首页 > 最新文献

International Journal of Information Technology and Computer Science最新文献

英文 中文
Development of an Interactive Dashboard for Analyzing Autism Spectrum Disorder (ASD) Data using Machine Learning 使用机器学习分析自闭症谱系障碍(ASD)数据的交互式仪表板的开发
Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.02
A. Saha, Dibakar Barua, Mahbub C. Mishu, Ziad Mohib, Sumaya Binte Zilani Choya
Autism Spectrum Disorder (ASD) is a neuro developmental disorder that affects a person's ability to communicate and interact with others for rest of the life. It affects a person's comprehension and social interactions. Furthermore, people with ASD experience a wide range of symptoms, including difficulties while interacting with others, repeated behaviors, and an inability to function successfully in other areas of everyday life. Autism can be diagnosed at any age and is referred to as a "behavioral disorder" since symptoms usually appear in the life's first two years. The majority of individuals are unfamiliar with the illness and so don't know whether or not a person is disordered. Rather than aiding the sufferer, this typically leads to his or her isolation from society. The problem with ASD starts in childhood and extends into adolescence and adulthood. In this paper, we studied 25 research articles on autism spectrum disorder (ASD) prediction using machine learning techniques. The data and findings of those publications using various approaches and algorithms are analyzed. Techniques are primarily assessed using four publicly accessible non-clinically ASD datasets. We found that support vector machine (SVM) and Convolutional Neural Network (CNN) provides most accurate results compare to other techniques. Therefore, we developed an interactive dashboard using Tableau and Python to analyze Autism data.
自闭症谱系障碍(ASD)是一种神经发育障碍,会影响一个人在余生中与他人沟通和互动的能力。它会影响一个人的理解力和社会交往。此外,患有ASD的人会经历各种各样的症状,包括与他人互动时的困难,重复的行为,以及在日常生活的其他领域无法成功运作。自闭症可以在任何年龄被诊断出来,被称为“行为障碍”,因为症状通常出现在生命的头两年。大多数人不熟悉这种疾病,因此不知道一个人是否患有疾病。这不仅没有帮助患者,而且通常会导致他或她与社会隔离。自闭症谱系障碍的问题始于童年,并延伸到青春期和成年期。在本文中,我们研究了25篇使用机器学习技术预测自闭症谱系障碍(ASD)的研究论文。使用各种方法和算法分析这些出版物的数据和发现。技术评估主要使用四个可公开获取的非临床ASD数据集。我们发现,与其他技术相比,支持向量机(SVM)和卷积神经网络(CNN)提供了最准确的结果。因此,我们使用Tableau和Python开发了一个交互式仪表板来分析自闭症数据。
{"title":"Development of an Interactive Dashboard for Analyzing Autism Spectrum Disorder (ASD) Data using Machine Learning","authors":"A. Saha, Dibakar Barua, Mahbub C. Mishu, Ziad Mohib, Sumaya Binte Zilani Choya","doi":"10.5815/ijitcs.2022.04.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.02","url":null,"abstract":"Autism Spectrum Disorder (ASD) is a neuro developmental disorder that affects a person's ability to communicate and interact with others for rest of the life. It affects a person's comprehension and social interactions. Furthermore, people with ASD experience a wide range of symptoms, including difficulties while interacting with others, repeated behaviors, and an inability to function successfully in other areas of everyday life. Autism can be diagnosed at any age and is referred to as a \"behavioral disorder\" since symptoms usually appear in the life's first two years. The majority of individuals are unfamiliar with the illness and so don't know whether or not a person is disordered. Rather than aiding the sufferer, this typically leads to his or her isolation from society. The problem with ASD starts in childhood and extends into adolescence and adulthood. In this paper, we studied 25 research articles on autism spectrum disorder (ASD) prediction using machine learning techniques. The data and findings of those publications using various approaches and algorithms are analyzed. Techniques are primarily assessed using four publicly accessible non-clinically ASD datasets. We found that support vector machine (SVM) and Convolutional Neural Network (CNN) provides most accurate results compare to other techniques. Therefore, we developed an interactive dashboard using Tableau and Python to analyze Autism data.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131961519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment Client-server环境下基于智能手机的门禁管理生物认证方案
Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.04
S. A. Lone, A. H. Mir
As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual attempting to ascertain is the individual in question. Thus, resulting in a more reliable, usable, and cost-effective model with a higher level of protection to deter an attacker from obtaining entry to a computer or network and gaining access to confidential data. This paper introduces a novel fingerprint-based authentication scheme for mobile environments, enabling user authentication based on fingerprint features using a challenge-response-based authentication process. In this study, the proposed authentication system has been developed on a real Android-based smartphone, tested on actual users, and performance analysis has been carried out; empirical results reveal that the proposed authentication scheme achieves increased performance. Moreover, a usability analysis has been done to determine efficiency, effectiveness, and user satisfaction. The evaluation results indicate its feasibility to use it as an effective authentication mechanism for mobile phone environments.
