Pub Date : 2022-01-28DOI: 10.14704/web/v19i1/web19383
N. Nurwita, K. Krisnaldy, Shelby Virby, Aria Aji Priyanto, Reza Octovian, Dijan Mardiati, Hendri Prasetyo, Robbi Rahim
The purpose of this research is to analyze using artificial neural network techniques in predicting the realization of provincial government spending in Indonesia according to the type of expenditure with Back-Propagation. This research needs to be done because it can be seen from the side of realization of provincial government spending in Indonesia that there can be a surplus and a deficit. Therefore, it is necessary to make predictions as an effort to address this. The data comes from the publication by the Central Statistical Agency of the provincial government of financial statistics (BPS). Financial provincial government data was collected through local government financial surveys from provincial government agencies in Indonesia. The analysis process uses the help of Rapidminer software and is validated with K-Fold values from 2 to 10. The data is divided into training data and testing data. Training data is data from 2016-2018 and testing data is data from 2017-2019. Several architectural models were tested namely '3-2-1; 3-5-1; 3-10-1; 3-5-10-1 'to obtain an accurate prediction by considering the value of Root Mean Square Error (RMSE). The results of the back-propagation analysis state that the 3-5-1 model is the best model with an RMSE value of 0.027 at k-fold = 9 for training data and an RMSE value of 0.035 for testing data. These results confirm that the back-propagation algorithm can be implemented in this case.
{"title":"Forecasting Provincial Government Expenditures in Indonesia using Artificial Neural Network","authors":"N. Nurwita, K. Krisnaldy, Shelby Virby, Aria Aji Priyanto, Reza Octovian, Dijan Mardiati, Hendri Prasetyo, Robbi Rahim","doi":"10.14704/web/v19i1/web19383","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19383","url":null,"abstract":"The purpose of this research is to analyze using artificial neural network techniques in predicting the realization of provincial government spending in Indonesia according to the type of expenditure with Back-Propagation. This research needs to be done because it can be seen from the side of realization of provincial government spending in Indonesia that there can be a surplus and a deficit. Therefore, it is necessary to make predictions as an effort to address this. The data comes from the publication by the Central Statistical Agency of the provincial government of financial statistics (BPS). Financial provincial government data was collected through local government financial surveys from provincial government agencies in Indonesia. The analysis process uses the help of Rapidminer software and is validated with K-Fold values from 2 to 10. The data is divided into training data and testing data. Training data is data from 2016-2018 and testing data is data from 2017-2019. Several architectural models were tested namely '3-2-1; 3-5-1; 3-10-1; 3-5-10-1 'to obtain an accurate prediction by considering the value of Root Mean Square Error (RMSE). The results of the back-propagation analysis state that the 3-5-1 model is the best model with an RMSE value of 0.027 at k-fold = 9 for training data and an RMSE value of 0.035 for testing data. These results confirm that the back-propagation algorithm can be implemented in this case.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43897297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19188
Sabah Salman Mutashar
This research paper aimed to clarify the impact of the Corona pandemic on joint stock companies, and to determine the role of corporate governance principles in limiting its effects. The results showed that the Corona pandemic affected companies operating in Iraq, as it affected all facilities of economic, social and health life and all countries of the world, which led to disruption in corporate activity, and also showed the role of governance principles in limiting the impact of the Corona pandemic on companies. A set of recommendations have been developed, including the need to adhere to the procedures determined by the competent authorities to reduce the effects of the Corona pandemic, and to enhance communication skills between companies and stakeholders using modern communication techniques and the Internet.
{"title":"The Impact of the Corona Pandemic on Companies and the Role of Governance Principles in Reducing them: An Analytical Study","authors":"Sabah Salman Mutashar","doi":"10.14704/web/v19i1/web19188","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19188","url":null,"abstract":"This research paper aimed to clarify the impact of the Corona pandemic on joint stock companies, and to determine the role of corporate governance principles in limiting its effects. The results showed that the Corona pandemic affected companies operating in Iraq, as it affected all facilities of economic, social and health life and all countries of the world, which led to disruption in corporate activity, and also showed the role of governance principles in limiting the impact of the Corona pandemic on companies. A set of recommendations have been developed, including the need to adhere to the procedures determined by the competent authorities to reduce the effects of the Corona pandemic, and to enhance communication skills between companies and stakeholders using modern communication techniques and the Internet.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45163400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19199
Basheer Alwan Hamd
The role of monetary policy and its impact in activation of the real sector comes by the financial and monetization role of investment, which is now fully mature in countries with well economic thriving. The problem of the research potentiates that the policy has limited effect in the real sector due to reluctance of due to security cause and monetary cause like investment in monetary sector due to increase in the interest rate or speculation in the selling and buying the foreign currency (dollar). The research finds many recommendations which are the most important as follows: 1. Follow monetary policy with specific character as it contains facilities to lower the currency rate to the sector. 2. Support the monetary policy measures by following the commercial protective policy of the national product.
