Tuesday, 10 September 2019

A Survey of the Ultimate Security Solution in Opportunistic Network: Trust Management

Volume 8 Issue 2 March - May 2019

Survey Paper

A Survey of the Ultimate Security Solution in Opportunistic Network: Trust Management

Basira Yahaya*, Mohammed Bashir Muazu**, Emmanuel Adewale Adedokun***, Ime J. Umoh****
*-**** Department of Computer Engineering, Ahmadu Bello University, Zaria, Nigeria.
Yahaya, B., Muazu, M. B., Adedokun, E. A., Umoh, I. J.(2019).A Survey of the Ultimate Security Solution in Opportunistic Network: Trust Management, i-manager's Journal on Information Technology, 8(2), 40-47. https://doi.org/10.26634/jit.8.2.15716

Abstract

Opportunistic network (oppnets) is a promising paradigm, which allows communication to be set up between nodes even without infrastructure in a delay tolerant fashion. It has even become more pertinent with the proliferation of varieties of autonomous mobile devices. However, malicious devices pose potential security threats (packet dropping, eavesdropping, Denial of Service (DoS) attack, black hole attack, Identification (ID) spoofing, etc.) to the performance of oppnets, due to the inherent characteristics of such networks like ever changing network topology and lack of a definite communication path between nodes amongst others. Recent focus on mitigation mechanisms for security threats in oppnets is on trust management since various mechanisms have been used, but the trust-based methods appeared to meet up with the security requirement of the opportunistic network better. However, no work strictly present trust management extensively. This paper presents trust management together with trust related issues in oppnet (trust-based security threats, trust mechanism, and the trust management scheme as oppnet security solution). It is aimed at providing the reader a clear understanding of trust management (preferred solution) within a single literature.

Automatic Timetable Generation Using PBIL Algorithm

Volume 8 Issue 2 March - May 2019

Research Paper

Automatic Timetable Generation Using PBIL Algorithm

Marada Srinivasa Rao*, Kaki Leela Prasad**, Pilaka Anusha***
*,*** Department of Computer Science, Vignan's Institute Information Technology, Visakhapatnam, India.
** Department of Information Technology, Vignan's Institute Information Technology, Visakhapatnam, India.
Rao, M. S., Prasad, K. L., Anusha, P.(2019). Automatic Timetable Generation Using PBIL Algorithm, i-manager's Journal on Information Technology, 8(2), 31-39. https://doi.org/10.26634/jit.8.2.15514

Abstract

An Educational Institution timetable is a tentative schedule of a number of lectures and classrooms where all constraints are met. Creation of timetables is typical and time taking process. The automated computer timetable generator can save a lot of valuable time of administrators, especially who contribute their efforts for creating and managing course timetables. Every Educational Institutions are having their individual timetabling system, proprietary software, which are available in the market that may meet the needs of every Educational Institution. Therefore the authors have developed automated customized timetable generating system, which fits to any Educational Institution timetabling problem. They found a lot of problems with infinite solution space. And identifying a best optimum solution for the problem with a minimum or less performance cost is hard and difficult task. Genetic algorithm though gave a beautiful solution through its fitness evolution strategy and its principle 'the survival of the fittest', still it is costlier in performance due to its bulky iterative process and it also risks the local optima. Thus in this paper, PBIL Algorithm (Population Based Incremental Learning Algorithm) is applied to frame the best possible timetable with even load distribution taken as the optimality criteria.

An Automated Framework for Handling Distributed Social Media Data and Cognitive Attack Detection

Volume 8 Issue 2 March - May 2019

Research Paper

An Automated Framework for Handling Distributed Social Media Data and Cognitive Attack Detection

Kiranmai M. V. S. V.*, D. Haritha**
*-** Department of Computer Science, University College of Engineering, JNTUK Kakinada, India.
Kiranmai, M. V. S. V., Haritha, D. (2019) An Automated Framework for Handling Distributed Social Media Data and Cognitive Attack Detection, 8(2), 20-30. https://doi.org/10.26634/jit.8.2.16259

Abstract

Tremendous growth in the availability of social media data and its collection and storage is moving towards the big data problems. Cloud-based data centres have adopted replication control mechanisms for the data distribution strategies to handle such huge volumes of data. These methods increase the query complexity and chance of the attacks. Parallel researches demonstrated that the large scale data demands in time complexity reduction and early attack detection. Most of the attacks depend on the network and application characteristics. Online personal information tracks deep insights about how people assemble numbers, rates, and attracted towards a particular substance or channel. This information of the Internet users can be gathered easily from their daily based activities over the Internet. However, the popular social media applications such as Twitter do not primarily signify the attacks or a chance of potential attack characteristics. With the added security concerns, it has been observed that the parallel research attempts have failed to justify the time complexity. Hence, this research proposes two novel algorithms as firstly, a secure distributed large volume data query algorithm using novel secure data discovery technique and secondly, a cognitive attack detection method using data characteristics analysis by deploying machine learning method. The final outcome of the research is to build a novel automated framework to detect the data centre clusters, which are potentially under attack.