随着智能手机、云、物联网和无处不在的计算融合在一起的信息继续以惊人的速度增长,数据泄露也在增加。如今,用户的强认证和授权方法对于保护敏感、机密和秘密信息变得越来越重要。电脑、互联网、电子邮件帐户等的拥有权和以知识为基础的认证技术,通常被用来获取重要信息;它们不会将用户链接到已建立的身份,从而导致大多数安全漏洞。另一方面,生物特征认证具有比传统认证更可靠的特权,因为一个人的生物特征不会丢失;它们很难分发、交换或复制;它要求用户在身份验证过程中在场,从而将用户与已建立的身份联系起来。生物识别技术提供了更高层次的保证,即试图确定的个人就是有问题的个人。因此,产生了一个更可靠、可用和经济高效的模型,具有更高级别的保护,以阻止攻击者进入计算机或网络并获得对机密数据的访问权。本文介绍了一种新的移动环境下基于指纹的身份验证方案,利用基于挑战-响应的身份验证过程,实现了基于指纹特征的用户身份验证。在本研究中,所提出的认证系统在真实的android智能手机上进行了开发,对实际用户进行了测试,并进行了性能分析;实验结果表明,提出的认证方案提高了认证性能。此外,还进行了可用性分析,以确定效率、有效性和用户满意度。评估结果表明,该方法可以作为一种有效的移动电话环境认证机制。
{"title":"Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment","authors":"S. A. Lone, A. H. Mir","doi":"10.5815/ijitcs.2022.04.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.04","url":null,"abstract":"As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual attempting to ascertain is the individual in question. Thus, resulting in a more reliable, usable, and cost-effective model with a higher level of protection to deter an attacker from obtaining entry to a computer or network and gaining access to confidential data. This paper introduces a novel fingerprint-based authentication scheme for mobile environments, enabling user authentication based on fingerprint features using a challenge-response-based authentication process. In this study, the proposed authentication system has been developed on a real Android-based smartphone, tested on actual users, and performance analysis has been carried out; empirical results reveal that the proposed authentication scheme achieves increased performance. Moreover, a usability analysis has been done to determine efficiency, effectiveness, and user satisfaction. The evaluation results indicate its feasibility to use it as an effective authentication mechanism for mobile phone environments.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114054783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN 基于RFID的车辆收费系统的UML和SPN定量分析
Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.03
R. Khan
This paper focuses on the quantitative analysis of RFID based vehicle toll collection system. Since we conduct the quantitative analysis long before the implementation of the infrastructure, the approach is realized by the UML and SPN to capture the system dynamics and carry out multiple performance tests of the possible infrastructure. Thus, the performance tests ensure the installation of correct number of RFID vehicle toll collection booth in the entrance of a bridge or a highway so that the traffic congestion can be kept as minimal as possible as well as financial viability can be confirmed. We analyze the response time and throughput to know the maximum limit for the diverse number of arrival vehicles that is served by the different number of toll booths. This finally gives us a better understanding of the number of units necessary for toll collection to decrease the traffic congestion in a budget constraint manner.
