Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 584

A Novel Model for Cloud Based Mobile Learning System

A Novel Model for Cloud Based Mobile Learning System

Areej Omar Baalghusun, M. Rizwan Jameel Qureshi

Статья научная

Mobile learning (M-learning) becomes revolutionary way to educate the world with the mass advancement in information and communications technology (ICT). It is difficult to deal with m-learning due to increasing number of users, services, education contents and resources and modes to deploy. Cloud computing, with its dynamic scalability and virtualized resources usage, is widely deployed for several applications in many organizations. It has a significant impact in the educational and learning environment. This paper presents a new model for mobile learning system in cloud computing environment that is enriched with high performance computing (HPC) and graphical processing unit (GPU) cluster infrastructure. This model aggregates the power with new technologies to implement M-leaning process more effective with high performance and quick response.

Бесплатно

A Novel Probability based Approach for Optimized Prefetching

A Novel Probability based Approach for Optimized Prefetching

Arvind Panwar, Achin Jain, Manish Kumar

Статья научная

As the World Wide Web carries on to grow up rapidly in size and popularity, web traffic and network bottlenecks are more important issues in the networked world. The continued enhancement in demand for items on the World Wide Web causes severe overloading in many sites, network congestion, delay in perceived latency and network bottleneck. Many users have no patience in waiting more than a few seconds for downloading a web page, that's why Web traffic reduction system is very necessary in today World Wide Web for accessing the websites efficiently with the facility of existing networks. Web caching is an effective method to improve the performance of the World Wide Web but in today's World Wide Web caching method alone is not enough because of World Wide Web has grown quickly from a simple information-sharing mechanism to a rich collection of dynamic objects and multimedia data. The web prefetching is used to improve the performance of the proxy server. Prefetching predict web object that is expected to be requested in the near future and store them in advance, thus the response time of the user request is reduced. To improve the performance of the proxy server, this paper proposed a new framework which combines the caching system and prefetching technique and also optimize the prefetching with the help of probability. In this paper, we use the dataset for the experiment which is collected from ircache.net proxy server and give the result with the comparison of other technique of prefetching.

Бесплатно

A Parallel-SQLIA Detector for Web Security

A Parallel-SQLIA Detector for Web Security

Pankaj Kumar, C.P. Katti

Статья научная

An SQL injection attack compromises the interactive web based applications, running database in the backend. The applications provide a form to accept user input and convert it into the SQL statement and fire the same to the database. The attackers change the structure of SQL statement by manipulating user inputs. The existing static and dynamic SQLIA detectors are being used for accurate detection of SQL injection, but it ignores the efficiency of the system. These detectors repeatedly verify the same queries inside the system, which causes unnecessary wastages of system resources. This paper contains the design approach of a parallel algorithm for the detection of SQL injection. The Algorithm uses the concept of Hot Query Bank (HQB) to cooperate with the existing SQLIA detectors (e.g. AMNESIA, SQLGuard, etc) and enhances the system performance. It simply keeps the information of previously verified queries in order to skip the verification process on the next appearance. The system performance has been observed by conducting a series of experiments on multi core processors. The experimental results have shown that parallel-SQLIA detector is 65% more efficient in term of time complexity. Further this design can be implemented in real web application environment; and the design interface can be standardized to cooperate with web application and the SQLIA detectors.

Бесплатно

A Proposal for High Availability of HDFS Architecture based on Threshold Limit and Saturation Limit of the Namenode

A Proposal for High Availability of HDFS Architecture based on Threshold Limit and Saturation Limit of the Namenode

Sabyasachi Chakraborty, Kashyap Barua, Manjusha Pandey, Siddharth Rautaray

Статья научная

Big Data which is one of the newest technologies in the present field of science and technology has created an enormous drift of technology to a salient data architecture. The next thing that comes right after big data is Hadoop which has motivated the complete Big Data Environment to its jurisdiction and has reinforced the complete storage and analysis of big data. This paper discusses a hierarchical architecture of Hadoop Nodes namely Namenodes and Datanodes for maintaining a High Availability Hadoop Distributed File System. The High Availability Hadoop Distributed File System architecture establishes itself onto the two fundamental model of Hadoop that is Master-Slave Architecture and elimination of single point node failure. The architecture will be of such utilization that there will be an optimum load on the data nodes and moreover there will be no loss of any data in comparison to the size of data.

