首页 > 最新文献

International Journal of Information Technology and Computer Science最新文献

英文 中文
Beyond the Hype: A Proposed Model Based on Critical Analysis of Blockchain Technology’s Potential to Address Supply Chain Issues 超越炒作:基于对区块链技术解决供应链问题潜力的批判性分析的拟议模型
Pub Date : 2023-12-08 DOI: 10.5815/ijitcs.2023.06.05
A.S.M. Fazle Rabbi, T.M. Ragib Shahrier, Mushfiqur Rahman Miraz, Sazia Rahman, Dip Nandi
This paper explores the proposed solutions based on blockchain technology's potential to solve supply chain management issues. The problems include lack of traceability and transparency, scalability and cost issues, sustainability, efficiency, patchwork logistics, and bullwhip effect issues. In this paper, we have suggested some solutions with the help of blockchain technology. The solutions can solve multiple significant issues in supply chain management. Our blockchain-based solutions can provide a secure and visible record of all transactions and data along the supply chain, which can improve traceability and transparency, a decentralized and efficient method of data processing and exchange that can also increase scalability and reduce cost, a transparent and accountable way to track and verify sustainability-related data. Our method can enable more streamlined and automated tracking and data sharing, helping to reduce the risk of delays and inefficiencies while mitigating the risk of the bullwhip effect by providing real-time visibility and enabling better communication and collaboration between parties. The paper discusses the implications and challenges of implementing blockchain in supply chain management.
本文探讨了基于区块链技术解决供应链管理问题的潜力的拟议解决方案。这些问题包括缺乏可追溯性和透明度、可扩展性和成本问题、可持续性、效率、拼凑物流和牛鞭效应问题。在本文中,我们利用区块链技术提出了一些解决方案。这些解决方案可以解决供应链管理中的多个重大问题。我们基于区块链的解决方案可以提供供应链上所有交易和数据的安全可见记录,这可以提高可追溯性和透明度,一种分散和有效的数据处理和交换方法,也可以提高可扩展性和降低成本,一种透明和负责任的方式来跟踪和验证与可持续性相关的数据。我们的方法可以实现更精简和自动化的跟踪和数据共享,有助于降低延迟和低效率的风险,同时通过提供实时可见性和实现各方之间更好的沟通和协作,降低牛鞭效应的风险。本文讨论了在供应链管理中实施区块链的影响和挑战。
{"title":"Beyond the Hype: A Proposed Model Based on Critical Analysis of Blockchain Technology’s Potential to Address Supply Chain Issues","authors":"A.S.M. Fazle Rabbi, T.M. Ragib Shahrier, Mushfiqur Rahman Miraz, Sazia Rahman, Dip Nandi","doi":"10.5815/ijitcs.2023.06.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.06.05","url":null,"abstract":"This paper explores the proposed solutions based on blockchain technology's potential to solve supply chain management issues. The problems include lack of traceability and transparency, scalability and cost issues, sustainability, efficiency, patchwork logistics, and bullwhip effect issues. In this paper, we have suggested some solutions with the help of blockchain technology. The solutions can solve multiple significant issues in supply chain management. Our blockchain-based solutions can provide a secure and visible record of all transactions and data along the supply chain, which can improve traceability and transparency, a decentralized and efficient method of data processing and exchange that can also increase scalability and reduce cost, a transparent and accountable way to track and verify sustainability-related data. Our method can enable more streamlined and automated tracking and data sharing, helping to reduce the risk of delays and inefficiencies while mitigating the risk of the bullwhip effect by providing real-time visibility and enabling better communication and collaboration between parties. The paper discusses the implications and challenges of implementing blockchain in supply chain management.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"8 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138586446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Data Mining Techniques for Predicting the Yield of Agricultural Crops 农作物产量预测数据挖掘技术的比较分析
Pub Date : 2023-08-08 DOI: 10.5815/ijitcs.2023.04.03
Utsha Das, Hasan Sanjary Islam, Kakon Paul Avi, Ajmayeen Adil, Dipannyta Nandi
Predicting crop yields is one of the more difficult tasks in the agriculture sector. A fascinating area of research to estimate agricultural productivity has emerged from recent advancements in information technology for agriculture. Crop yield prediction is a technique for estimating crop production based on a variety of factors, including weather conditions and parameters such as temperature, rainfall, fertilizer, and pesticide use. In the world of agriculture, Data mining techniques are extremely popular. In order to predict the crop production for the following year, data mining techniques are employed and evaluated in the agricultural sector. In this paper, we carried out the comparison between Naive Bayes, K-nearest neighbor, Decision Tree, Random Forest, and K-Means clustering algorithms to predict crop yield in order to determine which method is most effective at doing so. The results show which algorithm is better suitable for this particular purpose by comparing these data mining algorithms for agricultural crop production and determining which algorithm is more successful for this outcome.
