Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 584

Real-Time Obstacle Detection Approach using Stereoscopic Images

Real-Time Obstacle Detection Approach using Stereoscopic Images

Nadia Baha

Статья научная

In this paper, we propose a new and simple approach to obstacle and free space detection in an indoor and outdoor environment in real-time using stereo vision as sensor. The real-time obstacle detection algorithm uses two dimensional disparity map to detect obstacles in the scene without constructing the ground plane. The proposed approach combines an accumulating and thresholding techniques to detect and cluster obstacle pixels into objects using a dense disparity map. The results from both analysis modules are combined to provide information of the free space. Experimental results are presented to show the effectiveness of the proposed method in real-time.

Бесплатно

Recommender System in Tourism Using Case based Reasoning Approach

Recommender System in Tourism Using Case based Reasoning Approach

Tamir Anteneh Alemu, Alemu Kumilachew Tegegne, Adane Nega Tarekegn

Статья научная

Using recommender systems with the help of computer systems technology to support the Tourist advising process offers many advantages over the traditional system. A knowledge based recommender reasons about the fit between a user’s need and the features of available products. Providing an effective service in Ethiopian Tourism sector is critical to attract more foreign and local tourists. However, there are major problems that need immediate solution. First, the difficulty of getting fast, reliable, and consistent expert advice in the sector that is suitable to each visitor’s characteristics and capabilities. Second, inadequacy of the number of experienced experts and consulting individuals who can give advice on tourism issues in the country. Therefore, this paper aims to design a recommender system for tourist attraction area and visiting time selection that can assist experts and tourists to make timely decisions that helps them to get fast and consistent advisory service. So that, visitors can identify tourist attraction areas that have the highest potential of success/satisfaction and that match their personal characteristics. The system provides recommendation to visitors based on previously solved cases and new query given by the tourist. For this study, about 615 cases which are collected from National Tour operation and 10 attributes which are collected from experts are used as case base. These attributes and cases are used as knowledge base to construct case based recommender. The system calculates similarity between existing cases and new queries that are provided by the visitors, and provide solution or recommendation by taking best cases to the new query. In this study, JCOLIBRI case base development tool is used to develop the prototype. JCOLIBRI contains both user interface which enables visitors to enter their query and programming codes with the help of Java script language. To decide the applicability of the prototype in the domain area, the system has been evaluated by involving domain experts and visitors through visual interaction using the criteria of easiness to use, time efficiency, applicability in the domain area and providing correct recommendation. Based on prototype user acceptance testing, the average performance of the system is 80% and 82% by domain experts and visitors respectively. The performance of the system is also measured using the standard measure of relevance (IR system) recall, precision and accuracy measures, where the system registers 83% recall, 61% precision and 85.4% accuracy.

Бесплатно

Redesign Sanjai Chips Packaging Using Kansei Engineering Method

Redesign Sanjai Chips Packaging Using Kansei Engineering Method

Meylia Vivi Putri, Isdaryanto Iskandar, Andhika

Статья научная

Sanjai chips made from cassava is typical tradisional Minang food. Packaging design is fundamental because 89% of consumer responses to buying a product are influenced by packaging. Current packaging weakness are plastic packaging is thin, no accompanying brands, and unattractive packaging, so less attractive, greasy, leaks, and make the chips contained in it be destroyed when bought for souvenirs. For this reason, it is necessary to redesign packaging for sanjai chips to increase product protection and influence consumers. Kansei Engineering is a method that deals with the psychological aspects of consumers when interacting with products to obtain a relationship between feelings and product characteristics. Because of that, this method has been chosen. The kansei process begins with a span of semantic space which begins with determining the kansei word. Kansei words were obtained from the distribution of open questionnaires and also based on previous research. After that, the span of the space of properties is determined which is useful for identifying what product properties should be in the design. after that the synthesis, design and evaluation are carried out. Based on the results from the results of the synthesis of span of semantic space and span of the space of properties, it was found that to design Sanjai Chips packaging, the criteria for packaging design are simple, good, informative, unique, and convincing for packaging materials must be non-greasy, made of plastic, good, strong, and convincing, while for other facilities criteria must be flexible.