Бесплатно

A Proposal of Expert System to Select Components for the Product Line Software Engineering

A Proposal of Expert System to Select Components for the Product Line Software Engineering

M. Rizwan Jameel Qureshi, Nora Farraj

Статья научная

Programming companies in last decades have started to depend more and more on software components in developing their systems in order to save development time and increase the productivity of the company. However, this led to dramatically increase in the number of components, and selecting the appropriate component becomes a tough task. In this paper the authors propose an expert system to help developers choosing the best component fit their requirements. A survey is done to evaluate the efficiency of this proposed solution.

Бесплатно

A Proposed Model for Vehicle Registration Using Blockchain

A Proposed Model for Vehicle Registration Using Blockchain

Md. Zawad Hossain Rifat, Md. Shakil, Rifat Md. Iftakhar Hasan, F. A. Zidan, Dip Nandi

Статья научная

Systems for registering vehicles are essential for keeping track of ownership changes. However, severe flaws in the current systems permit vehicles that have been stolen or illegally sold to be registered. Inefficient verification techniques, drawn-out administrative processes, and dishonest employees cause these problems. This paper introduces a transparent system to prevent denial, alteration, or unauthorized manipulation. The proposed method employs hybrid blockchain architecture, distinguishing between confidential and non-confidential data. Personal information is stored privately, while vehicle-related data is maintained as public information. The adoption of blockchain technology is driven by its robust security features, transparency, and traceability, as well as its immutability and ability to handle many users effectively.

Бесплатно

A Reengineering based Framework for Integration of e-Governance Portal of Various State

A Reengineering based Framework for Integration of e-Governance Portal of Various State

Ganesh Chandra, Sachin Sahu, Sanjay K. Dwivedi

Статья научная

One of the most important purposes of e-Governance is to increase the satisfaction level of citizens. A single window system often helps in great way to access various government services. However, many e-Governance portals lack in integration and interoperability. Often individual state/local governments use their own portal for providing various e- services to its citizens which at times require integration and coordination with similar portals of other states for the information sharing. Lack of this feature restricts the usages of services. The realization towards this came from our previous case studies of two such portals (namely SPST and Jansunwai) of the state of Uttar Pradesh to understand the issues therein. This paper presents a general framework and guidelines for e-Governance which may be considered for implementation to overcome the existing limitations identified during the period of this study and research. The roadmap shown can improve the services, scope and functionality of certain portals. Central to this skeleton is the interconnection and integration of similar e-services being offered by different government in the country.

Бесплатно

A Review Study of Function-as-a-Service for Small Scale Businesses in Pakistan

A Review Study of Function-as-a-Service for Small Scale Businesses in Pakistan

Muhammad Fahad, Syed Muhammad Taha Rizvi, Waqas Mahmood

Статья научная

In today’s digitally driven world, many small to medium Scale Enterprises (SMEs) find it difficult to manage or scale businesses due impediments in procuring and managing digital and software services. Many SMEs are unable to purchase the off-the-shelf software, as they are not tailor-made for their specific business use-cases and at times may not even fulfill the requirements. Creating custom software applications is an expensive undertaking and is difficult to maintain and scale. Further, the cost of deployment of these applications and ensuring availability either on premises or on cloud becomes a major hurdle. To overcome these hindrances, in this paper we propose the use of function-as-a-service technology in comparison to other options like micro-services and Service Oriented Architecture (SOA) and have highlighted the benefits in terms of ease of development and managing further we have put forth some economic benefits they have. FaaS can prove to be a major game changer service as it follows the model of pay-as-you-use and at idle time it can even scale to zero usage. This paper mainly discusses the option of using FaaS to help SMEs scale their application while cutting down on initial cost as well as economic impact in long run as compared to the other more traditional digital software service delivery models such as SaaS, ERP and custom application development.