预测作物产量是农业部门比较困难的任务之一。最近农业信息技术的进步,催生了一个估算农业生产率的引人入胜的研究领域。作物产量预测是一种基于多种因素估计作物产量的技术,包括天气条件和温度、降雨、肥料和农药使用等参数。在农业领域,数据挖掘技术非常流行。为了预测下一年的作物产量,数据挖掘技术被用于农业部门并进行评估。在本文中,我们对朴素贝叶斯、k近邻、决策树、随机森林和k均值聚类算法进行了比较,以确定哪种方法在预测作物产量方面最有效。通过比较这些用于农业作物生产的数据挖掘算法,并确定哪种算法更成功,结果表明哪种算法更适合这一特定目的。
{"title":"Comparative Analysis of Data Mining Techniques for Predicting the Yield of Agricultural Crops","authors":"Utsha Das, Hasan Sanjary Islam, Kakon Paul Avi, Ajmayeen Adil, Dipannyta Nandi","doi":"10.5815/ijitcs.2023.04.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.04.03","url":null,"abstract":"Predicting crop yields is one of the more difficult tasks in the agriculture sector. A fascinating area of research to estimate agricultural productivity has emerged from recent advancements in information technology for agriculture. Crop yield prediction is a technique for estimating crop production based on a variety of factors, including weather conditions and parameters such as temperature, rainfall, fertilizer, and pesticide use. In the world of agriculture, Data mining techniques are extremely popular. In order to predict the crop production for the following year, data mining techniques are employed and evaluated in the agricultural sector. In this paper, we carried out the comparison between Naive Bayes, K-nearest neighbor, Decision Tree, Random Forest, and K-Means clustering algorithms to predict crop yield in order to determine which method is most effective at doing so. The results show which algorithm is better suitable for this particular purpose by comparing these data mining algorithms for agricultural crop production and determining which algorithm is more successful for this outcome.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117152119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CodeUP: A Web Application for Collaborative Question-answering System CodeUP:协同问答系统的Web应用
Pub Date : 2023-08-08 DOI: 10.5815/ijitcs.2023.04.04
Yashi Agarwal, P. Vamsi, Siddhanth Jain, Jayant Goel
The majority of collaborative learning and knowledge sharing (CLKS) platforms are built with numerous communication mediums, team and task management in mind. However, with the CLKS, the Question-Answering (QAs), User profile evaluation based on the quality of answers provided, and feeding of subject or project relevant data are all available. QAs are required for online or offline cooperation between team members or users. To that purpose, this paper presents a web application called CodeUP with features like QA system, Question similarity testing, and user profile rating for boosting communication and cooperation efficiency in CLKS for academic groups and small development teams. CodeUP is intended to be quickly established and step for academic or development groups to collaborate. As the CodeUP application supports the CLKS, it is also an ideal tool for academia and development teams to perform computer supported QA system and knowledge sharing in the sphere of work or study.
大多数协作学习和知识共享(CLKS)平台都是建立在多种沟通媒介、团队和任务管理的基础上的。然而,有了CLKS,问答(QAs)、基于所提供答案质量的用户档案评估以及主题或项目相关数据的提供都是可用的。团队成员或用户之间的在线或离线合作需要qa。为此,本文提出了一个名为CodeUP的web应用程序,它具有诸如QA系统、问题相似度测试和用户档案评级等功能,可以提高学术团体和小型开发团队在CLKS中的沟通和合作效率。CodeUP旨在快速建立并促进学术或开发团队的协作。由于CodeUP应用程序支持CLKS,它也是学术界和开发团队在工作或学习领域执行计算机支持的QA系统和知识共享的理想工具。
{"title":"CodeUP: A Web Application for Collaborative Question-answering System","authors":"Yashi Agarwal, P. Vamsi, Siddhanth Jain, Jayant Goel","doi":"10.5815/ijitcs.2023.04.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.04.04","url":null,"abstract":"The majority of collaborative learning and knowledge sharing (CLKS) platforms are built with numerous communication mediums, team and task management in mind. However, with the CLKS, the Question-Answering (QAs), User profile evaluation based on the quality of answers provided, and feeding of subject or project relevant data are all available. QAs are required for online or offline cooperation between team members or users. To that purpose, this paper presents a web application called CodeUP with features like QA system, Question similarity testing, and user profile rating for boosting communication and cooperation efficiency in CLKS for academic groups and small development teams. CodeUP is intended to be quickly established and step for academic or development groups to collaborate. As the CodeUP application supports the CLKS, it is also an ideal tool for academia and development teams to perform computer supported QA system and knowledge sharing in the sphere of work or study.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122211328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MOTIFSM: Cloudera Motif DNA Finding Algorithm Motif: Cloudera Motif DNA查找算法
Pub Date : 2023-08-08 DOI: 10.5815/ijitcs.2023.04.02
Tahani M. Allam
Many studying systems of gene function work depend on the DNA motif. DNA motifs finding generate a lot of trails which make it complex. Regulation of gene expression is identified according to Transcription Factor Binding Sites (TFBSs). There are different algorithms explained, over the past decades, to get an accurate motif tool. The major problems for these algorithms are on the execution time and the memory size which depend on the probabilistic approaches. Our previous algorithm, called EIMF, is recently proposed to overcome these problems by rearranging data. Because cloud computing involves many resources, the challenge of mapping jobs to infinite computing resources is an NP-hard optimization problem. In this paper, we proposed an Impala framework for solving a motif finding algorithms in single and multi-user based on cloud computing. Also, the comparison between Cloud motif and previous EIMF algorithms is performed in three different motif group. The results obtained the Cloudera motif was a considerable finding algorithms in the experimental group that decreased the execution time and the Memory size, when compared with the previous EIMF algorithms. The proposed MOTIFSM algorithm based on the cloud computing decrease the execution time by 70% approximately in MOTIFSM than EIMF framework. Memory size also is decreased in MOTIFSM about 75% than EIMF.
