Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1211

Toward Grasping the Dynamic Concept of Big Data

Toward Grasping the Dynamic Concept of Big Data

Luis Emilio Alvarez-Dionisi

Статья научная

The idea of Big Data represents a growing challenge for companies such as Google, Yahoo, Bing, Amazon, eBay, YouTube, LinkedIn, Facebook, Instagram, and Twitter. However, the challenge goes beyond private companies, government agencies, and many other organizations. It is actually an alarm clock that is ringing everywhere: newspapers, magazines, books, research papers, online, offline, it is all over the world and people are worried about it. Its economic impact and consequences are of unproportioned dimensions. This research outlines the fundamental literature required to understand the concept of Big Data. Additionally, the present work provides a conclusion and recommendations for further research on Big Data. This study is part of an ongoing research that addresses the link between Economic Growth and Big Data.

Бесплатно

Towards Automated Web Accessibility Evaluation: A Comparative Study

Towards Automated Web Accessibility Evaluation: A Comparative Study

Siddikjon Gaibullojonovich Abduganiev

Статья научная

With each passing day, the Web is becoming increasingly important in our lives. Hence, the need of making it more accessible to everyone, especially for the disabled and elderly spurred a great interest in automated tools, the total registered number of which has been continuously increasing and reached from forty-five software bids in 2014 to ninety-three in 2017. The purpose of this empirical research is to assess and compare eight popular and free online automated Web accessibility evaluation tools (AWAETs) such as AChecker, Cynthia Says, EIII Checker, MAUVE, SortSite, TAW, Tenon and WAVE with regard to the WCAG 2.0 conformance. As a result, significant differences were observed in terms of tool’s coverage (a maximum of 32.4%), completeness (ranges between 10% and 59%), correctness (an average of 70.7%), specificity (reaches 32%), inter-reliability (lies between 1.56% and 18.32%) and intra-reliability (the acceptable score), validity, efficiency and capacity. These eight criteria can help to determine a new role played by modern AWAETs as dependent methods in Web accessibility evaluation. Moreover, consequences of relying on AWAETs alone are quantified and concluded that applying such approaches is a great mistake since subjective and less frequent objective success criteria (SC) failed to be automated. However, using a good combination of AWAETs is highly recommended as overall results in all the mentioned quality criteria are maximized and tools could definitely validate and complete each other. Ultimately, integrating automated methods with the others is ideal and preferably at an early stage of the website development life cycle. The study also provides potential accessibility barriers that make websites inaccessible, challenges AWAETs are currently facing, nineteen pros and fourteen cons and fifteen improvement recommendations for the existing and next generation of AWAETs. Fundamentally, achieving the objectives of this study was possible due to the elaboration and implementation of a new five-phased methodology named as “5PhM-for-AWAEMs” for successful selection, evaluation and/or comparison of AWAEMs. In addition to providing detailed descriptions of the estimation process, this methodology represents eleven key criteria for effective selection of suitable AWAEMs and necessary numbers of web pages and expert evaluators for acceptable, normal or ideal assessment.

Бесплатно

Towards Effective Solid Waste Management: A Mobile Application for Coordinated Waste Collection and User-official Interaction

Towards Effective Solid Waste Management: A Mobile Application for Coordinated Waste Collection and User-official Interaction

Paudel A., Pant A., Manandhar A., Gautam B.

Статья научная

Solid Waste Management is an especially important task related to human health and the environment. Due to ineffective scheduled date & time, poor communication between waste collecting institutions and local house owners, people are compelled to throw waste on streets which is not good. Even if there is a routine, people tend to miss the schedule. Our aim is to develop an application for mobile phones, which consists of two parties- the user and waste management officials, where the second one acts as reminders. Officials will send a notification to the user, signaling that they are at a certain checkpoint near the user and the user can now throw waste properly and not on the streets. An incremental model was used throughout our project; basic requirements are fulfilled first and then iterated to create the final product. The proposed application includes two portals for whether you are user or waste management personnel. This application helps to improve the coordination between clients and collectors and determines whether the waste in an area has been collected or not. The survey conducted in this study involved consulting the Environment and Agricultural Department of Kathmandu Metropolitan City, which highlighted the significance of a notifying application. This application addresses the issue of uncoordinated waste disposal by providing users with information about collection schedules, leading to better waste management practices and reduced unsystematic garbage disposal.

