IJITCS Vol. 14, No. 2, Apr. 2022
Cover page and Table of Contents: PDF (size: 281KB)
REGULAR PAPERS
Markov models are one of the widely used techniques in machine learning to process natural language. Markov Chains and Hidden Markov Models are stochastic techniques employed for modeling systems that are dynamic and where the future state relies on the current state. The Markov chain, which generates a sequence of words to create a complete sentence, is frequently used in generating natural language. The hidden Markov model is employed in named-entity recognition and the tagging of parts of speech, which tries to predict hidden tags based on observed words. This paper reviews Markov models' use in three applications of natural language processing (NLP): natural language generation, named-entity recognition, and parts of speech tagging. Nowadays, researchers try to reduce dependence on lexicon or annotation tasks in NLP. In this paper, we have focused on Markov Models as a stochastic approach to process NLP. A literature review was conducted to summarize research attempts with focusing on methods/techniques that used Markov Models to process NLP, their advantages, and disadvantages. Most NLP research studies apply supervised models with the improvement of using Markov models to decrease the dependency on annotation tasks. Some others employed unsupervised solutions for reducing dependence on a lexicon or labeled datasets.
[...] Read more.In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.
[...] Read more.This research developed a secured student industrial work experience scheme (SIWES) placement system to take care of the security challenges of the existing automated systems. There are attempts by researchers to ameliorate the challenges associated with the scheme by developing various systems. However, the developed systems are subjected to security vulnerabilities. This research, in an attempt to avert the security challenges associated with the existing automated systems, designed a new scheme which includes security architectures in the kernel and application layers. This new system was able to achieve two important tasks; first, the system automation and second, the inclusion of security architectures to cubs the application’s vulnerabilities. The present process involves students manually seeking placement to undergo the program, and due to this, students end up applying at organizations that are not relevant to what they are studying. Despite the fact there are no much existing systems that digitally caters for this component of the scheme, the available existing systems are subjected to security vulnerability. Therefore, leveraging on secure web application technologies using Unified Modelling Languages for design, HTML, CSS, JavaScript, PHP for its implementation and user privilege and password hash to ensure its security, this project developed a secure solution to this pertinent challenge. The system is tested using unit testing component of each design, integration testing and general system testing. The implementation shows the system works according to the design, by ensuring all units of the development perform necessary functions of data storage, data retrieval, error alerting, and interface/server appropriate communication. In addition, the security architecture, design and implementation of the system’s design are better than the existing ones.
[...] Read more.A network is an interconnected group of independent computing devices which uses a different set of protocols to communicate with each other independently and meaningfully. This communication should be carried out securely. Due to different attacks, this security sometimes gets compromised. So, to communicate securely different cryptography algorithms are used i.e., symmetric and asymmetric algorithms. Cryptography helps to achieve authentication, confidentiality, integrity, non-repudiation, and availability of data. Nowadays many algorithms provide security to data but these algorithms have various security flaws. To improve the strength of these algorithms, a new security protocol is designed using features of symmetric key and asymmetric key algorithms. The security principles can be achieved by AES and RSA algorithms. The main purpose of designing this algorithm is to provide better security to data in transit against passive as well as from active attacks. The new proposed hybrid algorithm is implemented in MATLAB R2019a. This algorithm will be analysed and compared on three parameters like avalanche effect, performance, and security against attacks. The proposed model will contribute towards improving the excellence of educators and academics, as well as increase competitiveness of educational programmes on cybersecurity among similar institutions in the EU countries.
[...] Read more.Road traffic congestion is a recurring occurrence causing enormous loss of valuable working hours around the world. It is impossible to eradicate such a problem overnight. Rather it could be handled intelligently with the help of modern technologies. Researchers and practitioners have introduced several algorithms, frameworks, systems to mitigate traffic congestion. This paper presents a systematic literature review on existing research and critically analyze the applications on traffic analytics systems. After designing a review protocol, each work was evaluated based on the five research questions and criteria. After critically and carefully analyzing the existing works, this paper also identified the advantages as well as the limitations of the existing approaches towards solving traffic congestion. Based on the findings, a prototype of a mobile application is proposed that can be considered as an improved alternative to the existing works. Finally, this study provides future research directions and improvement scopes in this field.
[...] Read more.