2021 2nd International Informatics and Software Engineering Conference (IISEC)最新文献

筛选
英文 中文
The Evaluation of Enterprise Resource Planning using ISO 25010 Based Quality Model 基于ISO 25010质量模型的企业资源规划评价
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672349
Mazharul Islam, Rajib Imran, S. Hosain
{"title":"The Evaluation of Enterprise Resource Planning using ISO 25010 Based Quality Model","authors":"Mazharul Islam, Rajib Imran, S. Hosain","doi":"10.1109/iisec54230.2021.9672349","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672349","url":null,"abstract":"Software quality standards are fundamental today, particularly as the age of software technology and systems in every organization innovates the work process. Evaluations are carried out to assess service quality and product quality. In this paper, we present the evaluation of Enterprise Resource Planning (ERP) using eight major characteristics of ISO25010 Based quality model. Fifty functional users participated in the survey who used the ERP in day-to-day business to test and complete the existing system. The emphasis of this paper is on evaluating the framework built using the software quality Control ISO 25010:2011 based on the business and IT field. The method was tested and validated by 50 respondents consisting of users, heads of departments, and IT professionals using an adapted evaluation instrument. The findings shown in the paper demonstrate the assessment of the framework respondents with each characteristic of ISO25010.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three-Tier Password Security Algorithm for Online Databases 在线数据库的三层密码安全算法
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672434
Zubair Zaland, S. Bazai, Shahabzade Marjan, M. Ashraf
{"title":"Three-Tier Password Security Algorithm for Online Databases","authors":"Zubair Zaland, S. Bazai, Shahabzade Marjan, M. Ashraf","doi":"10.1109/iisec54230.2021.9672434","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672434","url":null,"abstract":"Password security is a significant issue for any authenticating process, and different researchers in the past have proposed techniques such as hashing, salting, honeywords to make the process most secured. We provide a self-guaranteed secure program and its access methods to mitigate the risk of illegal attacks like DDoS. This method ensures the security of a program by giving method level security that bolsters the further implemented security measures. A step-up approach is implementing the access security measures that protect against SQL injection and script attacks. Lucubration of various papers suggests that most systems are compromised at the storage of login credentials. Our solution ensures the security of such measures by obscurity. By using multiple layers of additional security procedures before storing the data decreases the risk of break-in exponentially. Our attempt to securely store passwords includes salting the passwords, encrypting them, and finally hashing them so that no patterns are visible. This paper presents a new method that involves SQLi prevention, encrypting, salting and then hashing the password. The SALT is generated dynamically using two parameters, one of which is unique, and the Salt is not stored in the database.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133543115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Domesticating a Treasury Shadow IT Application in a Turkish Bank 土耳其某银行财政影子IT应用的本土化
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672431
Berkan Keskin, N. Ozkan, Kübra Nuir Bulut, M. Gök, G. Ozer
{"title":"Domesticating a Treasury Shadow IT Application in a Turkish Bank","authors":"Berkan Keskin, N. Ozkan, Kübra Nuir Bulut, M. Gök, G. Ozer","doi":"10.1109/iisec54230.2021.9672431","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672431","url":null,"abstract":"Shadow information technology (Shadow IT) is defined as “hidden” IT solutions autonomously deployed in and managed by business departments to support their processes without alignment with IT departments. It has many issues concerning organizations with the occurrence of risks and inefficiencies. Meanwhile, its prevalence implies enhanced flexibility, adaptability, innovation, and performance for businesses to meet changing needs and diversifications facing complexity of today's business environments. Considering its advantages and risks together, it is necessary to control Shadow IT and its effects in organizations. To control Shadow IT applications, it is possible to see that organizations produce their own specific ways to control the Shadow IT instances. As an example, Kuveyt Turk Participation Bank has developed its own customized solution to one of the major Shadow IT instances, IT treasury application. The customized solution includes separation, allocation, and assurance of responsibilities between business and IT units. This case study presents the factors for the Shadow IT application occurrence in the bank, possible risks the application bears, the conversion project from Shadow IT to business IT, major challenges and solution approach applied, and further possible courses of the application (such as the possibility of turning from business IT to Shadow IT or from Shadow IT to parallel IT). Finally, the study delivers implications from the most challenging issues and the experiences obtained from the case, to give further insights to organizations in similar contexts.