首页 > 最新文献

Journal of Innovative Computing and Emerging Technologies最新文献

英文 中文
A Hybrid Book Recommendation System Using Genetic Algorithm for Enhancing Book Rating 基于遗传算法提高图书评级的混合图书推荐系统
Pub Date : 2021-09-05 DOI: 10.56536/jicet.v2i2.29
†. AqsaMaryum, Fawad Nasim
Recommendation systems have emerged as the most prevailing systems due to the abrupt use of online services during pandemics from past years. Multi-billiondollar industries such as kindle, Alibaba, amazon, Careem, and many other local online applications of grocery and medicine are heavily dependent on these systems. Applications based on machine learning models increase the accuracy and efficiency of the recommendation system and eliminate the possibility of human effort in finding relevant items. Machine learning models learn, recognize patterns, and make decisions with minimal human intervention based on data. We have developed an innovative and novel book recommendation system. We have used a genetic algorithm to enhance the rating of books and find the distance between similar users and recommend books. The Dataset is being used is taken from Amazon web services and it is available on Kaggle as Books.csv.
由于在过去几年中大流行期间突然使用在线服务,推荐系统已成为最普遍的系统。数十亿美元的行业,如kindle、阿里巴巴、亚马逊、Careem,以及许多其他本地的杂货和医药在线应用程序,都严重依赖这些系统。基于机器学习模型的应用程序提高了推荐系统的准确性和效率,并消除了人工寻找相关项目的可能性。机器学习模型学习、识别模式,并根据数据在最小的人为干预下做出决策。我们开发了一个创新的、新颖的图书推荐系统。我们使用了遗传算法来增强图书的评级,并找到相似用户与推荐图书之间的距离。正在使用的数据集取自亚马逊网络服务,在Kaggle上以Books.csv的形式提供。
{"title":"A Hybrid Book Recommendation System Using Genetic Algorithm for Enhancing Book Rating","authors":"†. AqsaMaryum, Fawad Nasim","doi":"10.56536/jicet.v2i2.29","DOIUrl":"https://doi.org/10.56536/jicet.v2i2.29","url":null,"abstract":"Recommendation systems have emerged as the most prevailing systems due to the abrupt use of online services during pandemics from past years. Multi-billiondollar industries such as kindle, Alibaba, amazon, Careem, and many other local online applications of grocery and medicine are heavily dependent on these systems. Applications based on machine learning models increase the accuracy and efficiency of the recommendation system and eliminate the possibility of human effort in finding relevant items. Machine learning models learn, recognize patterns, and make decisions with minimal human intervention based on data. We have developed an innovative and novel book recommendation system. We have used a genetic algorithm to enhance the rating of books and find the distance between similar users and recommend books. The Dataset is being used is taken from Amazon web services and it is available on Kaggle as Books.csv.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirement introspection and involvement of stakeholder 需求自省和涉众的参与
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.20
In this paper, we clarify how to fulfil the need of client. When a client has giant idea and he don’t know how to describe it to others than the requirement engineers approach this technique. The involvement of stakeholder to inspect the need of client and give a hint near to his requirement. How the client introduces his idea to company and how the requirement engineer will work on it will be explain in this paper. Client attitude may also a reflection of his requirement. Introspection is basically the self-perception. An organization is responsible for taking care of stakeholder. Once they show their involvement in any organization, it will be grateful for both parties i.e. their business will grow on the power of two. Once the communication is started requirement engineer will use some techniques for gathering requirement. As the stakeholders duties is to operate the organization and they are all connected virtually to each other. So during using techniques, introspection is also very important and without it requirement gathering process won’t be complete. Some organization use groupware tools for gathering requirement. Elicitation technique is also use in this process. Elicitation technique is also known as appropriate and qualitative technique. No attribute is considered in introspection.
