{"title":"Similarity Calculation Framework for Heterogeneous Multimedia Web Resources","authors":"A. Deema, B. Jawad","doi":"10.4172/2175-7866.1000227","DOIUrl":"https://doi.org/10.4172/2175-7866.1000227","url":null,"abstract":"With the huge amount and diversity of multimedia resources available on the web, it is becoming necessary to satisfy user’s information and knowledge needs in the mobile computing era. These resources need to be described and correlated systematically to allow applications and web services to access and reuse them properly. Although popular web search engines are very efficient in retrieving any type of information they are not designed to search different types of multimedia information at the same time. Traditional information retrieval techniques should be enhanced by semantic techniques, which analyze web resources information and metadata and use similarity calculations to find correlations between any two resources on the web. Web resources metadata are the attribute values that characterize a multimedia file and give a description about its content. In this research we propose a method that measures the semantic similarity between multimedia resources in the web by using resources’ metadata attributes. \u0000CCS concepts: Information Systems---Information Retrieval---Retrieval Models and Ranking ---Similarity Measures.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45178262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. J. Kadhim, Mohammed Fadhil Odhaib, Y. Hadi, Haider Muqdad Ameen, Audai Abdel Muhdi, Asmaa Khazaal Abdlsahib, Wan Rozaini Bt Sheik Osman
{"title":"Developing a Multi Platforms Web Applications for Mobile Device Using HTML5","authors":"K. J. Kadhim, Mohammed Fadhil Odhaib, Y. Hadi, Haider Muqdad Ameen, Audai Abdel Muhdi, Asmaa Khazaal Abdlsahib, Wan Rozaini Bt Sheik Osman","doi":"10.4172/2165-7866.1000225","DOIUrl":"https://doi.org/10.4172/2165-7866.1000225","url":null,"abstract":"As the mobile phone has become more mature, the continuous development of both hardware and software has become increasingly popular. Nowadays the need to develop mobile application that can run over multi-platform is an essential problem because we have to conquer the difficulties of the variety of mobile platform such as building a different application for each platform is very expensive if written in each native language. Because of the availability of web browser in all mobile devices, it is suggested as an environment to run all web application. This research will examine the limitation and resources of mobile web applications for each individual platform then presenting a model that can be run in different platform for developing phase HTML and CSS3 combined with java script languages will be used, the application will be located on remote server that can be accessed using mobile device throughout the internet, to evaluate the application two test will be done to check the functionality and the availability.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":" ","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000225","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45482014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft-Computing: A Fundamental Approach in Analyzing Big Data","authors":"Christopher Ejiofor, Mgbeafuluike Ij","doi":"10.4172/2165-7866.1000221","DOIUrl":"https://doi.org/10.4172/2165-7866.1000221","url":null,"abstract":"This paper has designed a novel model: soft-computing model in analyzing big data. It focuses on voluminous data while addressing data velocity. The model comprises of mediator, data filter, collector, predictor and acceptor, all model components. The enhancement of data volume is handled using data filters while data velocity is handled using predictor. Unified Modeling Language (UML) portrays the behavioral functionalities of the model. The proffered benefit of the model will be explored on full implemented.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2018-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000221","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49580962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Development of Integrated Wireless Sensor Networks For Real Time Monitoring of Oil and Gas Flow Rate Metering Infrastructure","authors":"J. Ayuba, H. Safwana, Y. Abdulazeez","doi":"10.4172/2165-7866.1000233","DOIUrl":"https://doi.org/10.4172/2165-7866.1000233","url":null,"abstract":"This research work describes the software development of an integrated wireless sensor network (WSN) for realtime remote monitoring of oil and gas flow rate metering infrastructure. The wireless sensor network includes flow sensors, pumping machines, microcontrollers, Wi-Fi or wireless links and a database server. The pumping machine first pumps oil and gas, then a flow rate sensor measures the quantity and communicates the flow rate data in meter cube per second via a wireless link to