首页 > 最新文献

International Journal of Information Technology and Computer Science最新文献

英文 中文
Design and Implementation of a Web-based Document Management System 基于web的文档管理系统的设计与实现
Pub Date : 2023-04-08 DOI: 10.5815/ijitcs.2023.02.04
Samuel M. Alade
One area that has seen rapid growth and differing perspectives from many developers in recent years is document management. This idea has advanced beyond some of the steps where developers have made it simple for anyone to access papers in a matter of seconds. It is impossible to overstate the importance of document management systems as a necessity in the workplace environment of an organization. Interviews, scenario creation using participants' and stakeholders' first-hand accounts, and examination of current procedures and structures were all used to collect data. The development approach followed a software development methodology called Object-Oriented Hypermedia Design Methodology. With the help of Unified Modeling Language (UML) tools, a web-based electronic document management system (WBEDMS) was created. Its database was created using MySQL, and the system was constructed using web technologies including XAMPP, HTML, and PHP Programming language. The results of the system evaluation showed a successful outcome. After using the system that was created, respondents' satisfaction with it was 96.60%. This shows that the document system was regarded as adequate and excellent enough to achieve or meet the specified requirement when users (secretaries and departmental personnel) used it. Result showed that the system developed yielded an accuracy of 95% and usability of 99.20%. The report came to the conclusion that a suggested electronic document management system would improve user happiness, boost productivity, and guarantee time and data efficiency. It follows that well-known document management systems undoubtedly assist in holding and managing a substantial portion of the knowledge assets, which include documents and other associated items, of Organizations.
近年来,文档管理是一个快速增长的领域,许多开发人员对此有不同的看法。这个想法已经超越了开发人员使任何人都可以在几秒钟内轻松访问文件的一些步骤。在组织的工作环境中,文档管理系统的重要性是不可能被夸大的。访谈,利用参与者和利益相关者的第一手资料创建场景,以及对当前程序和结构的检查都用于收集数据。开发方法遵循一种称为面向对象超媒体设计方法的软件开发方法。在统一建模语言(UML)工具的帮助下,创建了基于web的电子文档管理系统(WBEDMS)。数据库采用MySQL建立,系统采用XAMPP、HTML、PHP编程语言等web技术构建。系统评估的结果显示了一个成功的结果。在使用创建的系统后,受访者的满意度为96.60%。这表明当用户(秘书和部门人员)使用该文件系统时,该文件系统被认为是充分和优秀的,足以达到或满足规定的要求。结果表明,该系统的准确率为95%,可用性为99.20%。该报告得出的结论是,建议的电子文档管理系统将提高用户的幸福感,提高生产力,并保证时间和数据效率。由此可见,众所周知的文件管理系统无疑有助于持有和管理组织的大部分知识资产,其中包括文件和其他相关项目。
{"title":"Design and Implementation of a Web-based Document Management System","authors":"Samuel M. Alade","doi":"10.5815/ijitcs.2023.02.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.04","url":null,"abstract":"One area that has seen rapid growth and differing perspectives from many developers in recent years is document management. This idea has advanced beyond some of the steps where developers have made it simple for anyone to access papers in a matter of seconds. It is impossible to overstate the importance of document management systems as a necessity in the workplace environment of an organization. Interviews, scenario creation using participants' and stakeholders' first-hand accounts, and examination of current procedures and structures were all used to collect data. The development approach followed a software development methodology called Object-Oriented Hypermedia Design Methodology. With the help of Unified Modeling Language (UML) tools, a web-based electronic document management system (WBEDMS) was created. Its database was created using MySQL, and the system was constructed using web technologies including XAMPP, HTML, and PHP Programming language. The results of the system evaluation showed a successful outcome. After using the system that was created, respondents' satisfaction with it was 96.60%. This shows that the document system was regarded as adequate and excellent enough to achieve or meet the specified requirement when users (secretaries and departmental personnel) used it. Result showed that the system developed yielded an accuracy of 95% and usability of 99.20%. The report came to the conclusion that a suggested electronic document management system would improve user happiness, boost productivity, and guarantee time and data efficiency. It follows that well-known document management systems undoubtedly assist in holding and managing a substantial portion of the knowledge assets, which include documents and other associated items, of Organizations.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Early and Accurate Diagnosis of a Neurological Disorder Epilepsy Using Machine Learning Techniques 使用机器学习技术早期准确诊断神经系统疾病癫痫
Pub Date : 2023-04-08 DOI: 10.5815/ijitcs.2023.02.05
