{"title":"Histogram Equalization Techniques in Image Enhancement","authors":"Sireesha, L. Latha, A. Anuradha, N. PhaniKumar","doi":"10.35248/2165-7866.19.9.254","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.254","url":null,"abstract":"Image upgrade can be considered as one of the principal forms in picture examination. The objective of difference upgrade is to improve the nature of a picture to wind up additional appropriate for a specific application. Till today, various picture upgrade techniques have been proposed for different applications and endeavours have been coordinated to additionally build the nature of the upgrade results and limit the computational intricacy and memory utilization. In this paper, an image improvement strategies dependent on Histogram Equalization (HE) was considered.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"9 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Radio Frequency Identification (RFID) can Revolutionize the Supply Chain Management","authors":"K. Sunil","doi":"10.35248/2165-7866.19.9.252","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.252","url":null,"abstract":"Radio Frequency Identification (RFID) has emerged as one of the most revolutionary tools in supply chain and logistics. The technology is capable of helping organizations cut down on their expenses and hence become more competitive in the market. RFID uses radio frequency electromagnetic fields for data transfer. According to Sindi and Roe [1], it can be used in a number of ways to monitor the activities of a company in real time. The technology is highly valued due to its quality and adaptability in Supply Chain Management (SCM). RFID technology tracks assets such as the individual boxes, Individual items and even a bigger unit of measure in a supply chain operation. This paper focuses on the value of RFID in warehouses and ways through which it can be used together with blockchain technology to improve supply chain management and logistics. Please refer to the blockchain article [2,3], that outlines the emerging benefits of implementing blockchain.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69986941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provide A New Algorithm For Encrypting Packets In Wireless Sensor Networks And Authenticating Network Members Using The Bloom Filter","authors":"A. Khaki, Hamidreza R. Kermajani","doi":"10.35248/2165-7866.19.9.258","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.258","url":null,"abstract":"“Network security” and “information security” are mostly used interchangeably. In fact, as the users and staffs do not know much about the security, intruders can easily enter a computer network reaching secret information. Due to the increasing requirement of users to computer networks, the present study aims to present the algorithms and methods to enhance the security of the networks. As a matter of fact, it is tried to increase the security of sending packages according to cryptography algorithms and decrease the package size by compression method. Therefore, traffic load in connection lines will decrease. Besides, authentication is done by bloom filter in this study. It is expected to guarantee the security of sending packages banning intruders to enter the system.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"9 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69986912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effectiveness of Administrative Staff Working in the Study Program State Polytechnic Banjarmasin in Using Integrated Information System (SIMPADU)","authors":"Sisca Ariani, Juhriyansyah Dalle","doi":"10.35248/2165-7866.19.9.253","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.253","url":null,"abstract":"The importance of the work effectiveness of each employee is expected to have a positive impact on improving the quality of human resources in an organization. In the field of education, one effort in increasing the effectiveness of employee work can be done by developing an information technology system in the educational institution. The purpose of this research is to test the difference of working effectiveness of the administrative staff of study programs in Polytechnic Banjarmasin before and after the implementation of SIMPADU. The effectiveness of the work examined in several indicators items, namely: production, efficiency, quality, flexibility, and job satisfaction. This research used a quantitative approach. The sample was obtained from all the administrative staff of study programs in Polytechnic Banjarmasin, 16 people was chosen by using census technique. The data collected through questionnaire were analyzed by using paired samples t test in order to prove the acceptance and rejection of the hypotheses. The results of analysis show that there is significant difference of working effectiveness of the administrative staff of study programs before and after the implementation of SIMPADU in Polytechnic Banjarmasin. This study connects also the results of research on the theoretical and managerial implications. The managerial implications Polytechnic Banjarmasin recommend that can improve work effectiveness through providing trainings both inside and outside the campus environment. Providing trainings to face the technological change will improve the quality of employees so as to provide satisfactory performance.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey on Customer Satisfaction, Adoption, Perception, Behaviour, and Security on Mobile Banking","authors":"Afful Ekow Kelly, S. Palaniappan","doi":"10.35248/2165-7866.19.9.259","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.259","url":null,"abstract":"This literature survey is done to throw more light on current trends, purpose and future work done in the field of mobile banking. The areas considered here include customer satisfaction, adoption, perception, behaviour, security and privacy. Most of the research papers were on mobile banking adoptions while the last two were on post-adoption and security. Research papers on mobile banking within the last ten years on adoption, with post-adoption and security related papers, were examined. After diligent and thorough search, 68 articles satisfied the criteria for this review. The review has shown that security remains one of the principal constructs that hinder users in adopting and post-adoption of mobile banking. The research also showed that the most used model in mobile banking was TAM. Again, trust, perceived usefulness, perceived ease of use, perceived risk, compatible, and performance and effort expectation constructs remain the most studied variable in the mobile banking literature. This review captures and summarizes the huge knowledge of research work done on mobile banking, where security is one of the least discussed areas. However, most of the research reviewed did suggest that future work should consider security, especially on the protection of users on this emerging technology in banking. This survey has also given researchers and academia to look for other areas besides security.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"9 1","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69987064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Onoka Kelvin Onyango, Ogalo James Ochieng, Ogara Solomon
