Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1165

Analysing Open Source Software in Terms of Its Characteristics and Establishing New Paradigms

Analysing Open Source Software in Terms of Its Characteristics and Establishing New Paradigms

Harmaninder J. S. Sidhu, Sawtantar S. Khurmi

Статья научная

The world that we see and in which we live is driven by open source platforms. Whether we talk about Linux and Apache or Drupal and Joomla (all are open source platforms), right from the beginning the open source technology has always been influencing. If we go online and try to find out open source link, we find that it is difficult to find a site/online application without an open source connection. This paper examines Free and Open Source Software (FOSS) in an empirical setup in terms of its major characteristics i.e. Deployability and Usability. These two characteristics of FOSS are ex-tremely important from point of view of its comparison with proprietary software. The different attributes of FOSS were identified in the literature and were made part of the present study to carry out empirical analysis of FOSS. Apart from this a number of attributes were also included in this empirical study those were agreed upon by the participants while carrying out pilot study. This paper throws light on the experience of different kinds of users associated with FOSS. The statistical analysis using fisher's exact test was used to conclude the dependability of important characteristics of FOSS on each other.

Бесплатно

Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value

Analysis and Ranking of Software Reliability Models Based on Weighted Criteria Value

Mohd. Anjum, Md. Asraful Haque, Nesar Ahmad

Статья научная

Many software reliability growth models (SRGMs) have been analyzed for measuring the growth of software reliability. Selection of optimal SRGMs for use in a particular case has been an area of interest for researchers in the field of software reliability. All existing methodologies use same weight for each comparison criterion. But in reality, it is the fact that all the parameters do not have the same priority in reliability measurement. Keeping this point in mind, in this paper, a computational methodology based on weighted criteria is presented to the problem of performance analysis of various non-homogenous Poisson process (NHPP) models. It is relatively simple and requires less calculation. A set of twelve comparison criteria has been formulated and each criterion has been assigned different weight to rank the software reliability growth models proposed during the past 30 years. Case study results show that the weighted criteria value method offers a very promising technique in software reliability growth models comparison.

Бесплатно

Analysis and new approaches to the solution of problems of operation of oil and gas complex as cyber-physical system

Analysis and new approaches to the solution of problems of operation of oil and gas complex as cyber-physical system

Tahmasib Kh. Fataliyev, Shakir A. Mehdiyev

Статья научная

The application of modern information technologies in the oil and gas sector is constantly developing, which facilitates the acceleration of exploration and detection of oil, the increase in oil production and reduction in risks relates to health, human safety, and the environment. The Internet of things in the oil and gas sector, like in all sectors of industry, has great prospects from an economic point of view. The article is devoted to the study of the current state and avenues of solving key problems of effective and reliable functioning of the oil and gas industry as a cyber-physical system using the Internet of things in the Azerbaijani oil company SOCAR. The main technological processes and existing opportunities for the application of information technologies in the oil and gas complex are analyzed. New approaches are proposed to solve the problems in the oil and gas complex as cyber-physical system based on the smart sensors, the Internet of things, wireless networks and cloud technologies. The implementation of the proposed model is aimed at increasing the effectiveness, resource storage, exploration reliability and durability of the oil and gas complex.

Бесплатно

Analysis of MC-CDMA System in Mobile Communications

Analysis of MC-CDMA System in Mobile Communications

M. F. Ghanim, M. F. L. Abdullah

Статья научная

Wireless communication plays an important role in our daily life. One of the most important techniques which is Candidate for the fourth generation is Multicarrier Code Division Multiple Access (MC-CDMA) due to its high data rate. This research paper presents the MC-CDMA system using different modulation techniques. The variety of modulation types are depended in order to show the effects of modulation index and type on broadcasting data. The bit error rate of the system is plotted for a range of signal to noise ratio so that the effect of modulation on the MC-CDMA system will be evident. Actually, the simulation results show that QAM gives less bit error rate that makes MC-CDMA more flexible and suitable for mobile communication next generation technology. Also, the peak-to-average power (PAPR) of MC-CDMA is analyzed to show that high PAPR is the main disadvantage of MC-CDMA system then the possible solutions for this problem are discussed in this research paper.

