首页 > 最新文献

International journal of applied information systems最新文献

英文 中文
Geospatial Analysis of Urban Sprawl Patterns in Amritsar City, Punjab, India 印度旁遮普阿姆利则城市扩张模式的地理空间分析
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451636
M. Minakshi, Shivani Singh, B. Pateriya
Amritsar is the largest and most important city in northern Punjab. Amritsar serves as a major commercial, cultural, and transportation hub with Golden Temple & Raja Sansi international airport. It lies about 25 km east of the border with Pakistan and gateway for travelers coming to India on the overland route from central Asia. The present study attempts to understand, detect and quantify the spatial pattern of Amritsar urban sprawl using Shannon’s entropy and multitemporal satellite images acquired for the period from 1972 to 2015. Shannon’s entropy has been used to model the city’s urban sprawl, trend and spatial change. The entropy values for the different grids were modeled and the interpolation function in ArcGIS is used to obtain an entropy surface for each acquired temporal image. The entropy surface index indicates the spatial pattern of the urban sprawl and facilitates to visual assess the entropy phenomenon in all the grids. The value of Shannon’s entropy index increased from (0.40) in year 1972 to (0.97) in year 2015, indicating more dispersed urban growth, an indication of urban sprawl. Results obtained from entropy indices help in understanding the sprawl patterns and dynamics among different grids and provide a visual comparison which facilitates the decision makers and city planners for measuring the urban sprawl required for mega cities.
阿姆利则是旁遮普北部最大、最重要的城市。阿姆利则是一个主要的商业、文化和交通枢纽,拥有金庙和拉贾桑西国际机场。它位于与巴基斯坦边界以东约25公里处,是从中亚陆路进入印度的旅行者的门户。本研究试图利用香农熵和1972 - 2015年的多时相卫星图像来理解、检测和量化阿姆利则城市扩张的空间格局。香农熵被用来模拟城市的扩张、趋势和空间变化。对不同网格的熵值进行建模,利用ArcGIS中的插值函数对每幅获取的时间图像进行熵曲面的计算。熵面指数反映了城市扩张的空间格局,便于直观地评价各网格上的熵现象。Shannon’s熵指数由1972年的(0.40)增加到2015年的(0.97),表明城市增长更加分散,表明城市蔓延。熵指数的结果有助于理解不同网格间的城市扩张模式和动态,并为决策者和城市规划者衡量超大城市所需的城市扩张提供直观的比较。
{"title":"Geospatial Analysis of Urban Sprawl Patterns in Amritsar City, Punjab, India","authors":"M. Minakshi, Shivani Singh, B. Pateriya","doi":"10.5120/IJAIS2017451636","DOIUrl":"https://doi.org/10.5120/IJAIS2017451636","url":null,"abstract":"Amritsar is the largest and most important city in northern Punjab. Amritsar serves as a major commercial, cultural, and transportation hub with Golden Temple & Raja Sansi international airport. It lies about 25 km east of the border with Pakistan and gateway for travelers coming to India on the overland route from central Asia. The present study attempts to understand, detect and quantify the spatial pattern of Amritsar urban sprawl using Shannon’s entropy and multitemporal satellite images acquired for the period from 1972 to 2015. Shannon’s entropy has been used to model the city’s urban sprawl, trend and spatial change. The entropy values for the different grids were modeled and the interpolation function in ArcGIS is used to obtain an entropy surface for each acquired temporal image. The entropy surface index indicates the spatial pattern of the urban sprawl and facilitates to visual assess the entropy phenomenon in all the grids. The value of Shannon’s entropy index increased from (0.40) in year 1972 to (0.97) in year 2015, indicating more dispersed urban growth, an indication of urban sprawl. Results obtained from entropy indices help in understanding the sprawl patterns and dynamics among different grids and provide a visual comparison which facilitates the decision makers and city planners for measuring the urban sprawl required for mega cities.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"306 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73469593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Analysis of Image Restoration Techniques for Dermoscopy Images 皮肤镜图像恢复技术的性能分析
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451637
M. A. Altuncu, F. K. Gülagiz, Fatma Selin Hangisi, S. Sahin
Image enhancement and image restoration methods are widely used in most of the recent image processing studies. The main purpose of image enhancement is to remove noise from the image albeit different kinds. Therefore, in every field where image processing methods are used, image enhancement methods are more or less needed. And dermatological images, in which mostly image quality is inadequate most of the time, are one of the primary fields where these techniques are needed. Dermatologists that work in this field carry out the recording of wound images via a digital dermoscopy device. Later they realize the decision-making process using the image processing techniques through software. And in this study, the comparison of different image preprocessing methods is carried out in order to remove the effects of lighting and to make the software used give more accurate decisions.
