Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1195

Tuning stacked auto-encoders for energy consumption prediction: a case study

Tuning stacked auto-encoders for energy consumption prediction: a case study

Muhammed Maruf Öztürk

Статья научная

Energy is a requirement for electronic devices. A processor is a substantial part of computer components in terms of energy consumption. A great concern has risen over recent years about computers with regard to the energy consumption. Taking accurate information about energy consumption of a processor allows us to predict energy flow features. However, using traditional classifiers may not enhance the accuracy of the prediction of energy consumption. Deep learning shows great promise for predicting energy consumption of a processor. Stacked auto-encoders has emerged a robust type of deep learning. This work investigates the effects of tuning stacked auto-encoder in computer processor with regard to the energy consumption. To search parameter space, a grid search based training method is adopted. To prepare data to prediction, a data preprocessing algorithm is also proposed. According to the obtained results, on average, the method provides 0.2% accuracy improvement along with a remarkable success in reducing parameter tuning error. Further, in receiver operating curve analysis, tuned stacked auto-encoder was able to increase value of are under the curve up to 0.5.

Бесплатно

Twitter as a Social Network in Academic Environments for Exchanging Information Taibah University: A Case Study

Twitter as a Social Network in Academic Environments for Exchanging Information Taibah University: A Case Study

Zohair Malki

Статья научная

Twitter is extensively used in the Arab World in the last few years. It showed positive impact on both students and teachers in academic institutions. In this paper we introduce Taibah University as a case study to examine Twitter uses and benefits in education environments. Deans, Students and Teachers accounts on Twitter will be examined to discover the general uses of Twitter and the type of information which is commuting between students and teachers. Results showed that twitter is used extensively in Taibah University for after class room discussions, and for the teachers to share class notes and lectures, in addition it showed highly agreement on the importance of twitter in Taibah University from both students and faculty members.

Бесплатно

Two Fold Optimization of Precopy Based Virtual Machine Live Migration

Two Fold Optimization of Precopy Based Virtual Machine Live Migration

Sangeeta Sharma, Meenu Chawla

Статья научная

Virtualization is widely adopted by the data centers, in order to fulfill the high demand for resources and for their proper utilization. For system management in these virtualized data centers virtual machine live migration acts as a key method. It provides significant benefit of load-balancing without service disruption. Along with the various benefits virtual machine live migration also imposes performance overhead in terms of computation, space and bandwidth used. This paper analyzes the widely used precopy method for virtual machine live migration and proposes the two fold optimization of precopy method for virtual machine live migration. In the first phase, the proposed two fold precopy method reduces the amount of data sent in first iteration of precopy method. Second phase restricts sending of similar data iteratively in each subsequent iterations of precopy method by identifying frequently updated pages and keeps it till the last stop and copy iteration. In this way it reduces total migration time and total amount of data transferred. The proposed two fold precopy method is compared with precopy method and simulation results show the performance improvement of a virtual machine live migration in terms of total migration time and total amount of data transferred.

Бесплатно

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Jianhua Zhu, Guohua Cui, Shiyang Zhou

Статья научная

A group signature scheme and a threshold group signature scheme based on Bilinear Paring are proposed, there are multiple security strategies in these two schemes. These schemes have forward security which minimizes the damage caused by the exposure of any group member's signing key, and does not affect the past signatures generated by this member; meanwhile, ahead signature generated by a group member before the joining date can be prevented via this strategy. Moreover, this scheme support the group member revocable function efficiently and further has no requirement for time period limits.

Бесплатно

Two SAOR Iterative Formats for Solving Linear Complementarity Problems

Two SAOR Iterative Formats for Solving Linear Complementarity Problems

Xian-li Han, Dong-jin Yuan, Shan Jiang

Статья научная

In this paper, we propose two new iterative SAOR methods to solve the linear complementarity problem. Some sufficient conditions for the convergence of two new iterative methods are presented, when the system matrix M is an M-matrix. Moreover, when M is an L-matrix, we discuss the monotone convergence of the new methods. And in the numerical experiments we report some computational results with the two proposed SAOR formats.

