International Journal of Information Technology and Computer Science @ijitcs
Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1211

Performance Analysis of Most Common Encryption Algorithms on Different Web Browsers
Статья научная
The hacking is the greatest problem in the wireless local area network (WLAN). Many algorithms like DES, 3DES, AES,UMARAM, RC6 and UR5 have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user correctly. We have proposed a Web programming language to be analyzed with five Web browsers in term of their performances to process the encryption of the programming language’s script with the Web browsers. This is followed by conducting tests simulation in order to obtain the best encryption algorithm versus Web browser. The results of the experimental analysis are presented in the form of graphs. We finally conclude on the findings that different algorithms perform differently to different Web browsers like Internet Explorer, Mozilla Firefox, Opera and Netscape Navigator. Hence, we now determine which algorithm works best and most compatible with which Web browser. A comparison has been conducted for those encryption algorithms at different settings for each algorithm such as encryption/decryption speed in the different web Browsers. Experimental results are given to demonstrate the effectiveness of each algorithm.
Бесплатно

Performance Analysis of Resampling Techniques on Class Imbalance Issue in Software Defect Prediction
Статья научная
Predicting the defects at early stage of software development life cycle can improve the quality of end product at lower cost. Machine learning techniques have been proved to be an effective way for software defect prediction however an imbalance dataset of software defects is the main issue of lower and biased performance of classifiers. This issue can be resolved by applying the re-sampling methods on software defect dataset before the classification process. This research analyzes the performance of three widely used resampling techniques on class imbalance issue for software defect prediction. The resampling techniques include: “Random Under Sampling”, “Random Over Sampling” and “Synthetic Minority Oversampling Technique (SMOTE)”. For experiments, 12 publically available cleaned NASA MDP datasets are used with 10 widely used supervised machine learning classifiers. The performance is evaluated through various measures including: F-measure, Accuracy, MCC and ROC. According to results, most of the classifiers performed better with “Random Over Sampling” technique in many datasets.
Бесплатно

Performance Analysis of Software Effort Estimation Models Using Neural Networks
Статья научная
Software Effort estimation involves the estimation of effort required to develop software. Cost overrun, schedule overrun occur in the software development due to the wrong estimate made during the initial stage of software development. Proper estimation is very essential for successful completion of software development. Lot of estimation techniques available to estimate the effort in which neural network based estimation technique play a prominent role. Back propagation Network is the most widely used architecture. ELMAN neural network a recurrent type network can be used on par with Back propagation Network. For a good predictor system the difference between estimated effort and actual effort should be as low as possible. Data from historic project of NASA is used for training and testing. The experimental Results confirm that Back propagation algorithm is efficient than Elman neural network.
Бесплатно

Performance Analysis of Spatial Reused Bandwidth Reservation in Ad Hoc Networks
Статья научная
In this paper, an approach for spatial reused bandwidth reservation in ad hoc networks is proposed. Resource reservation in wireless networks is an essential component that is needed to support multimedia and real-time applications, such as audio/video conferencing. On the other hand, directional antenna technology provides the capability for considerable increase in spatial reuse, which increases the efficiency of communication. In our approach for spatial reused bandwidth reservation, the source node tries to discover multiple node-disjoint paths that are capable of satisfing the desired Quality of Service (QoS) requirement in ad hoc networks using directional antennas. The simulation result shows the performance of this spatial reused bandwidth reservation approach. There is a significant gain in the performance with a decrease in the number of paths, as well as an increase in the percentage of successfully received data packets and reservation success rate.
Бесплатно

Статья научная
The research activities in mobile computing and wireless networks strongly indicates that mobile computers and their wireless communication links will be an integral part of the current internet works. Communication over wireless links is characterised by limited bandwidth, high latency, high bit-error rates and temporary disconnections. Most often, networks with wireless links and mobile hosts incur significant losses due to handoff. It is also most important that in wireless environment TCP (transmission control protocol) causes degraded end-to-end performance. In this paper, we tried to give solutions to these problems. We adopt a new method to improve the end-to-end reliable transport performance in mobile wireless environment by incorporating changes to network-layer at the base station and mobile host and preserve end-to-end semantics of TCP. The methodology employs NDG (normalised delay gradient) loss-predictor function to determine congestion losses from that of transmission loss. The sender window can adjust its size depending on the loss information. If the loss is due to congestion, congestion control algorithm is invoked to decrease the flow rate. If the loss is due to handoff (transmission loss), immediate-recovery algorithm is invoked to recover the losses caused by the sender TCP. Stochastic equations are used to analyse, i) arrival rate handoff calls, ii) blocking probability of handoff request, iii) distinguish packet loss due to congestion or handoff, iv) dynamics of sender window, v) queue length at the ingress point of the BS router , vi) throughput, and vii) the losses due to congestion and handoff blocking. Our results provide better way understanding the problem of calls drop due to handoff, and providing most accurate solutions for mobile wireless system.
Бесплатно

