The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Top Downloaded Papers : International Journal of Software Engineering & Appli...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Top Cited Articles in 2019 - International Journal of Network Security & Its ...IJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
International Journal of Computer Science, Engineering and Applications (IJCSEA) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer science, Engineering and Applications. The journal is devoted to the publication of high quality papers on theoretical and practical aspects of computer science, Engineering and Applications.
Top Downloaded Papers : International Journal of Software Engineering & Appli...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
Top Cited Articles in 2019 - International Journal of Network Security & Its ...IJNSA Journal
Recently, the mode of living became more complicated without computer systems. The techniques of camouflage information have acquired a vital role with the requirement of intensifying trade of multimedia content. Steganography is the technique that utilizes disguise in a way that prohibits unauthorized access from suspicion of the existence of confidential information exchanged during communication channels between the connected parties. In this paper, an integrated image steganographic system is designed to conceal images, messages or together where the mainly deliberate the improvement of embedding capacity through embedding text with image simultaneously. For that purpose, used matrix partition to partition the secret image then embedded each partition separately after scrambling each pixel by replacing msb instead of lsb to provide the second level of security furthermore to steganography. The simulation results clarify the better performance of the proposed algorithms
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Trends in Network and Wireless Network Security in 2020IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Agricultural Informatics is a valuable domain in the field of interdisciplinary sciences. This is responsible for the applications of Information Technology, Computing and similar technologies into the agricultural activities. This is the combination of Agricultural Science and Information Sciences. The field due to technological nature is much closed with the Agricultural Engineering or Agricultural Technology. There are many allied and similar nomenclature of the fields but all of these are primarily responsible for the same purpose. The field is rapidly increasing in recent past and most practiced in the developed nation. However, in developing countries as well Agricultural Informatics becomes an emerging field of practice and growing rapidly. Agricultural Informatics is growing both in pre and post agricultural activity. This branch is considered as branch of Information Sciences & Technology due to its technological applications in the field of agriculture and allied areas. Information Sciences are the broadest field within the allied branches and growing rapidly. Agricultural Informatics educational programs have started in recent past in different level and stream of education viz. science and technology. However within the broad periphery of Information Sciences it could be offered in other streams and under the wide variety of Information Sciences. This paper is broad and interdisciplinary in nature and deals with the aspects of the Information Sciences and Technology including features, nature, scope and also the potentialities in respect of Agricultural Informatics.
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...IAEME Publication
In the perspective of Construction Management, fires as a risk to Jakarta city can
hamper the process of sustainability of Jakarta city administration, which includes:
Jakarta city planning, and building construction in Jakarta city environment. From
various sources, the average data of fire incident in Jakarta amounted to 4-5 times in
one day. In relation there to, the risk of fire in the city of Jakarta should be prevented
and overcome, so as not to result in the widespread risk of fire from the fire, which in
turn may result in Jakarta being totally paralyzed by a total burn. For this reason, this
research will solve research problems that will focus on the analysis of the importance
of the Fire Protection System in the context of fire prevention and control in Jakarta,
namely: 1) What are the factors and variables of the Fire Protection System model? 2)
How is Fire Protection System model analysis selected?; and 3) What
recommendations can be given to related parties? This research uses qualitative and
quantitative research methods to solve the above three research problems. This
research resulted that there are many factors and variables forming the chosen model.
Top cited computer science and engineering survey research articles from 2016...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication
Applications of information technology in agriculture ws ns for environmental...Aboul Ella Hassanien
This presentation due the workshop at faculty of agriculture - Suss Canal University organized by scientific research group in Egypt (SRGE) on Tuesday 8 April 214
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWAREijseajournal
Ubiquitous processing has the special property when contrasted with customary desktop figuring framework. Really in ubiquitous, more computational force in the earth by utilizing any gadget everything was accessible and open. Numerous machines give the interface to the single client by concealing every one of the gadgets from the foundation. Programming Engineering has unbelievable meaning in the area of g which was utilized and satisfactory for a wide range of ubiquitous figuring application. Because of less programming designing methodologies were distinguished, this was fundamental issue in the root to propose general level engineering. To reach on this objective, step was taken at exceptionally introductory level to seek out all the believable programming
designing difficulties in numerous ubiquitous registering applications that were at that point grew as such.
Attempt to highlight all methodologies that ever been utilized to built up the universal applications. This alysts to construct the general level engineering for the ubiquitous applications
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Feasibility of Artificial Neural Network in Civil Engineeringijtsrd
An Artificial neural network ANN is an information processing hypothesis that is stimulated by the way natural nervous system, such as brain, process information. The using of artificial neural network in civil engineering is getting more and more credit all over the world in last decades. This soft computing method has been shown to be very effective in the analysis and solution of civil engineering problems. It is defined as a body which works out the more and more complex problem through sequential algorithms. It is designed on the basis of artificial intelligence which is proficient of storing more and more information's. In this work, we have investigated the various architectures of ANN and their learning process. The artificial neural network based method was widely applied to the civil engineering because of the strong non linear relationship between known and un known of the problems. They come with good modelling in areas where conventional approaches finite elements, finite differences etc. require large computing resources or time to solve problems. These includes to study the behaviour of building materials, structural identification and control problems, in geo technical engineering like earthquake induced liquefaction potential, in heat transfer problems in civil engineering to improve air quality, in transportation engineering like identification of traffic problems to improve its flexibility , in construction technology and management to estimate the cost of buildings and in building services issues like analyzing the water distribution network etc. Researches reveals that the method is realistic and it will be fascinated for more civil engineering applications. Vikash Singh | Samreen Bano | Anand Kumar Yadav | Dr. Sabih Ahmad ""Feasibility of Artificial Neural Network in Civil Engineering"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22985.pdf
Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/22985/feasibility-of-artificial-neural-network-in-civil-engineering/vikash-singh
A one decade survey of autonomous mobile robot systems IJECEIAES
Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Genome-wide transcription profiling is a powerful technique in studying disease susceptible footprints. Moreover, when applied to disease tissue it may reveal quantitative and qualitative alterations in gene expression that give information on the context or underlying basis for the disease and may provide a new diagnostic approach. However, the data obtained from high-density microarrays is highly complex and poses considerable challenges in data mining. Past researches prove that neuro diseases damage the brain network interaction, protein- protein interaction and gene-gene interaction. A number of neurological research paper also analyze the relationship among damaged part. Analysis of gene-gene interaction network drawn by using state-of-the-art gene database of Alzheimer’s patient can conclude a lot of information. In this paper we used gene dataset affected with Alzheimer’s disease and normal patient’s dataset from NCBI databank. After proper processing the .CEL affymetrix data using RMA, we use the processed data to find gene interaction outputs. Then we filter the output files using probe set filtering attributes p-value and fold count and draw a gene-gene interaction network. Then we analyze the interaction network using GeneMania software.
