While the software systems like Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) have been solving critical problems of the industries, there are various integrations implemented to use them under overlapping conditions depending on the category of sector the solutions are implemented into. With the new buzzword called Internet of Things, in the Information Technology fraternity the scope and face of various traditional software systems is changing fast. Internet of Things is growing big day-by-day and finding its applications in domestic as well as industrial areas and even to some very unconventional areas as well. This paper discusses the overlapping roles of PLM and ERP systems in the IoT arena. The applications of both the systems can be enhanced and put to better use with the usage of IoT along with. With some of the enhancements, especially in the integration systems implemented for them, helps increasing the productivity and efficiency of the products and also save the cost with early indications of any failure. General Terms Internet of things, Product Lifecycle Management, Enterprise Resource Planning
{"title":"Enriched Integrations of ERP and PLM in the IoT World","authors":"Ritesh Jain","doi":"10.5120/IJAIS2017451684","DOIUrl":"https://doi.org/10.5120/IJAIS2017451684","url":null,"abstract":"While the software systems like Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) have been solving critical problems of the industries, there are various integrations implemented to use them under overlapping conditions depending on the category of sector the solutions are implemented into. With the new buzzword called Internet of Things, in the Information Technology fraternity the scope and face of various traditional software systems is changing fast. Internet of Things is growing big day-by-day and finding its applications in domestic as well as industrial areas and even to some very unconventional areas as well. This paper discusses the overlapping roles of PLM and ERP systems in the IoT arena. The applications of both the systems can be enhanced and put to better use with the usage of IoT along with. With some of the enhancements, especially in the integration systems implemented for them, helps increasing the productivity and efficiency of the products and also save the cost with early indications of any failure. General Terms Internet of things, Product Lifecycle Management, Enterprise Resource Planning","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"58 1","pages":"12-16"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88238770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Supriya Vitthal Ranawade, Shivani Navale, Akshay Dhamal, K. Deshpande, C. Ghuge
{"title":"Online Analytical Processing on Hadoop using Apache Kylin","authors":"Supriya Vitthal Ranawade, Shivani Navale, Akshay Dhamal, K. Deshpande, C. Ghuge","doi":"10.5120/IJAIS2017451682","DOIUrl":"https://doi.org/10.5120/IJAIS2017451682","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80775429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is about the implementation of a software tool to aid the study of chaos theory in the the context of the financial or commodities markets. The main focus of this paper is simulating the movement of oil prices in an attempt to identity chaos when it exists. Models implemented represent certain economically realistic aspects of the oil market. Tests for chaos (Lyapunov exponent test) will be conducted on these models, an attempt will be made to test for chaos in the movement of the price of oil dated from 2006 to 2016. The models implemented here are nonlinear models with the potential of exhibiting chaos for certain parameter values. Shocks will be introduced into the models and their effect on the models will be noted and visualized through the use of a time series or graphs. An Object oriented programming language (Java) was used in building this application, MYSQL database was used to save the data generated by the models and the spiral software development life-cycle was used in structuring, planning and controlling the process of building this application.
{"title":"Computer Simulation of Chaotic Systems","authors":"T. K. Genger, T. J. Anande, S. Al-Shehri","doi":"10.5120/IJAIS2017451605","DOIUrl":"https://doi.org/10.5120/IJAIS2017451605","url":null,"abstract":"This paper is about the implementation of a software tool to aid the study of chaos theory in the the context of the financial or commodities markets. The main focus of this paper is simulating the movement of oil prices in an attempt to identity chaos when it exists. Models implemented represent certain economically realistic aspects of the oil market. Tests for chaos (Lyapunov exponent test) will be conducted on these models, an attempt will be made to test for chaos in the movement of the price of oil dated from 2006 to 2016. The models implemented here are nonlinear models with the potential of exhibiting chaos for certain parameter values. Shocks will be introduced into the models and their effect on the models will be noted and visualized through the use of a time series or graphs. An Object oriented programming language (Java) was used in building this application, MYSQL database was used to save the data generated by the models and the spiral software development life-cycle was used in structuring, planning and controlling the process of building this application.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75630463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Brillouin fiber laser utilizing an exceedingly nonlinear birefringent photonic precious stone fiber is accounted for. The center of the fiber was curved fit as a fiddle. A solitary longitudinal-mode high power fiber laser was utilized as a Brillouin pump, and the laser created multi-wave length yield with a 0.04 nm partition. Modifying the polarization controller plates made it conceivable to get a single wavelength laser. The impact of the little center birefringent photonic gem fiber on the yield of the laser was investigated. The laser was steady and demonstrated a power change of under 0.2 dB. The yield of the laser was checked utilizing an optical range analyzer of determination 0.01 nm.
