{"title":"A Cybersecurity Culture Framework for Grassroots Levels in Zimbabwe","authors":"G. Kabanda, Tinashe Chingoriwo","doi":"10.13005/ojcst14.010203.03","DOIUrl":"https://doi.org/10.13005/ojcst14.010203.03","url":null,"abstract":"Cybersecurity is a combination of technologies, processes and operations that are designed to protect information systems, computers, devices, programs, data and networks from internal or external threats, harm, damage, attacks or unauthorized access1.The research was purposed to develop a cybersecurity culture framework which ensures that grassroot users of cyberspace are secured from cyber threats. Literature review showed that in Zimbabwe, no research had attempted to come up with a cybersecurity culture framework for grassroot users of cyberspace.The research was guided by the interpretivist paradigm and employed a qualitative methodology. A descriptive research design was used to answer the research questions and unstructured interviews were done to ascertain the cybersecurity needs and challenges of grassroot users of cyberspace. A cybersecurity culture framework was then crafted based on the research findings. The researchers recommended that Zimbabwe should have a cybersecurity vision and strategy that cascades to the grassroot users of cyberspace. Furthermore, the education curricula should be revised so that it incorporates cybersecurity courses at primary and secondary school level .This will then ensure that ICT adoption is matched with cyber hygiene and responsible use of cyberspace.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116420562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICT in Agriculture: Creating SMART Farmers","authors":"Aparana Sharma","doi":"10.13005/ojcst14.010203.04","DOIUrl":"https://doi.org/10.13005/ojcst14.010203.04","url":null,"abstract":"Agriculture is the backbone of any country and India is blessed to have agriculture as the main occupation of a large population. The varied geographical terrain of India provides an opportunity for yearlong production of crops. With the onset of technical revolution in all the areas of life, all over the world, agriculture is not untouched. The developments in ICT has revolutionized agricultural operations many folds. Be it the meteorological information, soil health, seed health, fertilizer application or even the insect attack on the crops, all are being regulated by the ICT applications in one form or other. Our today’s farmer is well informed about the use of new technologies in agriculture and is very efficiently utilizing the information in an intelligent way. All these are irrespective of the region, season, crop, place or the location. The use of Information Technology has made our farmers SMART, i.e., they are Self Monitoring, Analyzing and Reporting through the use of adequate Technology. The use of proper IT tools has given both the scientists and farmers a suitable platform to interact more frequently and on time. The scientists are using ICT tools to reach the farmers on their fields and our farmers has brought their knowledge to the labs for further growth and development in the field of agriculture. The present paper is a review on the current ICT applications which is making our farmers SMARTER and self reliant. There are many initiatives of government and private organizations to bring our farmers closer to the technologies developed for their benefit. The current paper is an attempt to visualize the efforts made by scientists and technologists in the field of information and Technology for the benefit of farmers and towards the end it conceptualizes the application of ICT and its use by our farmers.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"90 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128013529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shinde Mahadu Manoharrao, Madhav r. Patil, Munjewar Subhadra Amrat
{"title":"Role of Librarian in Electronic Libraries","authors":"Shinde Mahadu Manoharrao, Madhav r. Patil, Munjewar Subhadra Amrat","doi":"10.13005/ojcst14.010203.05","DOIUrl":"https://doi.org/10.13005/ojcst14.010203.05","url":null,"abstract":"The term information electronic library it’s need and importance and takes a stock of some notable efforts being made to initiate information electronic library activities in different parts the world.\u0000\u0000The aim of electronic library is to explorer and to collect useful knowledge over above faster coping. Search and to distribute. So present paper discuses in electronic library services. It’s meaning, feature, feature, roll of librarians, services of e-libraries, advantages, disadvantages, and objective etc..","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116842860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Lumber Spine Disc Herniation using Machine Learning Methods","authors":"Tan Xin Hui Nicole, H. Nisar, Sim Kar Wei","doi":"10.13005/ojcst14.010203.01","DOIUrl":"https://doi.org/10.13005/ojcst14.010203.01","url":null,"abstract":"In the medical field computer-aided diagnosis systems (CADs) are an active area of research as CADs serve to aid medical professionals in simplifying the diagnosis of a patients condition. In this paper we propose a machine learning based method for classifying lumbar disc herniation. The automation of herniated disc diagnosis decreases the enormous weight on radiologists who need to analyse several cases every day manually. Automation will also help to decrease inter and intra rater variability. Hence his work focuses on the classification of lumber disc herniation based on sagittal view Magnetic Resonance Images (MRIs). The dataset used in this work comprises of 32 images from 32 patients of which 10 patients are healthy while 22 of them have herniated discs. This data is processed through various image processing techniques to obtain three sets of features: the binary image; shape, height and width measurements of discs; and full attribute images. The proposed approach consists of four stages: region extraction, image segmentation, feature extraction and classification. The classification process is performed through support vector machines (SVMs) and K-nearest neighbor (KNNs) of which the KNN with k=5 produced the best results with 78.6% accuracy, F1 score of 66.7%, precision and recall rate of 60% and 75% respectively.