Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1165

Various Approaches of Community Detection in Complex Networks: A Glance

Various Approaches of Community Detection in Complex Networks: A Glance

Abhay Mahajan, Maninder Kaur

Статья научная

Identifying strongly associated clusters in large complex networks has received an increased amount of interest since the past decade. The problem of community detection in complex networks is an NP complete problem that necessitates the clustering of a network into communities of compactly linked nodes in such a manner that the interconnection between the nodes is found to be denser than the intra-connection between the communities. In this paper, different approaches given by the authors in the field of community detection have been described with each methodology being classified according to algorithm type, along with the comparative analysis of these approaches on the basis of NMI and Modularity for four real world networks.

Бесплатно

Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies

Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies

Garba Suleiman, Ibrahim S. Shehu, Olumide S. Adewale, Muhammad B. Abdullahi, Solomon A. Adepoju

Статья научная

Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for committing criminal activities more than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The development of a vehicle theft alert and location identification system becomes more necessary for vehicle owners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM application developed and installed in a mobile phone device which is embedded in the vehicle to communicate with the vehicle owner's mobile phone. The communication is established via SMS (i.e. between the installed mobile phone device and that of the vehicle owner). The communications established include; (i). Sending an SMS alert from installed mobile phone device to vehicle owner mobile phone when the car ignition is put on. (ii). Sending an SMS from the vehicle owner's mobile phone to start and stop the installed mobile phone device application. The location identification function makes use of a web application developed to; (i). Determine the real time location of a vehicle by means of tracking using GPS. (ii). Broadcast missing or stolen vehicle information to social media and security agency. The implementation of the installed mobile phone device application was done using JAVA because of its capabilities in programming mobile applications while PHP and MySQL was used for the web application functions. Integration testing of the system was carried out using simple percentage calculation for the performance evaluation. Fifty seven (57) vehicle owners were sampled and questionnaires were distributed to them in order to ascertain the acceptability and workability of the developed system. The result obtained shows the effectiveness of the system and hence it can be used to effectively monitor vehicle as it is been driven within or outside its jurisdiction. More so, the system can be used as database of missing, identified or recovered vehicles by various security agencies.

Бесплатно

Verification of Generic Ubiquitous Middleware for Smart Home Using Coloured Petri Nets

Verification of Generic Ubiquitous Middleware for Smart Home Using Coloured Petri Nets

Madhusudanan. J, Anand. P, Hariharan. S, V. Prasanna Venkatesan

Статья научная

Smart home is a relatively new technology, where we applied pervasive computing in all the aspects, so as to make our jobs or things that we normally do in-side the home in a very easier way. Originally, a smart home technology was used to control environmental systems such as lighting and heating; but recently the use of smart technology has been developed so that almost any electrical component within the home can be included in the system. Usually in pervasive computing, a middleware is developed to provide interaction between the user and device. In previous, a middleware is only suitable for specific Smart Home architecture, that can’t be applicable to any other architecture but the Generic Ubiquitous Middleware is suitable for different Smart Home architecture. This paper proposes that any smart home can be built with single architecture and it is verified using a Coloured Petri Nets tool. We have given a verification model of various Smart home Environments.

Бесплатно

Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

Video Quality Analysis of Distributed Video Coding in Wireless Multimedia Sensor Networks

Mortaza Nikzad, Ali Bohlooli, Kamal Jamshidi

Статья научная

Multimedia communications in wireless sensor networks is a very challenging task. Video coding with high computational complexity and great contribution to the energy consumption of nodes and video transmission over erroneous wireless channel are the main reasons of these challenges. Distributed Video Coding has high potential for being deployed in these networks due to its unique features like as independent frame coding and low complexity encoding operations. The purpose of this study is to understand and evaluate the distributed video coding performance facing the transmission characteristics in wireless multimedia sensor networks. To this end, the comparative analysis of the coding in respect of main factors of video transmission (i.e., bit rate and error resiliency) in the Wireless Multimedia Sensor Networks (WMSN) has been done. We have used both the objective and subjective criteria for checking the video quality and applied the Gilbert-Elliot channel model for capturing the bit-level error in WMSN. Therefore, unlike previous works, our results are more realistic. In addition, based on this model we have investigated the impact of protection of frames by Reed-Solomon error control scheme. The results show that paying attention to coding parameters and protecting key frames, have a great impact on increasing the quality of the receiving video and will reduce the energy consumption and delays due to low number of requests from the feedback channel.