本文阐述了如何满足客户的需求。当一个客户有一个伟大的想法,他不知道如何向其他人描述它,需求工程师就会采用这种技术。利益相关者的参与,以检查客户的需求,并给出一个暗示,接近他的要求。本文将解释客户如何向公司介绍他的想法以及需求工程师将如何工作。客户的态度也反映了他的要求。内省基本上就是自我认知。一个组织有责任照顾利益相关者。一旦他们参与到任何组织中,他们都会对双方表示感谢,也就是说,他们的业务将在两个人的力量下增长。一旦沟通开始,需求工程师将使用一些技术来收集需求。作为利益相关者的职责是经营组织,他们都是相互联系的。因此,在使用技术的过程中,自省也是非常重要的,没有它,需求收集过程就不完整。一些组织使用群件工具来收集需求。在这个过程中也使用了启发技巧。启发式技术又称恰当定性技术。在自省中不考虑任何属性。
{"title":"Requirement introspection and involvement of stakeholder","authors":"","doi":"10.56536/jicet.v2i1.20","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.20","url":null,"abstract":"In this paper, we clarify how to fulfil the need of client. When a client has giant idea and he don’t know how to describe it to others than the requirement engineers approach this technique. The involvement of stakeholder to inspect the need of client and give a hint near to his requirement. How the client introduces his idea to company and how the requirement engineer will work on it will be explain in this paper. Client attitude may also a reflection of his requirement. Introspection is basically the self-perception. An organization is responsible for taking care of stakeholder. Once they show their involvement in any organization, it will be grateful for both parties i.e. their business will grow on the power of two. Once the communication is started requirement engineer will use some techniques for gathering requirement. As the stakeholders duties is to operate the organization and they are all connected virtually to each other. So during using techniques, introspection is also very important and without it requirement gathering process won’t be complete. Some organization use groupware tools for gathering requirement. Elicitation technique is also use in this process. Elicitation technique is also known as appropriate and qualitative technique. No attribute is considered in introspection.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirement Engineering Processes, Activities, Flaws, Importance And Review 需求工程过程、活动、缺陷、重要性和评审
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.19
IT and Software industries are the fastest and most improving industries all over the world. Even in countries like India, Pakistan and other development counties the trend of IT and different TECH technologies is rapidly increasing time to time. There is no doubt on the fact that that all the IT and Software industries follows the Software Development Life Cycle (SDLC) for their software or product development process. Following the IT trends it is essential for the industries to follow the SDLC for their software development. The most important and the first step of any software development is Requirement engineering. In short words requirement engineering is the backbone of any software development process, other than that it also provides an estimation from the start that is the project doable in the time given or not.  After reading the paper one will be well aware of what software requirement engineering really is and what activities are involved what flaws are made in those activities and the importance of a requirement engineer in any industry. The information is conducted from different software industries. The data is gathered from all source means and is analyzed and refined with different software like Turnitin. The information conducted will be useful for all local and global software industries including other TECH industries.  
IT和软件行业是世界上发展最快、进步最快的行业。即使在印度、巴基斯坦和其他发展中国家,信息技术和不同技术的趋势也在迅速发展。毫无疑问,所有IT和软件行业的软件或产品开发过程都遵循软件开发生命周期(SDLC)。随着IT趋势的发展,行业必须遵循SDLC进行软件开发。任何软件开发的最重要和第一步是需求工程。简而言之,需求工程是任何软件开发过程的支柱,除此之外,它还从一开始就提供了项目在给定时间内是否可行的估计。在阅读了这篇论文之后,人们将会很好地意识到什么是软件需求工程,涉及到什么活动,这些活动中产生了什么缺陷,以及需求工程师在任何行业中的重要性。这些信息来自不同的软件行业。数据是从所有来源收集的,并通过不同的软件(如Turnitin)进行分析和提炼。所收集的资料对本地及全球的软件业,包括其他科技业,都有帮助。
{"title":"Requirement Engineering Processes, Activities, Flaws, Importance And Review","authors":"","doi":"10.56536/jicet.v2i1.19","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.19","url":null,"abstract":"IT and Software industries are the fastest and most improving industries all over the world. Even in countries like India, Pakistan and other development counties the trend of IT and different TECH technologies is rapidly increasing time to time. There is no doubt on the fact that that all the IT and Software industries follows the Software Development Life Cycle (SDLC) for their software or product development process. Following the IT trends it is essential for the industries to follow the SDLC for their software development. The most important and the first step of any software development is Requirement engineering. In short words requirement engineering is the backbone of any software development process, other than that it also provides an estimation from the start that is the project doable in the time given or not.  After reading the paper one will be well aware of what software requirement engineering really is and what activities are involved what flaws are made in those activities and the importance of a requirement engineer in any industry. The information is conducted from different software industries. The data is gathered from all source means and is analyzed and refined with different software like Turnitin. The information conducted will be useful for all local and global software industries including other TECH industries.  ","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Functional Requirements (Usability, security) 非功能性需求(可用性、安全性)
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.18
Ideally the use of software is determined by the performance of both its functionality, such as its usefulness, flexibility, functionality, synergy, security. However, there has been a third-party emphasis on software performance, even if the functionality is not helpful or used without he necessary non-functional features. we discuss the state of the art in the design of non-functional requirements (hereafter, NFRs), while providing hope for some future directions.
