International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Security and Challenges using Clouds Computing in Healthcare Management Systemijtsrd
This document summarizes a research paper on security and challenges of using cloud computing in healthcare management systems. It discusses how cloud computing can improve healthcare by allowing more efficient computing and centralized storage of electronic health records. However, it also notes that healthcare information is highly sensitive and privacy is a major concern. The key challenges of adopting cloud computing for healthcare mentioned are issues of reliability, security, privacy, data portability and integration. Proper security measures, policies and user training are needed to address these challenges and safely take advantage of cloud computing in healthcare.
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
2013, July 8
Part 1 of the tutorial illustrated at ICWE 2013, by Alessandro Bozzon (Delft University of Technology)
Crowdsourcing and human computation are novel disciplines that enable the design of computation processes that include humans as actors for task execution. In such a context, Games With a Purpose are an effective mean to channel, in a constructive manner, the human brainpower required to perform tasks that computers are unable to perform, through computer games. This tutorial introduces the core research questions in human computation, with a specific focus on the techniques required to manage structured and unstructured data. The second half of the tutorial delves into the field of game design for serious task, with an emphasis on games for human computation purposes. Our goal is to provide participants with a wide, yet complete overview of the research landscape; we aim at giving practitioners a solid understanding of the best practices in designing and running human computation tasks, while providing academics with solid references and, possibly, promising ideas for their future research activities.
IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. It has over 425,000 members across more than 160 countries. IEEE inspires a global community through publications, conferences, technology standards, and professional and educational activities. The chair of the IEEE Indonesia Section provided an overview of IEEE's global reach and impact.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Security and Challenges using Clouds Computing in Healthcare Management Systemijtsrd
This document summarizes a research paper on security and challenges of using cloud computing in healthcare management systems. It discusses how cloud computing can improve healthcare by allowing more efficient computing and centralized storage of electronic health records. However, it also notes that healthcare information is highly sensitive and privacy is a major concern. The key challenges of adopting cloud computing for healthcare mentioned are issues of reliability, security, privacy, data portability and integration. Proper security measures, policies and user training are needed to address these challenges and safely take advantage of cloud computing in healthcare.
CUbRIK tutorial at ICWE 2013: part 1 Introduction to Human ComputationCUbRIK Project
2013, July 8
Part 1 of the tutorial illustrated at ICWE 2013, by Alessandro Bozzon (Delft University of Technology)
Crowdsourcing and human computation are novel disciplines that enable the design of computation processes that include humans as actors for task execution. In such a context, Games With a Purpose are an effective mean to channel, in a constructive manner, the human brainpower required to perform tasks that computers are unable to perform, through computer games. This tutorial introduces the core research questions in human computation, with a specific focus on the techniques required to manage structured and unstructured data. The second half of the tutorial delves into the field of game design for serious task, with an emphasis on games for human computation purposes. Our goal is to provide participants with a wide, yet complete overview of the research landscape; we aim at giving practitioners a solid understanding of the best practices in designing and running human computation tasks, while providing academics with solid references and, possibly, promising ideas for their future research activities.
IEEE is the world's largest professional association dedicated to advancing technological innovation and excellence for the benefit of humanity. It has over 425,000 members across more than 160 countries. IEEE inspires a global community through publications, conferences, technology standards, and professional and educational activities. The chair of the IEEE Indonesia Section provided an overview of IEEE's global reach and impact.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
Trends in Network and Wireless Network Security in 2020IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEIAEME Publication
The main reason behind the spread of fake news is because of many fake and hyperpartisan sites present on the Internet. These fake sites try to manipulate the truth which creates misunderstanding in society. Therefore, it is important to detect fake news and try to make people aware of the truth. This paper gives an insight into how to detect fake news using Machine Learning and Deep Learning Techniques. On observing our data, we have categorized our data into five attributes namely Title, Text, Subject, Date, and Labels. In order to develop an efficient fake news detection system, the feature along with its degree of impact on the system must be taken into consideration. This paper attempts at providing a detailed analysis of detecting fake news using various models such as LSTM, ANN, Naïve Bayes, SVM, Logistic Regression, XGBoost, and Bert.
AI Lab at a Library? Why Artificial Intelligence Matters & What Libraries Can DoBohyun Kim
This document summarizes an AI lab presentation given at the American Libraries Association Annual Conference in June 2018. The presentation covered artificial intelligence topics including what AI is, how it is used today, and its applications in libraries. It also discussed the AI Lab at the University of Rhode Island, including its vision, funding, planning, and implementation. The presentation concluded with discussions of the challenges of AI including algorithmic biases and the importance of considering ethics for data science and AI.
This document summarizes the rise of mobile technologies and their impact on libraries. It begins with 3 key points:
1) Mobile devices are increasingly how people access the internet. By 2013, mobile phones will overtake PCs as the most common web access device.
2) Libraries recognize the need to provide services and content optimized for mobile to remain relevant to users who access information anywhere, anytime from various devices.
3) A growing number of academic and public libraries are implementing mobile friendly services like mobile websites, apps, and QR codes to enhance access to collections and resources.
Managing insider threats is a priority for organizations. Key aspects include establishing a strong security culture from the top-down through policies and regular reviews, identifying and monitoring high-risk employee behaviors, and implementing technical controls like access monitoring and honeypot approaches. Data-centric policies and identifying where sensitive data is located and who can access it are also important strategies for mitigating insider risks.
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
The document discusses data breaches and cybersecurity measures to prevent them. It begins by defining a data breach and describing major causes from cases at companies like Adobe, eBay, Facebook, and Myspace. It then discusses types of data breaches like ransomware, denial of service attacks, phishing, malware, insider threats, physical theft, and employee errors. Finally, it proposes cybersecurity measures organized into technical practices, organizational practices, and policies/standards to help prevent future breaches.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Cyber intelligence sharing and protect act researchLaVerne Kemp
The document discusses the Cyber Intelligence Sharing and Protection Act (CISPA), which aims to address the growing issue of cybersecurity by allowing companies to voluntarily share cyber threat information with each other and the government. It provides an overview of the critical need for improved cybersecurity given the millions of daily attacks on networks and businesses. CISPA would provide liability protection for companies that participate in the information sharing. Supporters argue it would enhance security while critics worry about potential privacy issues.