Бесплатно

A Review of Applications of Linear Programming to Optimize Agricultural Solutions

A Review of Applications of Linear Programming to Optimize Agricultural Solutions

Alanoud Alotaibi, Farrukh Nadeem

Статья научная

Quantitative methods help farmers plan and make decisions. An apt example of these methods is the linear programming (LP) model. These methods acknowledge the importance of economizing on available resources among them being water supply, labor, and fertilizers. It is through this economizing that farmers maximize their profit. The significance of linear programming is to provide a solution to the existing real-world problems through the evaluation of existing resources and the provision of relevant solutions. This research studies various LP applications including feed mix, crop pattern and rotation plan, irrigation water, and product transformation; that have the main role to enhance various facets of the agriculture sector. The paper will be a review that will probe into the applications of the LP model and it will also highlight the various tools that are central to analyzing LP model results. The review will culminate in a discussion on the different approaches that help optimize agricultural solutions.

Бесплатно

A Review of Data Security Challenges and their Solutions in Cloud Computing

A Review of Data Security Challenges and their Solutions in Cloud Computing

Isma Zulifqar, Sadia Anayat, Imtiaz Khara

Статья научная

Cloud computing is the newest web based computing network that offers the users with convenient and flexible resources to access or function with different cloud applications. Cloud computing is the availability of the computer network services, mainly storing data and computational power, without explicit user active control. The data in cloud computing is stored and accessed on a distant server by using cloud service provider’ applications. Providing protection is a main issue because information is transferred to the remote server through a medium. It is important to tackle the security issues of cloud computing before implementing it in an organization. In this paper, we call attention to the data related security issues and solution to be addressed in the cloud computing network. To protect our data from malicious users we can implement encryption. We have discussed the advantages of cloud computing in our paper.

Бесплатно

A Review of Electronic Voting Systems: Strategy for a Novel

A Review of Electronic Voting Systems: Strategy for a Novel

Adewale Olumide S., Boyinbode Olutayo K., Salako E. Adekunle

Статья научная

The voting system in the world has been characterised with many fundamental challenges, thereby resulting to a corrupt contestant winning an election. Researchers have been emotionally, physically, socially and intellectually concerned about the election malpractices recorded at various levels of electing a representative. Questions on how corrupt stakeholders in elections could be prevented from fraudulent activities such as rigging and impersonation called for discussion and answers. Consequences of declaring a corrupt contestant as a winner are bad governance, insecurities and diversification of public funds for personal gains. There must be approaches to tackle the problems of voting systems. This paper focused on a comprehensive review of electronic voting systems by different scholars as a platform for identifying shortcomings or drawbacks towards the implementation of a highly secured electronic voting system. The methods used by different scholars were technically reviewed so as to identify areas that need improvement towards providing solutions to the identified problems. Furthermore, countries with history on the adoption of e-voting systems were reviewed. Based on the problems identified from various works, a novel for future work on developing a secured electronic voting system using fingerprint and visual semagram techniques was proposed.

Бесплатно

A Review on Ontology Development Methodologies for Developing Ontological Knowledge Representation Systems for various Domains

A Review on Ontology Development Methodologies for Developing Ontological Knowledge Representation Systems for various Domains

Enesi Femi Aminu, Ishaq Oyebisi Oyefolahan, Muhammad Bashir Abdullahi, Muhammadu Tajudeen Salaudeen

Статья научная

The success of machine represented web known as semantic web largely hinges on ontologies. Ontology is a data modeling technique for structured data repository premised on collection of concepts with their semantic relationships and constraints on domain. There are existing methodologies to aid ontology development process. However, there is no single correct ontology design methodology. Therefore, this paper aims to present a review on existing ontology development approaches for different domains with the goal of identifying individual methodology’s weakness and suggests for hybridization in order to strengthen ontology development in terms of its content and constructions correctness. The analysis and comparison of the review were carried out by considering these criteria but not limited to: activities of each method, the initial domain of the methodology, ontology created from scratch or reuse, frequently used ontology management tools based on literature, subject granularity, and usage across different platforms. This review based on the literature showed some approaches that exhibit the required principles of ontology engineering in tandem with software development principles. Nonetheless, the review still noted some gaps among the methodologies that when bridged or hybridized a better correctness of ontology development would be achieved in building intelligent system.

Бесплатно

A Review on Search and Discovery Mechanisms in Social Networks

A Review on Search and Discovery Mechanisms in Social Networks

Shabnam Hassanzadeh Sharif, Shabnam Mahmazi, Nima Jafari Navimipour, Behzad Farid Aghdam

Статья научная

Social search is a variant of information retrieval where a document or website is considered relevant if individuals from the searcher’s social network have interacted with it. To the best of our knowledge, there is no new detailed paper which covers discovery method in social network; therefore, in this paper we surveyed searching methods in social network which have been presented so far. We classified the existing methods in four main categories: people search, job search, keyword search and web service discovery. Also we conclude the paper with some implications for future research and practice.