Бесплатно

Reducing Multicast Redundancy and Latency in Multi-Interface Multi-Channel Wireless Mesh Networks

Reducing Multicast Redundancy and Latency in Multi-Interface Multi-Channel Wireless Mesh Networks

Kai Han, Yang Liu

Статья научная

In wireless mesh networks, each node can be equipped with multiple network interface cards tuned to different channels. In this paper, we study the problem of collision-free multicast in multi-interface multi-channel wireless mesh networks. The concept of interface redundancy is proposed as a new criterion for the multicast/broadcast redundancy in wireless mesh networks, and we prove that building a multicast/broadcast tree with the minimum interface redundancy is NP-hard. We also prove that the minimum-latency multicasting problem in multi-channel wireless mesh networks is NP-hard. We present two heuristic-based algorithms which jointly reduce the interface redundancy and the multicast latency. Since broadcast can be considered as a special case of multicast, an approximate algorithm for low-redundancy broadcast tree construction is also proposed, which has a constant approximation ratio. Finally, the simulation results prove the effectiveness of our approach.

Бесплатно

Reduction of Multiple Move Method Suggestions Using Total Call-Frequencies of Distinct Entities

Reduction of Multiple Move Method Suggestions Using Total Call-Frequencies of Distinct Entities

Atish Kumar Dipongkor, Rayhanul Islam, Nadia Nahar, Iftekhar Ahmed, Kishan Kumar Ganguly, S.M. Arif Raian, Abdus Satter

Статья научная

Inappropriate placement of methods causes Feature Envy (FE) code smell and makes classes coupled with each other. To achieve cohesion among classes, FE code smell can be removed using automated Move Method Refactoring (MMR) suggestions. However, challenges arise when existing techniques provide multiple MMR suggestions for a single FE instance. The developers need to manually find an appropriate target classes for applying MMR as an FE instance cannot be moved to multiple classes. In this paper, a technique is proposed named MultiMMRSReducer, to reduce multiple MMR suggestions by considering the Total Call-Frequencies of Distinct Entities (TCFDE). Experimental results show that TCFDE can reduce the multiple MMR suggestions of an FE instance and performs 77.92% better than an existing approach, namely, JDeodorant. Moreover, it can ensure minimum future changes in the dependent classes of an FE instance.

Бесплатно

Reduction of Power Consumption in FPGAs - An Overview

Reduction of Power Consumption in FPGAs - An Overview

Naresh Grover, M.K.Soni

Статья научная

Field Programmable Gate Arrays FPGAs are highly desirable for implementation of digital systems due to their flexibility, programmability and low end product life cycle. In more than 20 years since the introduction of FPGA, research and development has produced dramatic improvements in FPGA speed and area efficiency, narrowing the gap between FPGAs and ASICs and making FPGAs the platform of choice for implementing digital circuits. FPGAs hold significant promise as a fast to market replacement. Unfortunately, the advantages of FPGAs are offset in many cases by their high power consumption and area. The goal is to reduce the power consumption without sacrificing much performance or incurring a large chip area so that the territories of FPGAs applications can expand more effectively. Reducing the power of FPGAs is the key to lowering packaging and cooling costs, improving device reliability, and opening the door to new markets such as mobile electronics. This paper presents the tips to lower down the static and dynamic power dissipation in FPGAs. It gives an overview of various techniques at system, device, and circuit and architecture level used for reduction of power consumption of FPGAs and their outcomes.

Бесплатно

Reliability of Software Correlated Components Failure in Pakistan Industry

Reliability of Software Correlated Components Failure in Pakistan Industry

Darakshan Anjum, Tasleem Mustafa

Статья научная

Now-a-days most important issue of software engineering in Pakistan industry is the correlated component failure, such failure occur when on component of the software is fail to work according to the specification and other related module to the specific component is also fail to perform the work. Due to this reason whole system destruction is possible as well as software development time and cost may be increased. The purpose of the study is to analyze the probability of software correlated component failure before the implementation and also analyze the main factor that cause of software correlated failure in Pakistan industry. Data is collected from software houses by using the data gathering techniques such as survey and interviews. After doing statistical analysis by using bar chart conclude that in Pakistan industry main reason of software failure is error in software resource analysis in addition to faults in testing of the software. To overcome these issues in future it's important to improve the testing phase of the software development process and during development of the software better techniques used for the resource allocation process.

