International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1227

Статья научная
This study examines the functional requirements (FR) and non-functional requirements (NFR) for development of an integrated mobile application and a web-based system for enhancement of HIV/AIDS healthcare information delivery in Tanzania. The study was conducted in Dar es Salaam city in Tanzania. The unstructured interview was carried-out involving 45 people, among them, there were selected relevant users of the proposed system, Information Technologists, System Administrators and HIV/AIDS healthcare practitioners from the HIV/AIDS Care and Treatment Centers (CTCs) in district referral hospitals in Dar es Salaam. The captured requirements were classified into functional and non-functional requirements, the functional requirements were then graphically analyzed using the use case diagram, which was done by using starUML computer software. These findings can be used as the foundation’s building block for the development of a mobile application and web-based system for HIV/AIDS healthcare information delivery services.
Бесплатно

Health informatics system for screening arboviral infections in adults
Статья научная
Health Informatics (HI) has played vital roles in the management of several diseases especially in the tropics. It has revolutionized the mainstream healthcare and healthcare delivery system. This paper applies the principle of Health Informatics to addressing the detection and management of arboviruses particularly Zika and Dengue viruses around which the aetiology of Zika Virus Disease and Dengue fever revolves. In this paper, the object-oriented approach was employed to study the fundamental procedures in the detection and management of arboviral infections. The study culminated into modelling of knowledge-based prototype system for screening patients in incidence areas. Existing knowledge on the management of arbovirus infections was complemented with purposive sampling of two specialist infectious diseases facilities in Nigeria. The health informatics prototype is christened NCliniSoft Diagnostic ZikaSol and is composed of five components validated through expert-driven differential diagnostic procedures. The prototype was evaluated to test for usability, diagnostic consistency, user acceptance and satisfaction. The prototype performs a differential screening between Dengue fever and Zika Virus disease using the Bayesian probabilities complemented by situational constructs. The result of each screening process is an automated diagnostic report that shows the status of the patient. Computed result showed high level of efficiency and acceptability.
Бесплатно

Heterogeneous Energy Efficient Protocol for Enhancing the Lifetime in WSNs
Статья научная
In this paper, we propose a 3-level heterogeneous network model for WSNs to enhance the network lifetime, which is characterized by a single parameter. Depending upon the value of the model parameter, it can describe 1-level, 2-level, and 3-level heterogeneity. Our heterogeneous network model also helps to select cluster heads and their respective cluster members by using weighted election probability and threshold function. We compute the network lifetime by implementing HEED protocol for our network model. The HEED implementation for the existing 1-level, 2-level, and 3-level heterogeneous network models are denoted as HEED-1, HEED-2, and HEED-3, respectively, and for our proposed 3-level heterogeneous network model, the SEP implementations are denoted as hetHEED-1, hetHEED-2, and hetHEED-3, respectively. As evident from the simulation results, the hetHEED-3 provides longer lifetime than that of the HEED-3 for all cases.
Бесплатно

Heuristic optimization technique to locate and avoid buried landmines: drone-based approach
Статья научная
Landmines detection and removal are one of the biggest problems that faced many countries throughout the world. The procedures of landmines detection and removal are slow, dangerous and labor intensive. Some countries are currently involved in peacekeeping forces, where troops are in constant danger from landmines placed along roads and tracks. Accordingly, such traps are considered as an effective weapon in threatening troop’s lives, and preventing their movements. From this perspective, to meet the need for a fast way to locate landmines, and to offer the highest level of safety for military forces without the risk of triggering them during any mission; a lightweight aerial system that implements a heuristic optimization technique is proposed in this paper. The system is structured with five units: Hexacopter unmanned aerial vehicle (UAV), landmine detector, hands free flight controller, emergency flight controller, and the main on-board flight controller. Drone is equipped with a landmine detector, emergency flight controller, and the main on-board flight controller. Based on the feedback from the landmine detector, Drone will guide the leader of the troop through the communication channel established between the hands free flight controller and the emergency flight controller. The system has been simulated using the MATLAB and the overall concept shows promise. Additionally, experiments are carried out successfully on the real hardware.
Бесплатно