S. Rangaswamy, Jinka Rakesh, Perla Leela charan, Deeptha Giridhar
An epileptic seizure is a type of seizure induced by aberrant brain activity caused by an epileptic condition, which is a brain Central Nervous System disorder (CNS). CNSs are relatively prevalent and include a wide range of symptoms, including loss of awareness, and strange behaviour. These symptoms frequently result in injuries as a result of walking imbalance, tongue biting, and hearing loss. For many researchers, detecting a prospective seizure in advance has been a difficult undertaking. In this research work we have used non-imaging data and applied supervised learning algorithms to determine the classification of epilepsy and try to improve the efficiency of the model, compared to the existing ones. Random Forest algorithm was found to have highest accuracy compared to other machine learning models. The paper can be helpful in diagnosing high-risk brain diseases and predicting diseases such as Alzheimer's with symptoms challenging to predict and diseases with overlapping symptoms and overlapping symptoms and attribute values. The scope of the research work can be further extended to determine at which stage the epilepsy is present in a patient, in order to provide a correct diagnosis and medical treatment.
癫痫发作是由癫痫状态引起的异常大脑活动引起的一种癫痫发作,是一种大脑中枢神经系统疾病(CNS)。神经性麻痹相对普遍,症状范围广泛,包括意识丧失和行为怪异。这些症状通常会导致行走不平衡、咬舌头和听力丧失。对于许多研究人员来说,提前发现潜在的癫痫发作是一项艰巨的任务。在本研究中,我们使用非成像数据,并应用监督学习算法来确定癫痫的分类,与现有的模型相比,我们试图提高模型的效率。与其他机器学习模型相比,随机森林算法具有最高的准确性。该方法可以帮助诊断高危脑疾病,预测阿尔茨海默病等症状难以预测的疾病,以及症状重叠、症状与属性值重叠的疾病。研究工作的范围可以进一步扩大,以确定患者出现癫痫的哪个阶段,以便提供正确的诊断和医疗。
{"title":"Early and Accurate Diagnosis of a Neurological Disorder Epilepsy Using Machine Learning Techniques","authors":"S. Rangaswamy, Jinka Rakesh, Perla Leela charan, Deeptha Giridhar","doi":"10.5815/ijitcs.2023.02.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.05","url":null,"abstract":"An epileptic seizure is a type of seizure induced by aberrant brain activity caused by an epileptic condition, which is a brain Central Nervous System disorder (CNS). CNSs are relatively prevalent and include a wide range of symptoms, including loss of awareness, and strange behaviour. These symptoms frequently result in injuries as a result of walking imbalance, tongue biting, and hearing loss. For many researchers, detecting a prospective seizure in advance has been a difficult undertaking. In this research work we have used non-imaging data and applied supervised learning algorithms to determine the classification of epilepsy and try to improve the efficiency of the model, compared to the existing ones. Random Forest algorithm was found to have highest accuracy compared to other machine learning models. The paper can be helpful in diagnosing high-risk brain diseases and predicting diseases such as Alzheimer's with symptoms challenging to predict and diseases with overlapping symptoms and overlapping symptoms and attribute values. The scope of the research work can be further extended to determine at which stage the epilepsy is present in a patient, in order to provide a correct diagnosis and medical treatment.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130169072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline 机器学习系统不同发展阶段的安全威胁研究
Pub Date : 2023-04-08 DOI: 10.5815/ijitcs.2023.02.03
A. D. Lahe, Guddi Singh
In recent years, Machine learning is being used in various systems in wide variety of applications like Healthcare, Image processing, Computer Vision, Classifications, etc. Machine learning algorithms have shown that it can solve complex problem-solving capabilities close to humans or beyond humans as well. But recent studies show that Machine Learning Algorithms and models are vulnerable to various attacks which compromise security the systems. These attacks are hard to detect because they can hide in data at various stages of machine learning pipeline without being detected. This survey aims to analyse various security attacks on machine learning and categorize them depending on position of attacks in machine learning pipeline. This paper will focus on all aspects of machine learning security at various stages from training phase to testing phase instead of focusing on one type of security attack. Machine Learning pipeline, Attacker’s goals, Attacker’s knowledge, attacks on specified applications are considered in this paper. This paper also presented future scope of research of security attacks in machine learning. In this Survey paper, we concluded that Machine Learning Pipeline itself is vulnerable to different attacks so there is need to build a secure and robust Machine Learning Pipeline. Our survey has categorized these security attacks in details with respect to ML Pipeline stages.
