SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Top Cited Article in
Computer Science &
Information Technology
Research: June 2020
International Journal of Computer Science and
Information Technology (IJCSIT)
Google Scholar Citation
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING
MACHINE LEARNING
Ananya Dey1
, Hamsashree Reddy2
, Manjistha Dey3
and Niharika Sinha4
1
National Institute of Technology, Tiruchirappalli, India
2
PES University, Bangalore, India
3
RV College of Engineering, Bangalore, India
4
Manipal Institute of Technology, Karnataka, India
ABSTRACT
With the advent of the Internet and social media, while hundreds of people have benefitted from the vast
sources of information available, there has been an enormous increase in the rise of cyber-crimes,
particularly targeted towards women. According to a 2019 report in the [4] Economics Times, India has
witnessed a 457% rise in cybercrime in the five year span between 2011 and 2016. Most speculate that
this is due to impact of social media such as Facebook, Instagram and Twitter on our daily lives. While
these definitely help in creating a sound social network, creation of user accounts in these sites usually
needs just an email-id. A real life person can create multiple fake IDs and hence impostors can easily be
made. Unlike the real world scenario where multiple rules and regulations are imposed to identify oneself
in a unique manner (for example while issuing one’s passport or driver’s license), in the virtual world of
social media, admission does not require any such checks. In this paper, we study the different accounts
of Instagram, in particular and try to assess an account as fake or real using Machine Learning techniques
namely Logistic Regression and Random Forest Algorithm.
KEYWORDS
Logistic Regression, Random Forest Algorithm, median imputation, Maximum likelihood estimation, k
cross validation, overfitting, out of bag data, recall, identity theft, Angler phishing.
For More Details: http://aircconline.com/ijcsit/V11N5/11519ijcsit07.pdf
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
REFERENCES
[1] Indira Sen,Anupama Aggarwal,Shiven Mian.2018."Worth its Weight in Likes: Towards Detecting
Fake Likes on Instagram". In ACM International Conference on Information and Knowledge
Management.
[2] Shalinda Adikari, Kaushik Dutta. 2014. “Identifying Fake Profiles In LinkedIn”. In Pacific Asia
Conference on Information Systems.
[3] Aleksei Romanov, Alexander Semenov, Oleksiy Mazhelis and Jari Veijalainen.2017. "Detection of
Fake Profiles in Social Media”. In 13th International Conference on Web Information Systems and
Technologies.
[4] https://telecom.economictimes.indiatimes.com/news/india-saw-457-rise-in-cybercrime-in-fiveyears-
study/67455224
[5] Todor Mihaylov, Preslav Nakov.2016. "Hunting for Troll Comments in News Community Forums".
In Association for Computational Linguistics.
[6] Ml-cheatsheet.readthedocs.io. (2019). Logistic Regression — ML Cheatsheet documentation.
[Online] Available at: https://ml
cheatsheet.readthedocs.io/en/latest/logistic_regression.html#binarylogistic-regression [Accessed 10
Jun. 2019].
[7] 3. Schoonjans, F. (2019). ROC curve analysis with MedCalc. [Online] MedCalc. Available at:
https://www.medcalc.org/manual/roc-curves.php [Accessed 10 Jun. 2019].
[8] Kietzmann, J.H., Hermkens, K., McCarthy, I.P., Silvestre,B.S., 2011. Social media? Get serious!
Understanding the functional building blocks of social media. Bus.Horiz., SPECIAL ISSUE:
SOCIAL MEDIA 54, 241251. doi:10.1016/j.bushor.2011.01.005.
[9] Krombholz, K., Hobel, H., Huber, M., Weippl, E., 2015.Advanced Social Engineering Attacks. J Inf
SecurAppl 22, 113–122. doi:10.1016/j.jisa.2014.09.005.
MONITORING STUDENT ATTENDANCE USING A
SMART SYSTEM AT TAIF UNIVERSITY
Saleh Alghamdi
Department of Information Technology, Taif University, Al-taif, Saudi
Arabia
ABSTRACT
The university system in the Kingdom of Saudi Arabia is concerned with student attendance for
lectures, and it is the responsibility of lecturers to monitor student attendance for each lecture. By
the end of the semester, students get an attendance register indicating which lectures the student
has attended and it reports the calculated percentage for each student’s attendance in each course.
Universities have regulated the mechanisms and the acceptable percentages of student absence.
The process for a lecturer to manually check student attendance consumes a lot of time and effort,
either during the lecture or when in the process of emptying absenteeism and inserting it into the
university’s electronic system. Therefore, Saudi universities compete to find modern methods of
checking student attendance that will avoid the disadvantages of manually taking attendance. For
this reason, they have produced electronic attendance systems, for example, using a student's
fingerprint, an eye recognition system, or a mobile phone system to read a QR code designed for
the same purpose. All of these systems have the disadvantage that they consume a lot of time, as
all students have to line up at the fingerprint reader or the eye detector for identification.
Therefore, the problem of the consumption of lecture time is still present, even with these modern
systems. Therefore, the aim of this research is to propose a smart mobile application that is able to
check the attendance of students without having to consume lecture time or require any effort
from the lecturer. The system automatically recognizes the attendance of students through their
university ID cards. Each lecturer would use his/ her own mobile phone to use the proposed
system to check the attendance of students instead of using manual method to register the
attendance of students and the students’ ID cards that are detected by coming within range of the
lecturer reader would represent present students, and missing student ID cards represent absent
students.
KEYWORDS
Context Awareness, RFID, Monitoring Student Attendance.
For More Details: http://aircconline.com/abstract/ijcsit/v11n1/11119ijcsit08.html
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
REFERENCES
[1] A. N. Yumang, D. Padilla, M. Sejera, A. C. U. Pajarillo, G. V. L. B. Palmiano and M. M. F.
Racho, "Attendance checker for students of Mapúa University," 2017IEEE 9th
International Conference on Humanoid, Nanotechnology, Information Technology,
Communication and Control, Environment and Management (HNICEM), Manila, 2017, pp.
1-3.
[2] M. M. Islam, M. K. Hasan, M. M. Billah and M. M. Uddin, "Development of
smartphone-based student attendance system," 2017 IEEE Region 10 Humanitarian
Technology Conference (R10-HTC), Dhaka, 2017, pp. 230-233.
[3] M. I. Moksin and N. M. Yasin, "The Implementation of Wireless Student Attendance
System in an Examination Procedure," 2009 International Association of Computer Science
and Information Technology - Spring Conference, Singapore, 2009, pp. 174-177.
[4] L. Ma, J. Pan, L. Cao and J. Shen, "The Design of Wireless Students Management
System Based on Fingerprint Sensor," 2010 International Conference on E-Business and
E-Government, Guangzhou, 2010, pp. 2153-2155.
[5] A. Purohit, K. Gaurav, C. Bhati and A. Oak, "Smart attendance," 2017 International
conference of Electronics, Communication and Aerospace Technology (ICECA),
Coimbatore, 2017, pp. 415-419.
[6] J. A. Rubella, M. Suganya, K. Senathipathi, B. S. Kumar, K. R. Gowdham and M.
Ranjithkumar, "Fingerprint based license checking for auto-mobiles," 2012 Fourth
International Conference on Advanced Computing (ICoAC), Chennai, 2012, pp. 1-8.
[7] Han Xi, Niu Wenliang and Li Zheying, "Application of fingerprint recognition on the
laboratory management," 2008 9th International Conference on Signal Processing, Beijing,
2008, pp. 2960-2963.
[8] N. Wenliang, H. Xi, L. Zheying and W. Shuying, "An Open Laboratory Management
System Based on Fingerprints Recognition," 2009 Second International Symposium on
Computational Intelligence and Design, Changsha, 2009, pp. 510-512.
[9] R. Samet and M. Tanriverdi, "Face Recognition-Based Mobile Automatic Classroom
Attendance Management System," 2017 International Conference on Cyberworlds (CW),
Chester, 2017, pp. 253-256.
[10] Y. Mao, H. Li and Z. Yin, "Who missed the class? — Unifying multi-face detection,
tracking and recognition in videos," 2014 IEEE International Conference on Multimedia
and Expo (ICME), Chengdu, 2014, pp. 1-6.
[11] S. M. Čisar, R. Pinter, V. Vojnić, V. Tumbas and P. Čisar, "Smartphone application for
tracking students' class attendance," 2016 IEEE 14th International Symposium on
Intelligent Systems and Informatics (SISY), Subotica, 2016, pp. 227-232.
[12] S. M. A. Rahman and O. N. A. Hatali, "Trends of the Academic Staff to Use Electronic
Attendance in the College of Applied Science, Ibri," 2015 Fifth International Conference
on e-Learning (econf), Manama, 2015, pp. 225-230.
