Lahore Garrison University Research Journal of Computer Science and Information Technology最新文献

筛选
英文 中文
Rapid Digital Transformation Using Agile Methodologies for Software Development Projects 在软件开发项目中使用敏捷方法进行快速数字化转换
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503218
Kausar Parveen
{"title":"Rapid Digital Transformation Using Agile Methodologies for Software Development Projects","authors":"Kausar Parveen","doi":"10.54692/lgurjcsit.2021.0503218","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503218","url":null,"abstract":"Now a day’s all organizations are moving towards digitalization. These consequences of the use of digital technologies made organizations seek for best and fast digital solutions. All software developer companies are also trying to draw consumer's attention by offering prompt services. In this regard, the critical issue in information technology and other areas of computation is how software can be created easily and rapidly for complex businesses. In this context, the main aim of the research is to show the agile methodology role in the rapid digital transformation. In this paper, we have surveyed different agile methodologies and tools for rapid software development and introduced an agile management tool having a backlog. We identified the key practices of agile methods and after a survey, it is suggested that the agile approach can help to achieve a balance between the applications generated by developers on customer demand. This paper illuminates and translates agile methodologies into agile project management tools for simple and rapid application development. Empirical research based on a case study is provided for better understanding and showing the importance of agility in software development","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133285031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Load Balancing in Cloud Computing Empowered with Dynamic Divisible Load Scheduling Method 基于动态可分负载调度方法的云计算负载均衡
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503217
Sohaib Ahmad
{"title":"Load Balancing in Cloud Computing Empowered with Dynamic Divisible Load Scheduling Method","authors":"Sohaib Ahmad","doi":"10.54692/lgurjcsit.2021.0503217","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503217","url":null,"abstract":"The need to process and dealing with a vast amount of data is increasing with the developing technology. One of the leading promising technology is Cloud Computing, enabling one to accomplish desired goals, leading to performance enhancement. Cloud Computing comes into play with the debate on the growing requirements of data capabilities and storage capacities. Not every organization has the financial resources, infrastructure & human capital, but Cloud Computing offers an affordable infrastructure based on availability, scalability, and cost-efficiency. The Cloud can provide services to clients on-demand, making it the most adapted system for virtual storage, but still, it has some issues not adequately addressed and resolved. One of those issues is that load balancing is a primary challenge, and it is required to balance the traffic on every peer adequately rather than overloading an individual node. This paper provides an intelligent workload management algorithm, which systematically balances traffic and homogeneously allocates the load on every node & prevents overloading, and increases the response time for maximum performance enhancement.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115278572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Classification Model using Fuzzy Rough Set Theory and Random Weight Neural Network 基于模糊粗糙集理论和随机权值神经网络的高效分类模型
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503224
Rana Aamir Raza
{"title":"An Efficient Classification Model using Fuzzy Rough Set Theory and Random Weight Neural Network","authors":"Rana Aamir Raza","doi":"10.54692/lgurjcsit.2021.0503224","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503224","url":null,"abstract":"In the area of fuzzy rough set theory (FRST), researchers have gained much interest in handling the high-dimensional data. Rough set theory (RST) is one of the important tools used to pre-process the data and helps to obtain a better predictive model, but in RST, the process of discretization may loss useful information. Therefore, fuzzy rough set theory contributes well with the real-valued data. In this paper, an efficient technique is presented based on Fuzzy rough set theory (FRST) to pre-process the large-scale data sets to increase the efficacy of the predictive model. Therefore, a fuzzy rough set-based feature selection (FRSFS) technique is associated with a Random weight neural network (RWNN) classifier to obtain the better generalization ability. Results on different dataset show that the proposed technique performs well and provides better speed and accuracy when compared by associating FRSFS with other machine learning classifiers (i.e., KNN, Naive Bayes, SVM, decision tree and backpropagation neural network).","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions 使用区块链的云计算数据安全调查:挑战,现有的最先进的方法和未来的方向
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503213
Muhammad Usman Ashraf
