Journal of information technology & software engineering最新文献

筛选
英文 中文
Provenance Detection of Online News Article 网络新闻文章的来源检测
Journal of information technology & software engineering Pub Date : 2017-08-04 DOI: 10.4172/2165-7866.1000204
R. Alsuhaymi
{"title":"Provenance Detection of Online News Article","authors":"R. Alsuhaymi","doi":"10.4172/2165-7866.1000204","DOIUrl":"https://doi.org/10.4172/2165-7866.1000204","url":null,"abstract":"At present, with the current wide spread of information on the social media, the recipient or the researcher needs more details about the received information or spread, including the provenance. With the current explosion of the news websites, there is a question of credibility of news articles on the internet. It is important to know whether the news is correct or not. This paper focuses on identifying the provenance of news articles. Also, trace the provenance of news articles often to see where did the first publication of such news appear. Is the news publication true (the credibility of the news), or is the news quoting from the provenance of the news on the news website or is plagiarism and redistributed on news websites on the Internet? In this paper, we will answer these questions through the design and implementation of two techniques Google Search API and Google Custom Search that will define the provenance of news articles through the technique Topic Detection and Tracking (TDT). Therefore, verifies the proposed technical quality in terms of performance metrics through several different experiments. Based on these experiments and tests it were discovered that the technique Google Search API is better performance than Google Custom Search in detecting the provenance of news articles. The Google Search API is the best technique, depending on the user satisfaction, the time it takes to view the results and the accuracy and validity. So, the result of the Google Search API is 90% while Google Custom Search 70%.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":" ","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000204","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45444072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Root Causes for the Failure of Communication in GSD GSD中沟通失败的根本原因
Journal of information technology & software engineering Pub Date : 2017-08-01 DOI: 10.4172/2165-7866.1000201
H. Khalid, Farhat-ul-Ain, K. Khushboo
{"title":"Root Causes for the Failure of Communication in GSD","authors":"H. Khalid, Farhat-ul-Ain, K. Khushboo","doi":"10.4172/2165-7866.1000201","DOIUrl":"https://doi.org/10.4172/2165-7866.1000201","url":null,"abstract":"At the moment majorly software development organizations tends to obtain common interest by implying software development using global approach. Global software development (GSD) is the essence of this global approach. In practical GSD faces several challenges in different software development organizations. The core issue is communication which becomes more complex while using requirement change management (RCM). The focus of this work is to figure out different factors which are effected by RCM for GSD. Hypotheses are constructed and a framework architecture is proposed on which a mathematical/statistical/quantitative is applied to analyze the data. Multi-regression technique is used to analyze the hypotheses saying whether they are supported or not supported according to the developers of several software development organizations.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"2017 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47445120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing the Text Production and Assisting Disable Users in Developing Word Prediction and Completion in Afan Oromo 加强阿法奥罗莫语文本生产,帮助残疾人发展词语预测和补全
Journal of information technology & software engineering Pub Date : 2017-04-27 DOI: 10.4172/2165-7866.1000200
Workineh Tesema Gudisa, D. Tamirat
{"title":"Enhancing the Text Production and Assisting Disable Users in Developing Word Prediction and Completion in Afan Oromo","authors":"Workineh Tesema Gudisa, D. Tamirat","doi":"10.4172/2165-7866.1000200","DOIUrl":"https://doi.org/10.4172/2165-7866.1000200","url":null,"abstract":"This work presents a word prediction and completion for disable users. The idea behind this work is to open a chance to interact with computer software and file editing for disable users in their mother tongue languages. Like normal persons, disable users are also needs to access technology in their life. In order to develop the model we have used unsupervised machine learning. The algorithm that used in this work was N-grams algorithms (Unigram, Bigram and Trigram) for auto completing a word by predicting a correct word in a sentence which saves time, reduces misspelling, keystrokes of typing and assisting disables. This work describes how we improve word entry information, through word prediction, as an assistive technology for people with motion impairment using the regular keyboard, to eliminate the overhead needed for the learning process. We also present evaluation metrics to compare different models being used in our work. The result argued that prediction yields an accuracy of 90% in unsupervised machine learning approach. This work particularly helps disable users who have poor spelling knowledge or printing press, institutions or government organizations, repetitive stress injuries to their (wrist, hand and arm) but it needs more further investigation for users who have visual problems.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42782474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Soft Computing Model for Evaluating Teachers’Overall Performance using Fuzzy Logic 基于模糊逻辑的教师综合绩效评价软计算模型
Journal of information technology & software engineering Pub Date : 2017-04-05 DOI: 10.4172/2165-7866.1000199