Бесплатно

Research Issues in Personalization of Mobile Services

Research Issues in Personalization of Mobile Services

Muhammad Asif, John Krogstie

Статья научная

Personalization is gaining more importance with the increase of mobile and community services. Provision of personalized mobile services can help to meet the individual needs at a time and place when and where a user needs it. Mobile services should be designed to be usable and useful to realize the benefits of personalization. It is not an easy task to satisfy the individual's goals or needs. Currently, mobile services are designed either using a client side or server- side approach. At the same time, it is raising different research issues ranging from technological to security or privacy concerns. In this work, we described the current research and development in the area of personalization of mobile services. The objective of this paper is to analyze which design approach is suitable for the personalization of mobile services. Finally, we have discussed issues and challenges related to client-side personalization vs server-side personalization and the recent trends in personalization of mobile services.

Бесплатно

Research of the QoC based Middleware for the Service Selection in Pervasive Environment

Research of the QoC based Middleware for the Service Selection in Pervasive Environment

Di Zheng, Jun Wang

Статья научная

With the rapid development of information technology, it is inevitable for the distributed mobile computing will evolve to the pervasive computing gradually and whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. Furthermore, with the development of SOA, more and more pervasive applications have been composed of different kinds of services. So how to choose a suitable service from all the useable services is the most important step for pervasive computing. Compare to the traditional service selection we must take more care of the context as well as the quality of them in pervasive environment. However, most of existing researches pay no attention to QoC(Quality of Service) which may lead to unreliable selections. Therefore we proposed a middleware based service selection scheme to support QoC-aware service selection efficiently.

Бесплатно

Research on Feature Matching of Multi-pose Face Based on SIFT

Research on Feature Matching of Multi-pose Face Based on SIFT

Yingjie Xia, Yanbin Han, Jinping Li, Rui Chen

Статья научная

Feature matching based on multi-pose faces has become more important in recent years. And it can be used in many fields, such as video monitoring, identity recognition, and so on. In this paper, SIFT algorithm is combined with AdaBoost algorithm, and a method of feature matching based on a multi-pose face is established. Firstly, the face region is extracted from multi-pose face images by AdaBoost. Secondly, SIFT characteristic vectors of the main regions are extracted and matched. The images of the ORL face DB are used in this paper, and some pictures taken in the experiment are used too. The matching results are acceptable and reasonable. Based on multi-pose face, it can be used to research face feature matching, face recognition, video monitoring and 3-D face reconstruction.

Бесплатно

Research on Fine-grained Job scheduling in Grid Computing

Research on Fine-grained Job scheduling in Grid Computing

Yeqing Liao, Quan Liu

Статья научная

Grid computing is the technology used in building Internet-wide computing environment and integrating distributed and heterogeneous resources. However, in Grid environment, job scheduling is confronted with a great challenge. This paper focuses on lightweight jobs scheduling in Grid Computing. An Adaptive Fine-grained Job Scheduling (AFJS) algorithm is proposed. Compared with other fine-grained job scheduling algorithms based on grouping, AFJS can outperform them according to the experimental results. And some other related problems are also illustrated.

Бесплатно

Role of m-Banking for Indian Rural Consumers, its Adaptation Strategies, and Challenges: Consumer Behavior Analysis

Role of m-Banking for Indian Rural Consumers, its Adaptation Strategies, and Challenges: Consumer Behavior Analysis

Shyam R. Sihare

Статья научная

An information technology is a part of modern society for completion of their daily schedule with sophisticated accuracy, effectiveness, efficiency and maintaining transparency. However, modern technology penetration into root level in modern Indian society is not in an appreciable in particular of rural India. Among different applications of wireless communication means a significant application is m-banking. Mobile banking mainly concerned the things of a transaction as well as financial services. In this paper, we discuss adaptation strategies and make an analysis of rural consumer behavior about mobile banking. Similarly, we discuss different mobile banking facilities and upcoming facilities which should be utilized by rural Indian people to connect rest of the world with efficiently. With that, we have a study, which factor play significant roles in rural India for deep penetration of mobile banking. As well as, study about his behavior and make an analysis of rural consumers for adaptation of beneficial technology and services to come out from a root and play at tip position in modern society. It is evident in recent time that mobile devices or handheld devices like PDA (Personal Digital Assistance) application are widespread due to its cost, ease of use, efficiency, and effectiveness. But optimum penetration exhibit inhibits by social misconception such as security and not maintain transparency before, during and after transactions.

