This document summarizes an article that discusses the integration of data warehouse and big data technologies. It outlines some of the key differences between data warehouses and big data, such as data warehouses being structured data focused while big data handles structured and unstructured data. However, it argues that both aim to support data exploration and decision making, so they should be integrated. It reviews existing integration proposals and highlights common elements between the technologies that could serve as a basis for full integration. Finally, it proposes an approach to integrating data warehouses and big data.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most cited articles in academia - International journal of network security &...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Most cited articles in academia - International journal of network security &...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2020: Top Read Articles in Advanced Computingacijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of computing.
October 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
A framework for improving security in cloud computingAJIT M KARANJKAR
Paper Presentation on cloud Computing, we have present the architecture diagram , As well as We have provides in cloud many advantages for individuals and small organizations; it can also create some serious security issues with personal and confidential data.
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
Most downloaded article for an year in academia - Advanced Computing: An Inte...acijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails opportunities for devices with powerful sensing, computing and interaction capabilities ranging from smartphones, wearable devices, home appliances, transport sensors and health products to share information through the internet. Due to vast data shared and increased interaction; they have attracted the interest of malware writers. Internet of Things environments poses unique challenges such as device latency, scalability, lack of antimalware tools and heterogeneity of device architectures that makes malware synthesis complex. In this paper we review literature on internet of things malware categories, support technologies, propagation and tools
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
Wearable Technology also called wearable gadget, is acategory of technology devices with low processing
capabilities that can be worn by a user with the aim to provide information and ease of access to the master
devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable
technology becomes significant when people start their invention in wearable computing, where their
mobile devices become one of the computation sources. However, wearable technology is not mature yet in
term of device security and privacy acceptance of the public. There exists some security weakness that
prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is
authentication issue. The low processing due to less computing power of wearable device causethe
developer's inability to equip some complicated security mechanisms and algorithm on the device.In this
study, an overview of security and privacy vulnerabilities on wearable devices is presented.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...IJECEIAES
The sucesssive growth of collabrative applications producing Bigdata on timeline leads new opprutinity to setup commodities on cloud infrastructure. Mnay organizations will have demand of an efficient data storage mechanism and also the efficient data analysis. The Big Data (BD) also faces some of the security issues for the important data or information which is shared or transferred over the cloud. These issues include the tampering, losing control over the data, etc. This survey work offers some of the interesting, important aspects of big data including the high security and privacy issue. In this, the survey of existing research works for the preservation of privacy and security mechanism and also the existing tools for it are stated. The discussions for upcoming tools which are needed to be focused on performance improvement are discussed. With the survey analysis, a research gap is illustrated, and a future research idea is presented
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat
modeling as a part of requirements engineering in secure software development provides a structured
approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities
in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for
privacy threat modeling in relation to processing sensitive data in cloud computing environments. It
describes the modeling methodology that involved applying Method Engineering to specify characteristics
of a cloud privacy threat modeling methodology, different steps in the proposed methodology and
corresponding products. In addition, a case study has been implemented as a proof of concept to
demonstrate the usability of the proposed methodology. We believe that the extended methodology
facilitates the application of a privacy-preserving cloud software development approach from requirements
engineering to design.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
A framework for improving security in cloud computingAJIT M KARANJKAR
Paper Presentation on cloud Computing, we have present the architecture diagram , As well as We have provides in cloud many advantages for individuals and small organizations; it can also create some serious security issues with personal and confidential data.
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
THE INTERNET OF THINGS: NEW INTEROPERABILITY, MANAGEMENT AND SECURITY CHALLENGESIJNSA Journal
The Internet of Things (IoT) brings connectivity to about every objects found in the physical space. It
extends connectivity to everyday objects. From connected fridges, cars and cities, the IoT creates
opportunities in numerous domains. However, this increase in connectivity creates many prominent
challenges. This paper provides a survey of some of the major issues challenging the widespread adoption
of the IoT. Particularly, it focuses on the interoperability, management, security and privacy issues in the
IoT. It is concluded that there is a need to develop a multifaceted technology approach to IoT security,
management, and privacy.
Most downloaded article for an year in academia - Advanced Computing: An Inte...acijjournal
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
Ubiquitous devices are rising in popularity and sophistication. Internet of Things (IoT) avails opportunities for devices with powerful sensing, computing and interaction capabilities ranging from smartphones, wearable devices, home appliances, transport sensors and health products to share information through the internet. Due to vast data shared and increased interaction; they have attracted the interest of malware writers. Internet of Things environments poses unique challenges such as device latency, scalability, lack of antimalware tools and heterogeneity of device architectures that makes malware synthesis complex. In this paper we review literature on internet of things malware categories, support technologies, propagation and tools
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
Wearable Technology also called wearable gadget, is acategory of technology devices with low processing
capabilities that can be worn by a user with the aim to provide information and ease of access to the master
devices its pairing with. Such examples are Google Glass and Smart watch. The impact of wearable
technology becomes significant when people start their invention in wearable computing, where their
mobile devices become one of the computation sources. However, wearable technology is not mature yet in
term of device security and privacy acceptance of the public. There exists some security weakness that
prompts such wearable devices vulnerable to attack. One of the critical attack on wearable technology is
authentication issue. The low processing due to less computing power of wearable device causethe
developer's inability to equip some complicated security mechanisms and algorithm on the device.In this
study, an overview of security and privacy vulnerabilities on wearable devices is presented.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
Content an Insight to Security Paradigm for BigData on Cloud: Current Trend a...IJECEIAES
The sucesssive growth of collabrative applications producing Bigdata on timeline leads new opprutinity to setup commodities on cloud infrastructure. Mnay organizations will have demand of an efficient data storage mechanism and also the efficient data analysis. The Big Data (BD) also faces some of the security issues for the important data or information which is shared or transferred over the cloud. These issues include the tampering, losing control over the data, etc. This survey work offers some of the interesting, important aspects of big data including the high security and privacy issue. In this, the survey of existing research works for the preservation of privacy and security mechanism and also the existing tools for it are stated. The discussions for upcoming tools which are needed to be focused on performance improvement are discussed. With the survey analysis, a research gap is illustrated, and a future research idea is presented
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat
modeling as a part of requirements engineering in secure software development provides a structured
approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities
in a system. This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for
privacy threat modeling in relation to processing sensitive data in cloud computing environments. It
describes the modeling methodology that involved applying Method Engineering to specify characteristics
of a cloud privacy threat modeling methodology, different steps in the proposed methodology and
corresponding products. In addition, a case study has been implemented as a proof of concept to
demonstrate the usability of the proposed methodology. We believe that the extended methodology
facilitates the application of a privacy-preserving cloud software development approach from requirements
engineering to design.
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
Sensor network is a term used to refer to a heterogeneous system combining tiny sensors and actuators with general/special-purpose processors. Sensor networks are assumed to grow in size to include hundreds or thousands of low-power, low-cost, static or mobile nodes. This system is created by observing that for any densely deployed sensor network, high redundancy exists in the gathered information from the sensor nodes that are close to each other we have exploited the redundancy and designed schemes to secure different kinds of aggregation processing against both inside and outside attacks.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Similar to New Research Articles 2021 June Issue International Journal of Computer Science Information Technology (IJCSIT) (20)
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
New Research Articles 2021 June Issue International Journal of Computer Science Information Technology (IJCSIT)
1. Top 10 Read Article in
Computer Science &
Information Technology:
June 2021
International Journal of Computer Science and
Information Technology (IJCSIT)
Google Scholar Citation
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
2. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
Te-Shun Chou
Department of Technology Systems, East Carolina University, Greenville, NC,
U.S.A.
ABSTRACT
Clouds provide a powerful computing platform that enables individuals and organizations to
perform variety levels of tasks such as: use of online storage space, adoption of business
applications, development of customized computer software, and creation of a “realistic” network
environment. In previous years, the number of people using cloud services has dramatically
increased and lots of data has been stored in cloud computing environments. In the meantime, data
breaches to cloud services are also increasing every year due to hackers who are always trying to
exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service
models were compared; cloud security risks and threats were investigated based on the nature of
the cloud service models. Real world cloud attacks were included to demonstrate the techniques
that hackers used against cloud computing systems. In addition,countermeasures to cloud security
breaches are presented.
KEYWORDS
Cloud computing, cloud security threats and countermeasures, cloud service models
For More Details : http://airccse.org/journal/jcsit/5313ijcsit06.pdf
Volume Link : http://airccse.org/journal/ijcsit2013_curr.html
3. REFERENCES
1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
2. Sophos Security Threat Report 2012. http://www.sophos.com/
3. Amazon.com Server Said to Have Been Used in Sony Attack, May
2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-
invaded-by-hackersusing-amazon-com-server.html
4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,”
International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672-
2676, April 2011.
5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE
International Conference on Cloud Computing Technology and Science, Indianapolis,
December 2010.
6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th
Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii, January
2011.
7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat
Technical Security Conference, 2011.
8. CERT Coordination Center, Denial of
Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html
9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security Issues
in Cloud Computing,” IEEE International Conference in Cloud Computing, pp. 109-116,
Bangalore, 2009.
10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August
2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_de
ni al_of_service_attack
11. DDoS Attack Rains Down on Amazon Cloud, October
2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/
12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon
University.
13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and Recommendations
for Information Security,” The European Network and Information Security Agency
(ENISA), November 2009.
4. 14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/
15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data-
breach-trendsstats/
16. 2012 Has Delivered Her First Giant Data Breach, January
2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First-
Giant-DataBreach.html
17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today,
2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h
tm l
18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June,
2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-
compromised/
19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox-
yes-we-werehacked/
20. Web Based Attacks, Symantec White Paper, February 2009.
21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012.
22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to
Averting SQL Injection for University Cloud,” International Journal of Computer
Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012.
