{"title":"Optimization of Lossless Compression Algorithms using Multithreading","authors":"S. P","doi":"10.46610/joits.2022.v09i01.005","DOIUrl":"https://doi.org/10.46610/joits.2022.v09i01.005","url":null,"abstract":"The process of reducing the number of bits required to characterize data is referred to as compression. The advantages of compression include a reduction in the time taken to transfer data from one point to another, and a reduction in the cost required for the storage space and network bandwidth. There are two types of compression algorithms namely lossy compression algorithm and lossless compression algorithm. Lossy algorithms find utility in compressing audio and video signals whereas lossless algorithms are used in compressing text messages. The advent of the internet and its worldwide usage has not only raised the utility but also the storage of text, audio and video files. These multimedia files demand more storage space as compared to traditional files. This has given rise to the requirement for an efficient compression algorithm. There is a considerable improvement in the computing performance of the machines due to the advent of the multi-core processor. However, this multi-core architecture is not used by compression algorithms. This paper shows the implementation of lossless compression algorithms namely the Lempel-Ziv-Markov Algorithm, BZip2 and ZLIB algorithms using the concept of multithreading. The results obtained prove that the ZLIB algorithm proves to be more efficient in terms of the time taken to compress and decompress the text. The comparison is done for both compressions without multithreading and compression with multi-threading.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127966010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Lossless Compression Algorithms using Multithreading","authors":"Srividya P","doi":"10.46610/joits.2023.v09i01.005","DOIUrl":"https://doi.org/10.46610/joits.2023.v09i01.005","url":null,"abstract":"The process of reducing the number of bits required to characterize data is referred to as compression. The advantages of compression include a reduction in the time taken to transfer data from one point to another, and a reduction in the cost required for the storage space and network bandwidth. There are two types of compression algorithms namely lossy compression algorithm and lossless compression algorithm. Lossy algorithms find utility in compressing audio and video signals whereas lossless algorithms are used in compressing text messages. The advent of the internet and its worldwide usage has not only raised the utility but also the storage of text, audio and video files. These multimedia files demand more storage space as compared to traditional files. This has given rise to the requirement for an efficient compression algorithm. There is a considerable improvement in the computing performance of the machines due to the advent of the multi-core processor. However, this multi-core architecture is not used by compression algorithms. This paper shows the implementation of lossless compression algorithms namely the Lempel-Ziv-Markov Algorithm, BZip2 and ZLIB algorithms using the concept of multithreading. The results obtained prove that the ZLIB algorithm proves to be more efficient in terms of the time taken to compress and decompress the text. The comparison is done for both compressions without multithreading and compression with multi-threading.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135130779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Relational Database Watermarking Employing Evolutionary Methods","authors":"Mohammed Mazhar, Rajesh Dhakad","doi":"10.46610/joits.2023.v09i01.003","DOIUrl":"https://doi.org/10.46610/joits.2023.v09i01.003","url":null,"abstract":"Ownership control, integrity, and tamper-proofing of relational data are essential concerns that must be addressed as the communication (network) system grows. Over the past several years, a plethora of potential solutions has been proposed to address these issues (including cryptography, steganography, digital signatures, watermarks, and many others). Digital watermarking (comparatively new) is a technology that aids in the resolution of issues such as data theft, authenticity, and copyright claims. This paper’s primary contributions are as follows: 1) Examine evolutionary algorithm-based watermarking in relational databases that provide optimize data encoding space in search space which provides high robustness and imperceptibility. 2) Examine contemporary database watermarking strategies based on evolutionary algorithms for high embedding capacity and watermark bit insertion. 3) Malicious agent tracing through cluster-based (mainly fuzzy c-mean clustering algorithm or based on a hash function) or multiple watermarking approaches over shared or collaborative networks. This article focuses on watermarking numeric relational databases for authentication and integrity. Also provide a brief overview of the development of relational database watermarking and emergence, its characteristics and application, and the popular research methods currently in use. In addition, gist on various possible attacks. At last, this paper suggests directions for further research in these areas. Researchers can use the findings of this study to build secure watermarking methods for databases.