首页 > 最新文献

BOHR International Journal of Smart Computing and Information Technology最新文献

英文 中文
The Importance of ICTs on Service Delivery at MTC, Namibia 信息通信技术对纳米比亚MTC服务提供的重要性
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.008
Ndahafa Eline Namene, Nikodemus Angula
The purpose of the study was to examine the effect of information and communication technology on service delivery in the Telecommunications industry. A descriptive survey research method was used as it helped the researcher to determine how the use of ICTs can improve service delivery at MTC, Namibia. Findings showed that variables of information and communication technology have positive effect on service delivery. Therefore, the study concluded that training collectively with changes in corporate policies and support, can result in better service delivery. It was recommended that employees have to acquire skills on how to use computers and communication software in order to offer efficient services. It is vital for the Telecommunications sector to foster digital opportunities by enhancing the use of ICTs to improve service delivery. Barriers to be overcome are no longer only technological but also educational, cultural and linguistic in nature. With that in mind, neglecting to invest sufficiently in human capacity may result in clientele dissatisfaction.
研究的目的是研究资讯及通讯科技对电讯业提供服务的影响。采用了描述性调查研究方法,因为它有助于研究人员确定信息通信技术的使用如何改善纳米比亚MTC的服务提供。调查结果显示,信息和通信技术的变量对服务提供有积极的影响。因此,研究得出的结论是,集体培训与公司政策和支持的变化可以导致更好的服务提供。有人建议雇员必须掌握如何使用电脑和通讯软件的技能,以便提供有效的服务。电信部门必须通过加强对信息通信技术的利用来改善服务提供,从而创造数字机会。需要克服的障碍不再仅仅是技术上的,而且还有教育、文化和语言上的。考虑到这一点,忽视对人力能力的充分投资可能会导致客户不满。
{"title":"The Importance of ICTs on Service Delivery at MTC, Namibia","authors":"Ndahafa Eline Namene, Nikodemus Angula","doi":"10.54646/bijscit.008","DOIUrl":"https://doi.org/10.54646/bijscit.008","url":null,"abstract":"The purpose of the study was to examine the effect of information and communication technology on service delivery in the Telecommunications industry. A descriptive survey research method was used as it helped the researcher to determine how the use of ICTs can improve service delivery at MTC, Namibia. Findings showed that variables of information and communication technology have positive effect on service delivery. Therefore, the study concluded that training collectively with changes in corporate policies and support, can result in better service delivery. It was recommended that employees have to acquire skills on how to use computers and communication software in order to offer efficient services. It is vital for the Telecommunications sector to foster digital opportunities by enhancing the use of ICTs to improve service delivery. Barriers to be overcome are no longer only technological but also educational, cultural and linguistic in nature. With that in mind, neglecting to invest sufficiently in human capacity may result in clientele dissatisfaction.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114434391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A case study: Grid services for satellite image processing 案例研究:用于卫星图像处理的网格服务
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.20
R. Patil, Mane Siddhi
Satellite image processing is an intricate task that requires vast computation and data processing, which cannot be handled by a single computer. Furthermore, the processing of the massive amount of data accumulated by the satellite is a huge challenge for the end user. Hence, grid computing is the essential platform to provide high computing performance at the user end. This article reviews the grid services used for satellite image processing and significant data processing.