理想情况下,软件的使用是由其功能的性能决定的,例如它的有用性、灵活性、功能性、协同性和安全性。然而,已经有第三方强调软件性能,即使功能没有帮助或没有必要的非功能特性使用。我们讨论了非功能需求(以下简称nfr)设计的最新技术,同时为未来的一些方向提供了希望。
{"title":"Non-Functional Requirements (Usability, security)","authors":"","doi":"10.56536/jicet.v2i1.18","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.18","url":null,"abstract":"Ideally the use of software is determined by the performance of both its functionality, such as its usefulness, flexibility, functionality, synergy, security. However, there has been a third-party emphasis on software performance, even if the functionality is not helpful or used without he necessary non-functional features. we discuss the state of the art in the design of non-functional requirements (hereafter, NFRs), while providing hope for some future directions.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Right Elistication Technique For Right Project 正确的项目,正确的调试技术
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.24
Elicitation technique is the process in which an analyst gather these requirements from the customer, stakeholders and users, who satisfy and fulfill the needs of customer, stakeholders and users. Right requirements are the key of successful project and this key is in the hand of analysts. Because analyst that person who select the elicitation technique. If the analyst select the right technique for the right project then the project will be goes to success otherwise it will be fail.
启发技术是分析人员从客户、涉众和用户那里收集这些需求的过程,这些需求满足并实现了客户、涉众和用户的需求。正确的需求是项目成功的关键,而这把关键掌握在分析人员手中。因为分析师那人选择了启发技巧。如果分析师为正确的项目选择了正确的技术,那么项目将走向成功,否则将失败。
{"title":"Right Elistication Technique For Right Project","authors":"","doi":"10.56536/jicet.v2i1.24","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.24","url":null,"abstract":"Elicitation technique is the process in which an analyst gather these requirements from the customer, stakeholders and users, who satisfy and fulfill the needs of customer, stakeholders and users. Right requirements are the key of successful project and this key is in the hand of analysts. Because analyst that person who select the elicitation technique. If the analyst select the right technique for the right project then the project will be goes to success otherwise it will be fail.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Artificial Intelligence in Software Development Life Cycle 人工智能在软件开发生命周期中的应用
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.25
Current automated software development life cycle was mainly allotting with the automated generation code. That kind of method mostly include in the software combination from model’s design, predetermined polices or the fixed rules. In this paper we discuss about the propose an approach that should went above the SDL automated that should be presenting direct method which is able to make decision and take decision to generate code and  software. The ontology do an important part of  developer by fulfill the development of software  affair freely. [2]Thus behavior catch a database of  ontological  permit highest level judgement to explain design and incorporate the logic of system depend on the configuration system which is physical system . This kind of method  implement in graphical tools. This paper discuss the autonomated ontological form of  methodology create the code of according to artificial intelligence
当前的自动化软件开发生命周期主要是用自动生成代码来分配的。这种方法主要包括在软件组合中从模型的设计、预先确定的策略或固定的规则。在本文中,我们讨论了一种应该超越SDL自动化的方法,它应该是一种能够做出决策并采取决策来生成代码和软件的直接方法。本体通过自由地完成软件事务的开发,成为开发人员的重要组成部分。[2]因此,行为捕获一个本体论的数据库,允许最高级别的判断来解释设计,并结合系统的逻辑,依赖于配置系统,即物理系统。这种方法在图形化工具中实现。本文讨论了基于人工智能的代码生成方法的自主本体论形式
{"title":"Use of Artificial Intelligence in Software Development Life Cycle","authors":"","doi":"10.56536/jicet.v2i1.25","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.25","url":null,"abstract":"Current automated software development life cycle was mainly allotting with the automated generation code. That kind of method mostly include in the software combination from model’s design, predetermined polices or the fixed rules. In this paper we discuss about the propose an approach that should went above the SDL automated that should be presenting direct method which is able to make decision and take decision to generate code and  software. The ontology do an important part of  developer by fulfill the development of software  affair freely. [2]Thus behavior catch a database of  ontological  permit highest level judgement to explain design and incorporate the logic of system depend on the configuration system which is physical system . This kind of method  implement in graphical tools. This paper discuss the autonomated ontological form of  methodology create the code of according to artificial intelligence","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131552049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eliciting Organizational Requirements Using Stakeholder Prioritization 使用涉众优先级来引出组织需求
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.17
Different stakeholders come together to find the requirements of a software in an organization. While there are many contradicting requirements which can be provided by different stakeholders, they need to be prioritized properly in order to avoid the confusion in the development or requirements elicitation phase.
