{"title":"Incorporating a Web-Based System to Implement Services and Recommendation System for International Students in Northeastern University (NEU)","authors":"Kometa Denis Mbowoh","doi":"10.5121/ijcseit.2023.13301","DOIUrl":"https://doi.org/10.5121/ijcseit.2023.13301","url":null,"abstract":"China has become a major study destination for many international students who come to study in many higher institutions at different levels. NEU is one of these higher institutions and as a result seeks to make life comfortable for the international students who come to study there. It is in this vein that this system has been designed with the objective of enabling any new foreign student arriving NEU to acquaint themselves with the new environment and integrate it in less than no time thereby overcoming the fear of the new environment which grips every new comer. Key technologies, tools such as Spring MVC/Security, JSF Prime Faces, etc. were carefully chosen for the development of the project. The system development followed the system development life cycle, specifically using the agile methodology. Testing proved that the proposed system is a very responsive and could run well on most browsers.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121244184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-Depth Analysis and Systematic Literature Review on Risk Based Access Control in Cloud","authors":"Sadia Hussain, M. H. Islam, H. Abbas","doi":"10.5121/ijcseit.2022.12501","DOIUrl":"https://doi.org/10.5121/ijcseit.2022.12501","url":null,"abstract":"Security in Cloud is one of the most foremost and critical feature, which can ensure the confidence of the Scientific community on Cloud environment. With the dynamic and ever changing nature of the Cloud computing environment, static access control models become obsolete. Hence, dynamic access control models are required, which is still an emergent and underdeveloped domain in Cloud security. These models utilize not only access policies but also contextual and real-time information to determine the access decision. Out of these dynamic models the Risk-based Access control model, estimates the security risk value related to the access request dynamically to determine the access decision. The exclusive working pattern of this access control model makes it an excellent choice for dynamically changing environment that rules the cloud’s environment. This paper provides a systematic literature appraisal and evaluation of risk-based access control models to provide a detailed understanding of the topic. The contributions of selected articles have been summarized. The security risks in cloud environment have been reviewed, taking in the account of both Cloud Service Provider and Cloud Customer perspectives. Additionally, risk factors used to build the risk-based access control model were extracted and analyzed. Finally, the risk estimation techniques used to evaluate the risks of access control operations have also been identified.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Warehousing as Knowledge Pool : A Vital Component of Business Intelligence","authors":"Abobakr Aljuwaiber","doi":"10.5121/ijcseit.2022.12402","DOIUrl":"https://doi.org/10.5121/ijcseit.2022.12402","url":null,"abstract":"Increasing amounts of information and diverse formats have forced organizations to create large data repositories in response to the information explosion in the 21st century. As a result, the model of a data warehouse has been introduced to define a large data repository. The purpose of this article is to describe the principles of data warehousing in business and how it can enhance the generation of new knowledge throughout the organization. Definitions of data warehousing are considered and include methods of its use, namely query and data simulation. The steps required prior to transforming the raw data into a data warehouse and project goals for data warehouses and metadata are also discussed. The objective of this document is to provide a clear and simple description of data warehousing terms and concepts, especially for busy managers and laymen. They may only need basic and direct information about data warehouses to gain a complete understanding of the principles of the data warehouse.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122098025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Saranya, Kariketi Tharun Reddy, Madhumitha Raju, Manoj Kutala
{"title":"Multiple Objects and Road Detection in Unmanned Aerial Vehicle","authors":"M. Saranya, Kariketi Tharun Reddy, Madhumitha Raju, Manoj Kutala","doi":"10.5121/ijcseit.2022.12401","DOIUrl":"https://doi.org/10.5121/ijcseit.2022.12401","url":null,"abstract":"Unmanned Aerial Vehicles have greater potential to widely used in military and civil applications. Additionally equipped with the cameras can also be used in agriculture and surveillance. Aerial imagery has its own unique challenges that differ from the training set of modern-day object detectors, since it is made of images of larger areas compared to the regular datasets and the objects are very small on the contrary. These problems do not allow us to use common object detection models. Currently there are many computer vision algorithm that are designed using human centric photographs, But from the top view imagery taken vertically the objects of interest are small and fewer features mostly appearing flat and rectangular, certain objects closer to each other can also overlap. So detecting most of the objects from the birds eye view is a challenging task. Hence the work will be focusing on detecting multiple objects from those images using enhanced ResNet, FPN, FasterRCNN models thereby providing an effective surveillance for the UAV and extraction of road networks from aerial images has fundamental importance.