Top Reading Papers : Web & Semantic Technologydannyijwest
International Journal of Web & Semantic Technology (IJWesT) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of web & semantic technology. The growth of the World-Wide Web today is simply phenomenal. It continues to grow rapidly and new technologies, applications are being developed to support end users modern life. Semantic Technologies are designed to extend the capabilities of information on the Web and enterprise databases to be networked in meaningful ways. Semantic web is emerging as a core discipline in the field of Computer Science & Engineering from distributed computing, web engineering, databases, social networks, Multimedia, information systems, artificial intelligence, natural language processing, soft computing, and human-computer interaction. The adoption of standards like XML, Resource Description Framework and Web Ontology Language serve as foundation technologies to advancing the adoption of semantic technologies.
Cyber intelligence sharing and protection act researchLaVerne Kemp
This paper discusses the Cyber Intelligence Sharing and Protection Act (CISPA), which aims to address the growing issue of cybersecurity by allowing companies to voluntarily share cyber threat information with each other and the government. It provides an overview of the critical need for improved cybersecurity given the millions of daily attacks on networks and businesses. The document also examines how CISPA provides liability protection for companies that participate in the cyber threat information sharing.
The document discusses the history and evolution of intelligent information retrieval and web search engines. It covers early concepts from the 1970s of intelligent information retrieval that focused on using intelligent agents. However, this concept did not work well and missed the key aspects of intelligence in information retrieval systems. True intelligence in information retrieval requires appropriate allocation of responsibilities among all actors in the system and effective support of people in their interactions with information. The document also discusses the evolution of web search engines from early keyword-based systems to modern approaches that focus more on user experience, engagement, and quality over quantity.
Various cloud computing models are used to increase the profit of an organization. Cloud
provides a convenient environment and more advantages to business organizations to run their
business. But, it has some issues related to the privacy of data. User’s data are stored and
maintained out of user’s premises. The failure of data protection causes many issues like data
theft which affects the individual organization. The cloud users may be satisfied, if their data
are protected properly from unauthorized access. This paper presents a survey on different
privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
Cloud Computing is an excellent alternative for Higher Education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, we will compare the cost between on-premise options and Cloud Computing. Two cost estimates will be created, the firstfor building and setting up IT infrastructure in-house in Federal University of Technology (FUTO), Nigeria while the second cost estimate will be for setting up IT in the cloud for the same Institution.This will enable us know the cost benefit cloud has over onpremise in setting up IT in Higher Educations.
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...J On The Beach
Our increasingly connected world leveraging the Internet of Things (IoT) creates great value, in connected healthcare, smart cities, and more. The increasing use of IoT also creates great risk. We will discuss the challenges and risks we need to address as developers in TIPPSS - Trust, Identity, Privacy, Protection, Safety, and Security - for devices, systems and solutions we deliver and use. Florence leads IEEE workstreams on clinical IoT and data interoperability with blockchain addressing TIPPSS issues. She is an author of IEEE articles on "Enabling Trust and Security - TIPPSS for IoT" and "Wearables and Medical Interoperability - the Evolving Frontier", "TIPPSS for Smart Cities" in the 2017 book "Creating, Analysing and Sustaining Smarter Cities: A Systems Perspective" , and Editor in Chief for an upcoming book on "Women Securing the Future with TIPPSS for IoT."
This document provides an overview of the evolution of the World Wide Web. It discusses the transition from Web 1.0, which focused on making the web accessible, to Web 2.0, which emphasized user participation and social media. Web 3.0 aims to make the web more intelligent through machine learning, personalization, and allowing interconnected devices to exchange data automatically. It is characterized by intelligence, personalization, interoperability, and virtualization. Key aspects enabling Web 3.0 include semantic web technologies, ubiquitous computing, and the growing Internet of Things.
Advanced Software Engineering Program with IIT MadrasMamathaSharma4
The document provides information about an Advanced Certification program in Software Engineering for Cloud, Blockchain & IoT offered jointly by IIT Madras and Great Learning. The 9-month online program aims to equip professionals with in-demand skills in cutting-edge technologies. It will cover topics like software design, databases, IoT, cloud computing, containers, blockchain development and more. The rigorous curriculum is designed by IIT Madras and includes projects, assignments and mentorship. Great Learning will also offer career assistance services to help candidates secure jobs with their 400+ hiring partners.
The document discusses developing an integrated framework to utilize big data for higher education institutions in Saudi Arabia. It aims to develop a framework to support decision making and improve performance in education sectors using big data. The study collected data through surveys and interviews to analyze factors affecting adoption and implementation of big data. The framework addresses issues related to adoption of big data in education.
This document summarizes an article that discusses the integration of data warehouse and big data technologies. It outlines some of the key differences between data warehouses and big data, such as data warehouses being structured data focused while big data handles structured and unstructured data. However, it argues that both aim to support data exploration and decision making, so they should be integrated. It reviews existing integration proposals and highlights common elements between the technologies that could serve as a basis for full integration. Finally, it proposes an approach to integrating data warehouses and big data.
Trends in Network and Wireless Network Security in 2020IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Internet of Things: Surveys for Measuring Human Activities from Everywhere IJECEIAES
The internet of things (IoT), also called internet of all, is a new paradigm that combines several technologies such as computers, the internet, sensors network, radio frequency identification (RFID), communication technology and embedded systems to form a system that links the real worlds with digital worlds. With an increase in the deployment of smart objects, the internet of things should have a significant impact on human life in the near future. To understand the development of the IoT, this paper reviews the current research of the IoT, key technologies, the main applications of the IoT in various fields, and identifies research challenges. A main contribution of this review article is that it summarizes the current state of the IoT technology in several areas, and also the applications of IoT that cause side effects on our environment for monitoring and evaluation of the impact of human activity on the environment around us, and also provided an overview of some of the main challenges and application of IoT. This article presents not only the problems and challenges of IoT, but also solutions that help overcome some of the problems and challenges.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEIAEME Publication
The main reason behind the spread of fake news is because of many fake and hyperpartisan sites present on the Internet. These fake sites try to manipulate the truth which creates misunderstanding in society. Therefore, it is important to detect fake news and try to make people aware of the truth. This paper gives an insight into how to detect fake news using Machine Learning and Deep Learning Techniques. On observing our data, we have categorized our data into five attributes namely Title, Text, Subject, Date, and Labels. In order to develop an efficient fake news detection system, the feature along with its degree of impact on the system must be taken into consideration. This paper attempts at providing a detailed analysis of detecting fake news using various models such as LSTM, ANN, Naïve Bayes, SVM, Logistic Regression, XGBoost, and Bert.
