Computer Science and Information Technologies

Journal Information
ISSN / EISSN : 2722-323X / 2722-3221
Current Publisher: Institute of Advanced Engineering and Science (10.11591)
Total articles ≅ 17
Filter:

Latest articles in this journal

Vahid Kaviani J , Parvin Ahmadi Doval Amiri, Farsad Zamani Brujeni, Nima Akhlaghi
Computer Science and Information Technologies, Volume 1, pp 98-105; doi:10.11591/csit.v1i3.p98-105

Abstract:
This paper is a review of types of modification data attack based on computer systems and it explores the vulnerabilities and mitigations. Altering information is a kind of cyber-attack during which intruders interfere, catch, alter, take or erase critical data on the PCs and applications through using network exploit or by running malicious executable codes on victim's system. One of the most difficult and trendy areas in information security is to protect the sensitive information and secure devices from any kind of threats. Latest advancements in information technology in the field of information security reveal huge amount of budget funded for and spent on developing and addressing security threats to mitigate them. This helps in a variety of settings such as military, business, science, and entertainment. Considering all concerns, the security issues almost always come at first as the most critical concerns in the modern time. As a matter of fact, there is no ultimate security solution; although recent developments in security analysis are finding daily vulnerabilities, there are many motivations to spend billions of dollars to ensure there are vulnerabilities waiting for any kind of breach or exploit to penetrate into the systems and networks and achieve particular interests. In terms of modifying data and information, from old-fashioned attacks to recent cyber ones, all of the attacks are using the same signature: either controlling data streams to easily breach system protections or using non-control-data attack approaches. Both methods can damage applications which work on decision-making data, user input data, configuration data, or user identity data to a large extent. In this review paper, we have tried to express trends of vulnerabilities in the network protocols’ applications.
Abhishek B., Kanya Krishi, Meghana M., Mohammed Daaniyaal, Anupama H. S.
Computer Science and Information Technologies, Volume 1, pp 116-120; doi:10.11591/csit.v1i3.p116-120

Abstract:
Gesture recognition is an emerging topic in today’s technologies. The main focus of this is to recognize the human gestures using mathematical algorithms for human computer interaction. Only a few modes of Human-Computer Interaction exist, they are: through keyboard, mouse, touch screens etc. Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers. Gesture recognition is one of the essential techniques to build user-friendly interfaces. Usually gestures can be originated from any bodily motion or state, but commonly originate from the face or hand. Gesture recognition enables users to interact with the devices without physically touching them. This paper describes how hand gestures are trained to perform certain actions like switching pages, scrolling up or down in a page.
Asep Sholahuddin , Dessy Novita, Deni Setiana
Computer Science and Information Technologies, Volume 1, pp 121-125; doi:10.11591/csit.v1i3.p121-125

Abstract:
Someone who could only move his/her head and could not move his/her limbs needs a wheelchair and robotic arms which could be controlled by the head. Gyro sensor is a sensor that could be controlled according to the tilt in the x,y coordinates which then implemented to measure the tilt of the user’s head. This paper would explain the head detector application to control wheelchairs and robotic arms. They could be controlled using Arduino microcontroller which uses C programming language. Gyro sensor that is put on the head could control wheelchair to move left, right, forward and backward according to the tilt of the head. It is the same with controlling robotic arms. It could rotate left, right, and move up and down. The x and y coordinates are used to determine the tilt of the head for controlling the wheelchair as well as robotic arms’ movements. It is discovered that wheelchairs and robotic arms could be controlled by the head by the use of gyro sensor.
Computer Science and Information Technologies, Volume 1, pp 93-97; doi:10.11591/csit.v1i3.p93-97

Abstract:
The idea of blockchains technology (BT) in the Internet of Things (IoT) is to allow the physical things to trust in the transactions held within the IoT network. The BT is a distributed, decentralized, publicly shared its digital ledger and secured technology to eternally record the transactions across the shared database. The BT in IoT can be called Trust Machine to eliminate the intermediates and enables the physical things to trust with each other. This research evaluates the performance of BT in IoT. The simulated results are tested and can be used in the sustainable development of the integration of BT and IoT.
Selvamuthukumaran S., Ramkumar T., Shantharajah Shantharajah
Computer Science and Information Technologies, Volume 1, pp 126-134; doi:10.11591/csit.v1i3.p126-134

Abstract:
Iris recognition is a promising biometric authentication approach and it is a very active topic in both research and realistic applications because the pattern of the human iris differs from person to person, even between twins. In this paper, an optimized iris normalization method for the conversion of segmented image into normalized form has been proposed. The existing methods are converting the Cartesian coordinates of the segmented image into polar coordinates. To get more accuracy, the proposed method is using an optimized rubber sheet model which converts the polar coordinates into spherical coordinates followed by localized histogram equalization. The experimental result shows the proposed method scores an encouraging performance with respect to accuracy.
E. Neelima , M.S. Prasad Babu
Computer Science and Information Technologies, Volume 1, pp 106-115; doi:10.11591/csit.v1i3.p106-115