Бесплатно

Towards Improving the Quality of Mobile App Reviews

Towards Improving the Quality of Mobile App Reviews

Mubasher Khalid, Muhammad Asif, Usman Shehzaib

Статья научная

Mobile app reviews are gaining importance as a crowd source to improve the quality of mobile apps. Mobile app review systems are providing a platform for users to share their experiences and to support in decision making for a certain app. Developers, on the other side, are utilizing the review system to get real-life user experience as a source of improving their apps. This paper has analyzed existing review system and proposed few recommendations for the current review system to improve the quality of app reviews. The proposed review system can help for collection and analysis of user reviews to make it more meaningful with less intensive data mining techniques. The proposed system can help the end users to get an overview of mobile apps. The recommendations in this paper are derived from the existing literature related to app reviews and will help to improve the current review systems for better app reviews from users as well as developers perspective.

Бесплатно

Towards a meta-modeling and verification approach of multi-agent systems based on the agent petri net formalism

Towards a meta-modeling and verification approach of multi-agent systems based on the agent petri net formalism

Amel Dembri, Mohammed Redjimi

Статья научная

The Agent Petri Nets (APN) formalism provides a set of adapted and specific tools, relations and functions for modeling multi-agent systems (MAS). However, there is a lack of tools for verifying the APN models. In order to fill some of these gaps, we propose in this paper, a meta-modeling approach based on the Model Driven Architecture (MDA). The Eclipse Modeling Framework (EMF) permits to define a generic APN Meta-model in Ecore informal format. Its abstraction level is very high, it offers as a basis for developing system models dedicated to various specific domains. In addition, the Object Constraint Language (OCL) aims to increase the structural verification level of the model and the Graphical Modeling Framework (GMF), for its part, is concerned with generating a graphical editor associated with the APN meta-model. Thus, we combine the rigor of APN formalism with the power of the MDA-based meta-modeling tools for verifying APN models.

Бесплатно

Towards data resilience: the analytical case of crypto ransomware data recovery techniques

Towards data resilience: the analytical case of crypto ransomware data recovery techniques

Aaron Zimba, Zhaoshun Wang, Luckson Simukonda

Статья научная

Crypto ransomware has earned an infamous reputation in the malware landscape and its sound sends a lot of shivers to many despite being a new entrant. The media has not helped matters even as the myths and inaccuracies surrounding crypto ransomware continue to deepen. It’s been purported that once crypto ransomware attacks, the victim is left with no option but to pay in order to retrieve the encrypted data, and that without a guarantee, or risk losing the data forever. Security researchers are inadvertently thrown into a cat-and-mouse chase to catch up with the latest vices of the aforesaid in order to provide data resilience. In this paper, we debunk the myths surrounding loss of data via a crypto ransomware attack. Using a variety of crypto ransomware samples, we employ reverse engineering and dynamic analysis to evaluate the underlying attack structures and data deletion techniques employed by the ransomware. Further, we expose the data deletion techniques used by ransomware to prevent data recovery and suggest how such could be countered. From the results, we further present observed sandbox evasion techniques employed by ransomware against both static and dynamic analysis in an effort to obfuscate its operations and subsequently prevent data recovery. Our analyses have led us to the conclusion that no matter how devastating a crypto ransomware attack might appear, the key to data recovery options lies in the underlying attack structure and the implemented data deletion methodology.

Бесплатно

Towards enhancing access of HIV/AIDS healthcare information in Tanzania: is a mobile application platform a way forward?

Towards enhancing access of HIV/AIDS healthcare information in Tanzania: is a mobile application platform a way forward?

Ibrahim A. Mwammenywa, Shubi F. Kaijage

Статья научная

This survey study evaluates the peoples’ acceptance and comfortability on accessing the HIV/AIDS healthcare information through visiting HIV/AIDS Care and Treatment Centers (CTCs). Furthermore, the survey examines whether a mobile application platform can be the way forward towards enhancing HIV/AIDS healthcare information delivery in Tanzania. This study was conducted in Dar es Salaam city in Tanzania. The structured questionnaire-based survey was carried-out involving a total of 208 respondents, among them, 45 were the HIV/AIDS healthcare practitioners. The collected data were analyzed by using WEKA and Python computer programming software. The study findings indicated that: 24.5% of the respondents claimed that they were not comfortable going to HIV/AIDS CTCs indicating that they were afraid of being exposed and stigmatized; almost one-third (31.3%) of respondents prefer to seek HIV/AIDS related information from online sources; 78.5% of respondents preferred to have an official mobile application for access the HIV/AIDS healthcare information; 64.4% of HIV/AIDS practitioners indicated the need of having a mobile application platform for HIV/AIDS healthcare information delivery; and more than two-third of HIV/AIDS practitioners claimed to be able to serve people with HIV/AIDS healthcare information online. It is concluded that there is a need for the HIV/AIDS healthcare providers to have a mobile application platform for HIV/AIDS healthcare information delivery. The mobile application platform will consequently help people to confidentially access the HIV/AIDS healthcare information in their mobile electronic gadgets frequently without fear of being exposed as if they would frequently visit CTCs.

