IJITCS Vol. 8, No. 1, Jan. 2016
Cover page and Table of Contents: PDF (size: 221KB)
REGULAR PAPERS
Today Wikipedia provides a very large and reliable domain-independent encyclopedic repository. With this study a mobile system which summarizes Turkish Wikipedia text is presented. The presented system selects the sentences due to structural features of Turkish language and semantic features of the sentences. The performance evaluation is made based on judgments of human experts. The results are tested due to precision and recall values of a ranked sentence list and it is concluded that, the summarization results are promising.
[...] Read more.Nowadays, spam has become serious issue for computer security, because it becomes a main source for disseminating threats, including viruses, worms and phishing attacks. Currently, a large volume of received emails are spam. Different approaches to combating these unwanted messages, including challenge response model, whitelisting, blacklisting, email signatures and different machine learning methods, are in place to deal with this issue. These solutions are available for end users but due to dynamic nature of Web, there is no 100% secure systems around the world which can handle this problem. In most of the cases spam detectors use machine learning techniques to filter web traffic. This work focuses on systematically analyzing the strength and weakness of current technologies for spam detection and taxonomy of known approaches is introduced.
[...] Read more.Considering the rapidly growing world population and increased enrolment in full course primary school education around the world, this paper elucidates key means of leveraging Information Technology for the effective and efficient management of the increasing pressure associated with schools' administrative functions and students' basic activities. Primarily narrowing down to the basic African education framework, this paper sheds more light on the methods which can be adopted for the development of such processes through improved Information Technology platforms. In doing this, the design and implementation of the Jasper School Management System (a school management solution developed by the author) will be used as a case study. Also, a brief highlight of the impact this Information Technology initiative will have on institutions where it is deployed. The Jasper School Management Software being referenced was built using Java Programming Language in conjunction with MySQL. It was produced to help improve management activities of schools especially in developing countries of the world, with 8 major school management modules incorporated into it. Also, the software is open-source i.e., open to adaptations, improvements and free to download.
[...] Read more.In India, more than 300 million people use Devanagari script for documentation. In Devanagari script, Marathi and Hindi are mainly used as primary language of Maharashtra state and national language of India respectively. As compared with English script, Devanagari script is reach of morphemes. Thus the lemmatization of Devanagari script is quite complex than that of English script. There is lack of resources for Devanagari script such as WordNet, ontology representation, parsing the keywords and their part of speech. Thus the overall task of information retrieval becomes complex and time consuming. Devanagari script document always carries suffixes which may cause problem in accurate information retrieval. We propose a method of extracting root words from Devanagari script document which can be used for information retrieval, text summarization, text categorization, ontology building etc. An attempt is made to design the Morphological Analyzer for Devanagari script. We have designed CORPUS containing more than 3000 possible stop words and suffixes for Marathi language. Morphological Analyzer can acts as a preliminary stage for developing any information retrieval application in Devanagari script. We have conducted the experiments on randomly selected Marathi documents and we found the accuracy of designed morphological analyzer is up to 96%.
[...] Read more.The service oriented architecture supports reusable components. Component reusability is one of the important features while designing web services for reuse. The reusability is an ideal and key factor to improve the quality and production rate of software. It becomes very helpful for quality assurance, if such quality parameters can be quantified. Non functional quality parameters like reusability are not easy to measure and quantify. This paper attempts to quantify reusability using fuzzy multi criteria approach. This approach is considered due to the unpredictable nature of reusability attributes. For the estimation of reusability, the paper identifies 5 key attributes of reusability i.e. Coupling, Interface Complexity, Security, Response Time and Statelessness in context of web service components.