卫星图像处理是一项复杂的任务,需要大量的计算和数据处理,单台计算机无法完成。此外,卫星积累的大量数据的处理对最终用户来说是一个巨大的挑战。因此,网格计算是在用户端提供高计算性能的必要平台。本文综述了用于卫星图像处理和重要数据处理的网格服务。
{"title":"A case study: Grid services for satellite image processing","authors":"R. Patil, Mane Siddhi","doi":"10.54646/bijscit.20","DOIUrl":"https://doi.org/10.54646/bijscit.20","url":null,"abstract":"Satellite image processing is an intricate task that requires vast computation and data processing, which cannot be handled by a single computer. Furthermore, the processing of the massive amount of data accumulated by the satellite is a huge challenge for the end user. Hence, grid computing is the essential platform to provide high computing performance at the user end. This article reviews the grid services used for satellite image processing and significant data processing.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Semantic Interoperability of Regional Trends of Disease Surveillance Data for Namibia Through a Health-Standards-Based Approach 通过基于健康标准的方法实现纳米比亚疾病监测数据区域趋势的语义互操作性
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.005
Nikodemus Angula, N. Dlodlo, Progress Mtshali
The Ministry of Health and Social Services in Namibia under the division of epidemiology uses a manual paper-based approach to capture disease surveillance data through 5 levels of reporting which include the community level, the health facility level, the district level, and the national level. As a result, this method of communicating and exchanging disease surveillance information is cost and time consuming, which delay disease surveillance information from reaching the head office on time. The current method that is being used to exchange and communicate disease surveillance data is a manual process which very time consuming due to the fact that surveillance officers have to organise and store the files and hunt down the information when it is needed and this can take time. Therefore, the study developed a prototype that aggregates disease surveillance data from the 14 regions in Namibia and can thus enable the disease service office to capture disease surveillance data through the use of mobile devices. The functionality of the prototype would allow a disease surveillance office in one regional office to access disease surveillance data of other regional office in real time. The method used to communicate disease surveillance data is through the excel spreadsheet (IDSR) which is called the integrated disease surveillance and response. Furthermore, the excel file will be sent to the relevant authority through email. However, we still do not have a web based system to report cases of diseases, instead this is a process starting from the intermediate hospital disease surveillance data which is captured then sent to the regional office and from the regional office the information is sent to the district office and then sent to the national office and from the national office the information is further sent to the WHO and other development partners as well as to the top management or to the highest authority. So it does not end at the national level but goes to management such as the Permanent Secretary, and the data is used to inform the development partners and the national surveillance office prepares official letters to the management as a form of reporting disease surveillance data. The symphonic surveillance office helps to detect a particular disease. The doctors send an investigation case form to the laboratory for testing the disease that has been identified.
纳米比亚卫生和社会服务部流行病学司采用纸质手工方法,通过五个级别的报告收集疾病监测数据,包括社区一级、卫生设施一级、地区一级和国家一级。因此,这种沟通和交换疾病监测信息的方法成本高,耗时长,导致疾病监测信息无法及时到达总部。目前用于交换和交流疾病监测数据的方法是一个人工过程,这非常耗时,因为监测官员必须组织和存储文件,并在需要时查找信息,这可能需要时间。因此,该研究开发了一个原型,该原型汇总了来自纳米比亚14个地区的疾病监测数据,从而使疾病服务办公室能够通过使用移动设备获取疾病监测数据。该原型的功能将允许一个区域办事处的疾病监测办公室实时访问其他区域办事处的疾病监测数据。疾病监测数据交流的方法是通过excel电子表格(IDSR),称为综合疾病监测和应对。并将excel文件通过邮件发送给相关部门。然而,我们仍然没有一个基于web的系统报告病例的疾病,相反这是一个流程从中间医院疾病监测数据然后被发送到的区域办事处和区域办事处的信息被发送到地区办公室,然后发送到国家机关和国家机关进一步的信息发送到世卫组织和其它发展伙伴以及高层管理人员或最高的权威。因此,它不是在国家一级结束,而是进入常务秘书等管理部门,这些数据被用来通知发展伙伴,国家监测办公室准备给管理部门的正式信函,作为报告疾病监测数据的一种形式。交响乐团监控室有助于发现一种特殊的疾病。医生将一份调查病例表送到实验室,对已确定的疾病进行检测。
{"title":"Enabling Semantic Interoperability of Regional Trends of Disease Surveillance Data for Namibia Through a Health-Standards-Based Approach","authors":"Nikodemus Angula, N. Dlodlo, Progress Mtshali","doi":"10.54646/bijscit.005","DOIUrl":"https://doi.org/10.54646/bijscit.005","url":null,"abstract":"The Ministry of Health and Social Services in Namibia under the division of epidemiology uses a manual paper-based approach to capture disease surveillance data through 5 levels of reporting which include the community level, the health facility level, the district level, and the national level. As a result, this method of communicating and exchanging disease surveillance information is cost and time consuming, which delay disease surveillance information from reaching the head office on time. The current method that is being used to exchange and communicate disease surveillance data is a manual process which very time consuming due to the fact that surveillance officers have to organise and store the files and hunt down the information when it is needed and this can take time. Therefore, the study developed a prototype that aggregates disease surveillance data from the 14 regions in Namibia and can thus enable the disease service office to capture disease surveillance data through the use of mobile devices. The functionality of the prototype would allow a disease surveillance office in