首页 > 最新文献

Lahore Garrison University Research Journal of Computer Science and Information Technology最新文献

英文 中文
Rapid Digital Transformation Using Agile Methodologies for Software Development Projects 在软件开发项目中使用敏捷方法进行快速数字化转换
Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503218
Kausar Parveen
Now a day’s all organizations are moving towards digitalization. These consequences of the use of digital technologies made organizations seek for best and fast digital solutions. All software developer companies are also trying to draw consumer's attention by offering prompt services. In this regard, the critical issue in information technology and other areas of computation is how software can be created easily and rapidly for complex businesses. In this context, the main aim of the research is to show the agile methodology role in the rapid digital transformation. In this paper, we have surveyed different agile methodologies and tools for rapid software development and introduced an agile management tool having a backlog. We identified the key practices of agile methods and after a survey, it is suggested that the agile approach can help to achieve a balance between the applications generated by developers on customer demand. This paper illuminates and translates agile methodologies into agile project management tools for simple and rapid application development. Empirical research based on a case study is provided for better understanding and showing the importance of agility in software development
如今,所有组织都在走向数字化。使用数字技术的这些后果促使组织寻求最佳和快速的数字解决方案。所有软件开发公司也都试图通过提供快速的服务来吸引消费者的注意力。在这方面,信息技术和其他计算领域的关键问题是如何为复杂的业务轻松快速地创建软件。在这种背景下,研究的主要目的是展示敏捷方法在快速数字化转型中的作用。在本文中,我们调查了用于快速软件开发的不同敏捷方法和工具,并介绍了一种具有backlog的敏捷管理工具。我们确定了敏捷方法的关键实践,经过调查,建议敏捷方法可以帮助实现开发人员根据客户需求生成的应用程序之间的平衡。本文阐明并将敏捷方法转化为敏捷项目管理工具,以实现简单快速的应用程序开发。基于案例研究的实证研究是为了更好地理解和展示敏捷性在软件开发中的重要性
{"title":"Rapid Digital Transformation Using Agile Methodologies for Software Development Projects","authors":"Kausar Parveen","doi":"10.54692/lgurjcsit.2021.0503218","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503218","url":null,"abstract":"Now a day’s all organizations are moving towards digitalization. These consequences of the use of digital technologies made organizations seek for best and fast digital solutions. All software developer companies are also trying to draw consumer's attention by offering prompt services. In this regard, the critical issue in information technology and other areas of computation is how software can be created easily and rapidly for complex businesses. In this context, the main aim of the research is to show the agile methodology role in the rapid digital transformation. In this paper, we have surveyed different agile methodologies and tools for rapid software development and introduced an agile management tool having a backlog. We identified the key practices of agile methods and after a survey, it is suggested that the agile approach can help to achieve a balance between the applications generated by developers on customer demand. This paper illuminates and translates agile methodologies into agile project management tools for simple and rapid application development. Empirical research based on a case study is provided for better understanding and showing the importance of agility in software development","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133285031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load Balancing in Cloud Computing Empowered with Dynamic Divisible Load Scheduling Method 基于动态可分负载调度方法的云计算负载均衡
Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503217
Sohaib Ahmad
The need to process and dealing with a vast amount of data is increasing with the developing technology. One of the leading promising technology is Cloud Computing, enabling one to accomplish desired goals, leading to performance enhancement. Cloud Computing comes into play with the debate on the growing requirements of data capabilities and storage capacities. Not every organization has the financial resources, infrastructure & human capital, but Cloud Computing offers an affordable infrastructure based on availability, scalability, and cost-efficiency. The Cloud can provide services to clients on-demand, making it the most adapted system for virtual storage, but still, it has some issues not adequately addressed and resolved. One of those issues is that load balancing is a primary challenge, and it is required to balance the traffic on every peer adequately rather than overloading an individual node. This paper provides an intelligent workload management algorithm, which systematically balances traffic and homogeneously allocates the load on every node & prevents overloading, and increases the response time for maximum performance enhancement.