{"title":"The Role of Monetary Policy in Activation of the Real Sector in Iraq","authors":"Basheer Alwan Hamd","doi":"10.14704/web/v19i1/web19199","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19199","url":null,"abstract":"The role of monetary policy and its impact in activation of the real sector comes by the financial and monetization role of investment, which is now fully mature in countries with well economic thriving. The problem of the research potentiates that the policy has limited effect in the real sector due to reluctance of due to security cause and monetary cause like investment in monetary sector due to increase in the interest rate or speculation in the selling and buying the foreign currency (dollar). The research finds many recommendations which are the most important as follows: 1. Follow monetary policy with specific character as it contains facilities to lower the currency rate to the sector. 2. Support the monetary policy measures by following the commercial protective policy of the national product.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45338822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19106
N. Haydarova
The article analyzes characters and features of their creation in Uzbek animated films of the times of independence. It also lists the reasons for referring to the characters of the past in modern Uzbek animated films in recent years. And also provided suggestions for creating an image that meets the requirements of the time in today's modern process.
{"title":"Problems of Character Creation in Animation Films of Uzbekistan","authors":"N. Haydarova","doi":"10.14704/web/v19i1/web19106","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19106","url":null,"abstract":"The article analyzes characters and features of their creation in Uzbek animated films of the times of independence. It also lists the reasons for referring to the characters of the past in modern Uzbek animated films in recent years. And also provided suggestions for creating an image that meets the requirements of the time in today's modern process.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48500621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19143
J. E. Postigo-Zumarán, Christian Esteban Gómez Carrión, Ruth Asela Saravia Alviar, Milagro Baldemar Quiroz Calderón, D. Arias-Chávez
The objective of this study is to characterize the world scientific production on education and COVID-19 between the months of January 2020 to September 2021. A bibliometric study was carried out in five databases (Scopus, Web of Science, Google Academic, Microsoft Academic and Crossref) from which a universe of 5005 articles was extracted. The bibliometric indicators were analyzed with the help of the Publish or Perish v. 7.19 and the same analytical software of the chosen databases. Regarding the most cited article published in the analyzed databases, the one entitled "Medical Student Education in the Time of COVID-19" stands out, which received 419 citations in the Scopus database, 368 in Web of Science, 442 in Crossref, 870 in Google Scholar and 702 in Microsoft Academic. Regarding the authors with the highest scientific production on the subject, Maria Assuncao Flores stands out with 5 publications on the Web of Science and Francisco José García-Peñalvo with 5 articles indexed in the Scopus database. Regarding the journals with the highest number of articles on education and COVID-19, Sustainability stands out. These results show that the scientific production referring to education and Covid-19 confirms the radical change generated in education at all levels by the pandemic and the increase in scientific production to try to explore and describe the changing situation resulting from the pandemic in education. Regarding the journals with the highest number of articles on education and COVID-19, Sustainability stands out. These results show that the scientific production referring to education and COVID-19 confirms the radical change generated in education at all levels by the pandemic and the increase in scientific production to try to explore and describe the changing situation resulting from the pandemic in education. Regarding the journals with the highest number of articles on education and COVID-19, Sustainability stands out. These results show that the scientific production referring to education and Covid-19 confirms the radical change generated in education at all levels by the pandemic and the increase in scientific production to try to explore and describe the changing situation resulting from the pandemic in education.
