University of Sindh Journal of Information and Communication Technology http://sujo2.usindh.edu.pk/index.php/USJICT <p align="justify"><img src="/public/site/images/sujo/cover_issue_195_en_US.jpg" width="233" height="290"></p> <p align="justify">University of Sindh Journal of Information and Communication Technology (USJICT) is an open-access, double blind peer reviewed research journal, published quarterly by University of Sindh, Jamshoro.&nbsp; The newly launched journal will cover a full spectrum of specialized domains in Information Technology, Software Engineering, Computer Science, Electronics and Telecommunication. It would include original research articles, review articles, case reports and scientific findings. The journal strictly follows the guidelines proposed by Higher Education Commission (HEC) Pakistan.</p> <p>Editor:</p> <p><strong>Dr. Zeeshan Bhatti&nbsp;</strong><br>Associate Professor&nbsp;<br>IICT, University of Sindh, Jamshoro</p> <p>Co-Editor(s)</p> <p><strong>Prof. Dr. Imdad Ali Ismaili</strong><br>Director &amp; Professor, IICT, University of Sindh, Jamshoro</p> <p><strong>Prof. Dr. Lachhman Das Dhomeja</strong><br>Professor,&nbsp;IICT, University of Sindh, Jamshoro</p> Institute of Information and Communication Technology, University of Sindh, Jamshoro, Sindh, Pakistan. en-US University of Sindh Journal of Information and Communication Technology 2521-5582 <p align="justify">University of Sindh Journal of Information and Communication Technology (USJICT) follows an Open Access Policy under&nbsp;Attribution-NonCommercial&nbsp;<a href="https://creativecommons.org/licenses/by-nd/4.0/">CC-BY-NC</a>&nbsp;license. Researchers can copy and redistribute the material in any medium or format, for any purpose. Authors can self-archive publisher's version of the accepted article in digital repositories and archives.&nbsp;</p> <p>Upon acceptance, the author must&nbsp; transfer the copyright of this manuscript to the Journal for publication on paper, on data storage media and online with distribution rights to USJICT, University of sindh, Jamshoro, Pakistan. Kindly download the copyright for below and attach as a supplimentry file during article submission</p> <p><a title="USJICT Copyright form" href="https://drive.google.com/file/d/0B1uSzD7y6Yl_YzFPYlFPMWxHWDQ/view?usp=sharing" target="_blank" rel="noopener">Download copyright form here</a></p> The World of Hacking: A Survey http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/358 <p>Hacking is the most genius field of computing science which is getting bigger with the passage of time. This research paper has the methods and techniques of hacking, types of hacking, types of hackers, types of hacking attacks, common tools of hacking, the geography of hackers, phases of hacking, protection processes, past reports, instruments of hacking and at last the future discussion on this field. This paper is enough to get to know some beginning information of hacking.</p> Imran Memon Riaz Ahmed Shaikh Hadiqua Fazal Hanif Tunio Qasim Ali Arain ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 31 37 A survey on cloud computing, security Challenges, architecture, applications & solutions http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/357 <p>In this paper, we are going to emphasize on the advancement in computing technology cloud computing is an incredible innovation to perform complex processing. It decreases the need of costly equipment’s and dedicated storage. The connection between information and cloud&nbsp; computing is inspected along .The definition, attributes and grouping of huge information along with certain discourses on cloud computing are presented with focus on accessibility, information honesty, information quality, adaptability, security and administration. There is a rapid development in cloud computing and Internet of things regard the field of wireless communication. We present a survey on the security issues of both the technologies. We studied about the contributions of cloud computing to the Internet of things technology. It will illustrate the improvements on the internet of things on the basis of cloud. We will discuss the pros and cons of merging the technologies. The financial effects on innovation will be discussed, it will mainly emphasize on macroeconomics development. In this examination the results of rivalry and market structures will be brought to spotlight .Secondly the impact on industries and firms renting the storage from the providers will be discussed and how it effects the economics. Vehicular networking has become a significant area due to standardization, traffic management, road safety and infotainment. Vehicles carry more communication systems in sensing power. It can promote intelligent transportation system. Vehicular cloud computing remarkably effects traffic, the executives and street security in a split by utilizing the vehicular assets.</p> <p>&nbsp;</p> Hadiqua Fazal Imran Memon Tarwan Kumar Khatri Ghulam Muhammad Qasim Ali ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 24 30 PREVENTION MECHANISM FOR RUDY ATTACK AND ITS COMPARISON http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/356 <p><strong><u>Abstract: </u></strong>Rapid growth in the area of information technology causes IT professionals to make greater efforts to secure their network from Hackers. IT world called that attack RUDY (R U Dead Yet) attack Basically, RUDY attack is used by hackers to block or disrupt web-server services. Hacker is also trying to attack a web server using open ports. Each web server in the world has its exposed client ports (80, 8080,443 and 4433), and hackers use these ports to target web servers. You may want to use a web server on Microsoft Based Server (IIS) or Linux Based Server (Apache). RUDY attack on the 7th layer of HTTP traffic (Dos) attack, which basically injects POST body traffic to the server at a low rate to create so many sessions on the server. In this proposed work, a RUDY attack would be undertaken and tested for its impact on the Microsoft Based Web-server as well as the Linux Based Web-server at the end of which the key would be bounce to lock the Web-server.