随着技术的发展,处理和处理大量数据的需求也在不断增加。最具前景的技术之一是云计算,它使人们能够实现期望的目标,从而提高性能。随着对数据能力和存储容量日益增长的需求的争论,云计算开始发挥作用。不是每个组织都有财务资源、基础设施和人力资本,但是云计算提供了基于可用性、可伸缩性和成本效率的可负担的基础设施。云可以按需为客户端提供服务,使其成为最适合虚拟存储的系统,但是,它仍然有一些问题没有得到充分解决。其中一个问题是负载平衡是一个主要挑战,需要充分平衡每个对等节点上的流量,而不是使单个节点过载。本文提出了一种智能工作负载管理算法,系统地平衡流量,均匀地分配各节点负载,防止过载,并增加响应时间,最大限度地提高性能。
{"title":"Load Balancing in Cloud Computing Empowered with Dynamic Divisible Load Scheduling Method","authors":"Sohaib Ahmad","doi":"10.54692/lgurjcsit.2021.0503217","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503217","url":null,"abstract":"The need to process and dealing with a vast amount of data is increasing with the developing technology. One of the leading promising technology is Cloud Computing, enabling one to accomplish desired goals, leading to performance enhancement. Cloud Computing comes into play with the debate on the growing requirements of data capabilities and storage capacities. Not every organization has the financial resources, infrastructure & human capital, but Cloud Computing offers an affordable infrastructure based on availability, scalability, and cost-efficiency. The Cloud can provide services to clients on-demand, making it the most adapted system for virtual storage, but still, it has some issues not adequately addressed and resolved. One of those issues is that load balancing is a primary challenge, and it is required to balance the traffic on every peer adequately rather than overloading an individual node. This paper provides an intelligent workload management algorithm, which systematically balances traffic and homogeneously allocates the load on every node & prevents overloading, and increases the response time for maximum performance enhancement.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Classification Model using Fuzzy Rough Set Theory and Random Weight Neural Network 基于模糊粗糙集理论和随机权值神经网络的高效分类模型
Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503224
Rana Aamir Raza
In the area of fuzzy rough set theory (FRST), researchers have gained much interest in handling the high-dimensional data. Rough set theory (RST) is one of the important tools used to pre-process the data and helps to obtain a better predictive model, but in RST, the process of discretization may loss useful information. Therefore, fuzzy rough set theory contributes well with the real-valued data. In this paper, an efficient technique is presented based on Fuzzy rough set theory (FRST) to pre-process the large-scale data sets to increase the efficacy of the predictive model. Therefore, a fuzzy rough set-based feature selection (FRSFS) technique is associated with a Random weight neural network (RWNN) classifier to obtain the better generalization ability. Results on different dataset show that the proposed technique performs well and provides better speed and accuracy when compared by associating FRSFS with other machine learning classifiers (i.e., KNN, Naive Bayes, SVM, decision tree and backpropagation neural network).
在模糊粗糙集理论(FRST)领域,研究人员对高维数据的处理产生了浓厚的兴趣。粗糙集理论(RST)是对数据进行预处理的重要工具之一,有助于获得更好的预测模型,但在粗糙集理论中,离散化过程可能会丢失有用的信息。因此,模糊粗糙集理论可以很好地处理实值数据。本文提出了一种基于模糊粗糙集理论(FRST)的大规模数据集预处理技术,以提高预测模型的有效性。因此,基于模糊粗糙集的特征选择(FRSFS)技术与随机加权神经网络(RWNN)分类器相结合,以获得更好的泛化能力。在不同数据集上的结果表明,与其他机器学习分类器(即KNN、朴素贝叶斯、支持向量机、决策树和反向传播神经网络)相关联的FRSFS相比,该技术表现良好,并且具有更好的速度和准确性。
{"title":"An Efficient Classification Model using Fuzzy Rough Set Theory and Random Weight Neural Network","authors":"Rana Aamir Raza","doi":"10.54692/lgurjcsit.2021.0503224","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503224","url":null,"abstract":"In the area of fuzzy rough set theory (FRST), researchers have gained much interest in handling the high-dimensional data. Rough set theory (RST) is one of the important tools used to pre-process the data and helps to obtain a better predictive model, but in RST, the process of discretization may loss useful information. Therefore, fuzzy rough set theory contributes well with the real-valued data. In this paper, an efficient technique is presented based on Fuzzy rough set theory (FRST) to pre-process the large-scale data sets to increase the efficacy of the predictive model. Therefore, a fuzzy rough set-based feature selection (FRSFS) technique is associated with a Random weight neural network (RWNN) classifier to obtain the better generalization ability. Results on different dataset show that the proposed technique performs well and provides better speed and accuracy when compared by associating FRSFS with other machine learning classifiers (i.e., KNN, Naive Bayes, SVM, decision tree and backpropagation neural network).","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions 使用区块链的云计算数据安全调查:挑战,现有的最先进的方法和未来的方向
Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503213
Muhammad Usman Ashraf
Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.