A mobile application which can save time, effort and money by giving technical video explanation based on the recognized image for learners. The collected video information contains all the detailed explanation of the scanned image done by the user. This application groups Augmented reality , 3d objects , sound , video , AI for image recognition into an easy and compact application for the benefit of the every learner. This web application is built C#, UNITY, VUFORIA with the help of Vuforia server connected by asserts. This mobile application serves as an easier way to access details and documentaries related to recognized object. It includes an automatic AR Camera and image target along with the video player which makes it easier for recognizing the image and to learn. The database is done with Vuforia cloud database. The UI provides an excellent user friendly environment that makes the communication more interactive.
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
September 2022-Top 10 Cited Articles-International Journal of Embedded System...ijesajournal
International Journal of Embedded Systems and Applications (IJESA) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Embedded Systems and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Embedded Systems and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Embedded Systems & applications.
Trends in Network and Wireless Network Security in 2020IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Agricultural Informatics is a valuable domain in the field of interdisciplinary sciences. This is responsible for the applications of Information Technology, Computing and similar technologies into the agricultural activities. This is the combination of Agricultural Science and Information Sciences. The field due to technological nature is much closed with the Agricultural Engineering or Agricultural Technology. There are many allied and similar nomenclature of the fields but all of these are primarily responsible for the same purpose. The field is rapidly increasing in recent past and most practiced in the developed nation. However, in developing countries as well Agricultural Informatics becomes an emerging field of practice and growing rapidly. Agricultural Informatics is growing both in pre and post agricultural activity. This branch is considered as branch of Information Sciences & Technology due to its technological applications in the field of agriculture and allied areas. Information Sciences are the broadest field within the allied branches and growing rapidly. Agricultural Informatics educational programs have started in recent past in different level and stream of education viz. science and technology. However within the broad periphery of Information Sciences it could be offered in other streams and under the wide variety of Information Sciences. This paper is broad and interdisciplinary in nature and deals with the aspects of the Information Sciences and Technology including features, nature, scope and also the potentialities in respect of Agricultural Informatics.
ANALYSIS MODEL OF MASTER PLAN FIRE PROTECTION SYSTEM IN BUILDING AND ENVIRONM...IAEME Publication
In the perspective of Construction Management, fires as a risk to Jakarta city can
hamper the process of sustainability of Jakarta city administration, which includes:
Jakarta city planning, and building construction in Jakarta city environment. From
various sources, the average data of fire incident in Jakarta amounted to 4-5 times in
one day. In relation there to, the risk of fire in the city of Jakarta should be prevented
and overcome, so as not to result in the widespread risk of fire from the fire, which in
turn may result in Jakarta being totally paralyzed by a total burn. For this reason, this
research will solve research problems that will focus on the analysis of the importance
of the Fire Protection System in the context of fire prevention and control in Jakarta,
namely: 1) What are the factors and variables of the Fire Protection System model? 2)
How is Fire Protection System model analysis selected?; and 3) What
recommendations can be given to related parties? This research uses qualitative and
quantitative research methods to solve the above three research problems. This
research resulted that there are many factors and variables forming the chosen model.
Top cited computer science and engineering survey research articles from 2016...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication
Applications of information technology in agriculture ws ns for environmental...Aboul Ella Hassanien
This presentation due the workshop at faculty of agriculture - Suss Canal University organized by scientific research group in Egypt (SRGE) on Tuesday 8 April 214
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWAREijseajournal
Ubiquitous processing has the special property when contrasted with customary desktop figuring framework. Really in ubiquitous, more computational force in the earth by utilizing any gadget everything was accessible and open. Numerous machines give the interface to the single client by concealing every one of the gadgets from the foundation. Programming Engineering has unbelievable meaning in the area of g which was utilized and satisfactory for a wide range of ubiquitous figuring application. Because of less programming designing methodologies were distinguished, this was fundamental issue in the root to propose general level engineering. To reach on this objective, step was taken at exceptionally introductory level to seek out all the believable programming
designing difficulties in numerous ubiquitous registering applications that were at that point grew as such.
