{"title":"QR Code: Challenges and Potentials for Services in Pos-Covid Era","authors":"R. Bolzan, Paula Martins, Silvia Fernandes","doi":"10.15344/2456-4451/2020/161","DOIUrl":"https://doi.org/10.15344/2456-4451/2020/161","url":null,"abstract":"The choice of this work arises from the interest in launching innovative services to target people. We sought to integrate a technology that could bring more innovation to a product/ service, namely due to mobile trends. Among some options considered, we chose the QR code technology. With the help of a strategic plan, we evaluate whether there is a market and propensity for its widespread use in Portugal. Then, an interactive prototype of the supporting platform is presented for validation by potential users. Most participants consider the idea interesting and promising. They suggested add-ons such as: more video functions and a greater variety of events and resources to apply it. Given the challenges in society, we forecast its application to the quick request for specialized information and/or resources by critical activities such as in health, tourism, etc. QR Code: Challenges and Potentials for Services in Pos-Covid Era Publication History: Received: December 08, 2020 Accepted: December 28, 2020 Published: December 30, 2020","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74375393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Channel Status Prediction using Auto-regressive and Auto-regressive Integrated Predictors over WLAN Channel","authors":"Yafei Hou, Naoya Hokimoto, S. Denno","doi":"10.15344/2456-4451/2020/159","DOIUrl":"https://doi.org/10.15344/2456-4451/2020/159","url":null,"abstract":"Recently, due to the increase of huge number of wireless devices such as smartphones or sensors, mobile wireless traffic is dramatically expanding each year. Cognitive radio (CR) system has been attracted attention to improve frequency usage efficiency. CR system is a technology that enables to select multiple radio systems, grasps the congestion status of communication and selects the optimum radio system. Till now, there are many researches considering the prediction of channel occupancy ratio (COR: the ration between busy duration length to resolution period T). If the start and end points of busy/idle duration from the sensing channel spectrum can be correctly predicted, it will largely benefit the wireless system design and spectrum efficiency (SE) improvement. In this paper, we will consider such research based on auto-regressive (AR) and auto-regressive integrated (ARI) models using traffic data captured from the wireless channel near a railway station. The major idea is that the busy/idle duration length can be calculated from COR value when the resolution period T is short. The results confirm that our proposal can improve the prediction accuracy.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85531023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERFORMANCE ANALYSIS AND OPTIMIZATION OF BUFFER SIZES FOR HETEROGENEOUS NETWORK TRAFFICS","authors":"M. A. Ahmad, D. Wisdom, S. Isaac, U. Arinze","doi":"10.15282/ijsecs.6.2.2020.5.0073","DOIUrl":"https://doi.org/10.15282/ijsecs.6.2.2020.5.0073","url":null,"abstract":"We have proposed a suited buffer size for Heterogeneous network traffics, with an average significant throughput and response delay.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"111 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77058672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TOWARDS DATA PRIVACY AND SECURITY FRAMEWORK IN BIG DATA GOVERNANCE","authors":"Jacentha N.Maniam, Dalbir Singh","doi":"10.15282/ijsecs.6.1.2020.5.0068","DOIUrl":"https://doi.org/10.15282/ijsecs.6.1.2020.5.0068","url":null,"abstract":"Data privacy and security are among the most important aspects to be considered in implementing a data-driven system. A well generated Big Data contains a wealth of information that can reveal personal life that should be kept in private. Although various studies and Big Data analysis are widely documented, the methods and policies to ensure the privacy and security of data in Big Data governance remain unclear. Big Data analytics also seeks to make the affected person disclose new and critical personal information that is not intended for disclosure. Thus, this study focuses on data privacy and security issues in Big Data governance. The objective of this study aims to propose of Big Data governance framework that complements data privacy and security factors. This study uses a qualitative approach in the development of the research framework based on a systematic literature review and evaluated by experts to validate the framework. This study is expected to benefits the public and private sectors where the proposed framework could be applied as a guide to preventing any data leakage or misuse of Big Data.