23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection
Attacks on Web Application,” International Journal of Computer Applications, Vol. 52,
No. 2, pp. 19-26, August 2012.
24. Web Application Attack Report For The Second Quarter of
2012.http://www.firehost.com/company/newsroom/web-application-attack-report-
second-quarter-2012
25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July
2008.http://www.sophos.com/en-us/press-office/press-
releases/2008/07/playstation.aspx
26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing
Journal, November 2010.
5. 28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_i
ssue_ amazon_aws_attack/
29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and
Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York,
NY, pp. 20–27, 2005.
30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security
Validation Revisited,” IEEE International Conference on Web Services, Los
Angeles, 2009.
31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,”
2011 IEEE International Conference on Signal Processing, Communications and
Computing, Xi'an, China, September 2011.
32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based Security
Vulnerability Assessment,” IEEE International Conference on E-Business
Engineering, pp.490-494, November 2010.
33. Amazon: Hey Spammers, Get Off My
Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer
s_get_off_my.html
34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud
Computing,” Computer Security Division, Information Technology Laboratory,
National Institute of Standards and Technology, Special Publication 800-144,
December2011.
35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140
36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010.
37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider
Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy
Workshops, pp. 125-128, San Francisco, CA, 2012.
38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of XML
Schema Validation for Countering XML Signature Wrapping Attacks,” First
International Workshop on Securing Services on the Cloud, Milan, Italy, September
2011.
[1] S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping
Attacks and Countermeasures,” IEEE International Conference on Web Services,
pp. 575–582, Miami, Florida, July 2009
6. DATA WAREHOUSE AND BIG DATA INTEGRATION
Sonia Ordoñez Salinas and Alba Consuelo Nieto Lemus Faculty of Engineering, Distrial
F.J.C University, Bogotá, Colombia
ABSTRACT
Big Data triggered furthered an influx of research and prospective on concepts and processes pertaining
previously to the Data Warehouse field. Some conclude that Data Warehouse as such will disappear;
others present Big Data as the natural Data Warehouse evolution (perhaps without identifying a clear
division between the two); and finally, some others pose a future of convergence, partially exploring the
possible integration of both. In this paper, we revise the underlying technological features of Big Data and
Data Warehouse, highlighting their differences and areas of convergence. Even when some differences
exist, both technologies could (and should) be integrated because they both aim at the same purpose: data
exploration and decision making support. We explore some convergence strategies, based on the common
elements in both technologies. We present a revision of the state-of-the-art in integration proposals from
the point of view of the purpose, methodology, architecture and underlying technology, highlighting the
common elements that support both technologies that may serve as a starting point for full integration and
we propose a proposal of integration between the two technologies.
KEYWORDS
Big Data, Data Warehouse, Integration, Hadoop, NoSql, MapReduce, 7V’s, 3C’s, M&G
For More Details : https://aircconline.com/ijcsit/V9N2/9217ijcsit01.pdf
Volume Link : http://airccse.org/journal/ijcsit2017_curr.html
7. REFERENCES
[1] P. Bedi, V. Jindal, and A. Gautam, “Beginning with Big Data Simplified,” 2014.
[2] R. Kimball, M. Ross, W. Thorthwaite, B. Becker, and M. J, The Data Warehouse Lifecycle Toolkit,
2nd Edition. 2008.
[3] C. Todman, Designing A Data Warehouse: Supporting Customer Relationship Management. 2001.
[4] W. H. Inmon, Building the Data Warehouse, 4th Edition. 2005. [5] “Oracle Database 12c for Data
Warehousing and Big Data .” [Online]. Available:
http://www.oracle.com/technetwork/database/bi-datawarehousing/data-warehousing-wp-
12c1896097.pdf. [Accessed: 09-Sep-2015].
[6] M. Cox and D. Ellsworth, “Application-Controlled Demand Paging for Out-of-Core Visualization,”
1997. [Online]. Available: http://www.nas.nasa.gov/assets/pdf/techreports/1997/nas-97-010.pdf.
[Accessed: 09-Apr-2015].
[7] S. Chaudhuri and U. Dayal, “An overview of data warehousing and OLAP technology,” ACM
SIGMOD Rec., vol. 26, no. 1, pp. 65–74, 1997. [8] T. Maiorescu, “General Information on Business
Intelligence,” pp. 294–297, 2010. [9] “Data Warehouses and OLAP: Concepts, Architectures and
Solutions: 9781599043647: Library and Information Science Books | IGI Global.” .
[10] Y. Demchenko, C. De Laat, and P. Membrey, “Defining Architecture Components of the Big Data
Ecosystem,” Collab. Technol. Syst. (CTS), 2014 Int. Conf., pp. 104–112, 2014.
[11] G. NBD-PWG, “ISO/IEC JTC 1 Study Group on Big Data,” 2013. [Online]. Available:
http://bigdatawg.nist.gov/cochairs.php. [Accessed: 24-Oct-2015].
[12] D. L. W.H. Inmon, Data Architecture: A Primer for the Data Scientist: Big Data, Data Warehouse
and Data Vault. Amsterdam,Boston: Elsevier, 2014.
[13] G. N. W.H. Inmon, Derek Strauss, DW 2.0: The Architecture for the Next Generation of Data
Warehousing (Morgan Kaufman Series in Data Management Systems) (): : Books. Burlington,
USA: Morgan Kaufmann Publishers Inc., 2008.
[14] R. Kimball, “The Evolving Role of the Enterprise Data Warehouse in the Era of Big Data
Analytics,” Kimball Gr., 2011.
[15] M. Muntean and T. Surcel, “Agile BI - The Future of BI,” Inform. Econ., vol. 17, no. 3, pp. 114–
124, 2013.
[16] D. Agrawal, “The Reality of Real-Time Business Intelligence,” in Business Intelligence for the
RealTime Enterprise, vol. 27 , M. Castellanos, U. Dayal, and T. Sellis, Eds. Springer Berlin
Heidelberg , 2009, pp. 75–88.
[17] R. Castillo, J. Morata, and L. del Arbol, “Operational Data Store (ODS) - 933.pdf,” Actas del III
taller nacional de minería de datos y aprendizaje, pp. 359–365, 2005.
[18] S. YiChuan and X. Yao, “Research of Real-time Data Warehouse Storage Strategy Based on
Multilevel Caches,” Phys. Procedia, vol. 25, no. 0, pp. 2315–2321, 2012.
[19] A. Ma. P. Díaz-zorita, “Evaluación de la herramienta de código libre Apache Hadoop,” Universidad
8. Carlos III de Madrid Escuela Politécnica Superior, 2011.
[20] R. Kimball, “Newly Emerging Best Practices for Big Data,” Kimball Group, p. 14, 2012.
[21] M. Maier, “Towards a Big Data Reference Architecture,” no. October, pp. 1–144, 2013.
[22] O. Corporation, “ORACLE ENTERPRISE ARCHITECTURE WHITE PAPER. An Enterprise
Architect ’ s Guide to Big Data,” no. February, 2015.
[23] F. Kramer, H. Muller, and K. Turowski, “Acceleration of Single Inserts for Columnar Databases --
An Experiment on Data Import Performance Using SAP HANA,” in Signal-Image Technology and
Internet-Based Systems (SITIS), 2014 Tenth International Conference on, 2014, pp. 672–676.
[24] M. R. Patil and F. Thia, Pentaho for Big Data Analytics, vol. 2013. PACKT PUBLISHING, 2013.
[25] S. G. Manikandan and S. Ravi, “Big Data Analysis Using Apache Hadoop,” in IT Convergence and
Security (ICITCS), 2014 International Conference on , 2014, pp. 1–4.
[26] J. Nandimath, E. Banerjee, A. Patil, P. Kakade, and S. Vaidya, “Big data analysis using Apache
Hadoop,” 2013 IEEE 14th Int. Conf. Inf. Reuse Integr., pp. 700–703, 2013.
[27] A. Katal, M. Wazid, and R. H. Goudar, “Big data: Issues, challenges, tools and Good practices,” in
Contemporary Computing (IC3), 2013 Sixth International Conference on , 2013, pp. 404–409.
[28] A. Pal and S. Agrawal, “An Experimental Approach Towards Big Data for Analyzing Memory
Utilization on a Hadoop cluster using HDFS and MapReduce .,” pp. 442–447, 2014.
[29] R. Zhang, D. Hildebrand, and R. Tewari, “In unity there is strength: Showcasing a unified big data
platform with MapReduce Over both object and file storage,” in Big Data (Big Data), 2014 IEEE
International Conference on , 2014, pp. 960–966.
[30] “Welcome to ApacheTM Hadoop®!” [Online]. Available: https://hadoop.apache.org/. [Accessed:
26- Mar-2015].
[31] “HDFS Architecture Guide.” [Online]. Available:
http://hadoop.apache.org/docs/r1.2.1/hdfs_design.html. [Accessed: 26-Mar-2015].
[32] S. Brin and L. Page, “The Anatomy of a Large-Scale Hypertextual Web Search Engine,” in Computer
Networks and ISDN Systems, 1998, pp. 107–117. [
[33] D. Garlasu, V. Sandulescu, I. Halcu, G. Neculoiu, O. Grigoriu, M. Marinescu, and V. Marinescu, “A
big data implementation based on Grid computing,” in Roedunet International Conference
(RoEduNet), 2013 11th, 2013, pp. 1–4.
[34] A. Jorgensen, C. Price, B. Mitchell, and J. Rowlan, Microsoft Big Data Solutions. John Wiley &
Sons, Inc., 2014.
[35] R. T. Kaushik, M. Bhandarkar, and K. Nahrstedt, “Evaluation and Analysis of GreenHDFS: A
SelfAdaptive, Energy-Conserving Variant of the Hadoop Distributed File System,” in Cloud
Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on,
2010, pp. 274–287.