Attempt to highlight all methodologies that ever been utilized to built up the universal applications. This alysts to construct the general level engineering for the ubiquitous applications
Research Inventy : International Journal of Engineering and Scienceresearchinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Feasibility of Artificial Neural Network in Civil Engineeringijtsrd
An Artificial neural network ANN is an information processing hypothesis that is stimulated by the way natural nervous system, such as brain, process information. The using of artificial neural network in civil engineering is getting more and more credit all over the world in last decades. This soft computing method has been shown to be very effective in the analysis and solution of civil engineering problems. It is defined as a body which works out the more and more complex problem through sequential algorithms. It is designed on the basis of artificial intelligence which is proficient of storing more and more information's. In this work, we have investigated the various architectures of ANN and their learning process. The artificial neural network based method was widely applied to the civil engineering because of the strong non linear relationship between known and un known of the problems. They come with good modelling in areas where conventional approaches finite elements, finite differences etc. require large computing resources or time to solve problems. These includes to study the behaviour of building materials, structural identification and control problems, in geo technical engineering like earthquake induced liquefaction potential, in heat transfer problems in civil engineering to improve air quality, in transportation engineering like identification of traffic problems to improve its flexibility , in construction technology and management to estimate the cost of buildings and in building services issues like analyzing the water distribution network etc. Researches reveals that the method is realistic and it will be fascinated for more civil engineering applications. Vikash Singh | Samreen Bano | Anand Kumar Yadav | Dr. Sabih Ahmad ""Feasibility of Artificial Neural Network in Civil Engineering"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22985.pdf
Paper URL: https://www.ijtsrd.com/engineering/civil-engineering/22985/feasibility-of-artificial-neural-network-in-civil-engineering/vikash-singh
A one decade survey of autonomous mobile robot systems IJECEIAES
Recently, autonomous mobile robots have gained popularity in the modern world due to their relevance technology and application in real world situations. The global market for mobile robots will grow significantly over the next 20 years. Autonomous mobile robots are found in many fields including institutions, industry, business, hospitals, agriculture as well as private households for the purpose of improving day-to-day activities and services. The development of technology has increased in the requirements for mobile robots because of the services and tasks provided by them, like rescue and research operations, surveillance, carry heavy objects and so on. Researchers have conducted many works on the importance of robots, their uses, and problems. This article aims to analyze the control system of mobile robots and the way robots have the ability of moving in real-world to achieve their goals. It should be noted that there are several technological directions in a mobile robot industry. It must be observed and integrated so that the robot functions properly: Navigation systems, localization systems, detection systems (sensors) along with motion and kinematics and dynamics systems. All such systems should be united through a control unit; thus, the mission or work of mobile robots are conducted with reliability.
Genome-wide transcription profiling is a powerful technique in studying disease susceptible footprints. Moreover, when applied to disease tissue it may reveal quantitative and qualitative alterations in gene expression that give information on the context or underlying basis for the disease and may provide a new diagnostic approach. However, the data obtained from high-density microarrays is highly complex and poses considerable challenges in data mining. Past researches prove that neuro diseases damage the brain network interaction, protein- protein interaction and gene-gene interaction. A number of neurological research paper also analyze the relationship among damaged part. Analysis of gene-gene interaction network drawn by using state-of-the-art gene database of Alzheimer’s patient can conclude a lot of information. In this paper we used gene dataset affected with Alzheimer’s disease and normal patient’s dataset from NCBI databank. After proper processing the .CEL affymetrix data using RMA, we use the processed data to find gene interaction outputs. Then we filter the output files using probe set filtering attributes p-value and fold count and draw a gene-gene interaction network. Then we analyze the interaction network using GeneMania software.
A mobile application which can save time, effort and money by giving technical video explanation based on the recognized image for learners. The collected video information contains all the detailed explanation of the scanned image done by the user. This application groups Augmented reality , 3d objects , sound , video , AI for image recognition into an easy and compact application for the benefit of the every learner. This web application is built C#, UNITY, VUFORIA with the help of Vuforia server connected by asserts. This mobile application serves as an easier way to access details and documentaries related to recognized object. It includes an automatic AR Camera and image target along with the video player which makes it easier for recognizing the image and to learn. The database is done with Vuforia cloud database. The UI provides an excellent user friendly environment that makes the communication more interactive.
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
September 2022-Top 10 Cited Articles-International Journal of Embedded System...ijesajournal
International Journal of Embedded Systems and Applications (IJESA) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Embedded Systems and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Embedded Systems and establishing new collaborations in these areas.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Embedded Systems & applications.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...ClaraZara1
With the simplicity of transmission of data over the web increasing, there has more prominent need for adequate security mechanisms. Trust management is essential to the security framework of any network. In most traditional networks both wired and wireless centralized entities play pivotal roles in trust management. The International Journal of Security, Privacy and Trust Management ( IJSPTM ) is an open access peer reviewed journal that provides a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
New Research Articles 2020 July Issue International Journal of Software Engin...ijseajournal
The International Journal of Software Engineering & Applications (IJSEA) is a bi-monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Software Engineering & Applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern software engineering concepts & establishing new collaborations in these areas.