A Survey of Research Trends on University Websites' Usability Evaluation

Volume 8 Issue 2 March - May 2019

Research Paper

A Survey of Research Trends on University Websites' Usability Evaluation

Solomon A. Adepoju*, Ishaq O. Oyefolahan**, Muhammad B. Abdullahi***, Adamu A. Mohammed****
*,*** Department of Computer Science, Federal University of Technology, Minna, Nigeria.
** Department of Information and Media Technology, Federal University of Technology, Minna, Nigeria.
**** Department of Mathematics and Applied Science, Federal University of Technology, Minna, Nigeria.
Adepoju, S. A., Oyefolahan, I. O., Abdullahi, M. B., Mohammed, A. A.(2019). A Survey of Research Trends on University Websites' Usability Evaluation, i-manager's Journal on Information Technology, 8(2), 11-19. https://doi.org/10.26634/jit.8.2.15714

Abstract

Research on website usability evaluation have been growing in recent times as a result of increased internet penetration rate globally. In view of this, several efforts have been made to develop usability evaluation methods for different genre of websites. Due to its uniqueness, university websites which is a class of academic websites require further attention. This paper hence provides a brief survey of various usability evaluation methods used in university websites and with special focus on Multi Criteria Decision Making (MCDM) approaches. A total of thirty five scholarly articles were retrieved from online database from year 2000 to 2018. The review was classified based on usability evaluation methods, MCDM approaches, and automated tools. Results from the trend analysis shows that automated tools, heuristic evaluation, and user testing methods are the mostly used usability evaluation methods. MCDM approach usage in usability evaluation is also found to be on the increase as well. It is therefore recommended that more attention should be given to the usage of this methodology in the usability evaluation of this important genre of websites.

Usability Evaluation of Web Search Engines Using Navigational Query Model Examples from Library and Information Services

Volume 8 Issue 2 March - May 2019

Research Paper

Usability Evaluation of Web Search Engines Using Navigational Query Model Examples from Library and Information Services

Isaiah Michael Omame*, Fasola Petunola Abifarin**, Samuel Jimmy Udoudoh***
* Department of Reference Services, University Library, Federal University, Lafia, Nasarawa State, Nigeria.
**-*** Department of Library and Information Technology, Federal University of Technology Minna, Nigeria.
Omame, I. M., Abifarin, F. P., Udoudoh, S. J.(2019). Usability Evaluation of Web Search Engines Using Navigational Query Model Examples from Library and Information Services, i-manager's Journal on Information Technology, 8(2), 1-10. https://doi.org/10.26634/jit.8.2.16106

Abstract

This paper is on usability evaluation of web search engines using navigational query model examples from library and information services. The paper adapted laboratory experimental design in which a study population of five web search engines, namely: Ask.com, Bing, Excite, Google, and Yahoo! web search engines, were selected for the study, and twenty one master degree students from the Department of Library and Information Technology, Federal University of Technology Minna, Nigeria were recruited and trained to perform usability evaluation of the selected web search engines by submitting queries drawn from library and information services to the various web search engines and assessing/judging their performances based on the relevance of the output results. The instrument used for data collection was an observation template/form used to record the observations made by the participants. The instrument contains five queries each of which has six usability effectiveness constructs/statements developed. The study revealed that there is no significant difference in usability effectiveness between web search engines using navigational query model, i.e, overall the web search engines performed well, but at different levels of performances. Specifically, Google has the highest performance on usability effectiveness using navigational query model, as reflected in its mean score of 3.59. Yahoo! ranked second with a mean score of 3.50, the third is Ask.com which has the mean score of 3.29, followed by Bing with a mean score of 3.01, and lastly Excite which has a mean score of 2.73. Hence, it was recommended to Excite web search engine's designers to improve on their navigational query model for better performance and enhance their users' experience. This study will provide deeper understanding to search engine developers on the significance of usability performances of web search engines using navigational query models, so that they can put these into consideration when designing a web search engine.

Integrated Usability Evaluation Framework for University Websites

Volume 8 Issue 1 December - February 2019

Research Paper

Integrated Usability Evaluation Framework for University Websites

Solomon A. Adepoju*, Ishaq O. Oyefolahan**, Muhammad B. Abdullahi***, Adamu A. Mohammed****
*,***Department of Computer Science, Federal University of Technology, Minna, Nigeria.
**Department of Information and Media Technology, Federal University of Technology, Minna, Nigeria.
****Department of Mathematics and Applied Science, Federal University of Technology, Minna, Nigeria.
Adepoju, S. A., Oyefolahan, I. O., Abdullahi, M. B., Mohammed, A. A(2019) Integrated Usability Evaluation Framework For University Websites, i-manager's Journal on Information Technology, 8(1), 40-48. https://doi.org/10.26634/jit.8.1.15713

Abstract

The importance of usability of websites in this contemporary era of information communication by universities and other allied academic institutions worldwide is very crucial. This has necessitated the urge and drive for usable websites to be developed by these institutions in order to improve ease of use. However, the need to measure usability of websites effectively have also prompted many researchers to develop different usability evaluation model. Even though there are numerous research efforts in this direction, there is still no universally acceptable usability evaluation model. In this paper, a framework based on integration of a Multi Criteria Decision Making (MCDM) approach with an artificial intelligence technique is being proposed to effectively evaluate university websites usability. The criteria used are; speed, navigation, ease of use, content, accessibility, aesthetic, and security. Thus a new model incorporating fuzzy analytical processing with artificial neural network is proposed.

Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System

Volume 8 Issue 1 December - February 2019

Research Paper

Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System

Musbau Dogo Abdulrahaman *, John K. Alhassan**
*-**Department of Cyber Security Science, Federal University of Technology Minna, Nigeria.
Abdulrahaman, M.D., Alhassan, J.K.(2019) Ensemble Learning Approach for the Enhancement of Performance of Intrusion Detection System, 8(1), 29-39. https://doi.org/10.26634/jit.8.1.15717

Abstract

Due to the rapid growth in the Information and Communication Technology (ICT) infrastructures, application and services, both corporate and individuals including government now depend on cyber space for almost every day- today activity. This development has brought about the disappearance of network boundary between computers on the internet, thereby making the security of Confidentiality, Integrity and Availability (CIA) of individual's information a great concern. Intrusion Detection System (IDS) has emerged as an important component of secure network as it filters and monitors the network traffic for any anomaly or misused connection. Machine learning technique has been useful in the area of intrusion detection due to their model free properties, which makes them to learn the network pattern and identifies them as either normal or malicious (attack). However, IDS suffers some performance challenges such as low detection and high false alarm rates. The focus of this research work is to develop a novel ensemble based model by integrating Multilayer Perceptron Neural Network (MPNN) and Sequential Minimal Optimization (SMO) classifiers to enhance the performance of IDS. Kyoto 2006+ intrusion detection dataset is used to evaluate the performance of the model. The results show that the ensemble of MPNN+SMO classifier outperformed ensemble of Random Forest (RF) and Average One Dependency Estimator (AODE) in terms accuracy, detection rate, false alarm rate, and Hubert index measurement. It is concluded that combination of multiple classifiers requires serious consideration so that the weak algorithm will not weigh down the performance of the model.

Research Data Management and Information Security: Role of Library and Information Technology Service (Its) Units in Federal Universities of Technology In Nigeria

Volume 8 Issue 1 December - February 2019

Research Paper

Research Data Management and Information Security: Role of Library and Information Technology Service (Its) Units in Federal Universities of Technology In Nigeria

Fatimah Jibril Abduldayan*, Fasola Petunola Abifarin**, Georgina Uchey Oyedum***, Jibril Attahiru Alhassan****
*Lecturer, Department of Library and Information Technology, Federal University of Technology, Minna, Nigeria.
**,****Associate Professor, Department of Library and Information Technology, Federal University of Technology, Minna, Nigeria.
***Professor, Department of Library and Information Technology, Federal University of Technology, Minna, Nigeria.
Abduldayan, F. J., Abifarin, F. P., Oyedum, G. U., Alhassan, J. A(2019). Research Data Management And Information Security: Role Of Library And Information Technology Service (Its) Units In Federal Universities Of Technology In Nigeria, i-manager's Journal on Information Technology, 8(1), 20-28. https://doi.org/10.26634/jit.8.1.15712

Abstract

This exploratory study presents how information security affects research data management in all the Federal Universities of Technology (FUTs) in Nigeria. These FUTs in Nigeria are: The Federal University of Technology, Minna; Federal University of Technology, Akure; Federal University of Technology, Owerri; Modibbo Adama University of Technology, Yola; and Abubakar Tafawa Balewa University, Bauchi. Lack of trust in the available security systems and safety procedures guiding the Institutional Repositories (IR) have been identified as perceived impediment to depositing intellectual outputs and the underlying research data by researchers. The consequence of this is poor patronage of the IR and low content of repositories of FUTs in Nigeria. The objective of this study was therefore to identify the available support systems in the Libraries and Information Technology Service (ITS) Units of FUTs in Nigeria. The study used oral face-to-face semistructured interview method conducted on five university librarians and five heads of ITS Units of FUTs in Nigeria, who are responsible for the development and management of institutional repositories and are also stakeholders in effective research data management. For the data transcription and analysis, this study adopted the Braun and Clarke (2006) thematic analysis approach, which involve a six-phase of qualitative data analysis. Findings of the study confirmed that hacking, as a cyber threat, still pose a great threat to intellectual output and research data deposited in the IR of FUTs in Nigeria. The study recommended the need for continued capacity building to improve the cyber security skills and data management skills of ITS staff and librarians, respectively.

Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria

Volume 8 Issue 1 December - February 2019

Research Paper

Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria

Oluwafemi Osho*, Benjamin M. O. Eneche**
*-**Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria.
Osho, O., Eneche, B. M. O. (2019) Market Dealers or Perpetrators of Cybercrimes? Investigating Cybercriminal Activities in Information Technology Markets in Nigeria, 8(1), 11-19. https://doi.org/10.26634/jit.8.1.15715

Abstract

This study explores the roles of IT markets in the promotion and proliferation of cybercrimes in Nigeria. Essentially, it seeks to identify cybercriminal activities perpetrated within the physical confines of markets of Information Technology (IT) products and services, assess the perception of dealers in these markets of the illegality of the cybercrimes, and identify factors that influence perpetrators at the markets to engage in criminal behaviours. Considering a mini size IT market in Minna, Niger State, Nigeria, it adopts the use of observation, disguised participation, questionnaire, and unstructured interview to collate relevant data. Findings reveal that content- and copyright-related offences, including illegal activities, such as sale of pre-registered SIM cards, cracking of Internet modems and distribution of cracked modems, and distribution of pirated software, games, music and videos, were perpetrated at the market. Most respondents agreed or strongly agreed the identified cybercrimes were illegal. The factors that influenced perpetrators centered primarily on economic gains.

Design and Implementation of a Computer-Based Visitors’ Record Management System for Niger State House of Assembly Complex, Minna

Volume 8 Issue 1 December - February 2019

Research Paper

Design and Implementation of a Computer-Based Visitors’ Record Management System for Niger State House of Assembly Complex, Minna

Isaiah Michael Omame*, Solomon Anibe Tijani**
*Department of Multimedia Services, University Library, Federal University, Lafia, Nigeria.
**Department of Computer Science , Southwestern University Lagos, Nigeria.
Omame,I.M., Tijani,S.A.(2019). Design and Implementation of a Computer-Based Visitors’ Record Management System for Niger State House of Assembly Complex, Minna, i-manager's Journal on Information Technology, 8(1), 1-10. https://doi.org/10.26634/jit.8.1.15711

Abstract

Records are pieces of information created or received by an organization or business establishment that provides evidences of business decisions or transactions. Record management is a vital part of any organization including the daily records of visitors in the organization. Types of records include vital and non-vital records, essential and nonessential records, active and non-active records, etc. Some of these categories of records are needed almost immediately to resume back the running and operation of an organization in case of an emergency, thus, they should be securely stored and managed. Interestingly, these records could be stored in paper-based format or in a computer based system. This research work is focused on the design and implementation of a computer-based visitors' records management system for Niger State House of Assembly Complex, Minna. It is a software application designed using JAVA programming language and MySQL database at the back end, used for storing visitors' information. The software handles all necessary operations regarding visitors' check-in and check-out in the Niger State House of Assembly Complex. Furthermore, the receptionist can capture visitors' bio-data, such as: name, gender, email, phone number(s), address, fingerprint data, and an instant picture snapshot with a digital camera. It also incorporates features of generating security reports and statistics for crime investigation, as a means of providing security for lives and properties of the members/staff of the house of Niger state house of assembly complex, Minna, as well as adequately managing the visitors' records for posterity.

Monday, 9 September 2019

Context Information Device Enriched Architecture for Context Computing

Volume 7 Issue 4 September - November 2018

Research Paper

Context Information Device Enriched Architecture for Context Computing

G. K. Mohan Devarakonda*, Y. K. Sundara Krishna**
* Research Scholar and Academic Consultant, Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India.
** Professor, Department of Computer Science, Krishna University, Machilipatnam, Andhra Pradesh, India..
Devarakonda, M. G. K., KRISHNA, S. Y. K. (2018) Context Information Device Enriched Architecture for Context Computing,i-manager's Journal on Information Technology, 7(4), 37-42. https://doi.org/10.26634/jit.7.4.15075

Abstract

With the increased use of smartphone devices, the business domains are fetching new ways to promote their services. One such business model of computing is to locate the customer through his geographical coordinates and providing the service accordingly, which is termed as context computing or context aware computing or location based service (Payton, Roman, & Julien, 2004). However, the business domains are concentrating on the service point of view, but not on the user choice of required service. For example, a user when moving in a medical emergency may not be able to find out the right hospital based on his type of emergency because hospitals may be of different specialities. In earlier types of context awareness applications, location of user at any particular point of time is termed as the context. This paper redefines the context not only as user location at any particular point of time, but also the user’s state of mind and choice of required service as the context and concentrates more on the services from the user’s point of view. Concentration on the user requirement and customization of services is also a key point in the business, which increases the market substantially. This paper proposes a new approach for context based computing that enables the user to avail services based on his requirement. This paper also proposes a methodology and architecture to provide context aware services to the user in a customizable manner so that the user can specify his requirements more clearly and avail the service that suits his requirement. This approach helps smaller markets to grow more and larger markets to increase further.