本文主要对基于RFID的车辆收费系统进行了定量分析。由于我们在基础结构的实现之前进行了定量分析,因此UML和SPN实现了该方法,以捕获系统动态并执行可能的基础结构的多个性能测试。因此,性能测试确保在桥梁或高速公路入口处安装正确数量的RFID车辆收费站,从而尽可能减少交通拥堵,并确认财务可行性。我们分析了响应时间和吞吐量,以了解不同数量的收费站服务的不同数量的到达车辆的最大限制。这最终使我们能够更好地理解在预算约束的情况下,为减少交通拥堵而收取通行费所需的单位数量。
{"title":"Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN","authors":"R. Khan","doi":"10.5815/ijitcs.2022.04.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.03","url":null,"abstract":"This paper focuses on the quantitative analysis of RFID based vehicle toll collection system. Since we conduct the quantitative analysis long before the implementation of the infrastructure, the approach is realized by the UML and SPN to capture the system dynamics and carry out multiple performance tests of the possible infrastructure. Thus, the performance tests ensure the installation of correct number of RFID vehicle toll collection booth in the entrance of a bridge or a highway so that the traffic congestion can be kept as minimal as possible as well as financial viability can be confirmed. We analyze the response time and throughput to know the maximum limit for the diverse number of arrival vehicles that is served by the different number of toll booths. This finally gives us a better understanding of the number of units necessary for toll collection to decrease the traffic congestion in a budget constraint manner.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions 尼日利亚本地云计算服务的采用:挑战和解决方案
Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.01
Emoghene Ogidiaka, F. Ogwueleka, Martins E. Irhebhude, Ugochi Orji
Cloud momentum seems unstoppable in Nigeria, as businesses and organizations in the country see less and less advantage in the slog of maintaining their infrastructure. The shift to the cloud in today's COVID-19 driven world has created an opportunity for investments to improve local cloud computing services. However, there are key challenges that must be addressed by the local cloud service providers in the country in order not to lose out to the foreign cloud service providers. This paper assessed the challenges to local cloud computing services adoption among sixty-seven (67) businesses and organizations in Nigeria. The research employed a non-probability purposive sampling approach. The surveyed data were obtained through an online form which was distributed via Linkedln. Descriptive and inferential analysis was used in analyzing the collected data via IBM SPSS software. Findings from the research showed the key challenges to include inadequate awareness of local cloud service vendors, poor innovation and local content, inadequate cloud infrastructure, local cloud vendor interoperability issue, national insecurity, shortages in skilled personnel, Service Level Agreement (SLA), security strategies, privacy, compliance terms, and requirements issues. Thus, adequate local cloud service offerings, skilled personnel, and the IT infrastructural backbone of the country have to be well established to increase the trust in local cloud computing, open up Nigeria to offshore markets while driving economic competitiveness and growth.
在尼日利亚,云计算的势头似乎不可阻挡,因为该国的企业和组织在维护基础设施的过程中越来越看不到优势。在COVID-19驱动的当今世界,向云计算的转变为改善本地云计算服务的投资创造了机会。然而,为了不输给外国云服务提供商,该国的本地云服务提供商必须应对一些关键挑战。本文评估了尼日利亚67家企业和组织采用本地云计算服务所面临的挑战。本研究采用非概率目的抽样方法。调查数据是通过linkedin分发的在线表格获得的。采用IBM SPSS软件对收集的数据进行描述性和推理性分析。研究结果显示,主要挑战包括对本地云服务供应商的认识不足、创新和本地内容不足、云基础设施不足、本地云供应商互操作性问题、国家不安全、熟练人员短缺、服务水平协议(SLA)、安全策略、隐私、合规条款和需求问题。因此,必须建立足够的本地云服务产品、技术人员和该国的IT基础设施骨干,以增加对本地云计算的信任,向离岸市场开放尼日利亚,同时推动经济竞争力和增长。
{"title":"Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions","authors":"Emoghene Ogidiaka, F. Ogwueleka, Martins E. Irhebhude, Ugochi Orji","doi":"10.5815/ijitcs.2022.04.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.01","url":null,"abstract":"Cloud momentum seems unstoppable in Nigeria, as businesses and organizations in the country see less and less advantage in the slog of maintaining their infrastructure. The shift to the cloud in today's COVID-19 driven world has created an opportunity for investments to improve local cloud computing services. However, there are key challenges that must be addressed by the local cloud service providers in the country in order not to lose out to the foreign cloud service providers. This paper assessed the challenges to local cloud computing services adoption among sixty-seven (67) businesses and organizations in Nigeria. The research employed a non-probability purposive sampling approach. The surveyed data were obtained through an online form which was distributed via Linkedln. Descriptive and inferential analysis was used in analyzing the collected data via IBM SPSS software. Findings from the research showed the key challenges to include inadequate awareness of local cloud service vendors, poor innovation and local content, inadequate cloud infrastructure, local cloud vendor interoperability issue, national insecurity, shortages in skilled personnel, Service Level Agreement (SLA), security strategies, privacy, compliance terms, and requirements issues. Thus, adequate local cloud service offerings, skilled personnel, and the IT infrastructural backbone of the country have to be well established to increase the trust in local cloud computing, open up Nigeria to offshore markets while driving economic competitiveness and growth.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114909223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating Preference Changes through Users’ Input in Collaborative Filtering Movie Recommender System 协同过滤电影推荐系统中用户输入的偏好变化