图像增强和图像恢复方法被广泛应用于近年来的图像处理研究中。图像增强的主要目的是从图像中去除各种各样的噪声。因此,在每个使用图像处理方法的领域中,或多或少都需要图像增强方法。而在大多数情况下,图像质量不足的皮肤科图像是需要这些技术的主要领域之一。在这一领域工作的皮肤科医生通过数字皮肤镜设备记录伤口图像。随后,他们利用图像处理技术,通过软件实现了决策过程。在本研究中,为了消除灯光的影响,使所使用的软件给出更准确的决策,对不同的图像预处理方法进行了比较。
{"title":"Performance Analysis of Image Restoration Techniques for Dermoscopy Images","authors":"M. A. Altuncu, F. K. Gülagiz, Fatma Selin Hangisi, S. Sahin","doi":"10.5120/IJAIS2017451637","DOIUrl":"https://doi.org/10.5120/IJAIS2017451637","url":null,"abstract":"Image enhancement and image restoration methods are widely used in most of the recent image processing studies. The main purpose of image enhancement is to remove noise from the image albeit different kinds. Therefore, in every field where image processing methods are used, image enhancement methods are more or less needed. And dermatological images, in which mostly image quality is inadequate most of the time, are one of the primary fields where these techniques are needed. Dermatologists that work in this field carry out the recording of wound images via a digital dermoscopy device. Later they realize the decision-making process using the image processing techniques through software. And in this study, the comparison of different image preprocessing methods is carried out in order to remove the effects of lighting and to make the software used give more accurate decisions.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"7 1","pages":"15-19"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82092218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comprehensive Study of Facial Action Coding 面部动作编码的综合研究
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451643
A. Alomari
Facial Action Coding (FAC) is expected to apply the whole world. The solicitations are not controlled to media communications. FAC is a testing difficulty in computer vision and remains alarm security case, and a novel strategy for program FAC is guided to bargain nearby the issue. The principle trial here, head-case and non-unbending outward appearance conformities because of alterations invited by the brutal face decoupling to present as they are coupled to the non-direct pictures. One more trial is the way to proficiently request to empower affiliation to contemplate expression (or different facial components) is to misuse the data. Facial Expression(FE) picture succession is fleeting territory spatial region information directly rise, however moreover the advance is not known. Information considering the increase of appearance together nearby the photo participation information can more improve the presentation of acknowledgment. However, the active information supplied is practical, there how to capture this information dependably and powerfully concerning facing challenges. For instance, an FE arrangement typically, one or additional of the principle times of development and counterbalance beat. Temporary information and preparing with a specific end goal to capture and question transient groupings of identical information, to make the correspondence in the midst of different worldly periods request to be built up. Press can be encoded. In this work, another dynamic FE, hereditary and neural organize based way utilizing the half, and half method are made.