[13] J. Park, K. An, D. Kim and J. Choi, "Multiple human tracking using multiple kinects
for an attendance check system of a smart class," 2013 10th International Conference
on Ubiquitous Robots and Ambient Intelligence (URAI), Jeju, 2013, pp. 130-130.
[14] G. J. Saxena et al., "Three stage robust attendance recording and monitoring using social
media platform, image processing and cloud computing," 2017 4th International
Conference on Signal Processing, Computing and Control (ISPCC), Solan, 2017, pp.
194- 199.
[15] U. E. Peter, C. K. A. Joe-Uzuegbu, L. Uzoechi and F. K. Opara, "Biometric-based
attendance system with remote real-time monitoring for tertiary institutions in
developing countries," 2013 IEEE International Conference on Emerging & Sustainable
Technologies for Power & ICT in a Developing Society (NIGERCON), Owerri, 2013,
pp. 1-8.
[16] Xiao, Sheng & Liang, Wenlong & Tang, Yishan. (2018). Classroom Attention
Restoration Using Computer Game Rewarding Mechanism. pp. 1-6.
[17] J. He, A. Atabekov and H. M. Haddad, "Internet-of-Things Based Smart Resource
Management System: A Case Study Intelligent Chair System," 2016 25th
International Conference on Computer Communication and Networks (ICCCN),
Waikoloa, HI, 2016, pp. 1-6
AUTHOR
Saleh Ahmed Alghamdi, Assistant Professor of College of Computers and
Information Technology, department of Information Technology, Taif
University, Taif, Saudi Arabia. Saleh completed Bachelor of Education degree
in the department of Computer Science, Teachers’ college, Riyadh, Saudi
Arabia, GPA 4.72 out of 5 With the second honor degree, 2004. Then he got
Master of Information Technology, from Latrobe University, Melbourne,
Australia. 2008- 2010. After that Saleh got Doctor of Philosophy (Computer
Science), Royal
Melbourne Institute of Technology (RMIT) University, Melbourne, Australia. 2010- 2014,
thesis title “A Context-aware Navigational Autonomy Aid for the Blind”. Now the main area
of Interest in research is: Context Awareness, Positioning and Navigation and Visually
Impaired Assistance
WEB-BASED LEARNING IN PERIODS OF CRISIS:
REFLECTIONS ON THE IMPACT OF COVID-19
Stella Chiemeke1
, Omokhagbo Mike Imafidor2
1
Department of Computer Science, University of Benin, Benin City, Nigeria
2
Africa PPP Advisory Nigeria Limited, Abuja, Nigeria
ABSTRACT
Education systems and its actors are generally responding to quarantine and large-scale shutdown
(partial) of cities with a sudden shift to Web-Based Learning. However, given that a pandemic of this
nature and scale is novel, there is a knowledge gap as to how teachers and learners should respond to
the shift, and what the likely impact and the key considerations should be. This study aims to
extrapolate and theorize from the existing knowledgebase about the use of Web-Based Learning, as
well as from an expert and practitioner wisdom and experience, to offer high-level guidance for
policymakers and education system actors that are forced to make decisions in fast-moving and very
challenging circumstances with little guidance or relevant experience. It is an early attempt at
theorizing the impact of the pandemic on two key actors (Learners and Teachers) and one interface
(Content), all across eight dimensions of learning. The analysis is based on Khan’s (2001) dimension
of Web-Based Learning and Anderson’s (2011) Model of Online Learning. Overall, we posit based on
experience and practice, that the pandemic has delivered severe shocks to both the demand and supply
side of Web-Based Learning, with Leaners, Teachers, and Content all significantly affected. While we
hypothesize a general drop in the quality of teaching and learning in the short run, we expect the
opposite to be the case in the long run, when the demand and supply side self-correct, albeit guided by
strong government and market institutions.
KEYWORDS
Web-Based Learning, COVID-19, Learners
For More Details: http://aircconline.com/ijcsit/V12N3/12320ijcsit03.pdf
Volume Link: http://airccse.org/journal/ijcsit2020_curr.html
REFERENCES
1. Alison, G. (2017). Beyond Access: Addressing Digital Inequality in Africa. Centre for
International Governance Innovation and Chatham House. Paper Series: No. 48
2. Anderson, T. (2011). The theory and practice of online learning (2nd Edition). Edmonton, AB:
AU Press.
3. Anderson, T., Rourke, L., Garrison, D.R, and Archer, W. (2001). Assessing social presence in
asynchronous text-based computer conferencing. Journal of Asynchronous Learning Networks,
5(2) Retrieved from:
http://immagic.com/eLibrary/ARCHIVES/GENERAL/ATHAB_CA/Anderson.pdf
4. Archambault, L. (2010). Identifying and addressing teaching challenges in k-12 online
environments. Distance Learning, 7(2), pp. 13-17.
5. Counted, A. and Arawole, J. (2016). We are connected, but constrained’: internet inequality and
the challenges of millennials in Africa as actors in innovation. Journal in Innovation and
Entrepreneurship 5(3), https://doi.org/10.1186/s13731-015-0029-1
6. Dalton, K. and Gren, I. (2015). Barriers and strategies on adoption of e-learning in Tanzanian
higher learning institutions: Lessons for adopters. International Journal of Education and
Development using Information and Communication Technology (IJEDICT);11(2),126-137.
7. Garrison, D. R., Anderson, T., and Archer, W. (2000). Critical inquiry in a text-based
environment: Computer conferencing in higher education model. The Internet and Higher
Education, 2(2-3), 87-105.
8. Gennaioli, la Porta, Lopez-de-silanes and Shleifer, (2011). Human Capital and Regional
Development, NBER working Paper 17158.
9. Ghavifekr, S. and Rosdy, W.A.W. (2015). Teaching and learning with technology: Effectiveness
of ICT integration in schools. International Journal of Research in Education and Science
(IJRES), 1(2), 175-191.
10. Harasim, L. (2012). Learning theory and online technologies. New York: Routledge/Taylor &
Francis.
11. Kahn, B. H. (2001). Web-based training: An introduction. In B.H. Kahn (Ed.) Web-based
Training. Englewood Cliffs, NJ.: Educational Technology Publications.
12. Kwanjai D. (2014). The design of web-based learning model using collaborative learning
techniques and a scaffolding system to enhance learners’ competency in higher education. 5th
World Conference on Educational Sciences - WCES 2013. Procedia - Social and Behavioral
Sciences; 116, 436 – 441
13. Moeketsi Letseka, Matsephe Martha Letseka and Victor Pitsoe (November 5th 2018). The
Challenges of E-learning in South Africa, Trends in E-learning, Mahmut Sinecen, IntechOpen,
DOI: 10.5772/intechopen.74843. Available from: https://www.intechopen.com/books/trends-in-e-
learning/the-challenges-of-e-learning-in-south-africa
14. Nagunwa, T. and Lwoga, E. 2012. “Developing eLearning technologies to implement
competency based medical education: Experiences from Muhimbili University of Health and
Allied Sciences”, International Journal of Education and Development using Information and
Communication Technology (IJEDICT), vol. 8, no. 3, pp. 07-21.
15. Picciano, A. G. (2017). Theories and frameworks for online education: Seeking an integrated
model. Online Learning, 21(3), 166-190. doi: 10.24059/olj.v21i3.1225
16. Said H. (2010). A Conceptual Framework for Using and Evaluating Web-Based Learning
Resources in School Education. Journal of Information Technology Education; 9,53-79.
17. Sanga, C., Magesa, M. M., Chingonikaya, E. and Kayunze, K. A. 2013. “Can e-learning promote
participation of female students in STEM disciplines in higher learning institutions of Tanzania?”,
International Journal of Education and Development using Information and Communication
Technology (IJEDICT), vol.9, no.3, pp. 86-102.
18. Siemens, G. (2004). Connectivism: A learning theory for the digital age. Paper retrieved from:
http://www.elearnspace.org/Articles/connectivism.htm
19. Sudha, A. and Amutha S. (2015) Higher Secondary Learners’ Effectiveness towards Web Based
Instruction (WBI) on Chemistry. Universal Journal of Educational Research, 3(7): 463-466.
DOI:10.13189/ujer.2015.030706
20. The European-wide e-Learning Recognition Review Report (2015). Retrieved from:
http://www.elearningnews.it/_resources/images/ebook/european-wide-elearning-
recognitionreview.Pdf.
21. The World Bank. (2010). ICTs & education: Issues and opportunities. Report. Retrieved June 30,
2011 from http://siteresources.worldbank.org/EDUCATION/Resources/ESSU/463292-
1290618190826/Background_Note_EducationStrategy2020_ICT_Edu.pdf
22. Titiana C (2019). Design of Web-Based Learning Model: Shifting the Accent from Knowledge
Transmission to Knowledge Construction. Proceedings of the Central and Eastern European, 177-
189
23. Todaro, M. and Smith, S. (2011). Economic Development, (11th ed.), Addison Wesley, 2011.
24. Van Reijswoud, V. (2009). Appropriate ICT as a tool to increase effectiveness in ICT4D:
Theoretical considerations and illustrating cases. The Electronic Journal on Information Systems
