Int. J. Web Appl.Pub Date : 2018-12-01DOI: 10.6025/IJWA/2018/10/4/137-153
K. H. Ramanayaka, Xianqiao Chen, Bing Shi
{"title":"Identifying Relative Weights of Evaluation Indices for Library Website Usability Acceptance Model by Applying the Extent Analysis Fuzzy AHP Approach","authors":"K. H. Ramanayaka, Xianqiao Chen, Bing Shi","doi":"10.6025/IJWA/2018/10/4/137-153","DOIUrl":"https://doi.org/10.6025/IJWA/2018/10/4/137-153","url":null,"abstract":"A library website plays an enhanced role compared to its traditional physical library while providing a wide variety of library services to its users. Evaluation of library websites is a key to realize the extent of user acceptance to the website and to improve overall quality of website. Usability is a highly recognized factor to determine how easy to use the website. The models of usability evaluations evaluate the ease of use of website operations and see whether the users can perform their tasks easily. Moving on further, this study has been undertaken in context of library websites in Sri Lanka with the main purpose of exploring the favourable weights of the seven key dimensions and 20 measuring items with the aids of experts in the related field. These dimensions and measuring items were identified from our previous study which have been tested its reliability and validity in assessing library website usability in Sri Lanka with the aids of actual library users in Sri Lanka. Fuzzy theories together with the extent analysis fuzzy analytic hierarchy process method were applied. It was expected to identify the relative importance of the criteria of interest while avoiding uncertainty, ambiguity, loss of data, and difficulties faced in assessment cycle. Triangular fuzzy numbers were used to represent the judgments on the relative importance between each pair of factors that makes experts consensus uniform rather than using linguistic values. The research findings concluded that satisfaction was the dimension that the experts considered most important in evaluating library website usability. The experts rated accessibility as the least important dimension.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115746247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Int. J. Web Appl.Pub Date : 2018-12-01DOI: 10.6025/ijwa/2018/10/4/127-136
O. Salubi, N. Muchaonyerwa, F. Nekhwevha
{"title":"Digital Media Usage and Prevalence of Internet Addiction among Undergraduate Students in South Africa","authors":"O. Salubi, N. Muchaonyerwa, F. Nekhwevha","doi":"10.6025/ijwa/2018/10/4/127-136","DOIUrl":"https://doi.org/10.6025/ijwa/2018/10/4/127-136","url":null,"abstract":"Internet and digital media for educational purposes have significantly improved knowledge creation. The Internet has proven itself to be a valuable resource in the enhancement of knowledge production and dissemination. The purpose of the study was to establish how excessive non-academic use of the Internet detrimentally affects undergraduate students’ daily lives. Using survey design, a total of 390 University undergraduate students comprising mainly adolescents/ young adults were selected using stratified random sampling at two South African universities, namely Fort Hare and Nelson Mandela. Data were collected using the Modified Internet Addiction Test for Undergraduates (MIATU), a modification of Internet Addiction Test (IAT) questionnaire. 282 (72.3%) use of the respondents indicated that they make use of the Internet daily with 34.8% spending more than 10 hours. More than 60% have access to at least two electronic devices. Most of the respondents stayed online longer than intended (x 2.88), slept less at night due to Internet use (x 2.63) and hence spent less time studying owing to Internet surfing (x 2.27). Furthermore, the amount of time spent on the Internet had a significant relationship with the level of influence the use of the Internet had on respondents (B = 0.250, t = 4.850, p < 0.05). The findings are indications that the excessive amount of time spent on the Internet served as a distraction from school work, a situation that put students at a disadvantage in as far as academic productivity was involved. These findings clearly suggest that the uncontrolled use of new media is both a hazard and a potential danger to academic productivity.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132382942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Int. J. Web Appl.Pub Date : 2018-09-01DOI: 10.6025/IJWA/2018/10/3/91-99
Akash Sharma, Deepanshu Batra, Rajat Pandey, Priti Narwal, Vinay Kumar