云计算是主流的存储解决方案之一。但是,云计算集中存储的方式并不稳定。区块链是一个分散的云存储系统,确保数据安全。云环境容易受到多种攻击,这些攻击会危及网络的基本机密性、完整性、可用性和安全性。本课题的研究重点是分散、安全的数据存储、高数据可用性以及存储资源的有效利用。为了正确应对区块链方法的情况,我们对最新和最有前途的区块链最先进的方法、用于数据传播的P2P网络、用于数据认证的哈希函数和用于数据完整性的IPFS(星际文件系统)协议进行了全面的调查。此外,我们还讨论了区块链共识算法在安全性方面的详细比较。此外,我们还讨论了区块链和云计算的未来。本研究的主要重点是利用区块链保护云计算中的数据,方便研究人员进行进一步的研究工作。
{"title":"A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions","authors":"Muhammad Usman Ashraf","doi":"10.54692/lgurjcsit.2021.0503213","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503213","url":null,"abstract":"Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classical and Probabilistic Information Retrieval Techniques: An Audit 经典和概率信息检索技术:审计
Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503221
Qaiser Abbas
Information retrieval is acquiring particular information from large resources and presenting it according to the user’s need. The incredible increase in information resources on the Internet formulates the information retrieval procedure, a monotonous and complicated task for users. Due to over access of information, better methodology is required to retrieve the most appropriate information from different sources. The most important information retrieval methods include the probabilistic, fuzzy set, vector space, and boolean models. Each of these models usually are used for evaluating the connection between the question and the retrievable documents. These methods are based on the keyword and use lists of keywords to evaluate the information material. In this paper, we present a survey of these models so that their working methodology and limitations are discussed. This is an important understanding because it makes possible to select an information retrieval technique based on the basic requirements. The survey results showed that the existing model for knowledge recovery is somewhere short of what was planned. We have also discussed different areas of IR application where these models could be used.
信息检索是从大量资源中获取特定的信息,并根据用户的需要进行呈现。互联网上信息资源的惊人增长,使得信息检索过程对用户来说是一项单调而复杂的任务。由于信息的过度访问,需要更好的方法从不同的来源检索最合适的信息。最重要的信息检索方法包括概率、模糊集、向量空间和布尔模型。这些模型中的每一个通常用于评估问题与可检索文档之间的联系。这些方法以关键词为基础,利用关键词列表对信息材料进行评价。在本文中,我们提出了这些模型的调查,以便他们的工作方法和局限性进行了讨论。这是一个重要的理解,因为它使选择基于基本需求的信息检索技术成为可能。调查结果表明,现有的知识恢复模式与计划存在一定差距。我们还讨论了可以使用这些模型的IR应用的不同领域。
{"title":"Classical and Probabilistic Information Retrieval Techniques: An Audit","authors":"Qaiser Abbas","doi":"10.54692/lgurjcsit.2021.0503221","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503221","url":null,"abstract":"Information retrieval is acquiring particular information from large resources and presenting it according to the user’s need. The incredible increase in information resources on the Internet formulates the information retrieval procedure, a monotonous and complicated task for users. Due to over access of information, better methodology is required to retrieve the most appropriate information from different sources. The most important information retrieval methods include the probabilistic, fuzzy set, vector space, and boolean models. Each of these models usually are used for evaluating the connection between the question and the retrievable documents. These methods are based on the keyword and use lists of keywords to evaluate the information material. In this paper, we present a survey of these models so that their working methodology and limitations are discussed. This is an important understanding because it makes possible to select an information retrieval technique based on the basic requirements. The survey results showed that the existing model for knowledge recovery is somewhere short of what was planned. We have also discussed different areas of IR application where these models could be used.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125159120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Classification Using Decision Trees J48 Algorithm for Text Mining of Business Data 基于决策树J48算法的商业数据文本挖掘数据分类
Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502210
Asif Yaseen
The business industry is generating a lot of data on daily business deals and financial transactions. These businesses are generating intensive-data like they need customer satisfaction on top priority, fulfilling their needs, etc. In every step, Data is being produced. This Data has a great value that is hidden from regular users. Data analytics is used to unhide those values. In our project, we are using a business-related dataset that contains strings and their class (0 or 1). 0 or 1 denotes the positive or negative string labels. To analyze this data, we are using a decision tree classification algorithm (J48 exceptionally) to perform text mining (classification) on our target dataset. Text mining comes under supervised learning (type). In-text mining, generally, we use two datasets. One is used to train the model, and the second dataset is used to predict the missing class labels in the second dataset based on this training model generated using the first dataset.
商业行业正在产生大量关于日常商业交易和金融交易的数据。这些企业正在产生密集的数据,比如他们需要把客户满意度放在首位,满足他们的需求等等。每一步都在产生数据。这些数据具有隐藏在普通用户之外的巨大价值。数据分析用于揭开这些值的隐藏。在我们的项目中,我们使用一个业务相关的数据集,其中包含字符串及其类(0或1)。0或1表示正或负字符串标签。为了分析这些数据,我们使用决策树分类算法(J48例外)对目标数据集执行文本挖掘(分类)。文本挖掘属于监督学习(类型)。文本挖掘,通常,我们使用两个数据集。一个用于训练模型,第二个数据集用于基于使用第一个数据集生成的训练模型预测第二个数据集中缺失的类标签。
{"title":"Data Classification Using Decision Trees J48 Algorithm for Text Mining of Business Data","authors":"Asif Yaseen","doi":"10.54692/lgurjcsit.2021.0502210","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502210","url":null,"abstract":"The business industry is generating a lot of data on daily business deals and financial transactions. These businesses are generating intensive-data like they need customer satisfaction on top priority, fulfilling their needs, etc. In every step, Data is being produced. This Data has a great value that is hidden from regular users. Data analytics is used to unhide those values. In our project, we are using a business-related dataset that contains strings and their class (0 or 1). 0 or 1 denotes the positive or negative string labels. To analyze this data, we are using a decision tree classification algorithm (J48 exceptionally) to perform text mining (classification) on our target dataset. Text mining comes under supervised learning (type). In-text mining, generally, we use two datasets. One is used to train the model, and the second dataset is used to predict the missing class labels in the second dataset based on this training model generated using the first dataset.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123733861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Crime Patterns in Digital Forensic Investigation to Trace the Adversaries 数字取证调查中犯罪模式的检测以追踪对手
Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502205
Muhammad ilyas
The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits is also increasing. To prosecute cybercriminals and make some lawful checks on everyone's digital activities, digital forensic science comes into the light. In this context, we developed a new framework that improves the digital forensic investigation process. This research paper proposes a method in which we can identify the illegal activities and trace the adversaries. We capture the TCP (Transmission Control Protocol) packets from the servers and workstations. This data collected from the TCP log is stored in the database and preprocessed to eliminate redundant data. Furthermore, the database also contains past data. The proposed framework has three major processes collection of TCP packets, storing and preprocessing of collected data in a database, and mining of the pattern through a digital forensic anomaly collection algorithm. For the evaluation of our proposed framework, we have developed a java based application. The results are shown in the form of reports and tables.
