Results (241)
Search Parameters:
Section: cisAn Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware
Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…
Read MoreEfficient and Scalable Ant Colony Optimization based WSN Routing Protocol for IoT
IoT integrates and connects intelligent devices or objects with varied architectures and resources. The number of IoT devices is growing exponentially. Due to the massive wave of IoT objects, their diversity and heterogeneity among their architectures, the existing communication protocols for wireless networks become ineffective in the context of IoT. Wireless Sensor Network (WSN) has…
Read MoreEducation Value Chain Model for Examination, Grading, and Evaluation Process in Higher Education based on Blockchain Technology
Blockchain is a solution to improve data integrity and minimize data manipulation. Blockchain technology can be used in student examination management in universities. The process of managing student examination produces some information that can be stored in a blockchain database such as information about the lecturer as the exam creator, exam proctor, student attendance, student…
Read MoreSentiment Analysis in English Texts
The growing popularity of social media sites has generated a massive amount of data that attracted researchers, decision-makers, and companies to investigate people’s opinions and thoughts in various fields. Sentiment analysis is considered an emerging topic recently. Decision-makers, companies, and service providers as well-considered sentiment analysis as a valuable tool for improvement. This research paper…
Read MoreHigh-Performance Computing: A Cost Effective and Energy Efficient Approach
The world is witnessing unprecedented advancements in ICT (Information & Communication Technology) related fields. These advancements are further boosted with the emergence of big data. It goes without saying that big data requires two major operations: storage and processing. The latter is usually provided through High-Performance Computing (HPC) which is delivered through two main venues:…
Read MoreFeatures Preference using Conjoint Analysis Method for E-marketplace Social Care System
With the features of the application system make it easier for users to transact, make the user feel comfortable in using the application system. The problem is that the intensity of application usage decreases judging by the application rating given by the user each time they perform a transaction, this is because the company initially…
Read MoreESP2: Embedded Smart Parking Prototype
The technological evolution and the frequent use of the Internet as a technology within the framework of the Internet of Things and Robotics has affected various fields such as Industry 4.0, smart agriculture, smart cities, home automation and autonomous cars. These advances applied to everyday life have facilitated the implementation of new concepts to minimize…
Read MoreApplication of Deep Belief Network in Forest Type Identification using Hyperspectral Data
Forest mapping by remote sensing is a hot topics in forestry. At present, many researchers focus on the research of forest type classification or tree species identification using different machine learning methods and try to improve the accuracy of classification of satellite image. However, forest type classification using deep belief network (DBN) is still limited…
Read MoreImplementation of a Journalist Business Intelligence in Social Media Monitoring System
The need to update the news at this time is very important. Journalists have responsibilities as their job. Apart from conveying the correct news to the public, they must also deliver it quickly. Journalists who are tasked as news seekers must always be updated about the latest news that is viral, therefore a journalist must…
Read MoreSocial Engineering to Establish Digital Culture in Higher Education
This study aims to discuss the establishment of digital culture in higher education as an effort of higher education to align themselves with the development of science and technology so that that higher education is always at the forefront in the enforcement and provide high-quality education. The method used in this study is a qualitative…
Read MoreRecommendation System for SmartMart-A Virtual Supermarket
The current online shopping system does not provide the actual shopping experience to the users where they scroll through the web pages and select an item to purchase, which becomes monotonous soon and lacks the shopping experience. This paper describes the development of the SmartMart, a 3D shopping mart where the user can navigate around…
Read MoreLEACH Based Protocols: A Survey
Advances in the world of communications and information technology, as well as the urgent necessity to monitor particular areas and regions, have led to a considerable and influential development in the world of wireless sensor nodes. As they are small, low-cost multi-purpose nodes with limited energy and capabilities. The most important points that deserve research…
Read MoreDevelopment and Performance Analysis of HRPL Using 6LoWPAN CC2538 Module for IoT Ecosystem
The Internet of Things (IoT) application has been experiencing increasingly progressive demand, especially for embedded devices (ED). However, the ED has limited capabilities, low power consumption resources, and low bandwidth in connecting to the Internet by using Wireless Sensor Networks (WSNs). Therefore, the WSNs form creates a necessity for new technologies and protocols for the…