{"title":"Brillouin Fiber Laser Utilizing Nonlinear Birefringent Photonic Crystal Fiber (PCF)","authors":"M. Algarni","doi":"10.5120/IJAIS2017451674","DOIUrl":"https://doi.org/10.5120/IJAIS2017451674","url":null,"abstract":"A Brillouin fiber laser utilizing an exceedingly nonlinear birefringent photonic precious stone fiber is accounted for. The center of the fiber was curved fit as a fiddle. A solitary longitudinal-mode high power fiber laser was utilized as a Brillouin pump, and the laser created multi-wave length yield with a 0.04 nm partition. Modifying the polarization controller plates made it conceivable to get a single wavelength laser. The impact of the little center birefringent photonic gem fiber on the yield of the laser was investigated. The laser was steady and demonstrated a power change of under 0.2 dB. The yield of the laser was checked utilizing an optical range analyzer of determination 0.01 nm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"9 1","pages":"38-40"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85540389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.
{"title":"Face Recognition Techniques for Authentication in Smart Devices - Comparative Study","authors":"J. George, Tulasi B.","doi":"10.5120/IJAIS2017451671","DOIUrl":"https://doi.org/10.5120/IJAIS2017451671","url":null,"abstract":"With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"16 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77737430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Fuzzy Decision Support System (FDSS) Procedures to Best Select e-Learning Solution","authors":"Mohammad A. A. Alhawamdeh","doi":"10.5120/IJAIS2017451665","DOIUrl":"https://doi.org/10.5120/IJAIS2017451665","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"149 1","pages":"9-23"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76254004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vitality utilization is inspected in the particular setting of home warming consumptions. Examination of home warmth costs crosswise over phases of the family life cycle uncovers an unmistakably unique example than already found when adding up to family vitality expenses were inspected. As opposed to the curvilinear example where uses top amid center phases of the life cycle, this information demonstrates a positive direct relationship where higher expenses are related with elderly buyers. The exploration center is extended to incorporate warmth related protection conduct and additionally uses with an end goal to better comprehend suggestions for arrangement creators and-advertisers.
{"title":"Energy Consumption and Conservation Family Lifestyle: Survey","authors":"M. Algarni","doi":"10.5120/IJAIS2017451662","DOIUrl":"https://doi.org/10.5120/IJAIS2017451662","url":null,"abstract":"Vitality utilization is inspected in the particular setting of home warming consumptions. Examination of home warmth costs crosswise over phases of the family life cycle uncovers an unmistakably unique example than already found when adding up to family vitality expenses were inspected. As opposed to the curvilinear example where uses top amid center phases of the life cycle, this information demonstrates a positive direct relationship where higher expenses are related with elderly buyers. The exploration center is extended to incorporate warmth related protection conduct and additionally uses with an end goal to better comprehend suggestions for arrangement creators and-advertisers.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"78 1","pages":"59-62"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80860855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. In this paper the proposed cryptanalysis system based on a Particle Swarm Optimization (PSO) with suggestions for improving the achievement of PSO, by using Simulated Annealing (SA) that is the first part of this paper. The second part represented by a comparison study for the cryptanalysis results obtained by the Improved PSO (IPSO) with classical PSO and Genetic Algorithm (GA).The cryptanalysis process include finding the initial state of the attacked stream cipher cryptosystem using ciphertext only attack.