{"title":"Distributed Denial of Service Attack and its Countermeasures","authors":"Akash Sharma, Deepanshu Batra, Rajat Pandey, Priti Narwal, Vinay Kumar","doi":"10.6025/IJWA/2018/10/3/91-99","DOIUrl":"https://doi.org/10.6025/IJWA/2018/10/3/91-99","url":null,"abstract":"91 ABSTRACT: Since past few years, there has been a rapid increase in use of attacks or cyber crime over the cyber space and one of the most common attacks used is the distributed denial of service attack. These attacks leads for use in the variety of both the attacks and the defence approaches. In this paper, classification of the available mechanisms which are proposed in the literature on how to keep the cyber space away from the possible DDoS attacks and discuss the strong and weak points of each mechanism. This provides the better understanding of the problem and enables a security administrator to effectively equip his storages with proper prevention mechanisms for fighting against DDoS attacks. The paper investigated multiple nature of the problem and look for its causes, further presenting brief insights and suggested approaches for defending against DDoS attack.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134038614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Int. J. Web Appl.Pub Date : 2018-09-01DOI: 10.6025/ijwa/2018/10/3/81-90
M. H. Shirvani
{"title":"A Non-Dominant Solution for Bi-objective Web Service Composition Problem in Multi-Cloud Environment","authors":"M. H. Shirvani","doi":"10.6025/ijwa/2018/10/3/81-90","DOIUrl":"https://doi.org/10.6025/ijwa/2018/10/3/81-90","url":null,"abstract":"81 ABSTRACT: A single cloud cannot meet all types of complicated business process requirements for the sake of vender lock-in, lack of fault tolerance and security uncertainty. Therefore, multi-cloud environment (MCE) is a promising solution in competitive market. Nevertheless, uncertainty relevant to security principles such as availability, integrity and confidentiality is the main challenge in this ambit. Virtualization as a key technology is pervasively being exploited in datacenters; so, variety known/unknown cybersecurity attacks threat mutli-tenant cloud datacenters. On the other hand, each service provider publishes same web services with different pricing scheme and different security level. We propose a framework in which every cloud can register its pricing scheme and its cybersecurity threats on a data warehouse via its broker module. Later, each security level can be measurable by our novel approach. Then, the web service composition problem is modeled to multiobjective optimization by monetary cost and cybersecurity viewpoints. We design and implement a multi-objective genetic approach to combine web service composition based on user cost and security requirement. Our proposed method well constitutes Pareto curve by finding non-dominance points. Simulation on different scenarios proves our approach dominance against a single objective heuristic ones.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121998416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Int. J. Web Appl.Pub Date : 2018-06-01DOI: 10.6025/IJWA/2018/10/2/51-63
Rajesh Singh, Rohit Samkaria, A. Gehlot, Sushabhan Choudhary
{"title":"Design and Development of IoT enabled Multi Robot System for Search and Rescue Mission","authors":"Rajesh Singh, Rohit Samkaria, A. Gehlot, Sushabhan Choudhary","doi":"10.6025/IJWA/2018/10/2/51-63","DOIUrl":"https://doi.org/10.6025/IJWA/2018/10/2/51-63","url":null,"abstract":"It can be admitted that multi robot systems have better possibilities of success in accomplishing surveillance and rescue missions. In proposed system, a multi robot system based on swarm intelligence is developed which will help in surveillance with real time data uploading on cloud using IoT and perform rescue missions. The objective of this paper is to develop wireless intercommunication between multiple agents so that they perform the given task in synchronized manner and to develop a control strategy for robots using PID technique and further optimizing it using ant colony optimization (ACO) algorithm. The presented system consists of two robots with temperature sensing, fire sensing and hazardous gas sensing features and a hand held device which receives this information and handheld device is incorporated with the NodeMCU unit that upload the data on BLYN app. These robots also have capability of sending live videos using wireless camera. The paper also consists of development of hardware along with simulation results of the system.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115279101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Int. J. Web Appl.Pub Date : 2018-06-01DOI: 10.6025/IJWA/2018/10/2/64-73
Rachid Hba, A. E. Manouar
