Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 584

Towards a Novel Identity Check Using Latest W3C standards & Hybrid Blockchain for Paperless Verification

Towards a Novel Identity Check Using Latest W3C standards & Hybrid Blockchain for Paperless Verification

Samiur Rahman Khan, Md. Al-Amin

Статья научная

With the advent of W3C standards such as DID, VCs, and DPKI beyond 2020, the industry has reached a new level where a technological infrastructure overhaul is possible. By employing blockchain and other Decentralized Ledger Technologies, it is believed that we can eliminate the requirement for paper-based verification. Researchers are aware of the technological components we possess at present and are trying to bring forth their sets of POCs. Additionally, governments ranging from developing to developed countries are taking industrial initiatives that incorporate these technologies. This research also evaluates the latest events and cases to find the need for paperless verification. Previous development conducted in the domains of Information Systems and Public forensics has presented us with various issues at both infrastructural and user levels. It also introduced us to the presence of lots of gaps present that can be improved with a more improvised form of decentralized paperless solution. Researchers have pointed out that the modern day identity check and forensic solutions will face difficulties with blockchain compatibility, since most of those previous components will require built-in integration with a decentralized environment. As the latest researches suggest the key to this integration is now possible with the proper application of the W3C standards. In this paper, we propose an architecture that interlinks the latest decentralized W3C standards with a permissioned blockchain for implementing paperless verification and identity check.

Бесплатно

Towards data exchange between health information system and insurance claims management system

Towards data exchange between health information system and insurance claims management system

Abel Haule, Mussa Ally Dida, Anael Elikana Sam

Статья научная

The advancement of technology observed today has led to the development of many Health Information Systems (HIS) which are cost-effective, reliable, scalable and flexible. Moreover, integrated Health Information System (iHIS) plays a crucial role in the dissemination of information, which helps in decision-making. The care2x HIS in Tanzania does not have a module for exchanging data between Care2x HIS and the National Health Insurance Fund (NHIF) claims management system. The absence of this module in Care2x has resulted into long waiting time for a patient, inaccuracy of the data submitted in claim forms, the consumption of time when processing claims, delay in processing payment and the high costs incurred in printing claims forms. In this paper, we used both qualitative and quantitative methods to gather the requirements for the development of the module. Interviews, questionnaire and document review were employed in data collection. The requirements were gathered with the help of 12 practitioners and one Information Technology (IT) specialist from NHIF headquarters. The results showed that the integration of the data exchange module is very potential in solving the present challenges. The data exchange module between Care2x HIS and NHIF Claims management System will increase the accuracy of claims submitted and reduce the cost for printing claims forms and time spent in filling and processing claims.

Бесплатно

Towards semantic Geo/BI: a novel approach for semantically enriching Geo/BI data with OWL ontological layers (OOLAP and ODW) to enable semantic exploration, analysis and discovery of geospatial business intelligence knowledge

Towards semantic Geo/BI: a novel approach for semantically enriching Geo/BI data with OWL ontological layers (OOLAP and ODW) to enable semantic exploration, analysis and discovery of geospatial business intelligence knowledge

Belko Abdoul Aziz Diallo, Thierry Badard, Frédéric Hubert, Sylvie Daniel

Статья научная

To contribute in filling up the semantic gap in data warehouses and OLAP data cubes, and enable semantic exploration and reasoning on them, this paper highlights the need for semantically augmenting Geo/BI data with convenient semantic relations, and provides OWL-based ontologies (ODW and OOLAP) which are capable of replicating data warehouses (respectively OLAP data cubes) in the form semantic data with respect of Geo/BI data structures, and which enable the possibility of augmenting these semantic BI data with semantic relations. Moreover, the paper demonstrates how ODW and OOLAP ontologies can be combined to current Geo/BI data structures to deliver either pure semantic Geo/BI data or mixed semantically interrelated Geo/BI data to business professionals.

