International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1211

Hybrid Real-time Zero-day Malware Analysis and Reporting System
Статья научная
To understand completely the malicious intents of a zero-day malware there is really no automated way. There is no single best approach for malware analysis so it demands to combine existing static, dynamic and manual malware analysis techniques in a single unit. In this paper a hybrid real-time analysis and reporting system is presented. The proposed system integrates various malware analysis tools and utilities in a component-based architecture. The system automatically provides detail result about zero-day malware's behavior. The ultimate goal of this analysis and reporting is to gain a quick and brief understanding of the malicious activity performed by a zero-day malware while minimizing the time frame between the detection of zero-day attack and generation of a security solution. The results are paramount valuable for a malware analyst to perform zero-day malware detection and containment.
Бесплатно

Hypervisors’ Guest Isolation Capacity Evaluation in the Private Cloud Using SIAGR Framework
Статья научная
Hypervisor vendors do claim that they have negated virtualization overhead compared to a native system. They also state that complete guest isolation is achieved while running multiple guest operating systems (OSs) on their hypervisors. But in a virtualization environment which is a combination of hardware, hypervisor and virtual machines (VMs) with guest operating systems, there bound to be an impact on each guest operating system while other guest operating systems are fully utilizing their allotted system resources. It is interesting to study hypervisor’s guest isolation capacity while several guest operating systems running on it. This paper selected three hypervisors, namely ESXi 4.1, XenServer 6.0 and KVM (Ubuntu 12.04 Server) for the experimentation. The three hypervisors are prudently preferred as they represent three different categories (full virtualized, para-virtualized, and hybrid virtualized). Focus being on hypervisors’ guest isolation capacity evaluation, therefore, private cloud is chosen over public cloud as it has fewer security concerns. Private Cloud is created using apache’s CloudStack. Windows 7 OS is deployed as a guest VM on each hypervisor and their guest isolation capacity is evaluated for CPU and Network performances.
Бесплатно

IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments
Статья научная
Scheduling is an NP-hard problem, and metaheuristic algorithms are often used to find approximate solutions within a feasible time frame. Existing metaheuristic algorithms, such as ACO, PSO, and BOA address this problem either in cloud or fog environments. However, when these environments are combined into a hybrid cloud-fog environment, these algorithms become inefficient due to inadequate handling of local and global search strategies. This inefficiency leads to suboptimal scheduling across the cloud-fog environment because the algorithms fail to adapt effectively to the combined challenges of both environments. In our proposed Improved Butterfly Optimization Algorithm (IBOA), we enhance adaptability by dynamically updating the computation cost, communication cost, and total cost, effectively balancing both local and global search strategies. This dynamic adaptation allows the algorithm to select the best resources for executing tasks in both cloud and fog environments. We implemented our proposed approach in the CloudSim simulator and compared it with traditional algorithms such as ACO, PSO, and BOA. The results demonstrate that IBOA offers significant reductions in total cost, communication cost, and computation cost by 19.65%, 18.28%, and 25.41%, respectively, making it a promising solution for real-world cloud-fog computing (CFC) applications.
Бесплатно

ICT Definition Implication on ICT Career Choice and Exclusion among Women
Статья научная
ICT is driving all areas of the economy and is likely to dictate the future for all genders. The narrow definition of ICT has greatly impacted on the female gender choosing ICT as a career of choice. There are few women in the ICT careers. The study sought to determine the nature of ICT career gender exclusion, status and trend of ICT job opportunities, source of ICT gender career exclusion and the contribution of the narrow definition to the exclusion. A mixed method of survey and desktop method was employed in this study. A structured questionnaire was used in this study in order to identify the factors that influence ICT career choice amongst Kenyan lady students. A purposive sample of Information Technology and Computer Science undergraduate university students (77 females, 56 males; age range 17 to 35 years) and 10 postgraduate students in Information Technology from two public universities participated in the study. The paper discusses the emerging unfilled ICT jobs. The study established that the narrow definition negatively influences ICT as a career of Choice among girls. Broadening ICT definition to include ICT related careers that have more social rather than technical aspect accordingly is likely to influence more women to join the field.
Бесплатно

