Vol 7, No 1 (2024)

Table of Contents

Open Access
Original Research Article
Article ID: 5224
PDF
by S. Sengamala Barani, R. Durga
Comput. Soft. Media. Appl. 2024, 7(1);   
Abstract

Block chain technology is regarded for enhancing the characteristics of security because of decentralized design, safe distributed storage, and privacy. However, in recent times the present situation of block chain technology has experienced some crisis that may delay the quick acceptance and utilization in real-time applications. To conquer this subdues, a blockchain based system for attack detection and mitigation with Deep Learning (DL) named Fractional Tasmanian Devil Harris Optimization_Zeiler and Fergus network (FTDHO_ZFNet) is introduced. In this investigation, the entities utilized are owner, block chain, server, trusted authority and user. Here, authentication phase is done by means of Ethereum block chain by Key Exchange module and privacy preserved data sharing and communication is also done. Then, recorded log file creation is executed by the below mentioned stages. At first, a log file is generated with the basis of communication to record the events. After wards, the features are extracted by BoT-IoT database. Then, feature fusion is done by overlap coefficient utilizing Deep Q-Network (DQN). Moreover, data augmentation (DA) is doneusing bootstrapping method. At last, attack detection is observed by ZFNet tuned by FTDHO. Here, FTDHO is unified by Fractional Tasmanian Devil Optimization (FTDO) and Harris Hawks Optimization (HHO). Additionally, FTDO is integrated by Fractional Calculus (FC) concept and Tasmanian devil optimization (TDO). Furthermore, attack mitigation is performed. The performance measures applied for FTDHO_ZFNet are accuracy, and True Negative rate (TNR), observed supreme values with 92.9%, 93.8% and 92.9%.

show more
Open Access
Original Research Article
Article ID: 6736
PDF
by Diego Firmenich, Leonardo Morales, Gastón Mura, Nicolás Calfuquir
Comput. Soft. Media. Appl. 2024, 7(1);   
Abstract

Mockplug is a browser extension that allows end users to specify their requirements for any existing web application through high-fidelity mockups. These mockups are built based on web augmentation techniques. This new way of specifying the requirements contains the intrinsic potential that the mockup is built on top of the application itself with elements of the same nature, containing technical information about the requirements in relation to application components from its origin automatically. This has great potential when it comes to being used as an input during the software development process. In this article, we disclose and describe the use and potential of this tool in two totally different approaches to building web software.

show more
Open Access
Original Research Article
Article ID: 10679
PDF
by Farida Balarabe, Esther Daniel, Muhammad Shamsuddeen Musa, Usman Yahya Ibrahim, Nuru Yakubu Umar, Ahmad Adamu Ahmad, Aminu Adamu Ahmed
Comput. Soft. Media. Appl. 2024, 7(1);   
Abstract

This research explores the role of social media advertisement in today’s digital landscape. It discusses the advantages of social media advertisement, including its wide audience reach, cost-effectiveness, and increased brand visibility. The research also delves into the impact of social media advertisement on consumer behavior, engagement, and data-driven insights. Furthermore, it addresses the challenges and criticisms surrounding social media advertisement, such as information overload, privacy concerns, and trust issues. The research concludes by highlighting future trends and opportunities, including influencer marketing, live video, augmented reality, and personalization. Overall, this paper emphasizes the importance of adapting and utilizing social media effectively for businesses to succeed in the digital age.

show more