Babak Esmaeilpour Ghouchani, A. Abdullah, N. A. W. Hamid, A. R. Rahiman
{"title":"A New Workload Recognition Strategy to Improve the Speed of Resource Provisioning in PaaS Layer of Cloud for Real-Time Demands","authors":"Babak Esmaeilpour Ghouchani, A. Abdullah, N. A. W. Hamid, A. R. Rahiman","doi":"10.19026/RJIT.7.2806","DOIUrl":"https://doi.org/10.19026/RJIT.7.2806","url":null,"abstract":"The real-time system should guarantee that all critical timing constraints will be met in advance. Many distributed systems such as a cloud environment have a nondeterministic structure and it would cause a serious problem for real time, but the user can access a large number of shared resources. Also launching a new resource in the IaaS layer of a Cloud is not instantaneous. Prediction model, risk management in PaaS and monitoring in IaaS are the most important parts that a real-time system should have because they must face a challenge in understanding the system and the behavior of workload completely. The results of analyzing, monitoring and prediction have serious impacts on system reaction. Understanding the workload is an important challenge in all systems and they use different models to identify the types or predict changes over the time. A prediction model must have the ability to produce and shape the pattern of workloads with low overhead. In this study, we propose an enhancement for profiling process with continues Markov chain to make hosts deterministic for users. The effectiveness and the accuracy of the proposed model measured in the evolution part. Also, the number of the failed tasks counted in this new model to show how proposed model is successful.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134367423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Conditional hybrid approach for intrusion detection","authors":"Hashem Alaidaros, M. Mahmuddin","doi":"10.3923/RJIT.2016.55.65","DOIUrl":"https://doi.org/10.3923/RJIT.2016.55.65","url":null,"abstract":"Background and Objective: Inspecting all packets to detect intrusions faces challenges when coping with a high volume of traffic.Packet-based detection processes every payload on the wire, which degrades the performance of intrusion-detection systems.This issue requires the introduction of a flow-based IDS approach that reduces the amount of data to be processed by examining aggregated information of related packets in the form of flow.However, flow-based detection still suffers from the generation of false positive alerts due to lack of completed data input.This study proposed a model to improve packet-based performance and reduce flow-based false positive rate by combining flow-based with packet-based detection to compensate for their mutual shortcomings.This proposed model is named as conditional hybrid intrusion detection.Materials and Methods: In this model, only malicious flows marked by flow-based must be further analyzed by packet-based detection.For packet-based detection to communicate with flow-based detection, input framework approach was used.To evaluate the proposed detection methods, public datasets were replayed in different traffic rates into both the proposed method and default Bro implementations in a testbed controlled environment.Results: Experimental evaluation shows that the proposed approach was able to detect all infected hosts reported and corresponding datasets.At 200 Mbps rate, proposed approach can save 50.6% of memory and 18.1% of CPU usage compared with default Bro packet-based detection. Experiments demonstrated that the default Bro packet-based can handle bandwidth up to 100 Mbps without packets drop, while 200 Mbps in the proposed approach. Conclusion: Experimental evaluation showed that the proposed model gains a significant performance improvement, in term of resource consumption and packet drop rate compared with a default Bro packet-based detection implementation.The proposed approach can mitigate the false positive rate of flow-based detection and reduce the resource consumption of packet-based detection, while preserving detection accuracy.This study can be considered as skeleton model to be applied for intrusion or monitoring detection systems.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"6 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123344861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Google File System and Hadoop Distributed File System","authors":"Nader M. Gemayel","doi":"10.3923/RJIT.2016.66.74","DOIUrl":"https://doi.org/10.3923/RJIT.2016.66.74","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Sridevi, P. Philominat, P. Praveenkum, R. JohnBoscoBalaguru, R. Amirtharaj