ICT training recommendation using web usage mining
Статья научная
The sustainability of a course and training institute depends on the availability of students. There are many ways to promote the courses and training programs including promoting it through the institution's website. The visitor behavior of a website have hidden information that can be found using web usage mining approach. This study aims to discover the hidden information from the visitor patterns of course website. The data used are web access log data of August 2016. Web usage mining process was done using the Co-Occurence Map Sequential Pattern Mining using Bitmap Representation (CM-SPAM) algorithm which is available in the SPMF tool. Based on sequential pattern mining on the access log data, this study recommends improvements regarding the website structure and information that should be displayed on certain web pages. This study also found that the visitors of course website interested in three page types: one day seminar, tutorial and the training program.
Бесплатно

IP Camera Based Video Surveillance Using Object's Boundary Specification
Статья научная
The ability to detect and track object of interest from sequence of frames is a critical and vital problem of many vision systems developed as yet. This paper presents a smart surveillance system that tracks objects of interest in a sequence of frames in their own defined respective boundaries. The objects of interest are registered or saved within the system. We have proposed a unique tracking algorithm using combination of SURF feature matching, Kalman filtering and template matching approach. Moreover, an efficient technique is proposed that is used to refine registered object image, extract object of interest and remove extraneous image area from it. The system will track registered objects in their respective boundaries using real time video generated through two IP cameras positioned in front of each other.
Бесплатно

IPL Team Performance Analysis: A Multi-Criteria Group Decision Approach in Fuzzy Environment
Статья научная
Now a day Cricket is one of the most popular sports around the world. Twenty-20 cricket is the most popular entertaining game in last eight to ten years among different formats of cricket. Indian Premier League (IPL) plays vital role to upturn the status of Twenty-20 cricket. This paper aims to analysis the team performances during first six sessions of IPL in the field of sports Data Mining. The proposed work deals with five different multi-criteria techniques and two group decision analysis in fuzzy environment to handle the imprecise and ambiguous data. The result shows that proposed model yields more realistic way to judge the team’s performance and every time it produces the accurate performance appraisal.
Бесплатно

ITAAM Framework: An Adaptive Approach to Design, Measure and Improve IT Agility
Статья научная
In order to respond effectively to rapid and unpredictable changes in the business environment, information systems are forced to adapt by developing agility skills, so the company can grow or even survive in this changing environment. Thus, it is necessary to provide organizations an approach indicating how to design, measure and improve the agility of their information systems. In this context an iterative, integrated, flexible and balanced framework has been developed. This framework, called ITAAM (Information Technology Agility Assessment Model), is founded upon a simple model, derived from the Balanced ScoreCard methodology that is widely used as a system of performance measurement. Basically, the structure of our approach is composed of a conceptual framework, an evaluation methodology, an agility grid and a scoring system for the Global Agility Index calculation. Moreover, within every assessment cycle, the agility level is identified and a set of recommendations are provided as well as the necessary adjustment guidelines concerning the whole organization. As a result, sustainability and continuous improvement of agility can be ensured, which represents the main goal of our new construct.
Бесплатно

Identity Management: Lightweight SAML for Less Processing Power
Статья научная
Identity management has emerged as important issue for reducing complexity and improving user experience when accessing services. In addition to, recently authentication services added SAML to the range of authentication options to be available to cloud subscriber. This work mainly focused on SAML representation in the existing identity management frameworks and its suitability. We introduced a new representation of SAML that makes it light in weight and easier in parsing and dealing with. This representation is demonstrated using JSON. In our new SAML representation, we enhanced the performance of marshalling the SAML by 28.99%. In this paper, we will go into these challenges to introduce a new representation for the identity and access management markup language. Our proposed representation is designed to match the small processing power devices for faster generation, parsing and communication.
Бесплатно

Image Classification using Support Vector Machine and Artificial Neural Network
Статья научная
Image classification is one of classical problems of concern in image processing. There are various approaches for solving this problem. The aim of this paper is bring together two areas in which are Artificial Neural Network (ANN) and Support Vector Machine (SVM) applying for image classification. Firstly, we separate the image into many sub-images based on the features of images. Each sub-image is classified into the responsive class by an ANN. Finally, SVM has been compiled all the classify result of ANN. Our proposal classification model has brought together many ANN and one SVM. Let it denote ANN_SVM. ANN_SVM has been applied for Roman numerals recognition application and the precision rate is 86%. The experimental results show the feasibility of our proposal model.
Бесплатно

