scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Computer Applications in 2021"



Journal ArticleDOI
TL;DR: A short survey is pursued on some common simulators that can be applicable in VANETs, and results obtained can draw a good and helpful guideline in developing VANet performance through its routing protocols.
Abstract: In recent years, the number of vehicles has been increasing enormously, this growth has led to an increase in the possibility of accidents. To overcome this situation and to make the driving experience enjoyable, and more comfortable, a special technology based on the Mobile Ad-hoc wireless network infrastructure (MANET) has appeared on the surface. Such technology is called Vehicular Ad-hoc Networks (VANETs). It allows vehicles to communicate with each other or communicate via infrastructure to exchange different kinds of information and warning messages. Scientists and programmers have developed VANET simulation programming to enable the examination and evaluation of various media access, routing, and crisis alerting protocols. In this paper, a short survey is pursued on some common simulators that can be applicable in VANETs. Because such platforms can save a lot of money and time, as well as make the simulation process more realistic; OMNeT++ and SUMO are both used together to investigate the VANET environment using a road traffic simulation. The simulation results obtained can draw a good and helpful guideline in developing VANET performance through its routing protocols.

17 citations


Journal ArticleDOI
TL;DR: The purpose of this research is to analyze the suitable machine learning (ML) for securing the SDN controller targeted by DDoS attacks and proposes a security scheme that includes the ML algorithm, adaptive bandwidth mechanism, and dynamic threshold technique.
Abstract: The fifth-generation (5G) network supports many systems such as reliable communication in potential applications that require maximum security. Advancement in Software-Defined Networking (SDN) is growing with the emerging network architectures targeted from many servers with the various types of Distributed Denial of Service (DDoS) attackers. When malicious users send DDoS attacks, the SDN based 5G networks face security problems and challenges. Despite the security solutions for preventing DDoS attacks in SDN, securing the SDN controller is one of the challenging problems. The purpose of this research is to analyze the suitable machine learning (ML) for securing the SDN controller targeted by DDoS attacks. This paper proposes a security scheme that includes the ML algorithm, adaptive bandwidth mechanism, and dynamic threshold technique. Therefore, the main focus is on the mitigation scheme of DDoS attacks considered in SDN controller through the ML trained model. In this scheme, the proposed approach uses the best ML as a method for finding security solutions that enhance the security of the SDN controller and network performance. In this method, the Extreme Gradient Boosting (XGBoost) and other ML algorithms were used, which not only enhance the accuracy of the security solutions but also improve the overall network performance.

11 citations




Journal ArticleDOI
TL;DR: The study aimed to provide a smart trolley for a supermarket which helps the customers to get benefit through the system and techniques such as loyalty accounts, image processing, recommendation, voice assistants and person counting and payment checkout alert systems are used in order to enhance the performance of asmart trolley.
Abstract: Electronic commerce has developed to such an extent to provide convenience, comfort and efficiency in day-to-day life. Nowadays there are a lot of stores emerging. A supermarket is a place where customers come to purchase their daily products and pay for that [1] . Lots of people spend too much time in the supermarket to purchase their goods. Because there is no proper way to pay the bills, they have no idea about present day deals / offers and people face difficulties in choosing the products from the large variety of products. The study aimed to provide a smart trolley for a supermarket which helps the customers to get benefit through the system. Techniques such as loyalty accounts, image processing, recommendation, voice assistants and person counting and payment checkout alert systems are used in order to enhance the performance of a smart trolley. Loyalty card is used to identify each customer and can be used to access the trolley. Smart trolley contains a camera and load cell which will scan the product and measure the product weight and display all the information in the LCD screen. It helps the customer to get the bill for their purchase in a flexible manner. Product