AI Lab at a Library? Why Artificial Intelligence Matters & What Libraries Can DoBohyun Kim
This document summarizes an AI lab presentation given at the American Libraries Association Annual Conference in June 2018. The presentation covered artificial intelligence topics including what AI is, how it is used today, and its applications in libraries. It also discussed the AI Lab at the University of Rhode Island, including its vision, funding, planning, and implementation. The presentation concluded with discussions of the challenges of AI including algorithmic biases and the importance of considering ethics for data science and AI.
This document summarizes the rise of mobile technologies and their impact on libraries. It begins with 3 key points:
1) Mobile devices are increasingly how people access the internet. By 2013, mobile phones will overtake PCs as the most common web access device.
2) Libraries recognize the need to provide services and content optimized for mobile to remain relevant to users who access information anywhere, anytime from various devices.
3) A growing number of academic and public libraries are implementing mobile friendly services like mobile websites, apps, and QR codes to enhance access to collections and resources.
Managing insider threats is a priority for organizations. Key aspects include establishing a strong security culture from the top-down through policies and regular reviews, identifying and monitoring high-risk employee behaviors, and implementing technical controls like access monitoring and honeypot approaches. Data-centric policies and identifying where sensitive data is located and who can access it are also important strategies for mitigating insider risks.
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
The document discusses data breaches and cybersecurity measures to prevent them. It begins by defining a data breach and describing major causes from cases at companies like Adobe, eBay, Facebook, and Myspace. It then discusses types of data breaches like ransomware, denial of service attacks, phishing, malware, insider threats, physical theft, and employee errors. Finally, it proposes cybersecurity measures organized into technical practices, organizational practices, and policies/standards to help prevent future breaches.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Cyber intelligence sharing and protect act researchLaVerne Kemp
The document discusses the Cyber Intelligence Sharing and Protection Act (CISPA), which aims to address the growing issue of cybersecurity by allowing companies to voluntarily share cyber threat information with each other and the government. It provides an overview of the critical need for improved cybersecurity given the millions of daily attacks on networks and businesses. CISPA would provide liability protection for companies that participate in the information sharing. Supporters argue it would enhance security while critics worry about potential privacy issues.
Top Reading Papers : Web & Semantic Technologydannyijwest
International Journal of Web & Semantic Technology (IJWesT) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of web & semantic technology. The growth of the World-Wide Web today is simply phenomenal. It continues to grow rapidly and new technologies, applications are being developed to support end users modern life. Semantic Technologies are designed to extend the capabilities of information on the Web and enterprise databases to be networked in meaningful ways. Semantic web is emerging as a core discipline in the field of Computer Science & Engineering from distributed computing, web engineering, databases, social networks, Multimedia, information systems, artificial intelligence, natural language processing, soft computing, and human-computer interaction. The adoption of standards like XML, Resource Description Framework and Web Ontology Language serve as foundation technologies to advancing the adoption of semantic technologies.
Cyber intelligence sharing and protection act researchLaVerne Kemp
This paper discusses the Cyber Intelligence Sharing and Protection Act (CISPA), which aims to address the growing issue of cybersecurity by allowing companies to voluntarily share cyber threat information with each other and the government. It provides an overview of the critical need for improved cybersecurity given the millions of daily attacks on networks and businesses. The document also examines how CISPA provides liability protection for companies that participate in the cyber threat information sharing.
The document discusses the history and evolution of intelligent information retrieval and web search engines. It covers early concepts from the 1970s of intelligent information retrieval that focused on using intelligent agents. However, this concept did not work well and missed the key aspects of intelligence in information retrieval systems. True intelligence in information retrieval requires appropriate allocation of responsibilities among all actors in the system and effective support of people in their interactions with information. The document also discusses the evolution of web search engines from early keyword-based systems to modern approaches that focus more on user experience, engagement, and quality over quantity.
Various cloud computing models are used to increase the profit of an organization. Cloud
provides a convenient environment and more advantages to business organizations to run their
business. But, it has some issues related to the privacy of data. User’s data are stored and
maintained out of user’s premises. The failure of data protection causes many issues like data
theft which affects the individual organization. The cloud users may be satisfied, if their data
are protected properly from unauthorized access. This paper presents a survey on different
privacy issues involved in the cloud service. It also provides some suggestions to the cloud users to select their suitable cloud services by knowing their privacy policies.
IRJET - Development of Cloud System for IoT ApplicationsIRJET Journal
This document discusses the development of cloud systems for IoT applications. It begins with an introduction stating that one major problem IoT faces is storing and managing vast amounts of data generated. It then reviews 6 papers related to IoT cloud platforms, cloud storage systems, developments in cloud and IoT, exploring IoT platform development, minimizing energy consumption and SLA violations in cloud data centers, and IoT data classification. The document concludes that a detailed review of 6 IoT platform development approaches was presented and a framework was proposed to help select approaches based on requirements.
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
Cloud Computing is an excellent alternative for Higher Education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, we will compare the cost between on-premise options and Cloud Computing. Two cost estimates will be created, the firstfor building and setting up IT infrastructure in-house in Federal University of Technology (FUTO), Nigeria while the second cost estimate will be for setting up IT in the cloud for the same Institution.This will enable us know the cost benefit cloud has over onpremise in setting up IT in Higher Educations.