Бесплатно

Two Level Hybrid SECO Environment for Secure Cloud Environment

Two Level Hybrid SECO Environment for Secure Cloud Environment

Manpreet kaur, Hardeep Singh

Статья научная

As cloud computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. Number of users used cloud to store their data. In general terms means encrypted form hackers can easily hack or modify the data because there is no security while uploading the data to cloud server. Due to this problem cloud server can easily deployed. As security is one of the major concerns in cloud environment for preventing data deployment during upload. The best solution for the protection of data privacy is done by encryption the sensitive data before being outsourced to cloud server, which makes effective data utilization a very challenging task. There are a number of security and privacy concerns associated with cloud computing but these issues fall into two broad categories: security and privacy concerns faced by cloud providers and security and privacy concerns faced by their customers. Different set of algorithms have been implemented on cloud environment for enhancing the security but still there are some major concerns like malicious attacks. In previous work on AES based encryption and a SECO based environment were introduced.. In SECO based environment root package generated key by using diffie-hellman algorithm and domain package generated key by using private key of root package. In AES algorithm and SECO based environment individually provided some sort of level encryption. In this both algorithms work on single level encryption approach which may be easily broken by malicious users. So, in proposed work both techniques that is AES and SECO based environment will be combined to provide two level security and also will double the encrypted environment which may not be easily broken by malicious users. Result will be more efficient and secure than the previous work.

Бесплатно

Two Proposed Models for Securing Data Management for Enterprise Resource Planning Systems Using Blockchain Technology

Two Proposed Models for Securing Data Management for Enterprise Resource Planning Systems Using Blockchain Technology

Nafiz Ahmed, Anik Kumar Saha, Mustafa Ahmad Arabi, Sheikh Talha Jubayer Rahman, Dip Nandi

Статья научная

An Enterprise Resource Planning (ERP) system is a software application that serves as a centralized platform to streamline and automate organizational functions and share real-time data, facilitating efficient communication and collaboration. It provides an all-inclusive approach to managing and optimizing business processes, boosting efficiency, fostering cooperation, and giving an overall picture of how the organization is operating. However, the traditional centralized databases in ERP systems pose security concerns. Blockchain Technology can be an appealing alternative as it comes with immutable and decentralized data as well as enhanced security. This study focuses on two methods of securing data management in ERP systems: Organizing the distributed information using The Ralph Kimball data model and optimizing an individual block using Database Sharding. This study does an extensive examination to determine the effectiveness of both suggested strategies, comprising a detailed evaluation that highlights the benefits and limitations of both techniques. This paper intends to patch the security holes in ERP systems to safeguard sensitive data and mitigate risks.

Бесплатно

USSD System for Monitoring and Management of Employee Leave in Higher Educational Institution

USSD System for Monitoring and Management of Employee Leave in Higher Educational Institution

Adamu Abubakar, Amit Mishra, Aliyu Yahaya Badeggi, Abubakar Abdulkadir

Статья научная

Unstructured supplementary service data also referred to as feature code or quick code has become a monumental part of services and products offered by Telecommunication Operators, and its application to various areas of telecommunication and real-world scenarios. It is a protocol of communication utilized by global system for mobile communications cell phones to communicate with mobile telecommunication network operators and applicable to various areas of trend in modern information technology sectors such as Wireless Application Protocol browsing, mobile-money services, prepaid call back services, menu-based information services, location-based content services, paid content portal, voting surveys, and product promotion. This system was designed by integrating the designed unstructured supplementary service data channel for employee leave management system into the standard global system for mobile communications architecture. The architecture consists of three parts; the front end, the middle end, and the back end. The system is implemented using PHP for the overall programming, MySQL for the database, and Windows 7 operating system as a development environment with Adobe dream weaver CS3 IDE. Apache TOMCAT webserver was used to host the system locally. Two interfaces were developed; one side with the mobile operators, which requires setting up of SS7 stack and the unstructured supplementary service data application over the stack. On the other side, HTTP-basedAPIs were used for the unstructured supplementary service data application. Several types of leaves exist and their usage depends on educational institution policies. An employee may apply for study leave like maternity leave, sick leave, and annual leave. Paper-based work is time consuming, USSD based activities are very simple and effective. This research work was conducted to solve the leave management in an academic institution using the USSD. Using the developed system, 1326 USSD sessions were recorded, 1238 sessions were successful, 59 were incomplete, and 29 failed. Cumulative findings from the 41 respondents reveal that the system is faster, more convenient, and user-friendly than the manual method of applying and managing employee leave, which indicates 94% of the success of the system. Thus, it can be concluded that the system was able to manage the leave management very well and very effectively.