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121800156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual Machine Migration in Cloud Computing","authors":"Waqas Hasan","doi":"10.13005/ojcst14.010203.06","DOIUrl":"https://doi.org/10.13005/ojcst14.010203.06","url":null,"abstract":"Cloud computing provides multiple services to users through the internet and these services include cloud storage, applications, servers, security and large network access. Virtual Machine allows the user to emulate multiple operating systems on a single computer; with the help of virtual machine migration users can transfer operating system instances from one computer to multiple computer machines. In this paper we will be discussing VM migration in cloud and also I will explain the whole procedure of VM migration. The two methods through which we can perform VM migration are Live VM migration and NON-live VM migration.VM migration also helps in managing the loads of the multiple machines and with VM we can save power consumption. People have written about cloud computing and virtual machines in previous studies, but in this research, we'll speak about virtual machine migration in cloud computing, as well as the techniques that are used in the VM migration process. I have used table to show the differences between VM migration techniques.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131170980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Protocol for Data Transmission Between Device-ToDevice Communications In Ieee 802.11 Standards","authors":"Itfaq Ahmad Mir, Anwaar Ahmad Wani","doi":"10.13005/ojcst14.010203.02","DOIUrl":"https://doi.org/10.13005/ojcst14.010203.02","url":null,"abstract":"Designed for multiple device-to-device clusters (D2DC) multicast communications is proposed in this research which is an efficient resource allocation scheme. To maximize the sum effective throughput the transmit power and the channel are apportioned to D2DC. Given that the nature of administration is rationed for cellular communications at a specific degree. Our examination details a channel assignment conspire utilizing fractional data of gadget areas. For this situation, we acquire the disturbance likelihood and viable throughput of D2DC communications incomparative outline. This process is carried by increasing the cluster size, code words and subcarriers. we proposed the algorithm here is a sensible channel allocation (CA) conspire utilizing partial information of device locations (CA-PIL). Consequently planned methodology can naturally lessen the measure of required framework overhead contrasted and the Channel Allocation (CA) conspire utilizing full information of device locations (CA-FIL).The forthcoming CA-PIL strategy accomplishes the close ideal aggregate Effective Throughput got by CA-FIL when an enormous number of D2D devices work in the clusters.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical Aspects of Wireless Sensor Networks (WSNs)","authors":"Suneela Kallakunta, A. Sreenivas","doi":"10.13005/ojcst13.0203.10","DOIUrl":"https://doi.org/10.13005/ojcst13.0203.10","url":null,"abstract":"Wireless sensor networks (WSNs) are a new kind of wireless networks that are becoming very popular with a large number of civilian and military applications. A wireless sensor network (WSN) is a wireless network that contains distributed independent sensor devices that are meant to monitor physical or environmental conditions. AWireless Sensor Network consists of a set of connected tiny sensor nodes, which communicate with each other we can also interchange information and data. These nodes obtain information on the environment such as temperature, pressure, or humidity and this information is stored in a base station. The latter sends the info to a wired network or activates an alarm or an action, depending on the type of data being monitored.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122678650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Preprocessing: The Techniques for Preparing Clean and Quality Data for Data Analytics Process","authors":"Ashish P. Joshi, B. Patel","doi":"10.13005/ojcst13.0203.03","DOIUrl":"https://doi.org/10.13005/ojcst13.0203.03","url":null,"abstract":"The model and pattern for real time data mining have an important role for decision making. The meaningful real time data mining is basically depends on the quality of data while row or rough data available at warehouse. The data available at warehouse can be in any format, it may huge or it may unstructured. These kinds of data require some process to enhance the efficiency of data analysis. The process to make it ready to use is called data preprocessing. There can be many activities for data preprocessing such as data transformation, data cleaning, data integration, data optimization and data conversion which are use to converting the rough data to quality data. The data preprocessing techniques are the vital step for the data mining. The analyzed result will be good as far as data quality is good. This paper is about the different data preprocessing techniques which can be use for preparing the quality data for the data analysis for the available rough data.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131267368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Bhambri, Harpreet Kaur, Akarshit Gupta, Jaskaran Singh
{"title":"Human Activity Recognition System","authors":"P. Bhambri, Harpreet Kaur, Akarshit Gupta, Jaskaran Singh","doi":"10.13005/ojcst13.0203.05","DOIUrl":"https://doi.org/10.13005/ojcst13.0203.05","url":null,"abstract":"Modern human activity recognAition systems are mainly trained and used upon video stream and images data that understand the features and actions variations in the data having similar or related movements. Human Activity Recognition plays a significant role in human-to-human and human-computer interaction. Manually driven system are highly time consuming and costlier. In this project, we aim at designing a cost-effective and faster Human Activity Recognition System which can process both video and image in order to recognize the activity being performed in it, thereby aiding the end user in various applications like surveillance, aiding purpose etc. This system will not only be cost effective but also as a utility-based system that can be incorporated in a large number of applications that will save time and aid in various activities that require recognition process, and save a lot of time with good accuracy Also, it will aid the blind people in availing the knowledge of their surroundings.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117087464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}