International Journal of Information Technology and Applied Sciences (IJITAS)

Journal Information
EISSN : 2709-2208
Total articles ≅ 33

Latest articles in this journal

Muhammad Shakil Parvez, Sarker Tanveer Ahmed Rumee
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 4, pp 01-11;

Electronic Identity Management has become a key ingredient for electronic governance. Countries around the world are using state-of-the-art technologies to digitize their citizen service delivery process. Uniquely identifying citizens and electronically managing their authentication information is a must for trust and fairness. However, at the implementation level, various modes of electronic identity management are currently in practice, primarily: centralized, user-centric, and federated models. This paper presents an overall summary of the level and type of identity management strategies adopted by different governments. We believe, this information will be valuable to the policymakers and development strategies to plan, design, implement and update the current state of the art.
Soulaiman Harfouf
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 4, pp 12-20;

This article aims to describe the process of anchoring, institutionalization and diffusion of modern sport in northern Morocco, and in Tetouan in particular, the capital of the Spanish protectorate (1913-1956). By referring to works describing some of the sports and physical activities practised in schools during the protectorate period, and by relying on some issues of the Spanish press of the protectorate period, the paper shows that although the British are to be credited with the introduction of the game of football and its relative diffusion in some cities and towns of northern Morocco, its supervised practice is mainly the responsibility of the colonists and the Spanish military. These two precursors of football in Morocco during colonization organized and practised it for entertainment purposes, mainly for the benefit of the Moroccan Spaniards. However, if the Europeans forbade Moroccans to take part in military gymnastics because it was considered dangerous, sport, which was considered a game and had no political charge, seemed less dangerous and, consequently, more accessible to the indigenous Muslims. The latter took advantage of this to appropriate a new culture while remaining totally absent from the management and decision-making structures.
Boddepalli Navjoth
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 172-179;

A university campus is an intricate infrastructure. Especially new students, who are thereon for the first time, have a tough time orienting themselves and finding places. The campus of Andhra University occupies more than 422 acres (170.7 hectares). The campus has many different buildings. Every year, thousands of new students join the university. These students either take a campus commuter or walk around to get familiar with the campus compound. Visitors to Andhra University might have a hard time searching for a particular location on the campus. Every day, uncountable numbers of students, staff, and visitors move around the campus compound to perform tasks by walking, cycling, driving, or riding campus commuters. Even if there are maps at various points on the campus premises, users do not have continuous help to reach their destination. On these static maps, they can try to figure out a way to get to their target, but as soon as they start walking in the target direction, they have no help anymore. The main objective of this study is to develop a Spatial Information System for Andhra University (a Progressive Web App). Which provides several features like a voice-enabled optimal navigation solution, shows nearby places within campus premises, and a geo-tagged university (Geo-tagging of all entities within campus premises). To make the web application more operative, the application is appended with more features. For instance, a map shows statistical data with pie charts visualization (statistical data like monthly attendance), machine learning's image recognition model for extracting the building information from the digital or captured images.
Indrani Roy, Ajmerry Hossain, Sarker Tanveer Ahmed Rumee
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 180-183;

User authentication is mostly reliant on password-based based verification. Users generally used text-based passwords, which are user-friendly but often predictable and vulnerable to some common attacks. To overcome these shortcomings, graphical authentication methods have emerged. Here, users choose a sequence of images as passwords. Though such methods help users to better remember their passwords, they too suffer from attacks seen in the case of textual passwords. This paper presents a comprehensive summary of the vulnerabilities state of the art graphical password schemes against the following well-known attacks - Dictionary, Guessing, Brute force, Shoulder surfing, Spyware, and Social engineering. We believe the findings of this study can help researchers design more secure graphical password schemes making them more usable and a realistic replacement for text-based passwords.
Safa Rkhouya, Khalid Chougdali
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 167-171;

The purpose of this research work is to study the usage of machine learning in detecting malware. This paper presents a versatile framework, in which a dataset of more than 130000 files has been analyzed, to train and test four machine learning algorithms: Support Vector Machine, Decision Tree, Random Forest, and Gradient Boosting; The performance of each algorithm in malware classification, has been studied based on the: Accuracy, execution time, rate of false positives and false negatives, and area under the Receiver Operating Characteristic curve.
Jin Yong-Xian
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 156-160;