Pub Date : 2022-08-08 DOI: 10.5815/ijitcs.2022.04.05
Abba Almu, Aliyu Ahmad, A. Roko, M. Aliyu
The usefulness of Collaborative filtering recommender system is affected by its ability to capture users' preference changes on the recommended items during recommendation process. This makes it easy for the system to satisfy users' interest over time providing good and quality recommendations. The Existing system studied fails to solicit for user inputs on the recommended items and it is also unable to incorporate users' preference changes with time which lead to poor quality recommendations. In this work, an Enhanced Movie Recommender system that recommends movies to users is presented to improve the quality of recommendations. The system solicits for users' inputs to create a user profiles. It then incorporates a set of new features (such as age and genre) to be able to predict user's preference changes with time. This enabled it to recommend movies to the users based on users new preferences. The experimental study conducted on Netflix and Movielens datasets demonstrated that, compared to the existing work, the proposed work improved the recommendation results to the users based on the values of Precision and RMSE obtained in this study which in turn returns good recommendations to the users.
协同过滤推荐系统能否捕捉用户在推荐过程中对推荐项目的偏好变化,影响了协同过滤推荐系统的有效性。这使得系统很容易满足用户的兴趣,随着时间的推移,提供良好和高质量的建议。所研究的现有系统未能征求用户对推荐项目的输入,也无法考虑用户偏好随时间的变化,导致推荐质量较差。在这项工作中,提出了一个增强的电影推荐系统,向用户推荐电影,以提高推荐的质量。系统征求用户的输入以创建用户配置文件。然后,它结合了一系列新功能(如年龄和类型),从而能够预测用户偏好随时间的变化。这使得它能够根据用户的新偏好向用户推荐电影。在Netflix和Movielens数据集上进行的实验研究表明,与现有工作相比,本文提出的工作根据本文获得的Precision和RMSE值改进了对用户的推荐结果,从而向用户返回了良好的推荐。
{"title":"Incorporating Preference Changes through Users’ Input in Collaborative Filtering Movie Recommender System","authors":"Abba Almu, Aliyu Ahmad, A. Roko, M. Aliyu","doi":"10.5815/ijitcs.2022.04.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.04.05","url":null,"abstract":"The usefulness of Collaborative filtering recommender system is affected by its ability to capture users' preference changes on the recommended items during recommendation process. This makes it easy for the system to satisfy users' interest over time providing good and quality recommendations. The Existing system studied fails to solicit for user inputs on the recommended items and it is also unable to incorporate users' preference changes with time which lead to poor quality recommendations. In this work, an Enhanced Movie Recommender system that recommends movies to users is presented to improve the quality of recommendations. The system solicits for users' inputs to create a user profiles. It then incorporates a set of new features (such as age and genre) to be able to predict user's preference changes with time. This enabled it to recommend movies to the users based on users new preferences. The experimental study conducted on Netflix and Movielens datasets demonstrated that, compared to the existing work, the proposed work improved the recommendation results to the users based on the values of Precision and RMSE obtained in this study which in turn returns good recommendations to the users.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hierarchical Document Clustering Framework on Large TREC Biomedical Documents 大型TREC生物医学文档的层次化聚类框架
Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.02
P. Kumari, M. Jeeva, C. Satyanarayana
The growth of microblogging sites such as Biomedical, biomedical, defect, or bug databases makes it difficult for web users to share and express their context identification of sequential key phrases and their categories on text clustering applications. In the traditional document classification and clustering models, the features associated with TREC texts are more complex to analyze. Finding relevant feature-based key phrase patterns in the large collection of unstructured documents is becoming increasingly difficult, as the repository's size increases. The purpose of this study is to develop and implement a new hierarchical document clustering framework on a large TREC data repository. A document feature selection and clustered model are used to identify and extract MeSH related documents from TREC biomedical clinical benchmark datasets. Efficiencies of the proposed model are indicated in terms of computational memory, accuracy, and error rate, as demonstrated by experimental results.
