Computer and Information Science
ISSN / EISSN : 1913-8989 / 1913-8997
Published by: Canadian Center of Science and Education (10.5539)
Total articles ≅ 882
Latest articles in this journal
Published: 25 October 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p57
The rapid spread of online fake news through some media platforms has increased over the last decade. Misinformation and disinformation of any kind is extensively propagated through social media platforms, some of the popular ones are Facebook and Twitter. With the present global pandemic ravaging the world and killing hundreds of thousands, getting fake news from these social media platforms can exacerbate the situation. Unfortunately, there has been a lot of misinformation and disinformation on COVID-19 virus implications of which has been disastrous for various people, countries, and economies. The right information is crucial in the fight against this pandemic and, in this age of data explosion, where TBs of data is generated every minute, near real time identification and tagging of misinformation is quintessential to minimize its consequences. In this paper, the authors use Natural Language Processing (NLP) based two-step approach to classify a tweet to be a potentially misinforming one or not. Firstly, COVID -19 tagged tweets were filtered based on the presence of keywords formulated from the list of common misinformation spread around the virus. Secondly, a deep neural network (RNN) trained on openly available real and fake news dataset was used to predict if the keyword filtered tweets were factual or misinformed.
Published: 25 October 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p65
The relationship between complexity and various factors is explored through the simulation of the three neighbor ways of the game of life. It mainly discusses the state evolution process of cell populations under various evolutionary laws, various environmental scales and various initial states. Based on the discovery of a novel, long-lived and simple cell with an initial state, the periodic and stable cell morphology in Game of Life is introduced, thus reflecting the related complexity factors and changes. By simulating various environmental boundaries and comparing the steady-state graphs, it is concluded that a closed system will cause certain limitations in the final outcome. The limited environment will prevent the cell from expanding outward, but it can also create more periodic patterns. A limited environment is simultaneously an important factor in simplifying the system. In addition to the environment, the edge of chaos is also an important factor in the complexity of the system. An appropriate evolution rule can help the entire system find a balance in the chaos and present stable and interesting patterns. In addition, the correct neighbor method has a positive effect on the change of the cell. Finally, an infinite loop mode is set up to illustrate once again the wonder and complexity of Game of Life.
Published: 12 October 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p47
We can use java language to design the game of chess on eclipse platform and design a new rule for it : “Six in a Row”, this game is more complex than Five-in-a-Row,and we can add a function of Man-Machine Battle in the program.This paper which based on the practical programming experience introduce the algorithm of the above game. The basic mentality of the algorithm is creating a scoring table and all points of the chessboard are scored by using ergodic method.Finally, the machine will placing the chess in the point which have the highest score.This algorithm is clearly operable, and the machine has a high rate of winning when play with human.
Published: 12 October 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p36
Video games, and especially roleplaying games offer a way for players to escape stress and cope with stressors. Video games are a new, and potentially unique, mechanism for telling stories. They allow a player to not only interact with a world, but to fully immerse themselves in a digital world. Being able to quite literally escape to a fantasy world where your actions matter, and you’re given control can be a great form of self-therapy for players. This study aims to examine the results of a global pandemic and quarantine on player motivations and the reasons they play video games. The study collected detailed information on the video games genres and play time of each user and how it has been affected during self-isolation. Participants were also asked a series of questions that required them to evaluate their gaming habits both prior to and during the pandemic. This information was analysed to attempt to further understand players choices, in particular during a pandemic where there is an increased need to alleviate stress and experience a sense of escapism.
Published: 21 September 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p32
Consumers shifted their spending to the web due to the coronavirus (Covid-19) outbreak. Businesses and organizations that once mapped digital strategy with careful planning over a transition period, now forced to scale their initiatives in a matter of days. In this regard, we are motivated by the need to develop a scalable, highly available, resilient, secure, and cost-effective e-commerce web application for demonstrating how cloud services can be leveraged for implementing such applications. This paper is a part of the aforementioned web application development project, titled “A cloud-based e-commerce storefront prototype for SMEs in Oman”. In this paper, we discuss the system considerations, components of implementation, and the schematic design of the proposed software solution. This paper provides meaningful guidelines for companies that want to adopt cloud-based E-commerce web application to bring their products and services online without much upfront cost or initial investment.