Бесплатно

A Roadmap for Establishing Trust Management Strategy in E-Commerce Services Using Quality Based Assessment

A Roadmap for Establishing Trust Management Strategy in E-Commerce Services Using Quality Based Assessment

Rath Jairak, Prasong Praneetpolgrang, Nivet Chirawichitchai

Статья научная

Trust has been reported as a key role in e-business, especially for a monetary based system like e-commerce. Therefore, many previous studies have been conducted to investigate the antecedents and consequences of consumer trust. But there has been little work done on establishing sensible solutions for leveraging consumer trust. Furthermore, previous studies in managerial trust have not demonstrated trust management that can illustrate a method to link their solutions with the consumers' point of view. In this paper, we therefore propose a practical roadmap for establishing trust management strategy that is consistent with consumer perceptions. Within this roadmap, firstly, a component extraction is performed on survey data in order to identify the quality criteria that actually impact buying decision process. Based on these criteria, the sensible factors for establishing trust and satisfaction are discovered from the regression analysis. Then, the prediction equations for trust and satisfaction are generated. After that the results of prediction equations are applied with a fuzzy linguistic approach in order to convert these results in linguistic terms. Finally, trust management strategy is established. By using our proposed method, website managers can identify which are the quality criteria that are consistent with their customer perceptions and they can use these criteria as a basis for improving trust and satisfaction in their websites.

Бесплатно

A Robust Approach for R-Peak Detection

A Robust Approach for R-Peak Detection

Amana Yadav, Naresh Grover

Статья научная

Electrocardiogram (ECG) is very crucial and important tool to detect the cardiac problems. For ECG analysis, it is essential to measure ECG parameter accurately. It is very critical in all types of ECG application. The accurate R Peaks detection is starting step in extracting ECG features which is necessary for the other ECG performance stages. It is very essential to detect these R-peaks accurately and efficiently to detect heart diseases or anomalies which create primary source of death in the universe. Hence automatic R-peaks detection in a lengthy duration ECG signal is very meaningful to diagnose the cardiac disorders. Here a latest R-peak exposure algorithm depended on Shannon energy envelope estimator and logic to find peaks has been proposed which uses the simple threshold of Shannon energy.

Бесплатно

A Safety Data Model for data analysis and decision making

A Safety Data Model for data analysis and decision making

Ilyasu Anda, Isah Omeiza Rabiu, Enesi Femi Aminu

Статья научная

The systems related to safety are becoming more and more important and are dependent on complex data both in terms of volume and variety. This is especially of importance in applications demanding data analysis, intensive maintenance and focuses on the potential threats due to possible data errors, such as railway signaling, traffic management etc. Errors in analysis of data could result in loss of many lives and financial loss such as the cases of Annabella container ship- Baltic Sea accident (United Kingdom Merchant Shipping, Regulations 2005 – Regulation 5). Despite these potential errors in data leading to accidents or mishaps, this part of the system has been ignored; this study focuses on the integrity of data in safety critical applications. It did so by developing a method for building metadata through a data chain, mining this metadata and representing it in such a way that a consumer of the data can judge the integrity of the data and factor this into the decision-making aspect of their response. This research proposes a design, implementation and evaluation of a safety data model that helps to ensure integrity of data use for data analysis and decision making to prevent loss of lives and properties. Modern and sophisticated ETL software tools including Microsoft SQL Server 2012 Data Tools and Microsoft SQL Server Management Studio were explored. The data were extracted from Safety Related Condition Reports (SRCRs) dataset and used data mining techniques to transform and filter unsafe and hazardous data from the extracted data and stored the safe data into the Data Warehouses (DWs). The prototype was able to load data into designated DWs. The success of the developed model proved that the prototype was able to extract all datasets, transform and load data into the DWs and moved extracted files to archive folder within 7.406 seconds.

Бесплатно

A Smart IoT Device for Child’s Safety Real Time Monitoring System

A Smart IoT Device for Child’s Safety Real Time Monitoring System

Vinod Kumar B., Sangeetha J.