New Research Articles 2020 September Issue International Journal of Software ...ijseajournal
International Journal of Software Engineering & Applications (IJSEA)- ERA Indexed
ISSN: 0975 - 9018 (Online); 0976-2221 (Print)
http://www.airccse.org/journal/ijsea/ijsea.html
New Research Articles 2020 September Issue International Journal of Software Engineering & Applications (IJSEA)
Current Issue: September 2020, Volume 11, Number 5
Secure Descartes: A Security Extension to Descartes Specification Language
Venkata N Inukollu1 and Joseph E Urban2, 1Purdue University, USA, 2Arizona State University, USA
Iterative and Incremental Development Analysis Study of Vocational Career Information Systems
Isyaku Maigari Ibrahim, Ogwueleka Francisca Nonyelum and Isah Rambo Saidu, Nigerian Defense Academy, Nigeria
MASRML - A Domain-specific Modeling Language for Multi-agent Systems Requirements Gilleanes Thorwald Araujo Guedes1, Iderli Pereira de Souza Filho1, Lukas Filipe Gaedicke1, Giovane D’Ávila Mendonça1, Rosa Maria Vicari2 and Carlos Brusius2, 1Pampa Federal University, Brazil, 2Federal University of Rio Grande do Sul, Brazil
http://www.airccse.org/journal/ijsea/vol11.html
Most trending articles 2020 - International Journal of Network Security & Its...IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
City i-Tick: The android based mobile application for students’ attendance at...journalBEEI
This paper presents City i-Tick, the android based mobile application for students’ attendance at a university. In this study, we developed mobile application for lecturers to take students’ attendance in City University, Petaling Jaya. Managing students’ attendance during lecture periods has become a difficult challenge. The research objectives for this study are to identify user requirement for City i-Tick, to design and develop City i-Tick, and to demonstrate the prototype of City i-Tick. The study is a narrative participatory design and exploits Design Thinking as the research methodology. City i-Tick was successfully validated by 14 lecturers and System Usability Scale (SUS) was used to determine the findings of the study. We found that City i-Tick is effective for lecturers in taking attendance because it is easy to use, easy to learn, and the users feel confident when using this application.
New Research Articles 2020 January Issue International Journal of Software En...ijseajournal
Proposing Automated Regression Suite Using Open Source Tools for A Health Care Solution
Anjali Rawat and Shahid Ali, AGI Institute, New Zealand
Quality Assessment Model of the Adaptive Guidance
Hamid Khemissa1 and Mourad Oussalah2, 1USTHB: University of Science and Technology Houari Boumediene, Algeria and 2Nantes University, France
An Application of Physics Experiments of High School by using Augmented Reality
Hussain Mohammed Abu-Dalbouh, Samah Mohammed AlSulaim, Shaden Abdulaziz AlDera, Shahd Ebrahim Alqaan, Leen Muteb Alharbi and Maha Abdullah AlKeraida, Qassim University, Kingdom of Saudi Arabia
On the Relationship between Software Complexity and Security
Mamdouh Alenezi and Mohammad Zarour, Prince Sultan University, Saudi Arabia
Structural Complexity Attribute Classification Framework (SCACF) for Sassy Cascading Style Sheets
John Gichuki Ndia1, Geoffrey Muchiri Muketha1 and Kelvin Kabeti Omieno2, 1Murang’a University of Technology, Kenya and 2Kaimosi Friends University College, Kenya
http://www.airccse.org/journal/ijsea/vol11.html
June 2020: Top Download Articles in Advanced Computational Intelligenceaciijournal
Advanced Computational Intelligence: An International Journal (ACII) is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of computational intelligence. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced computational intelligence concepts and establishing new collaborations in these areas.
Similar to Top Computer Science & Information Technology Articles of 2019 (20)
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Top Computer Science & Information Technology Articles of 2019
1. Top Computer Science &
Information Technology
Articles of 2019
International Journal of Computer Science
and Information Technology (IJCSIT)
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
2. METHODOLOGY AND ARCHITECTURE FOR SAFETY
MANAGEMENT
Matthieu Carré1,2
, Ernesto Exposito1
and Javier Ibañez-Guzmán1,2
1
Univ Pau & Pays Adour, E2S UPPA, LIUPPA, EA3000, Anglet, 64600, France
2
Renault S.A.S, 1 av. du Golf, Guyancourt, 78288, France.
ABSTRACT
The design of complex systems, as in the case of autonomous vehicles, requires a
specialized systems engineering methodology and an adapted modelling framework. In
particular, the integration of non-functional requirements, as important as the Safety,
requires from this methodological framework the well-adapted semantic expression of
constraints as well as their traceability during all phases of analysis, design and
implementation. This paper focuses on the study of model-based autonomous system design
and investigates the design flows and initiatives grasping with this complex computational
model. The specialization of the ARCADIA methodology will be illustrated in a real
industrial case.
KEYWORDS
Model Based System Engineering, Safety, Autonomous vehicles, System Engineering
analysis, System Engineering design.
Full Text: https://aircconline.com/csit/papers/vol9/csit91801.pdf
9th
International Conference on Computer Science, Engineering and
Applications (ICCSEA 2019)
http://airccse.org/csit/V9N18.html
3. REFERENCES
[1] Joseph Sifakis. Autonomous systems – an architectural characterization. In Models, Languages,
and Tools for Concurrent and Distributed Programming, pages 388–410. Springer International
Publishing, 2019. doi: 10.1007/ 978-3-030-21485-2_21.
[2] Gizem, Aksahya & Ayese, Ozcan (2009) Coomunications & Networks, Network Books, ABC
Publishers.
[3] James S Albus, Hui-Min Huang, Elena R Messina, Karl Murphy, Maris Juberts, Alberto
Lacaze, Stephen B Balakirsky, Michael O Shneier, Tsai Hong Hong, Harry A Scott, et al. 4d/rcs
version 2.0: A reference model architecture for unmanned vehicle systems. NIST
Interagency/Internal Report (NISTIR)-6910, 2002.
[4] J Kephart, D Chess, Craig Boutilier, Rajarshi Das, and William E Walsh. An architectural
blueprint for autonomic computing. IBM White paper, June 2006. doi: 10.1.1.150.1011. URL
https://pdfs.semanticscholar.org/0e99/ 837d9b1e70bb35d516e32ecfc345cd30e795.pdf.
