Buying and selling on the Net (e-commerce) is no more new to both the developed and developing nations. The issue now lies with the effectiveness of the existing payment system and the ICT infrastructures in place. This research examined the problems of the existing payment system in Nigeria and proposed a new one that would take care some of the limitations of the existing ones. The architecture of the proposed payment system was designed and coded using HTML to design the interfaces, JAVA Scripts as the scripting language that connects the front-end with the back-end and MySQL as the database. Application software was developed to simulate the design model using NetBeans IDE 6.9, MySQL database system and Java ME programming language. The simulation runs were done and hosted on www.elexsoft.com/mobilepaymentsystem/ and implemented on mobile browsers using Samsung android GT-S5830D smartphone, 800 Mhz Intel processor mobile phone. The system uses the most common method of authentication which is user name and password.
网上买卖(电子商务)对发达国家和发展中国家都不再是新鲜事物。现在的问题在于现有的支付系统和现有的信息和通信技术基础设施的有效性。这项研究审查了尼日利亚现有支付系统的问题,并提出了一个新的支付系统,该系统将照顾到现有支付系统的一些局限性。采用HTML设计接口,JAVA Scripts作为连接前端和后端的脚本语言,MySQL作为数据库,对所提出的支付系统的体系结构进行了设计和编码。采用NetBeans IDE 6.9, MySQL数据库系统,Java ME编程语言,开发应用软件对设计模型进行仿真。模拟运行在www.elexsoft.com/mobilepaymentsystem/上完成,并在使用三星android GT-S5830D智能手机和800 Mhz英特尔处理器手机的移动浏览器上实现。系统采用最常用的认证方式,即用户名和密码。
{"title":"Building an Enterprise-Class Electronic Commerce in Nigeria","authors":"Raphael Olufemi Akinyede","doi":"10.5120/IJAIS2017451697","DOIUrl":"https://doi.org/10.5120/IJAIS2017451697","url":null,"abstract":"Buying and selling on the Net (e-commerce) is no more new to both the developed and developing nations. The issue now lies with the effectiveness of the existing payment system and the ICT infrastructures in place. This research examined the problems of the existing payment system in Nigeria and proposed a new one that would take care some of the limitations of the existing ones. The architecture of the proposed payment system was designed and coded using HTML to design the interfaces, JAVA Scripts as the scripting language that connects the front-end with the back-end and MySQL as the database. Application software was developed to simulate the design model using NetBeans IDE 6.9, MySQL database system and Java ME programming language. The simulation runs were done and hosted on www.elexsoft.com/mobilepaymentsystem/ and implemented on mobile browsers using Samsung android GT-S5830D smartphone, 800 Mhz Intel processor mobile phone. The system uses the most common method of authentication which is user name and password.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"26 1","pages":"26-32"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85289716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Storing of data in the cloud (Cloud Computing) offers an effective and quick way of granting access to ones information from a third party service provider, providing business expansion at a lesser cost. Cloud data storage systems provide means to store bigger data in storage servers [1]. The data stored in the cloud are stored and accessed from the internet over a longer time, making data exposed to hackers to steal stored and transmitted data over the cloud environment, leading to data integrity loss and users of cloud data unhappy. This paper proposed a novel cryptographic techniques to enhance the security in cloud environment and reduce the time associated with cryptographic encryption to a minimum. General Terms Cryptographic Technique, Securing Cloud Storage Systems
{"title":"Effective Cryptographic Technique for Securing Cloud Storage Systems","authors":"Isaac Kofi Nti, Eric Gyamfi, M. Osei","doi":"10.5120/ijais2017451696","DOIUrl":"https://doi.org/10.5120/ijais2017451696","url":null,"abstract":"Storing of data in the cloud (Cloud Computing) offers an effective and quick way of granting access to ones information from a third party service provider, providing business expansion at a lesser cost. Cloud data storage systems provide means to store bigger data in storage servers [1]. The data stored in the cloud are stored and accessed from the internet over a longer time, making data exposed to hackers to steal stored and transmitted data over the cloud environment, leading to data integrity loss and users of cloud data unhappy. This paper proposed a novel cryptographic techniques to enhance the security in cloud environment and reduce the time associated with cryptographic encryption to a minimum. General Terms Cryptographic Technique, Securing Cloud Storage Systems","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"346 1","pages":"19-25"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79659990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.