Image Denoising using Tri Nonlinear and Nearest Neighbor Interpolation with Wavelet Transform
Статья научная
In this paper new methods Tri Non Linear Interpolation and nearest neighbor interpolation for image denoising in wavelet domain are proposed. Tri non linear interpolation methods better de-noising method which preserves the image feature like edges and background. Interpolation is way through which images are enlarged. The nearest neighbor interpolation used forward wavelet and enlarges the size of image which retains the image parameter. The nearest neighbor interpolation technique is fruit full for variety of noisy images. PSNR is key parameter for measurement of image quality throughout this text. The existing methods used the threshold technique for noise removal but our methods image quality is better as compared to the existing threshold technique.
Бесплатно

Image retrieval using hypergraph of visual concepts
Статья научная
Retrieving images similar to query image from a large image collection is a challenging task. Image retrieval is most useful in the image search engine to find images similar to the query image. Most of the existing graph based image retrieval methods capture only pair-wise similarity between images. The proposed work uses the hypergraph approach of the visual concepts. Each image can be represented by combination of the several visual concepts. Visual concept is the specific object or part of an image. There are several images in the database which can share multiple visual concepts. To capture such a relationship between group of images hypergraph is used. In proposed work, each image is considered as a vertex and each visual concept as a hyperedge in a hypergraph. All the images sharing same visual concept, form a hyperedge. Images in the dataset are represented using hypergraph. For each query image visual concept is identified. Similarity between query image and database image is identified. According to these similarities association scores are assigned to images, which will handle the image retrieval.
Бесплатно

Immune-Inspired Self-Protection Model for Securing Grid
Статья научная
The application of human immunology in solving security problems in Grid Computing seems to be a thought-provoking research area. Grid involves large number of dynamic heterogeneous resources. Manually managing the security for such dynamic system is always fault prone. This paper presents the simple immune based model for self-protection (SIMS) of grid environment from various attacks like DoS, DDoS, Probing, etc. Like human body helps to identify and respond to harmful pathogens that it doesn't recognize as "self", in the same manner SIMS incorporates the immunological concepts and principles for safeguarding the grid from various security breaches.
Бесплатно

Impact of Collaborative ALM on Software Project Management
Статья научная
To produce a release of software, ALM is a key for streaming the team’s ability. ALM consists of the core disciplines of requirements definition and its management, asset management, development, build creation, testing, and release that are all planned by project management and orchestrated by using some form of process [1]. The assets and their relationships are stored by the development team repository. Detailed reports and charts provide visibility into team’s progress. In this paper we will describe how the ALM involves software development activities and assets coordination for the production and management of software applications throughout their entire life cycle.
Бесплатно

Impact of IS Strategy and Technological Innovation Strategic Alignment on Firm Performance
Статья научная
The alignment between information systems strategy and business strategy as an important driver of competitiveness has predominantly been assessed through quantitative methods without exploring in detail factors that influence strategic alignment and their implications for perceived business performance. Most IS-business strategic alignment studies dominantly focus on entire business and IS strategies resulting in many findings that are too general and inconclusive. This study aims at assessing strategic alignment factors, their interrelationships, and how they influence the IS-business alignment and its consequential effect on the performance of six universal banks in Ghana. The study followed the systematic procedure of grounded theory design and adopted qualitative dominant crossover mixed analysis. The findings of the study indicate strategic alignment between information systems strategy and technological innovation impacts positively on the performance of a firm where IT utilization complements resources and capabilities.
Бесплатно

