International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1211

Measurement Based Admission Control Methods in IP Networks
Статья научная
Trends in telecommunications show that customers require still more and more bandwidth. If the telecommunication operators want to be successful, they must invest a lot of money to their infrastructure and they must ensure required quality of service. The telecommunication operators would devote to development in this area. The article deals with quality of service in IP networks. Problems of quality of service can be solved through admission control methods based on measurements. These admission control methods take care of control of incoming traffic load. New flow can be accepted only if needed quality of service is ensured for it and without quality of service breach causing of already accepted flows. In the article were made description of simulations and results of simulations for Voice over IP, constant bit rate and video sources. Simulations were realized in Network simulator 2 environment. These simulations were evaluated on the base of some parameters such as: estimated bandwidth, utilization and loss rate.
Бесплатно

Measurement of Usability of Office Application Using a Fuzzy Multi-Criteria Technique
Статья научная
Software Quality is very important aspect for any software development company. Software quality measurement is also a major concern for improving the software applications in software development processes in these companies. The quantification of various quality factors and integrate them into various software quality models is very important to analyze the quality of software system. Software usability is one of the important quality factors now days due to the increasing demand of interactive and user friendly software systems. In this paper, an attempt has been made to quantifying the usability of Ms-Excel 2007 and Ms-Excel 2010 application software using ISO/IEC 9126 model and compare the numeric value of usability for both version of Ms-Excel 2007 and Ms-Excel 2010. Due to the random nature of the usability attributes, the fuzzy multi criteria decision technique has been used to evolve the usability of the software office application. The present method will be helpful to analyze and enhance the quality of interactive software system.
Бесплатно

Measuring Complexity, Development Time and Understandability of a Program: A Cognitive Approach
Статья научная
One of the central problems in software engineering is the inherent complexity. Since software is the result of human creative activity and cognitive informatics plays an important role in understanding its fundamental characteristics. This paper models one of the fundamental characteristics of software complexity by examining the cognitive weights of basic software control structures. Cognitive weights are the degree of the difficulty or relative time and effort required for comprehending a given piece of software, which satisfy the definition of complexity. Based on this approach a new concept of New Weighted Method Complexity (NWMC) of software is developed. Twenty programs are distributed among 5 PG students and development time is noted of all of them and mean is considered as the actual time needed time to develop the programs and Understandability (UA) is also measured of all the programs means how much time needed to understand the code. This paper considers Jingqiu Shao et al Cognitive Functional Size (CFS) of software for study. In order to validate the new complexity metrics we have calculated the correlation between proposed metric and CFS with respect to actual development time and performed analysis of NWMC with CFS with Mean Relative Error (MRE) and Standard Deviation (Std.). Finally, the authors found that the accuracy to estimate the development time with proposed measure is far better than CFS.
Бесплатно

Measuring the information security maturity of enterprises under uncertainty using fuzzy AHP
Статья научная
Generally, measuring the Information Security maturity(ISM) is the first step to build a new knowledge information security management system in an organization. Knowing the ISM level helps organizations decide the type of protection strategies and policies will be taken and their priorities to strengthen their competitive ability. One of the possible ways to solve the problem is a using multiple criteria decision-making (MCDM) methodology. Analytic hierarchy process (AHP) is one of the most commonly used MCDM methods, which combines subjective and personal preferences in the information security assessment process. However, the AHP involves human subjectivity, which introduces vagueness type of uncertainty and requires the use of decision-making under those uncertainties. In this paper, the IS maturity is based on hierarchical multilevel information security gap analysis model for ISO 27001:2013 security standard. The concept of fuzzy set is applied to Analytic Hierarchical Process (AHP) to propose a model for measuring organizations IS maturity under uncertain environment. Using fuzzy AHP approach helps determine more efficiently importance weights of factors and indicators, especially deal with imprecise and uncertain expert comparison judgments. A case study is used to illustrate the better new method for IS evaluation.
Бесплатно

Medevice: a mobile – based diagnosis of common human illnesses using neuro – fuzzy expert system
Статья научная
Fever is a sign that the body is trying to fight infection. It is usually accompanied by various sicknesses or symptoms that signal another illness or disease. Diagnosing it ahead of time is essential because it has to do with human life and to determine what to do to get well. MeDevice is a mobile-based application that runs in Android devices that allows the user to enter the levels of his/her symptoms and diagnoses the disease either as influenza, dengue, chicken pox, malaria, typhoid fever, measles, Hepatitis A and pneumonia together with its details and its first aid treatment. It aims at providing an efficient decision support platform to aid people with fever in diagnosing their disease and whether or not to seek medical attention especially in developing countries like the Philippines. This application is engineered with the knowledge base and the inference method of fuzzy logic and expert system with the help of Gradient Descent optimization algorithm and back propagation neural network to achieve the optimum value of the error rate. This is essential to provide the application with a high accuracy rate which shows during the conduct of testing of the application.
Бесплатно