one regional office to access disease surveillance data of other regional office in real time. The method used to communicate disease surveillance data is through the excel spreadsheet (IDSR) which is called the integrated disease surveillance and response. Furthermore, the excel file will be sent to the relevant authority through email. However, we still do not have a web based system to report cases of diseases, instead this is a process starting from the intermediate hospital disease surveillance data which is captured then sent to the regional office and from the regional office the information is sent to the district office and then sent to the national office and from the national office the information is further sent to the WHO and other development partners as well as to the top management or to the highest authority. So it does not end at the national level but goes to management such as the Permanent Secretary, and the data is used to inform the development partners and the national surveillance office prepares official letters to the management as a form of reporting disease surveillance data. The symphonic surveillance office helps to detect a particular disease. The doctors send an investigation case form to the laboratory for testing the disease that has been identified.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Intelligence Approach to Handling Data Leakage Risks in the Corporate Information Security Process 在企业资讯保安过程中处理资料外泄风险的改进智能方法
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.17
K. T, V. A, S. M
onfidentialinformationisofgreatinteresttocompetingfirms.Thiscausesaggressionandattacks.Many people underestimate the importance of the threat, and as a result, it can lead to collapse and bankruptcy for the company. Even a single case of malpractice can result in millions in damages and the loss of customer trust. Threats are subject to data on organization structure, status, and operations. Sources of such threats are its competitors, corruptofficials,andcriminals.Theyareintroducedwithcertainvalue-protectedinformationandmodifiedinorder to cause financial damage. Even 20% of such a decision can result in information leakage. Sometimes the loss of companysecretscanbeduetotheinexperienceofemployeesoralackofsecuritysystems.Inthispaper,animproved intelligence approach to handling data leakage risks in the corporate information security process is proposed. Accounting automatically calculates weighted relative class systems through a complete, complex security of the most important processes and technical and organizational measures. Their combination is an antivirus system, a firewall, and protection from electromagnetic radiation. Systems protect information on electronic media sent through communication channels, access exemptions for various documents, create backup copies, and recover confidential information after damage.
onfidentialinformationisofgreatinteresttocompetingfirms.Thiscausesaggressionandattacks。许多人低估了这种威胁的重要性,结果,它可能导致公司崩溃和破产。即使是一个单一的渎职案件也可能导致数百万美元的损失和客户信任的丧失。威胁与组织结构、状态和操作数据有关。这种威胁的来源是它的竞争对手、腐败官员和罪犯。它们被引入某些价值保护的信息,并被修改,以造成经济损失。即使是20%的此类决策也可能导致信息泄露。有时,公司机密的泄露可能是由于员工缺乏经验或缺乏安全系统。本文提出了一种改进的智能方法来处理企业信息安全过程中的数据泄露风险。会计通过一个完整的、复杂的、安全的最重要的过程和技术、组织措施自动计算加权相对类系统。它们的组合是防病毒系统、防火墙和防电磁辐射。系统保护通过通信渠道发送的电子媒体上的信息,对各种文件的访问豁免,创建备份副本,并在损坏后恢复机密信息。
{"title":"An Improved Intelligence Approach to Handling Data Leakage Risks in the Corporate Information Security Process","authors":"K. T, V. A, S. M","doi":"10.54646/bijscit.17","DOIUrl":"https://doi.org/10.54646/bijscit.17","url":null,"abstract":"onfidentialinformationisofgreatinteresttocompetingfirms.Thiscausesaggressionandattacks.Many people underestimate the importance of the threat, and as a result, it can lead to collapse and bankruptcy for the company. Even a single case of malpractice can result in millions in damages and the loss of customer trust. Threats are subject to data on organization structure, status, and operations. Sources of such threats are its competitors, corruptofficials,andcriminals.Theyareintroducedwithcertainvalue-protectedinformationandmodifiedinorder to cause financial damage. Even 20% of such a decision can result in information leakage. Sometimes the loss of companysecretscanbeduetotheinexperienceofemployeesoralackofsecuritysystems.Inthispaper,animproved intelligence approach to handling data leakage risks in the corporate information security process is proposed. Accounting automatically calculates weighted relative class systems through a complete, complex security of the most important processes and technical and organizational measures. Their combination is an antivirus system, a firewall, and protection from electromagnetic radiation. Systems protect information on electronic media sent through communication channels, access exemptions for various documents, create backup copies, and recover confidential information after damage.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large Semi Primes Factorization with Its Implications to RSA Cryptosystems 大半素数分解及其对RSA密码系统的启示
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.011
R. Omollo, Arnold Okoth
RSA’s strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of classical computers. In this paper, we present the analysis of Fermat’s Last Theorem and Arnold’s Theorem. Also highlighted include new techniques such as Arnold’s Digitized Summation Technique (A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce the time taken to factorize large semi primes as for the case in RSA Cryptosystem.