The TIPPSS Imperative for IoT - Ensuring Trust, Identity, Privacy, Protection...J On The Beach
Our increasingly connected world leveraging the Internet of Things (IoT) creates great value, in connected healthcare, smart cities, and more. The increasing use of IoT also creates great risk. We will discuss the challenges and risks we need to address as developers in TIPPSS - Trust, Identity, Privacy, Protection, Safety, and Security - for devices, systems and solutions we deliver and use. Florence leads IEEE workstreams on clinical IoT and data interoperability with blockchain addressing TIPPSS issues. She is an author of IEEE articles on "Enabling Trust and Security - TIPPSS for IoT" and "Wearables and Medical Interoperability - the Evolving Frontier", "TIPPSS for Smart Cities" in the 2017 book "Creating, Analysing and Sustaining Smarter Cities: A Systems Perspective" , and Editor in Chief for an upcoming book on "Women Securing the Future with TIPPSS for IoT."
This document provides an overview of the evolution of the World Wide Web. It discusses the transition from Web 1.0, which focused on making the web accessible, to Web 2.0, which emphasized user participation and social media. Web 3.0 aims to make the web more intelligent through machine learning, personalization, and allowing interconnected devices to exchange data automatically. It is characterized by intelligence, personalization, interoperability, and virtualization. Key aspects enabling Web 3.0 include semantic web technologies, ubiquitous computing, and the growing Internet of Things.
Advanced Software Engineering Program with IIT MadrasMamathaSharma4
The document provides information about an Advanced Certification program in Software Engineering for Cloud, Blockchain & IoT offered jointly by IIT Madras and Great Learning. The 9-month online program aims to equip professionals with in-demand skills in cutting-edge technologies. It will cover topics like software design, databases, IoT, cloud computing, containers, blockchain development and more. The rigorous curriculum is designed by IIT Madras and includes projects, assignments and mentorship. Great Learning will also offer career assistance services to help candidates secure jobs with their 400+ hiring partners.
The document discusses developing an integrated framework to utilize big data for higher education institutions in Saudi Arabia. It aims to develop a framework to support decision making and improve performance in education sectors using big data. The study collected data through surveys and interviews to analyze factors affecting adoption and implementation of big data. The framework addresses issues related to adoption of big data in education.
This document summarizes an article that discusses the integration of data warehouse and big data technologies. It outlines some of the key differences between data warehouses and big data, such as data warehouses being structured data focused while big data handles structured and unstructured data. However, it argues that both aim to support data exploration and decision making, so they should be integrated. It reviews existing integration proposals and highlights common elements between the technologies that could serve as a basis for full integration. Finally, it proposes an approach to integrating data warehouses and big data.
Top 10 Read articles in Web & semantic technologydannyijwest
This document discusses the future of cloud computing in government IT. It begins by defining cloud computing and examining its growing adoption across both private and public sectors globally. The document then outlines challenges for governments transitioning to cloud computing, including workforce and computing resource issues. The author presents a six-step strategy for government agencies to migrate to the cloud. Finally, it explores implications of the continued cloud computing revolution for public sector organizations and the IT community.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2022: Top 10 Read Articles in Web & Semantic Technologydannyijwest
The World Wide Web as the largest information construct has had much progress since its advent. This paper provides a background of the evolution of the web from web 1.0 to web 4.0. Web 1.0 as a web of information connections, Web 2.0 as a web of people connections, Web 3.0 as a web of knowledge connections and web 4.0 as a web of intelligence connections are described as four generations of the web in the paper.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost-effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented. This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most cited articles in academia - International journal of network security &...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Similar to July 2020: TOP Must Read Article in Computer Science & Information Technology Research (20)
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
- The document presents 6 different models for defining foot size in Tunisia: 2 statistical models, 2 neural network models using unsupervised learning, and 2 models combining neural networks and fuzzy logic.
- The statistical models (SM and SHM) are based on applying statistical equations to morphological foot data.
- The neural network models (MSK and MHSK) use self-organizing Kohonen maps to cluster foot data and model full and half sizes.
- The fuzzy neural network models (MSFK and MHSFK) incorporate fuzzy logic into the neural network learning process to better account for uncertainty in foot sizes.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
July 2020: TOP Must Read Article in Computer Science & Information Technology Research
1. July 2020: TOP Must Read Article
in Computer Science & Information
Technology Research
International Journal of Computer Science and
Information Technology (IJCSIT)
Google Scholar Citation
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
2. DETECTION OF FAKE ACCOUNTS IN INSTAGRAM
USING MACHINE LEARNING
Ananya Dey1
, Hamsashree Reddy2
, Manjistha Dey3
and Niharika Sinha4
1
National Institute of Technology, Tiruchirappalli, India
2
PES University, Bangalore, India
3
RV College of Engineering, Bangalore, India
4
Manipal Institute of Technology, Karnataka, India
ABSTRACT
With the advent of the Internet and social media, while hundreds of people have benefitted from the
vast sources of information available, there has been an enormous increase in the rise of cyber-crimes,
particularly targeted towards women. According to a 2019 report in the [4] Economics Times, India
has witnessed a 457% rise in cybercrime in the five year span between 2011 and 2016. Most speculate
that this is due to impact of social media such as Facebook, Instagram and Twitter on our daily lives.
While these definitely help in creating a sound social network, creation of user accounts in these sites
usually needs just an email-id. A real life person can create multiple fake IDs and hence impostors can
easily be made. Unlike the real world scenario where multiple rules and regulations are imposed to
identify oneself in a unique manner (for example while issuing one’s passport or driver’s license), in
the virtual world of social media, admission does not require any such checks. In this paper, we study
the different accounts of Instagram, in particular and try to assess an account as fake or real using
Machine Learning techniques namely Logistic Regression and Random Forest Algorithm.
KEYWORDS
Logistic Regression, Random Forest Algorithm, median imputation, Maximum likelihood estimation,
k cross validation, overfitting, out of bag data, recall, identity theft, Angler phishing.
For More Details: http://aircconline.com/ijcsit/V11N5/11519ijcsit07.pdf
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
3. REFERENCES
[1] Indira Sen,Anupama Aggarwal,Shiven Mian.2018."Worth its Weight in Likes: Towards
Detecting Fake Likes on Instagram". In ACM International Conference on Information and
Knowledge Management.