in Developing Countries, 38(9), 1–18
25. Yongxia, D. and Peili Z. (2018). Practice and effectiveness of web-based problem-based learning
approach in a large class-size system: A comparative study. Nurse Education in Practice, 31;161-
164
SECURITY THREATS ON CLOUD COMPUTING
VULNERABILITIES
Te-Shun Chou
Department of Technology Systems, East Carolina University, Greenville,
NC, U.S.A.
ABSTRACT
Clouds provide a powerful computing platform that enables individuals and organizations to
perform variety levels of tasks such as: use of online storage space, adoption of business
applications, development of customized computer software, and creation of a “realistic”
network environment. In previous years, the number of people using cloud services has
dramatically increased and lots of data has been stored in cloud computing environments. In the
meantime, data breaches to cloud services are also increasing every year due to hackers who are
always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper,
three cloud service models were compared; cloud security risks and threats were investigated
based on the nature of the cloud service models. Real world cloud attacks were included to
demonstrate the techniques that hackers used against cloud computing systems. In
addition,countermeasures to cloud security breaches are presented.
KEYWORDS
Cloud computing, cloud security threats and countermeasures, cloud service models
For More Details : https://aircconline.com/ijcsit/V11N6/11619ijcsit04.pdf
Volume Link : http://airccse.org/journal/ijcsit2019_curr.html
REFERENCES
1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
2. Sophos Security Threat Report 2012. http://www.sophos.com/
3. Amazon.com Server Said to Have Been Used in Sony Attack,
May 2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-
have-been- invaded-by-hackersusing-amazon-com-server.html
4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,”
International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp.
2672- 2676, April 2011.
5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE
International Conference on Cloud Computing Technology and Science,
Indianapolis, December 2010.
6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th
Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii,
January 2011.
7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat
Technical Security Conference, 2011.
8. CERT Coordination Center, Denial of
Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html
9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security
Issues in Cloud Computing,” IEEE International Conference in Cloud Computing,
pp. 109-116, Bangalore, 2009.
10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August
2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_
deni al_of_service_attack
11. DDoS Attack Rains Down on Amazon Cloud, October
2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/
12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon
University.
13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and
Recommendations for Information Security,” The European Network and
Information Security Agency (ENISA), November 2009.
14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/
15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data-
breach-trendsstats/
16. 2012 Has Delivered Her First Giant Data Breach, January
2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First-
Giant-DataBreach.html
17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today,
2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h
tm l
18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June,
2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/
19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox-
yes-we-werehacked/
20. Web Based Attacks, Symantec White Paper, February 2009.
21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012.
22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to
Averting SQL Injection for University Cloud,” International Journal of Computer
Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012.
23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection
Attacks on Web Application,” International Journal of Computer Applications, Vol.
52, No. 2, pp. 19-26, August 2012.
24. Web Application Attack Report For The Second Quarter of
2012.http://www.firehost.com/company/newsroom/web-application-attack-report-
second-quarter-2012
25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July
2008.http://www.sophos.com/en-us/press-office/press-
releases/2008/07/playstation.aspx
26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing
Journal, November 2010.
28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_is
sue_ amazon_aws_attack/
29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and
Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York,
NY, pp. 20–27, 2005.
30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security
Validation Revisited,” IEEE International Conference on Web Services, Los
Angeles, 2009.
31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,”
2011 IEEE International Conference on Signal Processing, Communications and
Computing, Xi'an, China, September 2011.
32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based
Security Vulnerability Assessment,” IEEE International Conference on E-Business
Engineering, pp.490-494, November 2010.
33. Amazon:Hey Spammers, Get Off My
Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer
s_get_off_my.html
34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud
Computing,” Computer Security Division, Information Technology Laboratory,
National Institute of Standards and Technology, Special Publication 800-144,
December 2011.
35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140
36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010.
37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider
Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy
Workshops, pp. 125-128, San Francisco, CA, 2012.
38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of
XML Schema Validation for Countering XML Signature Wrapping Attacks,” First
International Workshop on Securing Services on the Cloud, Milan, Italy, September
2011.
39. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping
Attacks and Countermeasures,” IEEE International Conference on Web Services, pp.
575–582, Miami, Florida, July 2009.
BIG DATA IN CLOUD COMPUTING REVIEW AND
OPPORTUNITIES
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert
Seidenberg School of CSIS, Pace University, White Plains, New York
ABSTRACT
Big Data is used in decision making process to gain useful insights hidden in the data for
business and engineering. At the same time it presents challenges in processing, cloud
computing has helped in advancement of big data by providing computational, networking
and storage capacity. This paper presents the review, opportunities and challenges of
transforming big data using cloud computing resources.
KEYWORDS
Big data; cloud computing; analytics; database; data warehouse
For More Details: http://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
REFERENCES
[1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October).
On the elasticity of nosql databases over cloud management platforms. In Proceedings of the
20th ACM international conference on Information and knowledge management (pp. 2385-
2388). ACM.
[2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big
data." Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033.
[3] Abadi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data
Eng. Bull, 32(1), 3-12.
[4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development,
2(4), 314-319
[5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and analytical
methods." Journal of Business Research 70 (2017): 263-286.
[6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
[7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models
(SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
[8] https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf
[9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management
Auerbach, ed.
[10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th
international symposium on pervasive systems, algorithms and networks. IEEE, 2012.
[11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive
Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366).
IEEE.
[12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE,
pp.405–409
[13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing
environment, MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery 4.5 (2014): 380-409.
[14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf
[15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges
[J]." Journal of computer research and development 1.98 (2013): 146-169.
[16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data
Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.