Бесплатно

Roles of E–content for E–business: analysis

Roles of E–content for E–business: analysis

Shyam R. Sihare

Статья научная

E–content marketing is an emerging strategy in a marketing arena to shift the paradigm from traditional marketing to digital marketing. Digital marketing is an appropriate alternative to collaborate with a traditional marketing for enhance marketing strategies to reach globally. In India used the different kind of marketing strategies, however, in recent times, marketers focus on a digital marketing keeping view of its effectiveness and efficiency. Furthermore, a marketer needs to develop such strategies which should be consumer oriented. The digital marketing should be based on consumer interest and their product requirements. In this research paper, we discuss digital marketing with a perspective of consumer interest and requirements. After analysis of the digital marketing, we found that it is a robust medium to reach as globally within a fraction of the second.

Бесплатно

Sales Management Application at Widya Collection Store Web-based

Sales Management Application at Widya Collection Store Web-based

Vilianty Rafida, Ita Arfyanti, Irfan Hidayat

Статья научная

Widya Collection Store is a business that provides sports clothing, as well as one of the producers in the Samarinda area. Sales management is still not optimal because it still uses paper notes and is still being written which makes it easy for errors to occur in writing prices, quantities of goods and total prices so that it takes a long time to process transactions, both from payment in full or receivables. In addition, managing stock of goods is also more difficult because it is not recorded in the database. Therefore, a Sales Management application was made at the Web-Based Widya Collection Store to process item data, sales transactions, make complete notes and reports and make the transaction process faster. The long-term goal to be achieved is that the stock management process has been recorded in order to know the stock that must be ordered from the supplier. In addition, to simplify and expedite activities in searching for sales transaction data if one day it is needed. In this study, the method used to build a Sales Management Application at a Web-Based Widya Collection Store is the System Development Life Cycle (SDLC) development stage which consists of needs analysis, system design, and implementation.

Бесплатно

Scheme of Global Scrum Management Software

Scheme of Global Scrum Management Software

M. Rizwan Jameel Qureshi, Isaac Sayid

Статья научная

Many software development companies faced the challenge of coupling agile models and global software development in distributed projects. The challenges are related to the communication, management and control of the development process. These challenges emerged because global development involves developers from different geographical locations, time zones and with different cultures. Coupling agile models and global software development seems impossible at first glance, as they require frequent communications, rapid development, and resources management of distributed teams. However, researchers proposed several solutions and advices included tailoring of agile practices and addition of non-agile practices. Nevertheless, further efforts were needed to activate and unify these solutions. This paper introduces a new web based project management system for Scrum projects called global scrum management. It is a web application that manages Scrum process from planning phase to delivery of the last product increment. Moreover, the application features social networks functionalities to provide seamless communication, collaboration and knowledge transferring to the distributed team members. Also, developers' actions to the sprint tasks, including updating task status, will be reflected to the burn down charts of the sprint and product backlog instantly. Several diagrams are provided in this paper to explain the solution including UML diagrams.