[2] Shalinda Adikari, Kaushik Dutta. 2014. “Identifying Fake Profiles In LinkedIn”. In Pacific Asia
Conference on Information Systems.
[3] Aleksei Romanov, Alexander Semenov, Oleksiy Mazhelis and Jari Veijalainen.2017. "Detection
of Fake Profiles in Social Media”. In 13th International Conference on Web Information Systems
and Technologies.
[4] https://telecom.economictimes.indiatimes.com/news/india-saw-457-rise-in-cybercrime-in-
fiveyears-study/67455224
[5] Todor Mihaylov, Preslav Nakov.2016. "Hunting for Troll Comments in News Community
Forums". In Association for Computational Linguistics.
[6] Ml-cheatsheet.readthedocs.io. (2019). Logistic Regression — ML Cheatsheet documentation.
[Online] Available at: https://ml
cheatsheet.readthedocs.io/en/latest/logistic_regression.html#binarylogistic-regression [Accessed
10 Jun. 2019].
[7] 3. Schoonjans, F. (2019). ROC curve analysis with MedCalc. [Online] MedCalc. Available at:
https://www.medcalc.org/manual/roc-curves.php [Accessed 10 Jun. 2019].
[8] Kietzmann, J.H., Hermkens, K., McCarthy, I.P., Silvestre,B.S., 2011. Social media? Get serious!
Understanding the functional building blocks of social media. Bus.Horiz., SPECIAL ISSUE:
SOCIAL MEDIA 54, 241251. doi:10.1016/j.bushor.2011.01.005.
[9] Krombholz, K., Hobel, H., Huber, M., Weippl, E., 2015.Advanced Social Engineering Attacks. J
Inf SecurAppl 22, 113–122. doi:10.1016/j.jisa.2014.09.005.
4. BIG DATA IN CLOUD COMPUTING REVIEW AND
OPPORTUNITIES
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert
Seidenberg School of CSIS, Pace University, White Plains, New York
ABSTRACT
Big Data is used in decision making process to gain useful insights hidden in the data for
business and engineering. At the same time it presents challenges in processing, cloud
computing has helped in advancement of big data by providing computational, networking
and storage capacity. This paper presents the review, opportunities and challenges of
transforming big data using cloud computing resources.
KEYWORDS
Big data; cloud computing; analytics; database; data warehouse
For More Details: http://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
5. REFERENCES
[1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October).
On the elasticity of nosql databases over cloud management platforms. In Proceedings of the
20th ACM international conference on Information and knowledge management (pp. 2385-
2388). ACM.
[2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big
data." Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033.
[3] Abadi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data
Eng. Bull, 32(1), 3-12.
[4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development,
2(4), 314-319
[5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and analytical methods."
Journal of Business Research 70 (2017): 263-286.
[6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
[7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models
(SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
[8] https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf
[9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management
Auerbach, ed.
[10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th
international symposium on pervasive systems, algorithms and networks. IEEE, 2012.
[11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive
Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366).
IEEE.
[12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE,
pp.405–409
[13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing
environment, MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery 4.5 (2014): 380-409.
[14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf
[15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges
[J]." Journal of computer research and development 1.98 (2013): 146-169.
[16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data
Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.
6. SECURITY THREATS ON CLOUD COMPUTING
VULNERABILITIES
Te-Shun Chou
Department of Technology Systems, East Carolina University, Greenville,
NC, U.S.A.
ABSTRACT
Clouds provide a powerful computing platform that enables individuals and organizations to
perform variety levels of tasks such as: use of online storage space, adoption of business
applications, development of customized computer software, and creation of a “realistic”
network environment. In previous years, the number of people using cloud services has
dramatically increased and lots of data has been stored in cloud computing environments. In the
meantime, data breaches to cloud services are also increasing every year due to hackers who are
always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper,
three cloud service models were compared; cloud security risks and threats were investigated
based on the nature of the cloud service models. Real world cloud attacks were included to
demonstrate the techniques that hackers used against cloud computing systems. In
addition,countermeasures to cloud security breaches are presented.
KEYWORDS
Cloud computing, cloud security threats and countermeasures, cloud service models
For More Details : https://aircconline.com/ijcsit/V11N6/11619ijcsit04.pdf
Volume Link : http://airccse.org/journal/ijcsit2019_curr.html
7. REFERENCES
1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
2. Sophos Security Threat Report 2012. http://www.sophos.com/
3. Amazon.com Server Said to Have Been Used in Sony Attack,
May 2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-
have-been- invaded-by-hackersusing-amazon-com-server.html
4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,”
International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp.
2672- 2676, April 2011.
5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE
International Conference on Cloud Computing Technology and Science,
Indianapolis, December 2010.
6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th
Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii,
January 2011.
7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat
Technical Security Conference, 2011.
8. CERT Coordination Center, Denial of
Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html
9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security
Issues in Cloud Computing,” IEEE International Conference in Cloud Computing,
pp. 109-116, Bangalore, 2009.
10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August
2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_
deni al_of_service_attack
11. DDoS Attack Rains Down on Amazon Cloud, October
2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/
12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon
University.
13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and
Recommendations for Information Security,” The European Network and
Information Security Agency (ENISA), November 2009.
8. 14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/
15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data-
breach-trendsstats/
16. 2012 Has Delivered Her First Giant Data Breach, January
2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First-
Giant-DataBreach.html
17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today,
2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h
tm l
18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June,
2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/
19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox-
yes-we-werehacked/
20. Web Based Attacks, Symantec White Paper, February 2009.
21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012.
22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to
Averting SQL Injection for University Cloud,” International Journal of Computer
Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012.
23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection
Attacks on Web Application,” International Journal of Computer Applications, Vol.
52, No. 2, pp. 19-26, August 2012.
24. Web Application Attack Report For The Second Quarter of
2012.http://www.firehost.com/company/newsroom/web-application-attack-report-
second-quarter-2012
25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July
2008.http://www.sophos.com/en-us/press-office/press-
releases/2008/07/playstation.aspx
26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing
Journal, November 2010.
