{"title":"Enhancing student performance prediction through stream analysis dataset using modified XGBoost algorithm","authors":"Nityashree Nadar","doi":"10.59035/knug1085","DOIUrl":"https://doi.org/10.59035/knug1085","url":null,"abstract":"In the education domain, predicting the academic performance of students has become an essential task to improve learning outcomes. In this study, we propose a Modified XGBoost (MXGB) model for predicting student performance using stream-based analysis of the dataset. We used a modified version of the XGBoost algorithm using cross-validation, which incorporates stream-based analysis to enhance its performance on real-time data. We preprocessed the dataset and applied feature engineering techniques to extract relevant features for building the model. We trained the MXGB model on the preprocessed dataset and evaluated its performance using various metrics such as accuracy, precision, sensitivity, and F1-score. The results show that our model outperforms the baseline XGBoost model and achieves high accuracy in predicting the student's academic performance. Our model can assist educational institutions in identifying students who are at risk of performing poorly and providing them with timely intervention to improve their academic outcomes.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inference and performance aware multi-channel scheduling and routing scheme with call admission control in wireless mesh networks","authors":"K. Mathad, M. Math","doi":"10.59035/xuys3831","DOIUrl":"https://doi.org/10.59035/xuys3831","url":null,"abstract":"As wireless mesh networks have been deployed in the urban area, dynamic channel allocation is more challengeable because co-located wireless mediums are likely to be tuned to the same channels and may interfere with communication. Further, existing model doesn’t consider reutilizing routing resource. This paper presents an efficient scheduling and routing model considering an external interference and routing resource reutilization for multi-channel wireless mesh networks. Each mesh node uses a novel technique to estimate the usage status of all the channels within its interference range and assigns channels dynamically to radios to minimize interference within the mesh network and between the mesh network and collocated wireless networks. Simulation results demonstrate that our proposed algorithm can improve the network throughput, reduce packet failure rate and consume more energy while transmission substantially compared to other algorithms by removing the interference overestimation problem and assigning channels aggressively with priority.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90289800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer simulation of strength testing of an object based on signal shaped resources","authors":"S. Zelmanov, V. Krylov","doi":"10.59035/fpon6910","DOIUrl":"https://doi.org/10.59035/fpon6910","url":null,"abstract":"Considered the problem of the effectiveness of the proposed and protected method for testing systems and structures, based on the use of the impulse response of the test object as an optimal test signal. The purpose of the study is to confirm the gain in the magnitude of the response of the test object to the optimal signal compared to traditional methods. To solve the considered problem, an approach based on the representation of the test object in the form of a matched filter is proposed. As a result of computer simulation of the procedure for the impact of various test signals on the test object, it was possible to show the advantage of the optimal test signal in the form of the maximum response of the test object to it.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76051441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Hnatchuk, T. Hovorushchenko, Daria Shteinbrekher, A. Boyarchuk, T. Kysil
{"title":"Medical information technology for decision-making taking into account the norms of civil law","authors":"Y. Hnatchuk, T. Hovorushchenko, Daria Shteinbrekher, A. Boyarchuk, T. Kysil","doi":"10.59035/yvmt7964","DOIUrl":"https://doi.org/10.59035/yvmt7964","url":null,"abstract":"The task of this study is the design of medical information technology for decision-making taking into account the norms of civil law. The proposed medical information technology ensures the support when making medical decisions about the opportunity of reproductive technologies use (in vitro fertilization, surrogate motherhood), about the opportunity of transplantation and donation, about the opportunity of providing general medical services, about the opportunity of providing therapeutic services, about the opportunity of providing dental services, about the opportunity of vaccination. In addition, the designed information technology automates medical decision-making, minimizes the impact on medical decision-making, takes into account the norms of civil law when making medical decisions.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79255636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pre-copy live virtual machine migration techniques in cloud computing using HDWHM algorithm","authors":"N. Devi, S. Sushanth Kumar","doi":"10.59035/zgnk2556","DOIUrl":"https://doi.org/10.59035/zgnk2556","url":null,"abstract":"Live Virtual Machine (VM) migration is a legacy of server virtualization in cloud computing. One of the difficulties in a Virtual Machine (VM) Environment is load balancing, and the pre-copy migration strategy is both time-consuming and expensive. In this paper, we propose an efficient VM migration strategy to compute the parameters for Linear Adam Algorithm overload detection and Interquartile Range (IQR) under-loaded identification, the Central Processing Unit (CPU) utilization is sufficient. VMs require constant network traffic, storage, CPU, and memory demands. This study recommends using the novel Hamming Distance-Based Weighted Harmonic Mean (HDWHM) strategy for pre-copy live VM migration. We tested the suggested strategy using datasets from CloudSim-3.0.3 on a real PlanetLab. Simulations show that the suggested approach decreases host downtimes, energy consumption, VM migrations, and SLA degradation.