Weitere ähnliche Inhalte

Was ist angesagt?

A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
 
Curriculum vitae 170521 updated new
Curriculum vitae 170521 updated newCurriculum vitae 170521 updated new
Curriculum vitae 170521 updated newAbimbolaAfolayan2
 
E-Assessment: an E-Business Enabler in Higher Education
E-Assessment: an E-Business Enabler in Higher EducationE-Assessment: an E-Business Enabler in Higher Education
E-Assessment: an E-Business Enabler in Higher EducationDr Poonsri Vate-U-Lan
 
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...IAEME Publication
 
Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...IAEME Publication
 
Ufm social problem
Ufm social problemUfm social problem
Ufm social problemRamesh Kumar
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...ijcsit
 
Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Dr. Amarjeet Singh
 
Self paced learners; expectations and concerns about social
Self paced learners; expectations and concerns about social Self paced learners; expectations and concerns about social
Self paced learners; expectations and concerns about social Terry Anderson
 
Use of E-resources and Services by Users at Indian Institute of Management Ko...
Use of E-resources and Services by Users at Indian Institute of Management Ko...Use of E-resources and Services by Users at Indian Institute of Management Ko...
Use of E-resources and Services by Users at Indian Institute of Management Ko...inventionjournals
 
A pragmatic study on e learning system for higher education in developing cou...
A pragmatic study on e learning system for higher education in developing cou...A pragmatic study on e learning system for higher education in developing cou...
A pragmatic study on e learning system for higher education in developing cou...Najeem Olawale Adelakun
 
Information seeking behaviour of faculty members adn students in the digital ...
Information seeking behaviour of faculty members adn students in the digital ...Information seeking behaviour of faculty members adn students in the digital ...
Information seeking behaviour of faculty members adn students in the digital ...kumar A
 
Use of computer by secondary schools students
Use of computer by  secondary schools studentsUse of computer by  secondary schools students
Use of computer by secondary schools studentsKirti Matliwala
 
V elliott storyboard educ8345 update
V elliott storyboard educ8345 updateV elliott storyboard educ8345 update
V elliott storyboard educ8345 updatevolda boston
 
Matias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-CMatias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-CAudiMatias
 
Cloud solution to educational organization
Cloud solution to educational organizationCloud solution to educational organization
Cloud solution to educational organizationKaustubh Joshi
 

Was ist angesagt? (20)

A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
 
Curriculum vitae 170521 updated new
Curriculum vitae 170521 updated newCurriculum vitae 170521 updated new
Curriculum vitae 170521 updated new
 
E-Assessment: an E-Business Enabler in Higher Education
E-Assessment: an E-Business Enabler in Higher EducationE-Assessment: an E-Business Enabler in Higher Education
E-Assessment: an E-Business Enabler in Higher Education
 
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
 
Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...
 
Ufm social problem
Ufm social problemUfm social problem
Ufm social problem
 
Online modality-macahig-1
Online modality-macahig-1Online modality-macahig-1
Online modality-macahig-1
 
Cv hasnain acad12
Cv hasnain acad12Cv hasnain acad12
Cv hasnain acad12
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
 
Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...
 
Advance Mobile Education Service for College Students
Advance Mobile Education Service for College StudentsAdvance Mobile Education Service for College Students
Advance Mobile Education Service for College Students
 
Self paced learners; expectations and concerns about social
Self paced learners; expectations and concerns about social Self paced learners; expectations and concerns about social
Self paced learners; expectations and concerns about social
 
Use of E-resources and Services by Users at Indian Institute of Management Ko...
Use of E-resources and Services by Users at Indian Institute of Management Ko...Use of E-resources and Services by Users at Indian Institute of Management Ko...
Use of E-resources and Services by Users at Indian Institute of Management Ko...
 
A pragmatic study on e learning system for higher education in developing cou...
A pragmatic study on e learning system for higher education in developing cou...A pragmatic study on e learning system for higher education in developing cou...
A pragmatic study on e learning system for higher education in developing cou...
 
Information seeking behaviour of faculty members adn students in the digital ...
Information seeking behaviour of faculty members adn students in the digital ...Information seeking behaviour of faculty members adn students in the digital ...
Information seeking behaviour of faculty members adn students in the digital ...
 
Use of computer by secondary schools students
Use of computer by  secondary schools studentsUse of computer by  secondary schools students
Use of computer by secondary schools students
 
V elliott storyboard educ8345 update
V elliott storyboard educ8345 updateV elliott storyboard educ8345 update
V elliott storyboard educ8345 update
 
Matias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-CMatias et al. (2013) Sloan-C
Matias et al. (2013) Sloan-C
 
Cloud solution to educational organization
Cloud solution to educational organizationCloud solution to educational organization
Cloud solution to educational organization
 
Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...Intention to adopt mobile application services: a study among pakistani acadm...
Intention to adopt mobile application services: a study among pakistani acadm...
 