Impact of Internet of Things (IoT) as Persuasive Technology
Статья научная
The Internet of Things (IoT) adds a new dimension to how people and things can communicate and collaborate. Society and the Internet are now being interconnected tightly and purposely. The research aims to analyze how IoT as a persuasive technology can affect human behavior and increase the awareness and effectiveness of IoT products among users. How will the Internet of Things infrastructure facilitate humans to change their attitudes and behaviors towards specific routine work? Our objective is to analyze which factors influence the acceptance and rejection of particular behaviors and the core motivators that persuade people to do something or to avoid something. We aim to determine whether IoT will facilitate humans to change their focused behaviors or not. Because of the rapid convergence of digital and physical worlds and the advent of digital technology, the Internet and social media have opened up a new world of affordances, constraints, and information flows from a design perspective. This article discusses how digital architecture affects behavior and the ramifications for designers who want to influence behavior for social and environmental good. In this paper we aim to give a brief introduction to persuasive technology, especially as it pertains to human adoption of IoT technology. We discuss a number of current research opportunities in IoT gadgets and their adoptions [1]. Our results indicate that persuasive (IoT) infrastructure can be expected to achieve a change of driving behaviour among their adopters. Furthermore, attention should be paid to an appropriate selection and implementation of persuasive strategies.
Бесплатно

Impact of Throughput in Enhancing the Efficiency of Cognitive Radio Ad Hoc Network - A Study
Статья научная
Cognitive Radio Ad Hoc Networks (CRAHNs) constitute a viable solution to solve the current problems of inefficiency in the spectrum allocation, and to deploy highly reconfigurable and self-organizing wireless networks. Cognitive Radio (CR) devices are envisaged to utilize the spectrum in an opportunistic way by dynamically accessing different licensed portions of the spectrum. However the phenomena of channel fading and primary cum secondary interference in cognitive radio networks does not guarantee application demands to be achieved continuously over time. Availability of limited spectrum and the inadequate spectrum resource usage necessitates a new communication standard to utilize the existing wireless spectrum opportunistically. This paper discusses currently existing mechanism for providing better efficiency by utilizing cognitive network intelligence. The frequencies used are utilized to the maximum extent without any interference. This paper aims in comparing the techniques used for enhancing the throughput in CR.
Бесплатно

Impact of Variation in Pause Time and Network Load in AODV and AOMDV Protocols
Статья научная
A MANET is a collection of mobile nodes by wireless links forming a dynamic topology without any network infrastructure such as routers, servers, access points/cables or centralized administration. The communication within the network is facilitated through a protocol which discovers routes between nodes. The two major classifications of routing protocols are unipath and multipath. In this paper, the performance comparison of widely used on-demand unipath and multipath routing protocols such as AODV and AOMDV is carried out in terms of variation in pause time and network load under RWM in CBR Traffic. These protocols have been selected for simulation due to their edges over other protocols in various aspects.
Бесплатно

Impact of weighting factor on cosine similarity based avalanche forecasting model
Статья научная
Snow avalanche is an inevitable issue that is faced by mankind residing near the hilly and the mountainous regions. It is a natural disaster that is frequently observed in such terrains. Prediction of these avalanches is crucial for wellbeing of mankind. The concept of using cosine similarity with nearest neighbour is an innovative idea in nearest neighbour based avalanche forecasting model. The results of the model are encouraging, but a need for a mechanism that will provide additional preference to the significant parameters is observed. Present work focuses on the application of weighting factor to the nearest neighbour model with cosine similarity. Use of weighting factor helps in further tuning of the forecasting model. Selection of weighting factors for each parameter is accomplished by considering the effect of each parameter on the avalanche activity. The accuracy of the model is gauged using performance measures - Critical Success Index and Bias and by the changes reflected in the confusion matrix. An increase of 0.1978 and 0.4167 is observed in the values of Critical Success Index after the application of the weights to the forecasting model for dataset combination I and II respectively. The proposed work is implemented using the snow and meteorological data for the Bahang region of Himachal Pradesh, India.
Бесплатно

Статья научная
A computer vision-based automated fire detection and suppression system for manufacturing industries is presented in this paper. Automated fire suppression system plays a very significant role in Onsite Emergency System (OES) as it can prevent accidents and losses to the industry. A rule based generic collective model for fire pixel classification is proposed for a single camera with multiple fire suppression chemical control valves. Neuro-Fuzzy algorithm is used to identify the exact location of fire pixels in the image frame. Again the fuzzy logic is proposed to identify the valve to be controlled based on the area of the fire and intensity values of the fire pixels. The fuzzy output is given to supervisory control and data acquisition (SCADA) system to generate suitable analog values for the control valve operation based on fire characteristics. Results with both fire identification and suppression systems have been presented. The proposed method achieves up to 99% of accuracy in fire detection and automated suppression.
Бесплатно