面部动作编码(FAC)有望应用于全世界。征集活动不限于媒体传播。FAC是计算机视觉的一个测试难点,也是报警安全案例,本文提出了一种针对FAC问题的新策略。这里的原则试验,头部和非弯曲的外观一致性由于残酷的面部分离引起的变化而呈现出来,因为它们与非直接图片相耦合。另一个尝试是熟练地请求授权从属关系来考虑表情(或不同的面部成分)的方法是滥用数据。面部表情(FE)图像序列是转瞬即逝的疆域空间区域信息的直接上升,然而又不知道其前进方向。在照片参与信息的同时考虑外观的增加,更能提高识别的呈现效果。然而,所提供的活动信息是实用的,如何可靠而有力地捕获这些信息涉及到面临的挑战。例如,一个典型的FE安排,一个或更多的主要时间的发展和平衡拍。临时信息和准备以特定的最终目标捕获和质疑同一信息的临时分组,以使不同时代的通信要求建立起来。可以对按键进行编码。本文提出了一种基于遗传和神经组织的动态有限元方法。
{"title":"Comprehensive Study of Facial Action Coding","authors":"A. Alomari","doi":"10.5120/IJAIS2017451643","DOIUrl":"https://doi.org/10.5120/IJAIS2017451643","url":null,"abstract":"Facial Action Coding (FAC) is expected to apply the whole world. The solicitations are not controlled to media communications. FAC is a testing difficulty in computer vision and remains alarm security case, and a novel strategy for program FAC is guided to bargain nearby the issue. The principle trial here, head-case and non-unbending outward appearance conformities because of alterations invited by the brutal face decoupling to present as they are coupled to the non-direct pictures. One more trial is the way to proficiently request to empower affiliation to contemplate expression (or different facial components) is to misuse the data. Facial Expression(FE) picture succession is fleeting territory spatial region information directly rise, however moreover the advance is not known. Information considering the increase of appearance together nearby the photo participation information can more improve the presentation of acknowledgment. However, the active information supplied is practical, there how to capture this information dependably and powerfully concerning facing challenges. For instance, an FE arrangement typically, one or additional of the principle times of development and counterbalance beat. Temporary information and preparing with a specific end goal to capture and question transient groupings of identical information, to make the correspondence in the midst of different worldly periods request to be built up. Press can be encoded. In this work, another dynamic FE, hereditary and neural organize based way utilizing the half, and half method are made.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"41 1","pages":"18-21"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87503473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview on User Profiling in Online Social Networks 在线社交网络中的用户特征分析综述
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451639
Dr. Vasanthakumar G. U., K. Sunithamma, P. D. Shenoy, K. Venugopal
Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors.
在线社交网络的进步每天都在创造巨大的数据,为用户提供了很多表达他们的兴趣和意见的机会。由于社交网络的普及和暴露,许多入侵者正在使用这个平台进行非法目的。识别这样的用户具有挑战性,需要从社交媒体上传播的数据中挖掘出大量的知识。这项工作为在线社交网络中的用户档案提供了见解。用户档案的建立是基于用户的行为模式、相关性和活动,使用聚类、行为分析、内容分析和人脸检测等技术从聚合数据中分析用户。根据应用程序和目的的不同,分析用户所使用的机制也有所不同。进一步研究用于分析用户的其他机制是在未来努力的范围内。
{"title":"An Overview on User Profiling in Online Social Networks","authors":"Dr. Vasanthakumar G. U., K. Sunithamma, P. D. Shenoy, K. Venugopal","doi":"10.5120/IJAIS2017451639","DOIUrl":"https://doi.org/10.5120/IJAIS2017451639","url":null,"abstract":"Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"23 1","pages":"25-42"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84951439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Automatic Brain Tumor Detection and Segmentation using Hybrid Method 基于混合方法的脑肿瘤自动检测与分割
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451641
S. Sreedhanya, C. Pawar
{"title":"An Automatic Brain Tumor Detection and Segmentation using Hybrid Method","authors":"S. Sreedhanya, C. Pawar","doi":"10.5120/IJAIS2017451641","DOIUrl":"https://doi.org/10.5120/IJAIS2017451641","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"91 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77506502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization 基于虚拟化的移动存储共享内存的云数据中心方案
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451635
N. Sakib, Raihan Ahmed, Tanvir Ahmed, F. Islam, Bijoy Das
Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.
