Journal of information technology

Top PDF Journal of information technology:

Bibliometric Analysis Of Desidoc Journal Of Library And Information Technology For The Year 2010-2014

Bibliometric Analysis Of Desidoc Journal Of Library And Information Technology For The Year 2010-2014

DESIDOC Journal of Library & Information Technology was used as a source journal. The data for the study was downloaded from the website of DESIDOC journal (http://publications. drdo. gov.i n/ojs/ index.php/djlit) for 5 years from volume 30 (2010) to volume 34 (2014). The data consists of year of publication with its volume number, name of the author with their geographical location, total count of authors, and number of references cited by the article were collected. Data was analyzed to meet the objectives mentioned above.

8 Read more

Productivity Patterns of Authors in DESIDOC Journal of Library and Information Technology: A bibliometric Approach

Productivity Patterns of Authors in DESIDOC Journal of Library and Information Technology: A bibliometric Approach

headquarters, and its various laboratories at various places in India and also various publications as Defence Science Journal (Bi-Monthly), Defence Life Science Journal, DESIDOC Journal of Library and Information Technology (Bi-Monthly), DRDO Newsletter (Monthly), DRDO Samachar and Hindi Video Magazine(Monthly), Technology Focus (Bi-Monthly), ProdyogikiVishesh (Quarterly) and CRYSTAL : Technical Bulletin of SSPL (Bi-Annual). DESIDOC Journal of Library & Information Technology ( DJLIT ) is a peer-reviewed, open access, bi-monthly journal that publishes original research and review papers related to IT applied to library activities, services, and products and Itscovered include automation, digitisation, user interfaces, networks, hardware and software development, and technology. It was formerly known as DESIDOC Bulletin of Information Technology ( DBIT ).

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

The acoustic biometrics technology provides a higher level of safety than other solutions because biometrics relies on more than one physical property. Sound biometrics engines take into account sound behavior, what is being said, and countless audio features[3], [4]. These features are measured indirectly, given the data that is generated by the factors of how you speak, but are not exclusive to these physical properties. The information provided by these features is hidden by voice. The task of acoustic biometrics is to try to match recording samples that also contain that hidden information with experimental models containing the information. In addition, there are things that you can change around your voice and things that you cannot change[5], [6]. For example, you cannot change the length of the vocal paths, the basic frequency of your voice, etc., but you can change the pitch, accent, speed, and speed. These traits that you can change are what humans use to recognize and identify sounds, which also depend on inherent and insincere contributors [7], [8], [9].

9 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

In VANETs, the main aim of the routing protocols is to increase the packet delivery ratio and decrease the end to end delay. Each vehicle in the network is equipped with GPS to obtain its location information. Every vehicle knows its own coordinates. The source vehicle packets its own position into beacon message so that the neighboring vehicles forward packets to the destination according to the beacon message. In a fixed time interval, each vehicle exchanges the information of the neighboring vehicles and updates the neighbor list tables by beacon messages. Here, the neighboring vehicle means the one-hop neighbor. The packet delivery ratio and end to end delay depend upon the beacon interval. If the beacon interval is low then the redundancy increases leading to high end to end delay although it might increase the PDR a bit. On the other hand to decrease the end to end delay if beacon interval is kept high the PDR decreases. The beacon interval is decided on the basis of the environment in which the vehicle is, whether it is in city environment or the highway environment. In the city scenario the density of the vehicles is quite high and in case of the highway scenario the density of vehicle is quite less. The current routing protocols can’t sense the changing scenarios so also can’t adapt to them. As result it might lead to packet dropping, increasing end to end delay, decreasing PDR. To overcome these problems we have proposed a new protocol that will adapt itself to changing road environments. In addition to the position, velocity and direction attributes of the beacon message, two addition variables will be used. In order to incorporate the past behavior of a node into relay node selection criteria to increase the probability of message delivery, a new parameter is added i.e. connection reliability. This will be predicted on the basis of the speed variations of the vehicle. To minimize the chances of packet dropping resulting from the movement of the chosen node outside the relay node’s transmission range another parameter is introduced i.e. distance factor.