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121960640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Segmentation and Classification Using CNN Model to Detect Brain Tumors 基于CNN模型的图像分割与分类检测脑肿瘤
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672428
Shadi M. S. Hilles, Noor S. Saleh
{"title":"Image Segmentation and Classification Using CNN Model to Detect Brain Tumors","authors":"Shadi M. S. Hilles, Noor S. Saleh","doi":"10.1109/iisec54230.2021.9672428","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672428","url":null,"abstract":"Brain tumors are classified using a biopsy in brain surgery, the Enhancement technique and machine learning may assist tumor diagnosis without invasive procedures. where is a convolutional neural network CNN is a popular method in deep learning that has produced considerable success in image segmentation and classification (CNN). this paper presents a brain tumor segmentation and classification architecture with three tumor modalities. The neural network has been created and its much simple than what actually the current pre trained networks and also has been tested using contrast-enhanced magnetic resonance images MRI from T1. The capacity of the network to generalize has been evaluated using one of the 10 times, subject-specific cross-validation techniques and tested by an enlarged images in dataset. The best result was achieved for the 10-fold cross-validation technique for the record-oriented cross-validation of the increased data set, and the accuracy in this instance was 96.56 percent. The newly designed CNN architecture may be utilized as an effective decision support tool for radiologists in medical diagnosis with high generalization capacity and fast performance speed.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127656134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Disease Diagnosis by Nadi Analysis Using Ayurvedic Methods with Portable Nadi Device & Web Application 用阿育吠陀方法用便携式Nadi设备和Web应用进行Nadi分析疾病诊断
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672342
A. Bandara, N.K. Madanayake, P.K.K. Devaka, Perera L. Geethan Madurange, S. Silva, Pradeep Abeygunawardhna
{"title":"Disease Diagnosis by Nadi Analysis Using Ayurvedic Methods with Portable Nadi Device & Web Application","authors":"A. Bandara, N.K. Madanayake, P.K.K. Devaka, Perera L. Geethan Madurange, S. Silva, Pradeep Abeygunawardhna","doi":"10.1109/iisec54230.2021.9672342","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672342","url":null,"abstract":"As the world's population grows, so does the number of people who suffer from asthma, gastritis, and hypotension. In the future, there will be a need for the development of a system with early human health diagnostics. There are various methods to examine a patient's pulse in the medical field today. However, their fundamental concepts, clinical procedures are also evolved from our ayurvedic treatments. The purpose of this study is to develop a minimally invasive device and questionnaire to aid doctors in diagnosing diseases based on traditional Ayurvedic methods. Nadi Pariksha is an old medical technique that dates back to India and China. Ayurveda is the root of this approach. Ayurveda, in addition to examining the pulse, the patient is also diagnosed by asking questions and examining the cough, eyes, and face. Once the disease is diagnosed with these two methods, a prescription is generated for the diagnosed disease and the nearest hospitals and pharmacies. They are displayed to the patient for further convenience.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125266845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Long-Term Deposit Customers: A Machine Learning Approach 识别长期存款客户:一种机器学习方法
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672452
Mohammad Abu Tareq Rony, M. Hassan, Eshtiak Ahmed, Asif Karim, S. Azam, D. S. A. A. Reza
