Recommendation systems have emerged as the most prevailing systems due to the abrupt use of online services during pandemics from past years. Multi-billiondollar industries such as kindle, Alibaba, amazon, Careem, and many other local online applications of grocery and medicine are heavily dependent on these systems. Applications based on machine learning models increase the accuracy and efficiency of the recommendation system and eliminate the possibility of human effort in finding relevant items. Machine learning models learn, recognize patterns, and make decisions with minimal human intervention based on data. We have developed an innovative and novel book recommendation system. We have used a genetic algorithm to enhance the rating of books and find the distance between similar users and recommend books. The Dataset is being used is taken from Amazon web services and it is available on Kaggle as Books.csv.
{"title":"A Hybrid Book Recommendation System Using Genetic Algorithm for Enhancing Book Rating","authors":"†. AqsaMaryum, Fawad Nasim","doi":"10.56536/jicet.v2i2.29","DOIUrl":"https://doi.org/10.56536/jicet.v2i2.29","url":null,"abstract":"Recommendation systems have emerged as the most prevailing systems due to the abrupt use of online services during pandemics from past years. Multi-billiondollar industries such as kindle, Alibaba, amazon, Careem, and many other local online applications of grocery and medicine are heavily dependent on these systems. Applications based on machine learning models increase the accuracy and efficiency of the recommendation system and eliminate the possibility of human effort in finding relevant items. Machine learning models learn, recognize patterns, and make decisions with minimal human intervention based on data. We have developed an innovative and novel book recommendation system. We have used a genetic algorithm to enhance the rating of books and find the distance between similar users and recommend books. The Dataset is being used is taken from Amazon web services and it is available on Kaggle as Books.csv.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we clarify how to fulfil the need of client. When a client has giant idea and he don’t know how to describe it to others than the requirement engineers approach this technique. The involvement of stakeholder to inspect the need of client and give a hint near to his requirement. How the client introduces his idea to company and how the requirement engineer will work on it will be explain in this paper. Client attitude may also a reflection of his requirement. Introspection is basically the self-perception. An organization is responsible for taking care of stakeholder. Once they show their involvement in any organization, it will be grateful for both parties i.e. their business will grow on the power of two. Once the communication is started requirement engineer will use some techniques for gathering requirement. As the stakeholders duties is to operate the organization and they are all connected virtually to each other. So during using techniques, introspection is also very important and without it requirement gathering process won’t be complete. Some organization use groupware tools for gathering requirement. Elicitation technique is also use in this process. Elicitation technique is also known as appropriate and qualitative technique. No attribute is considered in introspection.
{"title":"Requirement introspection and involvement of stakeholder","authors":"","doi":"10.56536/jicet.v2i1.20","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.20","url":null,"abstract":"In this paper, we clarify how to fulfil the need of client. When a client has giant idea and he don’t know how to describe it to others than the requirement engineers approach this technique. The involvement of stakeholder to inspect the need of client and give a hint near to his requirement. How the client introduces his idea to company and how the requirement engineer will work on it will be explain in this paper. Client attitude may also a reflection of his requirement. Introspection is basically the self-perception. An organization is responsible for taking care of stakeholder. Once they show their involvement in any organization, it will be grateful for both parties i.e. their business will grow on the power of two. Once the communication is started requirement engineer will use some techniques for gathering requirement. As the stakeholders duties is to operate the organization and they are all connected virtually to each other. So during using techniques, introspection is also very important and without it requirement gathering process won’t be complete. Some organization use groupware tools for gathering requirement. Elicitation technique is also use in this process. Elicitation technique is also known as appropriate and qualitative technique. No attribute is considered in introspection.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IT and Software industries are the fastest and most improving industries all over the world. Even in countries like India, Pakistan and other development counties the trend of IT and different TECH technologies is rapidly increasing time to time. There is no doubt on the fact that that all the IT and Software industries follows the Software Development Life Cycle (SDLC) for their software or product development process. Following the IT trends it is essential for the industries to follow the SDLC for their software development. The most important and the first step of any software development is Requirement engineering. In short words requirement engineering is the backbone of any software development process, other than that it also provides an estimation from the start that is the project doable in the time given or not. After reading the paper one will be well aware of what software requirement engineering really is and what activities are involved what flaws are made in those activities and the importance of a requirement engineer in any industry. The information is conducted from different software industries. The data is gathered from all source means and is analyzed and refined with different software like Turnitin. The information conducted will be useful for all local and global software industries including other TECH industries.