{"title":"Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization","authors":"Salim A. Abbas Al-Ageelee, Riyam N. J. Kadhum","doi":"10.5120/IJAIS2017451658","DOIUrl":"https://doi.org/10.5120/IJAIS2017451658","url":null,"abstract":"Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. In this paper the proposed cryptanalysis system based on a Particle Swarm Optimization (PSO) with suggestions for improving the achievement of PSO, by using Simulated Annealing (SA) that is the first part of this paper. The second part represented by a comparison study for the cryptanalysis results obtained by the Improved PSO (IPSO) with classical PSO and Genetic Algorithm (GA).The cryptanalysis process include finding the initial state of the attacked stream cipher cryptosystem using ciphertext only attack.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"46 1","pages":"43-52"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88322323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial neural network assessment and modeling of job satisfaction of the Information and Communications Technology (ICT) Directorate workers of Federal University of Agriculture, Makurdi was investigated in this study. Modified Nordic Musculoskeletal Disorder (NMDQ) questionnaires which incorporated health, safety and environment factors were used. The questionnaire consisted of a series of objective questions with ‘yes’, ‘no’ and ‘I don’t know’ responses and some were multiple choice questions. Parameters such as health, safety, environment and ergonomic factors were obtained from questionnaires for the modelling of workers efficiency and job satisfaction. The efficiency of workers was determined and normal probability curve for the 40 workers was plotted to identify the outliers. The artificial neural network (ANN) modeling method was employed to predict job satisfaction using health, safety, environment and ergonomic factors as input parameters while job satisfaction was the output. Series of network architectures were considered using different training algorithms. The scale conjugate gradient SCG 4 [3-3]2 1 was adopted as the suitable network architecture for predicting job satisfaction. Result indicated that the predicted values of job satisfaction were in the range of 1.42 – 2.00 as compared with the actual values of 1.50 – 2.00 obtained from the questionnaires. Statistical indicators of normal error (E), used for validation of the model gave minimal errors and varied in the range of -0.48 – 0.08. The plot of the normal probability curve also indicated the presence of outliers or inefficient workers. Whereas most of the workers were satisfied with the existing health, safety, environment (HSE) and ergonomics (E) programs at the work place, some (outliers) were not. The presence of outliers calls for improvement of ergonomic conditions at the ICT directorate. General Terms Information and communication technology (ICT), Outliers, Training algorithms
{"title":"Artificial Neural Network Modeling of Job Satisfaction: A Case Study of ICT, Federal University of Agriculture, Makurdi","authors":"K. K. Ikpambese, T. Ipilakyaa, V. Achirgbenda","doi":"10.5120/IJAIS2017451651","DOIUrl":"https://doi.org/10.5120/IJAIS2017451651","url":null,"abstract":"Artificial neural network assessment and modeling of job satisfaction of the Information and Communications Technology (ICT) Directorate workers of Federal University of Agriculture, Makurdi was investigated in this study. Modified Nordic Musculoskeletal Disorder (NMDQ) questionnaires which incorporated health, safety and environment factors were used. The questionnaire consisted of a series of objective questions with ‘yes’, ‘no’ and ‘I don’t know’ responses and some were multiple choice questions. Parameters such as health, safety, environment and ergonomic factors were obtained from questionnaires for the modelling of workers efficiency and job satisfaction. The efficiency of workers was determined and normal probability curve for the 40 workers was plotted to identify the outliers. The artificial neural network (ANN) modeling method was employed to predict job satisfaction using health, safety, environment and ergonomic factors as input parameters while job satisfaction was the output. Series of network architectures were considered using different training algorithms. The scale conjugate gradient SCG 4 [3-3]2 1 was adopted as the suitable network architecture for predicting job satisfaction. Result indicated that the predicted values of job satisfaction were in the range of 1.42 – 2.00 as compared with the actual values of 1.50 – 2.00 obtained from the questionnaires. Statistical indicators of normal error (E), used for validation of the model gave minimal errors and varied in the range of -0.48 – 0.08. The plot of the normal probability curve also indicated the presence of outliers or inefficient workers. Whereas most of the workers were satisfied with the existing health, safety, environment (HSE) and ergonomics (E) programs at the work place, some (outliers) were not. The presence of outliers calls for improvement of ergonomic conditions at the ICT directorate. General Terms Information and communication technology (ICT), Outliers, Training algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"183 1","pages":"10-15"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80432561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad
Social networks such as Facebook, Twitter and SinaWeibo have become increasingly important for reaching millions of user globally. Consequently, spammers are increasing using such networks for propagating spam. Existing research on filtering techniques such as collaborative filters and behavioral analysis filters are able to significantly reduce spam. In recent years, online social networks have become the most important medium of communication among individual and organization to interact. Unfortunately, driven by the desire to communicate, fraudster or spammers have produced deceptive spam or unsolicited commercial email(UCE). The fraudsters’ or spammer activities mislead potential users and victims reshaping their individual life and general communication on social network platform. The aim of this study is to understand, classify and analyze existing research in spam detection on social networks, focusing on approaches and elements that are used to evaluate the general framework of spam detection and its architectural framework from the users perspective, service provider and security analyst ‘s point of view. This paper presents a systematic mapping study of several spam detection techniques and approaches on social networks that were proposed to measure to evaluate the general framework of spam detection on social networks. We found 17 proposals that could be applied to evaluate spam detection on social networks, while 14 proposals could be applied to evaluate the users, service providers and practitioners. Various elements of spam detection on social networks that were measured are reviewed and discussed. Only a few of the proposed spam detection on social networks are soundly defined. The quality assessment of the primary studies detected many limitations and suggested guidelines for possibilities for improving and increasing the acceptance of spam detection on social networks. However, it remains a challenge to characterize and evaluate a spam detection and framework on social networks quantitatively. For this fact, much effort must be made to achieve a better spam detection approach in the future that will be devoid of problem anomaly detection, fault detection, malware detection and intrusion detection General Terms Spam detection, Security, Mapping study,Spam detection metrics.
{"title":"A Mapping Study to Investigate Spam Detection on Social Networks","authors":"Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad","doi":"10.5120/IJAIS2017451652","DOIUrl":"https://doi.org/10.5120/IJAIS2017451652","url":null,"abstract":"Social networks such as Facebook, Twitter and SinaWeibo have become increasingly important for reaching millions of user globally. Consequently, spammers are increasing using such networks for propagating spam. Existing research on filtering techniques such as collaborative filters and behavioral analysis filters are able to significantly reduce spam. In recent years, online social networks have become the most important medium of communication among individual and organization to interact. Unfortunately, driven by the desire to communicate, fraudster or spammers have produced deceptive spam or unsolicited commercial email(UCE). The fraudsters’ or spammer activities mislead potential users and victims reshaping their individual life and general communication on social network platform. The aim of this study is to understand, classify and analyze existing research in spam detection on social networks, focusing on approaches and elements that are used to evaluate the general framework of spam detection and its architectural framework from the users perspective, service provider and security analyst ‘s point of view. This paper presents a systematic mapping study of several spam detection techniques and approaches on social networks that were proposed to measure to evaluate the general framework of spam detection on social networks. We found 17 proposals that could be applied to evaluate spam detection on social networks, while 14 proposals could be applied to evaluate the users, service providers and practitioners. Various elements of spam detection on social networks that were measured are reviewed and discussed. Only a few of the proposed spam detection on social networks are soundly defined. The quality assessment of the primary studies detected many limitations and suggested guidelines for possibilities for improving and increasing the acceptance of spam detection on social networks. However, it remains a challenge to characterize and evaluate a spam detection and framework on social networks quantitatively. For this fact, much effort must be made to achieve a better spam detection approach in the future that will be devoid of problem anomaly detection, fault detection, malware detection and intrusion detection General Terms Spam detection, Security, Mapping study,Spam detection metrics.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":"16-34"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89082521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}