Performance Analysis on Throughput in 4G Network in Digital Environment with SISO Technique
Статья научная
The development of the 4G or the Long Term Evolution (LTE) is working at a very fast pace. The 4G system invention had very high prospective and goals compared to 3G. It was already thought that the system should be more competitive and secure based. Every wireless connection would be IP oriented. 4G is on its phase in improving the Quality of Service (QOS). This paper shows the comparison of the throughput delivered by the different modulation techniques which have been proposed to be used. Also comparison has been made with the different Extended Channel Models. Figures and graphs have been put forward to show the performance by the throughput delivered in digital environment and RF technology.
Бесплатно

Performance Comparison of Various Diversity Techniques using Matlab Simulation
Статья научная
Due to the time-varying nature of the wireless channel and presence of limited resources for the signal transmission, which faces various detrimental effects such as path-loss, delay spread, Doppler spread, shadowing and interference make it very difficult to achieve sufficient data rates. To combat the effect of multi-path fading in the wireless communication system, the diversity combining mechanism has been introduced. In this paper, we have developed an algorithm for the performance evaluation of various spatial diversity combing techniques by using Matlab simulation. The developed new algorithm combine all three diversity techniques such as maximal ratio combining (MRC), selection combining (SC) and equal gain combing (EGC) techniques The combined diversity techniques algorithm computes and compares the MRC, SC, and EGC combing techniques theoretically by using the Matlab simulation.
Бесплатно

Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols
Статья научная
Mobile ad hoc networks are type of wireless networks in which any kind of infrastructure is not used, i.e. there are no infrastructures such as routers or switches or anything else on the network that can be used to support the network structure and the nodes has mobility. The routing is particularly a challenging task in MANETs that selecting paths in a network along which to send network traffic. In this paper, the performance analysis is carried out on Ad-hoc On-demand Distance Vector (AODV), Limited Hop Count AODV (LHC-AODV), Optimized Link State Routing (OLSR), Unnecessary Loop OLSR (UL-OLSR) and Destination Sequenced Distance Vector (DSDV) protocols using NS2 simulator. The delay, throughput, and packet delivery ratio are the three common measures used for the comparison of the performance of above protocols.
Бесплатно

Performance Evaluation of Fake News Detection Models
Статья научная
The rapid spread of misinformation on social media platforms, especially Twitter, presents a challenge in the digital age. Traditional fact-checking struggles with the volume and speed of misinformation, while existing detection systems often focus solely on linguistic features, ignoring factors like source credibility, user interactions, and context. Current automated systems also lack the accuracy to differentiate between genuine and fake news, resulting in high rates of false positives and negatives. This study investigates the creation of a Twitter bot for detecting fake news using deep learning methodologies. The research assessed the performance of BERT, CNN, and Bi-LSTM models, along with an ensemble model combining their strengths. The TruthSeeker dataset was used for training and testing. The ensemble model leverages BERT's contextual understanding, CNN’s feature extraction, and Bi-LSTM’s sequence learning to improve detection accuracy. The Twitter bot integrates this ensemble model via the Twitter API for real-time detection of fake news. Results show the ensemble model significantly outperformed individual models and existing systems, achieving an accuracy of 98.24%, recall of 98.14%, precision of 98.42%, and an F1-score of 98.24%. These findings highlight that combining multiple models can offer an effective solution for real-time detection of misinformation, contributing to efforts to combat fake news on social media platforms.
Бесплатно

Performance Evaluation of I.T Project Management in Developing Countries
Статья научная
In recent past, IT industry has seen massive growth. However it is not much mature in developing countries, facing many challenges particularly in project management. As a result performance of IT industry is not up to the mark and unable to provide professional support as compared to internationally recognized standards to public and private sector organizations. There are many challenges such as shortage of skilled and experienced human resources and high employee turnover. Tough and competitive market condition requires the product to be extremely good in performance, timeline and accuracy. Effective project management and collaborative efforts of the Government and IT professionals can make highly successful market for IT projects. Success rate of private sector organizations is high as compared to public sector organizations in developing countries like Pakistan. In this research we have explored the performance of IT project management in public and private sector organizations of developing countries focusing Pakistan, to find out the reasons of project failure and success in both public and private sector organizations.
Бесплатно