Ähnlich wie Top Cited Article in Computer Science & Information Technology Research: June 2020

Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...ClaraZara1
 
Top 10 Download Article in Computer Aided Technologies: October 2021
Top 10 Download Article in Computer Aided Technologies:  October 2021Top 10 Download Article in Computer Aided Technologies:  October 2021
Top 10 Download Article in Computer Aided Technologies: October 2021ijcax
 
July 2020: TOP Must Read Article in Computer Science & Information Technology...
July 2020: TOP Must Read Article in Computer Science & Information Technology...July 2020: TOP Must Read Article in Computer Science & Information Technology...
July 2020: TOP Must Read Article in Computer Science & Information Technology...AIRCC Publishing Corporation
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
 
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...ijmnct
 
Investigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learningInvestigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learningijmnct
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021AIRCC Publishing Corporation
 
Top Download Article in Computer Science & Information Technology Research: J...
Top Download Article in Computer Science & Information Technology Research: J...Top Download Article in Computer Science & Information Technology Research: J...
Top Download Article in Computer Science & Information Technology Research: J...AIRCC Publishing Corporation
 
Miniproject.pptx
Miniproject.pptxMiniproject.pptx
Miniproject.pptxSriSelva4
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
 
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...ijtsrd
 
i-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUM
i-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUMi-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUM
i-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUMThouhedul Islam
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...AIRCC Publishing Corporation
 
Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring IJECEIAES
 
SMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNING
SMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNINGSMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNING
SMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNINGIJITE
 

Ähnlich wie Top Cited Article in Computer Science & Information Technology Research: June 2020 (20)

Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
Top 10 Read Articles in International Journal of Security, Privacy and Trust ...
 
Top 10 Download Article in Computer Aided Technologies: October 2021
Top 10 Download Article in Computer Aided Technologies:  October 2021Top 10 Download Article in Computer Aided Technologies:  October 2021
Top 10 Download Article in Computer Aided Technologies: October 2021
 
July 2020: TOP Must Read Article in Computer Science & Information Technology...
July 2020: TOP Must Read Article in Computer Science & Information Technology...July 2020: TOP Must Read Article in Computer Science & Information Technology...
July 2020: TOP Must Read Article in Computer Science & Information Technology...
 
March 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information TechnologyMarch 2021: Top 10 Read Article in Computer Science & Information Technology
March 2021: Top 10 Read Article in Computer Science & Information Technology
 
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...
 
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
Investigation a New Approach to Detect and Track Fraud in Virtual Learning En...
 
Investigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learningInvestigation of new approach to detect and track fraud in virtual learning
Investigation of new approach to detect and track fraud in virtual learning
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021
 
Top Download Article in Computer Science & Information Technology Research: J...
Top Download Article in Computer Science & Information Technology Research: J...Top Download Article in Computer Science & Information Technology Research: J...
Top Download Article in Computer Science & Information Technology Research: J...
 
Miniproject.pptx
Miniproject.pptxMiniproject.pptx
Miniproject.pptx
 
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
 
Digital bus pass
Digital bus passDigital bus pass
Digital bus pass
 
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
Biometric Based Human Recognition Systems for Institutions using Exeat Monito...
 
i-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUM
i-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUMi-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUM
i-VRenewal:A Cloud based System for VISA Renewal:A Case Study of IIUM
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Thirunavukkarasu (2)
Thirunavukkarasu (2)Thirunavukkarasu (2)
Thirunavukkarasu (2)
 
Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring Intelligent solution for automatic online exam monitoring
Intelligent solution for automatic online exam monitoring
 
SMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNING
SMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNINGSMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNING
SMART AGENT BASED SEARCH FOR ADMISSION IN INSTITUTIONS OF HIGHER LEARNING
 
Resume
ResumeResume
Resume
 
Transforming African Education Systems through the Application of Internet of...
Transforming African Education Systems through the Application of Internet of...Transforming African Education Systems through the Application of Internet of...
Transforming African Education Systems through the Application of Internet of...
 

Mehr von AIRCC Publishing Corporation

The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...AIRCC Publishing Corporation
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!AIRCC Publishing Corporation
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarAIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)AIRCC Publishing Corporation
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...AIRCC Publishing Corporation
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3AIRCC Publishing Corporation
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...AIRCC Publishing Corporation
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkAIRCC Publishing Corporation
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesAIRCC Publishing Corporation
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...AIRCC Publishing Corporation
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...AIRCC Publishing Corporation
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...AIRCC Publishing Corporation
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...AIRCC Publishing Corporation
 

Mehr von AIRCC Publishing Corporation (20)

Big Data and Machine Learning in Defence
Big Data and Machine Learning in DefenceBig Data and Machine Learning in Defence
Big Data and Machine Learning in Defence
 
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in th...
 
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Ne...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
The Smart Parking Management System - IJCSIT
The Smart Parking Management System  - IJCSITThe Smart Parking Management System  - IJCSIT
The Smart Parking Management System - IJCSIT
 
Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!Discover Cutting-Edge Research in Computer Science and Information Technology!
Discover Cutting-Edge Research in Computer Science and Information Technology!
 
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic GrammarConstraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
Constraint-based and Fuzzy Logic Student Modeling for Arabic Grammar
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...Call for Articles - International Journal of Computer Science & Information T...
Call for Articles - International Journal of Computer Science & Information T...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)International Journal of Computer Science & Information Technology (IJCSIT)
International Journal of Computer Science & Information Technology (IJCSIT)
 
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
Your Device May Know You Better Than You Know Yourself-Continuous Authenticat...
 
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
 
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
From Clicks to Security: Investigating Continuous Authentication via Mouse Dy...
 
Image Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural NetworkImage Segmentation and Classification using Neural Network
Image Segmentation and Classification using Neural Network
 
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot SizesUse of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
Use of Neuronal Networks and Fuzzy Logic to Modelling the Foot Sizes
 
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment...
 
Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...Call for Papers - International Journal of Computer Science & Information Tec...
Call for Papers - International Journal of Computer Science & Information Tec...
 
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
Current Issue - February 2024, Volume 16, Number 1  - International Journal o...Current Issue - February 2024, Volume 16, Number 1  - International Journal o...
Current Issue - February 2024, Volume 16, Number 1 - International Journal o...
 
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
Variations in Outcome for the Same Map Reduce Transitive Closure Algorithm Im...
 