7 citations



Journal ArticleDOI
TL;DR: The proposed system AIMS (Aadhaar Identity Management System) provides self sovereign identity to the people through which one can create and control their verifiable credentials without any centralized authority and gives control over how their personal data is shared and used.
Abstract: Aadhaar is a 12 digit unique identification number, provided to each citizen of India. This includes the biometric data and personal information such as full names, addresses and birthdates. As per the government rule nowadays Aadhaaris linked to the Bank account, PAN Card, Voter ID Card, LPG Connection Card, Ration Card, Mobile number of the citizen of India. In order to ensure the security of Aadhaar, Blockchain technology has the potential to overcome the security and privacy challenges in Aadhaar.Blockchain is a decentralized, cryptographically signed digital ledger where transactions are framed into blocks.The type of information stored in the transactions can be varied (e.g. currency, intellectual property, identity data, location data, etc).Every transaction (and hence block) has a timestamp associated with when it was recorded to the blockchain. Subsequent blocks require the identifier (or hash) of the preceding block, and this is often the link that chains all the blocks together. The distributed consensus nature of the blockchain would prevent malicious attacks, until 51% of the nodes would be compromised. The proposed system AIMS (Aadhaar Identity Management System) provides self sovereign identity to the people through which one can create and control their verifiable credentials without any centralized authority and gives control over how their personal data is shared and used. This article also provides the comparative analysis of consensus algorithm which determines the performance and security of the blockchain system.

6 citations




Journal ArticleDOI
TL;DR: A stochastic model of spatio-temporal propagation of BLSD in an heterogeneous landscape is considered and mathematical and computational results for this continuous-time model are presented.
Abstract: Black Leaf Streak Disease (BLSD) is the most severe foliar disease of banana and plantain. BLSD is caused by Pseudocercospora fijiensis, an ascomycete fungus which produces wind-borne spores responsible for its spatial dispersal. In order to evaluate the BLSD long-distance dispersal and to better understand the effect of environmental factors on its invasive spatial spread, a spatio-temporal study was set up during the recent BLSD invasion in the Martinique island (FWI). Disease detection was carried out from September2010 to May 2012 and sampling squares were defined from a regular spatial grid built over the island. In this paper, we consider a stochastic model of spatio-temporal propagation of BLSD in an heterogeneous landscape and we present mathematical and computational results for this continuous-time model. Statistical inference of parameters is carried out from presence-absence data using a Bayesian framework based on a data augmentation method with respect to square first colonization times. Parameter posterior distribution calculations made possible the evaluation of the BLSD long-distance dispersal and land-cover influence on the disease propagation. Our results enabled the re-enactment of the invasion.

Journal ArticleDOI
TL;DR: The conclusion of the security implementation using the Freradius Authentication tool by using the PEAP EAP protocol can improve security on the wirelles.
Abstract: One of the main changes in the field of telecommunications is the use of wireless technology. Wireless technology is also implemented in the Ahmad Dahlan University Campus 3 Research Laboratory environment, better known as wireless LAN (WLAN). Each user within the range of campus research laboratory area Ahmad Dahlan University radiates an access point (AP). Another negative impact is that communication that occurs will be easily intercepted between the security of campus network users. The stages performed in this study use the PEAP EAP method to provide security to safer wireless. This security method aims to protect client authentication. PEAP only requires a digital certificate on the authentication side of the server, while the digital certificate on the wireless side of the client will be replaced by using a combination of username and password. Thus, the conclusion of the security implementation using the Freradius Authentication tool by using the PEAP EAP protocol can improve security on the wirelles. Authentication aims to verify the identity of the client so that only registered/valid users can connect to the network and do not need a long time when authentication.


Journal ArticleDOI
TL;DR: Office work refers to work that is generally done in an office building designated explicitly for administrative and professional duties and remote work relates to business operations and professional tasks outside of the office space like telecommunication or working from home.
Abstract: Office work refers to work that is generally done in an office building designated explicitly for administrative and professional duties. Remote work relates to business operations and professional tasks outside of the office space like telecommunication or working from home. Many companies believe that office spaces are more productive because the collective energy of having other people around who are working towards the same goal promotes innovation, collaboration, and collision. Production is at a faster pace when there are a laser focus and no distractions. More impromptu and immediate interactions and consultations create a deep cultural connection and assistance on tasks that one cannot complete independently (Haynes et al., 2017). The office space is not without its challenges. Productivity can be limited due to distractions that one is unlikely to encounter when working remotely, such as noise and commotion, interruptions from other workers dropping into one's office space, impromptu meetings, and gossip sessions (Haapakangas et al., 2018). Commutes to and from the office building result in time wastage and fatigue. Skipping a commute has the impact of letting one customize the workday and work longer hours due to the reduced stress levels (Lin & Bao, 2019).

