International Journal of Information Technology and Computer Science (IJITCS)

IJITCS Vol. 16, No. 4, Aug. 2024

Cover page and Table of Contents: PDF (size: 192KB)

Table Of Contents

REGULAR PAPERS

Securing the Cloud Infrastructure: Investigating Multi-tenancy Challenges, Modern Solutions and Future Research Opportunities

By Md. Abul Hayat Sunriz Islam Md. Fokhray Hossain

DOI: https://doi.org/10.5815/ijitcs.2024.04.01, Pub. Date: 8 Aug. 2024

Industry heavyweights like Microsoft, Amazon, and Google are at the forefront of the development and provision of cutting-edge and affordable cloud computing solutions, contributing to the widespread recognition of cloud computing. Without requiring direct human control, this technology provides network services, including data storage and computational power. But security becomes apparent as a major issue, hindering widespread adoption. The present study performs an extensive investigation to investigate security concerns related to cloud computing at several infrastructure levels, including application, network, host, and data. It examines significant issues that could impact the business model for cloud computing and discuss ways to solve security issues at every level that have been documented in the literature. The study identifies open problems, especially when considering cloud capabilities like elasticity, flexibility, and multi-tenancy, which create new problems at every infrastructure tier. Notably, it is found that multi-tenancy has a significant influence, contributing to security issues at all levels including abuse, unavailability, data loss, and privacy violations. The research ends with practical recommendations for additional studies targeted at improving overall cloud computing security. The results highlight the necessity of concentrated effort on mitigating security vulnerabilities resulting from multi-tenancy. This study makes a valuable contribution to the wider discussion on cloud security by identifying particular issues and supporting focused initiatives to strengthen the resilience of cloud infrastructure.

[...] Read more.
A Machine Learning Based Intelligent Diabetic and Hypertensive Patient Prediction Scheme and A Mobile Application for Patients Assistance

By Md. Amdad Hossain Mahfuzulhoq Chowdhury

DOI: https://doi.org/10.5815/ijitcs.2024.04.02, Pub. Date: 8 Aug. 2024

The inaccurate detection of diabetes and hypertension causes’ time wastage and a cost burden due to higher amounts of medicine intake and health problems. The previous works did not investigate machine learning (ML)-based diabetic and hypertension patient prediction by using multiple characteristics. This paper utilizes ML algorithms to predict the presence of diabetes and hypertension in patients. By analyzing patient data, including medical records, symptoms, and risk factors, the proposed system can provide accurate predictions for early detection and intervention. This paper makes a list of eighteen characteristics that can be used for data set preparation. With a classification accuracy of 93%, the Support Vector Machine is the best ML model in our work and is used for the diabetic and hypertension disease prediction models. This paper also gives a new mobile application that alleviates the time and cost burden by detecting diabetic and hypertensive patients, doctors, and medical information. The user evaluation and rating analysis results showed that more than sixty five percent of users declared the necessity of the proposed application features.

[...] Read more.
An Optimized Convolutional Neural Network Model for Detecting Depressive Symptoms from Image Posts

By Awoyelu T. M. Iyanda A. R. Mosaku S. K.

DOI: https://doi.org/10.5815/ijitcs.2024.04.03, Pub. Date: 8 Aug. 2024

This paper presents an optimized model that uses an optimized CNN to detect depressive symptoms from image posts. This is with a view to detecting depression symptoms in individuals. Visual data were collected in their raw form and assessed as having or not having a mental condition. The images were processed, and the relevant features retrieved from them. An optimized convolutional neural network (CNN) was used to simulate the defined classification model of the image posts. The model was implemented using Python Programming Language. Precision, recall, accuracy, and the area under the Receiver Operating Characteristics (ROC) curve were used as performance indicators to assess the model's efficacy. The collected findings indicate that 77% accuracy is achieved by the optimized model. As a result, 77% of the cases were accurately predicted by the model, suggesting that the model is generally accurate in its predictions. The research will contribute to a decrease in the incidence, prevalence, and recurrence of mental health illnesses as well as the disabilities they cause.