Medical image encryption using chaotic map improved advanced encryption standard
Статья научная
Under the Digital Image and Communication in Medicine (DICOM) standard, the Advanced Encryption Standard (AES) is used to encrypt medical image pixel data. This highly sensitive data needs to be transmitted securely over networks to prevent data modification. Therefore, there is ongoing research into how well encryption algorithms perform on medical images and whether they can be improved. In this paper, we have developed an algorithm using a chaotic map combined with AES and tested it against AES in its standard form. This comparison allowed us to analyse how the chaotic map affected the encryption quality. The developed algorithm, CAT-AES, iterates through Arnold’s cat map before encryption a certain number of times whereas, the standard AES encryption does not. Both algorithms were tested on two sets of 16-bit DICOM images: 20 brain MRI and 26 breast cancer MRI scans, using correlation coefficient and histogram uniformity for evaluation. The results showed improvements in the encryption quality. When encrypting the images with CAT-AES, the histograms were more uniform, and the absolute correlation coefficient was closer to zero for the majority of images tested on.
Бесплатно

Статья научная
We model the dynamic of malaria transmission taking into account climatic factors and the migration between Douala and Yaounde´, Yaounde´ and Ngaounde´re´, three cities of Cameroon country. We show how variations of climatic factors such as temperature and relative humidity affect the malaria spread. We propose a meta-population model of the dynamic transmission of malaria that evolves in space and time and that takes into account temperature and relative humidity and the migration between Douala and Yaounde´, Yaounde´ and Ngaounde´re´. More, we integrate the variation of environmental factors as events also called mathematical impulsion that can disrupt the model evolution at any time. Our modelling has been done using the Discrete EVents System Specification (DEVS) formalism. Our implementation has been done on Virtual Laboratory Environment (VLE) that uses DEVS formalism and abstract simulators for coupling models by integrating the concept of DEVS.
Бесплатно

Metal Artifact Reduction from Computed Tomography (CT) Images using Directional Restoration Filter
Статья научная
Computed tomography angiography (CTA) is a stabilized tool for vessel imaging in the medical image processing field. High-intense structures in the contrast image can seriously hamper luminal visualization. Metal artifacts are an extensive problem in computed tomography (CT) images. We proposed directional restoration filtering process with Fuzzy logic in order to reduce metal artifact from CT images. We create two sets by iteration process and these sets will be sorted in ascending order. After sorting we take two elements from two data sets and the tracking both elements will be selected from the second position of those sorting arrays. Intersection Fuzzy logic will be executed between two selected elements and Gaussian convolution operation will be performed in the entire images because of enhancement the artifact affected CT images. In this paper, we investigated a fully automated intensity-based filter and it depends on the gray level variation rating. This results in a better visualization of the vessel lumen, also of the smaller vessels, allowing a faster and more accurate inspection of the whole vascular structures.
Бесплатно

Method for Object Motion Characteristic Estimation Based on Wavelet Multi-Resolution Analysis: MRA
Статья научная
Method for object motion characteristic estimation based on wavelet Multi-Resolution Analysis: MRA is proposed. With moving pictures, the motion characteristics, direction of translation, roll/pitch/yaw rotations can be estimated by MRA with an appropriate support length of the base function of wavelet. Through simulation study, method for determination of the appropriate support length of Daubechies base function is clarified. Also it is found that the proposed method for object motion characteristics estimation is validated.
Бесплатно

Mimicking Nature: Analysis of Dragonfly Pursuit Strategies Using LSTM and Kalman Filter
Статья научная
Pursuing prey by a predator is a natural phenomenon. This is an event when a predator targets and chases prey for consuming. The motive of a predator is to catch its prey whereas the motive of a prey is to escape from the predator. Earth has many predator species with different pursuing strategies. Some of them are sneaky again some of them are bolt. But their chases fail every time. A successful hunt depends on the strategy of pursuing one. Among all the predators, the Dragonflies, also known as natural drones, are considered the best predators because of their higher rate of successful hunting. If their strategy of pursuing a prey can be extracted for analysis and make an algorithm to apply on Unmanned arial vehicles, the success rate will be increased, and it will be more efficient than that of a dragonfly. We examine the pursuing strategy of a dragonfly using LSTM to predict the speed and distance between predator and prey. Also, The Kalman filter has been used to trace the trajectory of both Predator and Prey. We found that dragonflies follow distance maintenance strategy to pursue prey and try to keep its velocity constant to maintain the safe (mean) distance. This study can lead researchers to enhance the new and exciting algorithm which can be applied on Unmanned arial vehicles (UAV).
Бесплатно