Бесплатно

User story based information visualization type recommendation system

User story based information visualization type recommendation system

Liu Xu

Статья научная

To help users to determine the most appropriate visualization type is a useful feature of business visualization tools. Existing systems often give preliminary suggestions based on data sources but usually cannot make practical final decision. User stories are generalizations of user requirements. To recommend visualization type based on user stories can make better use of human experience to achieve automated decision making. One approach discussed in the paper is using machine learning techniques to model existing visualization types with corresponding user stories, and then use this model to predict recommended visualization type for new user story. This paper designs and implements a recommendation system prototype ReViz to verify the feasibility of this approach. As a typical web application, Modeling, Input Processing and Predicting components of ReViz are programmed using Python with Flask framework and Anaconda package set, and user interface is implemented using HTML, JavaScript and CSS with Bootstrap front-end library. The evaluation results show that ReViz can give recommended visualization type based on user story keywords. As a data-based intelligent software development technology achievement, visualization type recommendation system can also be integrated into larger business information management systems.

Бесплатно

Using publications linked open data to define organizational policies

Using publications linked open data to define organizational policies

Muhammad Ahtisham Aslam

Статья научная

Researchers around the world are publishing their scientific research results in different forms such as books, journal articles, reference works and project reports. Publishers of these scientific documents usually describe them by using metadata for organizational purposes. This metadata provides a rich information about scientific documents that can be used for analysis purposes such as measuring the impact of researchers and research centers. It can also be used to find scientific documents published in domain of some ones interest, which ultimately can be used to raise the state of the art to the next level. Scientific publications metadata can also be used to analyze the quality and directions of common and highly cited individuals and organizations, and based on this analysis other individuals and organizations can define directions for their future work and research. However, the main limitation of this metadata is that it is available in different formats that might not facilitate the analysis of scientific documents. Therefore, in this paper we clarify that how our SPedia knowledge base (a semantic based knowledge base of scientific publications metadata which we extracted by using SpringerLink as information source) facilitates the analysis of scientific data for policy making. We discuss different kind of questions that can be answered through SPedia knowledge base and we show that how results of these questions can be used to analyze the performance of individuals as well as organizations. We also show that how results of such analysis can help in making organizational policies regarding future research directions.

Бесплатно

Validation lamina for maintaining confidentiality within the Hadoop

Validation lamina for maintaining confidentiality within the Hadoop

Raghvendra Kumar, Dac-Nhuong Le, Jyotir Moy Chatterjee

Статья научная

In the white paper we strive to cogitate vulnerabilities of one of the most popular big data technology tool Hadoop. The elephant technology is not a bundled one rather by product of the last five decades of technological evolution. The astronomical data today looks like a potential gold mine, but like a gold mine, we only have a little of gold and more of everything else. We can say Big Data is a trending technology but not a fancy one. It is needed for survival for system to exist & persist. Critical Analysis of historic data thus becomes very crucial to play in market with the competitors. Such a state of global organizations where data is going more and more important, illegal attempts are obvious and needed to be checked. Hadoop provides data local processing computation style in which we try to go towards data rather than moving data towards us. Thus, confidentiality of data should be monitored by authorities while sharing it within organization or with third parties so that it does not get leaked out by mistake by naïve employees having access to it. We are proposing a technique of introducing Validation Lamina in Hadoop system that will review electronic signatures from an access control list of concerned authorities while sending & receiving confidential data in organization. If Validation gets failed, concerned authorities would be urgently intimated by the system and the request shall be automatically put on halt till required action is not taken for privacy governance by the authorities.