云计算是一种广泛使用的技术,它为用户提供特定需求的资源,增强了可管理性,最大限度地减少了数据管理和运营成本。基本上,云允许用户将他们有价值的数据存储在云存储上,因此数据中心的安全性和易于访问被认为是云计算中值得关注的部分。在研究中,我们提出了一种新的云计算方法,即利用移动存储来构建云数据中心,并且易于访问,具有较好的安全性。我们考虑到使用用户的移动存储来构建数据中心可以降低成本,因此提出了三层技术。第一层是用户的移动设备,第二层是拥有不同虚拟机的服务器,最后一层还是用户的移动设备,用于构建云数据中心(mobile-server-mobile)。移动应用程序实现了最初的安全和管理问题。用户可以通过虚拟机实现数据在第一层和第三层之间的振荡,确保数据的安全交易,降低功耗、维护成本、带宽消耗和快速的数据共享。
{"title":"A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization","authors":"N. Sakib, Raihan Ahmed, Tanvir Ahmed, F. Islam, Bijoy Das","doi":"10.5120/IJAIS2017451635","DOIUrl":"https://doi.org/10.5120/IJAIS2017451635","url":null,"abstract":"Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"21 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81953650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Weekly Mining of Fuzzy Patterns from Temporal Datasets 每周从时间数据集中挖掘模糊模式
Pub Date : 2017-01-06 DOI: 10.5120/IJAIS2017451638
Husamuddin
The process of extracting fuzzy patterns from temporal datasets is a well known data mining problem. Weekly pattern is one such example where it reflects a pattern with some fuzzy time interval every week. This process involves two steps. Firstly, it finds frequent sets and secondly, it finds the association rules that occur in certain time intervals weekly. Most of the fuzzy patterns are concentrated as user defined. However, the probability of user not having prior knowledge of datasets being used in some applications is more. Thus, resulting in the loss of fuzziness related to the problem. The limitation of the natural language also bounds the user in specifying the same. This paper, proposes a method of extracting patterns that occur weekly in a particular fuzzy time frame and the fuzzy time frame is generated by the method itself. The efficacy of the method is backed by the experimental results
从时态数据集中提取模糊模式的过程是一个众所周知的数据挖掘问题。周模式就是这样一个例子,它反映了每周有一些模糊时间间隔的模式。这个过程包括两个步骤。首先查找频繁集,其次查找每周在一定时间间隔内出现的关联规则。大多数模糊模式都集中在用户定义的模式上。然而,在某些应用程序中,用户没有数据集先验知识的概率更大。这样,就造成了丢失相关的模糊性问题。自然语言的限制也限制了用户指定相同的内容。本文提出了一种提取特定模糊时间框架内每周发生的模式的方法,模糊时间框架由该方法本身生成。实验结果证明了该方法的有效性
{"title":"The Weekly Mining of Fuzzy Patterns from Temporal Datasets","authors":"Husamuddin","doi":"10.5120/IJAIS2017451638","DOIUrl":"https://doi.org/10.5120/IJAIS2017451638","url":null,"abstract":"The process of extracting fuzzy patterns from temporal datasets is a well known data mining problem. Weekly pattern is one such example where it reflects a pattern with some fuzzy time interval every week. This process involves two steps. Firstly, it finds frequent sets and secondly, it finds the association rules that occur in certain time intervals weekly. Most of the fuzzy patterns are concentrated as user defined. However, the probability of user not having prior knowledge of datasets being used in some applications is more. Thus, resulting in the loss of fuzziness related to the problem. The limitation of the natural language also bounds the user in specifying the same. This paper, proposes a method of extracting patterns that occur weekly in a particular fuzzy time frame and the fuzzy time frame is generated by the method itself. The efficacy of the method is backed by the experimental results","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"15 1","pages":"22-24"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84016477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using cloud computing in higher education: a strategy to address trust issues in adoption of cloud services in Kenyan Public and Private Universities 在高等教育中使用云计算:解决肯尼亚公立和私立大学采用云服务过程中信任问题的战略
Pub Date : 2016-12-10 DOI: 10.5120/IJAIS2016451630
D. Onyango
