Pub Date : 2016-06-28DOI: 10.14419/JACST.V5I2.5861
R. Kaula
Value chain is a successful management model for improving business competitiveness. A value chain based analytic approach facilitates meaningful grouping of business processes such that appropriate value from business operations can be derived. As organizations focus on competitive advantage and growth, a value chain derived operational intelligence provides insight to compete successfully in the marketplace. This paper outlines an approach to develop performance based value metrics in the form of analytic business rules for operational intelligence through the value chain model. The paper illustrates the concepts through a University value chain prototype which is implemented in Oracle’s PL/SQL language.
{"title":"Performance trends for operational intelligence through value chain model","authors":"R. Kaula","doi":"10.14419/JACST.V5I2.5861","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.5861","url":null,"abstract":"Value chain is a successful management model for improving business competitiveness. A value chain based analytic approach facilitates meaningful grouping of business processes such that appropriate value from business operations can be derived. As organizations focus on competitive advantage and growth, a value chain derived operational intelligence provides insight to compete successfully in the marketplace. This paper outlines an approach to develop performance based value metrics in the form of analytic business rules for operational intelligence through the value chain model. The paper illustrates the concepts through a University value chain prototype which is implemented in Oracle’s PL/SQL language.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125153080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-08DOI: 10.14419/JACST.V5I2.6079
M. B. Othman
Multiple Sequence Alignment (MSA) is used in genomic analysis, such as the identification of conserved sequence motifs, the estimation of evolutionary divergence between sequences, and the genes’ historical relationships inference. Several researches were conducted to determine the level of similarity of a set of sequences. Due to the problem of the NP-complete class property, a number of researches use genetic algorithms (GA) to find a solution to the multiple sequence alignment. However, the nature of genetic algorithms makes the complexity extremely high due to the redundancy provided by the different operators. The aim of this paper is to study some proposed GA solutions provided for MSA and to compare them using some criteria which we believe any solution should comply with in matters of representativeness, closeness and original sequence invariance.
{"title":"Survey of the use of genetic algorithm for multiple sequence alignment","authors":"M. B. Othman","doi":"10.14419/JACST.V5I2.6079","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.6079","url":null,"abstract":"Multiple Sequence Alignment (MSA) is used in genomic analysis, such as the identification of conserved sequence motifs, the estimation of evolutionary divergence between sequences, and the genes’ historical relationships inference. Several researches were conducted to determine the level of similarity of a set of sequences. Due to the problem of the NP-complete class property, a number of researches use genetic algorithms (GA) to find a solution to the multiple sequence alignment. However, the nature of genetic algorithms makes the complexity extremely high due to the redundancy provided by the different operators. The aim of this paper is to study some proposed GA solutions provided for MSA and to compare them using some criteria which we believe any solution should comply with in matters of representativeness, closeness and original sequence invariance.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124022288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-06-07DOI: 10.14419/JACST.V5I2.5951
Nderim Zeqiri
Computer system has important command under various objects. To have a stable system, there is a need to create the model and functionality in terms of management and programming. The purpose of this paper is to present computer system as a central source, and other systems management interface for external management facilities. The logic of interaction of various objects is to create structures with universal purposes. In the paper presented the functioning of the computer system with microcontrollers and especially with Arduino Uno device. Also, is analyzed the performance of computer system, and are given the perspective and other question in the context of problem-solving. So, finally is given the comparisons with other systems.
{"title":"Managing a computer system and interface, performance and applications","authors":"Nderim Zeqiri","doi":"10.14419/JACST.V5I2.5951","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.5951","url":null,"abstract":"Computer system has important command under various objects. To have a stable system, there is a need to create the model and functionality in terms of management and programming. The purpose of this paper is to present computer system as a central source, and other systems management interface for external management facilities. The logic of interaction of various objects is to create structures with universal purposes. In the paper presented the functioning of the computer system with microcontrollers and especially with Arduino Uno device. Also, is analyzed the performance of computer system, and are given the perspective and other question in the context of problem-solving. So, finally is given the comparisons with other systems.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116247618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-05-22DOI: 10.14419/JACST.V5I1.6181
B. Rawal, G. Eberhardt, Jaein Lee
Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.