Published: 3 September 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p20
A Vehicular Ad hoc Network (VANET) is a distinctive situation of wireless ad hoc networks. The designing of the routing protocol considers a critical role in communication in VANET. VANET has specific features compared to other types of wireless ad hoc networks that impose special characteristics for designing of efficient routing protocols.The challenging factor in designing efficient routing protocols for VANET is the high movement of vehicles that incurs a rapid change in the network topology that causes frequent link breakage. This paper presents and evaluates different position-based routing protocols associated with VANETs. The evaluation aiming to determine appropriate specifications for optimal routing protocols’ features achieving best performance within different environmental conditions. The performance comparison is carried out in terms of Packet Delivery Rate (PDR), Void Problem Occurrence Rate (VPOR), and Average Hops Count (AHC).
Published: 24 August 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p11
License plate detection and recognition are critical components of the development of a connected Intelligent transportation system, but are underused in developing countries because to the associated costs. Existing license plate detection and recognition systems with high accuracy require the usage of Graphical Processing Units (GPU), which may be difficult to come by in developing nations. Single stage detectors and commercial optical character recognition engines, on the other hand, are less computationally expensive and can achieve acceptable detection and recognition accuracy without the use of a GPU. In this work, a pretrained SSD model and a tesseract tessdata-fast traineddata were fine-tuned on a dataset of more than 2,000 images of vehicles with license plate. These models were combined with a unique image preprocessing algorithm for character segmentation and tested using a general-purpose personal computer on a new collection of 200 automobiles with license plate photos. On this testing set, the plate detection system achieved a detection accuracy of 99.5 % at an IOU threshold of 0.45 while the OCR engine successfully recognized all characters on 150 license plates, one character incorrectly on 24 license plates, and two or more incorrect characters on 26 license plates. The detection procedure took an average of 80 milliseconds, while the character segmentation and identification stages took an average of 95 milliseconds, resulting in an average processing time of 175 milliseconds per image, or 6 photos per second. The obtained results are suitable for real-time traffic applications.
Published: 24 August 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n4p1
One of e-Government implementation’s most notable advantages is the enhancement of transparency amongst public sector organizations that it brings, possibly caused by the availability of information, the newfound accountability, and the ability to track and monitor transactions within the public sector. With this in mind, the research at hand will centre on the issue of unemployment amongst postgraduates in Saudi Arabia, focusing on reaping the benefits of the centralised, highly efficient e-Government system to control the process of employment within Saudi universities and research centres. In this vein, this research proposes that e-Government (as well as other ICTs) should be tasked with fighting corruption by detailing the specifics and qualifications of the job-seeker in question within the relevant centralised websites. Indeed, such a process would allow for the filtering and selecting process by the employer to be both supervised and audited.
Published: 28 July 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n3p78
We propose a new approach to text semantic analysis and general corpus analysis using, as termed in this article, a "bi-gram graph" representation of a corpus. The different attributes derived from graph theory are measured and analyzed as unique insights or against other corpus graphs, attributes such as the graph chromatic number and the graph coloring, graph density and graph K-core. We observe a vast domain of tools and algorithms that can be developed on top of the graph representation; creating such a graph proves to be computationally cheap, and much of the heavy lifting is achieved via basic graph calculations. Furthermore, we showcase the different use-cases for the bi-gram graphs and how scalable it proves to be when dealing with large datasets.
Published: 28 July 2021
Computer and Information Science, Volume 14; https://doi.org/10.5539/cis.v14n3p63
A substantial portion of critical information infrastructures in advanced economies comprises former public utilities, which in the 1980s/90s were fully or partially privatized, a change justified mainly on economic efficiency grounds. This entailed that these utility companies had to compete in the free market, thus being exposed to the same risks/opportunities as private companies. Much like businesses in other industrial sectors, utility companies have increasingly joined social media over the last decade, as ‘digital’ visibility through social networking platforms, such as Facebook, Twitter, and Instagram has become fundamental. The new (privatized) utilities have relied on marketing and ad campaigns to promote their business and generate revenues. Trust and reputation for companies are primary resources to attract new customers and/or keep old ones, especially for companies with a wide customer base. Trust and reputation are difficult assets to preserve on social media, as they can be subject to negative attacks, including fake campaigns. This paper is a probe that explores a potential attack vector to critical infrastructures via weakening customer and investor trust in (the now private) utilities by blemishing CII-utilities’ reputation on social media. More specifically, the paper considers the possibility of attacks that have the potential to undermine the stability and reliability of critical infrastructures and advances a preliminary justification of why that may happen. We do this by looking at cases in which negative social media campaigns with fake content have been successfully implemented via digital tools.