance of collaborative filtering algorithm with the inclusion of multiple attributes

Barkha A. Wadhvani, Sameer A. Chauhan

Статья научная

At a recent time, digital data increases very speedily from small business to large business. In this span of internet explosion, choices are also increases and it makes the selection of products very difficult for users so it demands some recommendation system which provides good and meaningful suggestions to users to help them to purchase or select products of their own choice and get benefited. Collaborative filtering technique works very productive to provide personalized suggestions. It works based on the past given ratings, behavior and choices of users to provide recommendations. To boost its performance many other algorithms and techniques can be combined with it. This paper describes the method to boost the performance of collaborative filtering algorithm by taking multiple attributes in consideration where each attribute has some weight.

Бесплатно

Homogeneous densities clustering algorithm

Homogeneous densities clustering algorithm

Ahmed Fahim

Статья научная

Clustering based-density is very attractive research area in data clustering. DBSCAN (Density-Based Spatial Clustering of Applications with Noise) algorithm is the pioneer in this area. It can handle varied shaped and sized clusters. Also, it copes with noise and outliers efficiently, however it fails to handle clusters with varied densities due to the global parameter Eps. In this paper, we propose a method overcomes this problem, this method does not allow large variation in density within a cluster and use only two input parameters that will be called minpts and maxpts. They govern the minimum and maximum density of core objects within a cluster. The maxpts parameter will be used to control the value of Eps (neighborhood radius) in original DBSCAN. By allowing Eps to be varied from one cluster to another based on density of region this make DBSCAN able to handle varied density clusters and discover homogeneous clusters. The experimental results reflect the efficiency of the proposed method despite its simplicity.

Бесплатно

Hybrid Communication System Based on OFDM

Hybrid Communication System Based on OFDM

Farman Ullah, Nadia N Qadri, Muhammad Asif Zakriyya, Aamir Khan

Статья научная

A Hybrid architecture between terrestrial and satellite networks based on Orthogonal Frequency Division Multiplexing (OFDM) is employed here. In hybrid architecture, the users will be able to avail the services through the terrestrial networks as well as the satellite networks. The users located in urban areas will be served by the existing terrestrial mobile networks and similarly the one located in rural areas will be provided services through the satellite networks. The technique which is used to achieve this objective is called Pre-FFT adaptive beamforming also called time domain beamforming. When the data is received at the satellite end, the Pre-FFT adaptive beamforming extracts the desired user data from the interferer user by applying the complex weights to the received symbol. The weight for the next symbol is then updated by Least Mean Square (LMS) algorithm and then is applied to it. This process is carried out till all the desired user data is extracted.

Бесплатно

Hybrid Real-time Zero-day Malware Analysis and Reporting System

Hybrid Real-time Zero-day Malware Analysis and Reporting System

Ratinder Kaur, Maninder Singh

Статья научная

To understand completely the malicious intents of a zero-day malware there is really no automated way. There is no single best approach for malware analysis so it demands to combine existing static, dynamic and manual malware analysis techniques in a single unit. In this paper a hybrid real-time analysis and reporting system is presented. The proposed system integrates various malware analysis tools and utilities in a component-based architecture. The system automatically provides detail result about zero-day malware's behavior. The ultimate goal of this analysis and reporting is to gain a quick and brief understanding of the malicious activity performed by a zero-day malware while minimizing the time frame between the detection of zero-day attack and generation of a security solution. The results are paramount valuable for a malware analyst to perform zero-day malware detection and containment.