{"title":"Cybersecurity Snapshot: Google, Twitter, and Other Online Databases","authors":"B. Rawal, G. Eberhardt, Jaein Lee","doi":"10.14419/JACST.V5I1.6181","DOIUrl":"https://doi.org/10.14419/JACST.V5I1.6181","url":null,"abstract":"Every day, millions of attacks are carried out on the networks and computer systems. In recent years, these numbers have increased dramatically. All it requires is one success for a hacker to gain unauthorized access and data, but for administrators, it is a constant battle to protect what is rightfully theirs. In this paper, we look into how these attacks have increased, what the studies of various databases and reports say on how and what types of data are being breached, who is breaching them, and how they are breaching the systems. Also, we propose various unconventional ways to prevent these attacks from happening in the future. Furthermore, this paper lists the top 26 bug-fix times reported in the Google Security Research Project (GSRP). This article brings to light reoccurring cyber threats, challenges associated with these threats, and emerging trends in the domain of cyber security.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"210 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132587969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-07DOI: 10.14419/JACST.V5I1.5225
Sajad Homayoun, Marzieh Ahmadzadeh
Stream data is usually in vast volume, changing dynamically, possibly infinite, and containing multi-dimensional features. The attention towards data stream mining is increasing as regards to its presence in wide range of real-world applications, such as e-commerce, banking, sensor data and telecommunication records. Similar to data mining, data stream mining includes classification, clustering, frequent pattern mining etc. techniques; the special focus of this paper is on classification methods invented to handle data streams. Early methods of data stream classification needed all instances to be labeled for creating classifier models, but there are some methods (Semi-Supervised Learning and Active Learning) in which unlabeled data is employed as well as labeled data. In this paper, by focusing on ensemble methods, semi-supervised and active learning, a review on some state of the art researches is given.
{"title":"A review on data stream classification approaches","authors":"Sajad Homayoun, Marzieh Ahmadzadeh","doi":"10.14419/JACST.V5I1.5225","DOIUrl":"https://doi.org/10.14419/JACST.V5I1.5225","url":null,"abstract":"Stream data is usually in vast volume, changing dynamically, possibly infinite, and containing multi-dimensional features. The attention towards data stream mining is increasing as regards to its presence in wide range of real-world applications, such as e-commerce, banking, sensor data and telecommunication records. Similar to data mining, data stream mining includes classification, clustering, frequent pattern mining etc. techniques; the special focus of this paper is on classification methods invented to handle data streams. Early methods of data stream classification needed all instances to be labeled for creating classifier models, but there are some methods (Semi-Supervised Learning and Active Learning) in which unlabeled data is employed as well as labeled data. In this paper, by focusing on ensemble methods, semi-supervised and active learning, a review on some state of the art researches is given.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-06DOI: 10.14419/JACST.V5I1.4035
Yuchou Chang, Hong Lin
Video often include frames that are irrelevant to the scenes for recording. These are mainly due to imperfect shooting, abrupt movements of camera, or unintended switching of scenes. The irrelevant frames should be removed before the semantic analysis of video scene is performed for video retrieval. An unsupervised approach for automatic removal of irrelevant frames is proposed in this paper. A novel log-spectral representation of color video frames based on Fibonacci lattice-quantization has been developed for better description of the global structures of video contents to measure similarity of video frames. Hyperclique pattern analysis, used to detect redundant data in textual analysis, is extended to extract relevant frame clusters in color videos. A new strategy using the k-nearest neighbor algorithm is developed for generating a video frame support measure and an h-confidence measure on this hyperclique pattern based analysis method. Evaluation of the proposed irrelevant video frame removal algorithm reveals promising results for datasets with irrelevant frames.