许多基因功能研究系统的工作都依赖于DNA基序。DNA基序的发现产生了许多轨迹,这使得它变得复杂。基因表达调控是根据转录因子结合位点(TFBSs)来确定的。在过去的几十年里,有不同的算法被解释,以获得准确的主题工具。这些算法的主要问题是执行时间和内存大小,这取决于概率方法。我们之前的算法,称为EIMF,最近被提出通过重新排列数据来克服这些问题。由于云计算涉及许多资源,因此将作业映射到无限计算资源的挑战是一个NP-hard优化问题。本文提出了一种基于云计算的Impala框架,用于解决单用户和多用户的motif查找算法。在三个不同的motif组中,对Cloud motif和以前的EIMF算法进行了比较。结果表明,与以往的EIMF算法相比,实验组的Cloudera motif算法在执行时间和内存大小上都有显著的降低。本文提出的基于云计算的MOTIFSM算法在MOTIFSM框架下的执行时间比EIMF框架减少了约70%。MOTIFSM的内存大小也比EIMF减少了约75%。
{"title":"MOTIFSM: Cloudera Motif DNA Finding Algorithm","authors":"Tahani M. Allam","doi":"10.5815/ijitcs.2023.04.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.04.02","url":null,"abstract":"Many studying systems of gene function work depend on the DNA motif. DNA motifs finding generate a lot of trails which make it complex. Regulation of gene expression is identified according to Transcription Factor Binding Sites (TFBSs). There are different algorithms explained, over the past decades, to get an accurate motif tool. The major problems for these algorithms are on the execution time and the memory size which depend on the probabilistic approaches. Our previous algorithm, called EIMF, is recently proposed to overcome these problems by rearranging data. Because cloud computing involves many resources, the challenge of mapping jobs to infinite computing resources is an NP-hard optimization problem. In this paper, we proposed an Impala framework for solving a motif finding algorithms in single and multi-user based on cloud computing. Also, the comparison between Cloud motif and previous EIMF algorithms is performed in three different motif group. The results obtained the Cloudera motif was a considerable finding algorithms in the experimental group that decreased the execution time and the Memory size, when compared with the previous EIMF algorithms. The proposed MOTIFSM algorithm based on the cloud computing decrease the execution time by 70% approximately in MOTIFSM than EIMF framework. Memory size also is decreased in MOTIFSM about 75% than EIMF.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122237245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Implementation of Modular Reduction by Pseudo-mersenne Primes 伪梅森素数模约的软件实现
Pub Date : 2023-08-08 DOI: 10.5815/ijitcs.2023.04.01
M. Kovtun, V. Kovtun, Oleksandr Stokipnyi, Andrew Okhrimenko
Modern cryptosystems allow the use of operation in prime fields with special kind of modules that can speed up the prime field operation: multiplication, squaring, exponentiation. The authors took into account in the optimizations: the CPU architecture and the multiplicity of the degree of the modulus in relation to the machine word width. As example, shown adopted module reduction algorithms hard-coded for modern CPU in special form of pseudo-Mersenne prime used in MAC algorithm Poly1305, - in electronic signature algorithm EdDSA and - in short message encryption algorithm DSTU 9041. These algorithms have been software implemented on both 32-bit and 64-bit platforms and compared with Barrett modular reduction algorithm for different pseudo-Mersenne and generalized-Mersenne modules. Timings for proposed and Barrett algorithms for different modules are presented and discussed.