6 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Intrusion detection allows organizations to protect their systems from the threats that come with increasing network connectivity and reliance on information systems. Give the level and nature of modern network security threats, the question for security professionals should not be whether to use intrusion detection, but which intrusion detection features and capabilities to use. IDSs have gained acceptance as a necessary addition to every organization’s security infrastructure. Despite the documented contributions intrusion detection technologies make to system security, in many organizations one must still justify the acquisition of IDSs. There are several compelling reasons to acquire and use IDSs:

9 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

The model based scheme consists of three important modules. The anticipator uses the active models and the scenario models to try to predict the next step in the scenario that is expected to occur. A scenario model is a knowledge base with specifications of intrusion scenarios. The planner than translates this hypothesis into a format that shows the behavior, as it would occur in the audit trail. It uses the predicted information to plan what to search for next. The interpreter then searches for this data in the audit trail. The system proceeds this way, accumulating more and more evidence for an intrusion attempt until a threshold is crossed; at this point, it signals an intrusion attempt.

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Object position is a popular retrieval task in various applications. In relational databases, we rank tuples using an aggregate score function on their attribute values. For example, a real estate agency maintains a database that contains information of flats available for rent. A potential customer wishes to view the top- 10 flats with the largest sizes and lowest prices. In this case, the score of each flat is expressed by the sum of two qualities: size and price, after normalization to the domain [0,1] (e.g., 1 means the largest size and the lowest price). In spatial databases, position is often associated to nearest neighbor (NN) retrieval. Given a query location, we are interested in retrieving the set of nearest objects to it that qualify a condition (e.g., restaurants). Assuming that the set of interesting objects is indexed by an R-tree, we can apply distance bounds and traverse the index in a branch-and-bound fashion to obtain the answer.

13 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

In proactive schemes, also known as Table-driven approaches, every node continuously maintains the complete routing information of the network. When a node needs to forward a packet, the route is readily available; thus there is no delay in searching for a route. However, for a highly dynamic topology, the proactive schemes spend a significant amount of scarce wireless resource in keeping the complete routing information correct. E.g. Distance Vector Routing, Link State Routing.

7 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

The study of thermoelastic states of structures and their elements is an urgent problem of mathematical modeling. One of the main trends in the development of modern technology is the widespread use for the manufacture of various designs of composite materials consisting of structural components with various thermo- mechanical properties. The effectiveness of design solutions largely depends on the correct consideration of the thermo-mechanical behavior of the composite material under thermo-mechanical loads.

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract: Language is core medium of communication and translation is core tool for the understand the information in unknown language. Machine translation helps the people to understand the information of unknown language without the help of Human translator. This study is brief introduction to machine Translation and the solution for homographs. machine translation have been developed for many popular languages and many researches and developments have been applied to those languages but a significant problem in Persian (the language of Iranian, Afghani, etc.) is detecting the homographs which is not generally problematic in any other languages except Arabic. Detection of homographs in Arabic have been extensively studied. However Persian and Arabic share 28 characters, having only 4 different characters, they are two quite different languages. Homographs, words with same spelling and different translations are more problematic to detect in Persian because not all the pronounced vowels are written in the text (only 20% of vowels are written in the text) so the number of homographs in Persian is about thousands of times more than in other languages except Arabic.

42 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract— Attendance is a data collection activity to find out the presence of students in a class or an event. This is an important process throughout the teaching and learning process. One of them is supporting decisions for the school whether students can take the exam where attendance is the main requirement. Of course for parents is also an important thing to know the presence of their children in the learning process while in school. Currently attendance is being done manually by the teacher and it also has many disadvantages. One of them is invalid information when the data has been entered is incorrect. Another disadvantage of manual system is loss or damage of existing data and lack of efficiency and effectiveness in the process because attendance must be done at each turn of the lesson. From these problems raises an idea to create an Android based mobile application, it can take attendance automatically and can be monitored by school and parents. In addition, the teachers can review students at the end of each lesson and it can also make online reports that can be seen by parents. Supported by the availability of internet networks and GPS , this application can be used as a media controller and monitoring of students themselves. Utilize the React- Native technology as a tool to make this application and the methodology used in this application is Waterfall. With this application it can make easier for students, teachers and parents in the learning process at school.