本研究的目的是描述2020年1月至2021年9月期间世界教育和新冠肺炎科学生产的特点。在五个数据库(Scopus、Web of Science、Google Academic、Microsoft Academic和Crossref)中进行了文献计量学研究,从中提取了5005篇文章。在Publish或Perish v.7.19和所选数据库的相同分析软件的帮助下,对文献计量指标进行了分析。关于分析数据库中发表的被引用最多的文章,题为“新冠肺炎时代的医学生教育”的文章脱颖而出,在Scopus数据库中被引用419次,在Web of Science中被引用368次,Crossref中被引用442次,Google Scholar中被引用870次,在Microsoft Academic中被引用702次。关于在该主题上科学成果最高的作者,Maria Assuncao Flores在科学网上发表了5篇文章,Francisco JoséGarcía-Peñalvo在Scopus数据库中发表了5文章。关于教育和新冠肺炎文章数量最多的期刊,可持续性脱颖而出。这些结果表明,涉及教育和新冠肺炎的科学生产证实了疫情导致的各级教育的根本变化,以及科学生产的增加,以试图探索和描述疫情导致的教育变化情况。关于教育和新冠肺炎文章数量最多的期刊,可持续性脱颖而出。这些结果表明,与教育和新冠肺炎有关的科学生产证实了疫情导致各级教育发生的根本变化,以及科学生产的增加,以试图探索和描述疫情导致的教育变化情况。关于教育和新冠肺炎文章数量最多的期刊,可持续性脱颖而出。这些结果表明,涉及教育和新冠肺炎的科学生产证实了疫情导致的各级教育的根本变化,以及科学生产的增加,以试图探索和描述疫情导致的教育变化情况。
{"title":"World Scientific Production on Education and COVID 19: A Bibliometric Analysis","authors":"J. E. Postigo-Zumarán, Christian Esteban Gómez Carrión, Ruth Asela Saravia Alviar, Milagro Baldemar Quiroz Calderón, D. Arias-Chávez","doi":"10.14704/web/v19i1/web19143","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19143","url":null,"abstract":"The objective of this study is to characterize the world scientific production on education and COVID-19 between the months of January 2020 to September 2021. A bibliometric study was carried out in five databases (Scopus, Web of Science, Google Academic, Microsoft Academic and Crossref) from which a universe of 5005 articles was extracted. The bibliometric indicators were analyzed with the help of the Publish or Perish v. 7.19 and the same analytical software of the chosen databases. Regarding the most cited article published in the analyzed databases, the one entitled \"Medical Student Education in the Time of COVID-19\" stands out, which received 419 citations in the Scopus database, 368 in Web of Science, 442 in Crossref, 870 in Google Scholar and 702 in Microsoft Academic. Regarding the authors with the highest scientific production on the subject, Maria Assuncao Flores stands out with 5 publications on the Web of Science and Francisco José García-Peñalvo with 5 articles indexed in the Scopus database. Regarding the journals with the highest number of articles on education and COVID-19, Sustainability stands out. These results show that the scientific production referring to education and Covid-19 confirms the radical change generated in education at all levels by the pandemic and the increase in scientific production to try to explore and describe the changing situation resulting from the pandemic in education. Regarding the journals with the highest number of articles on education and COVID-19, Sustainability stands out. These results show that the scientific production referring to education and COVID-19 confirms the radical change generated in education at all levels by the pandemic and the increase in scientific production to try to explore and describe the changing situation resulting from the pandemic in education. Regarding the journals with the highest number of articles on education and COVID-19, Sustainability stands out. These results show that the scientific production referring to education and Covid-19 confirms the radical change generated in education at all levels by the pandemic and the increase in scientific production to try to explore and describe the changing situation resulting from the pandemic in education.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43386387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19328
A. Y. Ahmad, Asma’a Y. Hammo
Cloud computing technology has grown and expanded widely in recent years. Cloud computing is a distributed system that may be on physical or virtual machines. Because of the ease of working in the cloud, its ease of use, it's being an interactive model and a highly profitable business model, many users have used it. This led to an increase in the load on it, and thus the overload has become a problem that must be solved. Many algorithms have been proposed to balance the load on cloud. The essential are three: Round robin, Equally Spread Current Execution (ESCE), and Throttled. This research investigates the performance of those algorithms with increasing of number of users. Previous researches did not take into account the increasing of users. CloudAnalyst simulation tool is used for this comparison. The comparison is done according to DC (Data Centre) processing time, overall total response time (ORT), processing cost, and hourly data center. It was found that initially with a certain settings and for a certain number of users, there may be no difference that can be mentioned in performance between the three algorithms. Then the improvement in performance increases with the increasing number of users. Throttled algorithm showed best performance in the average of ORT with increasing number of users.