Minimax Estimation of the Parameter of Exponential Distribution based on Record Values
Статья научная
Bayes estimators of the parameter of exponential distribution are obtained with non-informative quasi-prior distribution based on record values under three loss functions. These functions are weighted squared error loss, square log error loss and entropy loss functions. Finally the minimax estimators of the parameter are obtained by using Lehmann’s theorem. Comparisons in terms of risks with the estimators of parameter under three loss functions are also studied.
Бесплатно

Minimizing Power Consumption by Personal Computers: A Technical Survey
Статья научная
Recently, the demand of “Green Computing”, which represents an environmentally responsible way of reducing power consumption, and involves various environmental issues such as waste management and greenhouse gases is increasing explosively. We have laid great emphasis on the need to minimize power consumption and heat dissipation by computer systems, as well as the requirement for changing the current power scheme options in their operating systems (OS). In this paper, we have provided a comprehensive technical review of the existing, though challenging, work on minimizing power consumption by computer systems, by utilizing various approaches, and emphasized on the software approach by making use of dynamic power management as it is used by most of the OSs in their power scheme configurations, seeking a better understanding of the power management schemes and current issues, and future directions in this field. Herein, we review the various approaches and techniques, including hardware, software, the central processing unit (CPU) usage and algorithmic approaches for power economy. On the basis of analysis and observations, we found that this area still requires a lot of work, and needs to be focused towards some new intelligent approaches so that human inactivity periods for computer systems could be reduced intelligently.
Бесплатно

Статья научная
Feature extraction task are primarily about making sense of the discriminative features/patterns of facial information and extracting them. However, most real world face images are almost always intertwined with imaging modality problems of which illumination is a strong factor. The compensation of the illumination factor using various illumination compensation techniques has been of interest in literatures with few emphasis on the adverse effect of the techniques to the task of extracting the actual discriminative features of a sample image for recognition. In this paper, comparative analyses of illumination compensation techniques for extraction of meaningful features for recognition using a single feature extraction method is presented. More also, enhancing red, green, blue gamma encoding (rgbGE) in the log domain so as to address the separability problem within a person class that most techniques incur is proposed. From experiments using plastic surgery sample faces, it is evident that the effect illumination compensation techniques have on face images after pre-processing is highly significant to recognition accuracy.
Бесплатно

Mining Frequent Itemsets with Weights over Data Stream Using Inverted Matrix
Статья научная
In recent years, the mining research over data stream has been prominent as they can be applied in many alternative areas in the real worlds. In this paper, we have proposed an algorithm called MFIWDSIM for mining frequent itemsets with weights over a data stream using Inverted Matrix [10]. The main idea is moving data stream to an inverted matrix saved in the computer disks so that the algorithms can mine on it many times with different support thresholds as well as alternative minimum weights. Moreover, this inverted matrix can be accessed to mine in different times for user's requirements without recalculation. By analyzing and evaluating, the MFIWDSIM can be seen as the better algorithm compared to WSWFP-stream [9] for mining frequent itemsets with weights over data stream.
Бесплатно

Mining Maximal Quasi Regular Patterns in Weighted Dynamic Networks
Статья научная
Interactions appearing regularly in a network may be disturbed due to the presence of noise or random occurrence of events at some timestamps. Ignoring them may devoid us from having better understanding of the networks under consideration. Therefore, to solve this problem, researchers have attempted to find quasi/quasi-regular patterns in non-weighted dynamic networks. To the best of our knowledge, no work has been reported in mining such patterns in weighted dynamic networks. So, in this paper we present a novel method which mines maximal quasi regular patterns on structure (MQRPS) and maximal quasi regular patterns on weight (MQRPW) in weighted dynamic networks. Also, we have provided a relationship between MQRPW and MQRPS which facilitates in the running of the proposed method only once, even when both are required and thus leading to reduction in computation time. Further, the analysis of the patterns so obtained is done to gain a better insight into their nature using four parameters, viz. modularity, cliques, most commonly used centrality measures and intersection. Experiments on Enron-email and a synthetic dataset show that the proposed method with relationship and analysis is potentially useful to extract previously unknown vital information.
Бесплатно