Бесплатно

Analysis of Metric-Based Object-Oriented Code Refactoring Opportunities Identification Approaches

Analysis of Metric-Based Object-Oriented Code Refactoring Opportunities Identification Approaches

Bassey Isong, Nosipho Dladlu, Etim Duke, Bassey Ele

Статья научная

Refactoring is used to improve deteriorated software design, code and their maintainability. In object-oriented (OO) code, before refactoring is performed, its opportunities must be identified and several approaches exist this regard. Among the approaches is the software metric-based approach where quality software metrics are used. Therefore, this paper provide analysis of existing empirical studies that utilized software metrics to identify refactoring opportunities in OO software systems. We performed a comprehensive analysis on 16 studies to identify the state-of-the-practice. The focal point was on the workings, refactoring activities, the programming language and the impact on software quality. The results obtained shows approaches were not unique, each was designed either for a single refactoring activity or couple of them, move method and extract class dominated the refactorings activities, and most approaches were fully automated while few were semi-automated. Moreover, OO metrics played acritical role in both opportunities detection and factoring decisions. Based on the results, it would be beneficial if generic refactoring approach is developed that is capable of identifying needs for all refactoring activities.

Бесплатно

Analysis of Parametric & Non Parametric Classifiers for Classification Technique using WEKA

Analysis of Parametric & Non Parametric Classifiers for Classification Technique using WEKA

Yugal kumar, G. Sahoo

Статья научная

In the field of Machine learning & Data Mining, lot of work had been done to construct new classification techniques/ classifiers and lot of research is going on to construct further new classifiers with the help of nature inspired technique such as Genetic Algorithm, Ant Colony Optimization, Bee Colony Optimization, Neural Network, Particle Swarm Optimization etc. Many researchers provided comparative study/ analysis of classification techniques. But this paper deals with another form of analysis of classification techniques i.e. parametric and non parametric classifiers analysis. This paper identifies parametric & non parametric classifiers that are used in classification process and provides tree representation of these classifiers. For the analysis purpose, four classifiers are used in which two of them are parametric and rest of are non-parametric in nature.

Бесплатно

Analysis of Power Consumption Efficiency on Various IoT and Cloud-Based Wireless Health Monitoring Systems: A Survey

Analysis of Power Consumption Efficiency on Various IoT and Cloud-Based Wireless Health Monitoring Systems: A Survey

Beny Nugraha, Irawan Ekasurya, Gunawan Osman, Mudrik Alaydrus

Статья научная

Nowadays, various Wireless Health Monitoring Systems use Internet of Things to transmit patient's data over Wireless Sensor Network and then the data is stored and processed via Cloud Computing, however, the use of different kind of Wireless Sensor on each system leads to power efficiency problem. This paper analyses and compares the consumption of power on six Wireless Health Monitoring Systems, which are invented to monitor the patient's condition and transfer the data using Wireless Sensor Network. Three different techniques are analyzed, namely GPRS/UMTS (used in one WHMS), Wi-Fi (used in one WHMS), and Bluetooth (used in four WHMS). This paper concludes that the systems that use Bluetooth as their transmission medium are more effective in reducing power consumption than the other systems that use GPRS/UMTS or Wi-Fi.

Бесплатно

Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies

Analysis of Requirement Engineering Processes, Tools/Techniques and Methodologies

Tousif ur Rehman, Muhammad Naeem Ahmed Khan, Naveed Riaz

Статья научная

Requirement engineering is an integral part of the software development lifecycle since the basis for developing successful software depends on comprehending its requirements in the first place. Requirement engineering involves a number of processes for gathering requirements in accordance with the needs and demands of users and stakeholders of the software product. In this paper, we have reviewed the prominent processes, tools and technologies used in the requirement gathering phase. The study is useful to perceive the current state of the affairs pertaining to the requirement engineering research and to understand the strengths and limitations of the existing requirement engineering techniques. The study also summarizes the best practices and how to use a blend of the requirement engineering techniques as an effective methodology to successfully conduct the requirement engineering task. The study also highlights the importance of security requirements as though they are part of the non-functional requirement, yet are naturally considered fundamental to secure software development.

Бесплатно

Analysis of Tandem Repeat Patterns in Nlrc4 using a Motif Model

Analysis of Tandem Repeat Patterns in Nlrc4 using a Motif Model

Sim-Hui Tee

Статья научная

Exponential accumulation of biological data requires computer scientists and bioinformaticians to improve the efficiency of computer algorithms and databases. The recent advancement of computational tools has boosted the processing capacity of enormous volume of genetic data. This research applied a computational approach to analyze the tandem repeat patterns in Nlrc4 gene. Because the protein product of Nlrc4 gene is important in detecting pathogen and triggering subsequent immune responses, the results of this genetic analysis is essential for the understanding of the genetic characteristics of Nlrc4. The study on the distribution of tandem repeats may provide insights for drug design catered for the Nlrc4-implicated diseases.

