首页 > 最新文献

International journal of applied information systems最新文献

英文 中文
Building an Enterprise-Class Electronic Commerce in Nigeria 在尼日利亚建立企业级电子商务
Pub Date : 2017-07-06 DOI: 10.5120/IJAIS2017451697
Raphael Olufemi Akinyede
Buying and selling on the Net (e-commerce) is no more new to both the developed and developing nations. The issue now lies with the effectiveness of the existing payment system and the ICT infrastructures in place. This research examined the problems of the existing payment system in Nigeria and proposed a new one that would take care some of the limitations of the existing ones. The architecture of the proposed payment system was designed and coded using HTML to design the interfaces, JAVA Scripts as the scripting language that connects the front-end with the back-end and MySQL as the database. Application software was developed to simulate the design model using NetBeans IDE 6.9, MySQL database system and Java ME programming language. The simulation runs were done and hosted on www.elexsoft.com/mobilepaymentsystem/ and implemented on mobile browsers using Samsung android GT-S5830D smartphone, 800 Mhz Intel processor mobile phone. The system uses the most common method of authentication which is user name and password.
网上买卖(电子商务)对发达国家和发展中国家都不再是新鲜事物。现在的问题在于现有的支付系统和现有的信息和通信技术基础设施的有效性。这项研究审查了尼日利亚现有支付系统的问题,并提出了一个新的支付系统,该系统将照顾到现有支付系统的一些局限性。采用HTML设计接口,JAVA Scripts作为连接前端和后端的脚本语言,MySQL作为数据库,对所提出的支付系统的体系结构进行了设计和编码。采用NetBeans IDE 6.9, MySQL数据库系统,Java ME编程语言,开发应用软件对设计模型进行仿真。模拟运行在www.elexsoft.com/mobilepaymentsystem/上完成,并在使用三星android GT-S5830D智能手机和800 Mhz英特尔处理器手机的移动浏览器上实现。系统采用最常用的认证方式,即用户名和密码。
{"title":"Building an Enterprise-Class Electronic Commerce in Nigeria","authors":"Raphael Olufemi Akinyede","doi":"10.5120/IJAIS2017451697","DOIUrl":"https://doi.org/10.5120/IJAIS2017451697","url":null,"abstract":"Buying and selling on the Net (e-commerce) is no more new to both the developed and developing nations. The issue now lies with the effectiveness of the existing payment system and the ICT infrastructures in place. This research examined the problems of the existing payment system in Nigeria and proposed a new one that would take care some of the limitations of the existing ones. The architecture of the proposed payment system was designed and coded using HTML to design the interfaces, JAVA Scripts as the scripting language that connects the front-end with the back-end and MySQL as the database. Application software was developed to simulate the design model using NetBeans IDE 6.9, MySQL database system and Java ME programming language. The simulation runs were done and hosted on www.elexsoft.com/mobilepaymentsystem/ and implemented on mobile browsers using Samsung android GT-S5830D smartphone, 800 Mhz Intel processor mobile phone. The system uses the most common method of authentication which is user name and password.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"26 1","pages":"26-32"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85289716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Cryptographic Technique for Securing Cloud Storage Systems 云存储系统安全的有效加密技术
Pub Date : 2017-07-06 DOI: 10.5120/ijais2017451696
Isaac Kofi Nti, Eric Gyamfi, M. Osei
Storing of data in the cloud (Cloud Computing) offers an effective and quick way of granting access to ones information from a third party service provider, providing business expansion at a lesser cost. Cloud data storage systems provide means to store bigger data in storage servers [1]. The data stored in the cloud are stored and accessed from the internet over a longer time, making data exposed to hackers to steal stored and transmitted data over the cloud environment, leading to data integrity loss and users of cloud data unhappy. This paper proposed a novel cryptographic techniques to enhance the security in cloud environment and reduce the time associated with cryptographic encryption to a minimum. General Terms Cryptographic Technique, Securing Cloud Storage Systems