诸如生物医学、生物医学、缺陷或bug数据库等微博站点的增长使得web用户难以在文本聚类应用程序上共享和表达他们对顺序关键短语及其类别的上下文识别。在传统的文档分类和聚类模型中,与TREC文本相关的特征分析更为复杂。随着存储库大小的增加,在大量非结构化文档中查找相关的基于特性的关键短语模式变得越来越困难。本研究的目的是在大型TREC数据存储库上开发和实现一个新的分层文档聚类框架。采用文档特征选择和聚类模型从TREC生物医学临床基准数据集中识别和提取MeSH相关文档。实验结果表明,该模型在计算内存、准确性和错误率方面具有较高的效率。
{"title":"A Novel Hierarchical Document Clustering Framework on Large TREC Biomedical Documents","authors":"P. Kumari, M. Jeeva, C. Satyanarayana","doi":"10.5815/ijitcs.2022.03.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.02","url":null,"abstract":"The growth of microblogging sites such as Biomedical, biomedical, defect, or bug databases makes it difficult for web users to share and express their context identification of sequential key phrases and their categories on text clustering applications. In the traditional document classification and clustering models, the features associated with TREC texts are more complex to analyze. Finding relevant feature-based key phrase patterns in the large collection of unstructured documents is becoming increasingly difficult, as the repository's size increases. The purpose of this study is to develop and implement a new hierarchical document clustering framework on a large TREC data repository. A document feature selection and clustered model are used to identify and extract MeSH related documents from TREC biomedical clinical benchmark datasets. Efficiencies of the proposed model are indicated in terms of computational memory, accuracy, and error rate, as demonstrated by experimental results.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127393274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontologies as Building Blocks of Cloud Security 本体作为云安全的构建块
Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.05
N. Shaikh, Affan Yasin, R. Fatima
Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS. Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.
就像其他处理领域一样,云计算并不一定安全。云处理的安全性需要与云处理的任何其他方面同样的关注。网络世界正在转向本体论技术和web 3.0或网络语义的安全。随着资源数量和访问权限的增加,云主机服务器在安全性方面需要更多的关注。在云环境中,安全措施必须更加广泛。语义网通常是基于本体的网络科学的一场新革命。本体论在计算领域受到了极大的关注,因此在安全领域也是如此。本文回顾了不同的“以本体为中心的技术”,并对这些策略进行了综合分析。本文对不同作者和研究人员提出的不同模型进行了批判性分析,以确保基于云的环境的安全性。这种分析可以帮助不同的云技术供应商调整一个或所有这些模型,以便在他们的云机器中实际实现,无论他们提供的是IaaS、PaaS还是SaaS。基于本研究,还可以提出使用本体的任何新的安全模型,因为本文对先前提出的用于监控云环境安全状态的本体进行了安全或恶意的全面比较。
{"title":"Ontologies as Building Blocks of Cloud Security","authors":"N. Shaikh, Affan Yasin, R. Fatima","doi":"10.5815/ijitcs.2022.03.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.05","url":null,"abstract":"Much like other processing domains, cloud computing is not surely safe. Security of cloud processing needs the same attention as any other aspect of cloud processing requires. Cyber world is shifting toward ontological technique and web 3.0 or web semantics for security. Cloud hosts servers demand more attention in context of security as number of resources and their access increases. Security measures have to be more extensive in cloud. Semantic web is usually new revolution inside the web science, which usually works upon base of ontologies. Ontologies are receiving great attention in the domain of computing and hence in the domain of security. This review paper examines different proposed “ontology centered techniques” and also provides a comprehensive analysis on these tactics. This research paper gives critical analysis of different models presented by different authors and researchers for ensuring security of a cloud based environment. This analysis helps different vendors of cloud technology to adapt one or all of these models to practically implement in their cloud machines whether they are offering IaaS, PaaS or SaaS. Any new security model using ontologies can also be proposed based on this study, as this paper gives a comprehensive comparison of the previously proposed ontologies for monitoring security state of cloud environment as safe or malicious.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132919890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Development of a Mobile-Based Hostel Location and Recommendation Chatbot System 基于移动的旅舍定位与推荐聊天机器人系统的开发
Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.03
F. Isinkaye, Imran Gbolahan AbiodunBabs, M. Paul
A Chabot is a conversational intelligent agent that has the capability of engaging in human-like interaction with its users. A lot of chatbots have been developed, but to the best of our knowledge, there are few or no chatbots that have been developed for hostel location integrated with a recommendation component to ease the cost, time, and stress of identifying suitable hostels for students, especially at higher institutions of learning. Therefore, this work develops a location-based chatbot system enhanced with recommendation capabilities to allow students to locate hostels that satisfy their needs in an easy and efficient way. The chatbot system was designed as a cross platform compatibility application with different tools and technologies which include Python, HTML and CSS with JavaScript to enhance the interactivity and attractiveness of the system. PHP provides access to MySQL database. The chatbot system provides good experience to its users in terms of loading speed, user friendliness, interface appearance, platform compatibility and recommendation accuracy as it allows them identify suitable hostel speedily and as well provides personalized recommendation of hostels to them.
Chabot是一种会话智能代理,具有与用户进行类似人类交互的能力。目前已经开发了很多聊天机器人,但据我们所知,很少有或没有为宿舍位置开发的聊天机器人集成了推荐组件,以减轻为学生确定合适宿舍的成本、时间和压力,特别是在高等院校。因此,本工作开发了一个基于位置的聊天机器人系统,增强了推荐功能,使学生能够以简单有效的方式找到满足他们需求的宿舍。聊天机器人系统被设计成跨平台兼容的应用程序,使用了不同的工具和技术,包括Python、HTML、CSS和JavaScript,以增强系统的交互性和吸引力。PHP提供对MySQL数据库的访问。聊天机器人系统在加载速度、用户友好度、界面外观、平台兼容性、推荐准确性等方面为用户提供了良好的体验,可以让用户快速识别合适的旅馆,并提供个性化的旅馆推荐。
{"title":"Development of a Mobile-Based Hostel Location and Recommendation Chatbot System","authors":"F. Isinkaye, Imran Gbolahan AbiodunBabs, M. Paul","doi":"10.5815/ijitcs.2022.03.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.03","url":null,"abstract":"A Chabot is a conversational intelligent agent that has the capability of engaging in human-like interaction with its users. A lot of chatbots have been developed, but to the best of our knowledge, there are few or no chatbots that have been developed for hostel location integrated with a recommendation component to ease the cost, time, and stress of identifying suitable hostels for students, especially at higher institutions of learning. Therefore, this work develops a location-based chatbot system enhanced with recommendation capabilities to allow students to locate hostels that satisfy their needs in an easy and efficient way. The chatbot system was designed as a cross platform compatibility application with different tools and technologies which include Python, HTML and CSS with JavaScript to enhance the interactivity and attractiveness of the system. PHP provides access to MySQL database. The chatbot system provides good experience to its users in terms of loading speed, user friendliness, interface appearance, platform compatibility and recommendation accuracy as it allows them identify suitable hostel speedily and as well provides personalized recommendation of hostels to them.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114140564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay and Energy Optimized Safety Information Dissemination Scheme in V2I Networks V2I网络中时延和能量优化的安全信息传播方案
Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.04
Ramesh B. Koti, M. Kakkasageri
Intelligent Transport System (ITS) is a transport system that uses communicating technologies such as cellular network communication, digital video broadcasting and adhoc wireless communication to link people on the road, vehicles with aim of solving various traffic related issues. Vehicle to infrastructure (V2I) communication is an important research area to develop cooperative self-driving support system using DSRC technology. V2I develops an environment friendly system that also accelerates the fuel efficiency by establishing high quality links between vehicles to roadside infrastructure. It is a system to prevent