Бесплатно

Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy

Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy

Alovsat Garaja Aliyev, Roza Ordukhan Shahverdiyeva

Статья научная

The article examines the scientific and methodological basis of a comprehensive assessment of threats and damage to information systems of the digital economy. The information infrastructure and tasks of the digital economy have been defined. Sources of information security in the digital economy sectors and their information security requirements have been studied. The results of the analysis of the situation in the countries of the world on the Global Cyber security Index are shown schematically. The graph of the dynamics of cybersecurity expenditures in the ICT segments is shown. It is argued that cybersecurity, which is formed and developed through the use of digital systems, is a priority. Many goals and methods of cyber-attacks are given on the platform of the 4.0 Industrial revolution. Cases of information security violations in the digital economy and the processes of assessing the damage caused by them have been studied. Generalized criteria for assessing information damage in the digital economy have been proposed. Threats to information and communication systems and classification of damage are given. A structural scheme of the conceptual model of threats and damage to information systems and resources in the field of digital economy of Azerbaijan has been proposed. An expert description of the ways in which information threats are disseminated has been developed using a fuzzy approach. The main types of damage caused by threats to the security of information systems are given. The security aspects of the abundance and surplus of information in the digital economy are shown. The directions of increasing the level of security and confidence in the digital economy and the structures to ensure its security are given. The main directions of information security in the digital economy have been identified, the directions of ensuring its security and increasing its confidence have been identified. Commonly used universal base technologies have been proposed in the digital economy sectors. Some methodological approaches to integrated risk and damage assessment in the digital economy have been explored. A scientific-methodological approach based on fuzzy methods has been proposed for the implementation of complex risk and damage assessment in the digital economy. Purpose of the research. The main purpose of the research in the article was to develop a scientific and methodological bases for identifying and comprehensively assessing the scope of possible threats, dangers and damage to information systems that make up the infrastructure of the digital economy in its formation conditions. Attention was paid to the development of recommendations on promising areas for improving multi-criteria expert assessment methods in increasing the effectiveness of management of threats and damage to information systems of the digital economy and the assessment of their performance. By applying the results of multi-criteria expert assessments in decision-making processes it has been possible to get results. Attempts have been made to classify threats and damages in information systems and resources in the sphere of digital economy and to develop a conceptual model of their impact. The spread of information threats using a fuzzy approach has been described by expert methods. Defining the main directions of information security in the digital economy, defining the directions of ensuring security and increasing confidence, using universal basic technologies to ensure security in the digital economy sectors are also included in the research goals. One of the goals was to propose the main stages of an approach based on fuzzy methods for the implementation of integrated risk and damage assessment issues in the digital economy. Research methods used. Research methods such as system analysis, correlation and regression analysis, mathematical and econometric modeling methods, expert assessment method, measurement theory, algorithmization, ICT tools and technologies have been used in the development of scientific and methodological bases of complex assessment of threats and damage to information systems of digital economy.

Бесплатно

Scrum Practices and Global Software Development

Scrum Practices and Global Software Development

Areej Sewalh AL_Zaidi, M. Rizwan Jameel Qureshi

Статья научная

Global software development (GSD) is one of the emerging areas of software engineering. Stakeholders are distributed located that brings into several challenges to coordinate and collaborate effectively. Scrum is one the widely practiced agile methodologies. Majority of the software development companies showed a great interest from last few years to apply Scrum methodology in distributed development to solve the coordination and communication problems. Although Scrum contains good features and strengths but still there are improvement possibilities to solve the problems of coordination and collaboration in GSD. Majority of software development companies face the problems of coordination and communication in GSD projects. This paper proposes a novel solution to mitigate the coordination and communication challenges of GSD projects. The survey is used as a research methodology to evaluate the proposed solution. The proposed solution is supported by 62.24%. We anticipate that the proposed solution will help the software development companies to mitigate the coordination and communication challenges of GSD projects.

Бесплатно

Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

Omar M.Barukab, Asif Irshad Khan, Mahaboob Sharief Shaik , MV Ramana Murthy, Shahid Ali Khan

Статья научная

Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel methodology for safe and secure data transmission over satellite. In this paper a methodology is proposed to ensure safe and secured transferred of data or information for satellite based communication using symmetric and asymmetric Cryptographic techniques.

Бесплатно

Security Challenges and Attacks in Mobile Ad Hoc Networks

Security Challenges and Attacks in Mobile Ad Hoc Networks

CH.V. Raghavendran, G. Naga Satish, P. Suresh Varma

Статья научная

Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes that form a temporary network without of any existing network infrastructure or central access point. The popularity of these networks created security challenges as an important issue. The traditional routing protocols perform well with dynamically changing topology but are not designed to defense against security challenges. In this paper we discuss about current challenges in an ad hoc environment which includes the different types of potential attacks that are possible in the Mobile Ad hoc Networks that can harm its working and operation. We have done literature study and gathered information relating to various types of attacks. In our study, we have found that there is no general algorithm that suits well against the most commonly known attacks. But the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET. To develop suitable security solutions for such environments, we must first understand how MANETs can be attacked. This paper provides a comprehensive study of attacks against mobile ad hoc networks. We present a detailed classification of the attacks against MANETs.

Бесплатно

Security Measures in Data Mining

Security Measures in Data Mining

Anish Gupta, Vimal Bibhu, Rashid Hussain

Статья научная

Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirement for data mining applications. In this paper we present security requirement measures for the data mining. We summarize the requirements of security for data mining in tabular format. The summarization is performed by the requirements with different aspects of security measure of data mining. The performances and outcomes are determined by the given factors under the summarization criteria. Effects are also given under the tabular form for the requirements of different parameters of security aspects.

Бесплатно

Журнал