International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 16, No. 1, Feb. 2024

Cover page and Table of Contents: PDF (size: 193KB)

Table Of Contents

REGULAR PAPERS

SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing

By M. Santhosh Kumar K. Ganesh Reddy Rakesh Kumar Donthi

DOI: https://doi.org/10.5815/ijitcs.2024.01.01, Pub. Date: 8 Feb. 2024

Cloud fog computing is a new paradigm that combines cloud computing and fog computing to boost resource efficiency and distributed system performance. Task scheduling is crucial in cloud fog computing because it decides the way computer resources are divided up across tasks. Our study suggests that the Shark Search Krill Herd Optimization (SSKHOA) method be incorporated into cloud fog computing's task scheduling. To enhance both the global and local search capabilities of the optimization process, the SSKHOA algorithm combines the shark search algorithm and the krill herd algorithm. It quickly explores the solution space and finds near-optimal work schedules by modelling the swarm intelligence of krill herds and the predator-prey behavior of sharks. In order to test the efficacy of the SSKHOA algorithm, we created a synthetic cloud fog environment and performed some tests. Traditional task scheduling techniques like LTRA, DRL, and DAPSO were used to evaluate the findings. The experimental results demonstrate that the SSKHOA outperformed the baseline algorithms in terms of task success rate increased 34%, reduced the execution time by 36%, and reduced makespan time by 54% respectively.

[...] Read more.
Towards Effective Solid Waste Management: A Mobile Application for Coordinated Waste Collection and User-official Interaction

By Paudel A. Pant A. Manandhar A. Gautam B.

DOI: https://doi.org/10.5815/ijitcs.2024.01.02, Pub. Date: 8 Feb. 2024

Solid Waste Management is an especially important task related to human health and the environment. Due to ineffective scheduled date & time, poor communication between waste collecting institutions and local house owners, people are compelled to throw waste on streets which is not good. Even if there is a routine, people tend to miss the schedule. Our aim is to develop an application for mobile phones, which consists of two parties- the user and waste management officials, where the second one acts as reminders. Officials will send a notification to the user, signaling that they are at a certain checkpoint near the user and the user can now throw waste properly and not on the streets. An incremental model was used throughout our project; basic requirements are fulfilled first and then iterated to create the final product. The proposed application includes two portals for whether you are user or waste management personnel. This application helps to improve the coordination between clients and collectors and determines whether the waste in an area has been collected or not. The survey conducted in this study involved consulting the Environment and Agricultural Department of Kathmandu Metropolitan City, which highlighted the significance of a notifying application. This application addresses the issue of uncoordinated waste disposal by providing users with information about collection schedules, leading to better waste management practices and reduced unsystematic garbage disposal.

[...] Read more.
Comparative Study: Performance of MVC Frameworks on RDBMS

By M. H. Rahman M. Naderuzzaman M. A. Kashem B. M. Salahuddin Z. Mahmud

DOI: https://doi.org/10.5815/ijitcs.2024.01.03, Pub. Date: 8 Feb. 2024

The regular utilization of web-based applications is crucial in our everyday life. The Model View Controller (MVC) architecture serves as a structured programming design that developers utilize to create user interfaces. This pattern is commonly applied by application software developers to construct web-based applications. The use of a MVC framework of PHP Scripting language is often essential for application software development. There is a significant argument regarding the most suitable PHP MVC such as Codeigniter & Laravel and Phalcon frameworks since not all frameworks cater to everyone's needs. It's a fact that not all MVC frameworks are created equal and different frameworks can be combined for specific scenarios. Selecting the appropriate MVC framework can pose a challenge at times. In this context, our paper focuses on conducting a comparative analysis of different PHP frameworks. The widely used PHP MVC frameworks are picked to compare the performance on basic Operation of Relational databases and different type of Application software to calculate execution time. In this experiment a large (Big Data) dataset was used. The Mean values of insert operation in MySQL database of Codeigniter, Laravel, Phalcon were 149.64, 149.99, 145.48 and PostgreSQL database`s 48.259, 49.39, 45.87 respectively. The Mean values of Update operation in MySQL database of Codeigniter, Laravel, Phalcon were 149.64, 158.39, 207.82 and PostgreSQL database`s 48.24, 49.39, 46.64 respectively. The Mean values of Select operation in MySQL database of Codeigniter, Laravel, Phalcon were 1.60, 3.23, 0.98 and PostgreSQL database`s 1.95, 4.57, 2.36 respectively. The Mean values of Delete operation in MySQL database of Codeigniter, Laravel, Phalcon were 150.27, 156.99, 149.63 and PostgreSQL database`s 42.95, 48.25, 42.07 respectively. The findings from our experiment can be advantageous for web application developers to choose proper MVC frameworks with their integrated development environment (IDE). This result will be helpful for small, medium & large-scale organization in choosing the appropriate PHP Framework.

[...] Read more.
The Impact of Financial Statement Integration in Machine Learning for Stock Price Prediction

By Febrian Wahyu Christanto Victor Gayuh Utomo Rastri Prathivi Christine Dewi

DOI: https://doi.org/10.5815/ijitcs.2024.01.04, Pub. Date: 8 Feb. 2024

In the capital market, there are two methods used by investors to make stock price predictions, namely fundamental analysis, and technical analysis. In computer science, it is possible to make prediction, including stock price prediction, use Machine Learning (ML). While there is research result that said both fundamental and technical parameter should give an optimum prediction there is lack of confirmation in Machine Learning to this result. This research conducts experi-ment using Support Vector Regression (SVR) and Support Vector Machine (SVM) as ML method to predict stock price. Further, the result is compared between 3 groups of parameters, technical only (TEC), financial statement only (FIN) and combination of both (COM). Our experimental results show that integrating financial statements has a neutral impact on SVR predictions but a positive impact on SVM predictions and the accuracy value of the model in this research reached 83%.

[...] Read more.
Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure

By Shakir A. Mehdiyev Mammad A. Hashimov

DOI: https://doi.org/10.5815/ijitcs.2024.01.05, Pub. Date: 8 Feb. 2024

This article explores the multifaceted challenges inherent in ensuring the cybersecurity of critical infrastructures, i.e., a linchpin of modern society and the economy, spanning pivotal sectors such as energy, transportation, and finance. In the era of accelerating digitalization and escalating dependence on information technology, safeguarding these infrastructures against evolving cyber threats becomes not just crucial but imperative. The examination unfolds by dissecting the vulnerabilities that plague critical infrastructures, probing into the diverse spectrum of threats they confront in the contemporary cybersecurity landscape. Moreover, the article meticulously outlines innovative security strategies designed to fortify these vital systems against malicious intrusions. A distinctive aspect of this work is the nuanced case study presented within the oil and gas sector, strategically chosen to illustrate the vulnerability of critical infrastructures to cyber threats. By examining this sector in detail, the article aims to shed light on industry-specific challenges and potential solutions, thereby enhancing our understanding of cybersecurity dynamics within critical infrastructures. This article contributes a comprehensive analysis of the challenges faced by critical infrastructures in the face of cyber threats, offering contemporary security strategies and leveraging a focused case study to deepen insights into the nuanced vulnerabilities within the oil and gas sector.

[...] Read more.