Статья научная

The IoT technology is used to monitor the child’s safety in the real time. The overall system is controlled by the Raspberry pi 3 module and it is connected to all the IoT devices. The child’s body temperature and pulse rate values are extracted through sensors. Whenever child experiences any abnormal feelings or unusual activities like fear, anxiety, etc. the temperature and pulse rate values reach above threshold and when child speaks with a specific keyword (i.e. “Help Me” or “Save Me”) then the voice recognition system gets activated. The child’s input voice will be converted into text format. When these text formats gets matched with the keywords then immediately pi camera captures the image of an attacker and sends an E-mail alert and at the same time even SMS alert is sent to the parents/guardians. The parents can also watch the live video streaming of the attacker in the YouTube channel from their remote location. This safety system also sends SMS alert message through Twilio in the local language (i.e. Kannada and Hindi) to the registered phone numbers (i.e. surrounding/neighbors of the victim), so that any local citizen can read and understand the message to save the child.

Бесплатно

A Stochastic Model for Document Processing Systems

A Stochastic Model for Document Processing Systems

Pierre Moukeli Mbindzoukou, Jocelyn Nembe

Статья научная

This work is focused on the stationary behavior of a document processing system. This problem can be handled using workflow models; knowing that the techniques used in workflow modeling heavily rely on constrained Petri nets. When using a document processing system, one wishes to know how the system behaves when a new document enters in order to give precise support to the manager's decision. This requires a good analysis of the system's performances. But according to many authors, stochastic models, specifically waiting lines should be used instead of Petri nets at a strategic level in order to lead such analysis. The need to study a new model comes from the fact that we wish to provide tools for a decision maker to lead accurate performance analysis in a document processing system. In this paper, amodel for document management systems in an organization is studied. The model has a static and a dynamic component. The static one is a graph which represents transitions between processing units. The dynamic component is composed of a Markov processes and a network of queues which model the set of waiting-lines at each processing unit. Key performance indicators are defined and studied point-wise and on the average. Formulas are given for some example models.

Бесплатно

A Study on Analysis of SMS Classification Using Document Frequency Thresold

A Study on Analysis of SMS Classification Using Document Frequency Thresold

R.Parimala, R. Nallaswamy

Статья научная

Recent years, feature selection is chief concern in text classification. A major characteristic in text classification is the high dimensionality of the feature space. Therefore, feature selection is strongly considered as one of the crucial part in text document categorization. Selecting the best features to represent documents can reduce the dimensionality of feature space hence increase the performance. Feature selection is performed here using Document Frequency Threshold. This paper focus on SVM based text message classification using document frequency threshold. The experiment is performed with NUS SMS text messages data set. An experimental result shows that the results of proposed method are more efficient.

Бесплатно

A Survey of Monitoring and Evaluation Systems for Government Projects in Tanzania: A Case of Health Projects

A Survey of Monitoring and Evaluation Systems for Government Projects in Tanzania: A Case of Health Projects

Mpawe N. Mleke, Mussa Ally Dida

Статья научная

Monitoring and Evaluation (M&E) system are used across the world by organizations or governments to track progress, measure and evaluate outcomes of projects. Organizations can improve their performance, effectiveness and achieving results in project success by strengthening their monitoring and evaluation systems. Moreover, various studies reveal the need for information and communication technology systems in monitoring and evaluation activities because most of the government organizations do not employ computerized monitoring and evaluation systems and those having these systems lack a systematic early informing mechanism of the projects' progress. Currently, the Ministry of Health in Tanzania monitors and evaluates its projects manually, due to this, they face the risks and challenges during the implementation of projects because of a lack of having timely adoption of remedial action. Monitoring and evaluation staffs spent a lot of time in manual work, manual compilation of data, due to data being in separate systems, delay in submission of data, data is lost between primary registries to monthly summaries, from monthly to quarterly summaries, system does not contain all details about projects/program as well as budget information, no early alert information about the status of the project, poor information sharing among stakeholder. In this study, we collect representative data from three monitoring and evaluation staff, four ICT staff and five project members by using interviews, focus group discussion and document review. The result showed that the electronic monitoring and evaluation system will solve a presented challenge. Development of a web-based monitoring and evaluation system for the ministry of health projects will provides timely, accurate information, that for tracking the implementation progress of projects improved monitoring and evaluation.

Бесплатно

Журнал