and help drivers to overlooking or missing the red lights at junctions. V2I system along the road side and intersections continuously transmit the traffic signal information to vehicles by warning the driver about red lights and thus help us to prevent road rule violations. ITS helps to prevent drivers' oversight about signals right/left turn collision avoidance and timely activation of brake system. In the proposed work we used a three-layer Vehicle to Infrastructure (V2I) network architecture to collect and disseminate the safety information using static and dynamic agents. These methods help us to quickly selecting high quality error free links to forward the data packets. In a highway road scenario with moderate traffic density, the proposed system gives an improved performance in terms of coverage area, lossless transmission and reduced latency. Finally, qualitative comparison is made with present V2I system and found significance improvement in its performance metrics. The outcome of the proposed system improved by 23%, 13%, 15% compared to the existing system in terms of end-to-end delay, communication overhead and energy consumption respectively considering V2I network architecture.
智能交通系统(ITS)是一种利用蜂窝网络通信、数字视频广播和自组织无线通信等通信技术将道路上的人、车辆连接起来,以解决各种交通相关问题的交通系统。车与基础设施(V2I)通信是利用DSRC技术开发协同自动驾驶支持系统的重要研究领域。V2I开发了一种环境友好型系统,通过在车辆与路边基础设施之间建立高质量的联系,提高了燃油效率。这是一个防止和帮助司机忽视或错过路口红灯的系统。路边和十字路口的V2I系统不断向车辆传递交通信号信息,提醒驾驶员注意红灯,从而帮助我们防止违反道路规则。智能交通系统有助于防止驾驶员忽视右/左转弯信号,避免碰撞和及时启动制动系统。在提出的工作中,我们使用三层车辆到基础设施(V2I)网络架构,使用静态和动态代理来收集和传播安全信息。这些方法可以帮助我们快速选择高质量的无差错链路来转发数据包。在中等交通密度的高速公路场景中,该系统在覆盖面积、无损传输和降低延迟方面具有更好的性能。最后,与现有V2I系统进行了定性比较,发现其性能指标有了显著改善。考虑V2I网络架构,与现有系统相比,所提出的系统在端到端延迟、通信开销和能耗方面分别提高了23%、13%和15%。
{"title":"Delay and Energy Optimized Safety Information Dissemination Scheme in V2I Networks","authors":"Ramesh B. Koti, M. Kakkasageri","doi":"10.5815/ijitcs.2022.03.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.04","url":null,"abstract":"Intelligent Transport System (ITS) is a transport system that uses communicating technologies such as cellular network communication, digital video broadcasting and adhoc wireless communication to link people on the road, vehicles with aim of solving various traffic related issues. Vehicle to infrastructure (V2I) communication is an important research area to develop cooperative self-driving support system using DSRC technology. V2I develops an environment friendly system that also accelerates the fuel efficiency by establishing high quality links between vehicles to roadside infrastructure. It is a system to prevent and help drivers to overlooking or missing the red lights at junctions. V2I system along the road side and intersections continuously transmit the traffic signal information to vehicles by warning the driver about red lights and thus help us to prevent road rule violations. ITS helps to prevent drivers' oversight about signals right/left turn collision avoidance and timely activation of brake system. In the proposed work we used a three-layer Vehicle to Infrastructure (V2I) network architecture to collect and disseminate the safety information using static and dynamic agents. These methods help us to quickly selecting high quality error free links to forward the data packets. In a highway road scenario with moderate traffic density, the proposed system gives an improved performance in terms of coverage area, lossless transmission and reduced latency. Finally, qualitative comparison is made with present V2I system and found significance improvement in its performance metrics. The outcome of the proposed system improved by 23%, 13%, 15% compared to the existing system in terms of end-to-end delay, communication overhead and energy consumption respectively considering V2I network architecture.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127200386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reliability Assessment for Open-Source Software Using Deterministic and Probabilistic Models 基于确定性和概率模型的开源软件可靠性评估
Pub Date : 2022-06-08 DOI: 10.5815/ijitcs.2022.03.01