{"title":"Deployment and Use of Mobile Technology to Control Malaria","authors":"Onoka Kelvin Onyango, Ogalo James Ochieng, Ogara Solomon","doi":"10.35248/2165-7866.19.9.255","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.255","url":null,"abstract":"Malaria is a significant public health problem and impediment to socio-economic development in the developing countries. According to World Health Organization (WHO) report, the number of malaria cases increased to 219 million in 2018, two million higher than the number that was reported in 2016. Information on the number of malaria cases is therefore very critical for the design and implementation of malaria control programmes. Malaria surveillance systems can provide important information on the trends in malaria, which varies widely across different seasons of year and socio-economic status. In this study malaria surveillance was conducted year-round in Rusinga Island, Western Kenya using rapid diagnostic test and individuals who tested positive were treated for malaria. The database system comprised of data on house structure and other risk factors relevant to predict malaria. Statistical analysis was conducted to establish the most significant malaria risk factors.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69986775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of University Network Traffic Using Deep Learning Method","authors":"Jihoon Lee","doi":"10.35248/2165-","DOIUrl":"https://doi.org/10.35248/2165-","url":null,"abstract":"The paper goes over what would happen when deep learning methods are implemented for University Network Traffic. In order to predict the outcome, the paper will compare the network before the implementation of deep learning and after the implementation of deep learning. If the results show an increase in data transfer speed after the implementation of deep learning, it suggests that the implementation of deep learning in any network system will most likely improve the data transfer speed. The paper first defines what deep learning is. It then utilizes different methods of deep learning in order to train the system. The system will go through the training phase, testing phase, and the prediction phase in order to familiarize it with the current network system. Once it understands the network system, it will find the optimized network system in order to improve the speed of network connection.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"13 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69986399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supply Chain Innovation: The Core Capabilities Required and Expected Outcomes","authors":"K. Sunil","doi":"10.35248/2165-7866.19.9.256","DOIUrl":"https://doi.org/10.35248/2165-7866.19.9.256","url":null,"abstract":"Supply chain innovation comes with several benefits. Notably, it promotes agile response to customer demands, competitiveness and business continuity. However, what fundamental capabilities or competencies do businesses require to successfully achieve supply chain innovation? An in-depth desk research was conducted to investigate these capabilities in addition to the eventual business performance outcomes. A theoretical research model was developed, extending current literature relating to supply chain innovation. The model comprises of eight hypotheses that are split into two sets-capabilities (or competencies) required for successful supply chain innovation and positive outcomes driven by such innovation. Findings show that constant SC process improvements, collaboration and communication, new business models, demand management, and SC performance measurement contribute to consequently supply chain innovation. The resultant SC innovation capability results in greater SC agility and resiliency, value creation, and overall business sustainability.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69986864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Function Point Analysis FPA on A Team Planning Website Based on PHP and MYSQL","authors":"A.K. Lassen","doi":"10.4172/2165-7866.1000237","DOIUrl":"https://doi.org/10.4172/2165-7866.1000237","url":null,"abstract":"A function point analysis (FPA) has been carried out on a custom team planning website based on PHP and MYSQL. The FPA was done after the development was finished (retrospective) and a constructive cost model analysis (COCOMO) was carried out to asses source lines of code (SLOC). In the present study the function point analysis is based on entities of the relational database evaluated as internal logical files, and evaluation of PHP source code with dynamic SQL as either external input files or external inquiry files. The complexity for a custom team planning website was found to be 510 total adjusted function points (TAFP) (UAF=580 FP, TDI=23, VAF=0, 88, TAFP=510FP). The function point estimate was classified as an organic project in a COCOMO analysis, and it was concluded that the complexity corresponds to 27742 LOC (or 27, 4 KDSI). The estimate of 66-82 person-months project would correspond to a 4 crew team in 16-21 months. The estimate was compared to the actual source code count of 22300 LOC.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":" ","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48710536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Vehicle Number Plate Recognition System Using Template Matching Techniques","authors":"Gajendra Sharma","doi":"10.4172/2165-7866.1000232","DOIUrl":"https://doi.org/10.4172/2165-7866.1000232","url":null,"abstract":"Vehicle number plate recognition (VNPR) system is a digital image processing techniques which is broadly used in vehicle transportation system to identify the vehicle by their number plate. Yet it’s a very challenging problem, due to the diversity of plate formats, different scales, and non-uniform illumination conditions during image acquisition. This research mainly focuses on Nepali vehicle number plate recognition system in which the vehicle plate image is received by the digital cameras and the image was then processed to obtain the number plate information. A real image of a vehicle is captured and processed using various algorithms. Morphological operations, and edge detection, smoothing, filtering, techniques for plate localization and characters segmentation for segment character and these segmented character was cut in to block of 70×70 size and calculate the correlation with the template of database using the template matching algorithm normalized cross correlation and phase correlation and compare this result in term of accuracy. The system was tested by 90 patterns under several conditions. It includes experiment of number plate recognition using phase correlation and normalized cross correlation methods. From the study and analysis of test after applying on number of images of database, the normalized cross correlation method was found more accurate to recognize the number plate then phase correlation method and recognition accuracy of normalized cross correlation was 67.98% and phase correlation was 63.46%.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2018-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000232","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41938273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}