Mining Sequential Patterns from mFUSP - Tree
Статья научная
Mining sequential patterns from sequence database has consequential responsibility in the data mining region as it can find the association from the ordered list of events. Mining methods that predicated on the pattern growth approach, such as PrefixSpan, are well-organized enough to denude the sequential patterns, but engendering a projection database for each pattern regards as bottleneck of these methods. Lin (2008) first commenced the concept of tree structure to sequential pattern mining, which is acknowledged as Fast updated sequential pattern tree (FUSP - tree). However, link information stored in each node of FUSP - tree structure increases the complication of this method due to its link updating process. In this paper, at first, we have proposed a modified fast updated sequential pattern tree (called a mFUSP - tree) arrangement for storing the complete set of sequences with just frequent items, their frequencies and their relations among items in the given sequence into a compact data structure; excluding this tree structure avoids storing link information along to the next node of the following branch in the tree that carries the same item. Afterward, we have established by a mining method that our mFUSP - tree structure is proficient enough to ascertain out the perfect set of frequent sequential patterns from sequence databases without generating any intermediate projected tree and without calling for repeated scanning of the original database during mining. Our experimental result proves that, the performance of our proposed mFUSP - tree mining approach is a lot more trustworthy than other existing algorithms like GSP, PrefixSpan and FUSP - tree based mining.
Бесплатно

Статья научная
This study presents the results of a content analysis of 2476 tweets posted by Hillary Clinton and Donald Trump during the 2016 presidential election following their official nomination by their respective political parties. The study sought to determine whether the candidates used a focused campaign strategy in their tweets, and whether the tweets revealed priorities based on their focus and the time of the day they were posted. The results show that Clinton posted more tweets, had a more focused campaign than Trump during the same time frame.
Бесплатно

Mining the Shirt Sizes for Indian Men by Clustered Classification
Статья научная
In garment production engineering, sizing system plays an important role for manufacturing of clothing. The standards for defining the size label are a critical issue. Locating the right garment size for a customer depends on the label as an interface. In this research work intend to approach that it could be used for developing sizing systems by data mining techniques applied to Indian anthropometric dataset. We propose a new approach of two-stage data mining procedure for labelling the shirt types exclusively for Indian men. In the first stage , clustering technique applied on the original dataset, to categorise the size labels. Then these clusters are used for supervised learning in the second stage for classification. A sizing system classifies a specific population into homogeneous subgroups based on some key body dimensions. The space with these dimensions gives raise to complexity for finding uniform standards. This enables us to have an interface as a communication tool among manufacturers, retailers and consumers. This sizing system is developed for the men’s age ranges between 25 and 66 years. Main attribute happens to be the chest size as clearly visible in the data set. We have obtained classifications for men’s shirt attributes based on clustering techniques.
Бесплатно

Mixed QoS Controlled Wireless Streaming Media Transmission Strategy
Статья научная
Streaming media applications is currently limited by high bandwidth requirements. It is a challenging problem to provide the required quality of service (QoS) for the efficient transmission of video data under the varying network conditions such as the time-varying packet loss and fluctuating bandwidth. On Internet the most important part for streaming media transmission application is QoS control mechanism which including two kinds of QoS control method, based on end to end and network. A wireless streaming media forward platform based on the mixed quality-of-service (QoS) control system is introduced in this paper. The theoretical knowledge related to the quality of service and mixed quality of service control of the feasibility and characteristics are analyzed, and introduced a comprehensive quality of service in theory. This system combines network control and end to end quality of service control. The network of the system is optimized to support quality of service, using the underlying network devices, network bandwidth optimization, network structure adapted to meet the both ends of the quality of service. At both ends, from the delay, jitter, etc. are adjusted, by the addition of the timestamp and other information on the dynamic adjustment of the speed of data transmission. Through improving the control of two ends QoS and media streaming forward server, the video streaming from ships on the sea is transferred to the Internet by microwave and then linked to common Internet and mobile phone users through carrier networks(wired and wireless), which realized the real time supervision.
Бесплатно

Mobile Computing Trends in Saudi Arabia: An Exploratory Study
Статья научная
The main purpose of this research was to gain an understanding of the adoption behavior of mobile computing in Saudi Arabia. In particular, it aimed to acquire new insight into mobile computing trends, specifically in Saudi Arabia, in order to develop hypotheses and formulate precise criteria for mobile computing evaluation. In order to achieve these aims, the researcher created a focus group by recruiting eight participants with solid background knowledge of usability engineering and mobile computing. The focus group proposed a four-phase process: determination, qualification, categorization and evaluation of the mobile computing applications developed by Saudi organizations. During the determination phase, two hundred and twenty seven (n=227) mobile applications were determined as having been developed by organizations in Saudi Arabia. During the qualification phase, one hundred and forty two (n=142) mobile applications were qualified. Within the categorization phase, the experts categorized only the qualified applications into a two-level categorization hierarchy. Finally, in the evaluation phase, the qualified applications were evaluated in terms of purpose, platform, visual appearance, content, organization and usability. The results herein revealed that 43% of the mobile applications in Saudi Arabia were M-Government applications, while 57% were M-Business applications. In addition, the study proposed a sample of thirty six (n=36) applications as having statistical significance from all of the mobile applications in Saudi Arabia.
Бесплатно