Бесплатно

Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks

Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks

Vincent Omollo Nyangaresi, Silvance O. Abeka, Anthony J. Rodrigues

Статья научная

Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The conventional mobility prediction models operate on unrealistic assumptions that make them unsuitable for cellular network mobile station tracking. For instance, the Feynman-Verlet, first order kinetic model and Random Waypoint assume that mobile phones move with constant velocity while Manhattan, Freeway, city area, street unit, obstacle mobility, and pathway mobility postulate that mobile station movement is restricted along certain paths. In addition, obstacle mobility model speculate that the mobile station signal is completely absorbed by an obstacle while random walk, random waypoint, Markovian random walk, random direction, shortest path model, normal walk, and smooth random assume that a mobile station can move in any direction. Moreover, the greatest challenge of the random direction model is the requirement that a border behavior model be specified for the reaction of mobile stations reaching the simulation area boundary. In this paper, a protocol that addresses the border behavior problem is developed. This protocol is shown to detect when the subscriber has moved out of the current tracking area, which is crucial during handovers.

Бесплатно

Traffic Accident Analysis Using Decision Trees and Neural Networks

Traffic Accident Analysis Using Decision Trees and Neural Networks

Olutayo V.A, Eludire A.A

Статья научная

This work employed Artificial Neural Networks and Decision Trees data analysis techniques to discover new knowledge from historical data about accidents in one of Nigeria’s busiest roads in order to reduce carnage on our highways. Data of accidents records on the first 40 kilometres from Ibadan to Lagos were collected from Nigeria Road Safety Corps. The data were organized into continuous and categorical data. The continuous data were analysed using Artificial Neural Networks technique and the categorical data were also analysed using Decision Trees technique .Sensitivity analysis was performed and irrelevant inputs were eliminated. The performance measures used to determine the performance of the techniques include Mean Absolute Error (MAE), Confusion Matrix, Accuracy Rate, True Positive, False Positive and Percentage correctly classified instances. Experimental results reveal that, between the machines learning paradigms considered, Decision Tree approach outperformed the Artificial Neural Network with a lower error rate and higher accuracy rate. Our research analysis also shows that, the three most important causes of accident are Tyre burst, loss of control and over speeding.

Бесплатно

Traffic Sign Detection and Recognition Model Using Support Vector Machine and Histogram of Oriented Gradient

Traffic Sign Detection and Recognition Model Using Support Vector Machine and Histogram of Oriented Gradient

Nabil Ahmed, Sifat Rabbi, Tazmilur Rahman, Rubel Mia, Masudur Rahman

Статья научная

Traffic signs are symbols erected on the sides of roads that convey the road instructions to its users. These signs are essential in conveying the instructions related to the movement of traffic in the streets. Automation of driving is essential for efficient navigation free of human errors, which could otherwise lead to accidents and disorganized movement of vehicles in the streets. Traffic sign detection systems provide an important contribution to automation of driving, by helping in efficient navigation through relaying traffic sign instructions to the system users. However, most of the existing techniques have proposed approaches that are mostly capable of detection through static images only. Moreover, to the best of the author’s knowledge, there exists no approach that uses video frames. Therefore, this article proposes a unique automated approach for detection and recognition of Bangladeshi traffic signs from the video frames using Support Vector Machine and Histogram of Oriented Gradient. This system would be immensely useful in the implementation of automated driving systems in Bangladeshi streets. By detecting and recognizing the traffic signs in the streets, the automated driving systems in Bangladesh will be able to effectively navigate the streets. This approach classifies the Bangladeshi traffic signs using Support Vector Machine classifier on the basis of Histogram of Oriented Gradient property. Through image processing techniques such as binarization, contour detection and identifying similarity to circle etc., this article also proposes the actual detection mechanism of traffic signs from the video frames. The proposed approach detects and recognizes traffic signs with 100% precision, 95.83% recall and 96.15% accuracy after running it on 78 Bangladeshi traffic sign videos, which comprise 6 different kinds of Bangladeshi traffic signs. In addition, a public dataset for Bangladeshi traffic signs has been created that can be used for other research purposes.

