Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1243

Systematic Review and Classification on Video Surveillance Systems

Systematic Review and Classification on Video Surveillance Systems

Fereshteh Falah Chamasemani, Lilly Suriani Affendey

Статья научная

Recently, various conferences and journals have published articles related to Video Surveillance Systems, indicating researchers’ attention. The goal of this review is to examine the latest works were published in journals, propose a new classification framework of video surveillance systems and investigate each aspect of this classification framework. This paper provides a comprehensive and systematic literature review of video surveillance systems from 2010-2011, extracted from six online digital libraries using article’s title and keyword. The proposed classification framework is expanded on the basis of architecture of video surveillance systems, which is composed of six layers: Concept and Foundation Layer, Network Infrastructure Layer, Processing Layer, Communication Layer, Application Layer, and User Interaction Layer. This review shows, although many publication and research focus on real-time aspect of the challenge, only few researches have investigated the deployment of extracted and retrieved information for forensic video surveillance.

Бесплатно

TSSR: A Proposed Tool for Secure Software Requirement Management

TSSR: A Proposed Tool for Secure Software Requirement Management

Mohammad Ubaidullah Bokhari, Shams Tabrez Siddiqui

Статья научная

This paper provides a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which have been discussed, we introduce a requirement management tool known as TSSR (Tool for Secure Software Requirement). This tool manages risk analysis, system requirements, security of the system and project, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the TSSR framework and its four components: Planner, Modeller, Prover and Documenter which will be helpful in interacting and managing requirements with arbitrary number of external tools for secure software development.

Бесплатно

Technology Adoption in Pakistani Banking Industry using UTAUT

Technology Adoption in Pakistani Banking Industry using UTAUT

M. Mustafa Khan, Waqas Mahmood

Статья научная

The success of any software product could be measured by its uses and adoption of that technology by the end-users. In this study, we investigate the factors on which bank user intents to adopt internet banking in Pakistan. A survey was conducted on Pakistani banking industry customers using the unified theory of acceptance and use of technology (UTAUT) model which explains the intention of bank users to use the banking systems. The four predictors of UTAUT which were facilitating conditions, social influence, effort expectancy and performance expectancy were significant in predicting the intention of bank users to adopt the banking systems. Finally, we discuss the results, restrictions, implications and future recommendations. The findings of the study may help to provide insights into a better approach to promote e-banking acceptance.

Бесплатно

Temporal Logics Specifications for Debit and Credit Transactions

Temporal Logics Specifications for Debit and Credit Transactions

Rafat M. Alshorman

Статья научная

Recently, with the emergence of mobile technology and mobile banking, debit and credit transactions have been the most common transactions that are widely spreading, using such technologies. In this research, we specify the concurrent debit and credit transactions in temporal logics such as CTL (Computational Tree Logic) and LTL (Linear-Time Temporal Logic). These specifications describe the infinite histories that may be produced by the iterations of such concurrent transactions infinitely many times. We represent the infinite histories as a model of temporal logics formulae. Then, model checkers, such as NuSMV or SPIN, can carry out exhaustive checks of the correctness of the concurrent debit and credit transactions. Moreover, in this paper, we presume that the serializability condition is too strict. Therefore, a relaxed condition has been suggested to keep the database consistent. Moreover, the relaxed condition is easier to encode into temporal logics formulae.

Бесплатно

Text extraction from natural scene images using OpenCV and CNN

Text extraction from natural scene images using OpenCV and CNN

Vaibhav Goel, Vaibhav Kumar, Amandeep Singh Jaggi, Preeti Nagrath

Статья научная

The influence of exponentially increasing camera-embedded smartphones all around the world has magnified the importance of computer vision tasks, and gives rise to a vast number of opportunities in the field. One of the major research areas in this field is the extraction of text embedded in natural scene images. Natural scene images are the images taken from a camera, where the background is random, and the variety of colors used in the image may be diverse. When text is present in such type of images, it is usually difficult for a machine to detect and extract this text due to a number of parameters. This paper presents a technique that uses a combination of the Open Source Computer Vision Library (OpenCV) and the Convolutional Neural Networks (CNN), to extract English text from images efficiently. The CNN model is based on a two-stage pipeline that uses a single neural network to directly detect the characters in the scene images. It eliminates the unnecessary intermediate steps that are present in the previous approaches to this task making them slower and inaccurate, thereby improving the time complexity and the performance of the algorithm.