将数据存储在云中(云计算)提供了一种有效而快速的方式,允许从第三方服务提供商访问自己的信息,从而以较低的成本提供业务扩展。云数据存储系统提供了在存储服务器上存储更大数据的手段[1]。存储在云中的数据在互联网上存储和访问的时间更长,使得数据暴露给黑客窃取云环境中存储和传输的数据,导致数据完整性丢失,云数据用户不满意。本文提出了一种新的加密技术,以提高云环境下的安全性,并最大限度地减少与加密相关的时间。通用术语加密技术,云存储系统安全
{"title":"Effective Cryptographic Technique for Securing Cloud Storage Systems","authors":"Isaac Kofi Nti, Eric Gyamfi, M. Osei","doi":"10.5120/ijais2017451696","DOIUrl":"https://doi.org/10.5120/ijais2017451696","url":null,"abstract":"Storing of data in the cloud (Cloud Computing) offers an effective and quick way of granting access to ones information from a third party service provider, providing business expansion at a lesser cost. Cloud data storage systems provide means to store bigger data in storage servers [1]. The data stored in the cloud are stored and accessed from the internet over a longer time, making data exposed to hackers to steal stored and transmitted data over the cloud environment, leading to data integrity loss and users of cloud data unhappy. This paper proposed a novel cryptographic techniques to enhance the security in cloud environment and reduce the time associated with cryptographic encryption to a minimum. General Terms Cryptographic Technique, Securing Cloud Storage Systems","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"346 1","pages":"19-25"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79659990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Chaotic Substation and Permutation Method for Image Encryption 一种新的图像加密混沌变位和排列方法
Pub Date : 2017-07-06 DOI: 10.5120/IJAIS2017451698
Ekhlas Abbas Albahrani, Tayseer Karam Alshekly
New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.
将分组密码和混沌映射相结合,提出了一种新的图像加密的混沌变位和排列方法。新算法对500字节的块进行加密和解密。首先使用超混沌映射对每个块进行排列,然后使用一维伯努利映射对结果进行替换。最后,结果块与键块进行xor。对所提出的密码图像进行了安全性分析(密钥空间分析和密钥灵敏度分析)和统计攻击分析(直方图、相关、差分攻击和信息熵)等多项测试,结果表明所提出的加密方案具有较大的密钥空间,是安全的;它对密码和图像非常敏感。
{"title":"New Chaotic Substation and Permutation Method for Image Encryption","authors":"Ekhlas Abbas Albahrani, Tayseer Karam Alshekly","doi":"10.5120/IJAIS2017451698","DOIUrl":"https://doi.org/10.5120/IJAIS2017451698","url":null,"abstract":"New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"1 1","pages":"33-39"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80437048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Taxonomies in Higher Education 高等教育中的分类法
Pub Date : 2017-07-06 DOI: 10.5120/IJAIS2017451695
A. B. Sawad, F. M. Reda, Fayez Nahed Al-Sehani
In higher education, there are many taxonomies or classifications. It needs more time and much resources to cover it. This paper trying to cover some taxonomies in higher education to make standardization. The taxonomy of Structure of the Observed Learning Outcome including first, second, third, third, fourth and fifth SOLO have been discussed. Furthermore, decision making in higher education is an important concern while the processes of decision-making involvement have been defined in six steps. In addition, the value chain, inbound logistics and operations of higher education has been discussed in detail along with integration in higher education. Quality assurance in higher education is examined. Additionally, open educational practices and reform in high education are considered. Besides, environment of learning and Decision Support Systems have also been depictured, along with data used in higher education. Taxonomy of cognitive domain is also analyzed as one of the fundamental taxonomies in higher education. Since important for modern world, instructional technology is described. Knowledge acquisition was also part of this paper.