Бесплатно

Virtual Machine Monitor Indigenous Memory Reclamation Technique

Virtual Machine Monitor Indigenous Memory Reclamation Technique

Muhammad Shams Ul Haq, Lejian Liao, Ma Lerong

Статья научная

Sandboxing is a mechanism to monitor and control the execution of malicious or untrusted program. Memory overhead incurred by sandbox solutions is one of bottleneck for sandboxing most of applications in a system. Memory reclamation techniques proposed for traditional full virtualization do not suit sandbox environment due to lack of full scale guest operating system in sandbox. In this paper, we propose memory reclamation technique for sandboxed applications. The proposed technique indigenously works in virtual machine monitor layer without installing any driver in VMX non root mode and without new communication channel with host kernel. Proposed Page reclamation algorithm is a simple modified form of Least recently used page reclamation and Working set page reclamation algorithms. For efficiently collecting working set of application, we use a hardware virtualization extension, page Modification logging introduced by Intel. We implemented proposed technique with one of open source sandboxes to show effectiveness of proposed memory reclamation method. Experimental results show that proposed technique successfully reclaim up to 11% memory from sandboxed applications with negligible CPU overheads.

Бесплатно

VisiMark1_0: An Assistance Tool for Evaluating Robustness of Video Watermarking Algorithms

VisiMark1_0: An Assistance Tool for Evaluating Robustness of Video Watermarking Algorithms

Neeta Deshpande, Mahesh Sanghavi, Archana Rajurkar, Ramchandra Manthalkar

Статья научная

The paper proposes a tool, VisiMark1_0, as assistance for evaluating the robustness of video watermarking algorithms as evaluation of a video watermarking algorithm for robustness with available tools is a tedious task. It is our belief that for researchers of robust video watermarking, a tool needs to be designed that will assist in the evaluation procedure irrespective of the design algorithm. This tool provides a test bed of various attacks. The input to this tool will be a watermarked video whereas the outputs will be attacked videos, evaluated parameters PSNR, MSE, MSAD and DELTA, graphical comparisons of the attacked and watermarked videos with all parameters needed by researchers, and the attacks report. Provision for comparison of any two videos is an additional facility provided in the tool. The attacks implemented in VisiMark1_0 are categorized mainly in three. Firstly, Video attacks: Frame dropping, Frame averaging, Frame swapping, Changing the sequence of the scenes, Changing Frame rate, Fade and dissolve, Contrast stretching, Motion blurring, Chroma sampling, Inter frame averaging are some of the novel offerings in video frame attacks category. Secondly, Geometrical attacks: Apart from the traditional Rotation, Scaling and Cropping attacks for images, VisiMark1_0 contributed towards Sharpening, Shearing, Flipping, Up/down sampling and Dithering attacks for a video and signal processing attacks like Conventional Noising, Denoising and Filtering attacks for images are incorporated for video along with Pixel removal attack as a novel contribution. VisiMark1_0 is an endeavor to design a tool for evaluating a raw video (an .avi file currently) incorporating various attacks having a prospect for numerous video formats in near future.