[36] J. G. Shanahan and L. Dai, “Large Scale Distributed Data Science Using Apache Spark,” in
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining, 2015, pp. 2323–2324.
9. [37] R. S. Xin, J. Rosen, M. Zaharia, M. J. Franklin, S. Shenker, and I. Stoica, “Shark: SQL and Rich
Analytics at Scale,” in Proceedings of the 2013 ACM SIGMOD International Conference on
Management of Data, 2013, pp. 13–24.
[38] J. Li, J. Wu, X. Yang, and S. Zhong, “Optimizing MapReduce Based on Locality of K-V Pairs and
Overlap between Shuffle and Local Reduce,” in Parallel Processing (ICPP), 2015 44th International
Conference on, 2015, pp. 939–948.
[39] E. Brewer, “CAP Twelve Years Later: How the ‘Rules’ Have Changed,” InfoQ, 2012. [Online].
Available: http://www.infoq.com/articles/cap-twelve-years-later-how-the-rules-have-changed.
[Accessed: 26-Mar-2015].
[40] G. Vaish, Getting started with NoSQL. 2013.
[41] V. N. Gudivada, D. Rao, and V. V. Raghavan, “NoSQL Systems for Big Data Management,” 2014
IEEE World Congr. Serv., pp. 190–197, 2014.
[42] Cassandra, “The Apache Cassandra Project,” httpcassandraapacheorg, 2010. [Online]. Available:
http://cassandra.apache.org/.
[43] D. Borthakur, “Petabyte Scale Databases and Storage Systems at Facebook,” in Proceedings of the
2013 ACM SIGMOD International Conference on Management of Data, 2013, pp. 1267–1268.
[44] J. Huang, X. Ouyang, J. Jose, M. Wasi-ur-Rahman, H. Wang, M. Luo, H. Subramoni, C. Murthy,
and D. K. Panda, “High-Performance Design of HBase with RDMA over InfiniBand,” in Parallel
[45] G. Weintraub, “Dynamo and BigTable - Review and comparison,” Electr. Electron. Eng. Isr. (IEEEI),
2014 IEEE 28th Conv., pp. 1–5, 2
[46] D. Pereira, P. Oliveira, and F. Rodrigues, “Data warehouses in MongoDB vs SQL Server: A
comparative analysis of the querie performance,” in Information Systems and Technologies
(CISTI), 2015 10th Iberian Conference on, 2015, pp. 1–7.
[47] K. Dehdouh, F. Bentayeb, O. Boussaid, and N. Kabachi, “Columnar NoSQL CUBE: Agregation
operator for columnar NoSQL data warehouse,” in Systems, Man and Cybernetics (SMC), 2014
IEEE International Conference on, 2014, pp. 3828–3833.
[48] Y. Liu and T. M. Vitolo, “Graph Data Warehouse: Steps to Integrating Graph Databases Into the
Traditional Conceptual Structure of a Data Warehouse,” in Big Data (BigData Congress), 2013
IEEE International Congress on, 2013, pp. 433–434.
[49] M. Chevalier, M. El Malki, A. Kopliku, O. Teste, and R. Tournier, “Benchmark for OLAP on NoSQL
technologies comparing NoSQL multidimensional data warehousing solutions,” in Research
Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on, 2015, pp.
480–485.
[50] F. Färber, S. K. Cha, J. Primsch, C. Bornhövd, S. Sigg, and W. Lehner, “SAP HANA Database: Data
Management for Modern Business Applications,” SIGMOD Rec., vol. 40, no. 4, pp. 45–51, 2012.
[51] K. M. A. Hasan, M. T. Omar, S. M. M. Ahsan, and N. Nahar, “Chunking implementation of
extendible array to handle address space overflow for large multidimensional data sets,” in
Electrical Information and Communication Technology (EICT), 2013 International Conference on,
2014, pp. 1– 6.
10. [52] S. Müller and H. Plattner, “An In-depth Analysis of Data Aggregation Cost Factors in a Columnar
Inmemory Database,” in Proceedings of the Fifteenth International Workshop on Data Warehousing
and OLAP, 2012, pp. 65–72.
[53] H. Plattner, “A Common Database Approach for OLTP and OLAP Using an In-memory Column
Database,” in Proceedings of the 2009 ACM SIGMOD International Conference on Management
of Data, 2009, pp. 1–2.
[54] J. Schaffner, A. Bog, J. Krüger, and A. Zeier, “A Hybrid Row-Column OLTP Database Architecture
for Operational Reporting,” in Business Intelligence for the Real-Time Enterprise SE - 5, vol. 27,
M. Castellanos, U. Dayal, and T. Sellis, Eds. Springer Berlin Heidelberg, 2009, pp. 61–74.
[55] V. K. Vavilapalli, A. C. Murthy, C. Douglas, S. Agarwal, M. Konar, R. Evans, T. Graves, J. Lowe,
H. Shah, S. Seth, B. Saha, C. Curino, O. O’Malley, S. Radia, B. Reed, and E. Baldeschwieler,
“Apache Hadoop YARN: Yet Another Resource Negotiator,” in Proceedings of the 4th Annual
Symposium on Cloud Computing, 2013, pp. 5:1–5:16.
[56] “Apache Pig Philosophy.” [Online]. Available: http://pig.apache.org/philosophy.html. [Accessed:
26- Mar-2015].
[57] “Architecture - Apache Drill.” [Online]. Available: http://drill.apache.org/architecture/. [Accessed:
26-Mar-2015].
[58] “Storm, distributed and fault-tolerant realtime computation.” [Online]. Available:
https://storm.apache.org/. [Accessed: 26-Mar-2015].
[59] “Apache Hive TM.” [Online]. Available: https://hive.apache.org/. [Accessed: 26-Mar-2015]. [60]
“Sqoop -.” [Online]. Available: http://sqoop.apache.org/. [Accessed: 26-Mar-2015].
[61] “Impala.” [Online]. Available: http://www.cloudera.com/content/cloudera/en/products-
andservices/cdh/impala.html. [Accessed: 26-Mar-2015].
[62] “Apache Thrift - Home.” [Online]. Available: https://thrift.apache.org/. [Accessed: 26-Mar-2015].
[63] “Apache ZooKeeper - Home.” [Online]. Available: https://zookeeper.apache.org/. [Accessed: 26-
Mar-2015].
[64] D. Borthakur, J. Gray, J. Sen Sarma, K. Muthukkaruppan, N. Spiegelberg, H. Kuang, K.
Ranganathan, D. Molkov, A. Menon, S. Rash, R. Schmidt, and A. Aiyer, “Apache Hadoop Goes
Realtime at Facebook,” in Proceedings of the 2011 ACM SIGMOD International Conference on
Management of Data, 2011, pp. 1071–1080.
[65] B. Ghit, A. Iosup, and D. Epema, “Towards an Optimized Big Data Processing System,” in Cluster,
Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium on, 2013,
pp. 83–86.
[66] P. Agarwal, G. Shroff, and P. Malhotra, “Approximate Incremental Big-Data Harmonization,” in
Big Data (BigData Congress), 2013 IEEE International Congress on, 2013, pp. 118–125.
[67] Y. Elshater, P. Martin, D. Rope, M. McRoberts, and C. Statchuk, “A Study of Data Locality in
YARN,” 2015 IEEE Int. Congr. Big Data, pp. 174–181, 2015.
[68] A. H. B. James Manyika, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles
Roxburgh, “Big data: The next frontier for innovation, competition, and productivity,” McKinsey
Glob. Inst., no. June, p. 156, 2011.
11. [69] J. S. Marron, “Big Data in context and robustness against heterogeneity,” Econom. Stat., vol. 2, pp.
73–80, 2017.
[70] L. Kugler, “What Happens When Big Data Blunders?,” Commun. ACM, vol. 59, no. 6, pp. 15–16,
2016.
[71] S. Sagiroglu, R. Terzi, Y. Canbay, and I. Colak, “Big data issues in smart grid systems,” in 2016
IEEE International Conference on Renewable Energy Research and Applications (ICRERA), 2016,
pp. 1007–1012.
[72] A. Gandomi and M. Haider, “Beyond the hype: Big data concepts, methods, and analytics,” Int. J.
Inf. Manage., vol. 35, no. 2, pp. 137–144, 2015.
[73] Jameela Al-Jaroodi, Brandon Hollein, Nader Mohamed, "Applying software engineering
processes for big data analytics applications development", Computing and Communication
Workshop and Conference (CCWC) 2017 IEEE 7th Annual, pp. 1-7, 2017
12. DATA MINING MODEL PERFORMANCE OF SALES PREDICTIVE
ALGORITHMS BASED ON RAPIDMINER WORKFLOWS
Alessandro Massaro, Vincenzo Maritati, Angelo Galiano Dyrecta Lab, IT research
Laboratory,via Vescovo Simplicio, 45, 70014 Conversano (BA), Italy
ABSTRACT
By applying RapidMiner workflows has been processed a dataset originated from different data files, and
containing information about the sales over three years of a large chain of retail stores. Subsequently, has
been constructed a Deep Learning model performing a predictive algorithm suitable for sales forecasting.
This model is based on artificial neural network –ANN- algorithm able to learn the model starting from
sales historical data and by pre-processing the data. The best built model uses a multilayer neural network
together with an “optimized operator” able to find automatically the best parameter setting of the
implemented algorithm. In order to prove the best performing predictive model, other machine learning
algorithms have been tested. The performance comparison has been performed between Support Vector
Machine –SVM-, k-Nearest Neighbor k-NN-,Gradient Boosted Trees, Decision Trees, and Deep Learning
algorithms. The comparison of the degree of correlation between real and predicted values, the average
absolute error and the relative average error proved that ANN exhibited the best performance. The
Gradient Boosted Trees approach represents an alternative approach having the second best performance.