Performance Evaluation of Index Schemes for Semantic Cache
Статья научная
In last decade of computing, a growing popularity for semantic cache schemes has been observed. Numerous techniques have been proposed for improved performance of semantic cache. Semantic cache is aimed towards reducing the network traffic load with the ability to address some queries without contacting the server. Semantic cache overcomes the limitations of previous page-caching and tuple-cache techniques. A prime concern of semantic cache includes query processing (query response-time) and cache management. The efficiency of semantic cache can be improved by using semantic indexing sachems. Semantic indexing sachems are segment based and hierarchical semantic indexing scheme. Both these sachems can improve the efficiency of query processing and cache management. In this paper, we have performed the evaluation of index schemes for Semantic Cache through the experimental study. Evaluations of these schemes are available in literature but experimental study is not available. Through this experiment, we have highlighted which technique is most suited in what kind of scenario.
Бесплатно

Статья научная
Nowadays, there are several models of computer systems finding their ways into various offices, houses, organizations as well as remote locations. Any slight malfunction of the computer system’s components could lead to loss of vital data and information. One of the sources of computer system malfunction is overheating of the electronic components. A common method of cooling a computer system is the use of cooling fan(s). Therefore, it is essential to have an appropriate control mechanism for the operation of computer system’s cooling fan in order to save energy, and prevent overheating. Failure to adopt a well designed and efficient performance controller could lead to the malfunction of a computer system. Presently, most controllers in computer systems are pulse width modulation based. That is, they make use of pulses in form of digits, 0 and 1. It was observed that inherent noise is still prevalent in the operation of computer system. Also, eventual breakdown of components is common. A new approach is therefore investigated through the use of fuzzy logic to serve as a base or platform to build an intelligent controller using a set of well defined rules to guide its operational performance. Mamdani-type fuzzy inference system and Sugeno-type fuzzy inference system were used with two input sets each and a single output function each. Simulation was carried out in MATLAB R2007a platform and operational performances of the two approaches were compared. Simulated results of the performances of the Mamdani-type fuzzy inference system based controller and the Sugeno-type fuzzy inference system based controller are presented accordingly.
Бесплатно

Performance Evaluation of Photovoltaic Models Based on a Solar Model Tester
Статья научная
The performances of 130 W (Solara PV) and 100 W (Sunworth PV) solar modules are evaluated using a single diode equivalent circuit. The equivalent circuit is able to simulate both the I–V and P–V characteristic curves, and is used to study the effect of the operating temperature, diode ideality factor, series resistance, and solar irradiance level on the model performance. The results of the PV characteristics curves are compared with the parameters from the manufacturing companies for each model. Afterwards, the Solara PV model is tested under different irradiance levels. The relationship between the model power versus its current under different irradiance levels is plotted, such that if the solar power meter (pyrheliometer) does not exist, the irradiance-current (G–I) curve can be used to measure solar radiation power without using the solar power meter. The measurement is achieved by moving the solar panel by a certain angle toward the solar radiation, and then measuring the corresponding current.
Бесплатно

Performance Evaluation of the Loop Buffer Switch Under Prioritized Traffic and Optical Regeneration
Статья научная
In this paper, an all-optical regenerator based, photonic packet switch architecture, which consists of the fiber loop for the storage of the contending packets, is considered. In the loop buffer, the available buffer space may not be fully utilized due to the limited re-circulation count of the data placed on buffer. This limit can be counteracted by placing a pool of regenerators inside the buffer. As optical regenerators are costly devices, hence they should be placed optimally in the buffer. The simulations results are presented by consider Prioritized and non – prioritized traffic. It is shown in the results that regeneration of data is essential if prioritized traffic has to be considered.
Бесплатно

Performance Evaluation of the Loop Buffer Switch under Prioritized Traffic
Статья научная
In this paper, optical loop buffer based architecture is discussed; with its advantages over other architectures. In general the performance of the switch is measured at physical and network layer. The physical layer analysis deals with power budget analysis, however, at the network layer; the performance is measured in terms of packet loss probability and average delay. To obtain more realistic performance at the network layer the QoS parameters need to be included. In this paper, a QoS parameter which is known as priority of the incoming packets is included and corresponding results are presented, and it has been found that even at the load of 0.7, packet loss probabilities on the order of 10-5 can be achieved.
Бесплатно