Kürzlich hochgeladen

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 

Kürzlich hochgeladen (20)

Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Top Cited Article in Computer Science & Information Technology Research: June 2020

  • 1. Top Cited Article in Computer Science & Information Technology Research: June 2020 International Journal of Computer Science and Information Technology (IJCSIT) Google Scholar Citation ISSN: 0975-3826(online); 0975-4660 (Print) http://airccse.org/journal/ijcsit.html
  • 2. DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING Ananya Dey1 , Hamsashree Reddy2 , Manjistha Dey3 and Niharika Sinha4 1 National Institute of Technology, Tiruchirappalli, India 2 PES University, Bangalore, India 3 RV College of Engineering, Bangalore, India 4 Manipal Institute of Technology, Karnataka, India ABSTRACT With the advent of the Internet and social media, while hundreds of people have benefitted from the vast sources of information available, there has been an enormous increase in the rise of cyber-crimes, particularly targeted towards women. According to a 2019 report in the [4] Economics Times, India has witnessed a 457% rise in cybercrime in the five year span between 2011 and 2016. Most speculate that this is due to impact of social media such as Facebook, Instagram and Twitter on our daily lives. While these definitely help in creating a sound social network, creation of user accounts in these sites usually needs just an email-id. A real life person can create multiple fake IDs and hence impostors can easily be made. Unlike the real world scenario where multiple rules and regulations are imposed to identify oneself in a unique manner (for example while issuing one’s passport or driver’s license), in the virtual world of social media, admission does not require any such checks. In this paper, we study the different accounts of Instagram, in particular and try to assess an account as fake or real using Machine Learning techniques namely Logistic Regression and Random Forest Algorithm. KEYWORDS Logistic Regression, Random Forest Algorithm, median imputation, Maximum likelihood estimation, k cross validation, overfitting, out of bag data, recall, identity theft, Angler phishing. For More Details: http://aircconline.com/ijcsit/V11N5/11519ijcsit07.pdf Volume Link: http://airccse.org/journal/ijcsit2019_curr.html REFERENCES
  • 3. [1] Indira Sen,Anupama Aggarwal,Shiven Mian.2018."Worth its Weight in Likes: Towards Detecting Fake Likes on Instagram". In ACM International Conference on Information and Knowledge Management. [2] Shalinda Adikari, Kaushik Dutta. 2014. “Identifying Fake Profiles In LinkedIn”. In Pacific Asia Conference on Information Systems. [3] Aleksei Romanov, Alexander Semenov, Oleksiy Mazhelis and Jari Veijalainen.2017. "Detection of Fake Profiles in Social Media”. In 13th International Conference on Web Information Systems and Technologies. [4] https://telecom.economictimes.indiatimes.com/news/india-saw-457-rise-in-cybercrime-in-fiveyears- study/67455224 [5] Todor Mihaylov, Preslav Nakov.2016. "Hunting for Troll Comments in News Community Forums". In Association for Computational Linguistics. [6] Ml-cheatsheet.readthedocs.io. (2019). Logistic Regression — ML Cheatsheet documentation. [Online] Available at: https://ml cheatsheet.readthedocs.io/en/latest/logistic_regression.html#binarylogistic-regression [Accessed 10 Jun. 2019]. [7] 3. Schoonjans, F. (2019). ROC curve analysis with MedCalc. [Online] MedCalc. Available at: https://www.medcalc.org/manual/roc-curves.php [Accessed 10 Jun. 2019]. [8] Kietzmann, J.H., Hermkens, K., McCarthy, I.P., Silvestre,B.S., 2011. Social media? Get serious! Understanding the functional building blocks of social media. Bus.Horiz., SPECIAL ISSUE: SOCIAL MEDIA 54, 241251. doi:10.1016/j.bushor.2011.01.005. [9] Krombholz, K., Hobel, H., Huber, M., Weippl, E., 2015.Advanced Social Engineering Attacks. J Inf SecurAppl 22, 113–122. doi:10.1016/j.jisa.2014.09.005.
  • 4. MONITORING STUDENT ATTENDANCE USING A SMART SYSTEM AT TAIF UNIVERSITY Saleh Alghamdi Department of Information Technology, Taif University, Al-taif, Saudi Arabia ABSTRACT The university system in the Kingdom of Saudi Arabia is concerned with student attendance for lectures, and it is the responsibility of lecturers to monitor student attendance for each lecture. By the end of the semester, students get an attendance register indicating which lectures the student has attended and it reports the calculated percentage for each student’s attendance in each course. Universities have regulated the mechanisms and the acceptable percentages of student absence. The process for a lecturer to manually check student attendance consumes a lot of time and effort, either during the lecture or when in the process of emptying absenteeism and inserting it into the university’s electronic system. Therefore, Saudi universities compete to find modern methods of checking student attendance that will avoid the disadvantages of manually taking attendance. For this reason, they have produced electronic attendance systems, for example, using a student's fingerprint, an eye recognition system, or a mobile phone system to read a QR code designed for the same purpose. All of these systems have the disadvantage that they consume a lot of time, as all students have to line up at the fingerprint reader or the eye detector for identification. Therefore, the problem of the consumption of lecture time is still present, even with these modern systems. Therefore, the aim of this research is to propose a smart mobile application that is able to check the attendance of students without having to consume lecture time or require any effort from the lecturer. The system automatically recognizes the attendance of students through their university ID cards. Each lecturer would use his/ her own mobile phone to use the proposed system to check the attendance of students instead of using manual method to register the attendance of students and the students’ ID cards that are detected by coming within range of the lecturer reader would represent present students, and missing student ID cards represent absent students. KEYWORDS Context Awareness, RFID, Monitoring Student Attendance. For More Details: http://aircconline.com/abstract/ijcsit/v11n1/11119ijcsit08.html Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
  • 5. REFERENCES [1] A. N. Yumang, D. Padilla, M. Sejera, A. C. U. Pajarillo, G. V. L. B. Palmiano and M. M. F. Racho, "Attendance checker for students of Mapúa University," 2017IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM), Manila, 2017, pp. 1-3. [2] M. M. Islam, M. K. Hasan, M. M. Billah and M. M. Uddin, "Development of smartphone-based student attendance system," 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), Dhaka, 2017, pp. 230-233. [3] M. I. Moksin and N. M. Yasin, "The Implementation of Wireless Student Attendance System in an Examination Procedure," 2009 International Association of Computer Science and Information Technology - Spring Conference, Singapore, 2009, pp. 174-177. [4] L. Ma, J. Pan, L. Cao and J. Shen, "The Design of Wireless Students Management System Based on Fingerprint Sensor," 2010 International Conference on E-Business and E-Government, Guangzhou, 2010, pp. 2153-2155. [5] A. Purohit, K. Gaurav, C. Bhati and A. Oak, "Smart attendance," 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA), Coimbatore, 2017, pp. 415-419. [6] J. A. Rubella, M. Suganya, K. Senathipathi, B. S. Kumar, K. R. Gowdham and M. Ranjithkumar, "Fingerprint based license checking for auto-mobiles," 2012 Fourth International Conference on Advanced Computing (ICoAC), Chennai, 2012, pp. 1-8. [7] Han Xi, Niu Wenliang and Li Zheying, "Application of fingerprint recognition on the laboratory management," 2008 9th International Conference on Signal Processing, Beijing, 2008, pp. 2960-2963. [8] N. Wenliang, H. Xi, L. Zheying and W. Shuying, "An Open Laboratory Management System Based on Fingerprints Recognition," 2009 Second International Symposium on Computational Intelligence and Design, Changsha, 2009, pp. 510-512. [9] R. Samet and M. Tanriverdi, "Face Recognition-Based Mobile Automatic Classroom Attendance Management System," 2017 International Conference on Cyberworlds (CW), Chester, 2017, pp. 253-256. [10] Y. Mao, H. Li and Z. Yin, "Who missed the class? — Unifying multi-face detection, tracking and recognition in videos," 2014 IEEE International Conference on Multimedia and Expo (ICME), Chengdu, 2014, pp. 1-6. [11] S. M. Čisar, R. Pinter, V. Vojnić, V. Tumbas and P. Čisar, "Smartphone application for tracking students' class attendance," 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY), Subotica, 2016, pp. 227-232. [12] S. M. A. Rahman and O. N. A. Hatali, "Trends of the Academic Staff to Use Electronic Attendance in the College of Applied Science, Ibri," 2015 Fifth International Conference on e-Learning (econf), Manama, 2015, pp. 225-230.
