{"title":"Systematic Survey of Data Mining Technology","authors":"Robert Hoehndor","doi":"10.35248/2165-7866.21.S2.004","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S2.004","url":null,"abstract":"Data mining is the revelation of designs and examples in enormous and complex data sets. There are two types of data mining: model structure and example location. Model structure in Data mining is very much like factual demonstrating, albeit new issues emerge on account of the enormous sizes of the Data indexes and the way that Data mining is frequently optional information examination. Example discovery looks for peculiarities or little nearby designs in information, with the tremendous mass of the information being unimportant. For sure, one perspective on numerous large scale information mining exercises is that they basically comprise separating and data reduction.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Healthcare Usage of Cloud Computing and Resources","authors":"Christopher M Hannock","doi":"10.35248/2165-7866.21.S4.002","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S4.002","url":null,"abstract":"Cloud computing has been an ever-growing field within information technology. As most businesses are finding ways to utilize cloud service providers, there is one industry that has not been as willing to make the shift. This paper will cover the different models of cloud computing, hesitation in making the shift, why the shift should be made, and discuss the overall benefits of cloud computing. With the current Coronavirus pandemic, the need for increased budgets, bandwidth, and access has increased drastically. Cloud computing is a computing model which takes place over the internet and provides scalability, reliability, availability and low cost of computer reassures. This paper also discusses the concerns that healthcare providers have in switching from legacy systems to a new cloud-based solution.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Security of Patient Health Information Regarding Wireless LANNetworks","authors":"David A. Walker","doi":"10.35248/2165-7866.21.11.246","DOIUrl":"https://doi.org/10.35248/2165-7866.21.11.246","url":null,"abstract":"The objective of this article is to report the results of data collected to search for solutions towards advancements in strengthening hospital wireless network security. Patient data breaches cost hospitals billions of dollars annually. The analysis of the data collected for this qualitative exploratory historic case study indicated that hospitals are searching for solutions to protect patient data from wireless network breaches, and the results of the analysis are available for review. This article presents results of the data collected and reviewed for this qualitative exploratory historical case study, as well as the results of the analysis of the data","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assembly Stations Performed by Mobile Robots","authors":"N. Busis","doi":"10.35248/2165-7866.21.S4.E001","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S4.E001","url":null,"abstract":"","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Living in the Future: Designing a Smart-Home with Information Security inMind","authors":"David Brehmer","doi":"10.35248/2165-7866.21.11.248","DOIUrl":"https://doi.org/10.35248/2165-7866.21.11.248","url":null,"abstract":"Around the world, there has been an increase in the number of IoT devices found in homes. These devices can range from temperature sensors and thermostats to security cameras and entire home security architecture. One study found that 63% of homes in North America had at least one IoT or ‘smart-home’ device. While the convenience of IoT devices in our homes is a value to the end user, many IoT makers do not prioritize security over convenience in their development life cycle. The development of IoT devices should include information security among the most important milestones to achieve, and one could argue it should be the top priority. In this paper we will discuss the concepts and best practices when developing a smart home and how information security should play a very large role.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"11 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things-Based Secure Healthcare Framework using Block Chain Technology","authors":"P. Pawar","doi":"10.35248/2165-7866.21.S2.003","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S2.003","url":null,"abstract":"Today, the Internet of Things (IoT) is becoming more common and finds applications in several domains, especially in the healthcare sector. Due to the rising demands of IoT, a massive quantity of sensing data gets generated from diverse sensing devices. Artificial Intelligence (AI) techniques are vital for providing a scalable and precise analysis of data in real time. But the design and development of a useful big data analysis technique face a few challenges, like centralized architecture, security, and privacy, resource constraints, and the lack of adequate training data. On the other hand, the rising blockchain technology offers a decentralized architecture. It enables secure sharing of data and resources to the different nodes of the IoT network and is promoted for removing centralized control and resolving the problems of AI.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic Survey of Data Mining Technique","authors":"N. Busis","doi":"10.35248/2165-7866.21.S4.001","DOIUrl":"https://doi.org/10.35248/2165-7866.21.S4.001","url":null,"abstract":"Information mining is the disclosure of plans and models in huge and complex informational indexes. There are two sorts of information mining: Model construction and model area. Model design in data mining is actually similar to verifiable illustrating, but new issues arise by virtue of the huge sizes of the data records and the way that Data mining is habitually discretionary data assessment. Model disclosure searches for quirks or minimal close by plans in data, with the enormous mass of the data being insignificant. Without a doubt, one viewpoint on various large-scale data mining practices is that they essentially contain isolating and information decrease.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Phillip Jaramillo, Marco Rascon, Charles Adams, Eric Jauregui
{"title":"Fundamental Principles, Processes, and Roles of Environmental Qualification Test Strategy for Complex Engineered Systems","authors":"Phillip Jaramillo, Marco Rascon, Charles Adams, Eric Jauregui","doi":"10.24105/2165-7866.10.265","DOIUrl":"https://doi.org/10.24105/2165-7866.10.265","url":null,"abstract":"“In real life, strategy is actually very straightforward. You pick a general direction and implement it like hell.” Jack Welch Former CEO of General Electric. A qualification strategy, created and executed on complex systems, enables effective and efficient environmental testing at the component, unit, section and system levels. Cost, schedule, and technical challenges highlight the need for an environmental qualification test strategy that provides a robust test regime to verify the design meets user requirements, balanced with a timesaving approach. This paper explains three fundamentals to follow when creating an environmental qualification test strategy that cover risk reduction testing, test planning, and test design. Based on lessons learned through two decades of results, the strategies described in the fundamentals provide an optimized approach to qualification by; 1) demonstrating test environment capabilities as risk reduction, 2) defining key stakeholders, roles and responsibilities along with methods to reduce the possibility of increased test durations due to setup inefficiencies, and 3) providing methods to ensure the required test coverage and test methodology is robust enough to detect design deficiencies. This strategy aligns with customer desire to reduce test delays while at the same time not sacrificing test thoroughness.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69014917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Plan Your Network Project","authors":"Anshuman Awasthi","doi":"10.24105/2165-7866.9.264","DOIUrl":"https://doi.org/10.24105/2165-7866.9.264","url":null,"abstract":"Planning for a Network Hardware Refresh is not an easy task as each project has a different set of requirements and unique objectives. Projects are done to accomplish End of Life and Support challenges or due to the requirement of a complete set of new features that were not available in the older technology. Whatever the case may be network projects need to plan carefully as the enterprise network is the last layer of enabling communication for critical business functions. Let us have a look at the planning tasks involved in the Network Project.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69014662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Network Hardware Refresh","authors":"Anshuman Awasthi","doi":"10.24105/2165-7866.9.262","DOIUrl":"https://doi.org/10.24105/2165-7866.9.262","url":null,"abstract":"It is essential to keep the Network Hardware up and running in good condition to support enterprise applications connectivity. Network performance plays a critical role in providing adequate bandwidth to the collaboration tools for an organization. The average life of the some of the network equipment ranges between 3-5 years, however some may last more than 5 years based on the type of hardware and technology used. The older technology may add performance barriers in the enterprise network. Performing a Network hardware refresh can be a tedious and complicated task depending on the amount of devices and the architecture. Let us try to understand how to perform a hardware refresh for your Network that function in an enterprise and the types of devices that function in different layers in an OSI model.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"10 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69014960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}