Бесплатно

Typology for Linguistic Pattern in English-Hindi Journalistic Text Reuse

Typology for Linguistic Pattern in English-Hindi Journalistic Text Reuse

Aarti Kumar, Sujoy Das

Статья научная

Linking and tracking news stories covering the same events written in different languages is a challenging task. In natural languages same information may be expressed in multiple ways and newspapers try to exploit this feature for making the news stories more appealing. It has been observed that the same news story is presented in same as well as in different language in different ways but normally the gist remains the same. Diversity of linguistic expressions presents a major challenge in identifying and tracking news stories covering the same events across languages, but doing so may provide rich and valuable resources as comparable and parallel corpora can be generated with this resource. In the case of Indian languages there exist limited language resources for Natural Language Processing and Information Retrieval tasks and identifying comparable and parallel documents would offer a potential source for deriving bilingual dictionaries and training statistical Machine Translation systems. Paraphrasing is the most common way of reproducing news stories and translated text is also a type of paraphrase. Prior to linking monolingual or bilingual news stories, these paraphrase types need to identified and classified to help researchers to devise techniques to solve these challenging problems. English-Hindi language pair not only differs in their scripts but also in their grammar and vocabulary. A number of paraphrase typologies have been built from the perspective of Natural Language Processing or for some or the other specific applications but as per the knowledge of the authors, no typology have been reported for English-Hindi cross language text reuse. In this paper a typology is formulated for cross lingual journalistic text reuse in English-Hindi. Typology unravels level of difficulties in English-Hindi mapping. It shall help in devising techniques for linking and tracking English-Hindi stories.

Бесплатно

Ultrasound Image Despeckling using Local Binary Pattern Weighted Linear Filtering

Ultrasound Image Despeckling using Local Binary Pattern Weighted Linear Filtering

Simily Joseph, Kannan Balakrishnan, M.R. Balachandran Nair, Reji Rajan Varghese

Статья научная

Speckle noise formed as a result of the coherent nature of ultrasound imaging affects the lesion detectability. We have proposed a new weighted linear filtering approach using Local Binary Patterns (LBP) for reducing the speckle noise in ultrasound images. The new filter achieves good results in reducing the noise without affecting the image content. The performance of the proposed filter has been compared with some of the commonly used denoising filters. The proposed filter outperforms the existing filters in terms of quantitative analysis and in edge preservation. The experimental analysis is done using various ultrasound images.

Бесплатно

Under Water Optical Wireless Communications Technology for Short and Very Short Ranges

Under Water Optical Wireless Communications Technology for Short and Very Short Ranges

Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed, Amina E. M. El-Nabawy

Статья научная

This paper has presented our interest in wireless underwater optical communications. Recent interest in ocean exploration has brought about a desire for developing wireless communication techniques in this challenging environment. Due to its high attenuation in water, a radio frequency (RF) carrier is not the optimum choice. Acoustic techniques have made tremendous progress in establishing wireless underwater links, but they are ultimately limited in bandwidth. In traditional communication systems, constructing a link budget is often relatively straight forward. In the case of underwater optical systems the variations in the optical properties of sea water lead to interesting problems when considering the feasibility and reliability of underwater optical links. The main focus of this paper is to construct an underwater link budget which includes the effects of scattering and absorption of realistic sea water. As well as we have developed the underwater optical wireless communication systems to have shorter ranges, that can provide higher bandwidth (up to several hundred Mbit/sec) communications by the assistant of exciting high brightness blue LED sources, and laser diodes suggest that high speed optical links can be viable for short range application.

Бесплатно

Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

N. Senthil Kumar, Anthoniraj Amalanathan

Статья научная

Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML) provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.

Бесплатно

Unsupervised Learning based Modified C- ICA for Audio Source Separation in Blind Scenario

Unsupervised Learning based Modified C- ICA for Audio Source Separation in Blind Scenario

Naveen Dubey, Rajesh Mehra

Статья научная

Separating audio sources from a convolutive mixture of signals from various independent sources is a very fascinating area in personal and professional context. The task of source separation becomes trickier when there is no idea about mixing environment and can be termed as blind audio source separation (BASS). Mixing scenario becomes more complicated when there is a difference between number of audio sources and number of recording microphones, under determined and over determined mixing. The main challenge in BASS is quality of separation and separation speed and the convergence speed gets compromised when separation techniques focused on quality of separation. This work proposed divergence algorithm designed for faster convergence speed along with good quality of separation. Experiments are performed for critically determined audio recording, where number of audio sources is equal to number of microphones and no noise component is taken into consideration. The result advocates that the modified convex divergence algorithm enhance the convergence speed by 20-22% and good quality of separation than conventional convex divergence ICA, Fast ICA, JADE.

Бесплатно

Uplink Capacity Estimation and Enhancement in WCDMA Network

Uplink Capacity Estimation and Enhancement in WCDMA Network

Fadoua Thami Alami, Noura Aknin, Ahmed El Moussaoui

Статья научная

Uplink planification in a WCDMA network consists of estimating the maximum capacity that a cell can support, by using the quality of service equation designed by (E_b)/(N_0). We are interested in this work on two different scenarios: an isolated cell and multiple cells. This capacity is adversely affected by interferences due to own mobile stations and to others belonging to neighboring cells. In order to enhance capacity and minimize the blocking probability of new requests in the cell, we have proposed a Freeing Resources algorithm which consists of releasing some mobile stations in the handover area with the overloaded cell. This algorithm is based on freeing 1, 2 and 3 mobile stations of 12.2 kbps and 1 mobile station of 64 kbps.