  • 6. [13] J. Park, K. An, D. Kim and J. Choi, "Multiple human tracking using multiple kinects for an attendance check system of a smart class," 2013 10th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI), Jeju, 2013, pp. 130-130. [14] G. J. Saxena et al., "Three stage robust attendance recording and monitoring using social media platform, image processing and cloud computing," 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, 2017, pp. 194- 199. [15] U. E. Peter, C. K. A. Joe-Uzuegbu, L. Uzoechi and F. K. Opara, "Biometric-based attendance system with remote real-time monitoring for tertiary institutions in developing countries," 2013 IEEE International Conference on Emerging & Sustainable Technologies for Power & ICT in a Developing Society (NIGERCON), Owerri, 2013, pp. 1-8. [16] Xiao, Sheng & Liang, Wenlong & Tang, Yishan. (2018). Classroom Attention Restoration Using Computer Game Rewarding Mechanism. pp. 1-6. [17] J. He, A. Atabekov and H. M. Haddad, "Internet-of-Things Based Smart Resource Management System: A Case Study Intelligent Chair System," 2016 25th International Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, 2016, pp. 1-6 AUTHOR Saleh Ahmed Alghamdi, Assistant Professor of College of Computers and Information Technology, department of Information Technology, Taif University, Taif, Saudi Arabia. Saleh completed Bachelor of Education degree in the department of Computer Science, Teachers’ college, Riyadh, Saudi Arabia, GPA 4.72 out of 5 With the second honor degree, 2004. Then he got Master of Information Technology, from Latrobe University, Melbourne, Australia. 2008- 2010. After that Saleh got Doctor of Philosophy (Computer Science), Royal Melbourne Institute of Technology (RMIT) University, Melbourne, Australia. 2010- 2014, thesis title “A Context-aware Navigational Autonomy Aid for the Blind”. Now the main area of Interest in research is: Context Awareness, Positioning and Navigation and Visually Impaired Assistance
  • 7. WEB-BASED LEARNING IN PERIODS OF CRISIS: REFLECTIONS ON THE IMPACT OF COVID-19 Stella Chiemeke1 , Omokhagbo Mike Imafidor2 1 Department of Computer Science, University of Benin, Benin City, Nigeria 2 Africa PPP Advisory Nigeria Limited, Abuja, Nigeria ABSTRACT Education systems and its actors are generally responding to quarantine and large-scale shutdown (partial) of cities with a sudden shift to Web-Based Learning. However, given that a pandemic of this nature and scale is novel, there is a knowledge gap as to how teachers and learners should respond to the shift, and what the likely impact and the key considerations should be. This study aims to extrapolate and theorize from the existing knowledgebase about the use of Web-Based Learning, as well as from an expert and practitioner wisdom and experience, to offer high-level guidance for policymakers and education system actors that are forced to make decisions in fast-moving and very challenging circumstances with little guidance or relevant experience. It is an early attempt at theorizing the impact of the pandemic on two key actors (Learners and Teachers) and one interface (Content), all across eight dimensions of learning. The analysis is based on Khan’s (2001) dimension of Web-Based Learning and Anderson’s (2011) Model of Online Learning. Overall, we posit based on experience and practice, that the pandemic has delivered severe shocks to both the demand and supply side of Web-Based Learning, with Leaners, Teachers, and Content all significantly affected. While we hypothesize a general drop in the quality of teaching and learning in the short run, we expect the opposite to be the case in the long run, when the demand and supply side self-correct, albeit guided by strong government and market institutions. KEYWORDS Web-Based Learning, COVID-19, Learners For More Details: http://aircconline.com/ijcsit/V12N3/12320ijcsit03.pdf Volume Link: http://airccse.org/journal/ijcsit2020_curr.html
  • 8. REFERENCES 1. Alison, G. (2017). Beyond Access: Addressing Digital Inequality in Africa. Centre for International Governance Innovation and Chatham House. Paper Series: No. 48 2. Anderson, T. (2011). The theory and practice of online learning (2nd Edition). Edmonton, AB: AU Press. 3. Anderson, T., Rourke, L., Garrison, D.R, and Archer, W. (2001). Assessing social presence in asynchronous text-based computer conferencing. Journal of Asynchronous Learning Networks, 5(2) Retrieved from: http://immagic.com/eLibrary/ARCHIVES/GENERAL/ATHAB_CA/Anderson.pdf 4. Archambault, L. (2010). Identifying and addressing teaching challenges in k-12 online environments. Distance Learning, 7(2), pp. 13-17. 5. Counted, A. and Arawole, J. (2016). We are connected, but constrained’: internet inequality and the challenges of millennials in Africa as actors in innovation. Journal in Innovation and Entrepreneurship 5(3), https://doi.org/10.1186/s13731-015-0029-1 6. Dalton, K. and Gren, I. (2015). Barriers and strategies on adoption of e-learning in Tanzanian higher learning institutions: Lessons for adopters. International Journal of Education and Development using Information and Communication Technology (IJEDICT);11(2),126-137. 7. Garrison, D. R., Anderson, T., and Archer, W. (2000). Critical inquiry in a text-based environment: Computer conferencing in higher education model. The Internet and Higher Education, 2(2-3), 87-105. 8. Gennaioli, la Porta, Lopez-de-silanes and Shleifer, (2011). Human Capital and Regional Development, NBER working Paper 17158. 9. Ghavifekr, S. and Rosdy, W.A.W. (2015). Teaching and learning with technology: Effectiveness of ICT integration in schools. International Journal of Research in Education and Science (IJRES), 1(2), 175-191. 10. Harasim, L. (2012). Learning theory and online technologies. New York: Routledge/Taylor & Francis. 11. Kahn, B. H. (2001). Web-based training: An introduction. In B.H. Kahn (Ed.) Web-based Training. Englewood Cliffs, NJ.: Educational Technology Publications. 12. Kwanjai D. (2014). The design of web-based learning model using collaborative learning techniques and a scaffolding system to enhance learners’ competency in higher education. 5th World Conference on Educational Sciences - WCES 2013. Procedia - Social and Behavioral Sciences; 116, 436 – 441 13. Moeketsi Letseka, Matsephe Martha Letseka and Victor Pitsoe (November 5th 2018). The Challenges of E-learning in South Africa, Trends in E-learning, Mahmut Sinecen, IntechOpen, DOI: 10.5772/intechopen.74843. Available from: https://www.intechopen.com/books/trends-in-e- learning/the-challenges-of-e-learning-in-south-africa 14. Nagunwa, T. and Lwoga, E. 2012. “Developing eLearning technologies to implement competency based medical education: Experiences from Muhimbili University of Health and Allied Sciences”, International Journal of Education and Development using Information and Communication Technology (IJEDICT), vol. 8, no. 3, pp. 07-21.