{"title":"A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions","authors":"Muhammad Usman Ashraf","doi":"10.54692/lgurjcsit.2021.0503213","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503213","url":null,"abstract":"Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classical and Probabilistic Information Retrieval Techniques: An Audit 经典和概率信息检索技术:审计
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-09-12 DOI: 10.54692/lgurjcsit.2021.0503221
Qaiser Abbas
{"title":"Classical and Probabilistic Information Retrieval Techniques: An Audit","authors":"Qaiser Abbas","doi":"10.54692/lgurjcsit.2021.0503221","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0503221","url":null,"abstract":"Information retrieval is acquiring particular information from large resources and presenting it according to the user’s need. The incredible increase in information resources on the Internet formulates the information retrieval procedure, a monotonous and complicated task for users. Due to over access of information, better methodology is required to retrieve the most appropriate information from different sources. The most important information retrieval methods include the probabilistic, fuzzy set, vector space, and boolean models. Each of these models usually are used for evaluating the connection between the question and the retrievable documents. These methods are based on the keyword and use lists of keywords to evaluate the information material. In this paper, we present a survey of these models so that their working methodology and limitations are discussed. This is an important understanding because it makes possible to select an information retrieval technique based on the basic requirements. The survey results showed that the existing model for knowledge recovery is somewhere short of what was planned. We have also discussed different areas of IR application where these models could be used.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125159120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Classification Using Decision Trees J48 Algorithm for Text Mining of Business Data 基于决策树J48算法的商业数据文本挖掘数据分类
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502210
Asif Yaseen
{"title":"Data Classification Using Decision Trees J48 Algorithm for Text Mining of Business Data","authors":"Asif Yaseen","doi":"10.54692/lgurjcsit.2021.0502210","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502210","url":null,"abstract":"The business industry is generating a lot of data on daily business deals and financial transactions. These businesses are generating intensive-data like they need customer satisfaction on top priority, fulfilling their needs, etc. In every step, Data is being produced. This Data has a great value that is hidden from regular users. Data analytics is used to unhide those values. In our project, we are using a business-related dataset that contains strings and their class (0 or 1). 0 or 1 denotes the positive or negative string labels. To analyze this data, we are using a decision tree classification algorithm (J48 exceptionally) to perform text mining (classification) on our target dataset. Text mining comes under supervised learning (type). In-text mining, generally, we use two datasets. One is used to train the model, and the second dataset is used to predict the missing class labels in the second dataset based on this training model generated using the first dataset.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123733861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Crime Patterns in Digital Forensic Investigation to Trace the Adversaries 数字取证调查中犯罪模式的检测以追踪对手
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502205
Muhammad ilyas
{"title":"Detection of Crime Patterns in Digital Forensic Investigation to Trace the Adversaries","authors":"Muhammad ilyas","doi":"10.54692/lgurjcsit.2021.0502205","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502205","url":null,"abstract":"The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits is also increasing. To prosecute cybercriminals and make some lawful checks on everyone's digital activities, digital forensic science comes into the light. In this context, we developed a new framework that improves the digital forensic investigation process. This research paper proposes a method in which we can identify the illegal activities and trace the adversaries. We capture the TCP (Transmission Control Protocol) packets from the servers and workstations. This data collected from the TCP log is stored in the database and preprocessed to eliminate redundant data. Furthermore, the database also contains past data. The proposed framework has three major processes collection of TCP packets, storing and preprocessing of collected data in a database, and mining of the pattern through a digital forensic anomaly collection algorithm. For the evaluation of our proposed framework, we have developed a java based application. The results are shown in the form of reports and tables.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116793717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Template Matching Based Probabilistic Optical Character Recognition for Urdu Nastaliq Script 基于模板匹配的乌尔都纳斯塔利克文字概率光学字符识别
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502207
Qaiser Abbas