Бесплатно

Visualization & Prediction of COVID-19 Future Outbreak by Using Machine Learning

Visualization & Prediction of COVID-19 Future Outbreak by Using Machine Learning

Ahmed Hassan Mohammed Hassan, Arfan Ali Mohammed Qasem, Walaa Faisal Mohammed Abdalla, Omer H. Elhassan

Статья научная

Day by day, the accumulative incidence of COVID-19 is rapidly increasing. After the spread of the Corona epidemic and the death of more than a million people around the world countries, scientists and researchers have tended to conduct research and take advantage of modern technologies to learn machine to help the world to get rid of the Coronavirus (COVID-19) epidemic. To track and predict the disease Machine Learning (ML) can be deployed very effectively. ML techniques have been anticipated in areas that need to identify dangerous negative factors and define their priorities. The significance of a proposed system is to find the predict the number of people infected with COVID-19 using ML. Four standard models anticipate COVID-19 prediction, which are Neural Network (NN), Support Vector Machines (SVM), Bayesian Network (BN) and Polynomial Regression (PR). The data utilized to test these models content of number of deaths, newly infected cases, and recoveries in the next 20 days. Five measures parameters were used to evaluate the performance of each model, namely root mean squared error (RMSE), mean squared error (MAE), mean absolute error (MSE), Explained Variance score and r2 score (R2). The significance and value of proposed system auspicious mechanism to anticipate these models for the current scenario of the COVID-19 epidemic. The results showed NN outperformed the other models, while in the available dataset the SVM performs poorly in all the prediction. Reference to our results showed that injuries will increase slightly in the coming days. Also, we find that the results give rise to hope due to the low death rate. For future perspective, case explanation and data amalgamation must be kept up persistently.

Бесплатно

VoIP Technology: Investigation of QoS and Security Issues

VoIP Technology: Investigation of QoS and Security Issues

Amor Lazzez

Статья научная

Voice over IP (VoIP) is the technology allowing voice traffic transmission as data packets over a private or a public IP network. VoIP allows significant benefits for customers and communication services providers. The main are cost savings, rich media service, phone and service portability and mobility, and the integration with other applications. Nevertheless, the deployment of the VoIP technology encounters many challenges such as architecture complexity, interoperability problems, QoS concerns, and security issues. Due to the inability of the IP networking technology to support the stringent QoS constraints of voice traffic, and the incapability of traditional security mechanisms to adequately protect VoIP systems from recent intelligent attacks, QoS and security issues are considered as the most serious challenges for successful deployment of the VoIP technology. The aim of this paper is to carry out a deep analysis of the security issues and QoS concerns of the VoIP technology. Firstly, we present a brief overview about the VoIP technology. Then, we discuss the QoS problems encountering the deployment of the VoIP technology. The presented discussion mainly address the QoS issues related to the use of the IP networking technology, the QoS concerns related to voice clarity, and the QoS mechanisms proposed to support voice traffic QoS constraints. After that, we investigate the security issues of the VoIP technology. The presented investigation mainly address the vulnerabilities and security attacks of VoIP systems, as well as the countermeasures that should be considered to help the deployment of secured VoIP systems.

Бесплатно

WEBspike: A New Proposition of Deterministic Finite Automata and Parallel Algorithm Based Web Application for EEG Spike Recognition

WEBspike: A New Proposition of Deterministic Finite Automata and Parallel Algorithm Based Web Application for EEG Spike Recognition

Anup Kumar Keshri, Shamba Chatterjee, Barda Nand Das, Rakesh Kumar Sinha

Статья научная

The brain signal or Electroencephalogram (EEG) has been proved as one of the most important bio-signal that deals with a number of problems and disorders related to the human being. Epilepsy is one of the most commonly known disorders found in humans. The application of EEG in epilepsy related research and treatment is now a very common practice. Variety of smart tools and algorithms exist to assist the experts in taking decision related to the treatment to be provided to an epileptic patient. However, web based applications or tools are still needed that can assist those doctors and experts, who are not having such existing smart tools for EEG analysis with them. In the current work, a web based system named WEBspike has been proposed that breaks the geographical boundary in assisting doctors in taking proper and fast decision regarding the treatment of epileptic patient. The proposed system receives the EEG data from various users through internet and processes it for Epileptic Spike (ES) patterns present in it. It sends back a report to the user regarding the appearance of ES pattern present in the submitted EEG data. The average spike recognition rate obtained by the system with the test files, was 99.09% on an average.