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84625045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A special mathematical model for the study of electrical circuits components by the method of differential inclusions","authors":"N. Hien, L. Phuong, V. Bolnokin","doi":"10.59035/girq4188","DOIUrl":"https://doi.org/10.59035/girq4188","url":null,"abstract":"Many information technologies for numerical analysis of electrical circuit parameters have been developed. The peculiarity of these methods is their applicability not only to DC but also AC circuits, not only to linear but also nonlinear circuits. This paper introduces the special mathematical model for rectifier circuits using semiconductor diodes. In previous studies, the rectifier circuit has been modelled by differential inclusions. However, the inclusions cannot be solved by the applied programs of information technology. In this paper, the new model writing by differential equation with a special right hand side is studied to replace the classical model. The main result of this is presented in a theorem that gives the correctness of the new model. The usefulness of this study is illustrated via a concrete example.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88008616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical evaluation of the transfer of information resources in active learning","authors":"R. Romansky","doi":"10.59035/wzfu1905","DOIUrl":"https://doi.org/10.59035/wzfu1905","url":null,"abstract":"Active learning is an alternative to traditional learning, using the capabilities of the global network to access remote information resources. The purpose of the article is to analyse the sources and factors of delay in the implementation of network services and the possibilities of access to distributed information objects depending on their size and remoteness. The research was conducted by collecting empirical data (monitoring) on the transfer of resources between client and server. A research organization model was developed and an implementation application was created. Experiments were carried out, and the obtained results were summarized and presented through statistical evaluations and graphical interpretation.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81129580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dragonfly soft-computing approach for workload scheduling resource utilization maximization using multi-cloud platform","authors":"Arundhati Nelli, R. Jogdand","doi":"10.59035/mbul3714","DOIUrl":"https://doi.org/10.59035/mbul3714","url":null,"abstract":"The execution of the real-time workload in the multi-cloud platform with the Service Level Agreement (SLA) requirements is a challenging task. Existing workload scheduling models have addressed issues related to minimizing execution time, cost, and energy with application reliability prerequisite. However, these models are not efficient in maximizing resource utilization under a multi-cloud platform. In addressing resource utilization issues, this paper presents a Workload Scheduling Resource Utilization Maximization (WS-RUM) technique for the multi-cloud platform. The WS-RUM technique leverages a multi-objective such as energy, processing efficiency, and fault-tolerant offloading mechanism employing a dragonfly soft computing algorithm. The WS-RUM improves resource utilization by minimizing both energy and processing time for real-time workload execution in comparison with existing workload execution.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89462018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure efficient task communication mechanisms for Big Data environment","authors":"Vinod Desai, D. Annappaiah","doi":"10.59035/ezob4017","DOIUrl":"https://doi.org/10.59035/ezob4017","url":null,"abstract":"In this paper, a Secure Efficient Task Communication (SETC) Mechanism for Big data environment has been proposed. The SETC mechanism detects the oscillating device efficiently (detects the good and bad behaviour of the node). The results have been compared with the current reliability-based security methods. The SETC method has achieved very good detection rate, reduced the detection failure rate, and provided high reliability in comparison to the current reliability-based security methods. It has been seen that the current reliability-based security methods fail to address the issue of the dynamic behaviour of the sensor nodes and feedback-reliability. In addition, in comparison to the conventional cryptography-based authentication method, the reputation-based security system is far more effective at determining the behaviour of the user.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80013891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Side channel attack performance of correlation power analysis method in noise","authors":"Fikret Garipay, Kemal Uzgören, İsmail Kaya","doi":"10.59035/uwcb7557","DOIUrl":"https://doi.org/10.59035/uwcb7557","url":null,"abstract":"This article explores the use of artificial noise to defend against power analysis and power analysis-based side-channel attacks on AES encryption. The study covers both hardware and open-source software components for performing power analysis and provides an analysis of attack performance. It also explains how security measures against side-channel attacks can be implemented without disrupting system operation.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74989417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}