Бесплатно

Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure

Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure

Shakir A. Mehdiyev, Mammad A. Hashimov

Статья научная

This article explores the multifaceted challenges inherent in ensuring the cybersecurity of critical infrastructures, i.e., a linchpin of modern society and the economy, spanning pivotal sectors such as energy, transportation, and finance. In the era of accelerating digitalization and escalating dependence on information technology, safeguarding these infrastructures against evolving cyber threats becomes not just crucial but imperative. The examination unfolds by dissecting the vulnerabilities that plague critical infrastructures, probing into the diverse spectrum of threats they confront in the contemporary cybersecurity landscape. Moreover, the article meticulously outlines innovative security strategies designed to fortify these vital systems against malicious intrusions. A distinctive aspect of this work is the nuanced case study presented within the oil and gas sector, strategically chosen to illustrate the vulnerability of critical infrastructures to cyber threats. By examining this sector in detail, the article aims to shed light on industry-specific challenges and potential solutions, thereby enhancing our understanding of cybersecurity dynamics within critical infrastructures. This article contributes a comprehensive analysis of the challenges faced by critical infrastructures in the face of cyber threats, offering contemporary security strategies and leveraging a focused case study to deepen insights into the nuanced vulnerabilities within the oil and gas sector.

Бесплатно

Analyzing Cost Parameters Affecting Map Reduce Application Performance

Analyzing Cost Parameters Affecting Map Reduce Application Performance

N.K. Seera, S. Taruna

Статья научная

Recently, big data analysis has become an imperative task for many big companies. Map-Reduce, an emerging distributed computing paradigm, is known as a promising architecture for big data analytics on commodity hardware. Map-Reduce, and its open source implementation Hadoop, have been extensively accepted by several companies due to their salient features such as scalability, elasticity, fault-tolerance and flexibility to handle big data. However, these benefits entail a considerable performance sacrifice. The performance of a Map-Reduce application depends on various factors including the size of the input data set, cluster resource settings etc. A clear understanding of the factors that affect Map-Reduce application performance and the cost associated with those factors is required. In this paper, we study different performance parameters and an existing Cost Optimizer that computes the cost of Map-Reduce job execution. The cost based optimizer also considers various configuration parameters available in Hadoop that affect performance of these programs. This paper is an attempt to analyze the Map-Reduce application performance and identifying the key factors affecting the cost and performance of executing Map-Reduce applications.

Бесплатно

Analyzing the Impact of Prosodic Feature (Pitch) on Learning Classifiers for Speech Emotion Corpus

Analyzing the Impact of Prosodic Feature (Pitch) on Learning Classifiers for Speech Emotion Corpus

Syed Abbas Ali, Anas Khan, Nazia Bashir

Статья научная

Emotion plays a significant role in human perception and decision making whereas, prosodic features plays a crucial role in recognizing the emotion from speech utterance. This paper introduces the speech emotion corpus recorded in the provincial languages of Pakistan: Urdu, Balochi, Pashto Sindhi and Punjabi having four different emotions (Anger, Happiness, Neutral and Sad). The objective of this paper is to analyze the impact of prosodic feature (pitch) on learning classifiers (adaboostM1, classification via regression, decision stump, J48) in comparison with other prosodic features (intensity and formant) in term of classification accuracy using speech emotion corpus recorded in the provincial languages of Pakistan. Experimental framework evaluated four different classifiers with the possible combinations of prosodic features with and without pitch. An experimental study shows that the prosodic feature (pitch) plays a vital role in providing the significant classification accuracy as compared to prosodic features excluding pitch. The classification accuracy for formant and intensity either individually or with any combination excluding pitch are found to be approximately 20%. Whereas, pitch gives classification accuracy of around 40%.