{"title":"ICT Green Alignment: New Generation Model Based on Corporate Social Responsibility and Green IT","authors":"Rachid Hba, A. E. Manouar","doi":"10.6025/IJWA/2018/10/2/64-73","DOIUrl":"https://doi.org/10.6025/IJWA/2018/10/2/64-73","url":null,"abstract":"The current context of information and communication technology (ICT) alignment is characterized by strong environmental and societal incentives and constraints to reduce carbon footprint. Companies must therefore reorient their ICT alignment strategies towards a new sustainable mode to maintain the performance of innovation, transformation and differentiation flows. This perspective opens up a new field of research, which takes into account the interactions with the stakeholders, as well as a better adjustment of the technological, the economic and the social. In this paper, we present the “ICT Green Alignment” model as a new generation ICT management model. This model is developed according to a Green IT and Corporate Social Responsibility (CSR) approach, which provides a theoretical tool for designing renewed managerial strategies for Sustainable Development (SD).","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mathematical Formulation for Programmers to Select Background and Foreground Colors in Designing Websites","authors":"Veeresh Duvvuri, Srinivas Laggoni, Shankar Karinga","doi":"10.6025/ijwa/2018/10/2/47-50","DOIUrl":"https://doi.org/10.6025/ijwa/2018/10/2/47-50","url":null,"abstract":"For any Website, the look and feel of the page depends on the selection of good color combinations for Background and Foreground Colors, which are represented in RGB format. In most of the cases, the selection of the colors is done by choosing 2 extremely different colors, one being light in color and other dark, for example white and black. The web designers don’t know how the color combination looks like unless they are checked or implemented in the system. The proposed methodology can help the designers to choose different combinations of background color and foreground color for a text in a website without executing. The same methodology can be applied for testing the website, with some suggestions or inputs for choosing of the colors. If the color combinations are not appropriate, or they may affect the eye, then the system rejects such color combinations. Because there is no automation testing technique for identification of color for web pages, most of the cases the tester or developer may conflict with each other in selection of the colors.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Focusing Web Crawls On Location-Specific Content","authors":"Lefteris Kozanidis, S. Stamou, G. Spiros","doi":"10.5220/0001823002440249","DOIUrl":"https://doi.org/10.5220/0001823002440249","url":null,"abstract":"Retrieving relevant data for location-sensitive keyword queries is a challenging task that has so far been addressed as a problem of automatically determining the geographical orientation of web searches. Unfortunately, identifying localizable queries is not sufficient per se for performing successful location-sensitive searches, unless there exists a geo-referenced index of data sources against which localizable queries are searched. In this paper, we propose a novel approach towards the automatic construction of a geo-referenced search engine index. Our approach relies on a geo-focused crawler that incorporates a structural parser and uses GeoWordNet as a knowledge base in order to automatically deduce the geo-spatial information that is latent in the pages’ contents. Based on location-descriptive elements in the page URLs and anchor text, the crawler directs the pages to a location-sensitive downloader. This downloading module resolves the geographical references of the URL location elements and organizes them into indexable hierarchical structures. The location-aware URL hierarchies are linked to their respective pages, resulting into a georeferenced index against which location-sensitive queries can be answered.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130356129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parametrized Unit Testing Tool for. Net Framework","authors":"M. Sami, Hala Abed El-Gali, Doaa Sami","doi":"10.5120/12370-8713","DOIUrl":"https://doi.org/10.5120/12370-8713","url":null,"abstract":"Unit testing has been widely recognized as an important and valuable means of improving software reliability, as it exposes bugs early in the software development life cycle. However, manual unit testing is often tedious and insufficient. Testing tools can be used to enable economical use of resources by reducing manual effort [11]. Recently the use of parameters in unit testing has emerged as a very promising and effective methodology to allow the separation of two testing concerns or tasks: the specification of external, black-box behavior (i.e., assertions or specifications) by developers and the generation and selection of internal, white-box test inputs (i.e., highcode-covering test inputs) by tools [4, 12]. The Unit Testing Tool produced in this research is based on a parameterized test method that takes parameters, calls the code under test, and states assertions.","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133013888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Int. J. Web Appl.Pub Date : 1900-01-01DOI: 10.6025/ijwa/2020/12/4/121-126
G. Cherneva
{"title":"Application of the Control of Chaotic Processes in the Electronic Communications","authors":"G. Cherneva","doi":"10.6025/ijwa/2020/12/4/121-126","DOIUrl":"https://doi.org/10.6025/ijwa/2020/12/4/121-126","url":null,"abstract":"","PeriodicalId":448883,"journal":{"name":"Int. J. Web Appl.","volume":"66 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}