</p> Sheena qadir bux Memon Dr Liaqaut Ali Thebo Syed Naveed Jafri Hyder Zaman Brohi ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 45 51 An Effective Way to Enhance Classifications for the Semi-Structured Research Articles http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/355 <p>Due to the drastic increase in the research publications, numerous research articles are available electronically on different online digital libraries. Some research articles or papers are not retrieved during online searches due to their classification issues. The adequately structured research articles are relatively easily approachable as compared to semi-structured and unstructured research articles, and sometimes the reader does not get accurate results on different digital libraries as the research articles are not classified properly. Neglecting the semi-structured and unstructured published research not only causes gap deficiency but also affects the results of the proposed techniques and citations for other articles. Usually, researchers missed semi-structured and unstructured research articles during their online search. Classification techniques have been applied to structured articles and no significant work has been performed towards the classification of semi-structured and unstructured research articles. Therefore, this research focuses on the classification of semi-structured research articles using different supervised classification techniques so that the most accurate and large amount of relevant research results will be achieved. For experimentation, a labeled dataset was used for the classification of semi-structured papers. The dataset we used for experimentation is comprised of manually gathered research articles from Santos repository dataset and labeling them accordingly. The current study used four different supervised classification techniques such as Support Vector Machine (SVM) classifier, Naïve Based classifier, K Nearest Neighbor classifier, and Decision Tree classifier. The comparison was performed between these supervised classification techniques to see which classifier gives better accuracy. The unit of measures or parameters selected to compare these classifiers are: accuracy, recall, precision, and f-score. The evaluation was performed on the basis of results and comparison in the experimentation</p> Ejaz Ahmed Sumbal Ashraf Waseem Shahzad ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 45 51 Interactive Smart Writing Technology (ISWT) http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/341 <p>With the latest inventions, human life standards have been changed dramatically. Intensive work can be seen to make environment human-friendly. By keeping this view, this paper presents the future of advanced classroom/ meeting rooms, training areas, etc. by bringing down the count of paper used for the purpose of making lecture notes. Our proposed system (Interactive smart writing technology (ISWT)) which we claim as an assistance to paperless documentation, is a pen/ marker sleeve that works on the mechanism of taking motion reading through the sensor that can work on any flat writing surface and whatever is written from it, will get digitalized on the application in real-time, making it easier to take notes and much more. You do not need to focus on writing, rather you can focus on the learning and understanding of the topics being discussed. ISWT can also work as a liaison between industry and academia. The novelty of ISWT includes surface independence, low cost, portable, repairable, real-time and very economical for personal usage.</p> Sadiq Ur Rehman Shariq Ahmed Khan Iqbal Uddin Khan Halar Mustafa Muhammad Ahsan Shaikh ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 1 8 Online Deal Portal: Factors to Consider for an Effective Design http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/359 <p>In this research paper we discuss about the relationship between online deals portals and consumers and how it affects an efficient deals portal design. Consumers from all over the globe now order products online, in order to help people, save time and money. The deal portals make this possible by finding best online deals easily. The main purpose this work is to propose factors of design that an online portal should have and will attract consumers using it to find the best deal quickly. A portal that collect deals and discount offers on daily basis from all over the world should satisfy many important factors, such as customer previous online experience, transaction secureness, site usefulness and also product attributes. An online survey was done and it was found that portal ease of use, usefulness and product &amp; company attributes are main influencing factors for making an online purchase decision by a consumer. Also, an analysis of web portals of deal offering sites is given with details of factors that e-commerce site designers should consider while developing a worldwide deals portal site.</p> <p>&nbsp;</p> Soobia Saeed Asadullah Shaikh Muhammad Ali Memon Muhammad Ali Nizamani Muhammad Memon ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 38 44 Review of Components from frameworks/models for DGBL for History Based Courses http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/351 <p>Playing a game is an essential factor that leads towards human development and then learning. Usually, it can be seen that children can spend hours in playing different non computer based games like hide and seek, board games, such as chess, Ludo, checkers and keep them engaged in their plays. These games not only keep them busy, but also improvise their creative thinking and learning ability. When children play, it can be witnessed that they also learn while play. In this way, play can be related to learning, enhancing children’s cognitive and emotional development through the social and cultural context. Digital Game Based Learning(DGBL) can also be useful as a supportive choice to traditional class lectures. The intent of DGBL is to incorporating new methods to existing instructional way and at also simultaneously, empower learners to gain skills and capabilities that may be beneficial in the future endeavor. This paper explores the existing frameworks and models that are being used for the development of game for classroom and identifies the 13 components that can be used for the development of history based games.</p> Sumbul Ghulamani Asadullah Shah Kamran Khowaja ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-25 2020-03-25 4 1 9 16 Generating believable Gait Patterns for Quadruped Locomotion using Fourier Analysis http://sujo2.usindh.edu.pk/index.php/USJICT/article/view/383 <p>In animation attaining a realistic gait pattern for a virtual quadruped character is very time consuming for animator. This research provides a prototype system for creating an initial layer of natural-looking animation to serve as a starting point for an animator. Starting with reference video of an actual Tiger’s walking, joints are animated to create a rotoscoped animation. This animation represents the animal’s natural motion achieved manually through key frame technique, which contains numerous errors in form of inaccurate motion curves. These expressions will be used to animate a virtual quadruped’s skeletal rig in Autodesk’s Maya. Joint angle values for the legs are sampled per frame of the animation and conditioned for Fourier analysis. FFT Fast Fourier Transform) provides frequency information that is used to create mathematical descriptions of each joint’s movement. A model representing the Tiger’s overall gait pattern that will be created once each of the leg joints will be analyzed and defined. Lastly, a new rig for a virtual quadruped will be created and its leg joints will be animated using the gait pattern model derived through the FFT analysis.</p> Faiz Muhammad Zeeshan Bhatti Imdad Ali Ismaili Naila Shabir Sayed Majid Ali Shah ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2020-03-26 2020-03-26 4 1 51 55