The case of study has been developed within the framework of an industry project oriented on the
integration of high performance data mining models able to predict sales using–ERP- and customer
relationship management –CRM- tools.
KEYWORDS
RapidMiner, Neural Network, Deep Learning, Gradient Boosted Trees, Data Mining Performance, Sales
Prediction.
For More Details : http://aircconline.com/ijcsit/V10N3/10318ijcsit03.pdf
Volume Link : http://airccse.org/journal/ijcsit2018_curr.html
13. REFERENCES
[1] Penpece D., & Elma O. E. (2014) “Predicting Sales Revenue by Using Artificial Neural Network
in Grocery Retailing Industry: A Case Study in Turkey”, International Journal of Trade Economics
and Finance, Vol. 5, No. 5, pp435-440.
[2] Thiesing F. M., & Vornberger, O. (1997) “Sales Forecasting Using Neural Networks”, IEEE
Proceedings ICNN’97, Houston, Texas, 9-12 June 1997, pp2125-2128.
[3] Zhang, G. P. (2003) “Time series forecasting using a hybrid ARIMA and neural network model”,
Neurocomputing, Vol. 50, pp159–175.
[4] Sharma, A., & Panigrahi, P. K. (2011) “Neural Network based Approach for Predicting Customer
Churn in Cellular Network Services”, International Journal of Computer Applications, Vol. 27,
No.11, pp0975–8887.
[5] Kamakura, W., Mela, C. F., Ansari A., & al. (2005) ” Choice Models and Customer Relationship
Management,” Marketing Letters, Vol. 16, No.3/4, pp279–291.
[6] Smith, K. A., & Gupta, J. N. D. (2000) “Neural Networks in Business: Techniques and Applications
for the Operations Researcher,” Computers & Operations Research, Vol. 27, No. 11–12, pp1023-
1044.
[7] Chattopadhyay, M., Dan, P. K., Majumdar, S., & Chakraborty, P. S. (2012) “Application of
Artificial Neural Network in Market Segmentation: A Review on Recent Trends,” Management
Science Letters, Vol. 2, pp425-438.
[8] Berry, J. A. M., & Linoff, G. S. (2004) “Data Mining Techniques For Marketing, Sales, and
Customer Relationship Management”, Wiley, Second Edition.
[9] Buttle, F. (2009) “Customer Relationship Management Concepts and Technologies”, Elsevier,
Second Edition.
[10] Thomassey, S. (2014) “Sales Forecasting in Apparel and Fashion Industry: A Review”, Springer,
chapter 2.
[11] Massaro, A. Barbuzzi, D., Vitti, V., Galiano, A., Aruci, M., Pirlo, G. (2016) “Predictive Sales
Analysis According to the Effect of Weather”, Proceeding of the 2nd International Conference on
Recent Trends and Applications in Computer Science and Information Technology, Tirana,
Albania, November 18 - 19, pp53-55.
[12] Parsons, A.G. (2001), “The Association between Daily Weather and Daily Shopping Patterns”,
Australasian Marketing Journal, Vol. 9, No. 2, pp78–84. [13] Steele, A.T., (1951) “Weather’s
Effect on the Sales of a Department Store”, Journal of Marketing Vol. 15, No. 4, pp436–443.
[14] Murray, K. B., Di Muro, F., Finn, A., & Leszczyc, P. P. (2010) “The Effect of Weather on
Consumer Spending”, Journal of Retailing and Consumer Services, Vol. 17, No.6, pp512-520.
[15] Massaro, A., Galiano, A., Barbuzzi, D., Pellicani, L., Birardi, G., Romagno, D. D., & Frulli, L.,
(2017) “Joint Activities of Market Basket Analysis and Product Facing for Business Intelligence
oriented on Global Distribution Market: examples of data mining applications,” International
Journal of Computer Science and Information Technologies, Vol. 8, No.2 , pp178-183.
14. [16] Aguinis, H., Forcum, L. E., & Joo, H. (2013) “Using Market Basket Analysis in Management
Research,” Journal of Management, Vol. 39, No. 7, pp1799-1824.
[17] Štulec, I, Petljak, K., & Kukor, A. (2016) “The Role of Store Layout and Visual Merchandising in
Food Retailing”, European Journal of Economics and Business Studies, Vol. 4, No. 1, pp139-152.
[18] Otha, M. & Higuci, Y. (2013) “Study on Design of Supermarket Store Layouts: the Principle of
“Sales Magnet””, World Academy of Science, Engieering and Technology, Vol. 7, No. 1, pp209-
212.
[19] Shallu, & Gupta, S. (2013) “Impact of Promotional Activities on Consumer Buying Behavior: A
Study of Cosmetic Industry”, International Journal of Commerce, Business and Management
(IJCBM), Vol. 2, No.6, pp379-385.
[20] Al Essa, A. & Bach, C. (2014)“ Data Mining and Knowledge Management for Marketing”,
International Journal of Innovation and Scientific Research, Vol. 2, No. 2, pp321-328.
[21] Kotu, V., & Deshpande B. (2015) “Predictive Analytics and Data Mining- Concepts and Practice
with RapidMiner” Elsevier.
[22] Wimmer, H., Powell, L. M. (2015) “A Comparison of Open Source Tools for Data Science”,
Proceedings of the Conference on Information Systems Applied Research. Wilmington, North
Carolina USA.
[23] Al-Khoder, A., Harmouch, H., “Evaluating Four Of The most Popular Open Source and Free Data
Mining Tools”, International Journal of Academic Scientific Research, Vol. 3, No. 1, pp13-23.
[24] Gulli, A., & Pal, S. (2017) “Deep Learning with Keras- Implement neural networks with Keras on
Theano and TensorFlow,” Birmingham -Mumbai Packt book, ISBN 978-1-78712-842-2.
[25] Kovalev, V., Kalinovsky, A., & Kovalev, S. (2016) “Deep Learning with Theano, Torch, Caffe,
TensorFlow, and deeplearning4j: which one is the best in speed and accuracy?” Proceeding of XIII
Int. Conf. on Pattern Recognition and Information Processing, 3-5 October, Minsk, Belarus State
University, pp99-103.
[26] “Walmart Recruiting - Store Sales Forecasting” 2018. [Online]. Available:
https://www.kaggle.com/c/walmart-recruiting-store-sales-forecasting/data
[27] Huang, H.-C. & Hou, C.-I.. (2017) “Tourism Demand Forecasting Model Using Neural Network”,
International Journal of Computer Science & Information Technology (IJCSIT), Vol. 9, No. 2,
pp19- 29.
[28] Kalyani, J., Bharathi, H. N., & Rao, J. (2016) “Stock Trend Prediction Using News Sentiment
Analysis”, International Journal of Computer Science & Information Technology (IJCSIT), Vol. 8,
No. 3, pp67-76.
15. A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE
FOR RURAL COMMUNITIES
1
OkoroOsahon and 2
EdimAzom Emmanuel
Dept. of Computer Science, University of Calabar, Nigeria
ABSTRACT
Wireless network implementation is a viable option for building network infrastructure in
rural communities. Rural people lack network infrastructures for information services and
socio-economic development. The aim of this study was to develop a wireless network
infrastructure architecture for network services to rural dwellers. A user-centered approach
was applied in the study and a wireless network infrastructure was designed and deployed to
cover five rural locations. Data was collected and analyzed to assess the performance of the
network facilities. The results shows that the system had been performing adequately without
any downtime with an average of 200 users per month and the quality of service has remained
high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet
transmit/receive specification with an average throughput of 1 Mbps. The multiple
output/multiple input(MIMO) point-to-multipoint network design increased the network
throughput and the quality of serviceexperienced by the users
KEYWORDS
Wifi-based Rural Extension, Wireless Fidelity(WiFi), Rural Community, Internet, Network
Architecture.
For More Details : http://aircconline.com/ijcsit/V9N3/9317ijcsit04.pdf
Volume Link : http://airccse.org/journal/ijcsit2017_curr.html
16. REFERENCES
[1] Divya Sargunarangan (2011). A Low-Cost Efficient Wireless Architecture for Rural
NetworkConnectivity. Electronic Project. Copyright Classle. Retrieved
from:https://www.cs.nyu.edu/~lakshmi/wire.pdf
[2] Nikos Korkakakis and Kyriakos Vlachos (2010). Building Wireless Metropolitan
Networks.ResearchAcademic Computer Technology Institute and Computer Engineering
and Informatics Department,University of Patras.
[3] Du Bowei, Demmer Michael and Brewer Eric(2006). Analysis of WWW Traffic in
Cambodia andGhana. 15thinternational WWW Conference(May 2006). Edinburgh.
[4] Todd L. (2007).Cisco Certified Network Associate. 6th Ed, Wiley Publishing Inc.,
Indianapolis,Indiana.
[5] Noll, G. Roger (2000). Telecommunications reform in developing countries. In A. O.
Kruger(Ed).Economic policy reform: The second stage. Chicago, University of Chicago
Press.
[6] Flickenger, Rob., Aichele Corinna., Fonda Carlo., Forster Jim., Howard Ian., Krag Tomas.,
andZennaro Marco. (2006). Wireless Networking in the Developing World. Limehouse
Book SprintTeam, First Edition.
[7] Horst, Heather. and Miller, Daniel. (2006). The Cell Phone: An Anthropology
ofCommunication.Berg, 2006.
[8] World Bank Report (2004). World Development indicators. Washington, DC: World Bank.
[9] Wallsten, J. Scott. (2003). Regulation and Internet use in Developing Countries.
Washington DC,AEI-BrookingsWiFi’s Growing Pains (Special Report). 2004, February
[8] Business WeekOnline.Retrieved May 18, 2005.
