scispace - formally typeset
Search or ask a question
JournalISSN: 2005-8039

International Journal of Advancements in Computing Technology 

The International Association for Information, Culture, Human and Industry Technology (AICIT)
About: International Journal of Advancements in Computing Technology is an academic journal. The journal publishes majorly in the area(s): Cluster analysis & Wireless sensor network. It has an ISSN identifier of 2005-8039. Over the lifetime, 1786 publications have been published receiving 6025 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: It was concluded that national culture of developing countries has an impressive effect on ERP implementation in these countries and developing countries underestimate business process reengineering (BPR) and fit between ERP and business/process factors in comparison with developed countries.
Abstract: The main goal of this research is to understand is there any difference between ERP implementation's CSF in developed and developing countries? Understanding this subject can help us to implement ERP systems properly in developing nations. This research showed that in developed and developing countries "Change Management" was most important factor and in developed countries "Country-related functional requirements" factor was less important factor and "Fit between ERP and business/process" was the least cited factor among developing nations. In last it concluded that national culture of developing countries has an impressive effect on ERP implementation in these countries. In other hand developing countries companies more depend on ERP vendors in compare to developed countries companies. In addition it seems developing countries underestimate business process reengineering (BPR) and fit between ERP and business/process factors in comparison with developed countries.

91 citations

Journal ArticleDOI
TL;DR: The current work’s purpose is to evaluate the performances of the HBase implementation in comparison with SQL database, and, of course, with the performances offered by BigTable.
Abstract: HBase is the open source version of BigTable distributed storage system developed by Google for the management of large volume of structured data. HBase emulates most of the functionalities provided by BigTable. Like most non SQL database systems, HBase is written in Java. The current work’s purpose is to evaluate the performances of the HBase implementation in comparison with SQL database, and, of course, with the performances offered by BigTable. The tests aim at evaluating the performances regarding the random writing and random reading of rows, sequential writing and sequential reading, how are they affected by increasing the number of column families and using MapReduce functions.

57 citations

Journal ArticleDOI
TL;DR: The characteristics of Mobile Ad hoc Networks (MANETs), and their Routing protocol, and a mobile ad hoc network which consists of set mobile wireless nodes and one fixed wireless server are design using OPNET Modeler 14.5.
Abstract: This paper first describes the characteristics of Mobile Ad hoc Networks (MANETs), and their Routing protocol, and second a mobile ad hoc network (MANET) which consists of set mobile wireless nodes (25, 50, 75, and 100) and one fixed wireless server are design using OPNET Modeler 14.5. The performance of this network under different routing protocol is analyzed by three metrics: delay, network load and throughput. The comparison analysis will carry out about these protocols and in the last the conclusion shows which routing protocol is the best one for mobile ad hoc networks.

50 citations

Journal ArticleDOI
TL;DR: An improvement is made to the conventional confusion-diffusion architecture by introducing a certain diffusion mechanism in confusion stage through a lightweight bitlevel permutation algorithm, and hence the overall security of the image cryptosystem is promoted.
Abstract: Confidentiality is an important issue when digital images are transmitted over public networks, and encryption is the most useful technique employed for this purpose. Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among adjacent pixels, which are generally difficult to handle by conventional algorithms. Recently, chaos-based encryption has suggested a new and efficient way to deal with the intractable problems of fast and highly secure image encryption. This paper proposes a chaos-based cryptosystem with a novel permutation process for secure and efficient image protection. To improve the security of the confusion module, an improvement is made to the conventional confusion-diffusion architecture by introducing a certain diffusion mechanism in confusion stage through a lightweight bitlevel permutation algorithm. As a result, the diffusion performance is significantly enhanced and hence the overall security of the image cryptosystem is promoted. Results of various types of analysis indicate that the proposed scheme provides a good balance between security and speed and hence suitable for real-time secure image communication applications.

40 citations

Journal ArticleDOI
TL;DR: Theoretical analysis shows that the algorithm based on randomized perturbation techniques and secure multiparty computation not only protect the users’ privacy, but also can keep the accuracy.
Abstract: With the evolution of the Internet, collaborative filtering techniques are becoming increasingly popular in E-commerce recommender systems. Such techniques recommend items to users employing similar users' preference data. People use recommender systems to cope with information overload. Although collaborative filtering systems are widely used by E-commerce sites, they fail to protect users' privacy. Since many users might decide to give false information because of privacy concerns, collecting high quality data from users is not an easy task. Collaborative filtering systems using these data might produce inaccurate recommendations. To reserve privacy in collaborative filtering recommender systems, this paper presented a collaborative filtering algorithm based on randomized perturbation techniques and secure multiparty computation. The randomized perturbation techniques are used in the course of user data collection and can generate recommendations with decent accuracy. Employing secure multiparty computation to protect the privacy of collaborative filtering by distributing the user profiles between multiple repositories and exchange only a subset of the profile data, which is useful for the recommendation. Theoretical analysis shows that the algorithm based on randomized perturbation techniques and secure multiparty computation not only protect the users’ privacy, but also can keep the accuracy.

39 citations

Network Information
Related Journals (5)
Journal of Applied Sciences
6.8K papers, 55.6K citations
75% related
Mathematical Problems in Engineering
20.3K papers, 167K citations
74% related
Multimedia Tools and Applications
16K papers, 185.7K citations
73% related
IEEE Access
69.3K papers, 1M citations
73% related
Computers & Electrical Engineering
5.2K papers, 82.1K citations
72% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20171
20152
20142
2013477
2012838
2011363