Novelty Theme International Journal of Advanced Science and Computer Applications http://ijasca.org/index.php/ijasca <p style="text-align: justify;"><strong>International Journal of Advanced Science and Computer Applications (IJASCA)</strong> is a peer-reviewed open-access journal. The journal invites scientists and engineers throughout the world to exchange and disseminate theoretical and practice-oriented the whole spectrum of Advanced Science and Computer Applications.<strong> </strong>Submitted papers must be written in English for an initial review stage by editors and further review process by a minimum of two international reviewers. Accepted papers will be freely accessed in this website.</p> <p>Before submission, please <strong>make sure that your paper </strong>is prepared using the journal <strong><a href="https://ijasca.org/index.php/ijasca/template">paper template</a><a href="https://drive.google.com/file/d/0B_kEtbonNZdJUlAwenFROFJ5Qlk/view?usp=sharing"> </a> </strong><strong>Online Submissions </strong><strong>Already have a Username/Password for International Journal of Advanced Science and Computer Applications (IJASCA)? </strong><a href="https://ijasca.org/index.php/ijasca/login">GO TO LOGIN</a><br />Need a Username/Password?<br /><a href="https://ijasca.org/index.php/ijasca/user/register">GO TO REGISTRATION</a><br />Registration and login are required to submit items online and to check the status of current submissions</p> Utan Kayu Publishins en-US International Journal of Advanced Science and Computer Applications 2809-7599 The Multi-factor based Regression Test Case Prioritization using Fuzzy Logic http://ijasca.org/index.php/ijasca/article/view/56 <p>The maintenance level activity generally done after the modification in the software to check whether it is functioning right or not is termed as regression testing. Test case prioritization, a key practice, involves strategically ordering test cases based on specific criteria to enhance the efficiency of fault detection within a condensed time frame. The fuzzy rule base serves as an alternative to the conventional crisp value set, offering a nuanced approach beyond binary outcomes (Yes or No). The primary objective of this research is to address critical factors often overlooked in existing literature on prioritization. Notably, prevalent approaches focus on singular factors during test case prioritization, highlighting the need for a comprehensive technique. To enhance the prioritization of test cases, there is a demand for a method that considers multi-factors or combinations thereof, ultimately increasing effectiveness. This paper introduces an innovative approach a multi-factors regression test-case prioritization technique utilizing fuzzy rules. The methodology aims to optimize the prioritization of test cases, striking a balance between effectiveness and time efficiency. Fuzzy rules are formulated to assess the effectiveness of a prioritized set of test cases in developing the proposed approach. A user-friendly tool has been developed to facilitate the application of this technique, allowing users to input relevant factors and subsequently prioritize test cases accordingly. Through extensive experiments using the developed tool, the effectiveness of the proposed approach has been validated. The results demonstrate that the priority lists of test cases generated for different projects, considering multi-factors, show greater promise compared to techniques relying solely on a single factor for prioritization.</p> Muhammad Waqar Arshad waqar Dr. Muhammad Bilal Bashir Dr. Yaser Hafeez Copyright (c) 2023 Muhammad Waqar Arshad waqar, Dr. Muhammad Bilal Bashir , Dr. Yaser Hafeez https://creativecommons.org/licenses/by/4.0 2024-03-22 2024-03-22 3 1 10.47679/ijasca.v3i1.56 big S-Boxes for Deeply Improved Hill Image Coding http://ijasca.org/index.php/ijasca/article/view/42 <p>This paper introduces a novel approach to encrypt color images, utilizing multiple chaotic maps and working with any size pixel blocks. The encryption procedure commences by converting the original image into a vector, which is then divided into equal dimension subblocks. These blocks undergo a new Vigenère transformation, employing two large dynamic substitution tables interconnected by an enhanced Hill operation using a large invertible matrix generated from a pseudo-random table, controlled by another binary dynamics table. Additionally, the truncated block undergoes the same encryption process using another pseudo-random invertible matrix. To evaluate the effectiveness and resilience of our algorithm, we conducted numerous simulations on randomly selected images of varying sizes and formats from diverse databases.