{"title":"New Chaotic Substation and Permutation Method for Image Encryption","authors":"Ekhlas Abbas Albahrani, Tayseer Karam Alshekly","doi":"10.5120/IJAIS2017451698","DOIUrl":"https://doi.org/10.5120/IJAIS2017451698","url":null,"abstract":"New Chaotic Substation and Permutation Method for Image Encryption is introduced based on combination between Block Cipher and chaotic map. The new algorithm encrypts and decrypts a block of 500 byte. Each block is firstly permuted by using the hyper-chaotic map and then the result is substituted using 1D Bernoulli map. Finally the resulted block is XORed with the key block. The proposed cipher image subjected to number of tests which are the security analysis (key space analysis and key sensitivity analysis) and statistical attack analysis (histogram, correlation, and differential attack and information entropy) and all results show that the proposed encryption scheme is secure because of its large key space; it’s highly sensitivity to the cipher keys and plain-images.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"1 1","pages":"33-39"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80437048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In higher education, there are many taxonomies or classifications. It needs more time and much resources to cover it. This paper trying to cover some taxonomies in higher education to make standardization. The taxonomy of Structure of the Observed Learning Outcome including first, second, third, third, fourth and fifth SOLO have been discussed. Furthermore, decision making in higher education is an important concern while the processes of decision-making involvement have been defined in six steps. In addition, the value chain, inbound logistics and operations of higher education has been discussed in detail along with integration in higher education. Quality assurance in higher education is examined. Additionally, open educational practices and reform in high education are considered. Besides, environment of learning and Decision Support Systems have also been depictured, along with data used in higher education. Taxonomy of cognitive domain is also analyzed as one of the fundamental taxonomies in higher education. Since important for modern world, instructional technology is described. Knowledge acquisition was also part of this paper.
{"title":"Taxonomies in Higher Education","authors":"A. B. Sawad, F. M. Reda, Fayez Nahed Al-Sehani","doi":"10.5120/IJAIS2017451695","DOIUrl":"https://doi.org/10.5120/IJAIS2017451695","url":null,"abstract":"In higher education, there are many taxonomies or classifications. It needs more time and much resources to cover it. This paper trying to cover some taxonomies in higher education to make standardization. The taxonomy of Structure of the Observed Learning Outcome including first, second, third, third, fourth and fifth SOLO have been discussed. Furthermore, decision making in higher education is an important concern while the processes of decision-making involvement have been defined in six steps. In addition, the value chain, inbound logistics and operations of higher education has been discussed in detail along with integration in higher education. Quality assurance in higher education is examined. Additionally, open educational practices and reform in high education are considered. Besides, environment of learning and Decision Support Systems have also been depictured, along with data used in higher education. Taxonomy of cognitive domain is also analyzed as one of the fundamental taxonomies in higher education. Since important for modern world, instructional technology is described. Knowledge acquisition was also part of this paper.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"49 1","pages":"8-18"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90976660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, Business Intelligence (BI) has started to play a significant role for businesses regarding of development and helping to increase achievements and supporting decisions making. Factors such as changing, innovation, globalization, and sustainability in changing markets environment accelerate the shift towards using BI. One of the difficulties that are affecting the business world is the increasing volume of data that is everywhere. BI allows for a large amount of data from different sources to be converted into helpful information, knowledge, and insights. This paper explains that the BI systems are not just about tools. Nevertheless, it is a wide range of applications and processes not for getting data out of the warehouse, but also for getting data into a warehouse, and for visualizing the trend in the data. This paper aims to investigate the concepts of BI, its framework, the relationship between BI and DSS, benefits of BI, its applications, its software and tools, and finally issues of implementation BI.
{"title":"Developing and Leveraging Business Intelligence Systems for Decision Making in Organizations","authors":"M. Almalki","doi":"10.5120/IJAIS2017451694","DOIUrl":"https://doi.org/10.5120/IJAIS2017451694","url":null,"abstract":"In recent years, Business Intelligence (BI) has started to play a significant role for businesses regarding of development and helping to increase achievements and supporting decisions making. Factors such as changing, innovation, globalization, and sustainability in changing markets environment accelerate the shift towards using BI. One of the difficulties that are affecting the business world is the increasing volume of data that is everywhere. BI allows for a large amount of data from different sources to be converted into helpful information, knowledge, and insights. This paper explains that the BI systems are not just about tools. Nevertheless, it is a wide range of applications and processes not for getting data out of the warehouse, but also for getting data into a warehouse, and for visualizing the trend in the data. This paper aims to investigate the concepts of BI, its framework, the relationship between BI and DSS, benefits of BI, its applications, its software and tools, and finally issues of implementation BI.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"50 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88714213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research is based on developing an integrated end-to-end electronic procurement system for agro-business in Nigeria with the aim of reducing information asymmetry, making agro-business more profitable and attractive by lowering transaction costs. Qualitative findings via structured questionnaire and direct one-on-one interview were carried out among farmers, farmers associations and agro input industries. Microsoft Office Excel was used as a tool to analyze all gathered data. Pinto and Slevin procurement management model was adopted to identify the critical variable of the procurement process and an architecture was designed for the system. Mathematical model of the system was developed, since the developed system is a web based, the client-side was implemented using HTML (Hypertext Markup Language) while the server-side was implemented with Hypertext Preprocessor (PHP) and the database management system used is MySQL. The implementation was done on Intel processor core i3, 1TB Hard Disk and 8GB DDR2 RAM computer system. Functional and performance tests were carried out on the system and the test showed that the system is capable of handling multiple simultaneous users with an average response time of 0.011 to 0.015 seconds.