RSA强大的密码系统工作原理是整数分解没有平凡的解。此外,当涉及到经典计算机的处理能力时,非常大的半素数的因式分解不能在多项式时间内完成。本文对费马大定理和阿诺德定理进行了分析。此外,还强调了一些新技术,如阿诺德的数字化求和技术(A.D.S.T.)和从上到下、从下到上的搜索主要因素的方法。这大大减少了分解大型半素数所需的时间,就像RSA密码系统中的情况一样。
{"title":"Large Semi Primes Factorization with Its Implications to RSA Cryptosystems","authors":"R. Omollo, Arnold Okoth","doi":"10.54646/bijscit.011","DOIUrl":"https://doi.org/10.54646/bijscit.011","url":null,"abstract":"RSA’s strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of classical computers. In this paper, we present the analysis of Fermat’s Last Theorem and Arnold’s Theorem. Also highlighted include new techniques such as Arnold’s Digitized Summation Technique (A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce the time taken to factorize large semi primes as for the case in RSA Cryptosystem.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy clustering and energy resourceful routing protocol (FCER2P) for smart dust 基于模糊聚类和能量资源路由协议的智能粉尘
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.22
R. D, Rajanna G. S.
Sensor nodes in smart dust are used to track and identify data that is being transferred to a sink. The accessibility of node energy poses a significant challenge for smart dust and may have an impact on the long-term viability of the network. As a result, constructing smart dust must take into account the need for algorithms and techniques that enable the most use of scarce resources, especially energy resources. For instance, routing algorithms are distinctive algorithms because they have a clear and direct connection with network longevity and energy. The offered routing techniques use clustering each round and single-hop data delivery to the sink. A Fuzzy Clustering and Energy Resourceful Routing Protocol (FCER2P) that reduces smart dust energy consumption and lengthens lifespan of the network is proposed in this research. Using a specified threshold, FCER2P proposes a new cluster-based fuzzy routing mechanism that can make use of clustering and multiple hop routing capabilities simultaneously. This research is innovative in that it adjusts multi-hop connectivity by anticipating the optimum intermediate node for aggregating and the sink, eliminates clustering each round while taking a fixed threshold into account, and eliminates clustering per round altogether. When choosing the intermediary node to employ, some fuzzy parameters, including residual energy, the number of neighbors, and the distance to the sink, are taken into account.
智能灰尘中的传感器节点用于跟踪和识别传输到接收器的数据。节点能量的可及性对智能尘埃提出了重大挑战,并可能影响网络的长期生存能力。因此,构建智能粉尘必须考虑到对算法和技术的需求,这些算法和技术能够最大限度地利用稀缺资源,特别是能源资源。例如,路由算法是独特的算法,因为它们与网络寿命和能量有明确而直接的联系。所提供的路由技术使用每轮集群和单跳数据传递到接收器。本文提出了一种模糊聚类和能量资源路由协议(FCER2P),该协议可以降低智能粉尘能耗,延长网络寿命。FCER2P提出了一种新的基于集群的模糊路由机制,该机制可以同时利用集群和多跳路由能力。该研究的创新之处在于,它通过预测聚合和汇聚的最佳中间节点来调整多跳连接,在考虑固定阈值的情况下每轮消除聚类,并完全消除每轮聚类。在选择中间节点时,考虑了一些模糊参数,包括剩余能量、邻居数和到汇聚点的距离。
{"title":"Fuzzy clustering and energy resourceful routing protocol (FCER2P) for smart dust","authors":"R. D, Rajanna G. S.","doi":"10.54646/bijscit.22","DOIUrl":"https://doi.org/10.54646/bijscit.22","url":null,"abstract":"Sensor nodes in smart dust are used to track and identify data that is being transferred to a sink. The accessibility of node energy poses a significant challenge for smart dust and may have an impact on the long-term viability of the network. As a result, constructing smart dust must take into account the need for algorithms and techniques that enable the most use of scarce resources, especially energy resources. For instance, routing algorithms are distinctive algorithms because they have a clear and direct connection with network longevity and energy. The offered routing techniques use clustering each round and single-hop data delivery to the sink. A Fuzzy Clustering and Energy Resourceful Routing Protocol (FCER2P) that reduces smart dust energy consumption and lengthens lifespan of the network is proposed in this research. Using a specified threshold, FCER2P proposes a new cluster-based fuzzy routing mechanism that can make use of clustering and multiple hop routing capabilities simultaneously. This research is innovative in that it adjusts multi-hop connectivity by anticipating the optimum intermediate node for aggregating and the sink, eliminates clustering each round while taking a fixed threshold into account, and eliminates clustering per round altogether. When choosing the intermediary node to employ, some fuzzy parameters, including residual energy, the number of neighbors, and the distance to the sink, are taken into account.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125462694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Translator from Portuguese (Voice and Text) to Portuguese Sign Language 自动翻译从葡萄牙语(语音和文字)到葡萄牙语手语