[5] Ö. S ̧. Tas ̧, F. Kuhnt, J. M. Zöllner, and C. Stiller. Functional system architectures towards fully
automated driving. In 2016 IEEE Intelligent Vehicles Symposium (IV), pages 304–309, June
2016. doi: 10.1109/IVS.2016.7535402.
[6] J. Lygeros, D. N. Godbole, and M. E. Broucke. Design of an extended architecture for degraded
modes of operation of ivhs. In American Control Conference, Proceedings of the 1995, volume
5, pages 3592–3596 vol.5, Jun 1995. doi: 10.1109/ACC.1995.533806.
[7] Yrvann Emzivat, Javier Ibanez-Guzman, Herve Illy, Philippe Martinet, and Olivier H. Roux. A
formal approach for the design of a dependable perception system for autonomous vehicles. In
2018 21st International Conference on Intelligent Transportation Systems (ITSC). IEEE, nov
2018. doi: 10.1109/itsc.2018.8569903.
[8] Andreas Reschka, Jürgen Rüdiger Böhmer, Tobias Nothdurft, Peter Hecker, Bernd Lichte, and
Markus Maurer. A surveillance and safety system based on performance criteria and functional
degradation for an autonomous vehicle. In 2012 15th International IEEE Conference on
Intelligent Transportation Systems, pages 237–242. IEEE, 2012.
[9] ISO 26262 road vehicles – functional safety, 2018. URL http:
//www.iso.org/iso/home/store/catalogue_tc/catalogue_ detail.htm?csnumber=43464.
[10] Colwell, B. Phan, S. Saleem, R. Salay, and K. Czarnecki. An automated vehicle safety concept
based on runtime restriction of the operational design domain. In 2018 IEEE Intelligent
Vehicles Symposium (IV), pages 1910–1917, June 2018. doi: 10.1109/IVS.2018.8500530.
[11]Sagar Behere and Martin Törngren. Systems Engineering and Architecting for Intelligent
Autonomous Systems, chapter 13, pages 313–351. Springer International Publishing, Cham,
2017. ISBN 978-3-319-31895-0. doi: 10.1007/978-3-319-31895-0_13. URL
https://doi.org/10.1007/ 978-3-319-31895-0_13. Computer Science & Information Technology
(CS & IT) 15
[12] Holger Giese, Nelly Bencomo, Liliana Pasquale, Andres J. Ramirez, Paola Inverardi, Sebastian
Wätzoldt, and Siobhán Clarke. Living with Uncertainty in the Age of Runtime Models, pages
47–100. Springer International Publishing, Cham, 2014. ISBN 978-3-319-08915-7. doi:
10.1007/978-3-319-08915-7_3. URL https://doi.org/10.1007/978-3-319-08915-7_3.
[13] Milos Ojdanic. Systematic literature review of safety-related challenges for autonomous
4. systems in safety-critical applications. Master’s thesis, MÃlardalen University, School of
Innovation Design and Engineering, VÃsterÃs, Sweden, 2019.
[14] Sagar Behere and Martin Törngren. Systems Engineering and Architecting for Intelligent
Autonomous Systems, chapter 13, pages 313–351. Springer International Publishing, Cham,
2017. ISBN 978-3-319-31895-0. doi: 10.1007/978-3-319-31895-0_13. URL
https://doi.org/10.1007/ 978-3-319-31895-0_13.
[15] Nicola Dragoni, Saverio Giallorenzo, Alberto Lluch-Lafuente, Manuel Mazzara, Fabrizio
Montesi, Ruslan Mustafin, and Larisa Safina. Microservices: yesterday, today, and tomorrow.
CoRR, abs/1606.04036, 2016. URL http://arxiv. org/abs/1606.04036.
[16] Martin Fowler and James Lewis. Microservices: a definition of this new architectural term.
ThoughtWorks. http://martinfowler.com/articles/microservices.html [last accessed on July 06,
2016], 2014. URL http://martinfowler.com/ articles/microservices.html.
[17] D. Rodrigues, R. de Melo Pires, E. A. Marconato, C. Areias, J. C. Cunha, K. R. L. J. Castelo
Branco, and M. Vieira. Service-oriented architectures for a flexible and safe use of unmanned
aerial vehicles. IEEE Intelligent Transportation Systems Magazine, 9(1):97–109, Spring 2017.
ISSN 1939-1390. doi: 10.1109/MITS.2016. 2611038.
[18] Nancy G. Leveson and John P. Thomas. STPA Handbook. MIT Partnership for a Systems
Approach to Safety (PSAS, March 2018. URL
http://psas.scripts.mit.edu/home/get_file.php?name= STPA_handbook.pdf.
[19] Gerrit Bagschik, Torben Stolte, and Markus Maurer. Safety analysis based on systems theory
applied to an unmanned protective vehicle. Procedia Engineering, 179:61 – 71, 2017. ISSN
1877- 7058. doi: http://dx.doi.org/10.1016/j.proeng.2017. 03.096. URL
http://www.sciencedirect.com/science/article/ pii/S1877705817312122. 4th European
{STAMP} Workshop 2016, {ESW} 2016, 13-15 September 2016, Zurich, Switzerland.
[20] Shawn A. Cook, Hsing-Hua Fan, Krzysztof Pennar, and Padma Sundaram. Building behavioral
competency into stpa process models for automated driving systems. March 2018.
GiedreSabaliauskaite,LinShenLiew,andJinCui.Integratingautonomousvehicle safety and
security analysis using stpa method and the six-step model. International Journal on Advances
in Security, 11:160–169, July 2018
[21] Mark A. Vernacchia. Gm presentation for introducing stamp/stpa tools into standards. March
2018.
[22] Asim Abdulkhaleq, Stefan Wagner, Daniel Lammering, Hagen Boehmert, and Pierre Blueher.
