{"title":"Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies","authors":"Chinazunwa Uwaoma","doi":"10.5120/ijais2023451954","DOIUrl":"https://doi.org/10.5120/ijais2023451954","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"54 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the Fight against Social Media Misinformation: An Ensemble Deep Learning Framework for Detecting Deepfakes","authors":"Ejike Joseph Aloke, Joshua Abah","doi":"10.5120/ijais2023451952","DOIUrl":"https://doi.org/10.5120/ijais2023451952","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"19 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniel Nuhu, Muhammad Mukhtar Liman, Timothy Moses
{"title":"REVIEW OF ONLINE SHOPPING DESIGN IN NIGERIA: CHALLENGES AND OPPORTUNITIES","authors":"Daniel Nuhu, Muhammad Mukhtar Liman, Timothy Moses","doi":"10.5120/ijais2023451953","DOIUrl":"https://doi.org/10.5120/ijais2023451953","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"24 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of smartphones in Nigeria has continued to increase daily and worsened during and after the Covid-19 pandemic that locked down even the developed nations. Like computers, smartphones keep the memory of users’ details like account details and transaction histories including passwords of their social media platforms. The huge volume of data being stored by smartphones brings about an unlimited number of privacy and security challenges. That is, security threats perpetrated by malicious actors or hackers is proportional to the ubiquity and adoption of smartphone in Nigeria. Therefore, this study aims to assess the awareness level of smartphone users in Nigeria regarding privacy and security issues associated with smartphones. By so doing, the study surveyed smartphone users across the 36 states and the FCT in Nigeria. The study employed both quantitative and qualitative methods. The quantitative research approach was utilized for data collection. While the qualitative approach was leveraged for descriptive analytics. The analysis was performed using the Statistical Package for Social Science (SPSS) to provide the graphical results. An existing mathematical model was therefore adapted and utilized to calculate the awareness level of smartphone users. The analytical outcome of the survey revealed that a considerable number of smartphone users in Nigeria are unaware of privacy and security issues allied to smartphones.
{"title":"Privacy And Security Issues: An Assessment of the Awareness Level of Smartphone Users in Nigeria","authors":"Omeka Friday Odey, Joshua Abah, Dekera Kenneth Kwaghtyo","doi":"10.5120/ijais2023451948","DOIUrl":"https://doi.org/10.5120/ijais2023451948","url":null,"abstract":"The use of smartphones in Nigeria has continued to increase daily and worsened during and after the Covid-19 pandemic that locked down even the developed nations. Like computers, smartphones keep the memory of users’ details like account details and transaction histories including passwords of their social media platforms. The huge volume of data being stored by smartphones brings about an unlimited number of privacy and security challenges. That is, security threats perpetrated by malicious actors or hackers is proportional to the ubiquity and adoption of smartphone in Nigeria. Therefore, this study aims to assess the awareness level of smartphone users in Nigeria regarding privacy and security issues associated with smartphones. By so doing, the study surveyed smartphone users across the 36 states and the FCT in Nigeria. The study employed both quantitative and qualitative methods. The quantitative research approach was utilized for data collection. While the qualitative approach was leveraged for descriptive analytics. The analysis was performed using the Statistical Package for Social Science (SPSS) to provide the graphical results. An existing mathematical model was therefore adapted and utilized to calculate the awareness level of smartphone users. The analytical outcome of the survey revealed that a considerable number of smartphone users in Nigeria are unaware of privacy and security issues allied to smartphones.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139315972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Timothy Moses, Henry Egaga Obi, C. I. Eke, Jeffrey Agushaka
{"title":"Enhancing Fake News Identification in Social Media through Ensemble Learning Methods","authors":"Timothy Moses, Henry Egaga Obi, C. I. Eke, Jeffrey Agushaka","doi":"10.5120/ijais2023451949","DOIUrl":"https://doi.org/10.5120/ijais2023451949","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139338498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Towhidul Islam Robin, Md. Samiul Islam, Ahmed Abdal Shafi Rasel, Mehedi Hasan
{"title":"Real-Time Face Mask Detection Using Deep Learning","authors":"Md. Towhidul Islam Robin, Md. Samiul Islam, Ahmed Abdal Shafi Rasel, Mehedi Hasan","doi":"10.5120/ijais2023451944","DOIUrl":"https://doi.org/10.5120/ijais2023451944","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"213 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139368416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This project work studies the development of restaurant management system. It is as a result of problem associated with the existing system which involves the use of Hashmicro system to compliment the manual method in keeping information in Sammies restaurant. The existing system are characterized with many problems which are staff are taking too much time pursuing mistakes instead of tending to customers, inventory doesn’t match your tallies, sales going unrecorded, and other. Restaurant personnel use computerized management database information system to gather data, process data and also keep it for future use and product ordering. The proposed system was implemented using HTML/CSS for the user interface, PHP and MYSQL database for the back end. Structured system analysis and design methodology was adopted. The designed system will allow the pliability to the Users/ Customers to order from Restaurants. It will also give recommendations to the users from the owners of the restaurants uploaded daily. In the proposed system, there will be no limitation on the amount of order the customer wants.