不同的涉众聚在一起寻找组织中软件的需求。虽然不同的涉众可以提供许多相互矛盾的需求,但为了避免在开发或需求引出阶段出现混乱,需要对它们进行适当的优先级排序。
{"title":"Eliciting Organizational Requirements Using Stakeholder Prioritization","authors":"","doi":"10.56536/jicet.v2i1.17","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.17","url":null,"abstract":"Different stakeholders come together to find the requirements of a software in an organization. While there are many contradicting requirements which can be provided by different stakeholders, they need to be prioritized properly in order to avoid the confusion in the development or requirements elicitation phase.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drawbacks of Elicitation Techniques 引出技术的缺点
Pub Date : 2021-01-01 DOI: 10.56536/jicet.v1i1.2
This paper summarizes the drawback of elicitation techniques problems and challenges of necessities engineering. necessities engineering is rotten into the want’s stimulation, specification, and validation. Most of the wants techniques nowadays target specification. Elicitation technique for a system is a crucial activity in demand engineering. A stimulation procedure is planned to handle these considerations. Consequently, the results of this paper have given North American country an honest disadvantage our analysis within the space of computer code needs stimulation.
总结了引出技术在必需品工程中的缺点、问题和挑战。必需品工程已经腐烂到需求的刺激、规范和验证。如今,大多数需求技术都是针对规范的。系统的引出技术是需求工程中的一项重要活动。为了解决这些问题,我们计划了一套增产措施。因此,本文的结果给了北美国家一个诚实的劣势,我们在计算机代码空间内的分析需要刺激。
{"title":"Drawbacks of Elicitation Techniques","authors":"","doi":"10.56536/jicet.v1i1.2","DOIUrl":"https://doi.org/10.56536/jicet.v1i1.2","url":null,"abstract":"This paper summarizes the drawback of elicitation techniques problems and challenges of necessities engineering. necessities engineering is rotten into the want’s stimulation, specification, and validation. Most of the wants techniques nowadays target specification. Elicitation technique for a system is a crucial activity in demand engineering. A stimulation procedure is planned to handle these considerations. Consequently, the results of this paper have given North American country an honest disadvantage our analysis within the space of computer code needs stimulation.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115456532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURED PARKING SYSTEM USING IMAGE PROCESSING 采用图像处理的安全停车系统
Pub Date : 2020-10-01 DOI: 10.56536/jicet.v1i2.15
Ikram Syed, Huma Khan
From the very beginning, mankind is trying to make their things safe and secure from risk of theft. After reading in depth various results of car thief-ting for last many years, Commonly those cars are been theft in the parking areas where there was no proper system to protect those cars. This work is to minimize the risk of vehicle thief-ting after creating a secured car parking system. If we talk about today's modern world, many of procedures are available to minimize or stop car thief-ting. Our Thesis is based on software and hardware application which works on real time environment. We are adopting the face detection technique under the umbrella of image processing which will provide security for public and parking places, Although we know image processing is a vast field in today’s era. This application uses OpenCV programming language C# using the Haar-cascade and more precisely canny pruning libraries for the detection of facial features. Few years back, list of procedures are adopted just to make a secure car parking system. Some procedures were by adopting RFID and many was by capturing the car number plate under the umbrella of image processing and result of these procedures was, they were failed to secure due to many factors. For example lack of accuracy in character reorganization of number plate and information about driver. However, our system is reliable as the probability of dodging is least, which provides security and flexibility to the car owners.