Designing of Wireless Sensor Network to Protect Agricultural Farm from Wild Animals

Volume 7 Issue 4 September - November 2018

Research Paper

Designing of Wireless Sensor Network to Protect Agricultural Farm from Wild Animals

Prashant V. Mane-Deshmukh*
* Assistant Professor, Department of Electronics, Jayawantrao Sawant College of Commerce and Science, Hadapsar, Pune, Maharashtra, India.
Mane-Deshmukh, P. V.(2018)Designing of Wireless Sensor Network to Protect Agricultural farm from wild Animals, i-manager's Journal on Information Technology, 7(4), 30-36. https://doi.org/10.26634/jit.7.4.14505

Abstract

Nowadays, the agricultural sector demands innovative technology to enhance the quality of agricultural products as well as to protect the same. New technologies such as Wireless Sensor Network are widely utilized in this sector for drip irrigation, soil parameter monitoring, green house control, etc. However, on a survey it is found that the agricultural land protection is one of the challenging tasks. Considering such fact it is proposed to design a wireless sensor network to protect agricultural land. The wireless sensor network is the most suitable technology to overcome traditional systems, save time of human being. The wireless network is designed to ensure real time patrolling at the border of agricultural farm and presented in this paper. For present research work, embedded technology based on sensor node have been designed by deploying advance microcontroller PIC 18F4550. The nodes are used to identify the movement of the wild animals crossing in to the border and monitor the activity occurred at border of agricultural land. Moreover, the sensor node is equipped with the IEEE 802.15.4 standard based RF module for wireless communication. The WSN collects information of the wild animals trying to enter into the cultivated crops and the same is disseminated towards the base station located at farmhouse. Moreover, it creates an irritating sound for animals to run away from the typical area. The developed smart graphical user interface helps the farmer to find correct location of the wild animals’ movement. From the database, the farmers can immediate take action for protection of crops.

The Insights of Mobile Augmented Reality Applications on Humans Performing the Task of Order Picking

Volume 7 Issue 4 September - November 2018

Research Paper

The Insights of Mobile Augmented Reality Applications on Humans Performing the Task of Order Picking

Tom Page*, Gisli Thorsteinsson**
*Associate Professor, Department of Product Design, Nottingham Trent University, England.
**Professor, Department of Design and Craft Education, University of Iceland, Iceland.
Page, T., Thorsteinsson , G.(2018). The Insights of Mobile Augmented Reality Applications on Humans Performing the Task of Order Picking, i-manager's Journal on Information Technology, 7(4), 16-29. https://doi.org/10.26634/jit.7.4.14697

Abstract

Augmented Reality (AR) is a technology that overlays specific objects on a camera with virtual images, graphics, and communication. This paper presents series of secondary sources with a wide range of subjects connected to this topic. These include order picking as logistical problem, different views on the implementation of augmented reality, and previous experiments using augmented reality to solve logistical problems. This paper investigates the results from an observational experiment created by the author. This experiment involves a range of participants searching for specific books on a library shelf, once with the aid of a mobile AR application and once without. Participants are then asked a series of questions about their experiences with the AR application and to give their own personal comments. The times, feedback, and observations from the participants are correlated with previous theories and experiments using AR in a library to provide insights to research questions.

Social Media Impacts and Security Issue on Data

Volume 7 Issue 4 September - November 2018

Article

Social Media Impacts and Security Issue on Data

Tella Prameela*, Tejasree Samakoti**
*Assistant Professor, Computer Science and Engineering, Siddartha Educational Academy Group of Institutions, Tirupathi, Chittoor(Dist), Andhra Pradesh, India.
**Assistant Professor, Computer Science and Engineering VEMU Institute of Technology, P.Kothakota, Chittoor(Dist), Andhra Pradesh, India.
Prameela, T., Samakoti , T.(2018) Social Media Impacts and Security Issue on Data, i-manager's Journal on Information Technology, 7(4), 11-15. https://doi.org/10.26634/jit.7.4.14574

Abstract

In this world everyone is interested in Social Media. There are so many advantages and disadvantages on using social media in political, educational, entertainment, etc, areas. Here the main concern is Social Media users to be aware of what is going on in a day-to-day life. There is no wrong in updating their views professionally or personally, but one should be careful in using Social Media. Social media platforms like Facebook, Twitter, Whatsapp, etc., companies also give a support for protecting the users' data. In this paper, the authors have discussed the impact of social media in all sectors, how the social media influence the users, and also explained the real time issue done in America Elections, and finally provides idea on how to overcome data leakage in social media users.

Analysis of Key Dynamics of Software Piracy in Sub-Saharan Africa

Volume 7 Issue 4 September - November 2018

Article

Analysis of Key Dynamics of Software Piracy in Sub-Saharan Africa

Mboungou Mouyabi Seke*
*University of the Witwatersrand, Johannesburg, South Africa.
Mouyabi seke, M.(2018). Analysis of Key dynamics of software piracy in Sub-Saharan Africa, i-manager's Journal on Information Technology, 7(4), 1-10 https://doi.org/10.26634/jit.7.4.15071

Abstract

Since Africa faces a growing pressure of Information and Communication Technology (ICT) adoption in the light of commercial investments, one of the predicaments the continent still struggles with is a lucrative "business" that has caught the attention of organized crime groups in a number of countries. This profitable business called software piracy is by definition one of the most common types of computer crimes. Its exact impact is hard to quantify, but there is no doubt that this trend has been increasing everywhere in the world. However, Africa is the continent that counts several developing countries that are not presently operating service economies; consequently, there is no shame concomitant with downloading, purchasing, or selling pirated software products. Thus far, there are many reasons provided by various knowledge bases to why software piracy happens; this paper, however discussed four causal factors of software piracy in the Sub-Saharan Africa. It emphasises on their dynamics identified to be crucial in encouraging this sordid behaviour in this particular sub-region of the globe. In addition, this paper argues the major issues surrounding this topic and suggests a way forward towards an anti-piracy continent.