{"title":"Tri Layer Image Encryption Based on Quantum Principle","authors":"R. Sridevi, P. Philominat, P. Praveenkum, R. JohnBoscoBalaguru, R. Amirtharaj","doi":"10.3923/RJIT.2016.82.87","DOIUrl":"https://doi.org/10.3923/RJIT.2016.82.87","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Watermarking System for the Security of Medical Image Databases used in Telemedicine","authors":"F. Alsaade","doi":"10.3923/RJIT.2016.88.97","DOIUrl":"https://doi.org/10.3923/RJIT.2016.88.97","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114348739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Road Map to Bio-inspired Software Engineering","authors":"S. Ghoul","doi":"10.3923/rjit.2016.75.81","DOIUrl":"https://doi.org/10.3923/rjit.2016.75.81","url":null,"abstract":"Software production research is quickly evolving on two parallel approaches: conventional and bio-inspired. The bio-inspired approaches are generally developed and presented as enhancements of the conventional ones. However the conventional approaches benefit from their integration with their global context, through software engineering methodologies, for being advantageous.The integration of bio-inspired approaches with bio-inspired software engineering methodologies will enrich them and let them be irrefutably be the best. This paper identify the motivations to the emergence of such bio-inspired software engineering, presents a first approach to it, with a road map, and some of its challenges.The application of this first approach on different software systems categories is presented with its summary evaluation. However, the evaluation on industrial scale remains a challenge.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132291015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomalies Calculation and Detection in Fuel Expense through Data Mining","authors":"Kaleem, Habib, A. I. Umar","doi":"10.19026/RJIT.6.2165","DOIUrl":"https://doi.org/10.19026/RJIT.6.2165","url":null,"abstract":"In organizations having large vehicle fleet a reasonable portion of the fuel budget is misused by malpractices of drivers and fuel providers. An optimal usage of this fuel amount could be of big advantages to the organization. We proposed a novel anomaly %age calculation algorithm to determine the misuse of the fuel of the vehicles. This algorithm will reduce the efforts for anomaly detection in clustering process. The results reflect that this algorithm could be used to implement an effective check on the misuse of the fuel in big organizations with less effort.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Email Phishing Detection System Using Neural Network","authors":"A. A. Abdullah, Loay E. George, Imad J. Mohammed","doi":"10.19026/rjit.6.2164","DOIUrl":"https://doi.org/10.19026/rjit.6.2164","url":null,"abstract":"","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127425347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
supAliyu Rufai Yauri, supRabiah A. Kadir, S. Azman, supMasrah A.A. Murad
{"title":"Review of Computer-Based Academic Research on the Quran","authors":"supAliyu Rufai Yauri, supRabiah A. Kadir, S. Azman, supMasrah A.A. Murad","doi":"10.19026/RJIT.6.2163","DOIUrl":"https://doi.org/10.19026/RJIT.6.2163","url":null,"abstract":"This study presents a review on the computer based academic researches related to Quran. The main motivation of the paper is because of the growing interest in the Quran knowledge globally, where today we are witnessing several researches on Quran being the main source of knowledge and law for Muslims. Today, computer based research on the Quran is being conducted globally by both Muslims and non-Muslims from various institutions. The study will give an up to date on computer based researchers conducted previously and will assist in furthering up researches in the area.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121313457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. E. Wu, supLifen Ding, Su Li, S. Qian, supWeidong Yang
{"title":"Fuzzy Fingerprint Recognition","authors":"S. E. Wu, supLifen Ding, Su Li, S. Qian, supWeidong Yang","doi":"10.19026/rjit.6.2166","DOIUrl":"https://doi.org/10.19026/rjit.6.2166","url":null,"abstract":"In order to effectively carry out the fingerprint image recognition, this study proposes a fingerprint preprocessing algorithm and feature extraction technology. In the fingerprint image preprocessing, this study gives the location method of region of interest. In terms of feature extraction, this study extracts the decomposition energy features of fingerprint. In terms of matching recognition, this study presents a new recognition method for fingerprint and uses the method to carry out the matching and recognition of fingerprint. In the simulation, the presented fingerprint recognition method is compared with several existing major fingerprinting methods. The comparison results show that the proposed recognition method is more accurate and faster than some existing better recognition methods. Its recognition precision is higher, the recognition speed is faster and the anti-noise ability is stronger. These researches in this study on fingerprinting promote an improving of the accuracy and speed of recognition and provide a new way of thinking for target recognition, which has an important theoretical references and practical significance.","PeriodicalId":235687,"journal":{"name":"Research Journal of Information Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114141952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}