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121481849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"State of Library Awareness Service in the IT Era and Users Response: A Study of JNN College of Engineering Library-Shimoga","authors":"K. T. Sateesha","doi":"10.46610/joits.2023.v09i01.002","DOIUrl":"https://doi.org/10.46610/joits.2023.v09i01.002","url":null,"abstract":"Information service is the emerging motto of all information centers. To tweet the expected level of the current users, the center should do needful to include certain nascent tools and techniques in their operation. JNN College of Engineering Library and Information Center has advanced and up-to-date information of the resources in the library. And to effectively distribute the preserved papers to its users, the library organizer must properly organize the library in the direction of being well-equipped. The head of the library must understand the nature of the library, the nature of the users of the library, and also change the pattern as per the users' likes and dislikes. Since today the mindset of the users' community is completely changed, because of the time constraints and accuracy in the information, users of the library lean towards IT-based services. Not only services, but relevant service awareness is also critical. In that direction, every information organizer and administrator should put an effort into conducting well-planned and required methods of library awareness programs. Keeping in mind massive coverage of all kinds of user communities, an organization must think over common methods and techniques in conducting awareness programs. Especially in the trend of today, massive numbers of the users' community are on social media like Facebook, Twitter, WhatsApp, and Web page, etc. Keeping these aspects in the mind, information centers of today must be alert and think over the reachable media and implement them in making effective awareness about the library and its activities to the current users' community. This article attempted to make an understanding of how the users’ community is making use of the library resources effectively and in making effective use, what are the efforts put by the library organizer to make awareness of the library to its users are the main goals of the study.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126305388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ankitha H N., A. P., Anshuman Gupta, Anupam Singh, N. B
{"title":"Health Monitoring System Using Smart Clothing","authors":"Ankitha H N., A. P., Anshuman Gupta, Anupam Singh, N. B","doi":"10.46610/joits.2022.v08i03.004","DOIUrl":"https://doi.org/10.46610/joits.2022.v08i03.004","url":null,"abstract":"The newest technology has been included in this significant sensor-based project. However, it can be challenging to monitor a patient's health state at home, especially if the patient is old and has to be often checked so that necessary action can be done right away. There are two levels to the overall architecture of these systems: Detecting layer. The application layer. Body temperature, heart rate, and other parameters are measured using the detecting layer. You may examine the unprocessed data from the sensors using Arduino's serial monitor. Information access takes place at the transport layer. The use of Arduino allows for the transmission of data to the cloud. This enables cloud-based access to information. Recovery of the information key, which is produced at the transport level, takes place at the application layer. Using the necessary program, you may see the patient's details.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122180508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Teaching Training Pedagogy (OTT-P) for Higher Education Faculties: Approaches and its Importance","authors":"Devasis Pradhan","doi":"10.46610/joits.2022.v08i03.003","DOIUrl":"https://doi.org/10.46610/joits.2022.v08i03.003","url":null,"abstract":"Teaching with online platform and learning is a need to make an effective decision in all types of training today. Teaching Staff belong to higher educational institutions is one of the significant components in this on the web instructing/educational experience. There are a few issues relating to staff and one significant issue is the preparing of the workforce and their direction towards internet instructing. There are a few stages, administrations, and MOOCs accessible, which give preparing to workforce in regards to various viewpoints connected with educating better on the web. While there are various showing techniques, the majority of the customary strategies utilized in class can be applied similarly effectively on the web. Anyway, the showing strategy you select will change in light of your showing reasoning, goals, branch of knowledge, and classroom socio- economics. This paper investigates the requirement for preparing the personnel to improve online teaching methodology.