A Comprehensive Review and Efficient Implementation of Privacy-Preserving Associative Classification

Volume 7 Issue 3 June - August 2018

Review Paper

A Comprehensive Review and Efficient Implementation of Privacy-Preserving Associative Classification

Darshana H. Patel*, Avani R. Vasant**, Saurabh Shah***
* Head and Assistant Professor, Department of Information Technology, V. V. P. Engineering College, Gujarat, India.
** Professor and Head, Department of Computer Science and Engineering, Babaria Institute of Technology, Gujarat, India.
*** Director and Professor, Department of Computer Engineering, C.U. Shah University, Wadhwan, Gujarat, India.
Patel,D.H., Avsant,A.R., and Shah,S.(2018). A Comprehensive Review and Efficient Implementation of Privacy-Preserving Associative Classification. i-manager’s Journal on Information Technology, 7(3), 45-52. https://doi.org/10.26634/jit.7.3.14406

Abstract

The enormous development in Information and Communications technology had increased the requirement for digital data to be stock up and communal securely. This immense quantity of data, if publicly available, can be employed for growth and development. However, data in its raw form comprises of sensitive information and advances in data mining techniques have increased the breach of privacy or confidential data. As a consequence, a field of privacy-preserving data mining emerged which deals with efficient conduction and application of data mining functionalities without scarifying the privacy of the data. Nevertheless, data should be mined before preserving privacy and amongst various techniques of data mining, associative classification is favorable for classification purpose. This paper focuses on the study of Associative Classification techniques in addition to privacy preserving techniques along with its pros and cons. In addition, related study of privacy preserving associative classification has been presented with an aim of prolific delve in this area. Furthermore, privacy preserving association classification has been implemented utilizing various datasets considering the accuracy parameter and it has been concluded that as privacy increases, accuracy gets degraded due to data transformation.

Classification of User Opinion using Sentiment Analysis

Volume 7 Issue 3 June - August 2018

Research Paper

Classification of User Opinion using Sentiment Analysis

Anil Vasoya*, Raj Desai**, Sangita Padshala***, Shraddha Paghdar****
* Assistant Professor, Department of Information Technology, Thakur College of Engineering and Technology, Mumbai, Maharashtra, India.
**-**** BE Graduate, Department of Information Technology, Thakur College of Engineering and Technology, Mumbai, Maharashtra, India.
Vasoya,A., Desai,R., Padshala,S., & Paghdar,S. (2018). Classification of User Opinion Using Sentiment Analysis. i-manager’s Journal on Information Technology, 7(3), 36-44. https://doi.org/10.26634/jit.7.3.14514

Abstract

E-commerce is a widely increasing business in the world with increasing revenues every year by manifold times. However, multiple e-commerce websites have same products and it becomes difficult for the user to select the product from the best e-commerce website as the reviews for each product are more in number. It is difficult for the user to go through these reviews as they are in large number and its time consuming. The machine learning tools and techniques such as classification have now made it easy and simple to process text datasets and find insights from it. In this paper, a simple text mining and processing approach is illustrated, and the sample dataset of product reviews are used from Amazon. For the classification model, a probabilistic based classifier model called Naïve Bayes is used, which will classify the user reviews in three categories, such as positive, neutral, and negative reviews. This will help to analyse the sentiments of the users who have already purchased the product and will help the customer. The final output will consist of overall review and rating of the product which will help the user to get a clear knowledge about the product and whether to make a purchase call or not. By applying the Naïve Bayes technique, the user reviews are classified successfully giving an accuracy of 72.46%.

IoT and Cloud Based Vehicle Toll Collection System

Volume 7 Issue 3 June - August 2018

Research Paper

IoT and Cloud Based Vehicle Toll Collection System

Neha Kapadia*
Assistant Professor, Department of Information Technology, Thakur College of Engineering and Technology, Mumbai, Maharashtra, India.
Kapadia,N.(2018). IoT and Cloud Based Vehicle Toll Collection System. i-manager’s Journal on Information Technology, 7(3), 30-35. https://doi.org/10.26634/jit.7.3.14519

Abstract

The most common approach for collecting tolls was to have the driver stop and to pay for toll collector sitting in a tollbooth. However, it is now viewed as toll collection process, this is unfeasible principally due to its adverse impact on traffic flow and its high collection costs, not to mention its effects on the environment. Different problems associated with traditional toll collection methods urged sophistication in the approach. After progressive developments resulting mostly from flawed strategies,“Electronic” Toll Collection (ETC) systems proved to suitably deal with the shortcomings. Though many different ETC schemes are in operation across the globe, the fundamental is to be able to automate vehicle identification and assess the tolls requiring no action by the driver. This research was, therefore, focused on studying the varied approaches to electronic tolling while working towards a feasible solution. The approach adopted for implementing the prototype employed Radio Frequency Identification (RFID). The basic idea was to work with RFID chips affixed at a corner of the vehicle's windshield. As the vehicle would pass through the toll junction, the chip would be scanned by RFID readers calibrated to the same frequency as the chips, mounted on either end, and an ID, unique to each chip, would be sent to the server via an on-board WiFi module. This ID would be used as an index to look up the database, fetch the associated user's details, and assess the toll accordingly. The user would also be notified of the transaction via SMS and/or email. This would allow speedy passage of vehicles eliminating the heavy congestion. As an added benefit, this would also eliminate the need for traditional book keeping by permitting authorized personnel to access daily logs anywhere, anytime. This would mean centralized control, improved audit, vehicle tracking, and more. An online portal was also provisioned, allowing users to register themselves, to check their billing history, choose appropriate payment methods, to recharge their accounts or pay their dues.