J. Alam, P. Manojkumar, Ey
{"title":"A Soft Computing Model for Evaluating Teachers’Overall Performance using Fuzzy Logic","authors":"J. Alam, P. Manojkumar, Ey","doi":"10.4172/2165-7866.1000199","DOIUrl":"https://doi.org/10.4172/2165-7866.1000199","url":null,"abstract":"In the entire world, there is a widespread recognition that evaluation framework is a key to building stronger and fairer academic institution system. All countries emphasize the evaluation not as end in itself but instead an important tool for achieving improved student outcomes. Teacher evaluation typically has two major purposes. First, it seeks to improve the teacher’s own practice by identifying strengths and weaknesses for further professional development and involves helping teachers learn about, reflect on and adjust their practice. Second it is aimed at holding teacher’s accountability for their performance in enhancing student learning. It typically entails performance based career advancement and/or salaries, bonus pay, or the possibility of sanctions for underperformance and usually involves evaluating performance at nodal points in a teacher’s career. The term soft computing represents the combination of emerging problem solving technologies, such as fuzzy logic, probabilistic reasoning, neural networks and genetic algorithms. Each of these technologies provides us with complementary reasoning and searching methods to solve complex real world problems. We have proposed a soft computing model for evaluating teachers’ overall performance using fuzzy logic. There are two different modules namely teachers’ overall performance module-1 (TOP-M1) and teachers’ overall performance module-2 (TOP-M2). First module TOP-M1, calculates teaching performance. Second module TOP-M2, calculates academic and administrative performance. On the bases of teaching performance and academic and administrative performance we calculate overall performance. Software has been developed in MATLAB. This soft computing model for evaluating teachers’ overall performance using fuzzy logic will not only be useful for decision makers to evaluate teachers’ abilities and improve student outcomes but may also be adopted in writing Annual Confidential Reports(ACR) for appraisal of all the teachers of an academic institution. Simulation results verify the performance of our proposed soft computing model for evaluating teachers’ overall performance using fuzzy logic.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000199","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43929123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Toward Securing Cyber-Physical Systems Using Exact Cover Set 利用精确覆盖集保护网络物理系统
Journal of information technology & software engineering Pub Date : 2017-03-30 DOI: 10.4172/2165-7866.1000198
Sameer Kumar Bisoyi, H. Reza
{"title":"Toward Securing Cyber-Physical Systems Using Exact Cover Set","authors":"Sameer Kumar Bisoyi, H. Reza","doi":"10.4172/2165-7866.1000198","DOIUrl":"https://doi.org/10.4172/2165-7866.1000198","url":null,"abstract":"Cyber physical systems (CPS) are computer systems that integrate computing, coordination and communication systems in order to monitor physical entities in the physical world. As they interact with the critical systems and infrastructure that may impact real life. There are many issues in design and constructions of these types of systems. One of the key issue that receives so many attention is the security of such systems. Although security solutions for Information Systems handle the security issues associated with Traditional IT security, but the impact of a failure in a cyber-physical system demands a different approach to handle security issues related to the cyber world. In this work, we focus on using a key agreement technique known as Physical Signal Key Agreement (PSKA) technique using the Exact Cover method to generate the random key which will be embedded into an access control model known as the Modified Context-Aware Security The feasibility of our framework (MCASF) to handle both normal and critical situation on demand is demonstrated via a Pervasive Health Monitoring Systems (PHMS).","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":" ","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45995953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Simulation of a Linear Prolate Filter for a Baseband Receiver 用于基带接收机的线性延长滤波器的设计与仿真
Journal of information technology & software engineering Pub Date : 2017-02-13 DOI: 10.4172/2165-7866.1000197
S. Soman, M. Čada
{"title":"Design and Simulation of a Linear Prolate Filter for a Baseband Receiver","authors":"S. Soman, M. Čada","doi":"10.4172/2165-7866.1000197","DOIUrl":"https://doi.org/10.4172/2165-7866.1000197","url":null,"abstract":"Digital signals transmitted over a communication channel are mostly affected by noise. To reduce the detrimental effects of noise, a band-limited filter is used at the receiver, which results a phenomenon known as Inter-Symbol Interference. To avoid Inter-Symbol Interference, filters with greater bandwidth can be used. However, this causes high frequency noise to interfere with the transmitted information signal. This paper illustrates an innovative way to reduce Inter-Symbol Interference in the received baseband signal. This is achieved by making use of the processing bandwidth of a special filter designed by using Linear Prolate Functions. The result of the signal reconstruction capabilities of a prolate filter are compared with those of an ideal low pass filter in this paper.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":" ","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47578204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Model for Requirement Management System 一个改进的需求管理系统模型