{"title":"Irrelevant frame removal for scene analysis using video hyperclique pattern and spectrum analysis","authors":"Yuchou Chang, Hong Lin","doi":"10.14419/JACST.V5I1.4035","DOIUrl":"https://doi.org/10.14419/JACST.V5I1.4035","url":null,"abstract":"Video often include frames that are irrelevant to the scenes for recording. These are mainly due to imperfect shooting, abrupt movements of camera, or unintended switching of scenes. The irrelevant frames should be removed before the semantic analysis of video scene is performed for video retrieval. An unsupervised approach for automatic removal of irrelevant frames is proposed in this paper. A novel log-spectral representation of color video frames based on Fibonacci lattice-quantization has been developed for better description of the global structures of video contents to measure similarity of video frames. Hyperclique pattern analysis, used to detect redundant data in textual analysis, is extended to extract relevant frame clusters in color videos. A new strategy using the k-nearest neighbor algorithm is developed for generating a video frame support measure and an h-confidence measure on this hyperclique pattern based analysis method. Evaluation of the proposed irrelevant video frame removal algorithm reveals promising results for datasets with irrelevant frames.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124290001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-10-29DOI: 10.14419/JACST.V4I2.5310
G. Pavlidis
Automated quality control and sorting based on computer vision techniques has been a long celebrated practice in industrial processes and production. Among the surface characteristics that guide the decision making in such systems, the colour holds a prominent position. This gets somehow complicated in cases dealing with translucent samples or samples with a significant amount of transparency and yet distinctive colour hues. The scope of this paper is to provide a method to tackle with such cases and presents a successful application to the world-renowned mastiha of Chios, a natural aromatic translucent resin extracted from the mastic tree that grows on the island of Chios, Greece.
{"title":"Colour sorting of translucent samples","authors":"G. Pavlidis","doi":"10.14419/JACST.V4I2.5310","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.5310","url":null,"abstract":"Automated quality control and sorting based on computer vision techniques has been a long celebrated practice in industrial processes and production. Among the surface characteristics that guide the decision making in such systems, the colour holds a prominent position. This gets somehow complicated in cases dealing with translucent samples or samples with a significant amount of transparency and yet distinctive colour hues. The scope of this paper is to provide a method to tackle with such cases and presents a successful application to the world-renowned mastiha of Chios, a natural aromatic translucent resin extracted from the mastic tree that grows on the island of Chios, Greece.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129139465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a study on the use of ICT in teaching methodology by the faculty of universities in Quetta, Pakistan. A Survey about the impact of ICT usage was conducted in three major public universities of Quetta - University Of Balochistan, Sardar Bahadur Khan Women University, and Balochistan University of Information Technology, Engineering and Management Sciences, focusing the faculty and the students. The study shows that ample ICT facilities are available to the faculties in these universities and the teachers incorporate different ICT tools in their teaching methodologies. Teachers and students believe that ICT has played a vital role in improving the quality of education while there remain some areas of improvement like University web portals, access to digital libraries for the students and online student management systems.