Neural Networks Application for Detecting Heart Disease

Volume 7 Issue 3 June - August 2018

Research Paper

Neural Networks Application for Detecting Heart Disease

Chaitanya Roygaga*, Suraj Punjabi**, Swapnil Sampat***, Tanuja K. Sarode****
*-*** BE Graduate, Department of Computer Engineering, Thadomal Shahani Engineering College, Mumbai, India.
** Professor and Head, Department of Computer Engineering, Thadomal Shahani Engineering College, Mumbai, India
Roygaga, C., Punjabi, S. Sampat, S., and Sarode, T. K. (2018). Diagnosis of Heart Disease Using Neural Networks. i-manager’s Journal on Information Technology, 7(3), 24-29. https://doi.org/10.26634/jit.7.3.14409

Abstract

Heart diseases have been the cause of frequent deaths. It is difficult to diagnose heart problems at every medical centre because of lack of technology and the cost to afford it. This problem has been increasing majorly in rural areas. That is why it is very important to develop an affordable and reliable technology. Artificial Neural Networks (ANNs) is intended towards developing such an intelligent system, which can diagnose whether a patient is suffering from a heart disease or not. The dataset is acquired from the UCI Machine Learning Repository. The training dataset was fed into the network. Error Back Propagation algorithm is the learning network used in the analysis. Artificial Neural Network (ANN) is used to classify and distinguish between absence and presence of disease. The performance measure taken into consideration is accuracy. The targets for the neural network have been classified as 0's (Disease is absent) and 1's (Disease is present). The results obtained from back propagation algorithm using varying number of neurons in hidden layer have been compared in this research work. This system has given the best accuracy (at 80.27%) of diagnosing heart disease when the neurons in the hidden layer are kept at four, with high sensitivity and specificity value. This system provides an efficient application of neural networks for detecting heart diseases.

Video Processing in Visual System for Color Detection for People with Tritanopia

Volume 7 Issue 3 June - August 2018Research Paper

Video Processing in Visual System for Color Detection for People with Tritanopia

Nazneen A. Pendhari*, Raghavendra R. Sedamkar**
* Assistant Professor, Department of Computer Engineering, M.H. Saboo Siddik College of Engineering, Mumbai, Maharashtra, India.
** Professor and Academic Dean, Department of Computer Engineering, Thakur College of Engineering and Technology, Mumbai, India.
Pendhari.N.A., & Sedamkar,R.R. (2018). Video Processing In Visual System for Color Detection for People with Tritanopia. i-manager’s Journal on Information Technology, 7(3), 17-23. https://doi.org/10.26634/jit.7.3.14517

Abstract

Video re-coloring and wavelength adjustment algorithm that have been performed for the anomalous Trichromats subtype Tritanomaly is presented in this paper. A method to handle the weaknesses faced by the anomalous Trichromacy was proposed and finally an interface is built that will bridge the gap for the color blind to view visual media without any hindrance. The RGB to LMS theory has been utilized for the required purpose. The detailed study about the RGB to LMS theory with respect to the required equations and pseudo code pertaining to the type Tritanomaly, i.e. Blue-Yellow weakness has been proposed to be done here using color Compensation Algorithm. Certain merits include Easy Detection, RGB to LMS Mapping, and Mapping of Frames to Easy Access of Videos.

Image Search by comparing Gabor filter with SVM and SIFT

Volume 7 Issue 3 June - August 2018

Research Paper

Image Search by comparing Gabor filter with SVM and SIFT

Suman S. Bhujbal*, Shubhangi R. Patil**
* PG Scholar, Department of Computer Engineering, A.C. Patil College of Engineering, Kharghar, Maharashtra, India.
** Assistant Professor, Department of Computer Engineering, A.C. Patil College of Engineering, Kharghar, Maharashtra, India.
Bhujbal,S.S., and Patil,S.R.(2018). Image Search by Comparing Gabor Filter With SVM and SIFT. i-manager’s Journal on Information Technology, 7(3), 10-16. https://doi.org/10.26634/jit.7.3.14403

Abstract

Social image search is becoming popular day by day, lots of research is going on in Image search systems. Some image searching technique matches only textual or visual features of image for searching. Many Image searching methods combine visual features and textual feature of image for better performance. Hypergraph Learning Technique finds more relevant image. Some image search algorithms make use of SIFT features. This paper shows that, the results of Gabor with SVM have better results than SIFT.