Бесплатно

Anti-Swing and Position Control of Double Inverted Pendulum (DIP) on Cart Using Hybrid Neuro-Fuzzy Controllers

Anti-Swing and Position Control of Double Inverted Pendulum (DIP) on Cart Using Hybrid Neuro-Fuzzy Controllers

Ashwani Kharola

Статья научная

This paper illustrates a comparison study for control of highly non-linear Double Inverted Pendulum (DIP) on cart. A Matlab-Simulink model of DIP has been built using Newton's second law. The Neuro-fuzzy controllers stabilizes pendulums at vertical position while cart moves in horizontal direction. This study proposes two soft-computing techniques namely Fuzzy logic reasoning and Neural networks (NN's) for control of DIP systems. The results shows that Fuzzy controllers provides better results as compared to NN's controllers in terms of settling time (sec), maximum overshoot (degree) and steady state error. The regression (R) and mean square error (MSE) values obtained after training of Neural network were satisfactory. The simulation results proves the validity of proposed techniques.

Бесплатно

Application of Cloud Theory in Association Rules

Application of Cloud Theory in Association Rules

Zhaohong Wang

Статья научная

The data mining is to discover knowledge from the database, quantitative association rules mining method is difficult for their values are too large. The usual means is dividing quantitative Data to discrete conception. The Cloud model combines fuzziness and randomness organically, so it fits the real world objectively, a new method to mine association rules from quantitative data based on the cloud model was proposed, which first take the original data distribution in the database into account, and then use the trapezoidal cloud model to complicate concepts division, and transforms qualitative data to the quantitative concept, in the conversion take account of the basic characteristics of human behavior fully, divides quantitative Data with trapezium Cloud model to create discreet concepts, the concept cluster within one class, and separated with each other. So the quantitative Data can be transforms to Boolean data well, the Boolean data can be mined by the mature Boolean association rules mining method to find useful knowledge.

Бесплатно

Application of Materialized View in Incremental Data Mining Operation

Application of Materialized View in Incremental Data Mining Operation

Debabrata Datta, Kashi Nath Dey

Статья научная

Materialized view is a database object used to store the results of a query set. It is used to avoid the costly processing time that is required to execute complex queries involving aggregation and join operations. Materialized view may be associated with the operations of a data warehouse. Data mining is a technique to extract knowledge from a data warehouse and the incremental data mining is another process that periodically updates the knowledge that has been already identified by a data mining process. This happens when a new set of data gets added with the existing set. This paper proposes a method to apply the materialized view in incremental data mining.

Бесплатно

Application of an enhanced self-adapting differential evolution algorithm to workload prediction in cloud computing

Application of an enhanced self-adapting differential evolution algorithm to workload prediction in cloud computing

M. A. Attia, M. Arafa, E. A. Sallam, M. M. Fahmy

Статья научная

The demand for workload prediction approaches has recently increased to manage the cloud resources, improve the performance of the cloud services and reduce the power consumption. The prediction accuracy of these approaches affects the cloud performance. In this application paper, we apply an enhanced variant of the differential evolution (DE) algorithm named MSaDE as a learning algorithm to the artificial neural network (ANN) model of the cloud workload prediction. The ANN prediction model based on MSaDE algorithm is evaluated over two benchmark datasets for the workload traces of NASA server and Saskatchewan server at different look-ahead times. To show the improvement in accuracy of training the ANN prediction model using MSaDE algorithm, training is performed with other two algorithms: the back propagation (BP) algorithm and the self-adaptive differential evolution (SaDE) algorithm. Comparisons are made in terms of the root mean squared error (RMSE) and the average root mean squared error (ARMSE) through all prediction intervals. The results show that the ANN prediction model based on the MSaDE algorithm predicts the cloud workloads with higher prediction accuracy than the other algorithms compared with.

Бесплатно

Application of cauchy (lipschitz) criterion for obtaining theoretical models of atmosphere striking overvoltages

Application of cauchy (lipschitz) criterion for obtaining theoretical models of atmosphere striking overvoltages

Slobodan N. Bjelić, Nenad A. Marković, Zorica S. Bogićević, Igor S. Bjelić

Статья научная

In investigation of consequences of atmosphere and commutating striking voltages, for simulation of the overvoltage are used the models of generators whose RC circuits have standard passive parameters of the elements upon which the form of striking overvoltage depends. According to IEC 62 305-1 standard, these formulas in the theoretical model serve for dimensioning the RC circuit of the generator of striking voltages although the definitions of time constants and passive parameters have only axiomatic character. Related to classical solution, this paper presents the model formed by mathematical procedure the solutions of which give sufficiently accurate values of time constants and essential parameters of RC circuit as well as the shape of striking voltage wave. The formulas for voltages and currents in model contain parameters of passive elements, and their accuracy has been confirmed by diagrams obtained in simulation by means of adapted psbtrnsrg.mdl part of MATLAB program. Theoretical model is suitable for simulation of standard wave forms of striking atmospheric and commutating overvoltages which replace laboratory testing.