Cloud computing is fast gaining significant ground as a solution to offer institutions with competitive advantage compared to the old traditional IT. Nevertheless, many institutions are still clenched to the traditional IT where legacy IT systems or applications are hosted in-house and hence administration of the systems or services is local or on premise. This has resulted in high IT expenditures on both hardware and software due to increased storage demands as well as investing on high skilled resources to administer the existing systems or applications which might not be viable in the long run. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, adoption level of cloud services is still very low in higher institutions of learning due to matters security especially trust issue which remains a major concern over cloud solutions. A case study was carried out in selected public and private universities to determine the reason for the low cloud uptake by the key stakeholders in higher institution of learning. An adoption strategy was recommended with reference to the resources, confidentiality, integrity and availability. The focus was on how key stakeholders view cloud services in the context of unique operational efficiency. General Terms Cloud Computing, Trust, Higher Education
与传统的IT相比,云计算作为一种解决方案正在迅速获得重要的地位,为机构提供了竞争优势。尽管如此,许多机构仍然固守传统IT,其中遗留IT系统或应用程序托管在内部,因此系统或服务的管理是本地或内部的。由于存储需求的增加,这导致硬件和软件上的高IT支出,以及对高技能资源的投资,以管理从长远来看可能不可行的现有系统或应用程序。尽管与云计算相关的潜在好处包括降低硬件、软件和熟练资源的总购置或拥有成本(TCO),但由于安全问题,特别是信任问题(这仍然是云解决方案的一个主要问题),云服务在高等院校的采用水平仍然很低。在选定的公立和私立大学进行了一项案例研究,以确定高等院校主要利益相关者对云的低吸收的原因。根据资源、保密性、完整性和可用性,建议采用一项采用策略。重点是关键利益相关者如何在独特的运营效率背景下看待云服务。云计算,信任,高等教育
{"title":"Using cloud computing in higher education: a strategy to address trust issues in adoption of cloud services in Kenyan Public and Private Universities","authors":"D. Onyango","doi":"10.5120/IJAIS2016451630","DOIUrl":"https://doi.org/10.5120/IJAIS2016451630","url":null,"abstract":"Cloud computing is fast gaining significant ground as a solution to offer institutions with competitive advantage compared to the old traditional IT. Nevertheless, many institutions are still clenched to the traditional IT where legacy IT systems or applications are hosted in-house and hence administration of the systems or services is local or on premise. This has resulted in high IT expenditures on both hardware and software due to increased storage demands as well as investing on high skilled resources to administer the existing systems or applications which might not be viable in the long run. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, adoption level of cloud services is still very low in higher institutions of learning due to matters security especially trust issue which remains a major concern over cloud solutions. A case study was carried out in selected public and private universities to determine the reason for the low cloud uptake by the key stakeholders in higher institution of learning. An adoption strategy was recommended with reference to the resources, confidentiality, integrity and availability. The focus was on how key stakeholders view cloud services in the context of unique operational efficiency. General Terms Cloud Computing, Trust, Higher Education","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"37 1","pages":"46-53"},"PeriodicalIF":0.0,"publicationDate":"2016-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88823149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
In what way Interactions Amongst Social Entities can be Integrated into Computations as Basis for Unravelling Complications 社会实体之间的相互作用以何种方式可以集成到计算中,作为解开复杂性的基础
Pub Date : 2016-12-06 DOI: 10.5120/ijais2016451627
Khalid A. Fakeeh
A social network is a network of relationships and interactions among social entities such as individuals, organizations, and groups. Social simulations are capable of representing social systems and coupled socio-techno-natural systems in ways that other methodological approaches are not. Computer code in a well-chosen programming language or simulation system. The pivotal role that agent interaction plays in determining social patterns has been investigated by two leading sociologists, James S. Coleman and Raymond Bourdon. In the 1960s, Coleman significantly contributed to developing mathematical sociology, but also worked to extend equationbased models through computer simulation could motivate and agent-based turn in sociology. This approach would contribute to shifting away from social systems tradition and their large-scale problems of social speculation to problems which can be studied by systematic research. The purpose of this paper is to discuss the challenges facing social entities, and how social objects can be incorporated into computations as the basis for solving difficulties.
