International Journal of Informatics and Communication Technology (IJ-ICT)
Not a member yet
    450 research outputs found

    Enhancing database query interpretation: a comparative analysis of semantic parsing models

    Get PDF
    The rapid proliferation of NoSQL databases in various domains necessitates effective parsing models for interpreting NoSQL queries, a fundamental aspect often overlooked in database management research. This paper addresses the critical need for a comprehensive understanding of existing semantic parsing models tailored for NoSQL query interpretation. We identify inherent issues in current models, such as limitations in precision, accuracy, and scalability, alongside challenges in deployment complexity and processing delays. This review is pivotal, shedding light on the intricacies and inefficiencies of existing systems, thereby guiding future advancements in NoSQL database querying. This methodical comparison of these models across key performance metrics-precision, accuracy, recall, delay, deployment complexity, and scalability-reveals significant disparities and areas for improvement. By evaluating these models against both individual and combined parameters, we identify the most effective methods currently available. The impact of this work is far-reaching, providing a foundational framework for developing more robust, efficient, and scalable parsing models. This, in turn, has the potential to revolutionize the way NoSQL databases are queried and managed, offering significant improvements in data retrieval and analysis. Through this paper, we aim to bridge the gap between theoretical model development and practical database management, paving the way for enhanced data processing capabilities in diverse NoSQL database applications

    Finite state machine for retro arcade fighting game development

    Get PDF
    Traditional fighting games are a competitive genre where players engage in one-on-one combat, aiming to reduce their opponent's health points to zero. These games often utilize two-dimensional (2D) graphics, enabling players to execute various character movements such as punching, jumping, and crouching. This research investigates the effectiveness of the finite state machine (FSM) method in developing a combo system for a retro fighting game, focusing on its implementation within the Godot Engine. The FSM method, which structures game behavior through states, events, and actions, is central to the game's control system. By employing the game development life cycle (GDLC) methodology, this study ensures a systematic and structured approach to game design. Special attention is given to the regulation of the combo hit system for the game's protagonist in Brawl Tale. The research culminates in the successful development of the retro fighting game Brawl Tale, demonstrating that the FSM method significantly enhances the fluidity and responsiveness of character movements. The findings suggest that the FSM method is an effective tool for simplifying and improving gameplay mechanics in retro-style fighting games

    Efficient blockchain based solution for secure medical record management

    Get PDF
    Electronic medical records (EMRs) have become a key player in the healthcare ecosystem contributing to the assessment of ailments, the choice of the treatment avenue, and the delivery of services. However, there is consideration of EMR storage whereby centralized storage leads to increased security and privacy issues in the patient’s record. In this paper, we proposed a blockchain and interplanetary file system (IPFS) based prototype model for EMR management. It provides a smart contract-enabled decentralized storage platform where healthcare data security, availability, and access management are prioritized. This model also employs cryptographic techniques to protect sensitive healthcare data. Finally, the model is evaluated in a realistic scenario. The experimental results demonstrate that compared to the current systems, the proposed prototype model outperforms them in terms of efficiency, privacy, and security

    Does empathy and awareness of bullying affect the performance of Moroccan students in PISA?

    Get PDF
    Socioemotional skills, such as empathy and bullying awareness, play a pivotal role in shaping students' personal and academic development. These skills are increasingly recognized as critical factors influencing educational outcomes, particularly in addressing challenges like bullying that can hinder learning. This study examines the impact of empathy and bullying awareness on the academic performance of Moroccan students, using data from the 2018 Programme for International Student Assessment (PISA). To ensure robust causal inference in high-dimensional data, the double/debiased machine learning (DML) technique is employed. The findings reveal that higher levels of empathy and awareness of bullying significantly enhance performance across reading, mathematics, and science, with the most notable improvements observed in reading. These results remain consistent across various demographic and socioeconomic groups, highlighting their robustness. The study underscores the importance of integrating socioemotional learning into educational practices to foster academic success and create supportive school environments. By contributing to the growing evidence on non-cognitive skills in education, this research offers valuable insights for educators and policymakers seeking to improve student outcomes

    Scaling of Facebook architecture and technology stack with heavy workload: past, present and future

    Get PDF
    Leading social media Facebook has improved its architecture to meet user needs. Facebook has improved its systems to handle millions of users with heavy workloads and large datasets using innovative architectural solutions and adaptive strategies. The study examines Facebook’s architectural and technological advances in heavy workload and big data. To understand how Facebook scaled with a growing user base and data volume, history and system architecture will be examined. It will also examine how cloud storage and high-performance computing optimize resource utilization and maintain performance during peak user activity. Facebook is managing big data and heavy workloads with new technologies like the hybrid communication model that uses PULL and PUSH strategies for real-time messaging. Facebook switched from HBase to MyRocks for message storage to improve performance as data grew. Architectural scaling and technology stack research must prioritize data storage innovations and optimized communication protocols to handle heavy workloads and big data. The messenger Sync protocol reduces network congestion and improves synchronous communication, reducing resource consumption and maintaining performance under high load. High-performance computing (HPC) and cloud storage should be studied together to support complex compute workflows. This convergence may improve large-scale application infrastructures and encourage interdisciplinary collaboration for scalable and resilient systems