{"title":"Requirement Engineering Processes, Activities, Flaws, Importance And Review","authors":"","doi":"10.56536/jicet.v2i1.19","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.19","url":null,"abstract":"IT and Software industries are the fastest and most improving industries all over the world. Even in countries like India, Pakistan and other development counties the trend of IT and different TECH technologies is rapidly increasing time to time. There is no doubt on the fact that that all the IT and Software industries follows the Software Development Life Cycle (SDLC) for their software or product development process. Following the IT trends it is essential for the industries to follow the SDLC for their software development. The most important and the first step of any software development is Requirement engineering. In short words requirement engineering is the backbone of any software development process, other than that it also provides an estimation from the start that is the project doable in the time given or not. After reading the paper one will be well aware of what software requirement engineering really is and what activities are involved what flaws are made in those activities and the importance of a requirement engineer in any industry. The information is conducted from different software industries. The data is gathered from all source means and is analyzed and refined with different software like Turnitin. The information conducted will be useful for all local and global software industries including other TECH industries. ","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ideally the use of software is determined by the performance of both its functionality, such as its usefulness, flexibility, functionality, synergy, security. However, there has been a third-party emphasis on software performance, even if the functionality is not helpful or used without he necessary non-functional features. we discuss the state of the art in the design of non-functional requirements (hereafter, NFRs), while providing hope for some future directions.
{"title":"Non-Functional Requirements (Usability, security)","authors":"","doi":"10.56536/jicet.v2i1.18","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.18","url":null,"abstract":"Ideally the use of software is determined by the performance of both its functionality, such as its usefulness, flexibility, functionality, synergy, security. However, there has been a third-party emphasis on software performance, even if the functionality is not helpful or used without he necessary non-functional features. we discuss the state of the art in the design of non-functional requirements (hereafter, NFRs), while providing hope for some future directions.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elicitation technique is the process in which an analyst gather these requirements from the customer, stakeholders and users, who satisfy and fulfill the needs of customer, stakeholders and users. Right requirements are the key of successful project and this key is in the hand of analysts. Because analyst that person who select the elicitation technique. If the analyst select the right technique for the right project then the project will be goes to success otherwise it will be fail.
{"title":"Right Elistication Technique For Right Project","authors":"","doi":"10.56536/jicet.v2i1.24","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.24","url":null,"abstract":"Elicitation technique is the process in which an analyst gather these requirements from the customer, stakeholders and users, who satisfy and fulfill the needs of customer, stakeholders and users. Right requirements are the key of successful project and this key is in the hand of analysts. Because analyst that person who select the elicitation technique. If the analyst select the right technique for the right project then the project will be goes to success otherwise it will be fail.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Current automated software development life cycle was mainly allotting with the automated generation code. That kind of method mostly include in the software combination from model’s design, predetermined polices or the fixed rules. In this paper we discuss about the propose an approach that should went above the SDL automated that should be presenting direct method which is able to make decision and take decision to generate code and software. The ontology do an important part of developer by fulfill the development of software affair freely. [2]Thus behavior catch a database of ontological permit highest level judgement to explain design and incorporate the logic of system depend on the configuration system which is physical system . This kind of method implement in graphical tools. This paper discuss the autonomated ontological form of methodology create the code of according to artificial intelligence
{"title":"Use of Artificial Intelligence in Software Development Life Cycle","authors":"","doi":"10.56536/jicet.v2i1.25","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.25","url":null,"abstract":"Current automated software development life cycle was mainly allotting with the automated generation code. That kind of method mostly include in the software combination from model’s design, predetermined polices or the fixed rules. In this paper we discuss about the propose an approach that should went above the SDL automated that should be presenting direct method which is able to make decision and take decision to generate code and software. The ontology do an important part of developer by fulfill the development of software affair freely. [2]Thus behavior catch a database of ontological permit highest level judgement to explain design and incorporate the logic of system depend on the configuration system which is physical system . This kind of method implement in graphical tools. This paper discuss the autonomated ontological form of methodology create the code of according to artificial intelligence","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131552049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Different stakeholders come together to find the requirements of a software in an organization. While there are many contradicting requirements which can be provided by different stakeholders, they need to be prioritized properly in order to avoid the confusion in the development or requirements elicitation phase.
