Journal of Information Technology and Sciences

Journal Information
EISSN : 2581-849X
Total articles ≅ 21
Filter:

Latest articles in this journal

Devasis Pradhan
Journal of Information Technology and Sciences, Volume 8, pp 12-26; https://doi.org/10.46610/joits.2022.v08i03.003

Abstract:
Teaching with online platform and learning is a need to make an effective decision in all types of training today. Teaching Staff belong to higher educational institutions is one of the significant components in this on the web instructing/educational experience. There are a few issues relating to staff and one significant issue is the preparing of the workforce and their direction towards internet instructing. There are a few stages, administrations, and MOOCs accessible, which give preparing to workforce in regards to various viewpoints connected with educating better on the web. While there are various showing techniques, the majority of the customary strategies utilized in class can be applied similarly effectively on the web. Anyway, the showing strategy you select will change in light of your showing reasoning, goals, branch of knowledge, and classroom socio- economics. This paper investigates the requirement for preparing the personnel to improve online teaching methodology.
Ms. Vishranti Kalyankar, Nilesh Anute
Journal of Information Technology and Sciences, Volume 8, pp 1-7; https://doi.org/10.46610/joits.2022.v08i03.001

Abstract:
The main objective of writing this research paper is to identify how google is used in the e-commerce sector. In addition, identify how e-commerce enhances its business using google analytics. To study the role of google analytics in the e-commerce sector. The paper went on to describe some of Google Analytics' particular advantages, such as high customization based on the nature of the organization and a broad range of reporting functionalities. The case study's main goal is to raise targeting strategies of Google Analytics' capabilities and to advocate the use of Web Analytics in sales and marketing activities. The case study's main result is that, in order to get the most out of analytics tools, it is essential to have strong financial goals and ensure first.
Leandre Gomes, Abhinav Deshmukh, Nilesh Anute
Journal of Information Technology and Sciences, Volume 8, pp 31-42; https://doi.org/10.46610/joits.2022.v08i02.005

Abstract:
The internet brought a new revolution to the financial sector and it has changed the way of operations in the last two decades. Now, people have the option to carry out banking transactions from a place of their choice without having to go to a nearby bank office. E-banking has become an integral part of the banking system and has become a popular method of transaction for the majority of people. A user has a wide range of options for managing his money through numerous internet banking methods. While internet banking is an aid for customers, they still have to be vigilant to keep their accounts safe from cybercriminals and hackers, as everything on the internet is prone to security threats. Internet security measures followed by the majority of the bank sites to protect their information are not up-to-date as compared to the dynamic cyber threats. Such problems have made it easy for confidential financial information to fall into the hands of third parties and cybercriminals. Although there are several security measures to stop data breaches, there are still flaws in these systems. The goal of this study article is to look at the number of cyber security issues in internet banking in India and the consumer’s awareness of these issues and preventive measures used by them. Our research is particularly based on primary data.
Sunusi Hussaini, Mustapha Haruna, Deepak Kumar Shrivastava
Journal of Information Technology and Sciences, Volume 8, pp 12-21; https://doi.org/10.46610/joits.2022.v08i01.003

Abstract:
The block chain is a distributed database that stores and shares records of all transactions or digital events that have taken place. Each transaction is double-checked by the majority of the system's members. It holds every single transaction's record. The block chain is a novel technology that is being used to validate and store transaction records for online crypto currencies such as Bit coin. Transactions cannot be retracted, copied, or faked because the system is redundant and distributed. The block chain has potential applications in domains other than online money, such as public libraries. This column will briefly outline what a block chain is and how it is used, as well as potential future uses that librarians and Academic Library practitioners would be interested in, as well as some of the system's flaws. Information workers may be able to utilize and benefit from this technology in a variety of ways.
Parjita Munshi, Udit Pandya, Dhara Prajapati, Gargi Chauhan, Priyanka Shah, Parita Parikh
Journal of Information Technology and Sciences, Volume 7; https://doi.org/10.46610/joits.2021.v07i03.005

Abstract:
To provide a better life to human, A six edges Robotic arm prototype model is developed. For the movement of every part there are Motors attached with them and for controlling we used Arduino UNO, for connection there is breadboard. A Robotic arm provides a facility to pick a thing from place and put that thing to another place. This prototype is used at home for carrying small things. With the reference to this prototype model a heavy thing carrying robotic arm can be use in industries.
R R Tribhuvan, T. Bhaskar
Journal of Information Technology and Sciences, Volume 7; https://doi.org/10.46610/joits.2021.v07i03.004

