INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY最新文献

筛选
英文 中文
A Review on Ontology Learning Approaches of Creating a Topic Map of Cybercrime Research 构建网络犯罪研究主题图的本体学习方法综述
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2019-02-01 DOI: 10.24297/IJCT.V18I0.8063
K. J. Lee
{"title":"A Review on Ontology Learning Approaches of Creating a Topic Map of Cybercrime Research","authors":"K. J. Lee","doi":"10.24297/IJCT.V18I0.8063","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.8063","url":null,"abstract":"Conducting an academic research requires getting a firm grasp of ongoing research issues as well as locating research materials effectively. Often research in different fields on a similar topic can assume diverse approaches due to different objectives and research goals in their own fields. Especially in an interdisciplinary research field like cybercrime, many research topics overlap with those of other research fields. Researchers in such a field, therefore, can benefit from understanding the related domains of one’s own research.  Topic maps provide methods for understanding research domain and managing relevant information resources at the same time. In this paper, we review a topic map solution to acquire knowledge structure and to locate information resources effectively. We address current problems of cybercrime research, review previous studies that use automated methods for topic map creation, and examine existing sets of methods for automatically extracting topic map components. Especially, the methods we discuss here are text mining techniques for extracting ontology components, denoted as ontology learning.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Agile Development and Its Tools Support Digital Transformation 敏捷开发及其工具如何支持数字化转型
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2019-02-01 DOI: 10.24297/IJCT.V18I0.8060
Fatimah Alruwaili, Muna Alrajhi, Kawther A. Saeedi
{"title":"How Agile Development and Its Tools Support Digital Transformation","authors":"Fatimah Alruwaili, Muna Alrajhi, Kawther A. Saeedi","doi":"10.24297/IJCT.V18I0.8060","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.8060","url":null,"abstract":"Digital transformation is the enabler for new reform of businesses, socialites and governments. It is also the platform to the 2030 Vision in Saudi Arabia and in many other countries. Agile Manifesto succeeded to manage software development in a rapid and reliable fashion. Furthermore, incremental delivery of software release ensure that software audiences are engaged while delivering the product, their comments are considered in every function and any changes in requirements are based on imperial use of the software. This ensure the delivery of functionalities matching customer demands as well as reduce project failure risk. For this reason, Agility has been adopted in most software companies as a guaranteed and easy way to implement the digital solutions for their companies. This paper examines the characteristics of agile frameworks, such as Scrum and XP, and Agile tools, such as Jira, Agilo, and others, that facilitate digital transformation. Then compare productivity and efficacy of agile frameworks with traditional SDLC methods. The paper is concluded with the features of agile framework that enable digital transformation such as incremental development, flexible requirements and customer engagement.   ","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122261993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Electric-Power Distribution and Load-Sharing on Smart-Grids: Analysis by Artificial Neural Network 基于人工神经网络的智能电网最优配电与负荷分担分析
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2019-01-24 DOI: 10.24297/IJCT.V18I0.8059
D. D. Groff, R. Melendez, P. Neelakanta, Hajar Akif
{"title":"Optimal Electric-Power Distribution and Load-Sharing on Smart-Grids: Analysis by Artificial Neural Network","authors":"D. D. Groff, R. Melendez, P. Neelakanta, Hajar Akif","doi":"10.24297/IJCT.V18I0.8059","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.8059","url":null,"abstract":"This study refers to developing an electric-power distribution system  with optimal/suboptimal load-sharing in the complex and expanding metro power-grid infrastructure.  That is, the relevant exercise is to indicate a smart forecasting strategy on optimal/suboptimal power-distribution to consumers served by a smart-grid utility.  An artificial neural network (ANN) is employed to model the said optimal power-distribution between generating sources and distribution centers.  A compatible architecture of the test ANN with ad hoc suites of training/prediction schedules is indicated thereof. Pertinent exercise is to determine smartly the power supported on each transmission-line  between generating to distribution-nodes.  Further, a “smart” decision protocol prescribing  the constraint that no transmission-line carries in excess of a desired load.  An algorithm is developed to implement the prescribed constraint via the test ANN; and, each value of the load  shared by each distribution-line  (meeting the power-demand of the consumers) is elucidated from the ANN output. The test ANN includes the use of a traditional multilayer architecture with feed-forward and backpropagation techniques; and,  a fast convergence algorithm (deduced in terms of eigenvalues of a Hessian matrix associated with the input data) is adopted. Further, a novel method based on information-theoretic heuristics (in Shannon’s sense) is invoked towards model specifications. Lastly, the study results are discussed with exemplified computations using appropriate field data.    ","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123782534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Multimodal Images Classification Based on DSMT Using Visual Saliency Model Fusion With SVM 基于视觉显著性模型与SVM融合的DSMT多模态图像分类改进