现代密码系统允许在素数域中使用特殊类型的模块来加速素数域的运算:乘法、平方、幂。作者在优化中考虑了:CPU的体系结构和多重度的模数与机器字宽的关系。以MAC算法Poly1305、电子签名算法EdDSA、短信加密算法DSTU 9041中使用的伪梅森素数特殊形式为例,采用现代CPU硬编码的模块约简算法。这些算法分别在32位和64位平台上进行了软件实现,并与Barrett模块化约简算法进行了不同伪mersenne和广义mersenne模块的比较。提出并讨论了不同模块的时序和Barrett算法。
{"title":"Software Implementation of Modular Reduction by Pseudo-mersenne Primes","authors":"M. Kovtun, V. Kovtun, Oleksandr Stokipnyi, Andrew Okhrimenko","doi":"10.5815/ijitcs.2023.04.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.04.01","url":null,"abstract":"Modern cryptosystems allow the use of operation in prime fields with special kind of modules that can speed up the prime field operation: multiplication, squaring, exponentiation. The authors took into account in the optimizations: the CPU architecture and the multiplicity of the degree of the modulus in relation to the machine word width. As example, shown adopted module reduction algorithms hard-coded for modern CPU in special form of pseudo-Mersenne prime used in MAC algorithm Poly1305, - in electronic signature algorithm EdDSA and - in short message encryption algorithm DSTU 9041. These algorithms have been software implemented on both 32-bit and 64-bit platforms and compared with Barrett modular reduction algorithm for different pseudo-Mersenne and generalized-Mersenne modules. Timings for proposed and Barrett algorithms for different modules are presented and discussed.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient IoT-based Ubiquitous Networking Service for Smart Cities Using Machine Learning Based Regression Algorithm 基于机器学习回归算法的智慧城市高效物联网泛在网络服务
Pub Date : 2023-06-08 DOI: 10.5815/ijitcs.2023.03.02
P. G., S. N
In recent days, the smart city project has been emerging concept all over the world. In this process, the proper communication between the sensors and the smart devices, and identification of optimal path between sensors and mutation sensors in large geographical area is very difficult. The main objective has been considered to overcome the drawbacks as mentioned above. The proposed algorithm is efficient to provide integrated communication of IoT-based ubiquitous networking (UBN) devices to improve in large geographically distributed area. The data storage capacity and accuracy of sensors and smart devices are enhanced using the proposed algorithm. The communication latency and data pre-processing of IoT-based UBN nodes deployed in smart cities are reduced. The proposed algorithm also analyses the performance of IoT-based UBN nodes by considering geographical testbeds that represent a smart city scenario. The analysis and comparison are carried out by considering the heuristic parameters. The proposed algorithm will also optimize the communication latency and data pre-processing time by analyzing various sensitivity levels by considering the heuristic parameters in different probability of nodes in smart cities. The proposed IoT-based UBN computing devices improve the objective function due to proper integrated communication between the sensors using a machine learning based regression algorithm. The proposed algorithm also identifies the probability sensitivity of optimal path between smart devices in a smart city thereby enhancing the connectivity of mutated sensor nodes. The proposed algorithm also enhances the probability of smart device connectivity to improve the accuracy, flexibility and large geographical coverage using machine learning based regression algorithm.
最近几天,智慧城市项目在世界各地都是新兴的概念。在此过程中,传感器与智能设备之间的正确通信,以及传感器与突变传感器之间的最优路径识别在大地理区域是非常困难的。考虑到主要目标是克服上述缺点。该算法可以有效地提供基于物联网的无处不在网络(UBN)设备的集成通信,以提高其在大地理分布区域的性能。该算法提高了传感器和智能设备的数据存储容量和精度。减少了智慧城市部署物联网UBN节点的通信延迟和数据预处理。该算法还通过考虑代表智慧城市场景的地理测试平台,分析了基于物联网的UBN节点的性能。考虑启发式参数,进行了分析和比较。通过考虑智慧城市中不同节点概率下的启发式参数,分析不同灵敏度级别,优化通信延迟和数据预处理时间。所提出的基于物联网的UBN计算设备使用基于机器学习的回归算法在传感器之间进行适当的集成通信,从而改善了目标函数。该算法还识别了智慧城市中智能设备之间最优路径的概率灵敏度,从而增强了突变传感器节点之间的连通性。该算法还利用基于机器学习的回归算法增强了智能设备连接的概率,以提高准确性、灵活性和大地理覆盖范围。
{"title":"An Efficient IoT-based Ubiquitous Networking Service for Smart Cities Using Machine Learning Based Regression Algorithm","authors":"P. G., S. N","doi":"10.5815/ijitcs.2023.03.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.03.02","url":null,"abstract":"In recent days, the smart city project has been emerging concept all over the world. In this process, the proper communication between the sensors and the smart devices, and identification of optimal path between sensors and mutation sensors in large geographical area is very difficult. The main objective has been considered to overcome the drawbacks as mentioned above. The proposed algorithm is efficient to provide integrated communication of IoT-based ubiquitous networking (UBN) devices to improve in large geographically distributed area. The data storage capacity and accuracy of sensors and smart devices are enhanced using the proposed algorithm. The communication latency and data pre-processing of IoT-based UBN nodes deployed in smart cities