Using STPA in compliance with ISO 26262 for developing a safe architecture for fully
automated vehicles.
[23] Pascal (Consultant) Roques. Systems Architecture Modeling with the Arca- dia Method. ISTE
Press Ltd - Elsevier Inc, 2017. ISBN 9781785481680.
5. AN INTELLIGENT MOBILE APPLICATION TO AUTOMATE FOOD
HEALTH RECOMMENDATION USING DEEP LEARNING
Peiqi Gu1
, Yu Sun1
and Fangyan Zhang2
1
Department of Computer Science, California State Polytechnic University,
Pomona, CA, 91768 2ASML, San Jose, CA, 95131
ABSTRACT
As the global health condition declines, people have started to be more conscious about their
health. In addition, the development of deep learning, especially in the sector of image
recognition, proliferates, provides more convenience for people to monitor their health.
Even though some food recognition applications appear on the internet, most of them are
inaccurate, and there aren’t any researches that focus on the correlation between the
accuracy of the model and attribute of the model. In addition, it is still inconvenient for
people to gather information about how the food they eat everyday affects their health.
Hence, in this project, the advanced development of deep learning was utilized for making
an app which could be used to recognize a picture of the food taken by a phone and to
display the food’s effect on a person’s certain health conditions. This project, or the
application, has two main components: a model that can recognize the actual food through
the camera of the phone and a database that stores the effects of the foods toward different
kinds of health problems. After taking the photo, the application will display the effect of
the foods to certain health problems that the user wants to see.
The experiment part of this project was inclined more on the optimization of the image
recognition model. The result of this experiment indicated that more pictures in one
category, less categories in total, and higher image resolution can improve the accuracy of
the recognition model. This finding will be used on optimizing both the model and the
application.
KEYWORDS
Deep Learning, Food Health Recommendation
Full Text: https://aircconline.com/csit/papers/vol9/csit91703.pdf
9th
International Conference on Advances in Computing and Information Technology
(ACITY 2019)
http://airccse.org/csit/V9N17.html
6. REFERENCES
[1] Arel, Itamar, Derek C. Rose, and Thomas P. Karnowski. "Deep machine learning-a
new frontier in artificial intelligence research." IEEE computational intelligence
magazine 5.4 (2010): 13-18.
[2] https://www.sas.com/en_us/insights/analytics/machine-learning.html
[3] https://becominghuman.ai/ai-machine-learning-deep-learning-explained-in-5-minutes-
b88b6ee65846
[4] https://en.wikipedia.org/wiki/Deep_learning
[5] https://www.foodvisor.io/
[6] https://www.zendesk.com/blog/machine-learning-and-deep-learning/
[7] https://codelabs.developers.google.com/codelabs/tensorflow-for-poets/#0
[8] https://towardsdatascience.com/train-image-recognition-ai-with-5-lines-of-code-
8ed0bdd8d9ba
7. AUTOMATION REGRESSION SUITE CREATION FOR HEALTH
CARE SOLUTION
Anjali Rawat and Shahid Ali, AGI Institute, New Zealand
ABSTRACT
Regression testing is very important for dynamic verification. It helps to simulate a suite of
test cases periodically and after major changes in the design or its environment, in order to
check that no new bugs were introduced. Evidences regarding benefit of implementing
automation testing which includes saves of time and cost as it can re-run test scripts again
and again and hence is much quicker than manual testing, providing more confidence in the
quality of the product and increasing the ability to meet schedules and significantly reducing
the effort that automation requires from testers are provided on the basis of survey of 115
software professionals. In addition to this, automated regression suite has an ability to
explore the whole software every day without requiring much of manual effort. Also, bug
identification is easier after the incorrect changes have been made. Occupational Health
Management Solution (OHMS) is going through continuous development and requires
testing again and again to check if new feature implementation has affected the existing
functionality. In addition to this, The Company is facing issue in validation of the OHMS
installation at client site since it requires availability of testers to check the critical
functionality of the software manually. Company wants to create an automated regression
suite for OHMS which can be executed at client site for checking the functionality of the
software. In addition to this, this suite will also help the testing team to validate if the new
features which have been added to the existing software are affecting the existing system or
not. Visual studio, Selenium Webdriver, Visual SVN and Trello are the tools which have
been used to achieve the creation of automation regression suite. The current research will
provide guidelines to the future researchers on how to create an automated regression suite
for any web application using open source tools.
KEYWORDS
Automation testing, Regression testing, Visual Studio, C#, Selenium Webdriver, Agile-
Scrum
Full Text: https://aircconline.com/csit/papers/vol9/csit91402.pdf
5th
International Conference on Computer Science and Information Technology (CSTY 2019)
http://airccse.org/csit/V9N14.html
8. REFERENCES
[1] Shai Fine, S. U. (2004). Probabilistic regression suites for functional verification. In
Proceedings of the 41st annual Design Automation Conference (DAC '04) (pp. 49-54). New
York, NY, USA: ACM.
[2] Dudekula Mohammad Rafi, K. R. (2012). Benefits and limitations of automated software
testing: systematic literature review and practitioner survey. In Proceedings of the 7th
International Workshop on Automation of Software Test (AST '12) (pp. 36-42). USA: IEEE
Press, Piscataway.
[3] Stanislav Stresnjak, Z. H. (2011). Usage of Robot Framework in Automation of Functional Test
Regression. The Sixth International Conference on Software Engineering Advances.
[4] Prakash, K. S. (2017). A Comparative Study of Testing Framework with Special Emphasis on
selenium for financial applications. International Journal of soft computing , 148-155.