Бесплатно

Text summarization system using Myanmar verb frame resources

Text summarization system using Myanmar verb frame resources

May Thu Naing, Aye Thida

Статья научная

In today’s era, when the size of information and data is increasing exponentially, there is an upcoming need to create a concise version of the information available. Until now, humans have tried to create “summaries” of the documents. Especially, Myanmar Natural Language Processing does not have computerized text summarization. Therefore, this paper presents a summary generation system that will accept a single document as input in Myanmar. In addition, this work presents analysis on the influence of the semantic roles in summary generation. The proposed text summarization system involves three steps: first, the sentences are parsed using Part of Speech tagger with Myanmar Language Tool Knowledge Resource (ML2KR); secondly, pronouns in the original text are resolved using Myanmar Pronoun Resolution Algorithm (MPAR); thirdly, the sentences are labeled with semantic roles using Myanmar Verb Frame Resource (MVF), finally, extraction of the sentences containing specific semantic roles for the most relevant entities in text. After that, the system abstracts the important information in fewer words from extraction summary from single documents.

Бесплатно

The Choice of the Best Proposal in Tendering with AHP Method: Case of Procurement of IT Master Plan's Realization

The Choice of the Best Proposal in Tendering with AHP Method: Case of Procurement of IT Master Plan's Realization

Amadou Diabagaté, Abdellah Azmani, Mohamed El Harzli

Статья научная

The computer system has become one of the centerpieces in the functioning of organizations hence the importance of an IT (Information Technology) master plan to manage its development. To find a provider for the IT master plan's realization, organizations are increasingly using tendering as the mode of awarding contracts. This article focuses on the use of multi-criteria decision-making method AHP for analysis and evaluation of tenders during the awarding of contracts of IT master plan's realization. To achieve this goal, a painstaking work was realized, on the one hand, for making an inventory of criteria and sub-criteria involved in the evaluation of bids and on the other hand for specifying the degrees of preference for each pair of criteria and each pair of sub-criteria. Finally, a test was performed by using fictitious tenders. The goals of this work are to make available to members of tenders committee a decision support tool for evaluating tenders of IT master plan's realization submitted by bidders and endow the organizations with effective IT master plans in order to increase the performance of their information systems.

Бесплатно

The Control and Modeling of Diesel Generator Set in Electric Propulsion Ship

The Control and Modeling of Diesel Generator Set in Electric Propulsion Ship

Le Luo, Lan Gao, Hehe Fu

Статья научная

This paper analyzes the characteristics of power system on electric propulsion ship. The mathematical model and simulation model of diesel engine PID speed control system and synchronous generator’s AVR+PSS excitation control system was built. At last the simulation test of suddenly add load was did in MATLAB/simulink environment. The result shows that the speed control and excitation control system has well stability, rapidity and some robustness.

Бесплатно

The Development and Implementation of a Loan Classification Database System

The Development and Implementation of a Loan Classification Database System

Eludire A. A.

Статья научная

This work documents the development and implementation of a commercial bank's loan classification database system. It employed multiple discriminant analysis models to assess the relationship between relevant loan variables and existing bad loan problem. It also made use of mathematical model to replicate the Examiner's classification process to classify loans in a more objective and sober way. Classification of loan is grouping of loans in accordance to their likelihood of ultimate recovery from borrowers. Banking business is one of the most highly levered businesses especially on loan accounts. It is likely to collapse in case of a slight deterioration in quality of loans. Six important factors (propriety of use of funds borrowed; operation of Borrower's overdraft account; cooperation with the Bank, collateral and number of days the loan is past due) were identified and grouped as variables in determining the quality of loan portfolio. The developed classification model shows that there exists a linear relation between loan classification and the six variables considered. Four classification functions were developed and implemented in Microsoft Access database to assist in effective classification. The implementation of a database system makes it easy to store relevant classification information and revert to them whenever needed for comparative analysis on quarterly, half-yearly and annual basis.

Бесплатно

The Extensive Bit-level Encryption System (EBES)

The Extensive Bit-level Encryption System (EBES)

Satyaki Roy

Статья научная

In the present work, the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism has been introduced. It is a symmetric key cryptographic technique that combines advanced randomization of bits and serial bitwise feedback generation modules. After repeated testing with a variety of test inputs, frequency analysis, it would be safe to conclude that the algorithm is free from standard cryptographic attacks. It can effectively encrypt short messages and passwords.