Abstract:
Outcome-based learning (OBL) is a tried-and-true learning technique based on a set of predetermined objectives. Program Educational Objectives (PEOs), Program Outcomes (POs), and Course Outcomes are the three components of OBL (COs). Faculty members may adopt many ML-based advised actions at the conclusion of each course to improve the quality of learning and, as a result, the overall education. Due to the huge number of courses and faculty members involved, harmful behaviors may be advocated, resulting in unwanted and incorrect choices. The education system is described in this study based on college course requirements, academic records, and course learning results evaluations is provided for anticipating appropriate actions utilizing various machine learning algorithms. Dataset translates to different problem conversion methods and adaptive methods such as one-versus-all, binary significance, naming power set, series classification and custom classification ML-KNN. The suggested recommender ML-based system is used as a case study at the Institute of Computer and Information Sciences to assist academic staff in boosting learning quality and instructional methodologies. The results suggest that the proposed recommendation system offers more measures to improve students' learning experiences.
Kalyani Deore, Leena Gaikwad, Rohit Dhamne, Vishal Agale, T. Bhaskar
Journal of Information Technology and Sciences, Volume 7; https://doi.org/10.46610/joits.2021.v07i03.003

Abstract:
This study is to help readers to understand detection of fake news using machine learning. The main purpose of the planned system is to build an application which identifies fake news stories from a bunch of news stories to make people aware of fake news rumours. With the help of machine learning algorithms, we can detect and separate out the fake news. Nowadays, it is become harder to identify the original source of news stories, like looking for a needle in a haystack. In the modern world, news is a kind of communication that keeps us up to date on the latest events, topics, and people in the wider globe. A society relies on news for a variety of reasons, the most important of which is informing its members about events taking on in and around them that might influence them. Oral and traditional media, as well as digital communication methods, altered videos, memes, unconfirmed marketing, and social media have all contributed to the spread of rumors. As nowadays many people use social media in many cases people get wrong and misleading information and people share those stories without verifying whether it is real or fake news stories. Spreading false information on social media has become a major problem these days. That is why we need a system that can tell us whether something is false news or not. Applications are: 1. Fake news may be detected on social media using this approach. 2. The system can be used to help news channels to broadcast only real and classified news. 3. Users can easily detect and eliminate fake articles that contain misinformation intended to mislead readers.
Sujata Khandaskar, Siddharth Tayde, Aditya Sawant, Nikhil Masand, Barun Singh
Journal of Information Technology and Sciences, Volume 7; https://doi.org/10.46610/joits.2021.v07i03.002

Abstract:
The number of marine debris is excellent in understanding the diagnosis of debris from all oceans of the world and the identification of the highest levels of waste disposal that is most necessary for the removal of waste. Currently, the standard for floating waste management requires the use of a manta trawl. Techniques that require manta trawls (or similar ground-collection devices) that use the physical removal of marine debris as a first step and then analyze the collected samples as a second step. The need for pre-analysis removal is very costly and requires significant oversight - preventing the safe transfer of marine waste monitoring services to all Earth's marine bodies. Without better monitoring methods and samples, the overall impact of water pollution on the entire environment. This study revealed an unusual flow of activity that used images taken from aquatic debris as roots. Produces quantification of marine plastic or waste incorporated into photographs to perform accurate quantification and body removal. This model is trained in the ImageNet Large Visual Recognition Challenge using the 2012 data and can distinguish between many different classes such as cardboard, glass, metal, paper, and plastic. This program uses the transfer of learning from the existing model and then returns it to separate a new set of images. Workflow involves creating and processing domain-specific information, building an object acquisition model using a deep neural network.
S Nagaraju, B. Prabhakara Reddy
Journal of Information Technology and Sciences, Volume 7; https://doi.org/10.46610/joits.2021.v07i03.001

Abstract:
Mental stress is showing harmfulness to human health leads abnormal stress in chronology with this may lose our mental health for proactive care. With recognizable pieces of proof of web-based media, individuals cannot share their everyday exercises and collaborate with companions via web-based media stages, making it happing to use online informal community information for stress identification. We find that users stress state is closely associated with thereupon of his/her friends in social media, which we employ a large-scale dataset from real-world social platforms to systematically study the relationship between users’ stress states and social interactions. We first define a gaggle of stress-related comments, images, and social attributes from various aspects, then proposed a plot. Research results saying that the proposed model can improve the detection performance. With the help of enumeration, we build an internet site for the users to spot their stress rate level and may check other related activities.
Atul Pawar, Sairaj Lohar, Manoj Patil, Rushikesh Kulkarni, Vasim Inamdar
Journal of Information Technology and Sciences, Volume 7; https://doi.org/10.46610/joits.2021.v07i02.004

Abstract:
Social Media has an impact on different aspects of our life. It has revolutionized the way people communicate and socialize on the web. It is an undeniable force in modern society. It has the power to force necessary changes. Social networking platforms such as Facebook, Twitter, Instagram allows users to interact with the world, to express their view on different topics in society. Social media influence in political campaigns has increased tremendously, it plays an important role in electoral politics, political polling, so it is necessary to perform sentiment analysis on political topics to get the public opinion. This technical paper focuses mainly on analysis of political tweets using sentiment analysis. In this paper, we performed sentiment analysis on different political topics in India and analysed the overall sentiments regarding those topics, using naive bayes machine learning algorithm and classified those tweets as positive and negative.
Back to Top Top