社会网络是个人、组织和群体等社会实体之间的关系和互动网络。社会模拟能够以其他方法方法无法做到的方式表示社会系统和耦合的社会-技术-自然系统。用精心选择的编程语言或模拟系统编写的计算机代码。两个主要的社会学家,James S. Coleman和Raymond Bourdon,已经研究了代理人相互作用在决定社会模式中所起的关键作用。在20世纪60年代,科尔曼对数学社会学的发展做出了重大贡献,但也致力于通过计算机模拟扩展基于方程的模型,从而推动社会学转向基于主体。这种方法将有助于从传统的社会系统及其大规模的社会投机问题转向可以通过系统研究来研究的问题。本文的目的是讨论社会实体面临的挑战,以及如何将社会对象纳入计算中,作为解决困难的基础。
{"title":"In what way Interactions Amongst Social Entities can be Integrated into Computations as Basis for Unravelling Complications","authors":"Khalid A. Fakeeh","doi":"10.5120/ijais2016451627","DOIUrl":"https://doi.org/10.5120/ijais2016451627","url":null,"abstract":"A social network is a network of relationships and interactions among social entities such as individuals, organizations, and groups. Social simulations are capable of representing social systems and coupled socio-techno-natural systems in ways that other methodological approaches are not. Computer code in a well-chosen programming language or simulation system. The pivotal role that agent interaction plays in determining social patterns has been investigated by two leading sociologists, James S. Coleman and Raymond Bourdon. In the 1960s, Coleman significantly contributed to developing mathematical sociology, but also worked to extend equationbased models through computer simulation could motivate and agent-based turn in sociology. This approach would contribute to shifting away from social systems tradition and their large-scale problems of social speculation to problems which can be studied by systematic research. The purpose of this paper is to discuss the challenges facing social entities, and how social objects can be incorporated into computations as the basis for solving difficulties.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"10 1","pages":"22-24"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76017507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Overview of DDOS Attacks Detection and Prevention in the Cloud 云环境下DDOS攻击检测与防护概述
Pub Date : 2016-12-06 DOI: 10.5120/IJAIS2016451628
Khalid A. Fakeeh
Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have exposed to significant operational and business consequences, not to mention public embarrassment. In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud. We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.
安全只是一种幻觉,除非你被黑客入侵。云中的攻击对组织的灾难性和破坏性影响比用户预期的要大。由于攻击不断演变,使其难以防御。大多数组织将尝试检查他们在云中的设备,以使用传统的安全措施(如反病毒或防火墙)来防止病毒,认为它可以保护不同的攻击,但随着攻击模式的广泛变化,组织已经暴露在重大的运营和业务后果中,更不用说公开尴尬了。本文对DDOS (Distributed Denial of Service,分布式拒绝服务)攻击的研究工作进行了调研,分析了云环境下DDOS攻击的防范和检测方法。我们发现在云中检测和防止缓慢的客户端应用层攻击有很大的研究范围。
{"title":"An Overview of DDOS Attacks Detection and Prevention in the Cloud","authors":"Khalid A. Fakeeh","doi":"10.5120/IJAIS2016451628","DOIUrl":"https://doi.org/10.5120/IJAIS2016451628","url":null,"abstract":"Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have exposed to significant operational and business consequences, not to mention public embarrassment. In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud. We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"30 1","pages":"25-34"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83349663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
International journal of applied information systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1