the database server for further processing. The resulting data is stored on the database server while the continuous flow rate is displayed in real time on the website designed as the humancomputer interaction (HCI) interface through which, the quantity of the oil and gas lifted can easily be accessed without having to collect the data from several stations manually. The cost-effective indices for reporting the quantity of oil and gas lifting are of significance to any accountable and transparent system. However, manual processes have not been able to do that in real time. In this paper, our main focus is to provide the software development life cycle involved in the design and implementation processes of the system prototype using iterative incremental mode and the complete software development architecture for the wireless sensor network.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy in Distributed Access Control Environment","authors":"Mbanaso Um","doi":"10.4172/2165-7866.1000236","DOIUrl":"https://doi.org/10.4172/2165-7866.1000236","url":null,"abstract":"Privacy in distributed environments introduces new security challenges since two parties in a typical access control may not always belong to the same security domain. Therefore, protection of personal identifiable information (PII) throws a fresh challenge in privacy equation in this context. Customarily, the challenge is how to preserve privacy when two parties in different security domains are involved in access control, particularly in distributed environments. This paper presents the conceptualization of privacy in typical distributed context, to raise issues when two parties in access control require protecting privacy sensitive information.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Measures in Distributed Approach of Cloud Computing","authors":"K. ShirishaReddy, M. Balaraju, N. Ramana","doi":"10.4172/2165-7866.1000230","DOIUrl":"https://doi.org/10.4172/2165-7866.1000230","url":null,"abstract":"Cloud computing has given a new approach of data accessing in a distributed manner, where the users has the advantage of higher data accessing feasibility. This approach works on the approach of outsourcing the storage requirements in public provider. The distributed approach has the advantage of low cost data accessing, scalable, location independent and reliable data management. It is observed that Conventional approaches are focused to achieve the objective of reliable and secure data access in cloud computing. However the signaling overhead in these approaches was not explored: in the exchange of control signal in cloud computing, it is needed that lower effort should be made for authentication and data integrity, so as more accessing provision exists. A new monitoring scheme is proposed to minimize the signaling overhead by monitoring record systems. In this paper, security issues also focused. In this process, at each of the data exchange, security risk arises, which are evaluated by different security measure such as Mean failure cost (MFC), and multi dimension failure cost (M2FC) To demonstrate our approach, To develop the suggested objectives, MATLAB interfacing with data feed toolbox was used, Effectiveness of the proposed method has been shown by the experimental results.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000230","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. OlalereModupeola, R. SalimonIshak, A. AboladeMayowa, J. OgunniyiOlalekan, A. AdeyemoSunday
{"title":"Design, Implementation and Evaluation of a Web-Based Physical Fitness Teleconsultation System","authors":"E. OlalereModupeola, R. SalimonIshak, A. AboladeMayowa, J. OgunniyiOlalekan, A. AdeyemoSunday","doi":"10.4172/2165-7866.1000240","DOIUrl":"https://doi.org/10.4172/2165-7866.1000240","url":null,"abstract":"Emerging evidence has revealed the efficacy of teleconsultation model as a modern tool in healthcare and fitness establishments. This research entails the design of a web-based teleconsultation model, its implementation and system performance evaluation using Nest Hotel, Ogbomoso as a case study. The application was built using different developmental tools and imaging technologies such as Hypertext Markup Language (HTML), Cascading Style Sheets (CSS3), JAVASCRIPT, Pre hypertext processor (PHP), Asynchronous JavaScript (AJAX), My Structured Query Language (MySQL), and JQUERY. The system was structured into three modules namely user, administrator, and instructor modules. The implementation of this system involves the use of designed user-instructor model, for an appropriate physical fitness exercise guide. The user, instructor, and administrator were able to can log into the system and get the relevant information on appropriate physical fitness exercise, with a detailed previous record. In this model, user was able to extract details about their physical fitness condition (body weight, body fat, pregnancy state) in form of multimedia files. The developed fitness model, therefore, showed a remarkable improvement over the already existing system in term of cost-effectiveness, confidentiality, 24 h daily service and uninterrupted accessibility. This study, therefore, provided a cordial link between the physical fitness instructors and users, thereby making information readily available to the end-users.