Performance Optimization in WBAN Using Hybrid BDT and SVM Classifier
Статья научная
Wireless Body Area Network has attracted significant research interest in various applications due to its self-automaton and advanced sensor technology. The most severe issue in WBAN is to sustain its Quality of Service (QoS) under the dynamic changing environment like healthcare, and patient monitoring system. Another critical issue in WBAN is heterogeneous packet handling in such resource-constrained network. In this paper, a new classifier having hybrid Binary Decision Tree and Support Vector Machine classifier is proposed to tackle these important challenges. The proposed hybrid classifier decomposes the N-class classification problem into N-1 sub-problems, each separating a pair of sub-classes. This protocol dynamically updates the priority of packet and node, adjusts data rate, packet transmission order and time, and resource distribution for the nodes based on node priority. The proposed protocol is implemented and simulated using NS-2 network simulator. The result generated for proposed approach shows that new protocol can outperform in a dynamic environment, and yields better performance by leveraging advantages of both the Binary Decision Tree in terms of efficient computation and Support Vector Machine for high classification accuracy. This hybrid classifier significantly reduces loss ratio and delay and increase packet delivery ratio and throughput.
Бесплатно

Performance analysis of LT codec architecture using different processor templates
Статья научная
Luby Transform (LT) code plays a vital role in binary erasure channel. This paper portrays the design techniques for implementation of LT codec using application specific instruction set processor (ASIP) design tools. In ASIP design, a common approach to increase the performance of processors is to boost the number of concurrent operations. Therefore, optimizations like strategy of input design, processor and compiler architecture are very useful phenomenon to enhance the performance of the application specific processor. Using Tensilica and OpenRISC processor design tools, this paper shows the response of LT codec architectures in terms of cycle counts and simulating time. Result shows that, the simulation speed of Tensilica is very high compared to the OpenRisc tool. Among different configurations of Tensilica tool, proposed ConnXD2 design took 1 M cycles per second and 135.66 ms to execute LT codec processor and XRC_D2MR configuration consumed only 9 iterations for successful decoding of LT encoded signal. Besides this, OpenRisc tool took 142K cycles and 6ms for executing LT encoder.
Бесплатно

Performance based Ranking Model for Cloud SaaS Services
Статья научная
Cloud computing systems provide virtualized resources that can be provisioned on demand basis. Enormous number of cloud providers are offering diverse number of services. The performance of these services is a critical factor for clients to determine the cloud provider that they will choose. However, determining a provider with efficient and effective services is a challenging task. There is a need for an efficient model that help clients to select the best provider based on the performance attributes and measurements. Cloud service ranking is a standard method used to perform this task. It is the process of arranging and classifying several cloud services within the cloud, then compute the relative ranking values of them based on the quality of service required by clients and the features of the cloud services. The objective of this study is to propose an enhanced performance based ranking model to help users choose the best service they need. The proposed model combines the attributes and measurements from cloud computing field and the well-defined and established software engineering field. SMICloud Toolkit has been used to test the applicability of the proposed model. The experimentation results of the proposed model were promising.
Бесплатно

Статья научная
Reusability is the quality of a piece of software, which enables it to be used again, be it partial, modified or complete. A wide range of modeling techniques have been proposed and applied for software quality predictions. Complexity and size metrics have been used to predict the number of defects in software components. Estimation of cost is important, during the process of software development. There are two main types of cost estimation approaches: algorithmic methods and non-algorithmic methods. In this work, using genetic programming which is a branch of evolutionary algorithms, a new algorithmic method is presented for software development cost estimation, using the implementation of this method; new formulas were obtained for software development cost estimation in which reusability of components is given priority. After evaluation of these formulas, the mean and standard deviation of the magnitude of relative error is better than related algorithmic methods such as COCOMO formulas.
Бесплатно

Performance of Frequency Domain DFE Using Subcarrier Allocation
Статья научная
Due to the usage of single carrier, the performance of SC-FDMA systems degrades in deep frequency selective fading channels. In this paper, we propose a structure of equalizer based on frequency domain decision feedback which could be used for multi-user SC-FDMA systems. This algorithm is applicable to various carrier allocations in multi-user systems such as localized allocation, distributed allocation, and frequency-hopping (FH) allocation. To reduce the complexity, it is not necessary to derive the inversion of matrix, which is required in the traditional decision feedback equalizer for single carrier frequency domain equalization (SC-FDE-DFE). Simulation results show that equalization has been achieved for FD-LE and FD-DFE with distribution mapping. This structure can be used in the broadcasting uplink channels with SC-FDMA scheme.
Бесплатно