JOURNAL OF INFORMATION SYSTEMS & INFORMATION TECHNOLOGY (JISIT)

Call For Papers. Vol.6 No.2 - 2021

Volume 06. Issue 01.

Early Diagnosis of the Learning Disabilities in Kids Using a Computer Game-Based Solution
Rohan Samarasinghe and Gamini Abeyasinghe

This paper presents the extracted computational techniques and outcomes of software solution developed for learning disability evaluation in kids age from 3 years to 6 years. Learning disabilities are neurological disorders which affects brain functions. It is efficient to diagnose them in early stages. The developed application screens the learning disabilities by using gamification module. This game module contains tasks which are based on symptoms of these disabilities. By evaluating children’s interactions to the tasks, this game module evaluates the child condition and provides the results to respective parties. Background problem of these disabilities, clinical diagnosing methods and criteria and methodology used for development of this solution is explicated by this paper. Ultimately, the proof testimonies of concepts are set forth by summarizing the outcomes obtained from standard statistical concepts.
Keywords:Learning disability evaluation, Computer-based games, Dyslexia, Dyspraxia, Dysgraphia, Dyscalculia

01-16
PDF

An Analysis of Security Issues in Cloud Databases
Muhammed Rijah

Cloud database is a kind of database service that is built, deployed and accessed through a cloud environment. Cloud database significantly stands among the next generation’s database technologies. Security and privacy of data in cloud databases is mostly taken into account as it stores, manages and share a wider volume of complex data. Hence, it is highly constrained into the Cloud Computing model. Even though, cloud computing has brought a new perspective towards the IT industry, we are not assuring 100% security and privacy of the data stored as it sometimes lacks with awareness and control of data, due to issues with transaction log of data and malicious acts. Furthermore, ethical problems such as trust issues from tenants arise due to the difficulty in outsourcing information without the barriers and attacks of a third-party user. Therefore, in cloud database has been contained security and privacy concerns associated with cloud database and how the services provided by a cloud database could be improved, will be discussed throughout this paper.
Keywords: Cloud Database, Privacy, Security

17-27
PDF

Simulation of Network Layer-Based Security Attacks in a Mobile Ad-hoc Network
Uthumansa Ahamed and Shantha Fernando

The opportunistic nature of the Mobile Ad-hoc Network (MANET) helps to deploy instantly where it is needed. MANET is the best solution as a network where infrastructure networks are unavailable. The fundamental characters of these networks are the reason for the vast variety of security attacks on them. Simulators provide a better platform to conduct researches, though faulty designs of simulations provide incorrect results. Therefore, the issue remains available for a valid solution. We designed the study to investigate the network layer-based security attacks. The study is detailed information of different attack simulations. Network Simulator 2 (NS2) was used. Ad-hoc On-demand Vector (AODV) routing protocol is used for the study. The Blackhole, Grayhole, and Wormhole attacks are simulated. The impacts of these attacks on the network performance were evaluated with Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time of an Intermediate node (SPTIN). The active attacks cause more damages to the network performance than passive attacks do. Moreover, the results proved that the impacts of an attack depend on the design of the attack. The incorrect design provides faulty results which lead to ill decisions. We are expecting to extend the simulation of different security attacks based on different simulators.
Keywords: : Blackhole, Grayhole, Security, Simulation, Wormhole

28-42
PDF

SMART MEDIA PLAYER WITH EYE BLINKING CONTROL
Mohamed Aliyar Thajun Najaah and Mohammed Ibrahim Mohammed Ferozee

When we are playing a video on our laptop or Mobile or PC and if someone calls us, we have to get away from the device or simply look away from it and sometimes we may sleep in the middle while watching a video and we have to drag back to see the video where we have left. As a solution to overcome this issue we can build a smart media player which can be able to play or pause the media stream while the human face is detecting in front of the screen and while the persons eyes are opening. It detects the Human face and Eyes and for the time it detecting an open eye/eyes video will be play else video will be pause automatically. The system runs continuously while monitoring whether a human eye open or not and the player starts to running as soon as it is detecting the eyes again and which keeps running as long as it is detecting the eyes without the interruption. This can be accomplished by using the web camera which is on the top of the computer. The player pauses as soon as the human eyes not completely seen. If there is no human face detected then the player will be stopped immediately. We are using Image Processing techniques and Open CV haar-cascade algorithms and haar- features for performing face and eye detection in real time. In addition to controlling media player by eye blinking the player offers all the basic features of a normal media player and it is generating a statistics report with performance analysis of the Smart Media Player. As per the performance analysis system has achieved ~6 frames per second and ~6 faces per second.
Keywords: Media Player, Face Detection, Eye Detection, Web Camera, Image Processing, Haar-cascade, Algorithms, Haar-features, Accuracy, Open CV

43-60
PDF

A Review of IT Governance and IT Management in the Context of Business Value of IT
Aboobucker Ilmudeen

The business value of IT has become one of the topmost concerns among scholars and industry practitioners. Enterprises are taking much effort for planning, evaluating, controlling, and aligning IT strategy with business strategy to create IT business value. Hence, the IT governance is aimed to bring alignment between IT strategy and business strategy while generating business value from IT investment. Similarly, the IT management has received greater attention among the business and IT executives as it proves the effectiveness and add business value for IT investment to business enterprises. This study used Web of Science core collection database to extract the dataset for the terms IT governance, IT management, and business value of IT. The bibliometric analysis is conducted for the 462 extracted publications in the dataset. The analysis includes various mapping by focusing co-authorship, co-occurrence, citation, bibliographic coupling, and co-citation. A comprehensive demonstration with mapping is presented to clearly explain each bibliometric map.
Keywords: IT governance, IT management, Business value, Bibliometric analysis.

61-76
PDF

An Analysis on the Adoption of Software as a Service (SaaS) by the students of the State Universities in the North and Eastern Part of Sri Lanka
Mohideen Bawa Mohamed Irshad

Software as Service (SaaS) as an option of cloud computing has been in use as one of the most advanced technology innovations by many users and organizations. Due to its scalability and network-based operation, SaaS provides many advantages for students and teachers in the universities for academic purpose without costly investment on IT infrastructure and expertise. The research aims at analyzing the adoption of SaaS using a theoretical framework by the students in the state universities located in the North and Eastern part of Sri Lanka and the PLS-SEM was used as the analytical tool for this study. The theoretical framework was developed based on the original Technology Acceptance Model (TAM) [1]. The data were obtained from 300 undergraduates of three state universities using a structured questionnaire. The collected data were analyzed utilizing the Smart PLS 3.2.7 with consistent PLS algorithm (PLSc). The results revealed that perceived ease of use, perceived usefulness, and perceived enjoyment directly influenced the SaaS adoption. It was also identified that there was specific indirect effect with the inclusion of perceived enjoyment as a mediating variable to SaaS adoption and it had significant effect and the research contributes to knowledge in the areas of Information Technology adoption studies.
Keywords: Perceived Ease of Use, Perceived Usefulness, Perceived Enjoyment, SaaS, TAM

77-92
PDF