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.014
Ma¨eva de Brito, N. Domingues
One of the major focuses of technology, engineering and computer science is to solve problems and improve the quality of life in health. The relationship between health and technology has made great advances in the last decades, and many cooperations are foreseen. Some citizens still have to deal with many obstacles daily to cope with the society as it is designed. One of the obstacles citizens deal with is deaf and hearing impairment. In Portugal, there are about 100,000 to 150,000 people with some level of hearing loss, and of these, around 30,000 people use Portuguese Sign Language as their mother tongue ([3]; National Institute for Rehabilitation, 1996). The greatest difficulties are appropriate or amend if necessary. encountered by them are poor communication with hearing people and the need of a translator person. Communication became even more complicated with the mandatory use of face mask, respect for the maximum number of people per division and social distancing due to the COVID-19 pandemic. To diminish or even solve this issue, the authors developed an automatic voice and text translation system to Portuguese sign language with captions. Sign language will be very useful for deaf and hearing impairment citizens, and captions will be useful for deaf and hearing impairment citizens who don’t understand sign language. For that, programming language tools were developed to create a translator with those requests. This article describes the developments and achievements. For the proof of concept, the translator started with 16 images in the database and reached a confidence level between 70 and 90%. This is an incentive to further developments that authors are continuing to produce more improvements in the developed tool.
技术、工程和计算机科学的主要焦点之一是解决问题和提高健康生活质量。在过去的几十年里,健康和技术之间的关系取得了很大的进展,预计会有许多合作。一些公民仍然要处理许多障碍,每天应付社会,因为它的设计。公民面临的障碍之一是耳聋和听力障碍。在葡萄牙,大约有10万到15万人有不同程度的听力损失,其中约有3万人以葡萄牙手语为母语([3];国家康复研究所,1996年)。最大的困难是适当的,必要时可以修改。他们遇到的问题是与听力正常的人沟通不畅,需要一个翻译人员。由于COVID-19大流行,强制使用口罩,尊重每个部门的最大人数以及保持社交距离,沟通变得更加复杂。为了减少甚至解决这个问题,作者开发了一个葡萄牙语手语自动语音和文本翻译系统。手语对聋人和听障人士非常有用,而文字说明对不懂手语的聋人和听障人士也很有用。为此,开发了编程语言工具来创建符合这些要求的翻译器。本文描述了这方面的发展和成就。对于概念验证,翻译器从数据库中的16张图像开始,并达到了70到90%之间的置信度。这是对进一步开发的一种激励,作者正在继续对开发的工具进行更多的改进。
{"title":"Automatic Translator from Portuguese (Voice and Text) to Portuguese Sign Language","authors":"Ma¨eva de Brito, N. Domingues","doi":"10.54646/bijscit.014","DOIUrl":"https://doi.org/10.54646/bijscit.014","url":null,"abstract":"One of the major focuses of technology, engineering and computer science is to solve problems and improve the quality of life in health. The relationship between health and technology has made great advances in the last decades, and many cooperations are foreseen. Some citizens still have to deal with many obstacles daily to cope with the society as it is designed. One of the obstacles citizens deal with is deaf and hearing impairment. In Portugal, there are about 100,000 to 150,000 people with some level of hearing loss, and of these, around 30,000 people use Portuguese Sign Language as their mother tongue ([3]; National Institute for Rehabilitation, 1996). The greatest difficulties are appropriate or amend if necessary. encountered by them are poor communication with hearing people and the need of a translator person. Communication became even more complicated with the mandatory use of face mask, respect for the maximum number of people per division and social distancing due to the COVID-19 pandemic. To diminish or even