Бесплатно

Usability Evaluation Criteria for Internet of Things

Usability Evaluation Criteria for Internet of Things

Michael Onuoha Thomas, Beverly Amunga Onyimbo, Rajasvaran Logeswaran

Статья научная

The field of usability, user experience (UX) design and human-computer interaction (HCI) arose in the realm of desktop computers and applications. The current experience in computing has radically evolved into ubiquitous computing over the preceding years. Interactions these days take place on different devices: mobile phones, e-readers and smart TVs, amid numerous smart devices. The use of one service across multiple devices is, at present, common with different form factors. Academic researchers are still trying to figure out the best design techniques for new devices and experiences. The Internet of Things (IoT) is growing, with an ever wider range of daily objects acquiring connectivity, sensing ability and increased computing power. Designing for IoT raises a lot of challenges; the obvious difference being the much wider variety of device form factors. IoT is still a technically driven field, thus the usability of many of IoT products is, in some way, of the level anticipated of mature consumer products. This study focuses on proposing a usability evaluation criterion for the generic IoT architecture and essential technological components.

Бесплатно

Usability and Security in User Interface Design: A Systematic Literature Review

Usability and Security in User Interface Design: A Systematic Literature Review

Ugochi Oluwatosin Nwokedi, Beverly Amunga Onyimbo, Babak Bashari Rad

Статья научная

Systems carry sensitive data where users are involved. There is need for security concern for the modern software applications. We can term them as 'untrusted clients'. Internet usage has rapidly grown over the years and, more users are opening their information system to their clientele, it is essential to understand users' data that need protecting and to control system access as well and the rights of users of the system. Because of today's increasingly nomadic lifestyle, where they allow users to connect to information systems from anywhere with all the devices in the market, the users need to carry part of the information system out of the secure infrastructure. Insecurity in user interfaces is caused by user ignoring functionalities in the system where some are not only a threat but can harm the system e.g. leaving network services active even though the user does not need them, or when a user is having little or no information of the available security measures. This research paper aims critically address through a review of existing literature, the importance of balance or trade-off between usability and the security of the system. Systematic review method involved a physical exploration of some conference proceedings and journals to conduct the literature review. Research questions relating to usability and security were asked and the criteria for usability and security evaluations were identified. This systematic literature review is valuable in closing the gap between usability and security in software development process, where usability and security engineering needs to be considered for a better quality end-user software.

Бесплатно

Usability of Cloud Computing to Improve Higher Education

Usability of Cloud Computing to Improve Higher Education

Bayan Hashr Alamri, M. Rizwan Jameel Qureshi

Статья научная

Cloud computing as a new paradigm has grown from a promising idea to one of the fastest research and development paradigm in education sector. It is a hot research area that applies in all sectors where we require high performance and fast access to resources and services. Cloud computing usability in education is wide-ranging, as acknowledged by many educational institutions around the world. This paper attempts to address the need for utilizing cloud computing in higher education in Kingdom of Saudi Arabia for all the disciplines to raise its level and solve the obstacles that faced the learning process. In addition, cloud computing facilitates educators and students to be more experienced in cloud computing and it prepares them to get benefits of usefulness to become more motivated and effective. Survey is used as a research design to validate the proposed solution. The results show that the proposal to improve higher education is highly supported by the professionals working in the industry and academia.

Бесплатно

Use of API’s for Comparison of different product information under one roof: analysis using SVM

Use of API’s for Comparison of different product information under one roof: analysis using SVM

Priyanka Desai, G. R. Kulkarni

Статья научная

The internet has grown in leaps and bounds and hence all the data is now available online; be it shopping, banking, private and public institutes or universities, private public sectors are all making their presence felt online. The online data is just a click away thanks to ubiquitous systems today. The browser does not require any specific program set up hence easier for the end user. Earlier the data online was static used HTML now it’s dynamic uses ASP, ASP.NET, Servlet, JSP and other operational tools therefore the internet operation is broken down into many categories. The problem arises with the customer while trying to buy something online. There are lots of online stores sometimes it’s difficult to browse through all products to get a better deal. The pricing of products are different on different sites, this is the first gap at the customer end. The second problem arises at the provider end. The second gap here is to understand the customer need. How can the variation in prices be checked? ; The existing prices available on sites cannot be changed but the customer can be provided with options to select the best deal of the same product. For the first problem the paper deals with an API implementation wherein the information of at least some products is compared under one roof. How can the provider know the genuine customer? ; The second problem is resolved by the use of SVM. Last problem is in detecting if a customer visiting a site will actually buy the product being compared. The paper focuses on the selection of ASP.NET to deal with the implementation problems stated and find solution to the forecasting problem using SVM. SVM and C4.5 are used for comparison.