{"title":"Development of an Integrated End-To-End Electronic Procurement Management System for Agro-Business in Nigeria","authors":"E. Ajulo, R. Akinyede, O. Boyinbode","doi":"10.5120/IJAIS2017451666","DOIUrl":"https://doi.org/10.5120/IJAIS2017451666","url":null,"abstract":"This research is based on developing an integrated end-to-end electronic procurement system for agro-business in Nigeria with the aim of reducing information asymmetry, making agro-business more profitable and attractive by lowering transaction costs. Qualitative findings via structured questionnaire and direct one-on-one interview were carried out among farmers, farmers associations and agro input industries. Microsoft Office Excel was used as a tool to analyze all gathered data. Pinto and Slevin procurement management model was adopted to identify the critical variable of the procurement process and an architecture was designed for the system. Mathematical model of the system was developed, since the developed system is a web based, the client-side was implemented using HTML (Hypertext Markup Language) while the server-side was implemented with Hypertext Preprocessor (PHP) and the database management system used is MySQL. The implementation was done on Intel processor core i3, 1TB Hard Disk and 8GB DDR2 RAM computer system. Functional and performance tests were carried out on the system and the test showed that the system is capable of handling multiple simultaneous users with an average response time of 0.011 to 0.015 seconds.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"91 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83768794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clustering is a common and useful exploratory task widely used in Data mining. Among the many existing clustering algorithms, the Agglomerative Clustering Method (ACM) introduced by the authors suffers from an obvious drawback: its sensitivity to data ordering. To overcome this issue, we propose in this paper to initialize the ACM by using the KKZ seed algorithm. The proposed approach (called KKZ_ACM) has a lower computational time complexity than the famous kmeans algorithm. We evaluated its performance by applying on various benchmark datasets and compare with ACM, kmeans++ and KKZ_ k-means. Our performance studies have demonstrated that the proposed approach is effective in producing consistent clustering results in term of average Silhouette index. General Terms Data mining, Algorithms
{"title":"An Improved Agglomerative Clustering Method","authors":"O. Kettani, F. Ramdani","doi":"10.5120/IJAIS2017451689","DOIUrl":"https://doi.org/10.5120/IJAIS2017451689","url":null,"abstract":"Clustering is a common and useful exploratory task widely used in Data mining. Among the many existing clustering algorithms, the Agglomerative Clustering Method (ACM) introduced by the authors suffers from an obvious drawback: its sensitivity to data ordering. To overcome this issue, we propose in this paper to initialize the ACM by using the KKZ seed algorithm. The proposed approach (called KKZ_ACM) has a lower computational time complexity than the famous kmeans algorithm. We evaluated its performance by applying on various benchmark datasets and compare with ACM, kmeans++ and KKZ_ k-means. Our performance studies have demonstrated that the proposed approach is effective in producing consistent clustering results in term of average Silhouette index. General Terms Data mining, Algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"131 1","pages":"16-23"},"PeriodicalIF":0.0,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74611442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Development in Information Technology (IT) have raised up a lot of fears about the risk to information concomitant with feeble IT security, including weakness to malware, attacks, virus and compromise of network systems and services. Anyone who goes on the net is vulnerable to security threats. Inadequate IT security may result in compromised integrity, confidentiality and the release of sensitive data to unauthorized persons. In most development communities and countries, IT vulnerability has become an important concept employed to guide the evaluation, design and targeting of programs. Remaining ahead of the everevolving threat of an information break on websites and web application necessitates conscientiousness on the part webmasters and heads of IT sections within an organization in understanding and anticipating the risks. This paper seek to examine the knowledge of webmasters and heads of IT sections on threats and vulnerabilities on the cyber world of selected institutions in Ghana through semi-structured questioners and one-on-one interview and proposed away forward in boosting the knowledge base of IT and Webmaster, hence contribute to the reduction of cyber-crime in the country and also outline some guidelines on how to surf the web safely to end-users. The survey showed that, on an average 47% of the respondent have little or no knowledge in at least one or more of the existing website vulnerabilities. General Terms Websites and web application vulnerabilities