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"1202 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000240","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developed Object Oriented System for Performance Evaluation Based on Balanced Scorecard Model in Ethiopian Organizations","authors":"W. M. Tessema, H. SolafAli, Nadire Cavus","doi":"10.4172/2165-7866.1000239","DOIUrl":"https://doi.org/10.4172/2165-7866.1000239","url":null,"abstract":"In this research a developed web–based balanced scorecard performance evaluation system proposed for the case study of Ethiopian organizations and supports both English and Amharic languages. The system incorporates evaluations of individual performance (both in activity and behavior), major activity performance, objective performance, perspective performance, unit/department performance, and the organization/institute as a whole based on time, cost, quality and quantity. Object oriented software engineering and ASP.NET 4.0 platform is employed to develop the system.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Management for (Industrial) Internet of Things: Challenges and Opportunities","authors":"L. Maximilian, Erich Markl, A. Mohamed","doi":"10.4172/2165-7866.1000250","DOIUrl":"https://doi.org/10.4172/2165-7866.1000250","url":null,"abstract":"The internet of things (IoT) is about an integration between the physical and the cyber worlds in several aspects of peoples’ lives, with benefits of convenience and entertainment in the “smart home” domain, and process optimization, costs savings and business opportunities in the industrial, “smart city” and other domains such as power and health care, however, associated with concerns about security. Security is a must for IoT systems to protect sensitive data and critical physical infrastructure. It is estimated that the number of networked devices will reach 20-50 billion by 2020 on a global scale. Security risks can become expensive (particularly in Industrial Internet of Things (IIoT) applications) and dangerous for corporations, governments and even individuals’ lives, and strategies to combat cybercrime are being developed. However, there are 3 main challenges for solving security issues in IoT and IIoT settings: Applications operate in highly distributed environments, heterogeneous smart objects are used, and sensors and actuators are limited in terms of power and computational resources. Therefore, traditional security countermeasures do not work efficiently in IoT systems. A key security challenge in the IoT context is the increase of the overall attack surface for malicious attacks, as compared to isolated (i.e., non-connected) systems. Cybersecurity management has to increase awareness, competence levels and assess novel technologies such as blockchain and SDN (Software Defined Networking). Opportunities are offered by 5G and “green” IoT, particularly with regard to energy and CO2 emissions savings. This review article discusses the state-of-the-art, trends and developments arounds challenges and opportunities in cybersecurity management.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"08 1","pages":"0-0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Current BYOD Security Evaluation System: Future Direction","authors":"Priscilla Mateko B, Shikun Mateko Z, Ioannis K","doi":"10.4172/2165-7866.1000235","DOIUrl":"https://doi.org/10.4172/2165-7866.1000235","url":null,"abstract":"There are growing vulnerabilities in Bringing Your Own Device (BYOD) implementation which may not have been fully identified by organisations. It is very difficult to identify, monitor and evaluate the fast growing number of threats and vulnerabilities in a BYOD system, leading to delayed time in preparing and loading a patch which is a periodic process (Static) in most organisation, resulting in risk as the process is not continuous (dynamic) Computer security managers have the task to identify and evaluate these vulnerabilities according to their risk and threat to the network. One database which is known to contain identified vulnerabilities is the Common Vulnerabilities and Exposures (CVE), Common Vulnerabilities Scoring System (CVSS) on the other hand provides numeric scores to each vulnerabilities in the CVE database based on their characteristics and security impact. This assessment is on relevant work to check the various data collected on vulnerability and threat related to BYOD and conduct a vulnerability scoring exercise to report on possible scoring framework.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}