</p> Abid Abdellah Hicham Rrghout Mourad Kattass Abdellatif Jarjar Abdellhamid Benazzi Copyright (c) 2023 ABDELLATIF JARJAR https://creativecommons.org/licenses/by/4.0 2023-11-08 2023-11-08 3 1 15 30 10.47679/ijasca.v3i1.42 Systematic Review from Different Encryption Techniques Perspectives http://ijasca.org/index.php/ijasca/article/view/46 <p>The volume of Big Data produced from various sources is always growing. Such vast amounts of data cannot be stored using conventional techniques. As a result, the majority of businesses have switched to using cloud storage as a substitute for storing Big Data. Cloud storage has made great progress, but there are still several problems, such security worries. This article examines Big Data, its difficulties, and many security concerns from the perspectives of various encryption approaches. Additionally, it presents various views to address these issues and suggests a new classification of Big Data security difficulties</p> alsadig abdallah Amir Talib Mandour Ibrahim Elhadi AbdElgader Copyright (c) 2023 alsadig abdallah, Amir Talib, Mandour Ibrahim, Elhadi AbdElgader https://creativecommons.org/licenses/by/4.0 2023-11-08 2023-11-08 3 1 31 42 10.47679/ijasca.v3i1.46 The MapReduce based approach to improve the all-pair shortest path computation http://ijasca.org/index.php/ijasca/article/view/44 <p>When building sequential algorithms for problems on the graphic network, the algorithms themselves are not only very complex but the complexity of the algorithms also is very big. Thus, sequential algorithms must be parralled to share work and reduce computation time. For above reasons, it is crucial to build parallelization of algorithms in extended graph to find the shortest path. Therefore, a study of algorithm finding the shortest path from a source node to all nodes in the MapReduce architectures is essential to deal with many real problems with huge input data in our daily life. MapReduce architectures processes on (Key, Value) pairs are independent between processes, so multiple processes can be assigned to execute simultaneously on the Hodoop system to reduce calculation time</p> Lau Nguyen Dinh Copyright (c) 2023 Lau Nguyen Dinh https://creativecommons.org/licenses/by/4.0 2023-11-08 2023-11-08 3 1 55 64 10.47679/ijasca.v3i1.44 Characteristic behavior of soil using bacterial biogrouting with LISA FEA V.8. http://ijasca.org/index.php/ijasca/article/view/47 <p>The increasingly widespread use of micro-bacteria in research to improve soil characteris-tics in the world of construction and also provide a significant increase in soil carrying ca-pacity so that this kind of research makes a very good contribution where the material and mixing object are natural materials, namely in the form of bacteria. This study used the finite element method with the help of LISA V.8 FEA (Li-cense), a finite element method software package, to obtain the stress arising from existing soil ma-terial with soil material that has been mixed with mycobac-teria or the biogrouting method. According from the results of the analysis using numerical analysis using the finite el-ement method LISA V.8 FEA program, it can be seen that there is a reduc-tion in the oc-currence of settlement after adding the two bacteria which have been aged for 30 days with a reduction in soil settlement of 2.9-2.27 mm de-spite an increase in stress. ranging from 58.3 to 69.4 kN/m<sup>2</sup>.</p> Aco Wahyudi Efendi Copyright (c) 2023 Aco Wahyudi Efendi https://creativecommons.org/licenses/by/4.0 2023-11-17 2023-11-17 3 1 65 74 10.47679/ijasca.v3i1.47 E-passport security systems and attack implications http://ijasca.org/index.php/ijasca/article/view/38 <p>Recent technological advances aim to recognise user data using biometrics such as the face, fingerprint, hand veins and iris. Currently, face prints are widely used to verify user data in e-passports. As a result, institutions face substantial difficulties in maintaining an appropriate level of security. Human error can introduce flaws that undermine security mechanisms. One potential solution to this problem is to install a facial recognition security system. Both hardware and software components make up this system, with the hardware being a camera and the software comprising face detection and identification algorithms.</p> <p>&nbsp;</p> <p>The purpose of this essay is to provide a thorough understanding of the Face Recognition Security System, including its application and deployment. Furthermore, the essay investigates the various weaknesses and methods of attack that could be used to target the system. The purpose of addressing these factors is to improve the effectiveness and robustness of system security, notably e-passport security.</p> Kaznah Alshammari Copyright (c) 2023 Kaznah Alshammari https://creativecommons.org/licenses/by/4.0 2023-11-15 2023-11-15 3 1 75 80 10.47679/ijasca.v3i1.38