Read MoreDesign of a Mobile Application for the School Enrollment Process in Order to Prevent Covid-19
In 2020, a great change occurred around the world due to the covid-19 pandemic, daily activities were restructured and thanks to technological advance it has been an ideal means to carry out remote work. With regard to education in Peru, it was paralyzed for a long time and only obtained in later months the option…
Read MoreMobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test
This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…
Read MoreDocker-C2A : Cost-Aware Autoscaler of Docker Containers for Microservices-based Applications
This article proposes a cost-aware autoscaler for microservices-based applications deployed with docker containers. This autoscaler decreases the cost of the application deployment as it reduces computing resources. In elastic treatment, microservice resources are scaled when the used metric as the central processing unit (CPU) exceeds the threshold. In case of threshold exceeding, an autoscaler adds…
Read MoreUpdated Analysis of Business Continuity Issues Underlying the Certification of Invoicing Software, Considering a Pandemic Scenario
Portuguese organizations that have invoicing software, certified by the Tax and Customs Authority, need to comply with technical requirements that involve business continuity and disaster recovery. The recent tax legislative changes created conditions for the dematerialization of documents, allowing waiving invoice printing, encouraging the adoption of an electronic invoicing and document archiving system. The pandemic…
Read MoreTowards a Smart Campus for Qassim University: An Investigation of Indoor Navigation System
With the advancements in technology, smart entities are becoming increasingly intelligent, therefore, increasing their interaction capabilities with their surrounding environment. Apart from the traditional smart low profile devices, these entities now involve cars, mobiles, televisions, and extend to universities and smart cities. One of the bi-product of the smart cities is the emergence of the…
Read MorePolarity Switch within Social Networks
It is the age of information. Social networks are the main reason why, following the increasing activity of online users. With this comes a big impact on the real world, it can be positive and highly negative as well. Therefore, research in this field is highly needed for the betterment of societal behaviors within social…
Read MoreA Model-Driven Approach for Reconfigurable Systems Development
Reconfigurable systems are considered as promising technology that enables the design of more flexible and dynamic applications. However, actually existent design flows are either low-level (so complex) or they lack support for automatic synthesis. In this paper, we present an ontology-based modeling approach for reconfigurable systems. Our approach is based on model-driven engineering process and…
Read MoreDependency Head Annotation for Myanmar Dependency Treebank
Complete manual annotation of dependency treebank needs resources like annotators and annotation tools and takes long time and has high possibility of inconsistent annotations for free word order languages such as Myanmar. This paper describes a dependency head annotation scheme with Universal part-of-speech and Universal Dependencies for Myanmar dependency treebank. Currently 22,810 sentences and 680,218…
Read MoreOptimization of Multi-user Face Identification Systems in Big Data Environments
Computer vision offers several strategies that permit computers to comprehend the substance of inputted data to extract the relevant highlights features. That gives the possibility to develop several successful recognition systems like face identification. One of the enormous difficulties these days is the way to have a prompt identification face in a multi-client identification system.…
Read MoreOntology-based Data Management Tool for Studying Radon Concentration
Interpreting data for solving information needs demands an understanding of the semantics of row data. In this paper, an ontology-driven management of data of the presence of radon gas in soil is presented. The main contribution of this research relies on the formal definition of the semantic of the presence of radon in the dimensions…
Read MoreAmerican Sign Language Recognition Based on MobileNetV2
Sign language is a form of communication language designed to link a deaf-mute person to the world. To express an idea it requires the use of hand gestures and body movement. However, the bulk of the general population remain uneducated to understand the sign language. Therefore, a translator is required to facilitate the communication. This…
Read MoreIntrusion Detection and Classification using Decision Tree Based Key Feature Selection Classifiers
Feature selection method applied on an intrusion dataset is used to classify the intrusion data as normal or intrusive. We have made an attempt to detect and classify the intrusion data using rank-based feature selection classifiers. A set of redundant features having null rank value are eliminated then the performance evaluation using various feature selection…
Read More