  • 9. 15. Picciano, A. G. (2017). Theories and frameworks for online education: Seeking an integrated model. Online Learning, 21(3), 166-190. doi: 10.24059/olj.v21i3.1225 16. Said H. (2010). A Conceptual Framework for Using and Evaluating Web-Based Learning Resources in School Education. Journal of Information Technology Education; 9,53-79. 17. Sanga, C., Magesa, M. M., Chingonikaya, E. and Kayunze, K. A. 2013. “Can e-learning promote participation of female students in STEM disciplines in higher learning institutions of Tanzania?”, International Journal of Education and Development using Information and Communication Technology (IJEDICT), vol.9, no.3, pp. 86-102. 18. Siemens, G. (2004). Connectivism: A learning theory for the digital age. Paper retrieved from: http://www.elearnspace.org/Articles/connectivism.htm 19. Sudha, A. and Amutha S. (2015) Higher Secondary Learners’ Effectiveness towards Web Based Instruction (WBI) on Chemistry. Universal Journal of Educational Research, 3(7): 463-466. DOI:10.13189/ujer.2015.030706 20. The European-wide e-Learning Recognition Review Report (2015). Retrieved from: http://www.elearningnews.it/_resources/images/ebook/european-wide-elearning- recognitionreview.Pdf. 21. The World Bank. (2010). ICTs & education: Issues and opportunities. Report. Retrieved June 30, 2011 from http://siteresources.worldbank.org/EDUCATION/Resources/ESSU/463292- 1290618190826/Background_Note_EducationStrategy2020_ICT_Edu.pdf 22. Titiana C (2019). Design of Web-Based Learning Model: Shifting the Accent from Knowledge Transmission to Knowledge Construction. Proceedings of the Central and Eastern European, 177- 189 23. Todaro, M. and Smith, S. (2011). Economic Development, (11th ed.), Addison Wesley, 2011. 24. Van Reijswoud, V. (2009). Appropriate ICT as a tool to increase effectiveness in ICT4D: Theoretical considerations and illustrating cases. The Electronic Journal on Information Systems in Developing Countries, 38(9), 1–18 25. Yongxia, D. and Peili Z. (2018). Practice and effectiveness of web-based problem-based learning approach in a large class-size system: A comparative study. Nurse Education in Practice, 31;161- 164
  • 10. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES Te-Shun Chou Department of Technology Systems, East Carolina University, Greenville, NC, U.S.A. ABSTRACT Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented. KEYWORDS Cloud computing, cloud security threats and countermeasures, cloud service models For More Details : https://aircconline.com/ijcsit/V11N6/11619ijcsit04.pdf Volume Link : http://airccse.org/journal/ijcsit2019_curr.html
  • 11. REFERENCES 1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics 2. Sophos Security Threat Report 2012. http://www.sophos.com/ 3. Amazon.com Server Said to Have Been Used in Sony Attack, May 2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to- have-been- invaded-by-hackersusing-amazon-com-server.html 4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,” International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672- 2676, April 2011. 5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, December 2010. 6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii, January 2011. 7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat Technical Security Conference, 2011. 8. CERT Coordination Center, Denial of Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html 9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference in Cloud Computing, pp. 109-116, Bangalore, 2009. 10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August 2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_ deni al_of_service_attack 11. DDoS Attack Rains Down on Amazon Cloud, October 2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/ 12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon University. 13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and Recommendations for Information Security,” The European Network and Information Security Agency (ENISA), November 2009.
  • 12. 14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/ 15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data- breach-trendsstats/ 16. 2012 Has Delivered Her First Giant Data Breach, January 2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First- Giant-DataBreach.html 17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today, 2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h tm l 18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June, 2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/ 19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox- yes-we-werehacked/ 20. Web Based Attacks, Symantec White Paper, February 2009. 21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012. 22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to Averting SQL Injection for University Cloud,” International Journal of Computer Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012. 23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection Attacks on Web Application,” International Journal of Computer Applications, Vol. 52, No. 2, pp. 19-26, August 2012. 24. Web Application Attack Report For The Second Quarter of 2012.http://www.firehost.com/company/newsroom/web-application-attack-report- second-quarter-2012 25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July 2008.http://www.sophos.com/en-us/press-office/press- releases/2008/07/playstation.aspx 26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009. 27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing Journal, November 2010.
  • 13. 28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011. http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_is sue_ amazon_aws_attack/ 29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York, NY, pp. 20–27, 2005. 30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security Validation Revisited,” IEEE International Conference on Web Services, Los Angeles, 2009. 31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,” 2011 IEEE International Conference on Signal Processing, Communications and Computing, Xi'an, China, September 2011. 32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based Security Vulnerability Assessment,” IEEE International Conference on E-Business Engineering, pp.490-494, November 2010. 33. Amazon:Hey Spammers, Get Off My Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer s_get_off_my.html 34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud Computing,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Special Publication 800-144, December 2011. 35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140 36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010. 37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy Workshops, pp. 125-128, San Francisco, CA, 2012. 38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks,” First International Workshop on Securing Services on the Cloud, Milan, Italy, September 2011. 39. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping Attacks and Countermeasures,” IEEE International Conference on Web Services, pp. 575–582, Miami, Florida, July 2009.
  • 14. BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert Seidenberg School of CSIS, Pace University, White Plains, New York ABSTRACT Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources. KEYWORDS Big data; cloud computing; analytics; database; data warehouse For More Details: http://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
  • 15. REFERENCES [1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October). On the elasticity of nosql databases over cloud management platforms. In Proceedings of the 20th ACM international conference on Information and knowledge management (pp. 2385- 2388). ACM. [2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big data." Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033. [3] Abadi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull, 32(1), 3-12. [4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development, 2(4), 314-319 [5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and analytical methods." Journal of Business Research 70 (2017): 263-286. [6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/ [7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, 2014. [8] https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf [9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management Auerbach, ed. [10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th international symposium on pervasive systems, algorithms and networks. IEEE, 2012. [11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366). IEEE. [12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE, pp.405–409 [13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4.5 (2014): 380-409. [14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf [15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges [J]." Journal of computer research and development 1.98 (2013): 146-169. [16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.