{"title":"A study on incorporating ICT in teaching methodologies at universities of Quetta","authors":"Nausheen Saeed, Farrukh Nasim, Walayat Hussain, Samina Azeem","doi":"10.14419/JACST.V4I2.4016","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.4016","url":null,"abstract":"This paper presents a study on the use of ICT in teaching methodology by the faculty of universities in Quetta, Pakistan. A Survey about the impact of ICT usage was conducted in three major public universities of Quetta - University Of Balochistan, Sardar Bahadur Khan Women University, and Balochistan University of Information Technology, Engineering and Management Sciences, focusing the faculty and the students. The study shows that ample ICT facilities are available to the faculties in these universities and the teachers incorporate different ICT tools in their teaching methodologies. Teachers and students believe that ICT has played a vital role in improving the quality of education while there remain some areas of improvement like University web portals, access to digital libraries for the students and online student management systems.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-26DOI: 10.14419/JACST.V4I2.4880
E. Nwabueze, Nwachukwu Catherine Ada Ngozi, J. Obiageli, Obikwere Fortune
The Global System of Mobile communication (GSM) technology has permeated every facet of human existence ,that man can no longer do away with it. This piece of work was motivated by the nagging problems, which include poor quality of service by telecom service providers, which attempts to negate the value of this revolution, inaccurate and interrupted service delivery which have resulted to delayed and aborted calls, traffic congestion, low bandwidth and oversubscription errors, inter alia. So the primary objective of this article therefore, is to design and develop intelligent electronic tutorial GSM software that would be capable of providing relevant answers to some GSM-based service challenges raised above. The Structured Systems Analysis and Design Methodology (SSADM) was employed as research methodology. The expected results shall include, among others, broadened scope of knowledge in GSM tutorial software engineering, provision of user friendly environment and cost effective communication system for a happy customer and a better society; provide an effective and feasible solution for a reliable and accurate GSM management system that would improve the efficiency and productivity of Nigerian information and communication infrastructure.
{"title":"Design and development of intelligent electronic tutorial software for GSM maintenance in Nigeria","authors":"E. Nwabueze, Nwachukwu Catherine Ada Ngozi, J. Obiageli, Obikwere Fortune","doi":"10.14419/JACST.V4I2.4880","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.4880","url":null,"abstract":"The Global System of Mobile communication (GSM) technology has permeated every facet of human existence ,that man can no longer do away with it. This piece of work was motivated by the nagging problems, which include poor quality of service by telecom service providers, which attempts to negate the value of this revolution, inaccurate and interrupted service delivery which have resulted to delayed and aborted calls, traffic congestion, low bandwidth and oversubscription errors, inter alia. So the primary objective of this article therefore, is to design and develop intelligent electronic tutorial GSM software that would be capable of providing relevant answers to some GSM-based service challenges raised above. The Structured Systems Analysis and Design Methodology (SSADM) was employed as research methodology. The expected results shall include, among others, broadened scope of knowledge in GSM tutorial software engineering, provision of user friendly environment and cost effective communication system for a happy customer and a better society; provide an effective and feasible solution for a reliable and accurate GSM management system that would improve the efficiency and productivity of Nigerian information and communication infrastructure.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130844050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-07-03DOI: 10.14419/JACST.V4I2.4857
Imad Matti Bakko, R. M. Yas
In computer operating systems books, they explain and solve deadlock problems by declaring in advance the maximum needs of resources and their instances for each process, the total number of resources' instances, and the allocation of the resources' instances for each process. In this paper, we introduce an effective software tool to prove that it is not necessary to declare in advance the allocation of resources' instances for each process since we suggested and implement in the tool some equations to calculate and discover a suitable allocation of resources' instances to be distributed among competing processes in such a way that the computer system will never enter a deadlock state. In fact, the only necessary and sufficient conditions to solve deadlock problems are the total number of resources and their instances besides the maximum needs of resources and their instances for each process. The theory and details are explained with some examples in the contents.
{"title":"Design and implementing a software tool to ensure undeadlock state by perfect distribution of resources' instances among competing processes","authors":"Imad Matti Bakko, R. M. Yas","doi":"10.14419/JACST.V4I2.4857","DOIUrl":"https://doi.org/10.14419/JACST.V4I2.4857","url":null,"abstract":"In computer operating systems books, they explain and solve deadlock problems by declaring in advance the maximum needs of resources and their instances for each process, the total number of resources' instances, and the allocation of the resources' instances for each process. In this paper, we introduce an effective software tool to prove that it is not necessary to declare in advance the allocation of resources' instances for each process since we suggested and implement in the tool some equations to calculate and discover a suitable allocation of resources' instances to be distributed among competing processes in such a way that the computer system will never enter a deadlock state. In fact, the only necessary and sufficient conditions to solve deadlock problems are the total number of resources and their instances besides the maximum needs of resources and their instances for each process. The theory and details are explained with some examples in the contents.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134298301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}