本项目研究餐厅管理系统的开发。现有系统使用 Hashmicro 系统来补充 Sammies 餐厅手工保存信息的方法,这是现有系统存在问题的结果。现有系统存在许多问题,如员工花太多时间纠正错误而不是照顾顾客、库存与统计不符、销售未记录等。餐厅人员使用计算机管理数据库信息系统来收集数据、处理数据并保存数据,以便将来使用和订购产品。该系统的用户界面使用 HTML/CSS,后端使用 PHP 和 MYSQL 数据库。采用了结构化系统分析和设计方法。所设计的系统将允许用户/客户从餐馆订餐。它还将向用户提供每天上传的餐馆老板的推荐信息。在提议的系统中,顾客订购的数量将不受限制。
{"title":"Web-Based Integrated Restaurant Management System","authors":"L. U. Oghenekaro, Jacinta Chielozonam Okafor","doi":"10.5120/ijais2023451945","DOIUrl":"https://doi.org/10.5120/ijais2023451945","url":null,"abstract":"This project work studies the development of restaurant management system. It is as a result of problem associated with the existing system which involves the use of Hashmicro system to compliment the manual method in keeping information in Sammies restaurant. The existing system are characterized with many problems which are staff are taking too much time pursuing mistakes instead of tending to customers, inventory doesn’t match your tallies, sales going unrecorded, and other. Restaurant personnel use computerized management database information system to gather data, process data and also keep it for future use and product ordering. The proposed system was implemented using HTML/CSS for the user interface, PHP and MYSQL database for the back end. Structured system analysis and design methodology was adopted. The designed system will allow the pliability to the Users/ Customers to order from Restaurants. It will also give recommendations to the users from the owners of the restaurants uploaded daily. In the proposed system, there will be no limitation on the amount of order the customer wants.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"133 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increase in the amount of data present over the cloud, there is a need for an efficient management of data to research and industry. Big Data is used by different organizations to extract valuable information which can be analyzed computationally to reveal trends, patterns, and associations exposing the human interaction and behavior for making various industrial decisions. Due to the enormous volume of data, the traditional systems are becoming incapable of storing and computing such voluminous data. To resolve this issue, the data is stored in the cloud, and all the analysis is done over Big Data using the cloud. But to make any practical decision, the data must be optimized, secured and visualized. Analysing large volume of data is not beneficial always unless it is adequately investigated. A perfect knowledge base should be selected. The techniques which are available right now are insufficient to analyze the Big Data and identify the frequent services accessed by the cloud users. Various functions can be integrated to provide a better environment to work in. Using these services, people become widely vulnerable to exposure. That is, it becomes possible to collect more data than it is required which may lead to leakage of the data and hence security concerns are at stake. Results can be analyzed in a better way by visuals like graphs, charts, etc. and thus, helps in faster and efficient decision-making and predictive modeling which can further extend this domain to Artificial Intelligence. MapReduce Algorithm assists in maintaining a log of user’s activities in the cloud and show the frequently used services. This paper shows the advancements done in the field of Data Analytics with Cloud Computing and Big Data, and also proposes a scheme for making Big Data Analytics more accurate, efficient and beneficial to the Cloud environment.