(http://www.businessweek.com/technology/tc-speccial/tc-04wi.htm)
[10] Kumar Arun, RajputNitendra., Chakraborty Dipanjan., Argarwal, K. Sheetal. and
Nanavati, A.A.(2007). WWWTW: The World-Wide Telecom Web. In: NSDR’09 Kyoto,
Japan.
[11] Patel, Neil.,Chittamuru, Deepti., Jain, Anupam., Dave, Paresh. and Parikh S. Tapan
(2010).AvaajOtalo – A Field Study of an Interactive Voice Forum for Small Farmers in
Rural India. In:CHI’10, Atlanta, GA.
[12] Galperin, Herman. and Bar, Francois. (2004). Building the Wireless Internet Infrastructure:
fromcordless EthernetArchipelagos to Wireless grids. Communication and Strategies,
54(2), 45 -68.
[13] LitePoint (2012): LitePoint Introduces IQxel—The First 802.11ac Manufacturing Test
17. SolutionAccessedfrom:http://litepoint.com/press-releases/litepoint-introduces-iqxel-the-
first-802-11ac-manufacturing-test-solution/ (Accessed: March 12, 2015).
[14] IEEE (2007) Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY)Specifications. IEEE Standard for Information Technology— Telecommunications
and informationexchange between systems. Accessed
from:http://www.ie.itcr.ac.cr/acotoc/Ingenieria/Lab%20TEM%20II/Antenas/Especificaci
on%20802%2011-2007.pdf (Accessed April 20, 2015).
[15] SoneshSurana, Rabin K. Patra., Sergiu Nedevschi., Manuel Ramos.,
LakshminarayananSubramanian., Yahel Ben-David, Eric A. Brewer. (2008). Beyond
Pilots: Keeping Rural WirelessNetworks Alive. NSDI 8,119-132.
[16] Patra K. Rabin, Nedevschi Sergiu., SuranaSonesh., Sheth Anmol.,
LakshminarayananSubramanian,and Eric A.Brewer (2007): WiLDNet: Design and
Implementation of High Performance WiFi BasedLong Distance Networks. NSDI 1(1),1.
[17] Atel Electronics (2015): Wireless access point Airmax TDMA (Ubiquiti NanoStation
M5)Accessedfrom: http://www.atel-electronics.eu/produkt.php?hash=07006 (Accessed:
March 15, 2015).
18. AGILE DISTRIBUTED SOFTWARE DEVELOPMENT IN NINE
CENTRAL EUROPEAN TEAMS:CHALLENGES, BENEFITS AND
RECOMMENDATIONS
Manuel Stadler, Raoul Vallon, Martin Pazderka and Thomas Grechenig
Research Group for Industrial Software, Vienna University of Technology,Vienna,
Austria
ABSTRACT
Although initially designed for co-located teams, agile methodologies promise mitigation to the
challenges present in distributed software development with their demand for frequent communication.
We examinethe application of agile practices in software engineering teams with low geographical
distribution in Austria and Germany. To gather insights on challenges and benefits faced by distributed
teams we conductinterviews with eleven representatives and analyse the interview transcripts using the
inductive category formation method. As a result, we identify four major challenges, such as technical
obstructions or theimpediments different language abilities have on communication, and four benefits,
regardingcollaboration and information radiation, that agile methods yield in distributed teams. Based on
ouranalysis of challenges and benefits, we deduct seven recommendations to improve collaboration,
overcomedistance and avoid pitfalls. Key recommendations for teams with low geographical distance
include thatteams should get together at certain points to build relationships and trust and share
information face-to- face
KEYWORDS
Agile Distributed Software Development, Distributed Agile, Nearshoring, Agile Methods
For More Details : http://aircconline.com/ijcsit/V11N1/11119ijcsit01.pdf
Volume Link : http://airccse.org/journal/ijcsit2019_curr.html
19. REFERENCES
[1] M. Kajko-Mattsson, G. Azizyan, and M. K. Magarian, “Classes of Distributed Agile
DevelopmentProblems,” in Proceedings of the 2010 Agile Conference, Washington, DC, USA,
2010, pp. 51–58.
[2] “Stack Overflow Developer Survey 2016 Results,” Stack Overflow. [Online].
Available:https://insights.stackoverflow.com/survey/2016. [Accessed: 08-Nov-2018].
[3] P. J. Ågerfalk, B. Fitzgerald, H. Holmström, B. Lings, B. Lundell, and E. Ó. Conchúir, “A
frameworkfor considering opportunities and threats in distributed software development,” in In
Proceedings ofthe International Workshop on Distributed Software Development (Paris, Aug. 29,
2005). AustrianComputer Society, pp. 47–61.
[4] Ebert, Christof, “The Bright Side: Benefits,” in Global Software and IT, Wiley-Blackwell, 2011,
pp.15–18.
[5] J. Kotlarsky and I. Oshri, “Country attractiveness for offshoring and offshore outsourcing:
Additionalconsiderations,” JIT, vol. 23, pp. 228–231, Dec. 2008.
[6] J. Noll, S. Beecham, and I. Richardson, “Global Software Development and Collaboration:
Barriersand Solutions,” ACM Inroads, vol. 1, no. 3, pp. 66–78, Sep. 2011.
[7] E. Woodward, S. Surdek, and M. Ganis, A Practical Guide to Distributed Scrum, 1st ed. IBM
Press,2010.
[8] K. Beck and C. Andres, Extreme Programming Explained: Embrace Change, 2nd Edition,
2ndedition. Boston, MA: Addison-Wesley, 2004.
[9] J. Shore and S. Warden, The Art of Agile Development, First. O’Reilly, 2007.[10] K. Beck et al.,
Manifesto for Agile Software Development. Online available athttps://agilemanifesto.org/; last
access 01.12.2018), 2001.
[11] M. Cohn, Succeeding with Agile: Software Development Using Scrum, 1 edition. Upper
SaddleRiver, NJ: Addison-Wesley Professional, 2009.
[12] T. J. Allen and G. Henn, The Organization and Architecture of Innovation: Managing the Flow
ofTechnology, 1 edition. Amsterdam; Boston: Butterworth-Heinemann, 2006.
[13] V. Casey, “Imparting the Importance of Culture to Global Software Development,” ACM
Inroads,vol. 1, no. 3, pp. 51–57, Sep. 2011.
[14] J. D. Herbsleb, “Global Software Engineering: The Future of Socio-technical Coordination,” in
2007Future of Software Engineering, Washington, DC, USA, 2007, pp. 188–198.
[15] M. B. O’Leary and J. N. Cummings, “The Spatial, Temporal, and Configurational Characteristics
ofGeographic Dispersion in Teams,” MIS Q, vol. 31, no. 3, pp. 433–452, Sep. 2007.
[16] E. Carmel and R. Agarwal, “Tactical approaches for alleviating distance in global
softwaredevelopment,” IEEE Softw., vol. 18, no. 2, pp. 22–29, Apr. 2001.
[17] L. Lee-Kelley and T. Sankey, “Global virtual teams for value creation and project success: A
20. casestudy,” Int. J. Proj. Manag., vol. 26, no. 1, pp. 51–62, Jan. 2008.
[18] J. R. Evaristo, R. Scudder, K. C. Desouza, and O. Sato, “A dimensional analysis of
geographicallydistributed project teams: a case study,” J. Eng. Technol. Manag., vol. 21, no. 3, pp.
175–189, Sep.2004.
[19] G. O. Wiredu, “A Framework for the Analysis of Coordination in Global Software Development,”
inProceedings of the 2006 International Workshop on Global Software Development for
thePractitioner, New York, NY, USA, 2006, pp. 38–44.
[20] J. E. Moore, C. K. Williams, and M. Sumner, “The Role of Informal Control in PMO
LiteEnvironments,” in Proceedings of the 50th Annual Conference on Computers and People
Research,New York, NY, USA, 2012, pp. 27–30.
[21] J. Ritchie, J. Lewis, C. M. Nicholls, and R. Ormston, Qualitative Research Practice: A Guide
forSocial Science Students and Researchers. SAGE, 2013.
[22] D. Šmite, C. Wohlin, Z. Galviņa, and R. Prikladnicki, “An Empirically Based Terminology
andTaxonomy for Global Software Engineering,” Empir. Softw Engg, vol. 19, no. 1, pp. 105–153,
Feb.2014.
[23] P. Runeson, M. Host, A. Rainer, and B. Regnell, Case Study Research in Software
Engineering:Guidelines and Examples, 1st ed. Wiley Publishing, 2012.
[24] R. K. Yin, Case Study Research, 5th ed. Los Angeles: Sage Publications, 2013.
[25] L. Layman, L. Williams, D. Damian, and H. Bures, “Essential communication practices for
ExtremeProgramming in a global software development team,” Inf. Softw. Technol., vol. 48, no.
9, pp. 781–794, Sep. 2006.
[26] S. Dorairaj, J. Noble, and P. Malik, “Effective Communication in Distributed Agile
SoftwareDevelopment Teams,” in Agile Processes in Software Engineering and Extreme
Programming, 2011,pp. 102–116.
[27] P. Mayring, Qualitative content analysis: theoretical foundation, basic procedures and
softwaresolution. 2014.
[28] A. Cockburn, Agile Software Development: The Cooperative Game, 2 edition. Upper Saddle
River,NJ: Addison-Wesley Professional, 2006.
[29] F. Zieris and S. Salinger, “Doing Scrum Rather Than Being Agile: A Case Study on
ActualNearshoring Practices,” presented at the Proceedings - IEEE 8th International Conference
on GlobalSoftware Engineering, ICGSE 2013, 2013, pp. 144–153.
[30] V. J. Wawryk, C. Krenn, and T. Dietinger, “Scaling a running agile fix-bid project with near
shoring:Theory vs. reality and (best) practice,” in 2015 IEEE Eighth International Conference on
SoftwareTesting, Verification and Validation Workshops (ICSTW), 2015, pp. 1–7.