Hierarchical Matching for Chinese Calligraphic Retrieval Using Skeleton Similarity
Статья научная
Individual Chinese characters are identified mainly by their skeleton structure instead of texture or color.In this paper, an approach based on skeleton similarity for Chinese calligraphic characters retrieval is proposed.By this approach,first,the skeleton of the binarized individual characters are acquired by an improved multi-level module analysis algorithm.Second,the first round of skeleton matching based on the invariant moment-descriptor guarantees the recall rate;the second round of skeleton matching based on the comprehensive characteristic difference in the polar coordinates system guarantees the retrieval precision.Finally,different styles of the same Chinese characters are ranked and displayed according to the two rounds of matching score.Besides,the efficiency of our approach is manifested by the preliminary experiment.
Бесплатно

High Performance Network Security Using NIDS Approach
Статья научная
Ever increasing demand of good quality communication relies heavily on Network Intrusion Detection System (NIDS). Intrusion detection for network security demands high performance. This paper gives a description of the available approaches for a network intrusion detection system in both software and hardware implementation. This paper gives a description of the structure of Snort rule set which is a very popular software signature and anomaly based Intrusion Detection and prevention system. This paper also discusses the merit of FPGA devices to be used in network intrusion detection system implementation and the approaches used in hardware implementation of NIDS.
Бесплатно

Hike the performance of collaborative filtering algorithm with the inclusion of multiple attributes
Статья научная
At a recent time, digital data increases very speedily from small business to large business. In this span of internet explosion, choices are also increases and it makes the selection of products very difficult for users so it demands some recommendation system which provides good and meaningful suggestions to users to help them to purchase or select products of their own choice and get benefited. Collaborative filtering technique works very productive to provide personalized suggestions. It works based on the past given ratings, behavior and choices of users to provide recommendations. To boost its performance many other algorithms and techniques can be combined with it. This paper describes the method to boost the performance of collaborative filtering algorithm by taking multiple attributes in consideration where each attribute has some weight.
Бесплатно

Homogeneous densities clustering algorithm
Статья научная
Clustering based-density is very attractive research area in data clustering. DBSCAN (Density-Based Spatial Clustering of Applications with Noise) algorithm is the pioneer in this area. It can handle varied shaped and sized clusters. Also, it copes with noise and outliers efficiently, however it fails to handle clusters with varied densities due to the global parameter Eps. In this paper, we propose a method overcomes this problem, this method does not allow large variation in density within a cluster and use only two input parameters that will be called minpts and maxpts. They govern the minimum and maximum density of core objects within a cluster. The maxpts parameter will be used to control the value of Eps (neighborhood radius) in original DBSCAN. By allowing Eps to be varied from one cluster to another based on density of region this make DBSCAN able to handle varied density clusters and discover homogeneous clusters. The experimental results reflect the efficiency of the proposed method despite its simplicity.
Бесплатно

Hybrid Communication System Based on OFDM
Статья научная
A Hybrid architecture between terrestrial and satellite networks based on Orthogonal Frequency Division Multiplexing (OFDM) is employed here. In hybrid architecture, the users will be able to avail the services through the terrestrial networks as well as the satellite networks. The users located in urban areas will be served by the existing terrestrial mobile networks and similarly the one located in rural areas will be provided services through the satellite networks. The technique which is used to achieve this objective is called Pre-FFT adaptive beamforming also called time domain beamforming. When the data is received at the satellite end, the Pre-FFT adaptive beamforming extracts the desired user data from the interferer user by applying the complex weights to the received symbol. The weight for the next symbol is then updated by Least Mean Square (LMS) algorithm and then is applied to it. This process is carried out till all the desired user data is extracted.
Бесплатно

Hybrid Real-time Zero-day Malware Analysis and Reporting System
Статья научная
To understand completely the malicious intents of a zero-day malware there is really no automated way. There is no single best approach for malware analysis so it demands to combine existing static, dynamic and manual malware analysis techniques in a single unit. In this paper a hybrid real-time analysis and reporting system is presented. The proposed system integrates various malware analysis tools and utilities in a component-based architecture. The system automatically provides detail result about zero-day malware's behavior. The ultimate goal of this analysis and reporting is to gain a quick and brief understanding of the malicious activity performed by a zero-day malware while minimizing the time frame between the detection of zero-day attack and generation of a security solution. The results are paramount valuable for a malware analyst to perform zero-day malware detection and containment.
Бесплатно