are reduced. The proposed algorithm also analyses the performance of IoT-based UBN nodes by considering geographical testbeds that represent a smart city scenario. The analysis and comparison are carried out by considering the heuristic parameters. The proposed algorithm will also optimize the communication latency and data pre-processing time by analyzing various sensitivity levels by considering the heuristic parameters in different probability of nodes in smart cities. The proposed IoT-based UBN computing devices improve the objective function due to proper integrated communication between the sensors using a machine learning based regression algorithm. The proposed algorithm also identifies the probability sensitivity of optimal path between smart devices in a smart city thereby enhancing the connectivity of mutated sensor nodes. The proposed algorithm also enhances the probability of smart device connectivity to improve the accuracy, flexibility and large geographical coverage using machine learning based regression algorithm.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security 提高企业资源规划系统安全性的多因素认证
Pub Date : 2023-06-08 DOI: 10.5815/ijitcs.2023.03.04
Carol W. Kimani, J. Obuhuma, Emily Roche
Universities across the globe have increasingly adopted Enterprise Resource Planning (ERP) systems, a software that provides integrated management of processes and transactions in real-time. These systems contain lots of information hence require secure authentication. Authentication in this case refers to the process of verifying an entity’s or device’s identity, to allow them access to specific resources upon request. However, there have been security and privacy concerns around ERP systems, where only the traditional authentication method of a username and password is commonly used. A password-based authentication approach has weaknesses that can be easily compromised. Cyber-attacks to access these ERP systems have become common to institutions of higher learning and cannot be underestimated as they evolve with emerging technologies. Some universities worldwide have been victims of cyber-attacks which targeted authentication vulnerabilities resulting in damages to the institutions reputations and credibilities. Thus, this research aimed at establishing authentication methods used for ERPs in Kenyan universities, their vulnerabilities, and proposing a solution to improve on ERP system authentication. The study aimed at developing and validating a multi-factor authentication prototype to improve ERP systems security. Multi-factor authentication which combines several authentication factors such as: something the user has, knows, or is, is a new state-of-the-art technology that is being adopted to strengthen systems’ authentication security. This research used an exploratory sequential design that involved a survey of chartered Kenyan Universities, where questionnaires were used to collect data that was later analyzed using descriptive and inferential statistics. Stratified, random and purposive sampling techniques were used to establish the sample size and the target group. The dependent variable for the study was limited to security rating with respect to realization of confidentiality, integrity, availability, and usability while the independent variables were limited to adequacy of security, authentication mechanisms, infrastructure, information security policies, vulnerabilities, and user training. Correlation and regression analysis established vulnerabilities, information security policies, and user training to be having a higher impact on system security. The three variables hence acted as the basis for the proposed multi-factor authentication framework for improve ERP systems security.
全球各地的大学越来越多地采用企业资源规划(ERP)系统,这是一种实时提供流程和事务集成管理的软件。这些系统包含大量信息,因此需要安全认证。在这种情况下,身份验证是指验证实体或设备身份的过程,以允许他们根据请求访问特定的资源。然而,ERP系统存在安全和隐私方面的问题,在这些系统中,通常只使用传统的用户名和密码认证方法。基于密码的身份验证方法存在容易被破坏的弱点。访问这些ERP系统的网络攻击在高等教育机构中已经变得很常见,随着新兴技术的发展,这种攻击不可低估。世界上一些大学已经成为网络攻击的受害者,这些攻击针对身份验证漏洞,导致机构声誉和信誉受损。因此,本研究旨在建立肯尼亚大学ERP系统的认证方法及其漏洞,并提出改进ERP系统认证的解决方案。该研究旨在开发和验证一个多因素认证原型,以提高ERP系统的安全性。多因素身份验证是一种结合了用户拥有、知道或存在等多个身份验证因素的最新技术,用于加强系统的身份验证安全性。本研究采用探索性顺序设计,对肯尼亚特许大学进行调查,使用问卷收集数据,然后使用描述性和推断性统计进行分析。采用分层、随机和有目的抽样技术确定样本量和目标人群。该研究的因变量仅限于与保密性、完整性、可用性和可用性实现相关的安全评级,而自变量仅限于安全性、身份验证机制、基础设施、信息安全策略、漏洞和用户培训的充分性。相关性和回归分析建立了对系统安全性有较大影响的漏洞、信息安全策略和用户培训。因此,这三个变量作为提出的多因素认证框架的基础,以提高ERP系统的安全性。