Бесплатно

Hypervisors’ Guest Isolation Capacity Evaluation in the Private Cloud Using SIAGR Framework

Hypervisors’ Guest Isolation Capacity Evaluation in the Private Cloud Using SIAGR Framework

P. Vijaya Vardhan Reddy, Lakshmi Rajamani

Статья научная

Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest operating systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and virtual machines (VMs) with guest operating systems, there bound to be an impact on each guest operating system while other guest operating systems are fully utilizing their allotted system resources. It is interesting to study hypervisor’s guest isolation capacity while several guest operating systems running on it. This paper selected three hypervisors, namely ESXi 4.1, XenServer 6.0 and KVM (Ubuntu 12.04 Server) for the experimentation. The three hypervisors are prudently preferred as they represent three different categories (full virtualized, para-virtualized, and hybrid virtualized). Focus being on hypervisors’ guest isolation capacity evaluation, therefore, private cloud is chosen over public cloud as it has fewer security concerns. Private Cloud is created using apache’s CloudStack. Windows 7 OS is deployed as a guest VM on each hypervisor and their guest isolation capacity is evaluated for CPU and Network performances.

Бесплатно

IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments

IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments

Santhosh Kumar Medishetti, Ganesh Reddy Karri, Rakesh Kumar Donthi

Статья научная

Scheduling is an NP-hard problem, and metaheuristic algorithms are often used to find approximate solutions within a feasible time frame. Existing metaheuristic algorithms, such as ACO, PSO, and BOA address this problem either in cloud or fog environments. However, when these environments are combined into a hybrid cloud-fog environment, these algorithms become inefficient due to inadequate handling of local and global search strategies. This inefficiency leads to suboptimal scheduling across the cloud-fog environment because the algorithms fail to adapt effectively to the combined challenges of both environments. In our proposed Improved Butterfly Optimization Algorithm (IBOA), we enhance adaptability by dynamically updating the computation cost, communication cost, and total cost, effectively balancing both local and global search strategies. This dynamic adaptation allows the algorithm to select the best resources for executing tasks in both cloud and fog environments. We implemented our proposed approach in the CloudSim simulator and compared it with traditional algorithms such as ACO, PSO, and BOA. The results demonstrate that IBOA offers significant reductions in total cost, communication cost, and computation cost by 19.65%, 18.28%, and 25.41%, respectively, making it a promising solution for real-world cloud-fog computing (CFC) applications.

Бесплатно

ICT Definition Implication on ICT Career Choice and Exclusion among Women

ICT Definition Implication on ICT Career Choice and Exclusion among Women

Muchiri Michael Njoki, Franklin Wabwoba, Elyjoy Muthoni Micheni

Статья научная

ICT is driving all areas of the economy and is likely to dictate the future for all genders. The narrow definition of ICT has greatly impacted on the female gender choosing ICT as a career of choice. There are few women in the ICT careers. The study sought to determine the nature of ICT career gender exclusion, status and trend of ICT job opportunities, source of ICT gender career exclusion and the contribution of the narrow definition to the exclusion. A mixed method of survey and desktop method was employed in this study. A structured questionnaire was used in this study in order to identify the factors that influence ICT career choice amongst Kenyan lady students. A purposive sample of Information Technology and Computer Science undergraduate university students (77 females, 56 males; age range 17 to 35 years) and 10 postgraduate students in Information Technology from two public universities participated in the study. The paper discusses the emerging unfilled ICT jobs. The study established that the narrow definition negatively influences ICT as a career of Choice among girls. Broadening ICT definition to include ICT related careers that have more social rather than technical aspect accordingly is likely to influence more women to join the field.

Бесплатно

ICT training recommendation using web usage mining

ICT training recommendation using web usage mining

Susi Maulidiah, Imas S. Sitanggang, Heru Sukoco

Статья научная

The sustainability of a course and training institute depends on the availability of students. There are many ways to promote the courses and training programs including promoting it through the institution's website. The visitor behavior of a website have hidden information that can be found using web usage mining approach. This study aims to discover the hidden information from the visitor patterns of course website. The data used are web access log data of August 2016. Web usage mining process was done using the Co-Occurence Map Sequential Pattern Mining using Bitmap Representation (CM-SPAM) algorithm which is available in the SPMF tool. Based on sequential pattern mining on the access log data, this study recommends improvements regarding the website structure and information that should be displayed on certain web pages. This study also found that the visitors of course website interested in three page types: one day seminar, tutorial and the training program.