[31] H. Holmström, B. Fitzgerald, P. J. Ågerfalk, and E. Ó. Conchúir, “Agile Practices Reduce Distance
inGlobal Software Development,” Inf. Syst. Manag., vol. 23, no. 3, pp. 7–18, Jun. 2006.
[32] Y. I. Alzoubi, A. Q. Gill, and A. Al-Ani, “Empirical studies of geographically distributed
agiledevelopment communication challenges: A systematic review,” Inf. Manage., vol. 53, no. 1,
pp. 22–37, Jan. 2016
21. FUTURE AND CHALLENGES OF INTERNET OF THINGS
Falguni Jindal1
, Rishabh Jamar2
, Prathamesh Churi3
1,2
Bachelors of Technology in Computer Engineering SVKM’s NMIMS Mukesh
Patel School of Technology Management and Engineering, Mumbai, India
3
Assistant Professor (Computer Engineering) SVKM’s NMIMS Mukesh Patel
School of Technology Management and Engineering, Mumbai, India.
ABSTRACT
The world is moving forward at a fast pace, and the credit goes to ever growing technology. One such
concept is IOT (Internet of things) with which automation is no longer a virtual reality. IOT connects
various non-living objects through the internet and enables them to share information with their
community network to automate processes for humans and makes their lives easier. The paper presents
the future challenges of IoT , such as the technical (connectivity , compatibility and longevity , standards
, intelligent analysis and actions , security), business ( investment , modest revenue model etc. ), societal
(changing demands , new devices, expense, customer confidence etc. ) and legal challenges ( laws,
regulations, procedures, policies etc. ). A section also discusses the various myths that might hamper the
progress of IOT, security of data being the most critical factor of all. An optimistic approach to people in
adopting the unfolding changes brought by IOT will also help in its growth
KEYWORDS
IoT, Internet of Things, Security, Sensors
For More Details : https://aircconline.com/ijcsit/V10N2/10218ijcsit02.pdf
Volume Link : http://airccse.org/journal/ijcsit2018_curr.html
22. REFERENCES
[1] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A
vision, architectural elements, and future directions. Future generation computer systems,
29(7), 1645-1660.
[2] Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems
Frontiers, 17(2), 243-259.
[3] Guo, B., Zhang, D., Wang, Z., Yu, Z., & Zhou, X. (2013). Opportunistic IoT: Exploring the
harmonious interaction between human and the internet of things. Journal of Network and
Computer Applications, 36(6), 1531-1539.
[4] Banafa, A. (2014). IoT Standardization and Implementation Challenges. IEEE. org
Newsletter.
[5] Banafa, A. (2015). „What is next for IoT and IIoT”. Enterprise Mobility Summit.
[6] Coetzee, L., & Eksteen, J. (2011, May). The Internet of Things-promise for the future? An
introduction. In IST-Africa Conference Proceedings, 2011 (pp. 1-9). IEEE.
[7] Cai, H., Da Xu, L., Xu, B., Xie, C., Qin, S., & Jiang, L. (2014). IoT-based configurable
information service platform for product lifecycle management. IEEE Transactions on
Industrial Informatics, 10(2), 1558-1567.
[8] Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2012, December). Future internet: the internet
of things architecture, possible applications and key challenges. In Frontiers of Information
Technology (FIT), 2012 10th International Conference on (pp. 257-260). IEEE.
[9] Liu, Y., & Zhou, G. (2012, January). Key technologies and applications of internet of things.
In Intelligent Computation Technology and Automation (ICICTA), 2012 Fifth International
Conference on (pp. 197-200). IEEE.
[10] Sadeghi, A. R., Wachsmann, C., & Waidner, M. (2015, June). Security and privacy
challenges in industrial internet of things. In Proceedings of the 52nd annual design
automation conference (p. 54). ACM.
[11] Banafa, A. (2014). IoT and Blockchain Convergence: Benefits and Challenges. IEEE Internet
of Things.
[12] Marjani, M., Nasaruddin, F., Gani, A., Karim, A., Hashem, I. A. T., Siddiqa, A., & Yaqoob,
I. (2017). Big IoT data analytics: Architecture, opportunities, and open research challenges.
IEEE Access, 5, 5247-5261.
[13] Desai, P., Sheth, A., & Anantharam, P. (2015, June). Semantic gateway as a service
architecture for iot interoperability. In Mobile Services (MS), 2015 IEEE International
Conference on(pp. 313-319). IEEE.
[14] Koivu, A., Koivunen, L., Hosseinzadeh, S., Laurén, S., Hyrynsalmi, S., Rauti, S., &
Leppänen, V. (2016, December). Software Security Considerations for IoT. In Internet of
Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE
23. Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 2016
IEEE International Conference on (pp. 392-397). IEEE.
[15] Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for
realising the Internet of Things. Cluster of European Research Projects on the Internet of
Things, European Commision, 3(3), 34-36.
[16] Vermesan, O., Friess, P., Guillemin, P., Gusmeroli, S., Sundmaeker, H., Bassi, A., ... &
Doody, P. (2011). Internet of things strategic research roadmap. Internet of Things-Global
Technological and Societal Trends, 1(2011), 9-52.
[17] Sheng, Z., Yang, S., Yu, Y., Vasilakos, A., Mccann, J., & Leung, K. (2013). A survey on the
ietf protocol suite for the internet of things: Standards, challenges, and opportunities. IEEE
Wireless Communications, 20(6), 91-98.
[18] Theoleyre, F., & Pang, A. C. (Eds.). (2013). Internet of Things and M2M Communications.
River Publishers.
[19] Coetzee, L., & Eksteen, J. (2011, May). The Internet of Things-promise for the future? An
introduction. In IST-Africa Conference Proceedings, 2011 (pp. 1-9). IEEE.
[20] Ji, Z., & Anwen, Q. (2010, November). The application of internet of things (IOT) in
emergency management system in China. In Technologies for Homeland Security (HST),
2010 IEEE International Conference on (pp. 139-142). IEEE.
[21] James Kirkland , “Internet of Things: insights from Red Hat” , Website:
https://developers.redhat.com/blog/2015/03/31/internet-of-things-insights-from-red-hat/ ,
Accesed : 2nd February 2018
24. AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION
WITH MOBILE PAYMENTS
Lisa Y. Chen and Wan-Ning Wu Department of Information Management,
I-Shou University, Taiwan
ABSTRACT
Mobile payment allows consumers to make more flexible payments through convenient mobile devices.
While mobile payment is easy and time save, the operation and security of mobile payment must ensure
that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction.
Therefore, this study based on technology acceptance model to explore the impact of external variables
through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods
used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation
analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are
supported. However, mobile payment is still subject to many restrictions on development and there are
limited related researches. The results of this study provided insight into the factors that affect the users’
satisfaction for mobile payment. Related services development of mobile payment and future research
suggestions are also offered.
KEYWORDS
Mobile Payment, Technology Acceptance Model, Users’ satisfaction
For More Details : https://aircconline.com/ijcsit/V9N3/9317ijcsit08.pdf
Volume Link : http://airccse.org/journal/ijcsit2017_curr.html
25. REFERENCES
[1] Lu, H. P. and Su, Y. J. (2009). “Factors affecting purchase intention on mobile shopping web sites,”
Internet Research, Vol.19, No. 4, pp. 442-458.
[2] Zhang, R., Chen, J. Q., and Lee, C. J. (2013). “Mobile commerce and consumer privacy concerns,”
The Journal of Computer Information Systems, Vol. 53, No. 4, pp. 31-38.
[3] Kim, C., Mirusmonov, M., and Lee, I. (2010). “An empirical examination of factors influencing the
intention to use mobile payment,” Journal Computers in Human Behavior, Vol. 26, No. 3, pp. 310-
322.
[4] Nguyen, N., Cao, T. K., Dang, P. L. and Nguyen, H. A. (2016). “Predicting consumer intention to use
mobile payment services: empirical evidence from Vietnam,” International Journal of Marketing
Studies, Vol. 8, No. 1, pp. 117-124.
[5] Pousttchi, K. and Wiedemann, D. G. (2007). “What influences consumers’ intention to use mobile
payments?” Retrieved from: International Journal of Computer Science & Information Technology
(IJCSIT) Vol 9, No 3, June 2017 105
https://pdfs.semanticscholar.org/a4dd/ce87edaa6d2bf14d0bd362e1c9beb24b030b.pdf (March, 22,
2017).
[6] Ondrus, J. and Pigneur, Y. (2007). “Cross‐industry preferences for development of mobile payments
in Switzerland,” Electronic Markets, pp. 142-152.
7] Liébana-Cabanillas, F., Ramos de Luna, I., and Montoro-Ríos, F. (2017). “Intention to use new mobile
payment systems: a comparative analysis of SMS and NFC payments,” Economic
ResearchEkonomska Istraživanja, Vol. 30, No. 1, pp. 892-910.
[8] Dornan, A. (2001). “The essential guide to wireless communications applications: from cellular
systems to WAP and m-commerce,” Upper Saddle River, NJ, Prentice Hall.
[9] Heijden, H. (2002). “Factors affecting the successful introduction of mobile payment systems,” 15th
Bled Electronic Commerce Conference eReality: Constructing the eEconomy, Bled, Slovenia, June
17-19, pp. 430-443.
[10] Hahn I. and Kodó, K. (2017). “Mobile payment analysed from the aspects of Kano model.” Retrieved
from: http://www.diva-portal.org/smash/get/diva2:1079862/FULLTEXT01.pdf (March, 22, 2017).
