Journal of Information Technology and Computing
Latest Publications


TOTAL DOCUMENTS

5
(FIVE YEARS 5)

H-INDEX

0
(FIVE YEARS 0)

Published By SABA Publishing

2709-5916

2021 ◽  
Vol 2 (1) ◽  
pp. 1-8
Author(s):  
Ahmed muayad younus Alzahawi ◽  
Mohanad Abumandil

This study aims to investigate the relationship between Scrum framework and risk management processes in Malaysia. Companies discuss the management based on a concerned business scale and the influence risk management in Malaysia Information technology projects success. This research is targeting Information technology firms and technology projects. Were researched through guarantee inside and out comprehension of the postulation foundation. In the outcome segment, the author influences a few proposals for the case to small-scale organizations to actualize ventures and to develop risk management successfully. The phases of risk management, in particular the step of risk detection, have a detrimental impact on project performance. Furthermore, risk control has its own risks as a mechanism. This makes it impossible to know if risk management is an appropriate approach in the IT production process for managing and minimizing risks. The study shows the effect of risk management in IT businesses is utilized in the Scrum


2020 ◽  
Vol 1 (1) ◽  
pp. 31-40
Author(s):  
Hina Afzal ◽  
Arisha Kamran ◽  
Asifa Noreen

The market nowadays, due to the rapid changes happening in the technologies requires a high level of interaction between the educators and the fresher coming to going the market. The demand for IT-related jobs in the market is higher than all other fields, In this paper, we are going to discuss the survival analysis in the market of parallel two programming languages Python and R . Data sets are growing large and the traditional methods are not capable enough of handling the large data sets, therefore, we tried to use the latest data mining techniques through python and R programming language. It took several months of effort to gather such an amount of data and process it with the data mining techniques using python and R but the results showed that both languages have the same rate of growth over the past years.


2020 ◽  
Vol 1 (1) ◽  
pp. 1-13
Author(s):  
Rafiat Oyekunle ◽  
Olaiyiwola Bello ◽  
Quincy Jubril ◽  
Ismaheel Sikiru ◽  
Abdullateef Balogun

The rapid consumption of content on the web and the creation of online businesses and educational platforms require improved usability for the user. It also calls for concerted effort to understand users' interactions with these digital products and services. This study was carried out to investigate the search and scan patterns employed by users interacting with the selected web interface from the e-commerce and education domains and also to establish the possibility of a localized interface design patterns in Nigeria. Usability evaluation was conducted using OGAMA software as an eye-tracking tool, to record as well as to analyze eye and mouse tracking data from slideshow eye-tracking experiments concurrently. During the evaluation period, fixation count, fixation length and saccade length of each website were taken into the consideration. Findings revealed that educational based site delivers users’ need than that of e-commerce due to less level of distraction as a result of fewer images and pictures. The study recommends that interface designs should be void of the display of excessive ad contents and include proper formatting of navigation items to contribute towards an enhanced user experience.  


2020 ◽  
Vol 1 (1) ◽  
pp. 14-30
Author(s):  
Zohaib Maqbool ◽  
Raja Habib ◽  
Tariq Aziz ◽  
Asma Maqbool ◽  
Oriba Altaf

The invention of IoT devices brings innovation to solve and control house hold devices. The demand of IoT devices like Google and Amazon Echo family has increased after their invention. New inventions may leave a lot of security flaws that must be resolved or addressed. Invention of IoT devices especially devices made for household become, pre vulnerable to many cyber-attacks leading to the leak of privacy. Recent literature revealed that IoT devices have both positive and negative sides. Leakage of privacy and protection lea people into troubles due to the Denial of Service (DDoS) attacks.


2020 ◽  
Vol 1 (1) ◽  
pp. 41-51
Author(s):  
SAJID KHAN ◽  
Uzma Sadiq ◽  
Sayyad Khurshid

Research displays an extensive investigation for different factual statistical estimates and their practical implementation in picture handling with various noises and filter channel procedures. Noise is very challenging to take out it from the digital images. The purpose of image filtering is to eliminate the noise from the image in such a way that the new image is detectible. We have clarified different calculations and systems for channel the pictures and which calculation is the best for sifting the picture. Signal and maximum Peak proportion parameters are utilized for execution for factual estimating, Wiener channel performs preferred in evacuating clamor over different channels. Wiener channel functions admirably for a wide range of clamors. The exhibition of Gaussian channel is superior to anything Mean channel, Mask Filter and Wiener channel as per MSE results. In picture setting up, a Gaussian fog generally called Gaussian smoothing is the result of darkening an image by a Gaussian limit. We reason that Gaussian separating approach is the best method that can be effectively actualized with the assistance of the MSE of picture. The Gaussian channel is certifiably superior to different calculations at expelling clamor. The outcomes have been looked at for channels utilizing SNR, PSNR and Mean Square Error esteem.


Sign in / Sign up

Export Citation Format

Share Document