{"title":"Multi-Factor Authentication for Improved Enterprise Resource Planning Systems Security","authors":"Carol W. Kimani, J. Obuhuma, Emily Roche","doi":"10.5815/ijitcs.2023.03.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.03.04","url":null,"abstract":"Universities across the globe have increasingly adopted Enterprise Resource Planning (ERP) systems, a software that provides integrated management of processes and transactions in real-time. These systems contain lots of information hence require secure authentication. Authentication in this case refers to the process of verifying an entity’s or device’s identity, to allow them access to specific resources upon request. However, there have been security and privacy concerns around ERP systems, where only the traditional authentication method of a username and password is commonly used. A password-based authentication approach has weaknesses that can be easily compromised. Cyber-attacks to access these ERP systems have become common to institutions of higher learning and cannot be underestimated as they evolve with emerging technologies. Some universities worldwide have been victims of cyber-attacks which targeted authentication vulnerabilities resulting in damages to the institutions reputations and credibilities. Thus, this research aimed at establishing authentication methods used for ERPs in Kenyan universities, their vulnerabilities, and proposing a solution to improve on ERP system authentication. The study aimed at developing and validating a multi-factor authentication prototype to improve ERP systems security. Multi-factor authentication which combines several authentication factors such as: something the user has, knows, or is, is a new state-of-the-art technology that is being adopted to strengthen systems’ authentication security. This research used an exploratory sequential design that involved a survey of chartered Kenyan Universities, where questionnaires were used to collect data that was later analyzed using descriptive and inferential statistics. Stratified, random and purposive sampling techniques were used to establish the sample size and the target group. The dependent variable for the study was limited to security rating with respect to realization of confidentiality, integrity, availability, and usability while the independent variables were limited to adequacy of security, authentication mechanisms, infrastructure, information security policies, vulnerabilities, and user training. Correlation and regression analysis established vulnerabilities, information security policies, and user training to be having a higher impact on system security. The three variables hence acted as the basis for the proposed multi-factor authentication framework for improve ERP systems security.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"78 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129713252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Leading Role of Digital Technologies in the Development of the Smart City Concept in Azerbaijan 数字技术在阿塞拜疆智慧城市概念发展中的主导作用
Pub Date : 2023-06-08 DOI: 10.5815/ijitcs.2023.03.05
A. Huseynova, O. Mazanova
The article describes the application of the Smart City concept and the economic opportunities it creates, infrastructure and services, and opportunities to improve governance. The main features of the Smart City concept, development directions and evolution, standards and solutions, and factors and obstacles to its implementation have been analyzed by the author. The experience of different countries in the application of digital technologies is discussed. The article provides the scope and structure of the "smart" market, application stages, and scenarios The international experience in this direction was widely analyzed and examples were shown. The article talks about smart cities, the construction of which has already begun in Azerbaijan. The application of the smart city concept in Azerbaijan has been studied. It is stressed that the spread of digital technologies for the construction of a smart city in Azerbaijan is a prerequisite. The Network Readiness Index (NRI) identifies the indicators that are holding back Azerbaijan in the ranking for 2021.
本文描述了智慧城市概念的应用及其创造的经济机会、基础设施和服务,以及改善治理的机会。分析了智慧城市概念的主要特征、发展方向与演变、标准与解决方案、实施的因素与障碍。讨论了各国在数字技术应用方面的经验。文章提出了“智能”市场的范围和结构、应用阶段和场景,广泛分析了这一方向的国际经验,并举例说明。这篇文章谈到了智慧城市,它的建设已经在阿塞拜疆开始。研究了智慧城市概念在阿塞拜疆的应用。强调数字技术的传播是在阿塞拜疆建设智慧城市的先决条件。网络准备指数(NRI)确定了阻碍阿塞拜疆在2021年排名的指标。
{"title":"The Leading Role of Digital Technologies in the Development of the Smart City Concept in Azerbaijan","authors":"A. Huseynova, O. Mazanova","doi":"10.5815/ijitcs.2023.03.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.03.05","url":null,"abstract":"The article describes the application of the Smart City concept and the economic opportunities it creates, infrastructure and services, and opportunities to improve governance. The main features of the Smart City concept, development directions and evolution, standards and solutions, and factors and obstacles to its implementation have been analyzed by the author. The experience of different countries in the application of digital technologies is discussed. The article provides the scope and structure of the \"smart\" market, application stages, and scenarios The international experience in this direction was widely analyzed and examples were shown. The article talks about smart cities, the construction of which has already begun in Azerbaijan. The application of the smart city concept in Azerbaijan has been studied. It is stressed that the spread of digital technologies for the construction of a smart city in Azerbaijan is a prerequisite. The Network Readiness Index (NRI) identifies the indicators that are holding back Azerbaijan in the ranking for 2021.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124248903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical and Machine Learning Approach for Robust Assessment Modelling of Out-of-School Children Rate: Global Perspective 失学儿童率稳健评估模型的统计和机器学习方法:全球视角