    Efficient design of approximate carry-based sum calculating full adders for error-tolerant applications

    Get PDF
    Approximate computing is an innovative circuit design approach which can be applied in error-tolerant applications. This strategy introduces errors in computation to reduce an area and delay. The major power-consuming elements of full adder are XOR, AND, and OR operations. The sum computation in a conventional full adder is modified to produce an approximate sum which is calculated based on carry term. The major advantage of a proposed adder is the approximation error does not propagate to the next stages due to the error only in the sum term. The proposed adder was coded in verilog HDL and verified for different bit sizes. Results show that the proposed adder reduces hardware complexity with delay requirements

    A survey on ransomware detection using AI models

    Get PDF
    Data centers and cloud environments are compromised as they are at great risk from ransomware attacks, which attack data integrity and security. Through this survey, we explore how AI, especially machine learning and deep learning (DL), is being used to improve ransomware detection capabilities. It classifies ransomware types, highlights active groups such as Akira, and evaluates new DL techniques effective at real-time data analysis and encryption handling. Feature extraction, selection methods, and essential parameters for effective detection, including accuracy, precision, recall, F1-score and receiver operating characteristic (ROC) curve, are identified. The findings point to the state of the art and the state of the art in AI based ransomware detection and underscore the need for robust, real-time models and collaborative research. The statistical and graphical analyses help researchers and practitioners understand existing trends and directions for future development of efficient ransomware detection systems to strengthen cybersecurity in data centers and cloud infrastructures

    Exploring user feedback on sharia FinTech apps: a Netnographic study in Indonesia

    Get PDF
    The rapid growth of Sharia FinTech applications in Indonesia has raised questions about user perceptions and experiences. This study employs a Netnographic approach to explore user feedback on Sharia FinTech apps through reviews posted on the Google Play store. The research analyzed 129 reviews from five Sharia FinTech applications between July and December 2023. The study reveals that 55.10% of users expressed overall satisfaction with the apps, appreciating their ease of use and Sharia compliance. However, significant challenges were identified, with 37.50% of negative reviews related to payment delays and interest issues. Other concerns included system errors, account creation difficulties, and poor customer service. These findings highlight the complex dynamics of user experiences with Sharia FinTech applications, demonstrating a generally positive reception but also pointing to critical areas for improvement. The study contributes to the understanding of Sharia FinTech adoption in Indonesia and provides valuable insights for application developers and Islamic microfinance institutions to enhance their services and address user concerns

    An IoT-based approach for microclimate surveillance in greenhouse environments

    Get PDF
    As the demand for efficient and cost-effective greenhouse microclimate surveillance has increased, we developed a microclimate surveillance system using microcontroller technology that automatically collects temperature and relative humidity data and transmits it to a cloud server for remote surveillance and data analysis. 1971 microclimate data points were acquired over a 20-day evaluation period, providing insights into greenhouse environmental conditions with a negative linear regression between air temperature and relative humidity within the greenhouse and an R-squared of 0.73. This illustrates the system’s ability to record and quantify environmental conditions data. Additionally, we derived a predictive model to manage microclimate conditions using the regression formula y = -6.12X + 238.33, where X represents the air temperature and y represents the relative humidity. All the results show that the acquired data can be used to make decisions to optimize plant growth. The prototype we developed can be an alternative option for small and medium-sized farms that need a greenhouse surveillance system to improve operational efficiency and reduce surveillance costs. The system can be further developed by implementing additional sensors to monitor light intensity, wind speed, or soil moisture and further data analysis models to optimize greenhouse management

    Enhancing credit card security using RSA encryption and tokenization: a multi-module approach

    Get PDF
    The security of credit card information remains a critical challenge, with existing methods often falling short in safeguarding data integrity, confidentiality, and privacy. Traditional approaches frequently transmit sensitive information in unencrypted formats, exposing it to significant risks of unauthorized access and breaches. This study introduces a robust security framework that leverages Rivest-Shamir-Adleman (RSA) encryption and tokenization to protect credit card information during transactions. The proposed solution is structured into three key modules: merchant, tokenization, and token vault. The merchant module works in tandem with the tokenization module to generate transaction validation tokens and securely transmit credit card data. The token vault, maintained on a secure cloud storage platform, acts as a restricted-access database, ensuring that sensitive information is encrypted and inaccessible to unauthorized entities. Through this multi-layered approach, the study demonstrates a significant enhancement in the security of credit card transactions, effectively mitigating the risks of data breaches and unauthorized disclosures. The findings indicate that the proposed method not only addresses existing security vulnerabilities but also offers a scalable and efficient solution for protecting financial transactions

    443

    full texts

    450

    metadata records
    Updated in last 30 days.
    International Journal of Informatics and Communication Technology (IJ-ICT) is based in Indonesia
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