Бесплатно

Use of project management information system to initiate the quality gate process for ERP implementation

Use of project management information system to initiate the quality gate process for ERP implementation

Atsushi Taniguchi, Masahiko Onosato

Статья научная

Non-conformance to quality in a project often can lead to a major reason for project failure resulted in not meeting the triple constraints of project management, scope, time and cost. To prevent it from happening, a quality check against the standard for quality needs to be conducted at the critical stages of ERP implementation project. Proactive quality management by the quality gate process is embedded in the implementation methodology to help secure quality outcomes for the customers. However, getting the schedule of each quality gate timely fixed by the independent quality reviewer with the project manager of a newly started project can often be problematic without having a systematic approach implemented. Recent research has provided an application with the use of project management information systems (PMIS) for such implementations in improvement of quality management systems requirements [1]. This article describes how PMIS was used to implement the project quality gate process for ERP implementation projects conducted by the solution provider for their customers in the various industries in Japan. PMIS was found to be effective in identifying, notifying and influencing the project managers to timely initiate the quality gate process based on the schedule fixed for each quality gate review.

Бесплатно

Using AHP Method for Educational and Vocational Guidance

Using AHP Method for Educational and Vocational Guidance

Essaid EL HAJI, Abdellah Azmani, Mohamed El Harzli

Статья научная

This work focuses on the use of multi-criteria decision-making method AHP for using in educational and vocational guidance. Analytical Hierarchy Process (AHP), proposed by the mathematician Thomas Saaty in 1980, is a method of analysis greatly used in the context of a multi-criteria analysis; it allows the comparison and the choice between the preset options. To achieve this goal, a vital work, preceded the use of the AHP method, which consists in doing a prototyping of trades according to the guidance criteria and sub-criteria. The IT system based on this method allows the student to find, firstly, the activities' sectors which are the most appropriate to his/her profile, to choose subsequently the trades and finally, to identify, the potential training paths.

Бесплатно

Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

M. Rizwan Jameel Qureshi, Mahaboob Sharief Shaik, Nayyar Iqbal

Статья научная

A new approach, to measure normalization completeness for conceptual model, is introduced using quantitative fuzzy functionality in this paper. We measure the normalization completeness of the conceptual model in two steps. In the first step, different normalization techniques are analyzed up to Boyce Codd Normal Form (BCNF) to find the current normal form of the relation. In the second step, fuzzy membership values are used to scale the normal form between 0 and 1. Case studies to explain schema transformation rules and measurements. Normalization completeness is measured by considering completeness attributes, preventing attributes of the functional dependencies and total number of attributes such as if the functional dependency is non-preventing then the attributes of that functional dependency are completeness attributes. The attributes of functional dependency which prevent to go to the next normal form are called preventing attributes.

Бесплатно

Using Logic Programming to Represent Information Content Inclusion Relations

Using Logic Programming to Represent Information Content Inclusion Relations

Doug Salt, Junkang Feng

Статья научная

Datalog is a widely recognised language for a certain class of deductive databases. Information Content Inclusion Relation (IIR) formulates a general, information theoretic relationship between: data constructs; between data constructs and real world objects, and between real world objects. IIR is particularly concerned with the information that data carry. It would therefore seem desirable to find out whether IIR and reasoning based on IIR may be implemented by using 'safe' Datalog. We present and prove the following theorem: Any database system that can be modelled using IIR can be represented as a 'safe' Datalog program.} This paper explores the nature of the relationship between the two frameworks for representing domains of application, in order that such representations of IIR by 'safe' Datalog can then be used as a tool for the analysis of any site that can be approached with the notion of information content, and in particular any given database, and hence how a database works may be approached in terms of information content of events.

Бесплатно

Using Negative Binomial Regression Analysis to Predict Software Faults: A Study of Apache Ant

Using Negative Binomial Regression Analysis to Predict Software Faults: A Study of Apache Ant

Liguo Yu

Статья научная

Negative binomial regression has been proposed as an approach to predicting fault-prone software modules. However, little work has been reported to study the strength, weakness, and applicability of this method. In this paper, we present a deep study to investigate the effectiveness of using negative binomial regression to predict fault-prone software modules under two different conditions, self-assessment and forward assessment. The performance of negative binomial regression model is also compared with another popular fault prediction model—binary logistic regression method. The study is performed on six versions of an open-source objected-oriented project, Apache Ant. The study shows (1) the performance of forward assessment is better than or at least as same as the performance of self-assessment; (2) in predicting fault-prone modules, negative binomial regression model could not outperform binary logistic regression model; and (3) negative binomial regression is effective in predicting multiple errors in one module.

Бесплатно

Журнал