Бесплатно

Transient Process at Atmospheric Discharge into the Landline and the Appearance of an Electric Arc in the Switch

Transient Process at Atmospheric Discharge into the Landline and the Appearance of an Electric Arc in the Switch

Slobodan N. Bjelić, Filip N. Marković, Nenad A. Marković

Статья научная

This document proposes a model of the process of atmospheric discharge of overhead lines followed by an electric arc. The intensity of atmospheric discharges, followed by electric arc and destruction, is determined by the difference in potential and current. Such a structure and form of discharge make it difficult to analyze the transient process and obtain adequate solutions. That is why the model of the transient process in the electric arc of the switch under the conditions of interruption of the AC circuit is specially analyzed. Simple equivalent schemes for the analysis of phenomena with given values of linear parameters are presented, which are very simple to apply. All influential parameters by which the overvoltage values in the model can be estimated were also taken into account. The evaluation of the proposed model was performed using the adapted MATLAB program psbsurlightcuurent for atmospheric electrical discharge, which contains a high frequency current source. The verified simulation method was used to verify the results as part of a method derived from artificial intelligence algorithms. The process simulation program, the obtained voltage and current diagrams confirm the application of the simulation algorithm model.

Бесплатно

Transient Processes on the Elements of Underground Installations

Transient Processes on the Elements of Underground Installations

Bojan L. Jovanović, Slobodan N. Bjelić, Nenad A. Marković

Статья научная

If the value of the field is greater than the disruptive voltage of the soil around earth wire (probe) the breakthrough occurs and the majority of soil becomes conductive. Particular problem are components of high frequency currents or voltages. Disorders of frequency in the range of 50 Hz to 5 kHz that can affect the selection of installation parameters, in compliance with all environmental criteria, are simulated by adapted subprogram in the part of the package Sym Power MATLAB.

Бесплатно

Tree Adapt: Web Content Adaptation for Mobile Devices

Tree Adapt: Web Content Adaptation for Mobile Devices

Rajibul Anam, Chin Kuan Ho, Tek Yong Lim

Статья научная

Mobile web browsing usually becomes time-consuming since currently it requires horizontal and vertical scrolling in addition to this, users interested in only a section of a web page are often burdened with cumbersome whole web pages that not only do not properly fit their mobile screens but also require a lot of delivery time. This problem can be addressed and resolved with the help of a mobile web content adaptation system. Existing web content adaptation systems focus on resizing contents to fit a mobile device and removing unnecessary contents from the adapted web page. This paper’s aim is to address the gap by proposing the TreeAdapt which provides a condensed view of an adapted web page. This condensed view consists of only block headers which users can then expand for complete content. In order to achieve this, the proposed algorithm will first categorize an HTML object as menu, block title or the main content. A depth-first traversal algorithm is then used to select the sequence of blocks to be displayed on a mobile device. Usability studies were performed to evaluate the usability of the adapted contents against other deployed systems. Results from the usability studies indicate that the adapted contents produced by the proposed techniques enabled users to locate targeted information within a web page in a shorter span of time.

Бесплатно

Trends, Issues and Challenges Concerning Spam Mails

Trends, Issues and Challenges Concerning Spam Mails

Jitendra Nath Shrivastava, Maringanti Hima Bindu

Статья научная

Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone’s life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the recipients’. The entire internet community pays the price, every time there pops a spam mail. Online privacy of the users is compromised when spam disturbs a network by crashing mail servers and filling up hard disks. Servers classified as spam sites are forfeited from sending mails to the recipients’. This paper gives the broader view of spam, issues challenges and statistical losses occurred on account of spams.

Бесплатно

Trust Formulization in Dynamic Source Routing Protocol Using SVM

Trust Formulization in Dynamic Source Routing Protocol Using SVM

Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari

Статья научная

In an advanced wireless network, trust is desirable for all routing protocols to secure data transmission. An enormous volume of important information communicates over the wireless network using trusted dynamic routing protocol, which is the enhancement of the DSR (Dynamic Source Routing) protocol to improve trust. Previously fuzzy logic, genetic algorithm, neural network has been used to modify DSR and good result has been obtained in few performance indicators and parameters. In this work an SVM based trusted DSR have been developed and better results have been presented. This new novel on demand trust based routing protocol for MANET is termed as Support vector machine based Trusted Dynamic Source Routing protocol, performance of STDSR has been improved in term of the detection ratio (%) at different mobility and no. of malicious node variation.