Бесплатно

Value-Risk Analysis of Crowdsourcing in Pakistan’s Perspective

Value-Risk Analysis of Crowdsourcing in Pakistan’s Perspective

Muhammad Saady, Qurat-ul-Ain, Sidra Anwar, Sadia Anayat, Samia Rafique

Статья научная

The benefits of crowdsourcing are enabled by open environments where multiple external stakeholders contribute to a firm's outcomes. In recent years, crowdsourcing has emerged as a distributed model of problem-solving and market development. Here, model assignments are assigned to networked individuals to complete so that the manufacturing expense of a business can be minimized considerably. The main objective of this research is to develop a methodology which will capture the value generation process in the presence of uncertainties (Risk factors) in crowdsourcing context. This study is designed to make an important contribution to the field of practice and knowledge. Value-Risk Analysis of crowd souring is one of the under studies Worldwide, especially in Pakistan. Provided the need, we have discussed the crowdsourcing as business process and presented an understanding of the risks associated with crowdsourcing use and possible strategies that can be used to maximize the value and minimize the identified risks. For the better understanding of crowdsourcing practices in Pakistan, three case studies were conducted based on three well reputed organizations of Pakistan and results gathered to help understand its practices, some of the risks associated with it and how they manage those risks.

Бесплатно

Variable Structure Control on Active Suspension of 4 DOF Vehicle Model

Variable Structure Control on Active Suspension of 4 DOF Vehicle Model

Chuanbo Ren, Cuicui Zhang, Lin Liu

Статья научная

In this paper, the theory of a variable structure model following control (VSMFC) is employed to the design of the controller for an active suspensions of 4-degree-of-freedom (4-DOF) automobile model. The sliding mode equation is derived by applying VSMFC theory and the parameters of the switching function are obtained by using the method of pole assignment; a hierarchical algorithm with control variables started in sequence is applied to solve the active force; a method of exponential approach law is used to improve the dynamic performance of the controller. The efficacy of the controller is verified by simulation carried out with the help of Matlab/ Simulink. The results show that the active suspension controller based on VSMFC theory is superior in both robustness and performance.

Бесплатно

Vulnerabilities Assessment of Emerging Web-based Services in Developing Countries

Vulnerabilities Assessment of Emerging Web-based Services in Developing Countries

Abdus Satter, B M Mainul Hossain

Статья научная

To cope up with the pace of digitalization all over the world, like developed countries, developing countries are also offering services to its citizens through various online portals, web applications and web sites. Unfortunately, due to the lack of consideration on vulnerability issues during the development phase, many of those web based services are suffering from serious security threats. For these developing countries, vulnerability statistics are required to have insight about the current security status of the provided web services. That statistical data can assist the stakeholders to take appropriate actions against cyberattacks. In this work, we conduct a survey to observe the responses of web based services against four most commonly found web attacks called Man in the Middle, SQL Injection, Cross Site Scripting and Denial of Service. We carry out the survey for 30 websites (applications) of Bangladesh as the country has been focusing on digitalization of government services for the last few years and has already been offering various online services to its citizens. Among the 30 websites of several categories, result shows that approximately 77% sites are vulnerable to Man in the Middle attack whereas 3% are vulnerable to SQL Injection and Cross Site Scripting.

Бесплатно

Vulnerabilities Assessment of Financial and Government Websites: A Developing Country Perspective

Vulnerabilities Assessment of Financial and Government Websites: A Developing Country Perspective

Md. Asif Khan Rifat, Yeasmin Sultana, B. M. Mainul Hossain

Статья научная

The growing number of web applications in a developing country like Bangladesh has led to an increase in cybercrime activities. This study focuses on measuring the vulnerabilities present in financial and government websites of Bangladesh to address the rising security concerns. We reviewed related works on web application vulnerability scanners, comparative studies on web application security parameters, surveys on web application penetration testing methodologies and tools, and security analyses of government and financial websites in Bangladesh. Existing studies in the context of developing countries have provided limited insight into web application vulnerabilities and their solutions. These studies have focused on specific vulnerabilities, lacked comprehensive evaluations of security parameters, and offered a limited comparative analysis of vulnerability scanners. Our study aims to address these gaps by conducting an in-depth analysis using the OWASP ZAP tool to scan and analyze risk alerts, including risk levels such as high, medium, low, and informational. Our investigation unveiled eight key vulnerabilities, including Hash Disclosure, SQL injection (SQLi), Cross-Site Request Forgery (CSRF), missing Content Security Policy (CSP) headers, Cross-Domain JavaScript File Inclusion, absence of X-Content-Type-Options headers, Cache-related concerns, and potential Cross-Site Scripting (XSS), which can lead to revealing hidden information, enabling malicious code, and failing to protect against specific types of attacks. In essence, this study does not only reveal major security weaknesses but also provides guidance on how to mitigate them, thereby playing a vital role in promoting enhanced cybersecurity practices within the nation.