在高等教育中,有许多分类法或分类。它需要更多的时间和更多的资源来覆盖它。本文试图对高等教育中的一些分类进行梳理,使之规范化。讨论了观察学习成果的结构分类,包括第一、第二、第三、第三、第四和第五次独奏。此外,高等教育中的决策是一个重要的问题,而决策参与的过程被定义为六个步骤。此外,对高等教育的价值链、入境物流和运营以及高等教育的整合进行了详细的讨论。高等教育的质量保证受到审查。此外,开放教育的实践和高等教育改革的考虑。此外,还描述了学习环境和决策支持系统,以及高等教育中使用的数据。并分析了认知领域分类作为高等教育的基本分类之一。由于对现代世界的重要性,教学技术被描述。知识获取也是本文的一部分。
{"title":"Taxonomies in Higher Education","authors":"A. B. Sawad, F. M. Reda, Fayez Nahed Al-Sehani","doi":"10.5120/IJAIS2017451695","DOIUrl":"https://doi.org/10.5120/IJAIS2017451695","url":null,"abstract":"In higher education, there are many taxonomies or classifications. It needs more time and much resources to cover it. This paper trying to cover some taxonomies in higher education to make standardization. The taxonomy of Structure of the Observed Learning Outcome including first, second, third, third, fourth and fifth SOLO have been discussed. Furthermore, decision making in higher education is an important concern while the processes of decision-making involvement have been defined in six steps. In addition, the value chain, inbound logistics and operations of higher education has been discussed in detail along with integration in higher education. Quality assurance in higher education is examined. Additionally, open educational practices and reform in high education are considered. Besides, environment of learning and Decision Support Systems have also been depictured, along with data used in higher education. Taxonomy of cognitive domain is also analyzed as one of the fundamental taxonomies in higher education. Since important for modern world, instructional technology is described. Knowledge acquisition was also part of this paper.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"49 1","pages":"8-18"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90976660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing and Leveraging Business Intelligence Systems for Decision Making in Organizations 开发和利用商业智能系统的决策组织
Pub Date : 2017-07-06 DOI: 10.5120/IJAIS2017451694
M. Almalki
In recent years, Business Intelligence (BI) has started to play a significant role for businesses regarding of development and helping to increase achievements and supporting decisions making. Factors such as changing, innovation, globalization, and sustainability in changing markets environment accelerate the shift towards using BI. One of the difficulties that are affecting the business world is the increasing volume of data that is everywhere. BI allows for a large amount of data from different sources to be converted into helpful information, knowledge, and insights. This paper explains that the BI systems are not just about tools. Nevertheless, it is a wide range of applications and processes not for getting data out of the warehouse, but also for getting data into a warehouse, and for visualizing the trend in the data. This paper aims to investigate the concepts of BI, its framework, the relationship between BI and DSS, benefits of BI, its applications, its software and tools, and finally issues of implementation BI.
近年来,商业智能(BI)开始在企业发展、帮助提高业绩和支持决策方面发挥重要作用。在不断变化的市场环境中,变化、创新、全球化和可持续性等因素加速了向使用BI的转变。影响商业世界的困难之一是无处不在的数据量不断增加。BI允许将来自不同来源的大量数据转换为有用的信息、知识和见解。本文解释了BI系统不仅仅是工具。尽管如此,它是一个广泛的应用程序和流程,不仅用于将数据从仓库取出,而且还用于将数据放入仓库,并用于可视化数据中的趋势。本文旨在探讨商业智能的概念、框架、商业智能与决策支持系统之间的关系、商业智能的好处、商业智能的应用、商业智能的软件和工具以及实施商业智能的问题。
{"title":"Developing and Leveraging Business Intelligence Systems for Decision Making in Organizations","authors":"M. Almalki","doi":"10.5120/IJAIS2017451694","DOIUrl":"https://doi.org/10.5120/IJAIS2017451694","url":null,"abstract":"In recent years, Business Intelligence (BI) has started to play a significant role for businesses regarding of development and helping to increase achievements and supporting decisions making. Factors such as changing, innovation, globalization, and sustainability in changing markets environment accelerate the shift towards using BI. One of the difficulties that are affecting the business world is the increasing volume of data that is everywhere. BI allows for a large amount of data from different sources to be converted into helpful information, knowledge, and insights. This paper explains that the BI systems are not just about tools. Nevertheless, it is a wide range of applications and processes not for getting data out of the warehouse, but also for getting data into a warehouse, and for visualizing the trend in the data. This paper aims to investigate the concepts of BI, its framework, the relationship between BI and DSS, benefits of BI, its applications, its software and tools, and finally issues of implementation BI.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"50 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88714213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an Integrated End-To-End Electronic Procurement Management System for Agro-Business in Nigeria 尼日利亚农业综合端到端电子采购管理系统的开发
Pub Date : 2017-06-06 DOI: 10.5120/IJAIS2017451666
E. Ajulo, R. Akinyede, O. Boyinbode
This research is based on developing an integrated end-to-end electronic procurement system for agro-business in Nigeria with the aim of reducing information asymmetry, making agro-business more profitable and attractive by lowering transaction costs. Qualitative findings via structured questionnaire and direct one-on-one interview were carried out among farmers, farmers associations and agro input industries. Microsoft Office Excel was used as a tool to analyze all gathered data. Pinto and Slevin procurement management model was adopted to identify the critical variable of the procurement process and an architecture was designed for the system. Mathematical model of the system was developed, since the developed system is a web based, the client-side was implemented using HTML (Hypertext Markup Language) while the server-side was implemented with Hypertext Preprocessor (PHP) and the database management system used is MySQL. The implementation was done on Intel processor core i3, 1TB Hard Disk and 8GB DDR2 RAM computer system. Functional and performance tests were carried out on the system and the test showed that the system is capable of handling multiple simultaneous users with an average response time of 0.011 to 0.015 seconds.