9. 28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_is
sue_ amazon_aws_attack/
29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and
Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York,
NY, pp. 20–27, 2005.
30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security
Validation Revisited,” IEEE International Conference on Web Services, Los
Angeles, 2009.
31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,”
2011 IEEE International Conference on Signal Processing, Communications and
Computing, Xi'an, China, September 2011.
32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based
Security Vulnerability Assessment,” IEEE International Conference on E-Business
Engineering, pp.490-494, November 2010.
33. Amazon:Hey Spammers, Get Off My
Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer
s_get_off_my.html
34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud
Computing,” Computer Security Division, Information Technology Laboratory,
National Institute of Standards and Technology, Special Publication 800-144,
December 2011.
35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140
36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010.
37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider
Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy
Workshops, pp. 125-128, San Francisco, CA, 2012.
38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of
XML Schema Validation for Countering XML Signature Wrapping Attacks,” First
International Workshop on Securing Services on the Cloud, Milan, Italy, September
2011.
39. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping
Attacks and Countermeasures,” IEEE International Conference on Web Services, pp.
575–582, Miami, Florida, July 2009.
10. Data Mining Model Performance Of Sales
Predictive Algorithms Based On Rapidminer
Workflows
Alessandro Massaro, Vincenzo Maritati, Angelo Galiano
Dyrecta Lab, IT research Laboratory,via Vescovo Simplicio,
45, 70014 Conversano (BA), Italy
ABSTRACT
By applying RapidMiner workflows has been processed a dataset originated from different data
files, and containing information about the sales over three years of a large chain of retail stores.
Subsequently, has been constructed a Deep Learning model performing a predictive algorithm
suitable for sales forecasting. This model is based on artificial neural network –ANN- algorithm
able to learn the model starting from sales historical data and by pre-processing the data. The best
built model uses a multilayer eural network together with an “optimized operator” able to find
automatically the best parameter setting of the implemented algorithm. In order to prove the best
performing predictive model, other machine learning algorithms have been tested. The
performance comparison has been performed between Support Vector Machine –SVM-, k-
Nearest Neighbor k-NN-,Gradient Boosted Trees, Decision Trees, and Deep Learning algorithms.
The comparison of the degree of correlation between real and predicted values, the verage
absolute error and the relative average error proved that ANN exhibited the best performance.
The Gradient Boosted Trees approach represents an alternative approach having the second best
performance. The case of study has been developed within the framework of an industry project
oriented on the integration of high performance data mining models able to predict sales using–
ERP- and customer relationship management –CRM- tools.
KEYWORDS
RapidMiner, Neural Network, Deep Learning, Gradient Boosted Trees, Data Mining
Performance, Sales Prediction.
For More Details : http://aircconline.com/ijcsit/V10N3/10318ijcsit03.pdf
Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
11. REFERENCES
[1] Penpece D., & Elma O. E. (2014) “Predicting Sales Revenue by Using Artificial Neural
Network in Grocery Retailing Industry: A Case Study in Turkey”, International Journal of
Trade Economics and Finance, Vol. 5, No. 5, pp435-440.
[2] Thiesing F. M., & Vornberger, O. (1997) “Sales Forecasting Using Neural Networks”, IEEE
Proceedings ICNN’97, Houston, Texas, 9-12 June 1997, pp2125-2128.
[3] Zhang, G. P. (2003) “Time series forecasting using a hybrid ARIMA and neural network
model”, Neurocomputing, Vol. 50, pp159–175.
[4] Sharma, A., & Panigrahi, P. K. (2011) “Neural Network based Approach for Predicting
Customer Churn in Cellular Network Services”, International Journal of Computer
Applications, Vol. 27, No.11, pp0975–8887.
[5] Kamakura, W., Mela, C. F., Ansari A., & al. (2005) ” Choice Models and Customer
Relationship Management,” Marketing Letters, Vol. 16, No.3/4, pp279–291.
[6] Smith, K. A., & Gupta, J. N. D. (2000) “Neural Networks in Business: Techniques and
Applications for the Operations Researcher,” Computers & Operations Research, Vol. 27, No.
11–12, pp1023- 1044.
[7] Chattopadhyay, M., Dan, P. K., Majumdar, S., & Chakraborty, P. S. (2012) “Application of
Artificial Neural Network in Market Segmentation: A Review on Recent Trends,” Management
Science Letters, Vol. 2, pp425-438.
[8] Berry, J. A. M., & Linoff, G. S. (2004) “Data Mining Techniques For Marketing, Sales, and
Customer Relationship Management”, Wiley, Second Edition.
[9] Buttle, F. (2009) “Customer Relationship Management Concepts and Technologies”, Elsevier,
Second Edition.
[10] Thomassey, S. (2014) “Sales Forecasting in Apparel and Fashion Industry: A Review”,
Springer, chapter 2.
[11] Massaro, A. Barbuzzi, D., Vitti, V., Galiano, A., Aruci, M., Pirlo, G. (2016) “Predictive Sales
Analysis According to the Effect of Weather”, Proceeding of the 2nd International Conference
on Recent Trends and Applications in Computer Science and Information Technology, Tirana,
Albania, November 18 - 19, pp53-55.
[12] Parsons, A.G. (2001), “The Association between Daily Weather and Daily Shopping Patterns”,
Australasian Marketing Journal, Vol. 9, No. 2, pp78–84.
[13] Steele, A.T., (1951) “Weather’s Effect on the Sales of a Department Store”, Journal of
Marketing Vol. 15, No. 4, pp436–443.
[14] Murray, K. B., Di Muro, F., Finn, A., & Leszczyc, P. P. (2010) “The Effect of Weather on
Consumer Spending”, Journal of Retailing and Consumer Services, Vol. 17, No.6, pp512-520.
12. [15] Massaro, A., Galiano, A., Barbuzzi, D., Pellicani, L., Birardi, G., Romagno, D. D., & Frulli, L.,
(2017) “Joint Activities of Market Basket Analysis and Product Facing for Business
Intelligence oriented on Global Distribution Market: examples of data mining applications,”
International Journal of Computer Science and Information Technologies, Vol. 8, No.2 , pp178-
183.