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132346267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis of Surface and Growth Differences in Plants of Different Stages Using Image Processing","authors":"Faizur Rashid, Tamirat Delesa","doi":"10.5121/ijcseit.2019.9401","DOIUrl":"https://doi.org/10.5121/ijcseit.2019.9401","url":null,"abstract":"Genomes are main reason for growth and surface differences in the plants. All plants grow on basis of their different surrounding like soil, water, breed of seed, and climatic session. This paper attempts to find stem growth from birth to maturity level of selected plant using image processing technique. Few reasons have been observed commonly by the researchers that some plants could not grow sufficiently as to the other plants of similar breed and age. Images were taken of different stage of bean plant and images of some other plant samples were also included for better assessment. Researchers are trying to understand through their calculative analysis by image processing emulator in MATLAB to view its reasons. Suitable comparison technique is applied to detect their period of growth. Image processing methods like Restoration, stem or leaves spots, filtering, and plant comparison have applied in MATLAB. Those effects that are not supporting to grow the plants of their similar age group are matter to calculate scientifically later in the future. The observation would help for further support in medicinal science or agricultural science of plant and Bio-chemical.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131400500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Green ICT Policy Maturity for Actualization of Sustainable Computing in Developing Nations","authors":"Franklin Wabwoba","doi":"10.5121/IJCSEIT.2019.9301","DOIUrl":"https://doi.org/10.5121/IJCSEIT.2019.9301","url":null,"abstract":"Green ICT Policy encompasses the frameworks an organization has developed and put in place to apply environmental sustainability criteria throughout its value chain. The lack of appropriate green policy alignment to application of ICT uptake challenges the reaping of the benefits often stated of ICT. Multiple case study design with case from different sectors of the economy selected based on information richness, accessibility, size as well as diversity in application of ICT was employed. Triangulation of data collection and findings interpretation was utilised. The study established that green ICT policy maturity was very low. In effect, calling for purposed policy set up on green ICT application by developing nations to ensure ICT benefits are realised while limiting environmental degradation.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134008519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Method of Small-Signal Calibration Based on Kalman Filter","authors":"X. Xiong, Wang Jun, Xu Jun, Yang Wei","doi":"10.5121/IJCSEIT.2019.9201","DOIUrl":"https://doi.org/10.5121/IJCSEIT.2019.9201","url":null,"abstract":"The basic principle of Kalman filter (KF) is introduced in this paper, based on which, it presents a new method for high precision measurement of small-signal instead of the unreal direct one. We have designed a method of multi-meter information infusion. With this method, we filter the measured value of a type of special equipment and extract the optimal estimate for true value. Experimental results show that this method can effectively eliminate the random error of the measurement process. The optimal estimate error meets the basic requirements of conformity assessment, 3U95 ≤ MPEV. This method can provide an algorithm reference for the design of automatic calibration equipment.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132198877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Employers’ Needs for Technical and Soft Skills Among New Graduates","authors":"Christopher Scaffidi","doi":"10.5121/ijcseit.2018.8602","DOIUrl":"https://doi.org/10.5121/ijcseit.2018.8602","url":null,"abstract":"Motivated by concern about the ability of graduates to succeed in the workforce, universities frequently conduct surveys of local and regional employers, to understand those companies’ expectations. These can uncover specific needs not being addressed. Following a similar line of inquiry, prior research at Oregon State University interviewed employers, with the aim of identifying skills of concern. The current paper takes this research another step further by presenting a survey-based study aimed at quantifying the prevalence and level of employers’ desire for workers who have these identified skills. Although all skills were rated as moderately useful or better, most soft skills scored higher than most technical skills. Nonetheless, three technical skills (source code versioning, testing and agile methods) scored approximately as well as the soft skills; these three technical skills, like soft skills, were cross-cutting and applicable to more than one software development context. Further survey questions revealed that employers preferred that, to the extent that students focus on building technical skill, these learning experiences ideally should involve creating software that students can use as evidence of their qualifications.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Ahmed, Rubaiyat Yasmin, H. Homyara, M. A. F. M. R. Hasan
{"title":"Generalized Power Allocation (GPA) Scheme for Non-Orthogonal Multiple Access (NOMA) Based Wireless Communication System","authors":"T. Ahmed, Rubaiyat Yasmin, H. Homyara, M. A. F. M. R. Hasan","doi":"10.5121/ijcseit.2018.8601","DOIUrl":"https://doi.org/10.5121/ijcseit.2018.8601","url":null,"abstract":"This paper presents a Generalized Power Allocation (GPA) scheme for different users in Non-Orthogonal Multiple Access (NOMA) based wireless communication system. The power allocation to the users becomes complex with the increased number of users. There are some conventional schemes for power allocation in NOMA but they have to optimize some parameters arbitrarily. In this paper, a simple but effective power allocation scheme has been formulated and tested by simulations. The proposed GPA scheme does not need any parameter adjustment. Theoretical power distribution to different users of NOMA has been calculated using the proposed GPA technique. The calculated powers of individual users with the proposed scheme are different and more distributed than the arbitrary power allocation scheme which satisfies the basic condition of NOMA. The total of calculated powers with GPA scheme shows only 01% variation with the arbitrary power allocation scheme which shows the consistency of GPA scheme with other schemes. The performance of NOMA based wireless communication system with GPA scheme has been simulated under various conditions using Matlab. The simulated BER performance for NOMA based wireless communication system using different modulation techniques show similar results with other conventional schemes which validates the formulation of GPA scheme.","PeriodicalId":394306,"journal":{"name":"International Journal of Computer Science, Engineering and Information Technology","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129613727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}