Бесплатно

The Image Recognition of Mobile Robot Based on CIE Lab Space

The Image Recognition of Mobile Robot Based on CIE Lab Space

Xuan Zou, Bin Ge

Статья научная

The image recognition of mobile robot is to extract the effective target information. The essence of image extraction is image segmentation. By extracting and distinguishing planar objects and three-dimensional objects, we propose two new algorithms. The color image is extracted by using CIE Lab Space. Then we propose a comparison method through the collection of two image samples. According to the principle of geometric distortion in the geometric space, we can easily distinguish the planar object in the environment. Therefore, Experimental results show that the combination of these two methods is accurate and fast in the color image recognition.

Бесплатно

The Impact of Financial Statement Integration in Machine Learning for Stock Price Prediction

The Impact of Financial Statement Integration in Machine Learning for Stock Price Prediction

Febrian Wahyu Christanto, Victor Gayuh Utomo, Rastri Prathivi, Christine Dewi

Статья научная

In the capital market, there are two methods used by investors to make stock price predictions, namely fundamental analysis, and technical analysis. In computer science, it is possible to make prediction, including stock price prediction, use Machine Learning (ML). While there is research result that said both fundamental and technical parameter should give an optimum prediction there is lack of confirmation in Machine Learning to this result. This research conducts experi-ment using Support Vector Regression (SVR) and Support Vector Machine (SVM) as ML method to predict stock price. Further, the result is compared between 3 groups of parameters, technical only (TEC), financial statement only (FIN) and combination of both (COM). Our experimental results show that integrating financial statements has a neutral impact on SVR predictions but a positive impact on SVM predictions and the accuracy value of the model in this research reached 83%.

Бесплатно

The Implementation of Clinical Decision Support System: A Case Study in Saudi Arabia

The Implementation of Clinical Decision Support System: A Case Study in Saudi Arabia

Sahar S. Alqahtani, Sabah Alshahri, Ahood I. Almaleh, Farrukh Nadeem

Статья научная

In recent years, the healthcare sector has shown inclination towards restructuring of healthcare systems to harmonize with technological innovations and adopting decision support system in routine clinical practices. The objective of this paper is to summarize challenges of Clinical Decision Support System (CDSS) and focus on the effectiveness of CDSS to improve clinical practice. This paper also describes the experience of CDSS in healthcare sector in Saudi Arabia and addresses the requirements for implementing successful CDSS with a real example. This study concludes that healthcare sector is in dire need to increase quality of patients' care and improve clinical practices by adopting CDSS.

Бесплатно

The Leading Role of Digital Technologies in the Development of the Smart City Concept in Azerbaijan

The Leading Role of Digital Technologies in the Development of the Smart City Concept in Azerbaijan

Arzu Huseynova, Ophelya Mazanova

Статья научная

The article describes the application of the Smart City concept and the economic opportunities it creates, infrastructure and services, and opportunities to improve governance. The main features of the Smart City concept, development directions and evolution, standards and solutions, and factors and obstacles to its implementation have been analyzed by the author. The experience of different countries in the application of digital technologies is discussed. The article provides the scope and structure of the "smart" market, application stages, and scenarios The international experience in this direction was widely analyzed and examples were shown. The article talks about smart cities, the construction of which has already begun in Azerbaijan. The application of the smart city concept in Azerbaijan has been studied. It is stressed that the spread of digital technologies for the construction of a smart city in Azerbaijan is a prerequisite. The Network Readiness Index (NRI) identifies the indicators that are holding back Azerbaijan in the ranking for 2021.

Бесплатно

The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures

The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures

Devesh Pratap Singh

Статья научная

Many optical packet switch (OPS) architectures are proposed and demonstrated. In the design of these architectures, most of the attention is paid on the network layer parameters like high through put (low packet loss probability) and low latency, etc. and to achieve these goals. The structure of the architectures becomes very complex. In real scenarios, these architectures may not work efficiently because of physical layer constraints. Hence, cross layer optimization needs to be considered. This paper addresses the major physical layer constraints, and it has been found that the optical packet switch architecture can work efficiently within the bounded regimes which can be called as an operation window.