Бесплатно

Applied an Efficient Site-directed Mutagenesis Method into Escherichia coli

Applied an Efficient Site-directed Mutagenesis Method into Escherichia coli

Muqing Qiu

Статья научная

A new technique for conducting site-directed mutagenesis was developed. This method allows the color selection of mutants through the simultaneous activation or deactivation of the α-peptide of ß-galactosidase. The method can efficiently create mutations at multiple sites simultaneously and can be used to perform multiple rounds of mutation on the same construct. In this paper, in order to develop an efficient site-directed mutagenesis method in vivo, the tests were tested by the following methods. The methods that the fragment knock-out ompR gene was constructed through overlapping PCR, digested by Notand SalⅠⅠ, ligated to plasmid pKOV were applied. The recombination plasmid was transformed into Escherichia coli WMC-001 strain, integrated into the genomic DNA through two step homologous recombination. The Escherichia coli WMC-001/ompR- mutant was obtained due to gene replacement. The fragment of the mutant ompR gene was amplified through overlapping PCR, cloned into pKOV vector. The recombinant plasmid was introduced into Escherichia coli WMC-001/ompR- mutant. The Escherichia coli WMC-001/ompR mutant was also obtained due to gene replacement. Results: The site-directed mutagenesis has been successfully constructed in the ompR gene by sequencing. Conclusion: The method is effective for construction of gene site-directed mutagenesis in vivo.

Бесплатно

Applying Clustering and Topic Modeling to Automatic Analysis of Citizens’ Comments in E-Government

Applying Clustering and Topic Modeling to Automatic Analysis of Citizens’ Comments in E-Government

Gunay Y. Iskandarli

Статья научная

The paper proposes an approach to analyze citizens' comments in e-government using topic modeling and clustering algorithms. The main purpose of the proposed approach is to determine what topics are the citizens' commentaries about written in the e-government environment and to improve the quality of e-services. One of the methods used to determine this is topic modeling methods. In the proposed approach, first citizens' comments are clustered and then the topics are extracted from each cluster. Thus, we can determine which topics are discussed by citizens. However, in the usage of clustering and topic modeling methods appear some problems. These problems include the size of the vectors and the collection of semantically related of documents in different clusters. Considering this, the semantic similarity of words is used in the approach to reduce measure. Therefore, we only save one of the words that are semantically similar to each other and throw the others away. So, the size of the vector is reduced. Then the documents are clustered and topics are extracted from each cluster. The proposed method can significantly reduce the size of a large set of documents, save time spent on the analysis of this data, and improve the quality of clustering and LDA algorithm.

Бесплатно

Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs

Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs

Jalaj Pateria, Laxmi Ahuja, Subhranil Som, Ashish Seth

Статья научная

Bluff and truth are major pillars of deception technology. Deception technology majorly relies on decoy-generated data and looks for any behavior deviation to flag that interaction as an attack or not. But at times a legitimate user can also do suspicious decoy interactions due to lack of knowledge and can be categorized under the “ATTACK” category which in a true sense should not be flagged that way. Hence, there is a need of doing collaborative analysis on honeypot, which are set up to monitor and log activities of sources that compromise or probe them. This goldmine provides ample information about the attacker intent and target, how it is moving forward in the kill chain as this information can be used to enhance threat intelligence and upgrade behaviors analysis rules. In this paper, decoys which are strategically placed in the network pointing to various databases, services, and Ips are used providing information of interactions made. This data is analyzed to understand underlying facts which can help in strengthening defense strategy, it also enhances confidence on the findings as analysis is not restricted to single decoy interaction which could be false positive or un-intentional in nature but analyzing holistically to conclude on the exact attack patten and progression. With experiment we have highlighted is reconciling various honeypots data and weighing IP visits and Honeypot interaction counts against scores and then using KNN and Weightage KNN to derive inclination of target IP against Source IP which can also be summarized as direction of Attack and count/frequency of interaction from highlights criticality of the interactions. Used KNN and W-KNN have shown approx. 94% accuracy which is best in class, also silhouette score highlighted high cohesion of data points in the experiment. Moreover, this was also analyzed that increasing the number of decoys in the analysis helps in getting better confidence on attack probability and direction.

Бесплатно

Журнал