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2019-01-09 DOI: 10.24297/IJCT.V18I0.7956
Hanan Anzid, Gaëtan Le Goïc, A. Bekkari, A. Mansouri, D. Mammass
{"title":"Improvement of Multimodal Images Classification Based on DSMT Using Visual Saliency Model Fusion With SVM","authors":"Hanan Anzid, Gaëtan Le Goïc, A. Bekkari, A. Mansouri, D. Mammass","doi":"10.24297/IJCT.V18I0.7956","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7956","url":null,"abstract":"Multimodal images carry available information that can be complementary, redundant information, and overcomes the various problems attached to the unimodal classification task, by modeling and combining these information together. Although, this classification gives acceptable classification results, it still does not reach the level of the visual perception model that has a great ability to classify easily observed scene thanks to the powerful mechanism of the human brain. \u0000 In order to improve the classification task in multimodal image area, we propose a methodology based on Dezert-Smarandache formalism (DSmT), allowing fusing the combined spectral and dense SURF features extracted from each modality and pre-classified by the SVM classifier. Then we integrate the visual perception model in the fusion process. \u0000To prove the efficiency of the use of salient features in a fusion process with DSmT, the proposed methodology is tested and validated on a large datasets extracted from acquisitions on cultural heritage wall paintings. Each set implements four imaging modalities covering UV, IR, Visible and fluorescence, and the results are promising.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129682955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
CONTEXT AWARENESS FRAMEWORK FOR DEVELOPING MOBILE APPLICATIONS: A SURVEY OF SELECTED SMALL AND MEDIUM ENTERPRISES IN NAKURU TOWN, KENYA 开发移动应用程序的上下文感知框架:对肯尼亚纳库鲁镇选定的中小型企业的调查
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2019-01-02 DOI: 10.24297/IJCT.V18I0.7788
Peter Siele
{"title":"CONTEXT AWARENESS FRAMEWORK FOR DEVELOPING MOBILE APPLICATIONS: A SURVEY OF SELECTED SMALL AND MEDIUM ENTERPRISES IN NAKURU TOWN, KENYA","authors":"Peter Siele","doi":"10.24297/IJCT.V18I0.7788","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7788","url":null,"abstract":"Mobile applications act as valuable tools that can be used by entrepreneurs and small and medium enterprises (SMEs) alike to market their products/services and considerably reduce costs of doing business. The government of Kenya has invested billions of shillings in laying of fiber optic cables in Kenya, improving Kenya‘s ICT sector and coming up with projects aimed at promoting the use of technology among businesses and citizens alike. With all of these investments, there are challenges that hinder the use of business mobile applications by SMEs. Although context awareness in mobile applications is gaining recognition among mobile user and developer communities, many design scenarios still do not incorporate required context awareness as one of their primary goals. Although there are strong context awareness frameworks for mobile applications, there is still potential to improve the usability of virtual learning systems. The study established that the concept of context independence including the physical context independence and the logical context independence from the applications and mobile devices provides a graceful solution in the form of a methodological framework for the development of context-aware systems for SMEs in Nakuru Town.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Encryption Using Chaotic Cat Mapping in the Discrete Fourier Transform 离散傅里叶变换中使用混沌Cat映射的图像加密
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2018-11-29 DOI: 10.24297/IJCT.V18I0.7907
M. Alzain
{"title":"Image Encryption Using Chaotic Cat Mapping in the Discrete Fourier Transform","authors":"M. Alzain","doi":"10.24297/IJCT.V18I0.7907","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7907","url":null,"abstract":"The paper presents an secure image using the two dimensional chaotic cat mapping  (2D-CCM) in the Discrete Fourier Transform domain (DFT). The ciphering phase begins by applying the DFT on the plainimage to be encrypted and the resulted Fourier transformed image are scrambled using the 2D-CCM and finally an inverse DFT is applied to obtain the final encrypted image. The decryption phase applies a reverse  procedure to get the original plainimage. A set of encryption test experiments are employed to inspect the proposed DFT based 2D-CCM image cryptosystem. The experimental results verified and confirmed the superiority of the proposed DFT based 2D-CCM image cryptosystem.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134431170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Method of Moving Region Detection for Static Camera 静态摄像机的运动区域检测方法