从一开始,人类就试图使他们的东西安全,不受盗窃的危险。在深入阅读了过去多年来各种汽车盗窃案的结果后,通常这些汽车是在停车场被偷的,那里没有适当的系统来保护这些汽车。这项工作是为了在建立一个安全的停车系统后,将车辆被盗的风险降到最低。如果我们谈论当今的现代世界,有许多程序可以减少或阻止偷车贼。本论文是基于实时环境下的软硬件应用。我们采用图像处理下的人脸检测技术,为公共场所和停车场提供安全保障,尽管我们知道图像处理在当今时代是一个广阔的领域。本应用程序使用OpenCV编程语言c#,使用haar级联和更精确的canny修剪库来检测面部特征。几年前,为了建立一个安全的停车系统,采用了一系列程序。一些程序是通过采用RFID,许多是通过在图像处理的保护伞下捕获汽车号牌,这些程序的结果是,由于许多因素,它们未能安全。例如,车牌字符重组和驾驶员信息缺乏准确性。然而,我们的系统是可靠的,因为闪避的概率最小,这为车主提供了安全性和灵活性。
{"title":"SECURED PARKING SYSTEM USING IMAGE PROCESSING","authors":"Ikram Syed, Huma Khan","doi":"10.56536/jicet.v1i2.15","DOIUrl":"https://doi.org/10.56536/jicet.v1i2.15","url":null,"abstract":"From the very beginning, mankind is trying to make their things safe and secure from risk of theft. After reading in depth various results of car thief-ting for last many years, Commonly those cars are been theft in the parking areas where there was no proper system to protect those cars. This work is to minimize the risk of vehicle thief-ting after creating a secured car parking system. If we talk about today's modern world, many of procedures are available to minimize or stop car thief-ting. Our Thesis is based on software and hardware application which works on real time environment. We are adopting the face detection technique under the umbrella of image processing which will provide security for public and parking places, Although we know image processing is a vast field in today’s era. This application uses OpenCV programming language C# using the Haar-cascade and more precisely canny pruning libraries for the detection of facial features. Few years back, list of procedures are adopted just to make a secure car parking system. Some procedures were by adopting RFID and many was by capturing the car number plate under the umbrella of image processing and result of these procedures was, they were failed to secure due to many factors. For example lack of accuracy in character reorganization of number plate and information about driver. However, our system is reliable as the probability of dodging is least, which provides security and flexibility to the car owners.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Text Watermarking Method for Embedded of Watermark Originality 嵌入水印原创性的零文本水印方法
Pub Date : 2020-09-21 DOI: 10.56536/jicet.v1i2.11
Fahad Sabah, Saleem Butt
In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.
在这个科技时代,人与人之间分享信息的方式完全改变了。科技让人们通过使用不同的社交网站快速地与人联系,并在几秒钟内分享他们的观点。几个小时的需求是如何以更精确的形式保护数据,以应对任何未经授权的用户的攻击,例如复制、更改、插入和删除数据。这些类型的攻击破坏了数据的原创性。数据可以是任何形式的内容——音频、视频和文本,但文本内容最难在未经授权的访问和使用中存活下来。由于文本内容在不同的社交网站上以软形式共享,因此攻击的机会增加,文本的价值难以维持。保护信息或文本免受未经授权攻击的解决方案是文本水印。随着水印技术的不断发展和攻击的增加,水印技术成为人们关注的热点。保护机密信息是保持内容原创性和真实性的时代要求之一。近年来,为了保证文本的安全,人们采用了不同的文本水印技术。虽然采用了不同的技术和算法,但都不能很好地满足文本水印的主要要求。这些技术可能不会让攻击者完全访问,但会降低文本的价值。本文提出了一种更强的技术来保持文本的原创性。
{"title":"Zero-Text Watermarking Method for Embedded of Watermark Originality","authors":"Fahad Sabah, Saleem Butt","doi":"10.56536/jicet.v1i2.11","DOIUrl":"https://doi.org/10.56536/jicet.v1i2.11","url":null,"abstract":"In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Innovative Computing and Emerging Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1