Бесплатно

Web Crawler Based on Mobile Agent and Java Aglets

Web Crawler Based on Mobile Agent and Java Aglets

Md. Abu Kausar, V. S. Dhaka, Sanjeev Kumar Singh

Статья научная

With the huge growth of the Internet, many web pages are available online. Search engines use web crawlers to collect these web pages from World Wide Web for the purpose of storage and indexing. Basically Web Crawler is a program, which finds information from the World Wide Web in a systematic and automated manner. This network load farther will be reduced by using mobile agents. The proposed approach uses mobile agents to crawl the pages. A mobile agent is not bound to the system in which it starts execution. It has the unique ability to transfer itself from one system in a network to another system. The main advantages of web crawler based on Mobile Agents are that the analysis part of the crawling process is done locally rather than remote side. This drastically reduces network load and traffic which can improve the performance and efficiency of the whole crawling process.

Бесплатно

Web Refinding Support System Based on Process Recollective Activity

Web Refinding Support System Based on Process Recollective Activity

Masashi Toda

Статья научная

The recent growth of search technology has enabled people to find information more easily. However, most people need to refind information on a daily basis. Finding and refinding are different activities and require different types of support. However, current refinding support systems don't consider this point. This has caused several problems: PVR, loss of contextual information, and difference in search experiences. We discuss these problems and their solutions from a cognitive perspective. We propose a process-recollective refinding support system based on this discussion. We demonstrate a novel approach to refinding information on the web and a specific system as an example.

Бесплатно

Web Service Component Reusability Evaluation: A Fuzzy Multi-Criteria Approach

Web Service Component Reusability Evaluation: A Fuzzy Multi-Criteria Approach

Aditya Pratap Singh, Pradeep Tomar

Статья научная

The service oriented architecture supports reusable components. Component reusability is one of the important features while designing web services for reuse. The reusability is an ideal and key factor to improve the quality and production rate of software. It becomes very helpful for quality assurance, if such quality parameters can be quantified. Non functional quality parameters like reusability are not easy to measure and quantify. This paper attempts to quantify reusability using fuzzy multi criteria approach. This approach is considered due to the unpredictable nature of reusability attributes. For the estimation of reusability, the paper identifies 5 key attributes of reusability i.e. Coupling, Interface Complexity, Security, Response Time and Statelessness in context of web service components.

Бесплатно

Web Services Matchmaking Based on a Partial Ontology Alignment

Web Services Matchmaking Based on a Partial Ontology Alignment

Aissa FELLAH, Mimoun Malki, Atilla ELÇI

Статья научная

The fast development and the huge number of existing web services have raised the problem of the urgent need for matchmaking mechanisms. However state-of-the-art matchmakers are unsuitable for locating web services that use different ontologies. This aspect is important since it is not realistic to assume that Web services will always be defined by the same ontology, as the Web service requester and provider operate independently, each defines their own ontologies to describe their services. This is an emergent research issue that has not been well addressed. This work is a contribution to achieve semantic interoperability in a multi-ontology environment. This paper describes a Web service multi-ontology matchmaker for SAWSDL services, called SAWSDL-MOM which locates web services that use different ontologies. The matchmaker engine incorporates a novel partial ontology alignment algorithm with syntax, linguistic and original structural matchers. In determining the 1:1 mappings the Hungarian algorithm is used. Finally a matchmaking strategy is utilized in finding the score of each service. Experimental evaluation and comparison provide strong evidence that SAWSDL-MOM can significantly improve results, achieve better interoperability and scalability.