[11] Dahlberg, T., Mallat, N., Ondrus, J., and Zmijewska, A. (2008). “Past, present and future of mobile
payments research: a literature review,” Electronic Commerce Research and Applications, Vol. 7, No.
2, pp. 165-181.
[12] Varshney, U. (2002). “Mobile payment,” IEEE Computer, Vol. 35, No. 12, pp. 120-121.
[13] Ondrus, J. and Pigneur, Y. (2006). “Towards a holistic analysis of mobile payments: a multiple
perspectives approach,” Electronic Commerce Research and Applications, Vol. 5, No. 3, pp. 246–257.
[14] Sang, R. J. and Murdock, K. (2013). “Consumer acceptance of mobile marketing communications
using the QR code,” Journal of Direct, Data and Digital Marketing Practice, Vol. 15, No. 2, pp. 11-
124.
[15] Davis, F. D. (1989). “Perceived usefulness, perceived ease of use, and user acceptance of information
technology,” MIS Quarterly, Vol. 13, No. 3, pp. 319-340.
26. [16] Fishbein, M. and Ajzen, I. (1975). “Belief, attitude, intention, and behavior: an introduction to theory
and research”. Reading, MA: Addison-Wesley.
[17] Taylor, S. and Todd, P. (1995). “Assessing IT usage: the role of prior experience,” MIS Quarterly, Vol.
19, No. 4, pp. 561-570.
[18] Gefen, D., Karahanna, E., and Straub, D. W. (2003), “Trust and TAM in online shopping: an integrated
model,” MIS Quarterly, Vol. 27, No. 1, pp. 51-90.
[19] Moon, J.W. and Kim, Y.G. (2001). “Extending the TAM for a world-wide-web context,” Information
& Management, Vol. 38, pp. 217-230.
[20] Venkatesh, V. and Davis, F. (2000). “A theoretical extension of the technology acceptance model: four
longitudinal field studies,” Management Science, Vol. 46, No. 2, pp.186-204.
[21] Brown, L. G. (1989). “The strategic and tactical implications of convenience in consumer product
marketing,” The Journal of Consumer Marketing, Vol. 6, No. 3, pp. 13-19.
[22] Yoon, C. and Kim, S. (2007). “Convenience and TAM in a ubiquitous computing environment: the
case of wireless LAN,” Electronic Commerce Research & Applications, Vol. 6, No. 1, pp. 102-112.
[23] Rogers, E.M. (2003). Diffusion of innovations (5th ed.). New York: Free Press.
[24] Craig, V.S., France, B., and Christie, L.C. (2004), “Factors influencing the adoption of web based
shopping: the impact of trust,” ACM SIGMIS Database, Vol. 35, No. 2, pp. 32-49.
[25] Kim, E. and Tadisina, S. (2007). “A model of customers’ trust in e-businesses: Micro-level inter-party
trust formation,” Journal of Computer Information Systems, Vol. 48, No. 1, pp. 88-104. [26] Kalakota,
R. and Whinston, A. B. (1996). “Readings in Electronic Commerce” Addison-Wesley Publishing,
Reading, MA.
[27] Yoon, S. J. (2002). “The antecedents and consequences of trust in online-purchase decisions,” Journal
of Interactive Marketing, Vol. 16, No. 2, pp. 47-63.
[28] Dahlberg, T., Mallat, N., and Öörni, A. (2003). Trust enhanced technology acceptance modelconsumer
acceptance of mobile payment solutions: Tentative evidence, Stockholm Mobility Roundtable, 22-23.
[29] Nunnally, J. C. (1978). “Psychometric theory,” New York: McGraw-Hill.
27. BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert Seidenberg School of CSIS,
Pace University, White Plains, New York
ABSTRACT
Big Data is used in decision making process to gain useful insights hidden in the data for business and
engineering. At the same time it presents challenges in processing, cloud computing has helped in
advancement of big data by providing computational, networking and storage capacity. This paper presents
the review, opportunities and challenges of transforming big data using cloud computing resources.
KEYWORDS
Big data; cloud computing; analytics; database; data warehouse
For More Details : https://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf
Volume Link : http://airccse.org/journal/ijcsit2019_curr.html
28. REFERENCES
[1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October). On the
elasticity of nosql databases over cloud management platforms. In Proceedings of the 20th ACM
international conference on Information and knowledge management (pp. 2385-2388). ACM.
[2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big data."
Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033.
[3] badi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull,
32(1), 3-12.
[4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development, 2(4),
314-319 International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No
4, August 2019 57 [5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and
analytical methods." Journal of Business Research 70 (2017): 263-286.
[6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
[7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models (SaaS,
PaaS, and IaaS). John Wiley & Sons, 2014. [8]
https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf
[9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management Auerbach, ed.
[10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th international
symposium on pervasive systems, algorithms and networks. IEEE, 2012.
[11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive
Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366). IEEE.
[12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE, pp.405–409
[13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing environment,
MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews: Data Mining and
Knowledge Discovery 4.5 (2014): 380-409.
[14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf
[15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges [J]."
Journal of computer research and development 1.98 (2013): 146-169.
[16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data
Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.
29. PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW
ALGORITHM
Bir Bahadur Khatri1
, Bulbul Ahammad1
, Md. Mezbahul Islam2
, Rahmina Rubaiat2
and Md. Imdadul Islam1
1
Department of Computer Science and Engineering, Jahangirnagar University,Savar,
Dhaka, Bangladesh
2
Department of Computer Science and Engineering, MBSTU, Tangail, Bangladesh
ABSTRACT
In this paper, we propose a new traffic flow model of the Long Term Evaluation (LTE) network for the
Evolved Universal Terrestrial Radio Access Network (E-UTRAN). Here only one Evolve Node B
(eNB)nearest to the Mobility Management Entity (MME) and Serving Gateway (S-GW) will use the S1 link
tobridge the E-UTRAN and Evolved Packet Core (EPC). All the eNBs of a tracking area will be connected
toeach other by the X2 link. Determination of capacity of a links of such a network is a challenging job
sinceeach node offers its own traffic and at the same time conveys traffic of other nodes. In this paper, we
applymaximum flow algorithm including superposition theorem to solve the traffic flow of radio network.
Usingthe total flow per subcarrier, a new traffic model is also developed in the paper. The relation among the
traffic parameters: ‘blocking probability’, ‘offered traffic’, ‘instantaneous capacity’, ‘average holdingtime’,
and ‘number of users’ are shown graphically under both QPSK and 16 -QAM. The concept of thenetwork
will be helpful to improve the SINR of the received signal ofeNBslocated long distance relative to MME/S-
GW.
KEYWORDS
Aggregate offered traffic, blocking probability, traffic channel, weighted graph and RB.
For More Details : http://aircconline.com/ijcsit/V12N4/12420ijcsit06.pdf
Volume Link : http://airccse.org/journal/ijcsit2020_curr.html
30. REFERENCES
[1] Jesmin Akhter, Abu Sayed Md. MostafizurRahaman, Md. Imdadul Islam, M. R.
Amin,‘TrafficModelling of Low Dense Femtocellular Network for Long Term Evolution,’ Journal of
Computer andCommunications, pp.88-101, Vol.7, No.12, December 2019
[2] Ma Lin, Wei Shouming and Qiang Wei, ‘A Novel Traffic Analysis Method For PoC over LTE Basedon
Retrial Calling Model,’2011 6th International ICST Conference on Communications andNetworking
in China (CHINACOM), 17-19 Aug. 2011, pp.771-774, Harbin, China
[3] H. Hidayat, Al KautsarPermana, I. Ridwany, and Iskandar, ‘Cell Capacity Prediction with Traffic Load
Effect for Soft Frequency Reuse (SFR) Technique in LTE – A Network,’The 11th
InternationalConference on Telecommunication Systems, Services, and Applications, 26-27 Oct.