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract - PT Rumah Sakit Mary Cileungsi Hijau as a big company providing health care and had many employee’s. Those employee’s data had to well organized. Calculating and controlling the schedule working which is divided 24 hours each day. Efectivity and efficiency time schedule in payroll unit is question abled if not supported by an information system which is can control the schedule perfectly.Applying the quality and centered information system hopefully can support efficiency and efffectivity employee's working time schedule and can give an accurate information administration employee’s data for the leader to control hospital operation. One of company effort to support that goals is implementing the good computerized system, which is can give fast and accurate information.

13 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

As an effort made to this research, to identify the methods that have been done. In order to know the application of methods created by others approaching this research. So here are some studies that are close to the research that will be discussed. The results of M. A. Sudarsono and Krisnawati showed that to design and build Android Based Applications required some software and hardware, starting from system analysis to design the process of this application [5]. Research A. Putranto explained based on the SWOT matrix, Regina Pacis High School Bogor can use the strengths to obtain opportunities. The way that can be done by SMU Regina Pacis Bogor, among others: make improving the competence of students and teachers by using existing facilities and technology; developing innovative learning methods by utilizing existing information technology channels (e- learning) and improving the quality of learning for students and teachers obtained from the technology channel [6]. Other research Y. Astuti and D. I. Fahmasari Pinter Java website provides feature article posting for member Pinter Java website that can be used to exchange information about Java Culture, and So people who will learn Javanese culture do not need to come directly to the island of Java [7]. From the previous research that has been described then it is necessary to develop to design sales applications in the analysis with SWOT, that is by adding feature product ranking into application design.

13 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

Abstract— Today rapid development in Information Technology field and new applications being developed constantly to support critical businesses all over the world and also various key fields like environment studies, Medicine, Research and other sciences, making it an indispensable part of our lives. Computations across and over Internet has become order of day. Internet of things is an emerging topic of technical, social and economic significance. With IPV6 addressing in place, every possible consumer product, durable goods, cars and trucks, Industrial and utility components, sensors and other everyday object can become part of Internet. Data Analytics is the driving force running these applications and for mining useful knowledge. This document aims at bringing out the feasibility support that current data mining tools render IOT, against its possible data models.

8 Read more

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology

A recent and more comprehensive work on forum crawling is iRobot by Cai et al. [13]. iRobot aims to automatically learn a forum crawler with minimum human intervention by sampling pages, clustering them, selecting informative clusters via an informativeness measure, and finding a traversal path by a spanning tree algorithm. However, the traversal path selection procedure requires human inspection. Follow up work by Wang et al. [26] proposed an algorithm to address the traversal path selection problem. They introduced the concept of skeleton link and page-flipping link. Skeleton links are “the most important links supporting the structure of a forum site.” Importance is determined by informativeness and coverage metrics. Page-flipping links are determined using connectivity metric. By identifying and only following skeleton links and page-flipping links, they showed that iRobot can achieve effectiveness and coverage. According to our evaluation, its sampling strategy and informativeness estimation is not robust and its tree-like traversal path does not allow more than one path from a starting page node to a same ending page node. For example, as shown in Fig. 1, there are six paths from entry to threads. But iRobot would only take the first path (entry ! board ! thread). iRobot learns URL location information to discover new URLs in crawling, but a URL location might become invalid when the page structure changes. As opposed to iRobot, we explicitly define entry-index-thread paths and leverage page layouts to identify index pages and thread pages. FoCUS also learns URL patterns instead of URL locations to discover new URLs. Thus, it does not need to classify new pages in crawling and would not be affected by a change in page structures. The respective results from iRobot and FoCUS demonstrated that the EIT paths and URL patterns are more robust than the traversal path and URL location feature in iRobot.

16 Read more

The Effect of Personality Traits on User Continuance Usage Intention of e-Filing System

The Effect of Personality Traits on User Continuance Usage Intention of e-Filing System

One of the puzzling phenomena with regard to internet usage is the difference between internet users and e-services users. According to [18], there has been tremendous growth of internet users worldwide. In the context of Malaysia, internet users increase to 64.6% of the total population of 26.1 million. Indeed, Malaysia is ranked as one of the top ten countries in Asian region with the highest number of internet users. According to survey done by [19] in 2009 reveals that the main purpose of internet usage in Malaysia is for getting information (76.9%) followed by communication by text (74.8%), leisure (50.1%), social networking (46.8%), educational activities (46%), financial activities (27.2%), government services (19.6%), maintain homepage (7%) and others (7.6%). This shows that users have actually become more like consumers in making decisions on their preferences to use, not to use or continually use a particular system [16]. While the difference has been empirically observed but it is still unclear the factor that contribute to this difference. Thus, this paper will explore the effect of personality traits on the continuance usage intention. The proposed research model will be tested on the tax payers and their continuance usage intention of e-filing system to file their tax online in Malaysia.