Journal ArticleDOI
TL;DR: The aim of the present paper is to reach out a hand to SMEs by presenting in deep details how to structure, load and querying a NoSQL PostgreSQL database being part of the customer service.
Abstract: Small and medium-sized enterprises (SMEs) are the backbone of the economy of most countries. There is large evidence in the literature that digitalization improves the market performance of enterprises and, as a consequence, it helps the growth of their businesses. SMEs suffer of budget restrictions, as a consequence within them is low R&D expenditure as well as the number of employees with IT technical abilities. This lack is an objective obstacle for SMEs to compete in the online market. The aim of the present paper is to reach out a hand to SMEs by presenting in deep details how to structure, load and querying a NoSQL PostgreSQL database being part of the customer service.

Journal ArticleDOI
TL;DR: This paper proposes a hybrid approach that combines hybrid algorithms [ (GWO and (PSO)], its name (GWOPS) to reduce the search space filter features selection.
Abstract: Sentiment analysis (SA) is used to evaluate the polarity of reviews. In SA, the feature selection phase is essential, as the best way to solve all optimization problems not happen yet so this paper proposes a hybrid approach that combines hybrid algorithms [ (GWO and (PSO)], its name (GWOPS). To reduce the search space filter features selection. (GWOPS) used for training neural networks (NN) classifiers to select the best features. Data was collected from Twitter on different topics used in our experimental. The proposed algorithm is compared with three well-known optimization algorithms the experiments and comparisons result to evaluate the quality and effectiveness of the (GWOPS)

Journal ArticleDOI
TL;DR: A broad analysis is carried on how the cognitive complexity derived based on Cognitive Information Complexity Measure (CICM) and the McCabe’s cyclomatic complexity relates and varies with the computation of the given software, resulting that the Cognitive complexity value becomes high with respective to its Cyclomatic complexity.
Abstract: The complexity of a software can be derived by using software complexity metrics which determines various software attributes quantitatively. The cognitive complexity metric, which is considering as a prominent factor of calculating the complexity of a software, evaluates how the human brain processes the given software with respective to different aspects, which involves the concept of cognitive Informatics. The McCabe’s cyclomatic complexity is currently using as a standard complexity metric to determine the software complexity in terms of the number of linear independent paths. Thus, a broad analysis is carried on how the cognitive complexity derived based on Cognitive Information Complexity Measure (CICM) and the McCabe’s cyclomatic complexity relates and varies with the computation of the given software, resulting that the cognitive complexity value becomes high with respective to its cyclomatic complexity. The cognitive complexity computation beyond the CICM value does not have a strong linear relation of the computation with cyclomatic complexity, which may be derived with a certain combination of relationships based on the factors involved within the cognitive complexity determination.

Journal ArticleDOI
TL;DR: Comparative analysis of collected soil samples in premonsoon and postmonsoon was execute for finding the influence of fertilizers in different seasons and implied that spectroscopic ground based remote sensing data based method provided great potential to analyze the soil properties.
Abstract: Soil properties assessment is critical for agricultural, environmental management. Regular soil assessment laboratory methods are very time consuming and expensive. For this work ground based remote sensing methods using spectroscopy technique was used in laboratory for soil properties assessment. Whereas spectral signature obtaining the diffused reflectance from spectroradiometer data is used. The different statistical methods are used for get the quantitative results of the acquired spectral data. By using this innovative technique comparative analysis of collected soil samples in premonsoon and postmonsoon was execute for finding the influence of fertilizers in different seasons. Soil samples are collected in context of surface and subsurface in premonsoon and post monsoon season for analyzing the influence of fertilizers on soil quality in banana and cotton crops soil. Soil properties analysis including chemical properties like nitrogen, phosphorus, potash, carbon, pH as well as physical properties like sand, silt, clay, soil organic matter (SOM), moisture were measured. The major difference is found in the availability of soil contents are higher in premonsoon season than postmonsoon season soil samples. Thus, this study implied that spectroscopic ground based remote sensing data based method provided great potential to analyze the soil properties. General Terms Comparative analysis of soil properties using remote sensing




Journal ArticleDOI
TL;DR: An efficient routing algorithm HSO-SAA for the WSN networks is proposed via examination and testing of numerous state of art routing protocols related to WSN to enhance the execution speed and energy efficiency of the conventional protocol.
Abstract: In the recent times wireless sensors network (WSN) are opted for acquiring the sensor data to improve the performance. Sleep and awake based routing is efficient way of increasing the life of networks which is restricted by power availability of sensors. But conventional sleep aware and awake based methods are relatively computationally slow. Therefore, this paper proposes a modified absolute distance measure for clustering based routing. It is proposed to enhance the execution speed and energy efficiency of the conventional protocol. Therefore, this paper proposes to design an efficient routing algorithm HSO-SAA for the WSN networks via examination and testing of numerous state of art routing protocols related to WSN. The optimum parametric selection approach is used for increasing energy efficiency of routing protocol. Various experimentations had been performed in order to evaluate the performance of proposed optimum design along with existing clustering based protocols. Performance is compared based on the network life time, alive nodes, latency as FND, and the number of packets transmitted. Overall proposed energy model is good enough to improve the energy uses of WSN.