{"title":"Investigating Websites and Web Application Vulnerabilities: Webmaster’s Perspective","authors":"V. Appiah, Isaac Kofi Nti, O. Nyarko-Boateng","doi":"10.5120/IJAIS2017451673","DOIUrl":"https://doi.org/10.5120/IJAIS2017451673","url":null,"abstract":"The Development in Information Technology (IT) have raised up a lot of fears about the risk to information concomitant with feeble IT security, including weakness to malware, attacks, virus and compromise of network systems and services. Anyone who goes on the net is vulnerable to security threats. Inadequate IT security may result in compromised integrity, confidentiality and the release of sensitive data to unauthorized persons. In most development communities and countries, IT vulnerability has become an important concept employed to guide the evaluation, design and targeting of programs. Remaining ahead of the everevolving threat of an information break on websites and web application necessitates conscientiousness on the part webmasters and heads of IT sections within an organization in understanding and anticipating the risks. This paper seek to examine the knowledge of webmasters and heads of IT sections on threats and vulnerabilities on the cyber world of selected institutions in Ghana through semi-structured questioners and one-on-one interview and proposed away forward in boosting the knowledge base of IT and Webmaster, hence contribute to the reduction of cyber-crime in the country and also outline some guidelines on how to surf the web safely to end-users. The survey showed that, on an average 47% of the respondent have little or no knowledge in at least one or more of the existing website vulnerabilities. General Terms Websites and web application vulnerabilities","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"34 1","pages":"10-15"},"PeriodicalIF":0.0,"publicationDate":"2017-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81171220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The k-means algorithm remains one of the most widely used clustering methods, in spite of its sensitivity to the initial settings. This paper explores a simple, computationally low, deterministic method which provides k-means with initial seeds to cluster a given data set. It is simply based on computing the means of k samples with equal parts taken from the given data set. We test and compare this method to the related well know kkz initialization algorithm for kmeans, using both simulated and real data, and find it to be more efficient in many cases. General Terms Data Mining,Clustering.
{"title":"A Fast Deterministic Kmeans Initialization","authors":"O. Kettani, F. Ramdani","doi":"10.5120/IJAIS2017451683","DOIUrl":"https://doi.org/10.5120/IJAIS2017451683","url":null,"abstract":"The k-means algorithm remains one of the most widely used clustering methods, in spite of its sensitivity to the initial settings. This paper explores a simple, computationally low, deterministic method which provides k-means with initial seeds to cluster a given data set. It is simply based on computing the means of k samples with equal parts taken from the given data set. We test and compare this method to the related well know kkz initialization algorithm for kmeans, using both simulated and real data, and find it to be more efficient in many cases. General Terms Data Mining,Clustering.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"13 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85224138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An e-library system is a very important element of the internet age libraries. A library without it may face a lot of challenges like the lack of adequate visitation by the users. This paper presents an e-library system that was developed using PHP programming language, HTML and CSS for design and MySQL as a backend database technology to run on Apache v3.21 application server and Mozilla FireFox web browser. The system allows multimedia sources to be accessed by the users of the library and was able to eliminate the problems of unavailiability of library resources, inadequate space, physical bounding and restricted access that characterized the traditional library system. General Terms Information Systems
{"title":"A Web-based E-Library System for Tertiary Institutions","authors":"M. A. Alarape, Samuel Ndifreke Edet","doi":"10.5120/IJAIS2017451685","DOIUrl":"https://doi.org/10.5120/IJAIS2017451685","url":null,"abstract":"An e-library system is a very important element of the internet age libraries. A library without it may face a lot of challenges like the lack of adequate visitation by the users. This paper presents an e-library system that was developed using PHP programming language, HTML and CSS for design and MySQL as a backend database technology to run on Apache v3.21 application server and Mozilla FireFox web browser. The system allows multimedia sources to be accessed by the users of the library and was able to eliminate the problems of unavailiability of library resources, inadequate space, physical bounding and restricted access that characterized the traditional library system. General Terms Information Systems","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"s3-16 1","pages":"17-22"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90808791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}