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2018-11-14 DOI: 10.24297/IJCT.V12I6.3142
P. Goel, P. Kotak, A. Gupta
{"title":"Method of Moving Region Detection for Static Camera","authors":"P. Goel, P. Kotak, A. Gupta","doi":"10.24297/IJCT.V12I6.3142","DOIUrl":"https://doi.org/10.24297/IJCT.V12I6.3142","url":null,"abstract":"The moving object detection from a stationary video sequence is a primary task in various computer vision applications. In this proposed system; three processing levels are suppose to perform: detects moving objects region from the background image; reduce noise from the pixels of detected region and extract meaningful objects and their features (area of object, center point of area etc.). In this paper; background subtraction techniques is used for segments moving objects from the background image, which is capable for pixel level processing. Morphology operation (Erosion and dilation) are used to remove pixel to pixel noise. In last level, CCL algorithm is used for sorts out foregrounds pixels are grouped into meaningful connected regions and their features.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP 采用安全OTP的RSA、AES和Blowfish数据加密混合机制增强云安全性
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2018-11-06 DOI: 10.24297/IJCT.V18I0.7898
Gurjeet Singh, M. Garg
{"title":"Enhanced Cloud Security using Hybrid Mechanism of RSA, AES and Blowfish Data Encryption with Secure OTP","authors":"Gurjeet Singh, M. Garg","doi":"10.24297/IJCT.V18I0.7898","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7898","url":null,"abstract":"Cloud Computing has become one of the most talked about technologies in recent times and has got lots of attention from media as well as analysts because it is offering lots of opportunities. Enterprises have been determined to reduce computing costs and for that reason most of them started using it in IT technology then adapted virtualization technology. Cloud computing has revolutionized the way computing and software services are delivered to the clients on demand. It offers users the ability to connect to computing resources and access IT managed services with a previously unknown level of ease. Thus, security concerns among users of the cloud have become a major barrier to the widespread growth of cloud computing. In this research work, we have used the 3 step security mechanism for the keeping the data secure at the cloud. We have implemented the strong authentication mechanism using md5 encrypted OTP and enhanced the security of data using Cloud Broker and RSA, Blowfish and AES.  When you log on to your machine and then try to access a resource, say a file server or database, something needs to assure that your username and password are valid. With sensitive data stored in the cloud of the different users, we need a strong authentication mechanism along with OTP. Data breaches because of no/weak authentication. Afterwards we have verified the integrity of data stored at cloud provider using SHA2. Multiple parameters like processing time, processing cost, AES,RSA and blowfish encryption time, OTP generation and encryption time have been calculated and analyzed. We have been able to enhance the security by optimizing the processing time as well as processing cost. After implementing the proposed methodology, it has been summarized that the cloud security can be enhanced by applying the proposed mechanism. The proposed system has reduced the complexity, processing cost which increases the overall efficiency of the system.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Face Detection & Recognition using Tensor Flow: A Review 基于张量流的人脸检测与识别综述
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2018-11-06 DOI: 10.24297/IJCT.V18I0.7924
Isha Chawla
{"title":"Face Detection & Recognition using Tensor Flow: A Review","authors":"Isha Chawla","doi":"10.24297/IJCT.V18I0.7924","DOIUrl":"https://doi.org/10.24297/IJCT.V18I0.7924","url":null,"abstract":"Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128237196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compared Between Ipv6 And With Ipv4,Differences And Similarities Ipv6与Ipv4的比较,异同
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY Pub Date : 2018-10-29 DOI: 10.24297/IJCT.V17I2.7805
Z. Z. abousalem, M. A. Ashabrawy
{"title":"Compared Between Ipv6 And With Ipv4,Differences And Similarities","authors":"Z. Z. abousalem, M. A. Ashabrawy","doi":"10.24297/IJCT.V17I2.7805","DOIUrl":"https://doi.org/10.24297/IJCT.V17I2.7805","url":null,"abstract":"This paperprovides Advantages of using IPv6 andcomparison of IPv4 and IPv6,For that, it’s critical to understand the differences and similarities, Some points in the near future when the sheer size of billions new devices will throw the IPv6 switch.IPv4 and IPv6, where IPv6 is the enhanced version of IPv4, There are various differences between IPv4 and IPv6 protocol including its features, but the critical one is the number of addresses (Address space) it creates. In my paper, I will explained the main Advantages (differences between both protocols)of IPv6 & IPv4, By giving results that can be obtained through the diffusion of technology.","PeriodicalId":161820,"journal":{"name":"INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131115388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信