A Novel Encryption Scheme to Seucre the Data Using DNA Based Play Fair Cipher Technique

Volume 7 Issue 3 June - August 2018

Research Paper

A Novel Encryption Scheme to Seucre the Data Using DNA Based Play Fair Cipher Technique

R. Kiran Kumar*, P. Bharathi Devi**
* Assistant Professor, Department of Computer Science, Krishna University, Andhra Pradesh, India.
** Research Scholar, Department of Computer Science, Krishna University, Andhra Pradesh, India.
Kumar,R.R., and Devi,P.B.(2018).A Novel Encryption Scheme to Secure the Data Using DNA Based Play Fair Cipher Technique. i-manager’s Journal on Information Technology, 7(3), 1-9. https://doi.org/10.26634/jit.7.3.14398

Abstract

DNA cryptography is one of the cryptographic techniques in which DNA is used to store and transmit the information. With the strange arrangement of information in DNA sequences, it is possible to implement data security efficiently. Though a lot of research is done and many algorithms have been developed for hiding the data, DNA sequences based data encryption seems to be an efficient approach for satisfying the present information security needs. In this paper, the traditional Playfair cipher to DNA Cryptography is applied. The key matrix of traditional matrix contains the 25 alphabets of the total 26-alphabets in a 5x5 key matrix based on the secret key. In the present paper, the key matrix uses 64 DNA codons by arranging them into 8x8 matrix so that the security is enhanced. The encryption technique has been modified, but at the same time retains some of the basic rules of the classical Playfair Algorithm. Playfair technique is modified by arranging the DNA Codons into 8x8 matrix to eliminate its limitations and enhance its security features. The proposed algorithm is efficient as it contains a LOOKUP table, which contains 64 values (A..Z,a..z,0..9, ,.) And the LOOKUP table is randomly arranged for each transmission. The proposed method is implemented and also compared with other popular ciphers on the basis of Time Complexity. The main objective of this paper is to provide a security system which uses DNA as a media.

A Comparative study of Secure Index Based on Context Based Fertility for Ranked Search over Encrypted Data

Volume 7 Issue 2 March - May 2018

Survey Paper

A Comparative study of Secure Index Based on Context Based Fertility for Ranked Search over Encrypted Data

A. Hema Latha*, A. Natasha**, Vijay Kumar.G***, Diana Moses****, M. Kamala*****
*-*** UG Scholar, Department of Computer Science and Engineering, St. Peter's Engineering College, Hyderabad,Telangana, India.
****-***** Assistant Professor, Department of Computer Science and Engineering, St. Peter's Engineering College, Hyderabad, Telangana, India.
Latha,A.H., Natasha,A., Kumar,G.V. , Moses,M., and Kamala,M. (2018). A Comparative Study of Secure Index Based on Context Based Fertility for Ranked Search Overencrypted Data. i-manager’s Journal on Information Technology, 7(2), 44-50. https://doi.org/10.26634/jit.7.2.14646

Abstract

A comparative study of secure index based on Context Based Fertility (CBF) for ranked search over encrypted data is performed in this paper. In daily requirement, there is an increasing in need for secure searched encrypted data in cloud computing. This paper mainly provides an approach to overcome the attacks and challenges that are occurred in the process of encryption by mentioning various methodologies proposed till date. In accordance with the frequent updating of technology in today's world, the secure index based on CBF for ranked search over encrypted data with few goals like Multiple Ranked Keywords Search, Guaranteed Security, Data Confidentiality, Indexed Privacy, Keyword Privacy and Efficiency faces many challenges in fulfilling their goals.

A Novel Hybrid Security Algorithm

Volume 7 Issue 2 March - May 2018

Research Paper

A Novel Hybrid Security Algorithm

Manisha Kumari *, Deeksha Ekka **, Nishi Yadav ***
*-** UG Scholar, Department of Computer Science and Engineering, Guru Ghasidas University, Bilaspur, Chhattisgarh, India.
*** Assistant Professor, Department of Computer Science and Engineering, Guru Ghasidas University, Bilaspur, Chhattisgarh, India.
Kumari,M., Ekka,D., and Yadav,N. (2018). A Novel Hybrid Security Algorithm. i-manager’s Journal on Information Technology, 7(2), 37-43. https://doi.org/10.26634/jit.7.2.14651

Abstract

A New Novel Hybrid Security Algorithm (NHSA) for Rivest-Shamir-Adleman (RSA) cryptosystem was proposed in this paper, which is based on Encryption algorithm using Dual Modulus and Enhanced method for RSA (ERSA) cryptosystem. Here, the computation of public keys and private keys depends on modulus values, each computed using three different prime integers. Thus complexity involved in factorizing the modulus value increases. It improves the security of RSA scheme against Brute Force Attack using double mod operation based encryption and decryption. Therefore, it is not possible to retrieve the original message for the cipher text even after determining a single public key. Also it is difficult to factorize the modulus value into its three prime factors. Thus it enhances the security of encrypted data two times. In this paper, the proposed algorithm is compared with “Encryption algorithm using dual modulus” in terms of key generation time and security of data.