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"102 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89007463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SEMANTIC SIMILARITY MEASUREMENT FOR MALAY WORDS USING WORDNET BAHASA AND WIKIPEDIA BAHASA MELAYU: ISSUES AND PROPOSED SOLUTIONS","authors":"T. Zakaria, M. J. Aziz, M. Mokhtar, S. Darus","doi":"10.15282/ijsecs.6.1.2020.4.0067","DOIUrl":"https://doi.org/10.15282/ijsecs.6.1.2020.4.0067","url":null,"abstract":"What is the similarity between ‘car’ and ‘automobile’? How many similarities are shared by these two words? This equation can be easily evaluated by humans but not by computers. Human language is very complicated and ambiguous. This ambiguity is a barrier that separates human understanding with computer comprehension. Semantic similarity between words is a very important task and widely practiced in the field of natural language processing. In this article, some issues regarding semantic similarity for Malay language using two Malay lexical resources (WordNet Bahasa and Wikipedia Bahasa Melayu) are discussed. Then, some solutions to solve the arising issues are proposed. An experiment was done to evaluate the performance of WordNet Bahasa and Wikipedia Bahasa Melayu on the coverage of semantic information for 150 Malay translated words (75 word-pairs). The result showed that the WordNet Bahasa and Wikipedia Bahasa Melayu are capable to be adapted to literature techniques. For WordNet Bahasa, we tested the coverage of WordNet Bahasa based on three word-levels (stem level, root level and mix level) to find the most applicable word level as our dataset. This is because WordNet Bahasa is a limited resource and some of the compound words cannot be match with the lemma in its database. The test indicated that the mix level of translated words outperformed the stem level and root level with 86.7% compared to stem level (78.7%) and root level (68.0%). For Wikipedia Bahasa Melayu, we evaluated the coverage of three main features in its article (gloss definitions, hyperlinks and categories) where these features are important in some previous techniques. The result of this test was used to choose the best technique based on the coverage of these features. The results of the experiment revealed that the gloss definition feature gave full coverage (100%) for our 75 word-pairs input compared to hyperlinks and categories (88.0%).","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"73 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86929768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GREEDY SHORTEST SUPERSTRING WITH DELAYED RANDOM CHOICE","authors":"Mutaz Rasmi Abu Sara, M. F. J. Klaib, M. Hasan","doi":"10.15282/ijsecs.6.1.2020.2.0065","DOIUrl":"https://doi.org/10.15282/ijsecs.6.1.2020.2.0065","url":null,"abstract":"The shortest superstring problem for a given set of strings is to find a string of minimum length such that each input string is a substring of the resulting string. This problem is known to be NP-complete. A simple and popular approximation algorithm for this problem is GREEDY, which at each step merges a pair of strings that have maximum overlap. If more than one pair have maximum overlap, it takes a pair in random. In this paper, we modify GREEDY such that instead of taking a pair in random, it takes the pair for which the overlap in the next step is maximum. We analyze our algorithm and compare it with GREEDY for different types of input. We implement both the algorithms and the experimental results show that our algorithm can outperform GREEDY substantially in many cases, and in general our algorithm is same or better than GREEDY.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85746718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sharifah Hafizah Sy Ahmad Ubaidillah, Noraziah Ahmad
{"title":"FRAGMENTATION TECHNIQUES FOR IDEAL PERFORMANCE IN DISTRIBUTED DATABASE – A SURVEY","authors":"Sharifah Hafizah Sy Ahmad Ubaidillah, Noraziah Ahmad","doi":"10.15282/ijsecs.6.1.2020.3.0066","DOIUrl":"https://doi.org/10.15282/ijsecs.6.1.2020.3.0066","url":null,"abstract":"Distributed processing is an operative way to improve the performance of the distributeddatabase systems and thus showing the effectiveness of computational intelligence. Aspecific arrangement of distributed processing through distributed database, where alogically integrated database is physically scattered over several distinct but linkedthrough the computing facilities. Hence, proper fragmentation of data across numeroussites of the network is considered as a significant exploration area in the distributeddatabase environment. Data can be allocated in distinct servers by fragmenting thecomplete or partially database into several pieces with different techniques. Each piece isstored at the different sites. In this paper, an exploration of fragmentation techniques indistributed database is done. Fragmentation techniques had been proved by manyresearches in improving the performance of the distributed database system, increase thedata accessibility, reduce the transfer cost and access time. This paper presents a surveyof numerous fragmentation techniques on distributed database systems.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72523704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}