Abstract:
CVD (Cardiovascular Diseases) is among the major health ailment issue leading to millions of deaths every year. CVDs are resulting as an outcome of implications in terms of environmental and the genetic factors that result in the CVD for individuals. Phenomenal advancements that has taken place in the diagnosis solutions like usage of genomic tools are contributing towards predicting and diagnosis of heart diseases more accurately. In recent past, analyzing gene expression data, particularly using machine learning strategies to predict and classify the given unlabeled gene expression record is a generous research issue. Concerning this, a substantial requirement is feature optimization, which is since the overall genes observed in human body are closely 25000 and among them 636 are cardio vascular related genes. Hence, it complexes the process of training the machine learning models using these entire cardio vascular gene features. Hence, this manuscript is using bidirectional pooled variance strategy of ANOVA standard to select optimal features. Along the side to surpass the constraint observed in traditional classifiers, which is unstable accuracy at k-fold cross validation, this manuscript proposed a classification strategy that build upon the swarm intelligence technique called cuckoo search. The experimental study indicating that the number of optimal features those selected by proposed model is substantially low that compared to the other contemporary model that selects features using Forward Feature Selection and classifies using SVM classifier (FFSSVM). The experimental study evinced that the proposed model, which selects feature by bidirectional pooled variance estimation and classifies using proposed classification strategy that build on cuckoo search (BPVECS) outperformed the selected contemporary model (FFSSVM).
Sridhar Iyer
Computer Science and Information Technologies, Volume 1, pp 54-60; doi:10.11591/csit.v1i2.p54-60

Abstract:
In the current work, for Space Division Multiplexing based Optical Networks (SDM-b-OTNs), we investigate the performance of various switching methods with a variation in traffic evolution over different time frame periods. Initially, comparison of the existing methods viz., independent switching (InSw), frequency switching (FqSw), and space switching (SpSw) demonstrates that (i) over longer periods of time frame, FqSw provisions low network usage, and (ii) SpSw offers low network usage for shorter periods of time frame; however, as time frame increases to longer periods, SpSw starts to outperform InSw. Next, we investigate a hybrid switching (HySw) method which begins by implementing InSw and then shifts to the use of SpSw after the activation of specific numbers of space channels. HySw is observed to provision substantial savings on the costs incurred for switching, and with lower space channel values it also offers a balance in the trade-off which occurs between the costs associated for activating the space channels and that incurred for switching. Lastly, a comparison of InSw, SpSw, and HySw considering mixed line rate (MLR) demands shows that the space channels assigned in the ‘in-between’ periods of time frame can be reduced by shifting from InSw to SpSw in the starting periods of time frame.Overall, from the results it is inferred that the network performance only slightly depends on the MLR traffic, and over longer periods of time frame, in comparison to InSw, the significant benefits of SpSw and HySw remains conserved.
Merlin Florrence Joseph , Ravi Lourdusamy
Computer Science and Information Technologies, Volume 1, pp 61-77; doi:10.11591/csit.v1i2.p61-77

Abstract:
Visualization is a technique of creating images, graphs or animations to share knowledge. Different kinds of visualization methods and tools are available to envision the data in an efficient way. The visualization tools and techniques enable the user to understand the knowledge in an easy manner. Nowadays most of the information is presented semantically which provides knowledge based retrieval of the information. Knowledge based visualization tools are required to visualize semantic concepts. This article analyses the existing semantic based visualization tools and plug-ins. The features and characteristics of these tools and plug-ins are analyzed and tabulated.
Shrutika Khobragade, Rohini Bhosale, Rahul Jiwane
Computer Science and Information Technologies, Volume 1, pp 78-83; doi:10.11591/csit.v1i2.p78-83

Abstract:
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.
Arpita Shah , Narendra Patel
Computer Science and Information Technologies, Volume 1, pp 39-46; doi:10.11591/csit.v1i2.p39-46

Abstract:
Of late Multitenant model with In-Memory database has become prominent area for research. The paper has used advantages of multitenancy to reduce the cost for hardware, labor and make availability of storage by sharing database memory and file execution. The purpose of this paper is to give overview of proposed Supple architecture for implementing in-memory database backend and multitenancy, applicable in public and private cloud settings. Backend in-memory database uses column-oriented approach with dictionary based compression technique. We used dedicated sample benchmark for the workload processing and also adopt the SLA penalty model. In particular, we present two approximation algorithms, Multi-tenant placement (MTP) and Best-fit Greedy to show the quality of tenant placement. The experimental results show that Multi-tenant placement (MTP) algorithm is scalable and efficient in comparison with Best-fit Greedy Algorithm over proposed architecture.
Back to Top Top