solve this issue, the authors developed an automatic voice and text translation system to Portuguese sign language with captions. Sign language will be very useful for deaf and hearing impairment citizens, and captions will be useful for deaf and hearing impairment citizens who don’t understand sign language. For that, programming language tools were developed to create a translator with those requests. This article describes the developments and achievements. For the proof of concept, the translator started with 16 images in the database and reached a confidence level between 70 and 90%. This is an incentive to further developments that authors are continuing to produce more improvements in the developed tool.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel intrusion detection system for IIoT using inception convolutional neural network 基于初始卷积神经网络的工业物联网入侵检测系统
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.23
Ofoegbunam Emmanuel Izuchukwu, Chigbo Paul Amalu, Ajao Saheed
The purpose of this study is to compare the accuracy of several deep-learning models for the identification of rice weed. In this study, 1500 datasets of local rice and 1000 datasets of weed were resized and applied to the input size of the network, respectively. A total of 70% of the data were used for training, and the remaining 30% were used for validation. MATLAB R2018a was used to construct the AlexNet pre-trained model using a transfer learning strategy, and by changing the AlexNet model, RiceWeedNet, a convolutional neural network, was created. Metrics such as network accuracy, recognition accuracy, precision, and recall were used to assess both models’ performances. While the test set’s identification accuracy is 97.713415%, its precision is 0.9776, and its recall value is 0.9803. The RiceWeedNet model achieved a network accuracy of 100%. A network accuracy of 90% and a recognition accuracy of 73.780488% were reported by the AlexNet model, respectively. The created model may be used instead of conventional weed detectors.
本研究的目的是比较几种用于水稻杂草识别的深度学习模型的准确性。在本研究中,将1500个本地水稻数据集和1000个杂草数据集分别调整大小并应用于网络的输入大小。总共70%的数据用于训练,其余30%用于验证。利用MATLAB R2018a采用迁移学习策略构建AlexNet预训练模型,通过改变AlexNet模型,创建卷积神经网络RiceWeedNet。网络准确性、识别准确性、精度和召回率等指标被用来评估两种模型的性能。测试集的识别准确率为97.713415%,精密度为0.9776,召回率为0.9803。RiceWeedNet模型的网络准确率达到100%。AlexNet模型的网络准确率为90%,识别准确率为73.780488%。所创建的模型可以用来代替传统的杂草探测器。
{"title":"A novel intrusion detection system for IIoT using inception convolutional neural network","authors":"Ofoegbunam Emmanuel Izuchukwu, Chigbo Paul Amalu, Ajao Saheed","doi":"10.54646/bijscit.23","DOIUrl":"https://doi.org/10.54646/bijscit.23","url":null,"abstract":"The purpose of this study is to compare the accuracy of several deep-learning models for the identification of rice weed. In this study, 1500 datasets of local rice and 1000 datasets of weed were resized and applied to the input size of the network, respectively. A total of 70% of the data were used for training, and the remaining 30% were used for validation. MATLAB R2018a was used to construct the AlexNet pre-trained model using a transfer learning strategy, and by changing the AlexNet model, RiceWeedNet, a convolutional neural network, was created. Metrics such as network accuracy, recognition accuracy, precision, and recall were used to assess both models’ performances. While the test set’s identification accuracy is 97.713415%, its precision is 0.9776, and its recall value is 0.9803. The RiceWeedNet model achieved a network accuracy of 100%. A network accuracy of 90% and a recognition accuracy of 73.780488% were reported by the AlexNet model, respectively. The created model may be used instead of conventional weed detectors.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine 基于支持向量机的云计算容错方法
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.010
Gajendra Sharma
Fault tolerance is an important issue in the field of cloud computing which is concerned with the techniques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning. Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a systematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine learning algorithm with cloud computing.