Бесплатно

The Novel Life Cycle Model for Component Based Software System Based on Architecture Quality Using KCW Framework

The Novel Life Cycle Model for Component Based Software System Based on Architecture Quality Using KCW Framework

S. Kaliraj, N. Premkumar, A. Bharathi

Статья научная

With the growing size of software’s and increasing needs of people we need a complex software system to provide a solution to the many problems among the humans. For that, we need to develop the software system with high quality and limited amount of time. Due to this reason, the software development process is moved to the component based software development (CBSD). The preliminary life cycle models of software development is not compatible with component based software development. For that we need a novel life cycle model to develop the software system using components with high quality. Some of the life cycle models are developed by some researchers, but when we are considering the quality of the software system those models are not assured the highest quality. Because of this we have developed one novel life cycle model based on v-model using KCW framework which assures the quality of the architecture of a software system itself.

Бесплатно

The Obstacles in Big Data Process

The Obstacles in Big Data Process

Rasim M. Alguliyev, Rena T. Gasimova, Rahim N. Abbaslı

Статья научная

The increasing amount of data and a need to analyze the given data in a timely manner for multiple purposes has created a serious barrier in the big data analysis process. This article describes the challenges that big data creates at each step of the big data analysis process. These problems include typical analytical problems as well as the most uncommon challenges that are futuristic for the big data only. The article breaks down problems for each step of the big data analysis process and discusses these problems separately at each stage. It also offers some simplistic ways to solve these problems.

Бесплатно

The Probabilistic Method for Solving Minimum Vertex Cover Problem Using Systems of Non-linear Equations

The Probabilistic Method for Solving Minimum Vertex Cover Problem Using Systems of Non-linear Equations

Listrovoy Sergey Vladimirovich, Motsnyi Stanislav Vladimirovich

Статья научная

In this paper the probabilistic method is presented for solving the minimum vertex cover problem using systems of non-linear equations that are formed on the basis of a neighborhood relationship of a particular vertex of a given graph. The minimum vertex cover problem is one of the classic mathematical optimization problems that have been shown to be NP-hard. It has a lot of real-world applications in different fields of science and technology. This study finds solutions to this problem by means of the two basic procedures. In the first procedure three probabilistic pairs of variables according to the maximum vertex degree are formed and processed accordingly. The second procedure checks a given graph for the presence of the leaf vertices. Special software package to check the validity of these procedures was written. The experiment results show that our method has significantly better time complexity and much smaller frequency of the approximation errors in comparison with one of the most currently efficient algorithms.

Бесплатно

The Proposal of Scaling the Roles in Scrum of Scrums for Distributed Large Projects

The Proposal of Scaling the Roles in Scrum of Scrums for Distributed Large Projects

Abeer M. AlMutairi, M. Rizwan Jameel Qureshi

Статья научная

Scrum of scrums is an approach used to scale the traditional Scrum methodology to fit for the development of complex and large projects. However, scaling the roles of scrum members brought new challenges especially in distributed and large software projects. This paper describes in details the roles of each scrum member in scrum of scrum to propose a solution to use a dedicated product owner for a team and inclusion of sub-backlog. The main goal of the proposed solution is to optimize the role of product owner for distributed large projects. The proposed changes will increase cohesiveness among scrum teams and it will also eliminate duplication of work. Survey is used as a research design to evaluate the proposed solution. The results are found encouraging supporting the proposed solution. It is anticipated that the proposed solution will help the software companies to scale Scrum methodology effectively for large and complex software projects.

Бесплатно

The SEIQR–V model: on a more accurate analytical characterization of malicious threat defense

The SEIQR–V model: on a more accurate analytical characterization of malicious threat defense

ChukwuNonso H. Nwokoye, Ikechukwu I. Umeh

Статья научная

Epidemic models have been used in recent times to model the dynamics of malicious codes in wireless sensor network (WSN). This is due to its open nature which provides an easy target for malware attacks aimed at disrupting the activities of the network or at worse, causing total failure of the network. The Susceptible-Exposed-Infectious-Quarantined-Recovered–Susceptible with a Vaccination compartment (SEIQR-V) model by Mishra and Tyagi is one of such models that characterize worm dynamics in WSN. However, a critical analysis of this model and WSN epidemic literature shows that it is absent essential factors such as communication range and distribution density. Therefore, we modify the SEIQR-V model to include these factors and to generate better reproduction ratios for the introduction of an infectious sensor into a susceptible sensor population. The symbolic solutions of the equilibriums were derived for two topological expressions culled from WSN literature. A suitable numerical method was used to solve, simulate and validate the modified model. Simulation results show the effect of our modifications.

Бесплатно

Журнал