[16] Aguinis, H., Forcum, L. E., & Joo, H. (2013) “Using Market Basket Analysis in Management
Research,” Journal of Management, Vol. 39, No. 7, pp1799-1824.
[17] Štulec, I, Petljak, K., & Kukor, A. (2016) “The Role of Store Layout and Visual Merchandising
in Food Retailing”, European Journal of Economics and Business Studies, Vol. 4, No. 1, pp139-
152.
[18] Otha, M. & Higuci, Y. (2013) “Study on Design of Supermarket Store Layouts: the Principle of
“Sales Magnet””, World Academy of Science, Engieering and Technology, Vol. 7, No. 1,
pp209-212.
[19] Shallu, & Gupta, S. (2013) “Impact of Promotional Activities on Consumer Buying Behavior:
A Study of Cosmetic Industry”, International Journal of Commerce, Business and Management
(IJCBM), Vol. 2, No.6, pp379-385.
[20] Al Essa, A. & Bach, C. (2014)“ Data Mining and Knowledge Management for Marketing”,
International Journal of Innovation and Scientific Research, Vol. 2, No. 2, pp321-328.
[21] Kotu, V., & Deshpande B. (2015) “Predictive Analytics and Data Mining- Concepts and
Practice with RapidMiner” Elsevier.
[22] Wimmer, H., Powell, L. M. (2015) “A Comparison of Open Source Tools for Data Science”,
Proceedings of the Conference on Information Systems Applied Research. Wilmington, North
Carolina USA.
[23] Al-Khoder, A., Harmouch, H., “Evaluating Four Of The most Popular Open Source and Free
Data Mining Tools”, International Journal of Academic Scientific Research, Vol. 3, No. 1,
pp13-23.
[24] Gulli, A., & Pal, S. (2017) “Deep Learning with Keras- Implement neural networks with Keras
on Theano and TensorFlow,” Birmingham -Mumbai Packt book, ISBN 978-1-78712-842-2.
[25] Kovalev, V., Kalinovsky, A., & Kovalev, S. (2016) “Deep Learning with Theano, Torch, Caffe,
TensorFlow, and deeplearning4j: which one is the best in speed and accuracy?” Proceeding of
XIII Int. Conf. on Pattern Recognition and Information Processing, 3-5 October, Minsk, Belarus
State University, pp99-103.
AUTHOR
Alessandro Massaro: Research & Development Chief of Dyrecta Lab s.r.l.
13. CONVOLUTIONAL NEURAL NETWORK BASED
FEATURE EXTRACTION FOR IRIS RECOGNITION
Maram.G Alaslani1
and Lamiaa A. Elrefaei1,2
1
Computer Science Department, Faculty of Computing and Information
Technology, King Abdulaziz University, Jeddah, Saudi Arabia
2
Electrical Engineering Department, Faculty of Engineering at Shoubra, Benha
University, Cairo, Egypt
ABSTRACT
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals
with a high degree of assurance. Extracting good features is the most significant step in the iris
recognition system. In the past, different features have been used to implement iris recognition
system. Most of them are depend on hand-crafted features designed by biometrics specialists.
Due to the success of deep learning in computer vision problems, the features learned by the
Convolutional Neural Network (CNN) have gained much attention to be applied for iris
recognition system. In this paper, we evaluate the extracted learned features from a pre-trained
Convolutional Neural Network (Alex-Net Model) followed by a multi-class Support Vector
Machine (SVM) algorithm to perform classification. The performance of the proposed system is
investigated when extracting features from the segmented iris image and from the normalized iris
image. The proposed iris recognition system is tested on four public datasets IITD, iris databases
CASIAIris-V1, CASIA-Iris-thousand and, CASIA-Iris- V3 Interval. The system achieved
excellent results with the very high accuracy rate.
KEYWORDS
Biometrics, Iris, Recognition, Deep learning, Convolutional Neural Network (CNN), Feature
extraction (FE).
For More Details : http://aircconline.com/ijcsit/V10N2/10218ijcsit06.pdf
Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
14. REFERENCES
[1] M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and
crossenterprise biometric identification," Expert Systems with Applications, vol. 42, pp.
7905-7916, 2015.
[2] D. Kesavaraja, D. Sasireka, and D. Jeyabharathi, "Cloud software as a service with iris
authentication," Journal of Global Research in Computer Science, vol. 1, pp. 16-22, 2010.
[3] N. Shah and P. Shrinath, "Iris Recognition System–A Review," International Journal of
Computer and Information Technology, vol. 3, 2014.
[4] A. B. Dehkordi and S. A. Abu-Bakar, "A review of iris recognition system," Jurnal
Teknologi, vol. 77, 2015.
[5] S. Minaee, A. Abdolrashidiy, and Y. Wang, "An experimental study of deep convolutional
features for iris recognition," in Signal Processing in Medicine and Biology Symposium
(SPMB), 2016 IEEE, 2016, pp. 1-6. International Journal of Computer Science &
Information Technology (IJCSIT) Vol 10, No 2, April 2018 77
[6] S. Minaee, A. Abdolrashidi, and Y. Wang, "Iris recognition using scattering transform and
textural features," in Signal Processing and Signal Processing Education Workshop
(SP/SPE), 2015 IEEE, 2015, pp. 37-42.
[7] S. Minaee, A. Abdolrashidi, and Y. Wang, "Face Recognition Using Scattering
Convolutional Network," arXiv preprint arXiv:1608.00059, 2016.
[8] IIT Delhi Database. Available:
http://www4.comp.polyu.edu.hk/~csajaykr/IITD/Database_Iris.htm. Accessed 14 April
2017.
[9] ( 2 April2017). CASIA Iris Image Database Version 1.0. Available:
http://www.idealtest.org/findDownloadDbByMode.do?mode=Iris. Accessed 12 April 2017.
[10] CASIA Iris Image Database Version 4.0 (CAS IA-Iris-Thousand). Available:
http://biometrics.idealtest.org/dbDetailForUser.do?id=4. Accessed 17 April 2017.