本研究的基础是为尼日利亚的农业企业开发一个集成的端到端电子采购系统,目的是减少信息不对称,通过降低交易成本使农业企业更具利润和吸引力。通过结构化问卷调查和直接一对一访谈对农民、农民协会和农业投入品行业进行定性调查。使用Microsoft Office Excel作为分析收集到的所有数据的工具。采用Pinto和Slevin采购管理模型识别采购过程中的关键变量,并设计了系统的体系结构。开发了系统的数学模型,由于所开发的系统是基于web的,客户端采用HTML(超文本标记语言)实现,服务器端采用超文本预处理器(PHP)实现,数据库管理系统采用MySQL。在Intel处理器i3内核、1TB硬盘和8GB DDR2内存的计算机系统上实现。对系统进行了功能和性能测试,测试表明系统能够同时处理多个用户,平均响应时间为0.011 ~ 0.015秒。
{"title":"Development of an Integrated End-To-End Electronic Procurement Management System for Agro-Business in Nigeria","authors":"E. Ajulo, R. Akinyede, O. Boyinbode","doi":"10.5120/IJAIS2017451666","DOIUrl":"https://doi.org/10.5120/IJAIS2017451666","url":null,"abstract":"This research is based on developing an integrated end-to-end electronic procurement system for agro-business in Nigeria with the aim of reducing information asymmetry, making agro-business more profitable and attractive by lowering transaction costs. Qualitative findings via structured questionnaire and direct one-on-one interview were carried out among farmers, farmers associations and agro input industries. Microsoft Office Excel was used as a tool to analyze all gathered data. Pinto and Slevin procurement management model was adopted to identify the critical variable of the procurement process and an architecture was designed for the system. Mathematical model of the system was developed, since the developed system is a web based, the client-side was implemented using HTML (Hypertext Markup Language) while the server-side was implemented with Hypertext Preprocessor (PHP) and the database management system used is MySQL. The implementation was done on Intel processor core i3, 1TB Hard Disk and 8GB DDR2 RAM computer system. Functional and performance tests were carried out on the system and the test showed that the system is capable of handling multiple simultaneous users with an average response time of 0.011 to 0.015 seconds.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"91 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83768794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Agglomerative Clustering Method 一种改进的聚类方法
Pub Date : 2017-06-06 DOI: 10.5120/IJAIS2017451689
O. Kettani, F. Ramdani
Clustering is a common and useful exploratory task widely used in Data mining. Among the many existing clustering algorithms, the Agglomerative Clustering Method (ACM) introduced by the authors suffers from an obvious drawback: its sensitivity to data ordering. To overcome this issue, we propose in this paper to initialize the ACM by using the KKZ seed algorithm. The proposed approach (called KKZ_ACM) has a lower computational time complexity than the famous kmeans algorithm. We evaluated its performance by applying on various benchmark datasets and compare with ACM, kmeans++ and KKZ_ k-means. Our performance studies have demonstrated that the proposed approach is effective in producing consistent clustering results in term of average Silhouette index. General Terms Data mining, Algorithms
聚类是数据挖掘中广泛使用的一种常见而有用的探索性任务。在现有的众多聚类算法中,本文介绍的聚类方法(Agglomerative clustering Method, ACM)有一个明显的缺点:对数据排序的敏感性。为了克服这一问题,本文提出使用KKZ种子算法初始化ACM。所提出的方法(称为KKZ_ACM)具有比著名的kmeans算法更低的计算时间复杂度。我们通过应用于各种基准数据集来评估其性能,并与ACM、kmeans++和KKZ_ k-means进行比较。我们的性能研究表明,所提出的方法在平均廓形指数方面产生一致的聚类结果是有效的。通用术语数据挖掘,算法
{"title":"An Improved Agglomerative Clustering Method","authors":"O. Kettani, F. Ramdani","doi":"10.5120/IJAIS2017451689","DOIUrl":"https://doi.org/10.5120/IJAIS2017451689","url":null,"abstract":"Clustering is a common and useful exploratory task widely used in Data mining. Among the many existing clustering algorithms, the Agglomerative Clustering Method (ACM) introduced by the authors suffers from an obvious drawback: its sensitivity to data ordering. To overcome this issue, we propose in this paper to initialize the ACM by using the KKZ seed algorithm. The proposed approach (called KKZ_ACM) has a lower computational time complexity than the famous kmeans algorithm. We evaluated its performance by applying on various benchmark datasets and compare with ACM, kmeans++ and KKZ_ k-means. Our performance studies have demonstrated that the proposed approach is effective in producing consistent clustering results in term of average Silhouette index. General Terms Data mining, Algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"131 1","pages":"16-23"},"PeriodicalIF":0.0,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74611442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating Websites and Web Application Vulnerabilities: Webmaster’s Perspective 调查网站和Web应用程序漏洞:网站管理员的观点
Pub Date : 2017-06-06 DOI: 10.5120/IJAIS2017451673