Бесплатно

Trusted Mobile Client for Document Security in Mobile Office Automation

Trusted Mobile Client for Document Security in Mobile Office Automation

Xiaojun Yu, Qiaoyan Wen

Статья научная

Mobile Office Automation is a popular application on the mobile platform. However, the mobile platform has no enough security protection in front of the open system, such as internet. The document security problem in this application has become a hot topic. This paper proposed a new solution to this problem. The solution based on the trusted computing technology, which implements the platform security by hardware. The solution also includes the transparent encryption technology that means application could run independent to the security module and keep the consistency of user experience. The trusted mobile client platform architecture and security functions process of the mobile document protection system are detailed. Related work also been introduced; the security analysis shows the proposed solution could provide well security enhancement for document protection in mobile platform.

Бесплатно

Tuning stacked auto-encoders for energy consumption prediction: a case study

Tuning stacked auto-encoders for energy consumption prediction: a case study

Muhammed Maruf Öztürk

Статья научная

Energy is a requirement for electronic devices. A processor is a substantial part of computer components in terms of energy consumption. A great concern has risen over recent years about computers with regard to the energy consumption. Taking accurate information about energy consumption of a processor allows us to predict energy flow features. However, using traditional classifiers may not enhance the accuracy of the prediction of energy consumption. Deep learning shows great promise for predicting energy consumption of a processor. Stacked auto-encoders has emerged a robust type of deep learning. This work investigates the effects of tuning stacked auto-encoder in computer processor with regard to the energy consumption. To search parameter space, a grid search based training method is adopted. To prepare data to prediction, a data preprocessing algorithm is also proposed. According to the obtained results, on average, the method provides 0.2% accuracy improvement along with a remarkable success in reducing parameter tuning error. Further, in receiver operating curve analysis, tuned stacked auto-encoder was able to increase value of are under the curve up to 0.5.

Бесплатно

Twitter as a Social Network in Academic Environments for Exchanging Information Taibah University: A Case Study

Twitter as a Social Network in Academic Environments for Exchanging Information Taibah University: A Case Study

Zohair Malki

Статья научная

Twitter is extensively used in the Arab World in the last few years. It showed positive impact on both students and teachers in academic institutions. In this paper we introduce Taibah University as a case study to examine Twitter uses and benefits in education environments. Deans, Students and Teachers accounts on Twitter will be examined to discover the general uses of Twitter and the type of information which is commuting between students and teachers. Results showed that twitter is used extensively in Taibah University for after class room discussions, and for the teachers to share class notes and lectures, in addition it showed highly agreement on the importance of twitter in Taibah University from both students and faculty members.

Бесплатно

Two Fold Optimization of Precopy Based Virtual Machine Live Migration

Two Fold Optimization of Precopy Based Virtual Machine Live Migration

Sangeeta Sharma, Meenu Chawla

Статья научная

Virtualization is widely adopted by the data centers, in order to fulfill the high demand for resources and for their proper utilization. For system management in these virtualized data centers virtual machine live migration acts as a key method. It provides significant benefit of load-balancing without service disruption. Along with the various benefits virtual machine live migration also imposes performance overhead in terms of computation, space and bandwidth used. This paper analyzes the widely used precopy method for virtual machine live migration and proposes the two fold optimization of precopy method for virtual machine live migration. In the first phase, the proposed two fold precopy method reduces the amount of data sent in first iteration of precopy method. Second phase restricts sending of similar data iteratively in each subsequent iterations of precopy method by identifying frequently updated pages and keeps it till the last stop and copy iteration. In this way it reduces total migration time and total amount of data transferred. The proposed two fold precopy method is compared with precopy method and simulation results show the performance improvement of a virtual machine live migration in terms of total migration time and total amount of data transferred.

Бесплатно

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Jianhua Zhu, Guohua Cui, Shiyang Zhou

Статья научная

A group signature scheme and a threshold group signature scheme based on Bilinear Paring are proposed, there are multiple security strategies in these two schemes. These schemes have forward security which minimizes the damage caused by the exposure of any group member's signing key, and does not affect the past signatures generated by this member; meanwhile, ahead signature generated by a group member before the joining date can be prevented via this strategy. Moreover, this scheme support the group member revocable function efficiently and further has no requirement for time period limits.

Бесплатно

Журнал