[11] CASIA Iris Image Database Version 3.0 (CASIA-Iris-Interval). Available:
http://biometrics.idealtest.org/dbDetailForUser.do?id=3. Accessed 17April2017.
[12] K. Nguyen, C. Fookes, A. Ross, and S. Sridharan, "Iris Recognition with Off-the-Shelf CNN
Features: A Deep Learning Perspective," IEEE Access, 2017.
[13] A. Romero, C. Gatta, and G. Camps-Valls, "Unsupervised deep feature extraction for remote
sensing image classification," IEEE Transactions on Geoscience and Remote Sensing, vol.
54, pp. 1349-1362, 2016.
15. [14] O. Oyedotun and A. Khashman, "Iris nevus diagnosis: convolutional neural network and
deep belief network," Turkish Journal of Electrical Engineering & Computer Sciences, vol.
25, pp. 1106-1115, 2017.
[15] A. S. Al-Waisy, R. Qahwaji, S. Ipson, S. Al-Fahdawi, and T. A. Nagem, "A multi-biometric
iris recognition system based on a deep learning approach," Pattern Analysis and
Applications, pp. 1-20, 2017.
[16] J. Nagi, F. Ducatelle, G. A. Di Caro, D. Cireşan, U. Meier, A. Giusti, F. Nagi, J.
Schmidhuber, and L. M. Gambardella, "Max-pooling convolutional neural networks for
vision-based hand gesture recognition," in Signal and Image Processing Applications
(ICSIPA), 2011 IEEE International Conference on, 2011, pp. 342-347.
[17] D. Scherer, A. Müller, and S. Behnke, "Evaluation of pooling operations in convolutional
architectures for object recognition," Artificial Neural Networks–ICANN 2010, pp. 92-101,
2010.
[18] J. van Doorn, "Analysis of deep convolutional neural network architectures," 2014.
[19] C. L. Lam and M. Eizenman, "Convolutional neural networks for eye detection in remote
gaze estimation systems," 2008.
[20] S. Ahmad Radzi, K.-H. Mohamad, S. S. Liew, and R. Bakhteri, "Convolutional neural
network for face recognition with pose and illumination variation," International Journal of
Engineering and Technology (IJET), vol. 6, pp. 44-57, 2014.
[21] K. Itqan, A. Syafeeza, F. Gong, N. Mustafa, Y. Wong, and M. Ibrahim, "User identification
system based on finger-vein patterns using Convolutional Neural Network," ARPN Journal
of Engineering and Applied Sciences, vol. 11, pp. 3316-3319, 2016.
[22] S. Sangwan and R. Rani, "A Review on: Iris Recognition," (IJCSIT) International Journal of
Computer Science and Information Technologies, vol. 6, pp. 3871-3873, 2015
[23] C. Jayachandra and H. V. Reddy, "Iris Recognition based on Pupil using Canny edge
detection and KMeans Algorithm," Int. J. Eng. Comput. Sci., vol. 2, pp. 221-225, 2013.
[24] L. A. Elrefaei, D. H. Hamid, A. A. Bayazed, S. S. Bushnak, and S. Y. Maasher, "Developing
Iris Recognition System for Smartphone Security," Multimedia Tools and Applications, pp.
1-25, 2017.
[25] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep
convolutional neural networks," in Advances in neural information processing systems,
2012, pp. 1097-1105.
[26] S. Minaee and Y. Wang, "Palmprint Recognition Using Deep Scattering Convolutional
Network," arXiv preprint arXiv:1603.09027, 2016.
16. [27] J. Weston and C. Watkins, "Multi-class support vector machines," Technical Report CSD-
TR-98-04, Department of Computer Science, Royal Holloway, University of London,
May1998.
[28] G. Xu, Z. Zhang, and Y. Ma, "A novel method for iris feature extraction based on
intersecting cortical model network," Journal of Applied Mathematics and Computing, vol.
26, pp. 341-352, 2008.
[29] M. Abhiram, C. Sadhu, K. Manikantan, and S. Ramachandran, "Novel DCT based feature
extraction for enhanced iris recognition," in Communication, Information & Computing
Technology (ICCICT), 2012 International Conference on, 2012, pp. 1-6.
[30] M. Elgamal and N. Al-Biqami, "An efficient feature extraction method for iris recognition
based on wavelet transformation," Int. J. Comput. Inf. Technol, vol. 2, pp. 521-527, 2013.
[31] B. Bharath, A. Vilas, K. Manikantan, and S. Ramachandran, "Iris recognition using radon
transform thresholding based feature extraction with Gradient-based Isolation as a pre-
processing technique," in Industrial and Information Systems (ICIIS), 2014 9th International
Conference on, 2014, pp. 1-8.
[32] S. S. Dhage, S. S. Hegde, K. Manikantan, and S. Ramachandran, "DWT-based feature
extraction and radon transform based contrast enhancement for improved iris recognition,"
Procedia Computer Science, vol. 45, pp. 256-265, 2015.
AUTHORS
Maram G. Alaslani Received her B.Sc. degree in Computer Science with Honors from King
Abdulaziz University in 2010. She works as Teaching Assistant from 2011 to date at Faculty of
Computers and Information Technology at King Abdulaziz University, Rabigh, Saudi Arabia.
Now she is working in her Master Degree at King Abdulaziz University, Jeddah, Saudi Arabia.
She has a research interest in image processing, pattern recognition, and neural network..
Lamiaa A. Elrefaei received her B.Sc. degree with honors in Electrical Engineering (Electronics
and Telecommunications) in 1997, her M.Sc. in 2003 and Ph.D. in 2008 in Electrical Engineering
(Electronics) from faculty of Engineering at Shoubra, Benha University, Egypt. She held a
number of faculty positions at Benha University, as Teaching Assistant from 1998 to 2003, as an
Assistant Lecturer from 2003 to 2008, and has been a lecturer from 2008 to date. She is currently
an Associate Professor at the faculty of Computing and Information Technology, King Abdulaziz
University, Jeddah, Saudi Arabia. Her research interests include computational intelligence,
biometrics, multimedia security, wireless networks, and Nano networks. She is a senior member
of IEEE..