Journal ArticleDOI
TL;DR: Two very promising alternatives for big document collections are presented: a variation of an existing KMeans-based fast clustering technique so that it can be applied in document clustering, and a hybrid clustering approach based on a customized version of the Buckshot algorithm that leads to acceptable clustering quality as well as to significant time improvements.
Abstract: Document clustering is a traditional, efficient and yet quite effective, text mining technique when we need to get a better insight of the documents of a collection that could be grouped together. The K-Means algorithm and the Hierarchical Agglomerative Clustering (HAC) algorithm are two of the most known and commonly used clustering algorithms; the former due to its low time cost and the latter due to its accuracy. However, even the use of K-Means in text clustering over large-scale collections can lead to unacceptable time costs. In this paper we first address some of the most valuable approaches for document clustering over such 'big data' (large-scale) collections. We then present two very promising alternatives: (a) a variation of an existing K-Means-based fast clustering technique (known as BigKClustering - BKC) so that it can be applied in document clustering, and (b) a hybrid clustering approach based on a customized version of the Buckshot algorithm, which first applies a hierarchical clustering procedure on a sample of the input dataset and then it uses the results as the initial centers for a K-Means based assignment of the rest of the documents, with very few iterations. We also give highly efficient adaptations of the proposed techniques in the MapReduce model which are then experimentally tested using Apache Hadoop and Spark over a real cluster environment. As it comes out of the experiments, they both lead to acceptable clustering quality as well as to significant time improvements (compared to K-Means - especially the Buckshot-based algorithm), thus constituting very promising alternatives for big document collections.

Journal ArticleDOI
TL;DR: The notions of the interior operator, the closure operator and frontier operator via D-preopen sets are given and the weak form of D-open sets in D-metric spaces are introduced.
Abstract: The purpose of this paper is to introduce and investigate weak form of D-open sets in D-metric spaces, namely D-preopen sets. The relationships among this form with the other known sets are introduced. We give the notions of the interior operator, the closure operator and frontier operator via D-preopen sets. AMS classification: Primary 54A05, 54E35.


Journal ArticleDOI
TL;DR: The proposed CNN model architecture will remediate the communication barrier of deaf people and analyze the hand gesture identically to sign language presenting the naturalness of intercommunication for deaf people.
Abstract: Hand gestures can play a notable role in computer vision, and hand gesture-based methods can stand out in providing a native way of interaction. Deafness is a degree of loss such that a person is unable to understand speech, spoken language. Sign language declined the gap in spoken language. The hand gesture is analyzed identically to sign language presenting the naturalness of intercommunication for deaf people. Real-time hand gesture recognition has been proposed in our research. Our proposed CNN model architecture will remediate the communication barrier of deaf people. The proposed model has achieved an accuracy of 94.61% to recognize 11 several different gestures using depth images.




Journal ArticleDOI
TL;DR: The study reveals that the use of key pairs improves system reliability by implementing of SHA-256 hash on the blockchain and that the most significant parameter in influencing the validity of the transaction is Value.
Abstract: Increased use of digital banking poses a risk to the security of its transactions. As result the system more vulnerable risks faced by digital banking stemmed of cyber-attacks. This study reveals blockchain technology algorithms that encrypted through RSA cryptography and SHA-256 hashes, to enhance digital banking security and reduce the risk of cyberattacks over the banking transaction. The level of blockchain data accuracy and completeness tested through the mathematics permutation method to find out which data-combination that may lead to vulnerable. However, this study is very promosing. The most significant parameter in influencing the validity of the transaction is Value with an accuracy percentage value of 88%, and then followed by Sender Address with an accuracy percentage value of 70% and the last is the Recipient Address with a percentage value. an accuracy of 62%. In other hand, the study reveals that the use of key pairs improves system reliability by implementing of SHA-256 hash on the blockchain.