[...] Read more.In cognitive radio networks, when primary users (PUs) do not use a shared frequency band, secondary users (SUs) are allowed to use that frequency band. However, when SU using frequency band and reclaiming PU also wants to use this band, there are two solutions: SU jumps to another existing spectrum band or stays in the same frequency band and changes its power so that interference in the reclaiming PUs does not exceed a threshold. Since the first solution interrupts the SUs' work, the second solution is more appropriate. Therefore, power control in cognitive networks is absolutely significant which should receive more attention. In the previous work (TPC-CBS) [2], TPC algorithm has been used for power control. The drawback of this algorithm is fixed target SIRs. In other words, while using this algorithm, all the users having enough sources or extra sources reach the same target SIR, which is not desirable. Therefore, in this paper, we are going to solve it by means of the proposed algorithm called "An Efficient Distributed Power Control Algorithm for Cognitive Networks (EDPC)". By the proposed algorithm, when a user has a bad channel, its SIR sets to the minimum target SIR and, when it has a good channel, its SIR will be more than the minimum value. Moreover, by means of fuzzy logic systems (FLS), the value of interference on reclaiming PU caused by SUs is checked in each iteration and power level of SUs is decreased if this value exceeds a threshold. Simulation results show that using our proposed algorithm not only allows SUs and PUs use frequency band simultaneously, but also enhances throughput significantly in comparison with the previous approaches (TPC-CBS).
[...] Read more.This paper presents some observations on Dependency Analysis of Service Oriented Architecture (SOA) based systems. In general, dependency analysis is based on the internal properties of artifacts (objects/components/services) and inter-relationship between the artifacts in the system. In order to make a dependency analysis for SOA based systems, one have to consider the special features of SOA that make them different with other approaches. This paper surveys the previous works taken on dependency analysis of service oriented systems. The present work provides insights about definitions related to service dependency, the modeling and analysis techniques of service dependency analysis, failure results to service dependence and some research challenges of the topic.The contribution of this paper is for novice researchers working on this topic as they can get an overview of dependency analysis of SOA based systems for their further research.
[...] Read more.Business to Business e-commerce is adopted by more and more companies all over the world. Many companies will be involved in doing business over internet among them some will act as manufacturer and other as suppliers of the sub products. Here we are going consider two types of hackers, the hackers who are outside the organization and the hackers present within the organization. The problem is how to identifying authentic supplier and to see that after authentication the data integrity, here we consider it as the number of sub product to be manufactured that should reach the authentic supplier in the presence of hacker within the organization. There is need for designing trusted security framework. In this paper we are designing a security framework which runs double securing algorithm by using keyless cryptography algorithm for finding the authentic supplier and to see that the order of sub product to be manufactured reaches correct supplier for this caser cryptography algorithm is used. The authentication solves the problem of outside hackers and uses of caser cryptography solve the problem of hacker within the organization. The double securing algorithm is implemented on MATLAB, CPU time is calculated to known the time taken to run the security mechanism.
[...] Read more.Mobile technology, over the years, has improved tremendously in sophistication and functionality. Today, there are mobile phones, known as smartphones, that can perform virtually most functions associated with personal computers. This has translated to increase in the adoption of mobile technology. Consequently, there has been an increase in the number of attacks against and with the aid of this technology. Mobile phones will often contain data that are needed as evidence in a court of law. And, therefore, the need to be able to acquire and present this data in an admissible form cannot be overemphasized. This requires the right forensic tools. This is the focus of this study. We evaluated the ability of four forensic tools to extract data, with emphasis on deleted data, from Android phones. Our results show that AccessData FTK Imager and EnCase performed better than MOBILedit Forensic and Oxygen Forensic Suite at acquiring deleted data. The conclusion is that, finding a forensic tool or toolkit that is virtually applicable across all mobile device platforms and operating systems is currently infeasible.
[...] Read more.Zigbee standard has been designed for low data rate, low cost and limited power applications for short-range wireless communication. The successful implementation of Zigbee based network depends on the suitable selection of physical (PHY) layer and medium access control (MAC) layer parameters. In this work the PHY layer parameters have been optimized for star, tree and mesh topologies. The performance investigations have been carried out for different frequency band and data rate and different bandwidth (BW) in each of standard topologies. Through extensive simulations, QoS parameters like throughput, network load and delay have been evaluated to achieve optimal performance of physical layer.
[...] Read more.