Research Journal of Information Technology最新文献

筛选
英文 中文
A New Workload Recognition Strategy to Improve the Speed of Resource Provisioning in PaaS Layer of Cloud for Real-Time Demands 一种新的工作负载识别策略,提高云平台即服务层资源配置的实时性
Research Journal of Information Technology Pub Date : 2016-05-05 DOI: 10.19026/RJIT.7.2806
Babak Esmaeilpour Ghouchani, A. Abdullah, N. A. W. Hamid, A. R. Rahiman
{"title":"A New Workload Recognition Strategy to Improve the Speed of Resource Provisioning in PaaS Layer of Cloud for Real-Time Demands","authors":"Babak Esmaeilpour Ghouchani, A. Abdullah, N. A. W. Hamid, A. R. Rahiman","doi":"10.19026/RJIT.7.2806","DOIUrl":"https://doi.org/10.19026/RJIT.7.2806","url":null,"abstract":"The real-time system should guarantee that all critical timing constraints will be met in advance. Many distributed systems such as a cloud environment have a nondeterministic structure and it would cause a serious problem for real time, but the user can access a large number of shared resources. Also launching a new resource in the IaaS layer of a Cloud is not instantaneous. Prediction model, risk management in PaaS and monitoring in IaaS are the most important parts that a real-time system should have because they must face a challenge in understanding the system and the behavior of workload completely. The results of analyzing, monitoring and prediction have serious impacts on system reaction. Understanding the workload is an important challenge in all systems and they use different models to identify the types or predict changes over the time. A prediction model must have the ability to produce and shape the pattern of workloads with low overhead. In this study, we propose an enhancement for profiling process with continues Markov chain to make hosts deterministic for users. The effectiveness and the accuracy of the proposed model measured in the evolution part. Also, the number of the failed tasks counted in this new model to show how proposed model is successful.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conditional hybrid approach for intrusion detection 入侵检测的条件混合方法
Research Journal of Information Technology Pub Date : 2016-03-01 DOI: 10.3923/RJIT.2016.55.65
Hashem Alaidaros, M. Mahmuddin
{"title":"Conditional hybrid approach for intrusion detection","authors":"Hashem Alaidaros, M. Mahmuddin","doi":"10.3923/RJIT.2016.55.65","DOIUrl":"https://doi.org/10.3923/RJIT.2016.55.65","url":null,"abstract":"Background and Objective: Inspecting all packets to detect intrusions faces challenges when coping with a high volume of traffic.Packet-based detection processes every payload on the wire, which degrades the performance of intrusion-detection systems.This issue requires the introduction of a flow-based IDS approach that reduces the amount of data to be processed by examining aggregated information of related packets in the form of flow.However, flow-based detection still suffers from the generation of false positive alerts due to lack of completed data input.This study proposed a model to improve packet-based performance and reduce flow-based false positive rate by combining flow-based with packet-based detection to compensate for their mutual shortcomings.This proposed model is named as conditional hybrid intrusion detection.Materials and Methods: In this model, only malicious flows marked by flow-based must be further analyzed by packet-based detection.For packet-based detection to communicate with flow-based detection, input framework approach was used.To evaluate the proposed detection methods, public datasets were replayed in different traffic rates into both the proposed method and default Bro implementations in a testbed controlled environment.Results: Experimental evaluation shows that the proposed approach was able to detect all infected hosts reported and corresponding datasets.At 200 Mbps rate, proposed approach can save 50.6% of memory and 18.1% of CPU usage compared with default Bro packet-based detection. Experiments demonstrated that the default Bro packet-based can handle bandwidth up to 100 Mbps without packets drop, while 200 Mbps in the proposed approach. Conclusion: Experimental evaluation showed that the proposed model gains a significant performance improvement, in term of resource consumption and packet drop rate compared with a default Bro packet-based detection implementation.The proposed approach can mitigate the false positive rate of flow-based detection and reduce the resource consumption of packet-based detection, while preserving detection accuracy.This study can be considered as skeleton model to be applied for intrusion or monitoring detection systems.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123344861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Google File System and Hadoop Distributed File System 谷歌文件系统和Hadoop分布式文件系统分析
Research Journal of Information Technology Pub Date : 2016-03-01 DOI: 10.3923/RJIT.2016.66.74
Nader M. Gemayel
{"title":"Analyzing Google File System and Hadoop Distributed File System","authors":"Nader M. Gemayel","doi":"10.3923/RJIT.2016.66.74","DOIUrl":"https://doi.org/10.3923/RJIT.2016.66.74","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Tri Layer Image Encryption Based on Quantum Principle 基于量子原理的三层图像加密
Research Journal of Information Technology Pub Date : 2016-03-01 DOI: 10.3923/RJIT.2016.82.87
R. Sridevi, P. Philominat, P. Praveenkum, R. JohnBoscoBalaguru, R. Amirtharaj
{"title":"Tri Layer Image Encryption Based on Quantum Principle","authors":"R. Sridevi, P. Philominat, P. Praveenkum, R. JohnBoscoBalaguru, R. Amirtharaj","doi":"10.3923/RJIT.2016.82.87","DOIUrl":"https://doi.org/10.3923/RJIT.2016.82.87","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Watermarking System for the Security of Medical Image Databases used in Telemedicine 用于远程医疗的医学图像数据库安全的水印系统
Research Journal of Information Technology Pub Date : 2016-03-01 DOI: 10.3923/RJIT.2016.88.97