Hypervisors’ Guest Isolation Capacity Evaluation in the Private Cloud Using SIAGR Framework
Статья научная
Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest operating systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and virtual machines (VMs) with guest operating systems, there bound to be an impact on each guest operating system while other guest operating systems are fully utilizing their allotted system resources. It is interesting to study hypervisor’s guest isolation capacity while several guest operating systems running on it. This paper selected three hypervisors, namely ESXi 4.1, XenServer 6.0 and KVM (Ubuntu 12.04 Server) for the experimentation. The three hypervisors are prudently preferred as they represent three different categories (full virtualized, para-virtualized, and hybrid virtualized). Focus being on hypervisors’ guest isolation capacity evaluation, therefore, private cloud is chosen over public cloud as it has fewer security concerns. Private Cloud is created using apache’s CloudStack. Windows 7 OS is deployed as a guest VM on each hypervisor and their guest isolation capacity is evaluated for CPU and Network performances.
Бесплатно

IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments
Статья научная
Scheduling is an NP-hard problem, and metaheuristic algorithms are often used to find approximate solutions within a feasible time frame. Existing metaheuristic algorithms, such as ACO, PSO, and BOA address this problem either in cloud or fog environments. However, when these environments are combined into a hybrid cloud-fog environment, these algorithms become inefficient due to inadequate handling of local and global search strategies. This inefficiency leads to suboptimal scheduling across the cloud-fog environment because the algorithms fail to adapt effectively to the combined challenges of both environments. In our proposed Improved Butterfly Optimization Algorithm (IBOA), we enhance adaptability by dynamically updating the computation cost, communication cost, and total cost, effectively balancing both local and global search strategies. This dynamic adaptation allows the algorithm to select the best resources for executing tasks in both cloud and fog environments. We implemented our proposed approach in the CloudSim simulator and compared it with traditional algorithms such as ACO, PSO, and BOA. The results demonstrate that IBOA offers significant reductions in total cost, communication cost, and computation cost by 19.65%, 18.28%, and 25.41%, respectively, making it a promising solution for real-world cloud-fog computing (CFC) applications.
Бесплатно

ICT Definition Implication on ICT Career Choice and Exclusion among Women
Статья научная
ICT is driving all areas of the economy and is likely to dictate the future for all genders. The narrow definition of ICT has greatly impacted on the female gender choosing ICT as a career of choice. There are few women in the ICT careers. The study sought to determine the nature of ICT career gender exclusion, status and trend of ICT job opportunities, source of ICT gender career exclusion and the contribution of the narrow definition to the exclusion. A mixed method of survey and desktop method was employed in this study. A structured questionnaire was used in this study in order to identify the factors that influence ICT career choice amongst Kenyan lady students. A purposive sample of Information Technology and Computer Science undergraduate university students (77 females, 56 males; age range 17 to 35 years) and 10 postgraduate students in Information Technology from two public universities participated in the study. The paper discusses the emerging unfilled ICT jobs. The study established that the narrow definition negatively influences ICT as a career of Choice among girls. Broadening ICT definition to include ICT related careers that have more social rather than technical aspect accordingly is likely to influence more women to join the field.
Бесплатно

ICT training recommendation using web usage mining
Статья научная
The sustainability of a course and training institute depends on the availability of students. There are many ways to promote the courses and training programs including promoting it through the institution's website. The visitor behavior of a website have hidden information that can be found using web usage mining approach. This study aims to discover the hidden information from the visitor patterns of course website. The data used are web access log data of August 2016. Web usage mining process was done using the Co-Occurence Map Sequential Pattern Mining using Bitmap Representation (CM-SPAM) algorithm which is available in the SPMF tool. Based on sequential pattern mining on the access log data, this study recommends improvements regarding the website structure and information that should be displayed on certain web pages. This study also found that the visitors of course website interested in three page types: one day seminar, tutorial and the training program.
Бесплатно