[5] Elior Vila, G. N. (2017). Automation Testing Framework for Web Applications with Selenium
WebDriver: Opportunities and Threats. In Proceedings of the International Conference on
Advances in Image Processing (ICAIP 2017) (pp. 144-150). New York, NY, USA: ACM.
[6] Jamshaid G. Mohebzada, G. R. (2011). SRP-plugin: a strategic release planning plug-in for
visual studio 2010. Proceeding of the 1st workshop on Developing tools as plug-ins - TOPI '11
(pp. 36-39). New York, NY, USA: ACM.
[7] Johnson, H. A. (2017). “Trello.”. Journal of the Medical Library Association : JMLA , 209–
211. 30 Computer Science & Information Technology (CS & IT)
[8] M. Mahalakshmi1, D. M. (2013). Traditional SDLC Vs Scrum Methodology – A Comparative
Study. International Journal of Emerging Technology and Advanced Engineering , 3(6).
[9] Maurizio Leotta, D. C. (2013). Comparing the maintainability of selenium WebDriver test suites
employing different locators: a case study. In Proceedings of the 2013 International Workshop
on Joining AcadeMiA and Industry Contributions to testing Automation (JAMAICA 2013) (pp.
53-58). New York, NY, USA: ACM
AUTHORS
I am Anjali Rawat and a QA Analyst. Have worked with Wipro Limited, India
where I get an opportunity to work with clients like Vodafone, Cisco and Bharti
Airtel. I had experience in database testing, regression testing, manual testing and
automation testing. I have recently complete d my graduate diploma in software
testing from AGI Education Limited and now currently working as a QA lead in
Born Digital, New Zealand. I am passionate about testing and love to deliver
quality product to the customers.
Dr. Shahid Ali is a senior lecturer and IT program leader at AGI Education Limited, Auckland, New
Zealand. He has published number of research papers on ensemble learning. His expertise and
research interests include ensemble learning, machine learning, data mining and knowledge
discovery
9. QUALITY MODEL TO THE ADAPTIVE GUIDANCE
Hamid Khemissa1
and Mourad Oussala2
,
1
USTHB: University of Science and Technology Houari Boumediene, Algeria and
2
Nantes University, France
ABSTRACT
The need for adaptive guidance systems is now recognized for all software development
processes. The new needs generated by the mobility context for software development led
these guidance systems to both quality and ability adaptation to the possible variations of the
development context. This paper deals with the adaptive guidance quality to satisfy the
developer’s guidance needs. We propose a quality model to the adaptive guidance. This
model offers a more detailed description of the quality factors of guidance service
adaptation. This description aims to assess the quality level of each guidance adaptation
factor and therefore the evaluation of the adaptive quality guidance services.
KEYWORDS
Quality model, Guidance System Quality, Adaptive Guidance, Plasticity
Full Text: https://aircconline.com/csit/papers/vol9/csit91303.pdf
6th
International Conference on Computer Science, Engineering and Information
Technology (CSEIT-2019)
http://airccse.org/csit/V9N13.html
10. REFERENCES
[1] Garcia, I. and Pacheco, C. (2009): Toward Automated Support for Software Process
Improvement Initiatives in Small and Medium Size Enterprises. Book chapter. Software
Engineering Research, Management and Applications Volume 253, pp. 51–58. C_Springer-
Verlag Berlin Heidelberg. ISBN: 978-3-642-05440-2.
[2] Kirk, D.C., Macdonell, S.G., and Tempero, E. (2009): Modeling software processes - a focus on
objectives, in Proceedings of the Onward. Conference. Orlando FL, USA, ACM Press, pp.941-
948.
[3] Calvary, G., Coutaz, J., Thevenin, D., Limbourg, Q., Souchon, N., Bouillon, L., Florins , M.,
and Vanderdonckt, J. (2002): Plasticity of User Interfaces: A Revised Reference Framework.
In: TAMODIA 2002.
[4] Coutas, J. (2010): EICS '10. User interface plasticity: model driven engineering to the limit.
Proceedings of the 2nd ACM SIGCHI symposium on engineering interactive computing
systems. June 2010.
[5] Khemissa, H., Ahmed-Nacer, M. and Oussalah, M. (2012): Adaptive Guidance based on
Context Profile for Software Process Modeling. Information Technology and Computer
Science, July 2012, 7, pp 50-60. Volume 4, number 7. DOI: 10.5815/ijitcs.2012.07.07.
[6] Khemissa, H., Ahmed-Nacer, M. and Oussalah , M. (2014): Plasticity of a Guidance System for
Software Process Modeling. First International Conference on Computer Science Information
Technology (CoSIT), pp. 49–63, Bangalore, India. CS & IT-CSCP 2014. DOI:
10.5121/csit.2014.4905.
[7] OMG. Inc. (2008): Software and System Process Engineering Meta-Model Specification
version 2.0: Formal/2008-04-01. [8] Estublier, J., Villalobos, J., Tuyet lean H, Jamal-Sanlaville,
S. AND Vega, G. (2003): An Approach and Framework for Extensible Process Support System.
In Proceedings 9th European Workshop on Software Process Technology (EWSPT 2003),
Helsinki, Finland, 2003-09-01.
[9] Coulette B., Crégut X., Dong T.B.T. and Tran D.T., (2000): RHODES, a Process Component
Centered Software Engineering Environment”, ICEIS2000, 2nd International Conference on
Enterprise Information Systems, Stafford, pp 253-260, July 2000. Computer Science &
Information Technology (CS & IT) 43
[10] Tran Hanh Nhi, Coulette, B., Crégut, X., Thuy Dong Thi Bich, and Thu Tran Dan. (2003):
Modélisation du méta-procédé RHODES avec SPEM. Dans : Recherche Informatique
VietnamFrancophone (RIVF'03), Hanoi, Vietnam
[11] Mordal-Manet, K., Laval, J. and Ducasse, S. (2011): Modèles de mesure de la qualité des
logiciels, in Evolution et Rénovation des Systèmes Logiciels. Hermès 2011. .