{"title":"A Comparative Study of the Performance of Load Balancing Algorithms Using Cloud Analyst","authors":"A. Y. Ahmad, Asma’a Y. Hammo","doi":"10.14704/web/v19i1/web19328","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19328","url":null,"abstract":"Cloud computing technology has grown and expanded widely in recent years. Cloud computing is a distributed system that may be on physical or virtual machines. Because of the ease of working in the cloud, its ease of use, it's being an interactive model and a highly profitable business model, many users have used it. This led to an increase in the load on it, and thus the overload has become a problem that must be solved. Many algorithms have been proposed to balance the load on cloud. The essential are three: Round robin, Equally Spread Current Execution (ESCE), and Throttled. This research investigates the performance of those algorithms with increasing of number of users. Previous researches did not take into account the increasing of users. CloudAnalyst simulation tool is used for this comparison. The comparison is done according to DC (Data Centre) processing time, overall total response time (ORT), processing cost, and hourly data center. It was found that initially with a certain settings and for a certain number of users, there may be no difference that can be mentioned in performance between the three algorithms. Then the improvement in performance increases with the increasing number of users. Throttled algorithm showed best performance in the average of ORT with increasing number of users.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41626109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19043
P. Mittal, C. Bhatnagar
Optical Coherence Tomography (OCT) is a developing medical scanning technique proposing non- protruding scanning with high resolution for biological tissues. It is extensively employed in optics to accomplish investigative scanning of the eye, especially the retinal layers. Various medical research works are conducted to evaluate the usage of Optical Coherence Tomography to detect diseases like DME. The current study provides an innovative, completely automated algorithm for disease detection such as DME through OCT scanning. We performed the classification and segmentation for the detection of DME. The algorithm used employed HOG descriptors as feature vectors for SVM based classifier. Cross-validation was performed on the SD-OCT data sets comprised of volumetric images obtained from 20 people. Out of 10 were normal, while 10 were patients of diabetic macular edema (DME). Our classifier effectively detected 100% of cases of DME while about 70% cases of healthy individuals. The development of such a notable technique is extremely important for detecting retinal diseases such as DME.
{"title":"Detection of DME by Classification and Segmentation Using OCT Images","authors":"P. Mittal, C. Bhatnagar","doi":"10.14704/web/v19i1/web19043","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19043","url":null,"abstract":"Optical Coherence Tomography (OCT) is a developing medical scanning technique proposing non- protruding scanning with high resolution for biological tissues. It is extensively employed in optics to accomplish investigative scanning of the eye, especially the retinal layers. Various medical research works are conducted to evaluate the usage of Optical Coherence Tomography to detect diseases like DME. The current study provides an innovative, completely automated algorithm for disease detection such as DME through OCT scanning. We performed the classification and segmentation for the detection of DME. The algorithm used employed HOG descriptors as feature vectors for SVM based classifier. Cross-validation was performed on the SD-OCT data sets comprised of volumetric images obtained from 20 people. Out of 10 were normal, while 10 were patients of diabetic macular edema (DME). Our classifier effectively detected 100% of cases of DME while about 70% cases of healthy individuals. The development of such a notable technique is extremely important for detecting retinal diseases such as DME.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41526633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19276
L. Hasan
There are many algorithms for optimization meta heuristic have developed on swarm intelligence-based that depending in the nature of design. One of them, Bat Algorithm (BA), is based on the "echolocation behaviors" of bats. Micro bat used echolocation to specify the prey, avoid obstacles and locate their roosting crevices in the dark. Another algorithm is Artificial Bee Colony (ABC) is a new optimization algorithm which depend on the "bee behavior" towards colony to search about the food. In this paper, presents the BA and ABC algorithms steps for solving TSP then try to search about best solution depending on the parameters for both algorithms. The results show the ABC is best performance than BA for finding the best tour quickly compared with other by consuming time lesser than by effecting on the convergence speed for searching the solution. Furthermore, The BA required more parameters to achieve each output efficiently and need using improved control strategy to balance between exploitation and exploration that consuming more time for it.