Бесплатно

Web Video Mining: Metadata Predictive Analysis using Classification Techniques

Web Video Mining: Metadata Predictive Analysis using Classification Techniques

Siddu P. Algur, Prashant Bhat

Статья научная

Now a days, the Data Engineering becoming emerging trend to discover knowledge from web audio-visual data such as- YouTube videos, Yahoo Screen, Face Book videos etc. Different categories of web video are being shared on such social websites and are being used by the billions of users all over the world. The uploaded web videos will have different kind of metadata as attribute information of the video data. The metadata attributes defines the contents and features/characteristics of the web videos conceptually. Hence, accomplishing web video mining by extracting features of web videos in terms of metadata is a challenging task. In this work, effective attempts are made to classify and predict the metadata features of web videos such as length of the web videos, number of comments of the web videos, ratings information and view counts of the web videos using data mining algorithms such as Decision tree J48 and navie Bayesian algorithms as a part of web video mining. The results of Decision tree J48 and navie Bayesian classification models are analyzed and compared as a step in the process of knowledge discovery from web videos.

Бесплатно

Web Vulnerability Finder (WVF): Automated Black- Box Web Vulnerability Scanner

Web Vulnerability Finder (WVF): Automated Black- Box Web Vulnerability Scanner

Muhammad Noman Khalid, Muhammad Iqbal, Kamran Rasheed, Malik Muneeb Abid

Статья научная

Today the internet has become primary source of communication among people because it holds limitless space and pool of various web applications and resources. The internet allows us to communicate in a fraction of second with another people who is sitting in the other part of the world. At present, the internet has become part of our daily life and its usage is increasing exponentially, therefore it accumulates a number of web applications on daily basis on Web podium. Most of the web applications exist with few weaknesses and that weaknesses give room to several bad buys (hackers) to interrupt that weak part of code in web applications. Recently, SQL Injection, Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) seriously threaten the most of the web applications. In this study, we have proposed a black box testing method to detect different web vulnerabilities such as SQL Injection, XSS and CSRF and developed a detection tool i.e. Web Vulnerabilities Finder (WVF) for most of these vulnerabilities. Our proposed method can automatically analyze websites with the aim of finding web vulnerabilities. By applying the tool to some websites, we have found 45 exploitable XSS, SQL Injection 45, Directory Discloser 38 and Local/remote file inclusion 40 vulnerabilities. The experimental results show that our tool can efficiently detect XSS, SQL Injection, Directory Discloser and LFI/RFI vulnerabilities.

Бесплатно

Web services for transforming e-cultural heritage management in Tanzania

Web services for transforming e-cultural heritage management in Tanzania

Gloriana Joseph Monko, Khamisi Kalegele, Dina Machuve

Статья научная

Globally, applications of Information and Communication Technologies (ICTs) in services management and delivery have positively transformed various sectors of economies. Similar transformations have been witnessed in Tanzania, where mobile money and the Internet have transformed the way businesses are done. However, the transformations have not taken place across all sectors of the Tanzanian economy with some sectors lagging further behind than others. Cultural heritage sector, in particular, has been slow in leveraging ICT to transform the delivery of services. The sector is characterized by poor consumption of heritage sites and artworks, neglect, low publicity, weak branding, to mention a few. Although the achieved level of skills in Internet and Web have enabled the proliferation of many useful Websites which offer services to the public, information gathering remains a huge challenge considering the size of the country, its cultural heritage from 126 tribes and the vast nature reserves. We have investigated the usefulness of Web services in promoting mechanisms to gather and disseminate information about e-Cultural Heritage in Tanzania. In our investigation, we analyzed stakeholders of the sector and realized that Web services can be used to foster mechanisms within specific groups using crowdsourcing techniques. We then proposed specific Web services that cater for information flow chain of Tanzanian's artwork industry and developed an e-cultural heritage portal for demonstration. We tested the system with a sample of selected stakeholders and the initial results indicated that the locals’ readiness for such a system is strong enough and that apart from developers benefiting from the Web services, accessibility of information and stakeholders’ visibility will improve.