[...] Read more.
Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset

By Akinul Islam Jony Arjun Kumar Bose Arnob

DOI: https://doi.org/10.5815/ijitcs.2024.04.04, Pub. Date: 8 Aug. 2024

An increase in cyber threats directed at interconnected devices has resulted from the proliferation of the Internet of Things (IoT), which necessitates the implementation of comprehensive defenses against evolving attack vectors. This research investigates the utilization of machine learning (ML) prediction models to identify and defend against cyber-attacks targeting IoT networks. Central emphasis is placed on the thorough examination of the CIC-IoT2023 dataset, an extensive collection comprising a wide range of Distributed Denial of Service (DDoS) assaults on diverse IoT devices. This ensures the utilization of a practical and comprehensive benchmark for assessment. This study develops and compares four distinct machine learning models Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Tree (DT), and Random Forest (RF) to determine their effectiveness in detecting and preventing cyber threats to the Internet of Things (IoT). The comprehensive assessment incorporates a wide range of performance indicators, such as F1-score, accuracy, precision, and recall. Significantly, the results emphasize the superior performance of DT and RF, demonstrating exceptional accuracy rates of 0.9919 and 0.9916, correspondingly. The models demonstrate an outstanding capability to differentiate between benign and malicious packets, as supported by their high precision, recall, and F1 scores. The precision-recall curves and confusion matrices provide additional evidence that DT and RF are strong contenders in the field of IoT intrusion detection. Additionally, KNN demonstrates a noteworthy accuracy of 0.9380. On the other hand, LR demonstrates the least accuracy with a value of 0.8275, underscoring its inherent incapability to classify threats. In conjunction with the realistic and diverse characteristics of the CIC-IoT2023 dataset, the study's empirical assessments provide invaluable knowledge for determining the most effective machine learning algorithms and fortification strategies to protect IoT infrastructures. Furthermore, this study establishes ground-breaking suggestions for subsequent inquiries, urging the examination of unsupervised learning approaches and the incorporation of deep learning models to decipher complex patterns within IoT networks. These developments have the potential to strengthen cybersecurity protocols for Internet of Things (IoT) ecosystems, reduce the impact of emergent risks, and promote robust defense systems against ever-changing cyber challenges.

[...] Read more.
Designing the Smart Shopping Cart Mobile Application (SmartCart) Using Mobile Application Development Life Cycle

By Muhammad Amirul Asyraaf Roslan Haryani Haron

DOI: https://doi.org/10.5815/ijitcs.2024.04.05, Pub. Date: 8 Aug. 2024

The primary objective of this paper is to design a SmartCart mobile application. The proposal centres around designing a mobile app that allows customers to engage in collaborative shopping with their family members or friends, effectively shopping together in a group. This project seeks to improve upon existing shopping mobile apps that predominantly focus on online shopping. Through the development of the SmartCart mobile application, users will have the capability to shop in physical stores while collaborating with others or their group. The application adheres to the Mobile Application Development Life Cycle (MADLC) methodology, focusing on the phases of identification, design, development, prototyping, and testing. This paper provides an in-depth description of each step within the methodology, commencing with the identification stage and culminating in the testing phase. To evaluate the application's usability, ten users from various backgrounds took part in the testing process, and their feedback, measured through the System Usability Scale (SUS), indicated a positive reception of the application. The paper presents the initial framework and design concept that preceded the development of the final SmartCart mobile application design. From a pool of around 50 paper prototypes, 18 were selected as pertinent and fitting for advancement to the subsequent stage. In this subsequent phase, the chosen designs were transformed into a medium-fidelity prototype before progressing to the actual development of the SmartCart mobile application. This paper fulfils an identified need to study how collaborative shopping mobile applications can be developed and prototyped.

[...] Read more.
Mimicking Nature: Analysis of Dragonfly Pursuit Strategies Using LSTM and Kalman Filter

By Mehedi Hassan Zidan Rayhan Ahmed Khandakar Anim Hassan Adnan Tajkurun Zannat Mumu Md. Mahmudur Rahman Debajyoti Karmaker

DOI: https://doi.org/10.5815/ijitcs.2024.04.06, Pub. Date: 8 Aug. 2024

Pursuing prey by a predator is a natural phenomenon. This is an event when a predator targets and chases prey for consuming. The motive of a predator is to catch its prey whereas the motive of a prey is to escape from the predator. Earth has many predator species with different pursuing strategies. Some of them are sneaky again some of them are bolt. But their chases fail every time. A successful hunt depends on the strategy of pursuing one. Among all the predators, the Dragonflies, also known as natural drones, are considered the best predators because of their higher rate of successful hunting. If their strategy of pursuing a prey can be extracted for analysis and make an algorithm to apply on Unmanned arial vehicles, the success rate will be increased, and it will be more efficient than that of a dragonfly. We examine the pursuing strategy of a dragonfly using LSTM to predict the speed and distance between predator and prey. Also, The Kalman filter has been used to trace the trajectory of both Predator and Prey. We found that dragonflies follow distance maintenance strategy to pursue prey and try to keep its velocity constant to maintain the safe (mean) distance. This study can lead researchers to enhance the new and exciting algorithm which can be applied on Unmanned arial vehicles (UAV).

[...] Read more.
Enhancing Healthcare Provision in Conflict Zones: Queuing System Models for Mobile and Flexible Medical Care Units with a Limited Number of Treatment Stations

By Anatoliy Litvinov Dmytro Chumachenko Nataliia Dotsenko Iryna Kadykova Igor Chumachenko

DOI: https://doi.org/10.5815/ijitcs.2024.04.07, Pub. Date: 8 Aug. 2024

We address the challenge of optimizing the interaction between medical personnel and treatment stations within mobile and flexible medical care units (MFMCUs) in conflict zones. For the analysis of such systems, a closed queuing model with a finite number of treatment stations has been developed, which accounts for the possibility of performing multiple tasks for a single medical service request. Under the assumption of Poisson event flows, a system of integro-differential equations for the probability densities of the introduced states has been compiled. To solve it, the method of discrete binomial transformations is employed in conjunction with production functions. Solutions were obtained in the form of finite expressions, enabling the transition from the probabilistic characteristics of the model to the main performance metrics of the MFMCU: the load factor of medical personnel, and the utilization rate of treatment stations. The results show the selection of the number of treatment stations in the medical care area and the calculation of the appropriate performance of medical personnel.

[...] Read more.