F. Alsaade
{"title":"Watermarking System for the Security of Medical Image Databases used in Telemedicine","authors":"F. Alsaade","doi":"10.3923/RJIT.2016.88.97","DOIUrl":"https://doi.org/10.3923/RJIT.2016.88.97","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Road Map to Bio-inspired Software Engineering 生物启发软件工程的路线图
Research Journal of Information Technology Pub Date : 2016-03-01 DOI: 10.3923/rjit.2016.75.81
S. Ghoul
{"title":"A Road Map to Bio-inspired Software Engineering","authors":"S. Ghoul","doi":"10.3923/rjit.2016.75.81","DOIUrl":"https://doi.org/10.3923/rjit.2016.75.81","url":null,"abstract":"Software production research is quickly evolving on two parallel approaches: conventional and bio-inspired. The bio-inspired approaches are generally developed and presented as enhancements of the conventional ones. However the conventional approaches benefit from their integration with their global context, through software engineering methodologies, for being advantageous.The integration of bio-inspired approaches with bio-inspired software engineering methodologies will enrich them and let them be irrefutably be the best. This paper identify the motivations to the emergence of such bio-inspired software engineering, presents a first approach to it, with a road map, and some of its challenges.The application of this first approach on different software systems categories is presented with its summary evaluation. However, the evaluation on industrial scale remains a challenge.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132291015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Anomalies Calculation and Detection in Fuel Expense through Data Mining 基于数据挖掘的燃油费用异常计算与检测
Research Journal of Information Technology Pub Date : 2015-08-05 DOI: 10.19026/RJIT.6.2165
Kaleem, Habib, A. I. Umar
{"title":"Anomalies Calculation and Detection in Fuel Expense through Data Mining","authors":"Kaleem, Habib, A. I. Umar","doi":"10.19026/RJIT.6.2165","DOIUrl":"https://doi.org/10.19026/RJIT.6.2165","url":null,"abstract":"In organizations having large vehicle fleet a reasonable portion of the fuel budget is misused by malpractices of drivers and fuel providers. An optimal usage of this fuel amount could be of big advantages to the organization. We proposed a novel anomaly %age calculation algorithm to determine the misuse of the fuel of the vehicles. This algorithm will reduce the efforts for anomaly detection in clustering process. The results reflect that this algorithm could be used to implement an effective check on the misuse of the fuel in big organizations with less effort.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Email Phishing Detection System Using Neural Network 基于神经网络的电子邮件网络钓鱼检测系统
Research Journal of Information Technology Pub Date : 2015-08-05 DOI: 10.19026/rjit.6.2164
A. A. Abdullah, Loay E. George, Imad J. Mohammed
{"title":"Email Phishing Detection System Using Neural Network","authors":"A. A. Abdullah, Loay E. George, Imad J. Mohammed","doi":"10.19026/rjit.6.2164","DOIUrl":"https://doi.org/10.19026/rjit.6.2164","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review of Computer-Based Academic Research on the Quran 《古兰经》计算机学术研究综述
Research Journal of Information Technology Pub Date : 2015-08-05 DOI: 10.19026/RJIT.6.2163
supAliyu Rufai Yauri, supRabiah A. Kadir, S. Azman, supMasrah A.A. Murad
{"title":"Review of Computer-Based Academic Research on the Quran","authors":"supAliyu Rufai Yauri, supRabiah A. Kadir, S. Azman, supMasrah A.A. Murad","doi":"10.19026/RJIT.6.2163","DOIUrl":"https://doi.org/10.19026/RJIT.6.2163","url":null,"abstract":"This study presents a review on the computer based academic researches related to Quran. The main motivation of the paper is because of the growing interest in the Quran knowledge globally, where today we are witnessing several researches on Quran being the main source of knowledge and law for Muslims. Today, computer based research on the Quran is being conducted globally by both Muslims and non-Muslims from various institutions. The study will give an up to date on computer based researchers conducted previously and will assist in furthering up researches in the area.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fuzzy Fingerprint Recognition 模糊指纹识别
Research Journal of Information Technology Pub Date : 2015-05-05 DOI: 10.19026/rjit.6.2166
S. E. Wu, supLifen Ding, Su Li, S. Qian, supWeidong Yang
{"title":"Fuzzy Fingerprint Recognition","authors":"S. E. Wu, supLifen Ding, Su Li, S. Qian, supWeidong Yang","doi":"10.19026/rjit.6.2166","DOIUrl":"https://doi.org/10.19026/rjit.6.2166","url":null,"abstract":"In order to effectively carry out the fingerprint image recognition, this study proposes a fingerprint preprocessing algorithm and feature extraction technology. In the fingerprint image preprocessing, this study gives the location method of region of interest. In terms of feature extraction, this study extracts the decomposition energy features of fingerprint. In terms of matching recognition, this study presents a new recognition method for fingerprint and uses the method to carry out the matching and recognition of fingerprint. In the simulation, the presented fingerprint recognition method is compared with several existing major fingerprinting methods. The comparison results show that the proposed recognition method is more accurate and faster than some existing better recognition methods. Its recognition precision is higher, the recognition speed is faster and the anti-noise ability is stronger. These researches in this study on fingerprinting promote an improving of the accuracy and speed of recognition and provide a new way of thinking for target recognition, which has an important theoretical references and practical significance.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信