Бесплатно

IP Camera Based Video Surveillance Using Object's Boundary Specification

IP Camera Based Video Surveillance Using Object's Boundary Specification

Natalia Chaudhry, Kh. M. Umar Suleman

Статья научная

The ability to detect and track object of interest from sequence of frames is a critical and vital problem of many vision systems developed as yet. This paper presents a smart surveillance system that tracks objects of interest in a sequence of frames in their own defined respective boundaries. The objects of interest are registered or saved within the system. We have proposed a unique tracking algorithm using combination of SURF feature matching, Kalman filtering and template matching approach. Moreover, an efficient technique is proposed that is used to refine registered object image, extract object of interest and remove extraneous image area from it. The system will track registered objects in their respective boundaries using real time video generated through two IP cameras positioned in front of each other.

Бесплатно

IPL Team Performance Analysis: A Multi-Criteria Group Decision Approach in Fuzzy Environment

IPL Team Performance Analysis: A Multi-Criteria Group Decision Approach in Fuzzy Environment

Pabitra Kumar Dey, Dipendra Nath Ghosh, Abhoy Chand Mondal

Статья научная

Now a day Cricket is one of the most popular sports around the world. Twenty-20 cricket is the most popular entertaining game in last eight to ten years among different formats of cricket. Indian Premier League (IPL) plays vital role to upturn the status of Twenty-20 cricket. This paper aims to analysis the team performances during first six sessions of IPL in the field of sports Data Mining. The proposed work deals with five different multi-criteria techniques and two group decision analysis in fuzzy environment to handle the imprecise and ambiguous data. The result shows that proposed model yields more realistic way to judge the team’s performance and every time it produces the accurate performance appraisal.

Бесплатно

ITAAM Framework: An Adaptive Approach to Design, Measure and Improve IT Agility

ITAAM Framework: An Adaptive Approach to Design, Measure and Improve IT Agility

Yassine Rdiouat, Wafaa Dachry, Alami Semma

Статья научная

In order to respond effectively to rapid and unpredictable changes in the business environment, information systems are forced to adapt by developing agility skills, so the company can grow or even survive in this changing environment. Thus, it is necessary to provide organizations an approach indicating how to design, measure and improve the agility of their information systems. In this context an iterative, integrated, flexible and balanced framework has been developed. This framework, called ITAAM (Information Technology Agility Assessment Model), is founded upon a simple model, derived from the Balanced ScoreCard methodology that is widely used as a system of performance measurement. Basically, the structure of our approach is composed of a conceptual framework, an evaluation methodology, an agility grid and a scoring system for the Global Agility Index calculation. Moreover, within every assessment cycle, the agility level is identified and a set of recommendations are provided as well as the necessary adjustment guidelines concerning the whole organization. As a result, sustainability and continuous improvement of agility can be ensured, which represents the main goal of our new construct.

Бесплатно

Identity Management: Lightweight SAML for Less Processing Power

Identity Management: Lightweight SAML for Less Processing Power

Mohammed Ali, Tarek S. Sobh, Salwa El-Gamal

Статья научная

Identity management has emerged as important issue for reducing complexity and improving user experience when accessing services. In addition to, recently authentication services added SAML to the range of authentication options to be available to cloud subscriber. This work mainly focused on SAML representation in the existing identity management frameworks and its suitability. We introduced a new representation of SAML that makes it light in weight and easier in parsing and dealing with. This representation is demonstrated using JSON. In our new SAML representation, we enhanced the performance of marshalling the SAML by 28.99%. In this paper, we will go into these challenges to introduce a new representation for the identity and access management markup language. Our proposed representation is designed to match the small processing power devices for faster generation, parsing and communication.

Бесплатно

Журнал