5 Read more

Document Analysis using Similarity Measures : A Case Study on Text Retrieval System

Document Analysis using Similarity Measures : A Case Study on Text Retrieval System

Newspapers are one of the first mass communication media introduced by human being. Gradually other media like radio, television and now the Internet became popular. Even then newspapers remain as the most appealing information source for many. Newspapers are hard printed offline documents, with very rich information content. These documents exist ever since printing was invented. The current number of available newspapers is so abundant that it is very difficult to maintain them in a perishable paper format.

6 Read more

Role of Information Technology in Improvement of Current Scenario in Agriculture

Role of Information Technology in Improvement of Current Scenario in Agriculture

5. Software for various operating systems are available which act as an interface between the user and the machine. Graphical user interface (GUI) has become a prerequisite for end users accepted. Microsoft ‘Windows’ in India is becoming a favourite. Which can support complex user requirements, application soft wares are available. Office automation packages, Groupware applications, complex DB solutions for store data and information, communication products, solutions based on remote sensing and geographic information systems for the shelf solutions are also available. In addition, based on some or all of these solutions are also readily available. Developed at an affordable price to the downward trend in the industry is currently working on an idea to provide a customized application. Rapid Application Development and Deployment (Radd) is a popular model for rapid development and deployment of applications. Quicken the pace of development, the environment itself is easy with tools that software specialists. Project management and monitoring software that is necessary for rural India to facilitate efficient implementation of large and complex applications that are available. 6. Networking devices: the ability of a modem, used to convert data from digital to analog and vice versa, which is employed for the popular use of telephone lines, has increased. So that they are not exposed to the outside environment integrated internal modem is available in the computer. Such routers, and other networking devices, such as the ability to make it as easy as possible for large networks with data transmission, which makes increased.

6 Read more

Automating Query Cloud Provider through Semantic Technologies
A Sripal & Mr J Suman

Automating Query Cloud Provider through Semantic Technologies A Sripal & Mr J Suman

As promising because it is, this paradigm additionally brings forth several new challenges for knowledge secu- rity and access management once users source sensitive knowledge for sharing on cloud servers, that don\’t seem to be inside an equivalent trustworthy domain as knowl- edge homeowners. To stay sensitive user knowledge confidential against untreated servers, existing solutions typically apply scientific discipline ways by revealing knowledge decoding keys solely to licensed users. How- ever, in doing thus, these solutions inevitably introduce an important computation overhead on the knowledge the info the information owner for key distribution and knowledge management once fine- grained data a access management is desired. The problem of at the same time achieving measurability and knowledge confidentiality of access management truly still remains unresolved. This paper addresses this difficult open issue by, on one hand, process and implementing access policies support- ed knowledge attributes, and, on the opposite hand, per- mitting the knowledge the info the information owner to delegate most of the computation tasks concerned in fine- grained knowledge access management to entrusted cloud servers while not revealing the underlying data contents. gift system achieves this goal by exploiting and unambig- uously combining techniques of attribute-based encoding (ABE) and Advanced encoding normal (AES). gift Sys- tem shows secure ABE-based hybrid cloud storage design that permits a corporation to store knowledge firmly in a very public cloud, whereas maintaining the sensitive data associated with the organization’s structure in a very non- public cloud. Our projected theme additionally has salient properties of user access privilege confidentiality and user secret key responsibility. in depth analysis shows that our projected theme is very economical and demonstrably se- cures below existing security models.

5 Read more

Information Technology Use in Agriculture

Information Technology Use in Agriculture

There square measure many programs that square measure created attainable by information technology helps. once a community adopts trendy strategies for agriculture, the assembly of native merchandise are often augmented. There square measure some places wherever folks greatly have the benefit will result in higher financial gain for everybody concerned.

5 Read more

Show all 10000 documents...

Related subjects