{"title":"Advancements in Data Analytics using Big Data and Cloud Computing","authors":"Rayan Dasoriya, Krishna Samdani","doi":"10.5120/IJAIS2018451724","DOIUrl":"https://doi.org/10.5120/IJAIS2018451724","url":null,"abstract":"With the increase in the amount of data present over the cloud, there is a need for an efficient management of data to research and industry. Big Data is used by different organizations to extract valuable information which can be analyzed computationally to reveal trends, patterns, and associations exposing the human interaction and behavior for making various industrial decisions. Due to the enormous volume of data, the traditional systems are becoming incapable of storing and computing such voluminous data. To resolve this issue, the data is stored in the cloud, and all the analysis is done over Big Data using the cloud. But to make any practical decision, the data must be optimized, secured and visualized. Analysing large volume of data is not beneficial always unless it is adequately investigated. A perfect knowledge base should be selected. The techniques which are available right now are insufficient to analyze the Big Data and identify the frequent services accessed by the cloud users. Various functions can be integrated to provide a better environment to work in. Using these services, people become widely vulnerable to exposure. That is, it becomes possible to collect more data than it is required which may lead to leakage of the data and hence security concerns are at stake. Results can be analyzed in a better way by visuals like graphs, charts, etc. and thus, helps in faster and efficient decision-making and predictive modeling which can further extend this domain to Artificial Intelligence. MapReduce Algorithm assists in maintaining a log of user’s activities in the cloud and show the frequently used services. This paper shows the advancements done in the field of Data Analytics with Cloud Computing and Big Data, and also proposes a scheme for making Big Data Analytics more accurate, efficient and beneficial to the Cloud environment.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88548756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the design, training, and evaluation of a deep neural network for removing noise from medical fluoroscopy videos. The method described in this work, unlike the current standard techniques for video denoising, is able to deliver a result quickly enough to be used in real-time scenarios. Furthermore, this method is able to produce results of a similar quality to the existing industry-standard denoising techniques.
{"title":"Real-Time Medical Video Denoising with Deep Learning: Application to Angiography.","authors":"Praneeth Sadda, Taha Qarni","doi":"10.5120/ijais2018451755","DOIUrl":"https://doi.org/10.5120/ijais2018451755","url":null,"abstract":"<p><p>This paper describes the design, training, and evaluation of a deep neural network for removing noise from medical fluoroscopy videos. The method described in this work, unlike the current standard techniques for video denoising, is able to deliver a result quickly enough to be used in real-time scenarios. Furthermore, this method is able to produce results of a similar quality to the existing industry-standard denoising techniques.</p>","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"12 13","pages":"22-28"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.5120/ijais2018451755","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36201860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ilham Maskani, J. Boutahar, Souhaïl El Ghazi El Houssaïni
In Security Requirements Engineering, many approaches offer different ways to model security requirements. This paper presents a model that can be used in conjunction with any of the former approaches. The model is an extension of SysML requirements diagrams that adds concepts from Security Requirements Engineering: Stakeholder, Goal, Asset and Risk. The proposed model is illustrated by applying it to a telemedicine system.
{"title":"Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts","authors":"Ilham Maskani, J. Boutahar, Souhaïl El Ghazi El Houssaïni","doi":"10.5120/IJAIS2017451731","DOIUrl":"https://doi.org/10.5120/IJAIS2017451731","url":null,"abstract":"In Security Requirements Engineering, many approaches offer different ways to model security requirements. This paper presents a model that can be used in conjunction with any of the former approaches. The model is an extension of SysML requirements diagrams that adds concepts from Security Requirements Engineering: Stakeholder, Goal, Asset and Risk. The proposed model is illustrated by applying it to a telemedicine system.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"25 1","pages":"30-36"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83291481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}