To improve the energy efficiency of the wireless sensor network (WSN), and extend the network life. This paper proposes an improved unequal clustering multipath routing algorithm (UCMRA). The algorithm improves the formula of cluster head selection probability and competition radius, and considers the energy factor, node density, optimal number of cluster heads, etc. Experimental results show that, compared with the traditional algorithm, UCMRA has more stable cluster head distribution, less energy consumption and longer network lifetime.
Asmae Sadiq, Nihal Moukrim, Touria EL Ghailassi, Zineb Faiz, Said Fakhi, Hassan Hannache
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 142-147;

The present work aims to investigate the conditions for improving the containment of spent ion exchange resin (IER) as a radioactive waste, using powdered Callovo-Oxfordian clay (COx) as an addition to the cementitious matrix at different rates. The aim of this work was to investigate the influence of COx on the characteristics of cemented packages of spent (REI). In this context, a cemented pack was made using Portland class 45 cement, sand, resin and water. And others are prepared by replacing the sand with COx, in the following proportions: (2%, 4%, 6%, 8% and 10%). The packages obtained with and without COx were measured for their compressive strength and porosity.
Said Lotfi, Mohamed Rebbouj
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 148-155;

This paper describes the use of machine learning in sports. Given the recent trend in Data science and sport analytics, the use of Machine Learning and Data Mining as techniques in sport reveals the essential contribution of technology in results and performance prediction. The purpose of this paper is to benchmark existing analysis methods used in literature, to understand the prediction processes used to model Data collection and its analysis; and determine the characteristics of the variables controlling the performance. Finally, this paper will suggest the reliable tool for Data mining analysis technique using Machine Learning.
Muhammad Sanwal, Cafer Çalişkan
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 161-168;

In the current era, a rapid increase in data volume produces redundant information on the internet. This predicts the appropriate items for users a great challenge in information systems. As a result, recommender systems have emerged in this decade to resolve such problems. Various e-commerce platforms such as Amazon and Netflix prefer using some decent systems to recommend their items to users. In literature, multiple methods such as matrix factorization and collaborative filtering exist and have been implemented for a long time, however recent studies show that some other approaches, especially using artificial neural networks, have promising improvements in this area of research. In this research, we propose a new hybrid recommender system that results in better performance. In the proposed system, the users are divided into two main categories, namely average users, and non-average users. Then, various machine learning and deep learning methods are applied within these categories to achieve better results. Some methods such as decision trees, support vector regression, and random forest are applied to the average users. On the other side, matrix factorization, collaborative filtering, and some deep learning methods are implemented for non-average users. This approach achieves better compared to the traditional methods.
Janos Vincze, Gabriella Vincze-Tiszay
International Journal of Information Technology and Applied Sciences (IJITAS), Volume 3, pp 139-141;

After Békésy the stapes base moves around two axes: for weaker sounds - rotates around its transverse axis; in case of a strong sound - it moves around its longitudinal axis. Békésy’s place theory cannot alone explain the frequency-distinguishing ability of the ear. However, the existence of active amplification further sharpens the frequency-analysing ability of the cochlea. In addition, the different frequency sensitivity of afferent nerve fibres of inner hair cells synergizes with the mechanisms above. Peaked resonance curves are consequences of different threshold sensitivities of nerves connecting to individual hair cells. The frequency, which belongs to the lowest stimulus threshold, is called the characteristic frequency of a nerve. This place assignment of nerve frequencies are formed by the following mechanism in the cochlea. The place of amplitude maxima of progressive waves excited in the basilar membrane shows slight frequency dependence. The mechanism of active amplification forming in outer hair cells amplifies and sharpens the resonances of the basilar membrane. In 1961, nobleman Georg von Békésy received the Nobel Prize in Medicine: “for his discoveries of the physical mechanisms of stimulation within the cochlea”.
Back to Top Top