{"title":"Template Matching Based Probabilistic Optical Character Recognition for Urdu Nastaliq Script","authors":"Qaiser Abbas","doi":"10.54692/lgurjcsit.2021.0502207","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502207","url":null,"abstract":"This paper presents a technique for optical recognition of Urdu characters using template matching based on a probabilistic N-Gram language model. Dataset used has the collection of both printed and typed text. This model is able to perform three types of segmentations including line, ligature and character using horizontal projection, connected component labeling, corners and pointers techniques, respectively. A separate stochastic lexicon is built from a collected corpus, which contains the probability values of grams. By using template matching and the N-Gram language model, our study predicts complete segmented words with the promising result, particularly in case of bigrams. It outperforms three out of four existing models with an accuracy rate of 97.33%. Results achieved on our test dataset are encouraging in one perspective but provide direction to work for further improvement in this model.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weed Identification Methodology by using Transfer Learning 基于迁移学习的杂草识别方法
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502206
Bushra Idrees
{"title":"Weed Identification Methodology by using Transfer Learning","authors":"Bushra Idrees","doi":"10.54692/lgurjcsit.2021.0502206","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502206","url":null,"abstract":"From recent past years, Weed identification remained a hot topic for researchers. Majority of work focused on the detection of weed but we are trying to identify the weed via weed name. The unrivaled successes of deep learning make the researchers able to evaluate different weed species in the complex rangeland climate. Nowadays, with an increasing population, farming productivity needs to be increased a lot to meet the demand for accurate weed detection. Increased demand for an increase in the use of herbicides, resulting in environmental harm. In this research work, the picture of weed helps to detect and differentiate as per area, and its name. The main aim of this research is the identification of weed so that fewer herbicides can use. This research work will contribute toreducing the higher use of herbicides by helping clear identification of weed names through its features. We use transfer learning in machine learning. The deep Weeds dataset is used for the evaluation. For this, we use the deep learning model ResNet50 to get better results. The Deep Weeds dataset contains 17,509 images that are label and eight nationally recognized species of weed belonged to 8 across northern Australia locations. This paper declares a baseline for classification performance on the dataset of weed while utilizing the deep learning model ResNet-50 and it is a benchmark too. Deep learning model ResNet-50 attained an average accuracy classification of 96.16. The findings are high enough to make effective use of weed control methods in Pakistan for futurefield implementation. The results confirm that our System offers more effective Weed recognition than many other systems.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next-Wave of E-commerce: Mobile Customers Churn Prediction using Machine Learning 下一波电子商务:使用机器学习预测移动客户流失
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2021-06-21 DOI: 10.54692/lgurjcsit.2021.0502209
Asif Yaseen
{"title":"Next-Wave of E-commerce: Mobile Customers Churn Prediction using Machine Learning","authors":"Asif Yaseen","doi":"10.54692/lgurjcsit.2021.0502209","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2021.0502209","url":null,"abstract":"With the swift increase of mobile devices such as personal digital assistants, smartphones and tablets, mobile commerce is broadly considered to be a driving force for the next wave of ecommerce. The power of mobile commerce is primarily due to the anytime-anywhere connectivity and the use of mobile technology, which creates enormous opportunities to attract and engage customers. Many believe that in an era of m-commerce especially in the telecommunication business retaining customers is a big challenge. In the face of an extremely competitive telecommunication industry, the value of acquiring new customers is very much expensive than retaining the existing customer. Therefore, it has become imperative to pay much attention to retaining the existing customers in order to get stabilized in a market comprised of vibrant service providers. In the current market, a number of prevailing statistical techniques for customer churn management are replaced by more machine learning and predictive analysis techniques. In this study, we employed the feature selection technique to identify the most influencing factors in customer churn prediction. We adopt the wrapper-based feature selection approach where Particle Swarm Optimization (PSO) is used for search purposes and different classifiers like Decision Tree (DT), Naïve Bayes, k-NN and Logistic regression is used for evaluation purposes to assess the enactment on optimally sampled and abridged dataset. Lastly, it is witnessed through simulations that our suggested method accomplishes fairly thriving for forecasting churners and hence could be advantageous for exponentially increasing competition in the telecommunication sector.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"76 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120887337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信