{"title":"Eliciting Organizational Requirements Using Stakeholder Prioritization","authors":"","doi":"10.56536/jicet.v2i1.17","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.17","url":null,"abstract":"Different stakeholders come together to find the requirements of a software in an organization. While there are many contradicting requirements which can be provided by different stakeholders, they need to be prioritized properly in order to avoid the confusion in the development or requirements elicitation phase.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper summarizes the drawback of elicitation techniques problems and challenges of necessities engineering. necessities engineering is rotten into the want’s stimulation, specification, and validation. Most of the wants techniques nowadays target specification. Elicitation technique for a system is a crucial activity in demand engineering. A stimulation procedure is planned to handle these considerations. Consequently, the results of this paper have given North American country an honest disadvantage our analysis within the space of computer code needs stimulation.
{"title":"Drawbacks of Elicitation Techniques","authors":"","doi":"10.56536/jicet.v1i1.2","DOIUrl":"https://doi.org/10.56536/jicet.v1i1.2","url":null,"abstract":"This paper summarizes the drawback of elicitation techniques problems and challenges of necessities engineering. necessities engineering is rotten into the want’s stimulation, specification, and validation. Most of the wants techniques nowadays target specification. Elicitation technique for a system is a crucial activity in demand engineering. A stimulation procedure is planned to handle these considerations. Consequently, the results of this paper have given North American country an honest disadvantage our analysis within the space of computer code needs stimulation.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115456532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
From the very beginning, mankind is trying to make their things safe and secure from risk of theft. After reading in depth various results of car thief-ting for last many years, Commonly those cars are been theft in the parking areas where there was no proper system to protect those cars. This work is to minimize the risk of vehicle thief-ting after creating a secured car parking system. If we talk about today's modern world, many of procedures are available to minimize or stop car thief-ting. Our Thesis is based on software and hardware application which works on real time environment. We are adopting the face detection technique under the umbrella of image processing which will provide security for public and parking places, Although we know image processing is a vast field in today’s era. This application uses OpenCV programming language C# using the Haar-cascade and more precisely canny pruning libraries for the detection of facial features. Few years back, list of procedures are adopted just to make a secure car parking system. Some procedures were by adopting RFID and many was by capturing the car number plate under the umbrella of image processing and result of these procedures was, they were failed to secure due to many factors. For example lack of accuracy in character reorganization of number plate and information about driver. However, our system is reliable as the probability of dodging is least, which provides security and flexibility to the car owners.
{"title":"SECURED PARKING SYSTEM USING IMAGE PROCESSING","authors":"Ikram Syed, Huma Khan","doi":"10.56536/jicet.v1i2.15","DOIUrl":"https://doi.org/10.56536/jicet.v1i2.15","url":null,"abstract":"From the very beginning, mankind is trying to make their things safe and secure from risk of theft. After reading in depth various results of car thief-ting for last many years, Commonly those cars are been theft in the parking areas where there was no proper system to protect those cars. This work is to minimize the risk of vehicle thief-ting after creating a secured car parking system. If we talk about today's modern world, many of procedures are available to minimize or stop car thief-ting. Our Thesis is based on software and hardware application which works on real time environment. We are adopting the face detection technique under the umbrella of image processing which will provide security for public and parking places, Although we know image processing is a vast field in today’s era. This application uses OpenCV programming language C# using the Haar-cascade and more precisely canny pruning libraries for the detection of facial features. Few years back, list of procedures are adopted just to make a secure car parking system. Some procedures were by adopting RFID and many was by capturing the car number plate under the umbrella of image processing and result of these procedures was, they were failed to secure due to many factors. For example lack of accuracy in character reorganization of number plate and information about driver. However, our system is reliable as the probability of dodging is least, which provides security and flexibility to the car owners.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.
{"title":"Zero-Text Watermarking Method for Embedded of Watermark Originality","authors":"Fahad Sabah, Saleem Butt","doi":"10.56536/jicet.v1i2.11","DOIUrl":"https://doi.org/10.56536/jicet.v1i2.11","url":null,"abstract":"In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}