Journal of Information Technology and Computing 2022-06-30T10:05:50+00:00 JITC Open Journal Systems <p>Journal of Information Technology and Computing (JITC) is an international peer-reviewed journal published by Saba Publishing and covering the area of information technology and computing, i.e. computer science, computer engineering, software engineering, information systems, and information technology. JITC endeavors to publish stimulating accounts of original scientific work, primarily including research papers on both theoretical and practical issues, as well as case studies describing the application and critical evaluation of theory. Articles are published in English.</p> <p><strong>Editor in Chief:</strong> <strong><a href="" target="_blank" rel="noopener">Dr. Hitham Seddiq Alhassan</a></strong><br /><strong>ISSN (online)</strong>: <a href="" target="_blank" rel="noopener">2709-5916</a><br /><strong>Frequency:</strong> Semiannual</p> F-OFDM in a novel form for analyzing 5G networks 2022-06-30T10:05:50+00:00 Sairoel Amertet <p>The need for internet of things (IoT) and machine-to-machine communication (MTC) has been growing rapidly all across the world. To meet the client's needs, many literature reviews were undertaken in several countries. Orthogonal frequency division multiplexing (OFDM), Universal Filtered Multi-Carrier (UFMC), filter-bank multicarrier offset construction amplitude modulation (FBMC-OQAM), generalized frequency division multiplexing (GFDM), and others are candidates for LTE, LTE advance, and 5G, according to the majority of the researchers. However, because it is sensitive to propagation and noise, such as amplitude, with a huge dynamic range, it requires RF power amplifiers with a high peak to average power quantitative relationship; consequently, it is not recommended for LTE, LTE advance, or 5G. As a result, the same concerns were addressed by introducing innovative type filtered orthogonal frequency division multiplexing (F- OFDM), which was the subject of this study. In addition, F-OFDM mathematical models were constructed and simulated in the MATLAB software environment. To validate the proposed innovative F-OFDM, OFDM was compared. For innovative F-OFDM, the simulated result was 0.00083333 bit error rate (BER). Furthermore, the bit error rate (BER) of F-OFDM over OFDM was 89.4 percent, and the peak to average power ratio was 17 percent. The simulation results unmistakably show that the suggested innovative F-OFDM is the greatest fit for LTE, LTE advanced, and 5G contenders.</p> 2022-06-30T00:00:00+00:00 Copyright (c) 2022 Journal of Information Technology and Computing Exploration of Social Attitudes and Summarization of Film Reviews 2022-05-17T19:35:40+00:00 Sudipto Ghosh Md. Tabil Ahammed Md. Moynul Islam Sahasa Debnath Md Rezaul Hasan <p><em>The goal of this study was to identify the specific characteristics of internet reviews that made them useful. An online movie review site, Rotten Tomatoes, was used to gather online movie reviews. The online impact factor review methodology developed in this research makes use of data mining methods. A study found that article quality influences users' views of the effectiveness of interventions. When a reviewer has a happy mood, a strong emotional predisposition, and a high degree of review reliability, their material is more effective. Negative emotions, on the other hand, are less beneficial and weaker. Emotionally charged assessments are shown to have a greater number of reviews and tend to be more effective. The results of this study, which looked at how people evaluate online reviews, could help come up with new ways to predict economic success.</em></p> 2022-06-30T00:00:00+00:00 Copyright (c) 2022 Journal of Information Technology and Computing Are Women a Soft Target for Cyber Crime in India 2022-06-30T10:05:47+00:00 Showkat Ahmad Dar Dolly Nagrath <p>A growing global issue that might have significant social and economic repercussions is cyber violence against women. This is due to the growing popularity of social media, the spread of information via mobile devices, and the growth of the internet. Any form of sexual or gender-based violence against women that takes place through ICTs like the Internet, mobile devices, and video games is referred to as cyber violence. These technologies are ideal for using as weapons against women for a variety of reasons these include cyber stalking, sexual abuse (including sending sexually explicit or pornographic emails to the victim), cyber extortion, cyber bullying, cybersex trafficking, and phishing. Even if there are more crimes against women overall, a woman can find that experiencing a cybercrime is the most upsetting thing that has ever happened to her. More so in India, where women are devalued and cybercrimes aren't even given significant legal consideration. India's legal system's current rules and practises are shown to have gaps in Cyber Crimes against Women, as well as what can be done to keep individuals secure online. In this essay, I'd want to discuss the various cybercrimes that can affect women and how they can harm them. I also briefly discuss new laws that are being introduced in this field, such as the Criminal Amendment Bill, as well as the many statutes that protect women in these circumstances, such as the Information Technology Act of 2000. (2013). to reach a conclusion, I consider a number of well-known cybercrime cases. Additionally, we need to consider a couple of answers for the rising frequency of cyber crimes against ladies in India. At the end, we talk about the choices accessible to casualties of cyber crime and the changes that should be made to the overall set of laws to battle the rising tide of cyber crimes.</p> 2022-06-30T00:00:00+00:00 Copyright (c) 2022 Journal of Information Technology and Computing Applying data mining steps to explore different small RNAs from buffalo milk transcriptome 2022-06-30T10:05:46+00:00 Pooja Chhabra Brij Mohan Goel <p class="western" align="left"><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;">This study is a first attempt to find different types of RNA in lactating buffalo's milk somatic cells. The molecular factors that regulate lactation need to be identified and understood in order to help milk production. </span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;">By using data mining techniques, patterns and information hidden within a dataset can be identified</span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;">. In order to detect the RNA, data of 12 samples of buffalo milk somatic cells were analyzed. For extraction of diverse RNAs COMPSRA (</span></span><span style="font-family: Times new roman, serif;"><span style="font-size: medium;">COMprehensive Platform for Small RNA Analysis</span></span><span style="font-family: Times New Roman, serif;"><span style="font-size: medium;">) pipeline was used. We were able to identify several miRNAs, piRNAs, snRNAs, snoRNAs, circRNAs and tRNAs in buffalo milk somatic cells. circRNAs ranked highest among all the samples in our dataset, followed by piRNAs and then miRNAs. Understanding the RNA regulators of lactation will improve and facilitate management of buffalo milk production. Furthermore, our study contributes towards a complete annotation of the buffalo genome.</span></span></p> 2022-06-30T00:00:00+00:00 Copyright (c) 2022 Journal of Information Technology and Computing