Бесплатно

Web Application Performance Analysis of E-Commerce Sites in Bangladesh: An Empirical Study

Web Application Performance Analysis of E-Commerce Sites in Bangladesh: An Empirical Study

Mahfida Amjad, Md. Tutul Hossain, Rakib Hassan, Md. Abdur Rahman

Статья научная

The users of e-commerce sites are growing rapidly day by day for easy internet access where the performance of web applications plays a key role to satisfy the end-users. The performance of these websites or web applications depends on several parameters such as load time, fully loaded (time), fully loaded (requests), etc. This research tries to investigate and find out the parameters that affects the web performance and it has been tested on e-commerce applications of Bangladesh, where eleven parameters are considered and these are fully loaded (requests), first CPU idle, speed index, start render, load time, fully loaded (time), document complete (time), last painted hero, first contentful paint, and first byte. According to the analysis some applications need to take care of or the developers need to re-modify it. As per the investigation of scanned information, the applications fall under three classes. To start with, the applications do not demonstrate acceptable records to be investigated. The second and third classification applications required medium and high reaction times at the user end separately. Also, the fully loaded (requests)’ and document complete (requests) show the most noteworthy required time at the user end, where maximum values are 347 and 344 seconds individually.

Бесплатно

Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity

Web Applications Login Authentication Scheme Using Hybrid Cryptography with User Anonymity

Bello Alhaji Buhari, Afolayan Ayodele Obiniyi

Статья научная

It is a common requirement for modern web applications as many if not all services that need personalization and control of access move online. Due to increase in these services becoming online, login authentications become targets to attackers. Therefore, there is need for secure and efficient web application login authentication schemes to ensure users access control, security and privacy. Present schemes have limitations such as users spent a lot of time browsing to create image portfolios than to create passwords and PINs, subject to active impersonation attack, some will only suit well for financial transaction system due to the TIC involved, some may have hash collisions, some require addition BLE device to be install and available on the authentication systems and cannot be used for higher data rates and long distance unlike cellular and WiFi devices, some involves reuse of password at single or multiple service providers which may lead to a password reuse attack called domino effect and some work well in application that needs to share permission with other applications like social media applications inform of APIs and improvising of user anonymity. We propose an improved web application login authentication scheme using hybrid cryptography with user anonymity. The improved scheme used blowfish – the most efficient private key algorithm, Elgamal – very secure public key algorithm and SHA-2 hash function combined together to enable high performance and security. The methods are thoroughly discussed and its security evaluated to show that it provides password protection, user privacy, perfect forward secrecy, mutual authentication and security against impersonation attack.

Бесплатно

Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute

Web Based Student Registration and Exam Form Fill-up Management System for Educational Institute

Md. Tofail Ahmed, Md. Humaun Kabir, Sujit Roy

Статья научная

Registration of new students’ academic information is essential for every educational institute to continue their education at every semester level and go through their whole student life. And this registration information is used when they do their form fill up of consecutive semesters. Nowadays, almost all educational institutes are using paper based registration and form fill up systems which is prone to many human errors and very time consuming for both students, teachers as well as other related administrative bodies. In this paper, we developed a web based application for academic purposes to control and save student registration and form fill up data that will be helpful for students, teachers and admin authority to make the process easier, less time consuming and error free. There are four main types of users who can use this system: student, department authority, students’ hall authority and administrator. The student can submit their registration and form fill up information by using a web form. Moreover, he/she can download their admit card and registration form after the approval of the concerned authority. The students also can be able to do other module activities. The hall and department authority can use the system to approve the students' registration, semester examination form and to provide the students' attendance data. In addition, the department and hall authority has a choice to see all students’ academic information. Moreover, the system administrator controls the system by managing (add, delete, update) student, hall and department authority, exam or registration date, subjects of a particular semester, notice board of the institute, module and programme data. The administrator can also add and remove the running and passed student data. The students also can pay their semester fees by using an online banking system.