容错是云计算领域的一个重要问题,它涉及到使系统能够容忍在其运行过程中可能遇到的错误所需的技术或机制。容错策略可分为主动容错策略、被动容错策略和自适应容错策略。通过系统的解决方案,将损失降至最低,保证关键业务的可用性和可靠性。本研究的目的和范围是将机器学习算法的优势与云计算相结合,推荐支持向量机(Support Vector Machine)这一监督式机器学习算法主动监测故障,从而提高可用性和可靠性。
{"title":"A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine","authors":"Gajendra Sharma","doi":"10.54646/bijscit.010","DOIUrl":"https://doi.org/10.54646/bijscit.010","url":null,"abstract":"Fault tolerance is an important issue in the field of cloud computing which is concerned with the techniques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning. Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a systematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine learning algorithm with cloud computing.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithm to Extract the Costume’s Size by Fuzzy Logic 基于模糊逻辑的服装尺寸提取算法
Pub Date : 1900-01-01 DOI: 10.54646/bijscit.012
Thi Nguyen Mong Hien, Tran Thi Minh Hieu
This study presents the algorithm to extract the size of the ready-to-wear clothing, which is men's T-shirts with f. house branding. The table has four sizes, and the size labels are signed by S, M, L, and XL. Authors use fuzzy logic to establish the algorithm model. In this model, the input variables have three inputs, which are the body height, weight, and bust girth measurements. In the output variables are the results of size coding. From this size chart table, the authors choose the primary dimensions to be the input variables of the algorithm. The first dimension is a vertical dimension, and the other two dimensions are horizontal dimensions. The vertical dimension is height. Two horizontal dimensions are weight and bust girth. The sizes in the table are encoded to be used for the algorithm results, and the output is the encoded sequence number, which is also the size to be searched. After running this simulation program, measurements of three primary dimensions in size are tested on customers using two methods for two objects. An algorithm for extracting the size of ready-to-wear clothes by the fuzzy logic method reduces the time it takes to choose the size that fits body measurements. In addition, this research direction is consistent with the trend of digital development.
本研究提出了一种提取成衣尺寸的算法,即f. house品牌的男士t恤。表格有四种尺寸,尺寸标签上有S、M、L、XL的签名。采用模糊逻辑建立算法模型。在这个模型中,输入变量有三个输入,分别是身高、体重和胸围。在输出变量中是大小编码的结果。从这个尺寸表中,作者选择了主要的维度作为算法的输入变量。第一个维度是垂直维度,另外两个维度是水平维度。垂直尺寸是高度。两个水平尺寸是体重和胸围。表中的大小被编码以用于算法结果,输出是编码的序列号,这也是要搜索的大小。在运行此模拟程序后,对客户使用两种方法对两个对象进行三个主要尺寸的测量。利用模糊逻辑方法提取成衣尺码的算法,减少了选择适合身体尺寸的尺码所需的时间。此外,这一研究方向也符合数字化发展的趋势。
{"title":"An Algorithm to Extract the Costume’s Size by Fuzzy Logic","authors":"Thi Nguyen Mong Hien, Tran Thi Minh Hieu","doi":"10.54646/bijscit.012","DOIUrl":"https://doi.org/10.54646/bijscit.012","url":null,"abstract":"This study presents the algorithm to extract the size of the ready-to-wear clothing, which is men's T-shirts with f. house branding. The table has four sizes, and the size labels are signed by S, M, L, and XL. Authors use fuzzy logic to establish the algorithm model. In this model, the input variables have three inputs, which are the body height, weight, and bust girth measurements. In the output variables are the results of size coding. From this size chart table, the authors choose the primary dimensions to be the input variables of the algorithm. The first dimension is a vertical dimension, and the other two dimensions are horizontal dimensions. The vertical dimension is height. Two horizontal dimensions are weight and bust girth. The sizes in the table are encoded to be used for the algorithm results, and the output is the encoded sequence number, which is also the size to be searched. After running this simulation program, measurements of three primary dimensions in size are tested on customers using two methods for two objects. An algorithm for extracting the size of ready-to-wear clothes by the fuzzy logic method reduces the time it takes to choose the size that fits body measurements. In addition, this research direction is consistent with the trend of digital development.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127573334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
BOHR International Journal of Smart Computing and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1