[12] Mordal-Manet, K., Anquetil, N., Laval, J., Serebrenik, A., Vasilescu, B. and Ducasse, S. (2013)
Software quality metrics aggregation in industry. In Journal of Software: Evolution and Process
25 (10) p. 1117—1135, 2013. DOI: 10.1002/smr.1558.
[13] Mc Call , J., Richards, P. and Walters, G. (1976): Factors in Software Quality. NTIS
Springfield.
[14] ISO/IEC. Iso/iec 9126-3 software engineering -product quality- part 3: Internal metrics, 2003.
11. [15] ISO/IEC. Iso/iec 25010-2011 software engineering -product quality- part 1: Quality model,
2011.
[16] ISO/IEC. Iso/iec 25000-2014 software engineering-software product quality requirement and
evaluation, 2014.
[17] Balmas, F., Bellingard, F., Denier, S., Ducasse, S., Franchet, B., Laval, J., Mordal-Manet, K.,
and Vaillergues, P. (2010): The Squale Quality Model. INRIA-00533654, Version 1-Second
Edition, 8 Nov 2010. http://www.squale.org/quality-models-site/deliverables.html
[18] Boehm, B.W., Abts, C., Brown, A.W., Chulani, S., Clark, B.K., Horowitz, E., Madachy, R.,
Reifer, D.J., and Bert Steece, B. M. (2009): Software Cost Estimation with COCOMO II.
Prentice Hall Edition, ISBN: 0137025769, 978013702576
AUTHORS
Hamid Khemissa is a full associate professor at Computer Systems Department, Faculty of
Electronics and Computer Science, USTHB University, Algiers. He is member of the software
engineering team at computer system laboratory LSI, USTHB. His current research interests include
Software Process Modeling and Software Modeling Assistance.
Mourad Chabane Oussalah is a full Professor of Computer Science at the University of Nantes and
the chief of the software architecture modeling Team. His research concerns software architecture,
object architecture and their evolution. He worked on several European projects (Esprit, Ist, ...). He
is (and was) the leader of national project (France Telecom, Bouygues telecom, Aker-Yard-STX, ...).
He earned a BS degree in Mathematics in 1983, and Habilitation thesis from the University of
Montpellier in 1992.
12. AN IRREGULAR SPATIAL CLUSTER DETECTION COMBINING THE
GENETIC ALGORITHM
Tao Wang1
, Yitong Zhao2
, Yonglin Lei3
, Mei Yang4
and Shan Mei5
,
1,3,4,5
National University of Defence Technology, China and 2Troop of PLA, China
ABSTRACT
Spatial cluster detection is widely used for disease surveillance, prevention and containment.
However, the commonly used clustering methods cannot resolve the conflicts between the accuracy
and efficiency of the detection. This paper proposes an improved method for flexiblyshaped spatial
scanning, which can identify irregular spatial clusters more accurately and efficiently. By using a
genetic algorithm, we also accelerate the detection process. We convert geographic information to a
network structure, in which nodes represent the regions and edges represent the adjacency
relationship between regions. According to Kulldorff’s spatial scan statistics, we set the objective
function. A constraint condition based on the spectral graph theory is employed to avoid
disconnectedness or excessive irregularity of clusters. The algorithm is tested by analysing the
simulation data of H1N1 influenza in Beijing. The results show that compared with the previous
spatial scan statistic algorithms, our algorithm performs better with shorter time and higher accuracy.
KEYWORDS
Spatial cluster detection, flexibly-shaped spatial scanning, H1N1 influenza in Beijing
Full Text: https://aircconline.com/csit/papers/vol9/csit90802.pdf
9th
International Conference on Computer Science and Information Technology (CCSIT 2019)
http://airccse.org/csit/V9N08.html
13. REFERENCES
[1] Kulldorff M 1997 A spatial scan statistic J. Communications in statistics-theory and methods
26(6). 1481-96. [2] Huang L, Kulldorff M and Gregorio D 2007 A spatial scan statistic for
survival data J. Biometrics 63(1). 109 -18.
[3] Neill D B, Moore A W 2004 A Fast Multi-Resolution Method for Detection of Significant
Spatial Disease Clusters J. Advances in Neural Information Processing Systems 13(4). 651 -
658.
[4] Kulldorff M, Huang L and Pickle L 2006 An elliptic spatial scan statistic J. Statistics in
medicine 25(22). 3929-43.
[5] Tango T, Takahashi K 2005 A flexibly shaped spatial scan statistic for detecting clusters J.
International journal of health geographic 4(1). 11.
[6] Duczmal L, Kulldorff M and Huang L 2006 Evaluation of spatial scan statistics for irregularly
shaped clusters J. Journal of Computational and Graphical Statistics15(2). 428-42. 20
Computer Science & Information Technology (CS & IT)
[7] Neill D B 2012 Fast subset scan for spatial pattern detection J. Journal of the Royal Statistical
Society: Series B (Statistical Methodology)74(2). 337-60.
[8] Chung F R 2012 Spectral graph theory C.Regional Conference Series in Mathematics92. 212.
[9] Zhao Y, Mei S and Zhang W 2017 Irregular spatial cluster detection based on h1n1 flu
simulation in Beijing C. the Asian Simulation Conference. 2017. 169-79