IP Camera Based Video Surveillance Using Object's Boundary Specification
Статья научная
The ability to detect and track object of interest from sequence of frames is a critical and vital problem of many vision systems developed as yet. This paper presents a smart surveillance system that tracks objects of interest in a sequence of frames in their own defined respective boundaries. The objects of interest are registered or saved within the system. We have proposed a unique tracking algorithm using combination of SURF feature matching, Kalman filtering and template matching approach. Moreover, an efficient technique is proposed that is used to refine registered object image, extract object of interest and remove extraneous image area from it. The system will track registered objects in their respective boundaries using real time video generated through two IP cameras positioned in front of each other.
Бесплатно

IPL Team Performance Analysis: A Multi-Criteria Group Decision Approach in Fuzzy Environment
Статья научная
Now a day Cricket is one of the most popular sports around the world. Twenty-20 cricket is the most popular entertaining game in last eight to ten years among different formats of cricket. Indian Premier League (IPL) plays vital role to upturn the status of Twenty-20 cricket. This paper aims to analysis the team performances during first six sessions of IPL in the field of sports Data Mining. The proposed work deals with five different multi-criteria techniques and two group decision analysis in fuzzy environment to handle the imprecise and ambiguous data. The result shows that proposed model yields more realistic way to judge the team’s performance and every time it produces the accurate performance appraisal.
Бесплатно

ITAAM Framework: An Adaptive Approach to Design, Measure and Improve IT Agility
Статья научная
In order to respond effectively to rapid and unpredictable changes in the business environment, information systems are forced to adapt by developing agility skills, so the company can grow or even survive in this changing environment. Thus, it is necessary to provide organizations an approach indicating how to design, measure and improve the agility of their information systems. In this context an iterative, integrated, flexible and balanced framework has been developed. This framework, called ITAAM (Information Technology Agility Assessment Model), is founded upon a simple model, derived from the Balanced ScoreCard methodology that is widely used as a system of performance measurement. Basically, the structure of our approach is composed of a conceptual framework, an evaluation methodology, an agility grid and a scoring system for the Global Agility Index calculation. Moreover, within every assessment cycle, the agility level is identified and a set of recommendations are provided as well as the necessary adjustment guidelines concerning the whole organization. As a result, sustainability and continuous improvement of agility can be ensured, which represents the main goal of our new construct.
Бесплатно

Identity Management: Lightweight SAML for Less Processing Power
Статья научная
Identity management has emerged as important issue for reducing complexity and improving user experience when accessing services. In addition to, recently authentication services added SAML to the range of authentication options to be available to cloud subscriber. This work mainly focused on SAML representation in the existing identity management frameworks and its suitability. We introduced a new representation of SAML that makes it light in weight and easier in parsing and dealing with. This representation is demonstrated using JSON. In our new SAML representation, we enhanced the performance of marshalling the SAML by 28.99%. In this paper, we will go into these challenges to introduce a new representation for the identity and access management markup language. Our proposed representation is designed to match the small processing power devices for faster generation, parsing and communication.
Бесплатно

Image Classification using Support Vector Machine and Artificial Neural Network
Статья научная
Image classification is one of classical problems of concern in image processing. There are various approaches for solving this problem. The aim of this paper is bring together two areas in which are Artificial Neural Network (ANN) and Support Vector Machine (SVM) applying for image classification. Firstly, we separate the image into many sub-images based on the features of images. Each sub-image is classified into the responsive class by an ANN. Finally, SVM has been compiled all the classify result of ANN. Our proposal classification model has brought together many ANN and one SVM. Let it denote ANN_SVM. ANN_SVM has been applied for Roman numerals recognition application and the precision rate is 86%. The experimental results show the feasibility of our proposal model.
Бесплатно

Image Denoising using Tri Nonlinear and Nearest Neighbor Interpolation with Wavelet Transform
Статья научная
In this paper new methods Tri Non Linear Interpolation and nearest neighbor interpolation for image denoising in wavelet domain are proposed. Tri non linear interpolation methods better de-noising method which preserves the image feature like edges and background. Interpolation is way through which images are enlarged. The nearest neighbor interpolation used forward wavelet and enlarges the size of image which retains the image parameter. The nearest neighbor interpolation technique is fruit full for variety of noisy images. PSNR is key parameter for measurement of image quality throughout this text. The existing methods used the threshold technique for noise removal but our methods image quality is better as compared to the existing threshold technique.
Бесплатно