在过去的几年里,互联网的使用显著增加。接入互联网已经变得如此普遍,一个没有计算机知识的人也可以很容易地使用这个设施。这种易用性为社会带来了很多好处,但另一方面,滥用互联网为个人或企业利益也在增加。为了起诉网络罪犯并对每个人的数字活动进行合法检查,数字法医学应运而生。在此背景下,我们开发了一个新的框架,以改进数字法医调查过程。本文提出了一种识别非法活动和追踪对手的方法。我们从服务器和工作站捕获TCP(传输控制协议)数据包。从TCP日志中收集的数据存储在数据库中,并进行预处理以消除冗余数据。此外,数据库还包含过去的数据。该框架包括三个主要过程:TCP数据包的收集,收集到的数据在数据库中存储和预处理,以及通过数字取证异常收集算法挖掘模式。为了评估我们提出的框架,我们开发了一个基于java的应用程序。结果以报告和表格的形式显示。
{"title":"Detection of Crime Patterns in Digital Forensic Investigation to Trace the Adversaries","authors":"Muhammad ilyas","doi":"10.54692/lgurjcsit.2021.0502205","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502205","url":null,"abstract":"The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits is also increasing. To prosecute cybercriminals and make some lawful checks on everyone's digital activities, digital forensic science comes into the light. In this context, we developed a new framework that improves the digital forensic investigation process. This research paper proposes a method in which we can identify the illegal activities and trace the adversaries. We capture the TCP (Transmission Control Protocol) packets from the servers and workstations. This data collected from the TCP log is stored in the database and preprocessed to eliminate redundant data. Furthermore, the database also contains past data. The proposed framework has three major processes collection of TCP packets, storing and preprocessing of collected data in a database, and mining of the pattern through a digital forensic anomaly collection algorithm. For the evaluation of our proposed framework, we have developed a java based application. The results are shown in the form of reports and tables.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Template Matching Based Probabilistic Optical Character Recognition for Urdu Nastaliq Script 基于模板匹配的乌尔都纳斯塔利克文字概率光学字符识别
Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502207
Qaiser Abbas
This paper presents a technique for optical recognition of Urdu characters using template matching based on a probabilistic N-Gram language model. Dataset used has the collection of both printed and typed text. This model is able to perform three types of segmentations including line, ligature and character using horizontal projection, connected component labeling, corners and pointers techniques, respectively. A separate stochastic lexicon is built from a collected corpus, which contains the probability values of grams. By using template matching and the N-Gram language model, our study predicts complete segmented words with the promising result, particularly in case of bigrams. It outperforms three out of four existing models with an accuracy rate of 97.33%. Results achieved on our test dataset are encouraging in one perspective but provide direction to work for further improvement in this model.
提出了一种基于概率N-Gram语言模型的模板匹配乌尔都语字符光学识别技术。使用的数据集包含打印和键入文本的集合。该模型能够执行三种类型的分割,包括线,线和字符分别使用水平投影,连接组件标记,角和指针技术。从收集到的语料库中构建一个单独的随机词典,其中包含克的概率值。通过模板匹配和N-Gram语言模型,我们的研究预测了完整的分词,并取得了令人满意的结果,特别是在双元词的情况下。它以97.33%的准确率优于现有四种模型中的三种。在我们的测试数据集上取得的结果在一个角度上是令人鼓舞的,但为该模型的进一步改进提供了方向。
{"title":"Template Matching Based Probabilistic Optical Character Recognition for Urdu Nastaliq Script","authors":"Qaiser Abbas","doi":"10.54692/lgurjcsit.2021.0502207","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502207","url":null,"abstract":"This paper presents a technique for optical recognition of Urdu characters using template matching based on a probabilistic N-Gram language model. Dataset used has the collection of both printed and typed text. This model is able to perform three types of segmentations including line, ligature and character using horizontal projection, connected component labeling, corners and pointers techniques, respectively. A separate stochastic lexicon is built from a collected corpus, which contains the probability values of grams. By using template matching and the N-Gram language model, our study predicts complete segmented words with the promising result, particularly in case of bigrams. It outperforms three out of four existing models with an accuracy rate of 97.33%. Results achieved on our test dataset are encouraging in one perspective but provide direction to work for further improvement in this model.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weed Identification Methodology by using Transfer Learning 基于迁移学习的杂草识别方法
Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502206
Bushra Idrees
From recent past years, Weed identification remained a hot topic for researchers. Majority of work focused on the detection of weed but we are trying to identify the weed via weed name. The unrivaled successes of deep learning make the researchers able to evaluate different weed species in the complex rangeland climate. Nowadays, with an increasing population, farming productivity needs to be increased a lot to meet the demand for accurate weed detection. Increased demand for an increase in the use of herbicides, resulting in environmental harm. In this research work, the picture of weed helps to detect and differentiate as per area, and its name. The main aim of this research is the identification of weed so that fewer herbicides can use. This research work will contribute toreducing the higher use of herbicides by helping clear identification of weed names through its features. We use transfer learning in machine learning. The deep Weeds dataset is used for the evaluation. For this, we use the deep learning model ResNet50 to get better results. The Deep Weeds dataset contains 17,509 images that are label and eight nationally recognized species of weed belonged to 8 across northern Australia locations. This paper declares a baseline for classification performance on the dataset of weed while utilizing the deep learning model ResNet-50 and it is a benchmark too. Deep learning model ResNet-50 attained an average accuracy classification of 96.16. The findings are high enough to make effective use of weed control methods in Pakistan for futurefield implementation. The results confirm that our System offers more effective Weed recognition than many other systems.
近年来,杂草鉴定一直是研究人员关注的热点。大部分工作都集中在杂草的检测上,但我们正试图通过杂草的名称来识别杂草。深度学习无与伦比的成功使研究人员能够在复杂的牧场气候中评估不同的杂草种类。在人口不断增长的今天,为了满足对杂草准确检测的需求,农业生产力需要大幅度提高。需求增加,除草剂使用量增加,造成环境危害。在本研究工作中,杂草的图片有助于按区域和名称进行检测和区分。本研究的主要目的是鉴别杂草,以减少除草剂的使用。这项研究工作将有助于通过其特征来明确杂草名称,从而减少除草剂的使用。我们在机器学习中使用迁移学习。深度杂草数据集用于评估。为此,我们使用深度学习模型ResNet50来获得更好的结果。深度杂草数据集包含17,509张标签图像和8个国家认可的杂草物种,属于澳大利亚北部的8个地点。本文利用深度学习模型ResNet-50在杂草数据集上声明了分类性能的基线,这也是一个基准。深度学习模型ResNet-50的平均准确率为96.16。这一发现足以在巴基斯坦有效利用杂草控制方法,以便将来在现场实施。结果证实,我们的系统提供了比许多其他系统更有效的杂草识别。
{"title":"Weed Identification Methodology by using Transfer Learning","authors":"Bushra Idrees","doi":"10.54692/lgurjcsit.2021.0502206","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502206","url":null,"abstract":"From recent past years, Weed identification remained a hot topic for researchers. Majority of work focused on the detection of weed but we are trying to identify the weed via weed name. The unrivaled successes of deep learning make the researchers able to evaluate different weed species in the complex rangeland climate. Nowadays, with an increasing population, farming productivity needs to be increased a lot to meet the demand for accurate weed detection. Increased demand for an increase in the use of herbicides, resulting in environmental harm. In this research work, the picture of weed helps to detect and differentiate as per area, and its name. The main aim of this research is the identification of weed so that fewer herbicides can use. This research work will contribute toreducing the higher use of herbicides by helping clear identification of weed names through its features. We use transfer learning in machine learning. The deep Weeds dataset is used for the evaluation. For this, we use the deep learning model ResNet50 to get better results. The Deep Weeds dataset contains 17,509 images that are label and eight nationally recognized species of weed belonged to 8 across northern Australia locations. This paper declares a baseline for classification performance on the dataset of weed while utilizing the deep learning model ResNet-50 and it is a benchmark too. Deep learning model ResNet-50 attained an average accuracy classification of 96.16. The findings are high enough to make effective use of weed control methods in Pakistan for futurefield implementation. The results confirm that our System offers more effective Weed recognition than many other systems.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next-Wave of E-commerce: Mobile Customers Churn Prediction using Machine Learning 下一波电子商务:使用机器学习预测移动客户流失
Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502209
Asif Yaseen
With the swift increase of mobile devices such as personal digital assistants, smartphones and tablets, mobile commerce is broadly considered to be a driving force for the next wave of ecommerce. The power of mobile commerce is primarily due to the anytime-anywhere connectivity and the use of mobile technology, which creates enormous opportunities to attract and engage customers. Many believe that in an era of m-commerce especially in the telecommunication business retaining customers is a big challenge. In the face of an extremely competitive telecommunication industry, the value of acquiring new customers is very much expensive than retaining the existing customer. Therefore, it has become imperative to pay much attention to retaining the existing customers in order to get stabilized in a market comprised of vibrant service providers. In the current market, a number of prevailing statistical techniques for customer churn management are replaced by more machine learning and predictive analysis techniques. In this study, we employed the feature selection technique to identify the most influencing factors in customer churn prediction. We adopt the wrapper-based feature selection approach where Particle Swarm Optimization (PSO) is used for search purposes and different classifiers like Decision Tree (DT), Naïve Bayes, k-NN and Logistic regression is used for evaluation purposes to assess the enactment on optimally sampled and abridged dataset. Lastly, it is witnessed through simulations that our suggested method accomplishes fairly thriving for forecasting churners and hence could be advantageous for exponentially increasing competition in the telecommunication sector.
随着个人数字助理、智能手机和平板电脑等移动设备的迅速增加,移动商务被广泛认为是下一波电子商务的推动力。移动商务的力量主要是由于随时随地的连接和移动技术的使用,这为吸引和吸引客户创造了巨大的机会。许多人认为,在移动商务时代,特别是在电信业务中,留住客户是一个巨大的挑战。面对竞争极其激烈的电信行业,获得新客户的价值比保留现有客户的价值要昂贵得多。因此,为了在充满活力的服务提供商组成的市场中保持稳定,必须重视留住现有客户。在当前的市场中,许多流行的客户流失管理统计技术被更多的机器学习和预测分析技术所取代。在本研究中,我们采用特征选择技术来识别影响客户流失预测的最重要因素。我们采用基于包装的特征选择方法,其中粒子群优化(PSO)用于搜索目的,不同的分类器如决策树(DT), Naïve贝叶斯,k-NN和逻辑回归用于评估目的,以评估对最佳采样和精简数据集的制定。最后,通过模拟可以看到,我们建议的方法在预测流失者方面相当成功,因此可能有利于电信行业以指数方式增加竞争。
{"title":"Next-Wave of E-commerce: Mobile Customers Churn Prediction using Machine Learning","authors":"Asif Yaseen","doi":"10.54692/lgurjcsit.2021.0502209","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502209","url":null,"abstract":"With the swift increase of mobile devices such as personal digital assistants, smartphones and tablets, mobile commerce is broadly considered to be a driving force for the next wave of ecommerce. The power of mobile commerce is primarily due to the anytime-anywhere connectivity and the use of mobile technology, which creates enormous opportunities to attract and engage customers. Many believe that in an era of m-commerce especially in the telecommunication business retaining customers is a big challenge. In the face of an extremely competitive telecommunication industry, the value of acquiring new customers is very much expensive than retaining the existing customer. Therefore, it has become imperative to pay much attention to retaining the existing customers in order to get stabilized in a market comprised of vibrant service providers. In the current market, a number of prevailing statistical techniques for customer churn management are replaced by more machine learning and predictive analysis techniques. In this study, we employed the feature selection technique to identify the most influencing factors in customer churn prediction. We adopt the wrapper-based feature selection approach where Particle Swarm Optimization (PSO) is used for search purposes and different classifiers like Decision Tree (DT), Naïve Bayes, k-NN and Logistic regression is used for evaluation purposes to assess the enactment on optimally sampled and abridged dataset. Lastly, it is witnessed through simulations that our suggested method accomplishes fairly thriving for forecasting churners and hence could be advantageous for exponentially increasing competition in the telecommunication sector.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120887337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Lahore Garrison University Research Journal of Computer Science and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1