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124555896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Effectiveness of Google Analytics on the Business Growth of E-Commerce Companies in India","authors":"Vishranti Kalyankar, Nilesh Anute","doi":"10.46610/joits.2022.v08i03.001","DOIUrl":"https://doi.org/10.46610/joits.2022.v08i03.001","url":null,"abstract":"The main objective of writing this research paper is to identify how google is used in the e-commerce sector. In addition, identify how e-commerce enhances its business using google analytics. To study the role of google analytics in the e-commerce sector. The paper went on to describe some of Google Analytics' particular advantages, such as high customization based on the nature of the organization and a broad range of reporting functionalities. The case study's main goal is to raise targeting strategies of Google Analytics' capabilities and to advocate the use of Web Analytics in sales and marketing activities. The case study's main result is that, in order to get the most out of analytics tools, it is essential to have strong financial goals and ensure first.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116621162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security and Internet Banking: Issues and Preventive Measures","authors":"Leandre Gomes, Abhinav Deshmukh, Nilesh Anute","doi":"10.46610/joits.2022.v08i02.005","DOIUrl":"https://doi.org/10.46610/joits.2022.v08i02.005","url":null,"abstract":"The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accounts safe from cybercriminals and hackers, as everything on the internet is prone to security threats. Internet security measures followed by the majority of the bank sites to protect their information are not up-to-date as compared to the dynamic cyber threats. Such problems have made it easy for confidential financial information to fall into the hands of third parties and cybercriminals. Although there are several security measures to stop data breaches, there are still flaws in these systems. The goal of this study article is to look at the number of cyber security issues in internet banking in India and the consumer’s awareness of these issues and preventive measures used by them. Our research is particularly based on primary data.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"44 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain: The Gateway to New Technology and its Applications for Academic Libraries","authors":"S. Hussaini, M. Haruna, D. Shrivastava","doi":"10.46610/joits.2022.v08i01.003","DOIUrl":"https://doi.org/10.46610/joits.2022.v08i01.003","url":null,"abstract":"The block chain is a distributed database that stores and shares records of all transactions or digital events that have taken place. Each transaction is double-checked by the majority of the system's members. It holds every single transaction's record. The block chain is a novel technology that is being used to validate and store transaction records for online crypto currencies such as Bit coin. Transactions cannot be retracted, copied, or faked because the system is redundant and distributed. The block chain has potential applications in domains other than online money, such as public libraries. This column will briefly outline what a block chain is and how it is used, as well as potential future uses that librarians and Academic Library practitioners would be interested in, as well as some of the system's flaws. Information workers may be able to utilize and benefit from this technology in a variety of ways.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning Techniques for Enhancing Student Learning Experiences","authors":"R. R. Tribhuvan, T. Bhaskar","doi":"10.46610/joits.2021.v07i03.004","DOIUrl":"https://doi.org/10.46610/joits.2021.v07i03.004","url":null,"abstract":"Outcome-based learning (OBL) is a tried-and-true learning technique based on a set of predetermined objectives. Program Educational Objectives (PEOs), Program Outcomes (POs), and Course Outcomes are the three components of OBL (COs). Faculty members may adopt many ML-based advised actions at the conclusion of each course to improve the quality of learning and, as a result, the overall education. Due to the huge number of courses and faculty members involved, harmful behaviors may be advocated, resulting in unwanted and incorrect choices. The education system is described in this study based on college course requirements, academic records, and course learning results evaluations is provided for anticipating appropriate actions utilizing various machine learning algorithms. Dataset translates to different problem conversion methods and adaptive methods such as one-versus-all, binary significance, naming power set, series classification and custom classification ML-KNN. The suggested recommender ML-based system is used as a case study at the Institute of Computer and Information Sciences to assist academic staff in boosting learning quality and instructional methodologies. The results suggest that the proposed recommendation system offers more measures to improve students' learning experiences.","PeriodicalId":273004,"journal":{"name":"Journal of Information Technology and Sciences","volume":"312 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123041791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}