Pub Date : 2023-06-08 DOI: 10.5815/ijitcs.2023.03.01
Edith Edimo Joseph, J. Isabona, Sunday Dare, Odaro Osayande, Okiemute Roberts Omasheye
The negative impact of out-of-school students' problems at the basic and high-school levels is always very weighty on the affected individuals, parents, and society at large. Owing to the weighty negative consequences, policymakers, different government agencies, educators and researchers have long been looking for how to effectively study and forecast the trends as a means of offering a concrete solution to the problem. This paper develops a better hybrid machine learning method, which combines the least square and support vector machine (LS-SVM) model for robust prediction improvement of out-of-school children trend patterns. Particularly, while other previous works only engaged some regional and few samples of out-of-school datasets, this paper focused on long-ranged global out-of-school datasets, collated by UNESCO between 1975- 2020. The proposed hybrid method exhibits the optimal precision accuracies with the LS-SVM model in comparison with ones made using the ordinary SVM model. The precision performance of both LS-SVM and SVM was quantified and a lower NRMSE value is preferred. From the results, the LS-SVM attained lower error values of 0.0164, 0.0221, 0.0268, 0.0209, 0.0158, 0.0201, 0.0147 and 0.0095 0.0188, compared to the SVM model that attained higher NRMSE values of 0.041, ,0.0628, 0.0381, 0.0490, 0.0501, 0.0493, 0.0514, 0.0617 and 0.0646, respectively. By engaging the MAPE indicator, which expresses the mean disconnection between the sourced and predicted values of the out-of-school data. By means of the MAPE, LS-SVM attained lower error values of 0.51, 1.88, 0.82, 2.38, 0.62, 2.55, 0.60, 0.60, 1.63 while SVM attained 1.83, 7.39, 1.79 7.01, 2.43, 8.79, 2.58, 4.13, 6.18. This implies that the LS-SVM model has better precision performance than the SVM model. The results attained in this work can serve as an excellent guide on how to explore hybrid machine-learning techniques to effectively study and predict out-of-school students among researchers and educators.
在小学和高中阶段,失学学生的问题对受影响的个人、父母和整个社会的负面影响总是非常严重的。由于严重的负面影响,政策制定者、不同的政府机构、教育工作者和研究人员长期以来一直在寻找如何有效地研究和预测趋势,作为提供具体解决问题的手段。本文提出了一种更好的混合机器学习方法,将最小二乘和支持向量机(LS-SVM)模型相结合,对失学儿童趋势模式进行鲁棒预测改进。特别是,虽然以前的其他工作只涉及一些区域和少数校外数据集样本,但本文侧重于教科文组织在1975年至2020年期间整理的长期全球校外数据集。与普通支持向量机模型相比,该混合方法具有最佳的精度精度。对LS-SVM和SVM的精度性能进行了量化,建议采用较低的NRMSE值。从结果来看,LS-SVM模型的误差值较低,分别为0.0164、0.0221、0.0268、0.0209、0.0158、0.0201、0.0147和0.0095 0.0188,而SVM模型的误差值较高,分别为0.041、0.0628、0.0381、0.0490、0.0501、0.0493、0.0514、0.0617和0.0646。通过使用MAPE指标,该指标表示校外数据来源值和预测值之间的平均脱节。通过MAPE, LS-SVM的误差值较低,分别为0.51、1.88、0.82、2.38、0.62、2.55、0.60、0.60、1.63,而SVM的误差值分别为1.83、7.39、1.79、7.01、2.43、8.79、2.58、4.13、6.18。这说明LS-SVM模型比SVM模型具有更好的精度性能。在这项工作中获得的结果可以作为一个很好的指南,指导如何探索混合机器学习技术,以有效地研究和预测研究人员和教育工作者中的校外学生。
{"title":"Statistical and Machine Learning Approach for Robust Assessment Modelling of Out-of-School Children Rate: Global Perspective","authors":"Edith Edimo Joseph, J. Isabona, Sunday Dare, Odaro Osayande, Okiemute Roberts Omasheye","doi":"10.5815/ijitcs.2023.03.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.03.01","url":null,"abstract":"The negative impact of out-of-school students' problems at the basic and high-school levels is always very weighty on the affected individuals, parents, and society at large. Owing to the weighty negative consequences, policymakers, different government agencies, educators and researchers have long been looking for how to effectively study and forecast the trends as a means of offering a concrete solution to the problem. This paper develops a better hybrid machine learning method, which combines the least square and support vector machine (LS-SVM) model for robust prediction improvement of out-of-school children trend patterns. Particularly, while other previous works only engaged some regional and few samples of out-of-school datasets, this paper focused on long-ranged global out-of-school datasets, collated by UNESCO between 1975- 2020. The proposed hybrid method exhibits the optimal precision accuracies with the LS-SVM model in comparison with ones made using the ordinary SVM model. The precision performance of both LS-SVM and SVM was quantified and a lower NRMSE value is preferred. From the results, the