Islam S. Ramadan, H. Harb, Hamdy M. Mousa, Mohammed G. Malhat
Nowadays, computer software plays a significant role in all fields of our life. Essentially open-source software provides economic benefits for software companies such that it allows building new software without the need to create it from scratch. Therefore, it is extremely used, and accordingly, open-source software’s quality is a critical issue and one of the top research directions in the literature. In the development cycles of the software, checking the software reliability is an important indicator to release software or not. The deterministic and probabilistic models are the two main categories of models used to assess software reliability. In this paper, we perform a comparative study between eight different software reliability models: two deterministic models, and six probabilistic models based on three different methodologies: perfect debugging, imperfect debugging, and Gompertz distribution. We evaluate the employed models using three versions of a standard open-source dataset which is GNU’s Not Unix Network Object Model Environment projects. We evaluate the employed models using four evaluation criteria: sum of square error, mean square error, R-square, and reliability. The experimental results showed that for the first version of the open-source dataset SRGM-4 based on imperfect debugging methodology achieved the best reliability result, and for the last two versions of the open-source dataset SRGM-6 based on Gompertz distribution methodology achieved the best reliability result in terms of sum of square error, mean square error, and R-square.
如今,计算机软件在我们生活的各个领域起着重要的作用。从本质上讲,开源软件为软件公司提供了经济利益,因为它允许开发新软件而无需从头开始创建。因此,它被广泛使用,因此,开源软件的质量是一个关键问题,也是文献研究的前沿方向之一。在软件的开发周期中,检查软件的可靠性是决定是否发布软件的重要指标。确定性模型和概率模型是用于软件可靠性评估的两大类模型。在本文中,我们对八种不同的软件可靠性模型进行了比较研究:两种确定性模型和六种基于三种不同方法的概率模型:完全调试、不完全调试和Gompertz分布。我们使用三个版本的标准开源数据集来评估所使用的模型,该数据集是GNU的非Unix网络对象模型环境项目。我们使用四个评价标准来评价所采用的模型:平方和误差、均方误差、r平方和可靠性。实验结果表明,对于第一个版本的开源数据集,基于不完全调试方法的SRGM-4获得了最好的可靠性结果;对于后两个版本的开源数据集,基于Gompertz分布方法的SRGM-6在平方和误差、均方误差和r平方方面获得了最好的可靠性结果。
{"title":"Reliability Assessment for Open-Source Software Using Deterministic and Probabilistic Models","authors":"Islam S. Ramadan, H. Harb, Hamdy M. Mousa, Mohammed G. Malhat","doi":"10.5815/ijitcs.2022.03.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.03.01","url":null,"abstract":"Nowadays, computer software plays a significant role in all fields of our life. Essentially open-source software provides economic benefits for software companies such that it allows building new software without the need to create it from scratch. Therefore, it is extremely used, and accordingly, open-source software’s quality is a critical issue and one of the top research directions in the literature. In the development cycles of the software, checking the software reliability is an important indicator to release software or not. The deterministic and probabilistic models are the two main categories of models used to assess software reliability. In this paper, we perform a comparative study between eight different software reliability models: two deterministic models, and six probabilistic models based on three different methodologies: perfect debugging, imperfect debugging, and Gompertz distribution. We evaluate the employed models using three versions of a standard open-source dataset which is GNU’s Not Unix Network Object Model Environment projects. We evaluate the employed models using four evaluation criteria: sum of square error, mean square error, R-square, and reliability. The experimental results showed that for the first version of the open-source dataset SRGM-4 based on imperfect debugging methodology achieved the best reliability result, and for the last two versions of the open-source dataset SRGM-6 based on Gompertz distribution methodology achieved the best reliability result in terms of sum of square error, mean square error, and R-square.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125749216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1