Бесплатно

Web Performance Analysis: An Empirical Analysis of E-Commerce Sites in Bangladesh

Web Performance Analysis: An Empirical Analysis of E-Commerce Sites in Bangladesh

Md. Tutul Hossain, Rakib Hassan, Mahfida Amjad, Md. Abdur Rahman

Статья научная

Performance testing of e-commerce site is important for upcoming improvement and making better user experience which is performed by several web performance testing tools available on online platform. There are several tools user can use to scan their site for performance testing. This paper presents a web based application to collect and compare performance parameters with results automatically by applying WebpageTest, PageSpeed Insights and GTmetrix tools. For doing the test comparison nine parameters are considered and these are Load Time, First Byte, Start Render, First Contentful Paint, Speed Index, Largest Contentful Paint, Cumulative Layout Shift, Total Blocking Time and Time to Interactive parameters. The framework is developed with PHP, MySQL, CSS and HTML, where user will provide intended site’s url to test performance. This paper presents the performance of ten e-commerce sites of Bangladesh. Among the three tools WebpageTest and Gtmetrix can collect the reports of all the parameters. 1.62 (site7), 3.25 (site4) and 1.89 (site7) seconds are reported as lowest value for tools WebPageTest, PageSpeed Insight and Gtmetrix respectively. The average results of three tools is measured where, the minimum value is shown as 0.03 seconds for ‘total blocking time’ by site7. And maximum value is shown as 17.78 seconds for ‘load time’ parameter recorded by site10.

Бесплатно

Web Portal Analysis of Asian Region Countries

Web Portal Analysis of Asian Region Countries

Subhash Chander, Ashwani Kush

Статья научная

The number of online services provided by Government and private sectors is increasing these days. On the same pattern various countries have their own portals to provide basic services to the citizens and other people of the world. Analysis of portals in Asia is the main theme of the paper. There are various indicators or attributes necessary for the implementation of e-services .Some of the indicators may be frequency of use of services, number of users, visitors, site hits, searchable option, accessibility, language option, performance, functionality, broken links, traffic analysis, and feedback. Out of these metrics taken into consideration here are Traffic analysis, feedback, accessibility, security and language option. The countries taken into consideration are India, China and Pakistan. Web portals of these countries will be analyzed in detail.

Бесплатно

Web Search Customization Approach Using Redundant Web Usage Data Association and Clustering

Web Search Customization Approach Using Redundant Web Usage Data Association and Clustering

N. Krishnaiah, G. Narsimha

Статья научная

The massive growth of web consists of huge number of redundant information in related to some context. Due to which the need of information through a search provide high number of duplicate results which makes user to navigate number of sites to find the needed information. Users often miss their search pages when they browse the large and complex navigation of the web. Web customization is based on the use of the web logs can take advantage of the knowledge necessary to study the content and the structure of the internet to support. Searching information can be improvised in support of the implicit information generated by the web server in form logs for various web documents visited by users. This paper proposes a web search customization approach (WSCA) using redundant web usage data association and hierarchal clustering. Association generates a multilevel association for redundant data in the web navigation sites and clustering generates a cluster of frequent access patterns. The approach will improvise the real-time customization and also cost requirement for generating customized resources. The experiment evaluation shows an improvisation in precision rate in relevant to different queries against existing clustering approach.

Бесплатно

Web Video Object Mining: Expectation Maximization and Density Based Clustering of Web Video Metadata Objects

Web Video Object Mining: Expectation Maximization and Density Based Clustering of Web Video Metadata Objects

Siddu P. Algur, Prashant Bhat

Статья научная

Nowadays YouTube becoming most popular video sharing website, and is established in 2005. The YouTube official website is providing different categories videos including Science and Technology, Films and Animation, News and politics, Movies, Comedy, Sports, Music etc. Each video hosted in website such as YouTube have its own identity and features. The identity and features of each video can be described by web video metadata objects such as- URL of each video, category, length of the video, rating information, view counts, comment information, key words etc. Using extracted web video metadata objects, we present an in-depth and systematic clustering study on the metadata objects of YouTube videos using Expectation Maximization (EM) and Density Based (DB) clustering approach. Distinct web video metadata object clusters are formed based on different category of web videos. The resultant clusters are analyzed in depth as a step in the KDD process.

Бесплатно

Журнал