LS-SVM attained lower error values of 0.0164, 0.0221, 0.0268, 0.0209, 0.0158, 0.0201, 0.0147 and 0.0095 0.0188, compared to the SVM model that attained higher NRMSE values of 0.041, ,0.0628, 0.0381, 0.0490, 0.0501, 0.0493, 0.0514, 0.0617 and 0.0646, respectively. By engaging the MAPE indicator, which expresses the mean disconnection between the sourced and predicted values of the out-of-school data. By means of the MAPE, LS-SVM attained lower error values of 0.51, 1.88, 0.82, 2.38, 0.62, 2.55, 0.60, 0.60, 1.63 while SVM attained 1.83, 7.39, 1.79 7.01, 2.43, 8.79, 2.58, 4.13, 6.18. This implies that the LS-SVM model has better precision performance than the SVM model. The results attained in this work can serve as an excellent guide on how to explore hybrid machine-learning techniques to effectively study and predict out-of-school students among researchers and educators.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"549 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131435892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach 检测和预防常见的Web应用程序漏洞:一个全面的方法
Pub Date : 2023-06-08 DOI: 10.5815/ijitcs.2023.03.03
Najla Odeh, Sherin Hijazi
Web applications are becoming very important in our lives as many sensitive processes depend on them. Therefore, it is critical for safety and invulnerability against malicious attacks. Most studies focus on ways to detect these attacks individually. In this study, we develop a new vulnerability system to detect and prevent vulnerabilities in web applications. It has multiple functions to deal with some recurring vulnerabilities. The proposed system provided the detection and prevention of four types of vulnerabilities, including SQL injection, cross-site scripting attacks, remote code execution, and fingerprinting of backend technologies. We investigated the way worked for every type of vulnerability; then the process of detecting each type of vulnerability; finally, we provided prevention for each type of vulnerability. Which achieved three goals: reduce testing costs, increase efficiency, and safety. The proposed system has been validated through a practical application on a website, and experimental results demonstrate its effectiveness in detecting and preventing security threats. Our study contributes to the field of security by presenting an innovative approach to addressing security concerns, and our results highlight the importance of implementing advanced detection and prevention methods to protect against potential cyberattacks. The significance and research value of this survey lies in its potential to enhance the security of online systems and reduce the risk of data breaches.
Web应用程序在我们的生活中变得非常重要,因为许多敏感的过程都依赖于它们。因此,它对于安全性和抵御恶意攻击的牢固性至关重要。大多数研究都集中在检测这些攻击的方法上。在这项研究中,我们开发了一个新的漏洞系统来检测和预防web应用程序中的漏洞。它具有多个功能来处理一些反复出现的漏洞。该系统提供了SQL注入、跨站脚本攻击、远程代码执行和后端技术指纹识别四种漏洞的检测和预防。我们调查了每种类型的漏洞的工作方式;然后是检测各类漏洞的过程;最后,我们为每种类型的漏洞提供了预防措施。它达到了三个目标:降低检测成本,提高效率和安全性。通过对某网站的实际应用验证了该系统的有效性,实验结果证明了该系统在检测和防范安全威胁方面的有效性。我们的研究通过提出解决安全问题的创新方法,为安全领域做出了贡献,我们的研究结果强调了实施先进的检测和预防方法以防止潜在网络攻击的重要性。这项调查的意义和研究价值在于它有可能增强在线系统的安全性,降低数据泄露的风险。
{"title":"Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach","authors":"Najla Odeh, Sherin Hijazi","doi":"10.5815/ijitcs.2023.03.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.03.03","url":null,"abstract":"Web applications are becoming very important in our lives as many sensitive processes depend on them. Therefore, it is critical for safety and invulnerability against malicious attacks. Most studies focus on ways to detect these attacks individually. In this study, we develop a new vulnerability system to detect and prevent vulnerabilities in web applications. It has multiple functions to deal with some recurring vulnerabilities. The proposed system provided the detection and prevention of four types of vulnerabilities, including SQL injection, cross-site scripting attacks, remote code execution, and fingerprinting of backend technologies. We investigated the way worked for every type of vulnerability; then the process of detecting each type of vulnerability; finally, we provided prevention for each type of vulnerability. Which achieved three goals: reduce testing costs, increase efficiency, and safety. The proposed system has been validated through a practical application on a website, and experimental results demonstrate its effectiveness in detecting and preventing security threats. Our study contributes to the field of security by presenting an innovative approach to addressing security concerns, and our results highlight the importance of implementing advanced detection and prevention methods to protect against potential cyberattacks. The significance and research value of this survey lies in its potential to enhance the security of online systems and reduce the risk of data breaches.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126736125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1