{"title":"Artificial Bee Colony Algorithm and Bat Algorithm for Solving Travel Salesman Problem","authors":"L. Hasan","doi":"10.14704/web/v19i1/web19276","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19276","url":null,"abstract":"There are many algorithms for optimization meta heuristic have developed on swarm intelligence-based that depending in the nature of design. One of them, Bat Algorithm (BA), is based on the \"echolocation behaviors\" of bats. Micro bat used echolocation to specify the prey, avoid obstacles and locate their roosting crevices in the dark. Another algorithm is Artificial Bee Colony (ABC) is a new optimization algorithm which depend on the \"bee behavior\" towards colony to search about the food. In this paper, presents the BA and ABC algorithms steps for solving TSP then try to search about best solution depending on the parameters for both algorithms. The results show the ABC is best performance than BA for finding the best tour quickly compared with other by consuming time lesser than by effecting on the convergence speed for searching the solution. Furthermore, The BA required more parameters to achieve each output efficiently and need using improved control strategy to balance between exploitation and exploration that consuming more time for it.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41460594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19017
Mahdi S. Almhanna, F. S. Al-Turaihi
Incoming Information Technology (IT) services appear with cloud computing perspectives that provide users access to IT resources anytime, anywhere. These services should be good enough for the user with some advantages for the cloud service provider. To achieve this goal, you must face many challenges, load balancing is one of these challenges. The most convenient option for some functions does not mean that option is always a good choice to achieve the entire work all the time. Resource overload and bad traffic that can lead to time exhaustion should be avoided, this can be obtained through appropriate load balancing mechanisms. This paper offers a simple solution for choosing the preferred server to distribute functions based on minimum bandwidth consumption.
{"title":"Efficient Bandwidth Management for Load Balancing in Grid Computing","authors":"Mahdi S. Almhanna, F. S. Al-Turaihi","doi":"10.14704/web/v19i1/web19017","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19017","url":null,"abstract":"Incoming Information Technology (IT) services appear with cloud computing perspectives that provide users access to IT resources anytime, anywhere. These services should be good enough for the user with some advantages for the cloud service provider. To achieve this goal, you must face many challenges, load balancing is one of these challenges. The most convenient option for some functions does not mean that option is always a good choice to achieve the entire work all the time. Resource overload and bad traffic that can lead to time exhaustion should be avoided, this can be obtained through appropriate load balancing mechanisms. This paper offers a simple solution for choosing the preferred server to distribute functions based on minimum bandwidth consumption.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49269262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-20DOI: 10.14704/web/v19i1/web19115
A. S. Jamil, N. Hassan, R. A. Azeez
Individual privacy protection is regarding a subject in surveillance and security areas. Protection of people's faces in image in linking with complex info, abused cases, involvement, and others on public broadcasting media and social networks are very important. Partial encryption human face is selected to reduce the computational requirements for huge volumes of image data and reducing the computational processing time required to conduct the entire image. In this paper, a new fast algorithm is proposed to encrypt partially human face, at first human face is detected using vole and jones algorithm, features points are extracted from face region to be encrypted, these features points are determined by using Canny edge detector since Canny edge algorithm considers the best edge detector with decent localization properties marked edges areas similar to the edges in the actual image as possible, i.e. that it is an essential feature. Furthermore, the importance of the key for the encryption process and its significant role in increasing and improving security, a new method for generating key is proposed making them resistant to attackers. The suggested encryption algorithms produced good results in the encryption process, since it has a shorter encrypting period and a greater encrypting effect, according to experimental results.
{"title":"Face Encryption based on Feature Extraction Supported by Canny Edge Detector","authors":"A. S. Jamil, N. Hassan, R. A. Azeez","doi":"10.14704/web/v19i1/web19115","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19115","url":null,"abstract":"Individual privacy protection is regarding a subject in surveillance and security areas. Protection of people's faces in image in linking with complex info, abused cases, involvement, and others on public broadcasting media and social networks are very important. Partial encryption human face is selected to reduce the computational requirements for huge volumes of image data and reducing the computational processing time required to conduct the entire image. In this paper, a new fast algorithm is proposed to encrypt partially human face, at first human face is detected using vole and jones algorithm, features points are extracted from face region to be encrypted, these features points are determined by using Canny edge detector since Canny edge algorithm considers the best edge detector with decent localization properties marked edges areas similar to the edges in the actual image as possible, i.e. that it is an essential feature. Furthermore, the importance of the key for the encryption process and its significant role in increasing and improving security, a new method for generating key is proposed making them resistant to attackers. The suggested encryption algorithms produced good results in the encryption process, since it has a shorter encrypting period and a greater encrypting effect, according to experimental results.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43028937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}