Бесплатно

Website Structure Optimization Model Based on Ant Colony System and Local Search

Website Structure Optimization Model Based on Ant Colony System and Local Search

Harpreet Singh, Parminder Kaur

Статья научная

The unabated growth of the World Wide Web in the last decade and the increasing size of the websites have resulted in significant amount of research activity to improve the link structure of the websites. A website can be considered as a directed graph with webpages as nodes and hyperlinks as edges referred to as the Webgraph. Website structure optimization or reorganization is also considered as a graph optimization problem. The researchers have developed few models to optimize the website link structure. It is observed that the heuristic and mathematical models cannot optimize webgraphs of large size and are also time consuming. This paper presents an Ant Colony and local search based hybrid metaheuristic model for the newly emerged website structure optimization (WSO) problem. The developed hybrid model is also compared with Ant colony method and it is observed that the model performs better than Ant Colony System based approach.

Бесплатно

Weighted Priority Queuing: A New Scheduling Strategy for Web Services

Weighted Priority Queuing: A New Scheduling Strategy for Web Services

Randa. Hammami, Yossra. Hadj Kacem, Senda. Souissi, Hatem. Bellaaj, Ahmed. Hadj Kacem

Статья научная

Web services are considered as one of the best and most widespread solution for handling the interoperability problem and the challenge of integration. The proliferation of Web services over the Internet becomes more and more significant. They are henceforth playing an important role in several fields such as e-health, e-commerce and e-learning. Thus, one important question arises: how to manage Web services more efficiently? It is a key problem to the Web services based- applications at present especially that the need to enhance the Quality of Services (QoS) is constantly growing: the better the QoS are, the more the users are satisfied. This has spurred the study of scheduling algorithms for providing QoS guarantees. In this paper we put the light on the Web services requests scheduling strategies on the server side. In fact, we present a brief overview and a comparative evaluation of three queuing scheduling disciplines for Web services, which are: First in First out (FIFO), Priority Queuing (PQ) and Weighted Fair Queuing (WFQ). Then, we put forward a new scheduling strategy based on two well-known strategies namely: Priority Queuing and Weighted Fair Queuing. The experimental results highlight the merits and shortcomings of each scheduling discipline in addition to its performance in terms of: execution time, communication time and response time.

Бесплатно

Why should municipalities use management information systems in their decision-making processes?

Why should municipalities use management information systems in their decision-making processes?

Cigdem Tarhan, Can Aydın

Статья научная

In recent years, rapid developing information and communication technology has been changing swiftly our insight of management perspective in our country and the World. Generally, dynamic and visionary private sector enterprises could easily adapt to these changes. From the point of information systems view, local governments just like the private sector which produce services. Local governments provide services to people living within the boundaries, but they never think or act as profit-oriented private sector. In new economy, cities are becoming more interconnected economically, culturally, and infrastructural through the parallel development of global telecommunication and transportation networks. Firstly, it has been investigated what factors affect the adoption of information technologies in Izmir Metropolitan Municipality. A survey was developed to measure the factors affecting the use of information technology in municipalities. The survey questions were prepared according to the effects of the above organizational factors. Also it was conducted with the managers of the branch manager level in Izmir Metropolitan Municipality. Finally, the results of the study were discussed and give a contribution to the literature.

Бесплатно

Why we need dedicated web-based collaboration platforms for inter-organizational connectivity? A research synthesis

Why we need dedicated web-based collaboration platforms for inter-organizational connectivity? A research synthesis

Atia Bano Memon, Kyrill Meyer

Статья научная

This paper examines the potential of existing web-based collaboration services in supporting the inter-organizational connectivity throughout the collaboration process. In doing so, the paper initially presents a brief overview and a hierarchical classification with respect to the degree and complexity of service integration of existing collaboration services which are applicable in inter-organizational settings. Successively, their shortcomings in supporting the process of inter-organizational collaboration are herein determined and discussed. As a conclusion, the paper elucidates the rational and need for designing the dedicated web-based collaboration platforms for facilitating the inter-organizational connectivity within a particular business sector.

Бесплатно

Журнал