Journal of information technology & software engineering Pub Date : 2017-01-27 DOI: 10.4172/2165-7866.1000196
Mohammad Salman Hafeez, F. Rasheed, Khan Mr
{"title":"An Improved Model for Requirement Management System","authors":"Mohammad Salman Hafeez, F. Rasheed, Khan Mr","doi":"10.4172/2165-7866.1000196","DOIUrl":"https://doi.org/10.4172/2165-7866.1000196","url":null,"abstract":"Requirement engineering is the most important part of the modern software engineering, which evolved over decades and become a science. It probably plays the most vital part in success of the software system. The requirements management world has developed considerably in the last decade and has increasingly become one of the bases of successful software and systems engineering projects. Managing requirements is not an easy task; in order to record good requirements and manage the changes afterwards is the trickiest part. Many researchers around the world have worked on optimization of the requirement management process. In this paper we propose a model which is and improved version of the model by Nathan W Mogk. To overcome the limitations of that model we proposed a comprehensive model with focus on the limitation of this model and provide an enhanced model. This paper is the extension of the requirements management system based on an optimization model of the design process.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":" ","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2017-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000196","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42595035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Software Architecture Methodology in Agile Environments 敏捷环境中的软件架构方法论
Journal of information technology & software engineering Pub Date : 2017-01-23 DOI: 10.4172/2165-7866.1000195
M. Mekni, G. Mounika, C. eep, B. Gayathri
{"title":"Software Architecture Methodology in Agile Environments","authors":"M. Mekni, G. Mounika, C. eep, B. Gayathri","doi":"10.4172/2165-7866.1000195","DOIUrl":"https://doi.org/10.4172/2165-7866.1000195","url":null,"abstract":"Lengthy requirements, design, integration, test, and assurance cycles delay software delivery, resulting in late discovery of mismatched assumptions and system level rework. In response, development methods that enable frequent iterations with small increments of functionality, such as agile practices, have become popular. However, since the business goals and context continuously evolve, the software architecture must also change. Currently, a clear specification in software architecture activities and processes in agile environments does not exist. In this paper, we provide an overview on agile development methodology along with the software architecture related issues in agile environments. Our main contribution is a novel methodology to guide and assist practitioners adopting software architectural design in agile environments.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000195","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43076986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Analysis of Hybrid Authentication and Authorization Model for Web Based Application 基于Web应用的混合认证与授权模型分析
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000215
Harish Baraithiya, R. Pateriya
{"title":"An Analysis of Hybrid Authentication and Authorization Model for Web Based Application","authors":"Harish Baraithiya, R. Pateriya","doi":"10.4172/2165-7866.1000215","DOIUrl":"https://doi.org/10.4172/2165-7866.1000215","url":null,"abstract":"An Identify Access Management (IAM) system is very important and trusted source for accessing the website related information. Now in real world it is always need for safe the personal and sensitive information of website from malicious insiders. It always needs a well-defined authentication and authorization mechanism to ensure only the right persons only can access the right applications at a right time with the given privilege. The website is having many users with different Identity and its Access Management via using authentication and authorization. The existing models have some limitations in the implementation phase in this research. This research having analysis of hybrid authentication and authorization model for secure and user-friendly web-based applications. It also compares different access control models and their features with the proposed hybrid model.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on Machine Learning Classification Models for Activity Recognition 面向活动识别的机器学习分类模型比较研究
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000209
Mohsen Nabian
{"title":"A Comparative Study on Machine Learning Classification Models for Activity Recognition","authors":"Mohsen Nabian","doi":"10.4172/2165-7866.1000209","DOIUrl":"https://doi.org/10.4172/2165-7866.1000209","url":null,"abstract":"Activity Recognition (AR) systems are machine learning models developed for cell-phones and smart wearables to recognize various real-time human activities such as walking, standing, running and biking. In this paper, the performance (accuracy and computational time) of several well-known supervised and unsupervised learning models including Logistic Regression, Support Vector Machine, K-Nearest Neighbors’, Naive Base, ’Decision Tree’ and Random Forest are examined on a dataset. It is shown that Random Forest model outperforms other models with accuracy over 99 percent. It is shown that PCA significantly improved the performance of Artificial Neural Network with one hidden layer and SVM models in both accuracy and time, while PCA showed to have negative impacts on Random Forest or Decision Tree models by increasing the running time and decreasing the prediction accuracy.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000209","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信