Current Issue
Editor in Chief
Dr. Juan Manuel Corchado Rodríguez
Abbreviation of Journal : Orient. J. Comp. Sci. & Technol.
DOI Prefix : 10.13005
Frequency : Quarterly (March, June, September, December)
Published by : Oriental Scientific Publishing Company
Open Access

Latest Articles - Volume 12 No. 2

  • An Assessment of the Effectiveness of E-Learning in AMA Olongapo Campus

    Froilan D. Mobo* and Gesswein O. Sabado

    [ View:    Abstract ] [ HTML Full Text]

    E-learning system is designed to aid students build their comprehension towards their respected academic subjects to make their experience in learning more nourishing and engaging. The researchers decided to conduct this study to be au fait the benefits of online education and how the students accept the change this innovation gave. A survey questionnaire was distributed to the enrolled college students of AMA Computer College Year 2018-2019 to make the research more reliable, accurate and at the same time tackle the benefits of the said innovated education system. The said research was a success in defining what helps the students in their education as well as the improvement it can do in terms of catering different subjects and assessing the learners’ competency. The researchers recommend the future researchers to further expand and elaborate the topic in order to enhance the study. To further extend the scope and distribute further information regarding the tackled study.

    Hide Abstract

  • Copy Move Image Forgery Detection with Exact Match Block Based Technique

    Priyanka Arora* and Derminder Singh

    [ View:    Abstract ] [ HTML Full Text]

    Digital images are a momentous part of today’s digital communication. It is very easy to manipulate digital images for hiding some useful information by image rendering tools such as Adobe Photoshop, Microsoft Paint etc. The common image forgery which is easy to carry out is copy-move in which some part of an image is copied and pasted on another part of the same image to hide the important information. In this paper we propose an algorithm to spot the copy-move forgery based on exact match block based technique. The algorithm works by matching the regions in image that are equivalent by matching the small blocks of size b b. The program is tested for 45 images of mixed image file formats by considering block sizes 2, 4, 6, 8, 10, 12, 14, and 16.? It is observed from the experimental results that the proposed algorithm can detect copy-move image forgery in TIF, BMP and PNG image formats only. Results reveal that as the block size increases, execution time (time taken by CPU to display output) also increases but the number of detected forged images increases till block size 10 and attains saturation thereafter. Consequently block size should be set to 10 for getting good results in terms of less execution time.

    Hide Abstract

  • Controlling the Speed of Conveyor Belt using Python – Raspberry Pi 3B+

    M. Kamalakannan*, K. Devadharshini

    [ View:    Abstract ] [ HTML Full Text]

    In food processing industry, there arises a need to control a conveyor belt. currently industries are very necessary to use material handling system for to move materials from one place to another place continuously and to minimize operations time. Stepper Motor is suitable for controlling conveyor because of its high accuracy positioning over a short distance and provide high torque even at low speeds and it is also offer very low vibration and a wide range of features. This paper is focused on controlling the speed of the conveyor belt through the speed of stepper motor using the micro processor namely, Raspberry Pi 3B+’s (RP 3B+) GPIOs (General Purpose Input Output) and it can be generate sequence of control signals on the GPIO pins of RP 3B+. Interfacing the stepper motor with RP 3B+ using python programming language. The method is explained with the results of changing the weights the speed level is reduced through time variation on the conveyor belt and the model of working Conveyor belt with Stepper motor controlled by python and RP 3B+ with Easy Driver(A3967).

    Hide Abstract

    Views 
       PDF Download PDF Downloads: 30
  • 博電競菠菜平臺:A Review on Cyber Security and the Fifth Generation Cyberattacks

    A. Saravanan1*, S. Sathya Bama2

    [ View:    Abstract ] [ HTML Full Text]

    Cyber attacks have become quite common in this internet era. The cybercrimes are getting increased every year and the intensity of damage is also increasing. providing security against cyber-attacks becomes the most significant in this digital world. However, ensuring cyber security is an extremely intricate task as requires domain knowledge about the attacks and capability of analysing the possibility of threats. The main challenge of cybersecurity is the evolving nature of the attacks. This paper presents the significance of cyber security along with the various risks that are in the current digital era. The analysis made for cyber-attacks and their statistics shows the intensity of the attacks. Various cybersecurity threats are presented along with the machine learning algorithms that can be applied to cyber attacks detection. The need for the fifth generation cybersecurity architecture is discussed.

    Hide Abstract

    Views 
       PDF Download PDF Downloads: 27
  • Justifying IT Investment: Extension of a Model using a Case Study from Jordan

    Emad Abu-Shanab1, Qais Hammouri2*, Mai Tarik Al-Sebae3

    [ View:    Abstract ] [ HTML Full Text]

    Investing in information technology is a requirement for enterprises to sustain their competitive advantage in a market that is described as changing and global. IT is a very important resource for enterprises to improve their organizational performance, but requires some justification for its costs and burdens. This study utilized an existing model and applied it on a case in Jordan by analyzing and exploring the implications of investing in IT projects. The case used is the Japan Tobacco International, where a survey was used to collect response from JTI personnel and the documents available on their portal. Two models are proposed to improve our understanding of topic and set the stage for future research. The detailed results of this study are reported with conclusions at the end.

    Hide Abstract

    Views 
       PDF Download PDF Downloads: 28
  • An Edge Computing Tutorial

    Inés Sittón-Candanedo1* and Juan Manuel Corchado1,2,3,4

    [ View:    Abstract ] [ HTML Full Text]

    Edge Computing (EC) is an emerging technology that has made it possible to process the large volume of data generated by devices connected to the Internet, through the Internet of objects (IO). The article provides an introduction to EC and its definition. The integration of EC in those contexts would imply an optimisation of the processes that are normally executed in a cloud computing environment, bringing considerable advantages. The main contribution of EC is a better pre-processing of the data collected through devices before they are sent to a central server or the cloud.

    Hide Abstract

    Views 
       PDF Download PDF Downloads: 46