V. Appiah, Isaac Kofi Nti, O. Nyarko-Boateng
The Development in Information Technology (IT) have raised up a lot of fears about the risk to information concomitant with feeble IT security, including weakness to malware, attacks, virus and compromise of network systems and services. Anyone who goes on the net is vulnerable to security threats. Inadequate IT security may result in compromised integrity, confidentiality and the release of sensitive data to unauthorized persons. In most development communities and countries, IT vulnerability has become an important concept employed to guide the evaluation, design and targeting of programs. Remaining ahead of the everevolving threat of an information break on websites and web application necessitates conscientiousness on the part webmasters and heads of IT sections within an organization in understanding and anticipating the risks. This paper seek to examine the knowledge of webmasters and heads of IT sections on threats and vulnerabilities on the cyber world of selected institutions in Ghana through semi-structured questioners and one-on-one interview and proposed away forward in boosting the knowledge base of IT and Webmaster, hence contribute to the reduction of cyber-crime in the country and also outline some guidelines on how to surf the web safely to end-users. The survey showed that, on an average 47% of the respondent have little or no knowledge in at least one or more of the existing website vulnerabilities. General Terms Websites and web application vulnerabilities
随着信息技术的发展,人们越来越担心信息安全带来的风险,包括对恶意软件、攻击、病毒和网络系统和服务的破坏。任何上网的人都容易受到安全威胁。资讯科技保安不足可能导致资料的完整性、机密性受到损害,并将敏感资料泄露给未经授权的人士。在大多数发展社区和国家,IT脆弱性已成为指导项目评估、设计和目标确定的重要概念。在网站和web应用程序上不断变化的信息泄露威胁中保持领先地位,需要网站管理员和组织内IT部门负责人在理解和预测风险方面的责任心。本文试图通过半结构化的提问者和一对一的访谈,检查加纳选定机构的网站管理员和IT部门负责人对网络世界的威胁和漏洞的知识,并提出进一步提高IT和网站管理员的知识库,从而有助于减少该国的网络犯罪,并概述了一些指导方针,指导最终用户如何安全上网。调查显示,平均47%的受访者对至少一个或多个现有的网站漏洞知之甚少或一无所知。网站和web应用程序漏洞
{"title":"Investigating Websites and Web Application Vulnerabilities: Webmaster’s Perspective","authors":"V. Appiah, Isaac Kofi Nti, O. Nyarko-Boateng","doi":"10.5120/IJAIS2017451673","DOIUrl":"https://doi.org/10.5120/IJAIS2017451673","url":null,"abstract":"The Development in Information Technology (IT) have raised up a lot of fears about the risk to information concomitant with feeble IT security, including weakness to malware, attacks, virus and compromise of network systems and services. Anyone who goes on the net is vulnerable to security threats. Inadequate IT security may result in compromised integrity, confidentiality and the release of sensitive data to unauthorized persons. In most development communities and countries, IT vulnerability has become an important concept employed to guide the evaluation, design and targeting of programs. Remaining ahead of the everevolving threat of an information break on websites and web application necessitates conscientiousness on the part webmasters and heads of IT sections within an organization in understanding and anticipating the risks. This paper seek to examine the knowledge of webmasters and heads of IT sections on threats and vulnerabilities on the cyber world of selected institutions in Ghana through semi-structured questioners and one-on-one interview and proposed away forward in boosting the knowledge base of IT and Webmaster, hence contribute to the reduction of cyber-crime in the country and also outline some guidelines on how to surf the web safely to end-users. The survey showed that, on an average 47% of the respondent have little or no knowledge in at least one or more of the existing website vulnerabilities. General Terms Websites and web application vulnerabilities","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"34 1","pages":"10-15"},"PeriodicalIF":0.0,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81171220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Fast Deterministic Kmeans Initialization 快速确定性Kmeans初始化
Pub Date : 2017-05-05 DOI: 10.5120/IJAIS2017451683
O. Kettani, F. Ramdani
The k-means algorithm remains one of the most widely used clustering methods, in spite of its sensitivity to the initial settings. This paper explores a simple, computationally low, deterministic method which provides k-means with initial seeds to cluster a given data set. It is simply based on computing the means of k samples with equal parts taken from the given data set. We test and compare this method to the related well know kkz initialization algorithm for kmeans, using both simulated and real data, and find it to be more efficient in many cases. General Terms Data Mining,Clustering.