{"title":"Identifying Long-Term Deposit Customers: A Machine Learning Approach","authors":"Mohammad Abu Tareq Rony, M. Hassan, Eshtiak Ahmed, Asif Karim, S. Azam, D. S. A. A. Reza","doi":"10.1109/iisec54230.2021.9672452","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672452","url":null,"abstract":"Majority of the revenue from the banking sector is usually generated from long term deposits by customers. It is for banks to understand customer characteristics to increase product sales. To aid this, marketing strategies are employed to target potential customers and let them interact with the banks directly, generating a large amount of data on customer characteristics and demographics. In recent years, it has been discovered that various data analysis, feature selection and machine learning techniques can be employed to analyze customer characteristics as well as variables that can impact customer decision significantly. These methods can be used to identify consumers in different categories to predict whether a customer would subscribe to a long-term deposit, allowing the marketing strategy to be more successful. In this study, we have taken a R programming approach to analyze financial transaction data to gain insight into how business processes can be improved using data mining techniques to find interesting trends and make more data-driven decisions. We have used statistical analysis like Exploratory Data Analysis (EDA), Principal Component Analysis (PCA), Factor Analysis and Correlations in the given data set. Besides, the study's goal is to use at least three typical classification algorithms among Logistic Regression, Random Forest, Support Vector Machine and K-nearest neighbors, and then make predictive models around customers signing up for long term deposits. Where we have gotten best accuracy from Logistic Regression which is 90.64 % as well the sensitivity is 99.05 %. Results were analyzed using the accuracy, sensitivity, and specificity score of these algorithms.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126947717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Digital Democracy: A Secure Platform for Voting 数字民主:一个安全的投票平台
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672367
Krs Peiris, G. Gunathilake, J.A.E.P. Attanayaka, Imssk Ilankoon, S. Chandrasiri, D. Wijendra
{"title":"Digital Democracy: A Secure Platform for Voting","authors":"Krs Peiris, G. Gunathilake, J.A.E.P. Attanayaka, Imssk Ilankoon, S. Chandrasiri, D. Wijendra","doi":"10.1109/iisec54230.2021.9672367","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672367","url":null,"abstract":"The voting system is the way to elect country representatives. It is a set of rules that determine how the elections and referendums are conducted and how their results are determined. Voting is commonly related to politics and is finished with exploitation and a manual approach. The voters stand to vote for his or her decision. There are many ways to conduct voting, and for a developing country like Sri Lanka, the polling power to have an excellent representative to develop the country into a better and prosperous one. Usually, the existing voting system is operated manually and sometimes may lead to malpractices. Many have suggested diverse ways to overcome the problems, and sometimes those recommendations have failed. The most reliable way to accomplish this is to expand the technology from manual voting systems to digital voting systems. There are several significant issues with introducing such a digital voting system. A significant problem here is the low level of technical knowledge among the people of Sri Lanka. Such a system would be a problem for some at once. This research paper aims to put forward a study on why and how it is necessary to shift from a standard voting system to a digital platform and how it saves time and energy.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network for Traffic Sign Recognition based on Color Space 基于颜色空间的卷积神经网络交通标志识别
2021 2nd International Informatics and Software Engineering Conference (IISEC) Pub Date : 2021-12-16 DOI: 10.1109/iisec54230.2021.9672400
Gülcan Yildiz, B. Dizdaroğlu
{"title":"Convolutional Neural Network for Traffic Sign Recognition based on Color Space","authors":"Gülcan Yildiz, B. Dizdaroğlu","doi":"10.1109/iisec54230.2021.9672400","DOIUrl":"https://doi.org/10.1109/iisec54230.2021.9672400","url":null,"abstract":"Traffic sign recognition has been one of the indispensable issues of Advanced Driver Assistance Systems. In this study, a new CNN model for traffic sign recognition based on deep learning is proposed. The proposed model has low number of parameter and high accuracy compared to most studies in the literature. Initially, in preprocessing stage, different color spaces are tried for the input image, and their combinations are given to the network together. Color spaces used in the study are RGB, CIELab, RIQ and LGI. In addition, the accuracy results were compared by experimenting on the input image dimensions. Additionally, data augmentation was applied during the training phase. As a result, 98.84% accuracy was obtained by giving the input image with RIQ and LGI color space to the network. The number of parameters is 0.95 M.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115097519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信