2017, 26-27October 2017, Lombok-Indonesia
[4] Haka, V. Aleksieva and H. Valchanov, ‘Comparative Analysis of Traffic Prioritisation Algorithms by
LTE Base Station Scheduler,’ 2020 21st International Symposium on Electrical Apparatus
&Technologies (SIELA), pp. 1-4, 3-6 June 2020, Bourgas, Bulgaria
[5] M. Sahu, ‘Delay Jitter Analysis for Uplink Traffic in LTE Systems,’2019 11th InternationalConference
on Communication Systems & Networks (COMSNETS), pp. 504-506, 7-11 Jan. 2019,Bengaluru,
India
[6] R. Liu, Q. Chen, G. Yu, G. Y. Li and Z. Ding, ‘Resource Management in LTE-U Systems: Past,Present,
and Future,’ IEEE Open Journal of Vehicular Technology,vol. 1, pp. 1-17, Oct’ 2020
[7] Bulbul Ahammad, Risala T. Khan and Md. Imdadul Islam, ‘WLAN -LTE Integrated Traffic
Modelunder Unlicensed Spectrum,’ International Journal of Computer Science and Information
Security (IJCSIS), vol. 17, no. 3, pp.85-100, March 2019
[8] Fatima Sapundzhi and MetodiPopstoilov, ‘C# implementation of the maximum flow
problem,’201927th National Conference with International Participation (TELECOM) ,
pp. 62-65,30-31 Oct. 2019,Sofia, Bulgaria
[9] Y. Wang, J. Ling, S. Zhou, Y. Liu, W. Liao and B. Zhang, ‘A Study on Rapid Incremental
MaximumFlow Algorithm in Dynamic Network,’2018 1st International Cognitive Cities Conference
(IC3), pp.7-11,7-9 Aug. 2018, Okinawa, Japan
[10] Jiyang Dong, Wei Li, CongboCai, Zhong Chen, ‘Draining Algorithm for the Maximum Flow
Problem,’2009 International Conference on Communications and Mobile Computing, pp.197-200, 6-
8 Jan. 2009, Yunnan, China
[11] Ruipeng Bai1 ,HuiGuo, Zhenzhong Wang, Yanlong Zhang, Fan Zhang and Lei Chen, ‘FPGA
Interconnect Resources Test Based on A Improved Ford- Fulkerson Algorithm,’ 2018 IEEE 4th
Information Technology and Mechatronics Engineering Conference (ITOEC 2018), pp.251-258,14-16
Dec. 2018, Chongqing, China
[12] Jesmin Akhter, Md. Imdadul Islam, ASM M Rahaman and M R Amin, ‘Performance Evaluation of
Femtocell Based LTE Network under the Concept of Cross- layer Optimization,’ International
Journalof Computer Science and Information Security, pp. 52-60, vol. 14, no. 7, July 2016
[13] Jesmin Akhter, Md. Imdadul Islam, ASM M Ra haman and M R Amin, ‘The MIMO Performance
ofLTE Network under Rayleigh Fading Environment,’ International Journal of Computer Science
andInformation Security, pp. 88-94, vol. 14, no. 8, August 2016
31. [14] Lifeng Zhao and XiaowanMeng, ‘An Improved Algorithm for Solving Maximum Flow Problem,’ 2012
8th International Conference on Natural Computation (ICNC 2012), pp.1016-1018, 29-31 May2012,
Chongqing, China
[15] Bo Hong and Zhengyu He, ‘An Asynchronous Multithreaded Algorithm for the Maximum Network
Flow Pro blem with Nonblocking Global Relabeling Heuristic,’ IEEE Transactions on Parallel
andDistributed Systems, pp.1025-1033, vol. 22, no. 6, June 2011
[16] Ali Mustafa Elshawesh, Mohamed Abdulali, ‘Dimensioning of Circuit Switched Networks by using
Simulation Code based on Erlang (B) formula,’ 2014 Global Summit on Computer &
InformationTechnology (GSCIT),pp. 1-5, 14-16 June 2014, Sousse, Tunisia
[17] James K. Tamgno, Mamadou Alpha Barry, Simplice E. Gnang, Claude Lishou, ‘Estimating Number
of Organs using Erlang's B & C-Formulas,’ 2017 19th International Conference on
AdvancedCommunication Technology (ICACT), pp.858-864, 19-22 Feb. 2017, Bongpyeong, South
Korea
32. CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING
SILHOUETTE SCORE VALUE
Godwin Ogbuabor1
and Ugwoke, F. N2
1
School of Computer Science, University of Lincoln, United Kingdom
2
Department of Computer Science, Michael Okpara University of Agriculture Umudike,
Abia State, Nigeria
ABSTRACT
The huge amount of healthcare data, coupled with the need for data analysis tools has made data mining
interesting research areas. Data mining tools and techniques help to discover and understand hidden patterns
in a dataset which may not be possible by mainly visualization of the data. Selecting appropriate clustering
method and optimal number of clusters in healthcare data can be confusing and difficult most times. Presently,
a large number of clustering algorithms are available for clustering healthcare data, but it is very difficult for
people with little knowledge of data mining to choose suitable clustering algorithms. This paper aims to
analyze clustering techniques using healthcare dataset, in order to determine suitable algorithms which can
bring the optimized group clusters. Performances of two clustering algorithms (Kmeans and DBSCAN) were
compared using Silhouette score values. Firstly, we analyzed K-means algorithm using different number of
clusters (K) and different distance metrics. Secondly, we analyzed DBSCAN algorithm using different
minimum number of points required to form a cluster (minPts) and different distance metrics. The
experimental result indicates that both K-means and DBSCAN algorithms have strong intra-cluster cohesion
and inter-cluster separation. Based on the analysis, K-means algorithm performed better compare to
DBSCAN algorithm in terms of clustering accuracy and execution time.
KEYWORDS
Dataset, Clustering, Healthcare data, Silhouette score value, K-means, DBSCAN
For More Details : https://aircconline.com/ijcsit/V10N2/10218ijcsit03.pdf
Volume Link : http://airccse.org/journal/ijcsit2018_curr.html
33. REFERENCES
[1] Alsayat, A., & El-Sayed, H. (2016). Efficient genetic K-Means clustering for health care knowledge
discovery. In Software Engineering Research, Management and Applications (SERA), 2016 IEEE 14th
International Conference on (pp. 45-52). IEEE.
[2] Balasubramanian, T., & Umarani, R. (2012, March). An analysis on the impact of fluoride in human
health (dental) using clustering data mining technique. In Pattern Recognition, Informatics and Medical
Engineering (PRIME), 2012 International Conference on (pp. 370-375). IEEE.
[3] Banu G. Rasitha & Jamala J.H.Bousal (2015). Perdicting Heart Attack using Fuzzy C Means Clustering
Algorithm. International Journal of Latest Trends in Engineering and Technology (IJLTET).
[4] Banu, M. N., & Gomathy, B. (2014). Disease forecasting system using data mining methods. In
Intelligent Computing Applications (ICICA), 2014 International Conference on (pp. 130-133). IEEE.
[5] Belciug, S. (2009). Patients length of stay grouping using the hierarchical clustering algorithm. Annals
of the University of Craiova-Mathematics and Computer Science Series, 36(2), 79-84.
[6] Belciug, S., Salem, A. B., Gorunescu, F., & Gorunescu, M. (2010, November). Clustering-based
approach for detecting breast cancer recurrence. In Intelligent Systems Design and Applications
(ISDA), 2010 10th International Conference on (pp. 533-538). IEEE.
[7] Bruno, G., Cerquitelli, T., Chiusano, S., & Xiao, X. (2014). A clustering-based approach to analyse
examinations for diabetic patients. In Healthcare Informatics (ICHI), 2014 IEEE International
Conference on (pp. 45-50). IEEE.
[8] DeFreitas, K., & Bernard, M. (2015). Comparative performance analysis of clustering techniques in
educational data mining. IADIS International Journal on Computer Science & Information Systems,
10(2).
[9] Escudero, J., Zajicek, J. P., & Ifeachor, E. (2011). Early detection and characterization of Alzheimer's
disease in clinical scenarios using Bioprofile concepts and K-means. In Engineering in Medicine and
Biology Society, EMBC, 2011 Annual International Conference of the IEEE (pp. 6470-6473). IEEE.
[10] Han, J., Kamber, M., & Pei, J. (2012). Cluster Analysis-10: Basic Concepts and Methods.
[11] Ibrahim, N. H., Mustapha, A., Rosli, R., & Helmee, N. H. (2013). A hybrid model of hierarchical
clustering and decision tree for rule-based classification of diabetic patients. International Journal of
Engineering and Technology (IJET), 5(5), 3986-91.
[12] Jabel K. Merlin & Srividhya (2016). Performance analysis of clustering algorithms on heart dataset.
International Journal of Modern Computer Science, 5(4), 113-117.
[13] Kar Amit Kumar, Shailesh Kumar Patel & Rajkishor Yadav (2016). A Comparative Study &
Performance Evaluation of Different Clustering Techniques in Data Mining. ACEIT Conference
Proceeding.
[14] Lv, Y., Ma, T., Tang, M., Cao, J., Tian, Y., Al-Dhelaan, A., & Al-Rodhaan, M. (2016). An efficient
and scalable density-based clustering algorithm for datasets with complex structures. Neurocomputing,
171, 9-22.
[15] Malli, S., Nagesh, H. R., & Joshi, H. G. (2014). A Study on Rural Health care Data sets using Clustering
Algorithms. International Journal of Engineering Research and Applications, 3(8), 517- 520.
34. [16] Maulik, U., & Bandyopadhyay, S. (2002). Performance evaluation of some clustering algorithms and
validity indices. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(12), 1650-1654.
[17] Na, S., Xumin, L., & Yong, G. (2010, April). Research on k-means clustering algorithm: An improved
k-means clustering algorithm. In Intelligent Information Technology and Security Informatics (IITSI),
2010 Third International Symposium on (pp. 63-67). IEEE.
[18] Paul, R., & Hoque, A. S. M. L. (2010, July). Clustering medical data to predict the likelihood of
diseases. In Digital Information Management (ICDIM), 2010 Fifth International Conference on (pp.
44-49). IEEE.
[19] Pham, D. T., Dimov, S. S., & Nguyen, C. D. (2005). Selection of K in K-means clustering. Proceedings
of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 219(1),
103-119.
[20] R.Nithya & P.Manikandan & D.Ramyachitra (2015); Analysis of clustering technique for the diabetes
dataset using the training set parameter. International Journal of Advanced Research in Computer and
Communication Engineering Vol. 4, Issue 9.
[21] Sagar, H. K., & Sharma, V. (2014). Error Evaluation on K-Means and Hierarchical Clustering with
Effect of Distance Functions for Iris Dataset. International Journal of Computer Applications, 86(16).
[22] Shah, G. H., Bhensdadia, C. K., & Ganatra, A. P. (2012). An empirical evaluation of density-based
clustering techniques. International Journal of Soft Computing and Engineering (IJSCE) ISSN,
22312307, 216-223.
[23] Tan, P. N., Steinbach, M., & Kumar, V. (2013). Data mining cluster analysis: basic concepts and
algorithms. Introduction to data mining.
[24] Tomar, D., & Agarwal, S. (2013). A survey on Data Mining approaches for Healthcare. International
Journal of Bio-Science and Bio-Technology, 5(5), 241-266.
[25] Vijayarani, S., & Sudha, S. (2015). An efficient clustering algorithm for predicting diseases from
hemogram blood test samples. Indian Journal of Science and Technology, 8(17).
[26] Zheng, B., Yoon, S. W., & Lam, S. S. (2014). Breast cancer diagnosis based on feature
extraction using a hybrid of K-means and support vector machine algorithms. Expert Systems
with Applications, 41(4), 1476-1482