尽管k-means算法对初始设置很敏感,但它仍然是最广泛使用的聚类方法之一。本文探讨了一种简单,计算量低,确定性的方法,该方法为k-means提供初始种子来聚类给定数据集。它只是基于计算k个样本的均值,从给定的数据集中取等量的样本。我们使用模拟数据和真实数据对该方法与相关的kkz初始化算法进行了测试和比较,发现该方法在许多情况下更有效。数据挖掘,聚类。
{"title":"A Fast Deterministic Kmeans Initialization","authors":"O. Kettani, F. Ramdani","doi":"10.5120/IJAIS2017451683","DOIUrl":"https://doi.org/10.5120/IJAIS2017451683","url":null,"abstract":"The k-means algorithm remains one of the most widely used clustering methods, in spite of its sensitivity to the initial settings. This paper explores a simple, computationally low, deterministic method which provides k-means with initial seeds to cluster a given data set. It is simply based on computing the means of k samples with equal parts taken from the given data set. We test and compare this method to the related well know kkz initialization algorithm for kmeans, using both simulated and real data, and find it to be more efficient in many cases. General Terms Data Mining,Clustering.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"13 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85224138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web-based E-Library System for Tertiary Institutions 专上院校网上电子图书馆系统
Pub Date : 2017-05-05 DOI: 10.5120/IJAIS2017451685
M. A. Alarape, Samuel Ndifreke Edet
An e-library system is a very important element of the internet age libraries. A library without it may face a lot of challenges like the lack of adequate visitation by the users. This paper presents an e-library system that was developed using PHP programming language, HTML and CSS for design and MySQL as a backend database technology to run on Apache v3.21 application server and Mozilla FireFox web browser. The system allows multimedia sources to be accessed by the users of the library and was able to eliminate the problems of unavailiability of library resources, inadequate space, physical bounding and restricted access that characterized the traditional library system. General Terms Information Systems
电子图书馆系统是网络时代图书馆的重要组成部分。没有它的图书馆可能会面临许多挑战,比如用户缺乏足够的访问。本文采用PHP编程语言,HTML和CSS进行设计,MySQL作为后台数据库技术,在Apache v3.21应用服务器和Mozilla FireFox浏览器上开发了一个电子图书馆系统。该系统允许图书馆用户访问多媒体资源,并能够消除传统图书馆系统所特有的图书馆资源不可用、空间不足、物理边界和访问受限等问题。通用术语信息系统
{"title":"A Web-based E-Library System for Tertiary Institutions","authors":"M. A. Alarape, Samuel Ndifreke Edet","doi":"10.5120/IJAIS2017451685","DOIUrl":"https://doi.org/10.5120/IJAIS2017451685","url":null,"abstract":"An e-library system is a very important element of the internet age libraries. A library without it may face a lot of challenges like the lack of adequate visitation by the users. This paper presents an e-library system that was developed using PHP programming language, HTML and CSS for design and MySQL as a backend database technology to run on Apache v3.21 application server and Mozilla FireFox web browser. The system allows multimedia sources to be accessed by the users of the library and was able to eliminate the problems of unavailiability of library resources, inadequate space, physical bounding and restricted access that characterized the traditional library system. General Terms Information Systems","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"s3-16 1","pages":"17-22"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90808791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International journal of applied information systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1