近年来,机器学习被广泛应用于各种系统中,如医疗保健、图像处理、计算机视觉、分类等。机器学习算法已经表明,它可以解决接近人类或超越人类的复杂问题。但最近的研究表明,机器学习算法和模型容易受到各种攻击,从而危及系统的安全性。这些攻击很难被检测到,因为它们可以隐藏在机器学习管道的各个阶段的数据中而不被检测到。本调查旨在分析针对机器学习的各种安全攻击,并根据攻击在机器学习管道中的位置对其进行分类。本文将关注机器学习安全的各个方面,从训练阶段到测试阶段,而不是专注于一种类型的安全攻击。本文讨论了机器学习管道、攻击者的目标、攻击者的知识、对特定应用程序的攻击。本文还提出了机器学习安全攻击的未来研究范围。在这篇调查论文中,我们得出结论,机器学习管道本身容易受到不同的攻击,因此需要建立一个安全可靠的机器学习管道。我们的调查针对ML Pipeline阶段对这些安全攻击进行了详细分类。
{"title":"A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline","authors":"A. D. Lahe, Guddi Singh","doi":"10.5815/ijitcs.2023.02.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.03","url":null,"abstract":"In recent years, Machine learning is being used in various systems in wide variety of applications like Healthcare, Image processing, Computer Vision, Classifications, etc. Machine learning algorithms have shown that it can solve complex problem-solving capabilities close to humans or beyond humans as well. But recent studies show that Machine Learning Algorithms and models are vulnerable to various attacks which compromise security the systems. These attacks are hard to detect because they can hide in data at various stages of machine learning pipeline without being detected. This survey aims to analyse various security attacks on machine learning and categorize them depending on position of attacks in machine learning pipeline. This paper will focus on all aspects of machine learning security at various stages from training phase to testing phase instead of focusing on one type of security attack. Machine Learning pipeline, Attacker’s goals, Attacker’s knowledge, attacks on specified applications are considered in this paper. This paper also presented future scope of research of security attacks in machine learning. In this Survey paper, we concluded that Machine Learning Pipeline itself is vulnerable to different attacks so there is need to build a secure and robust Machine Learning Pipeline. Our survey has categorized these security attacks in details with respect to ML Pipeline stages.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing PI Controller for SEPIC Converter with Optimization Algorithm 用优化算法优化SEPIC变换器的PI控制器
Pub Date : 2023-04-08 DOI: 10.5815/ijitcs.2023.02.02
Sushma Kamlu, G. Shivanesh, Amlan Gain
This paper refers to work evaluating the performance of PI controllers integrated with optimization techniques designed for Single Ended Primary Inductance Converters (SEPIC). With the SEPIC converter, a constant voltage output can be retained while switching a range of dc voltages. Performance of PI controller has been combined with Artificial Bee Colony (ABC) Algorithm, Particle swarm optimization (PSO) Algorithm, Whale optimization algorithm (WOA). In this research, a performance analysis of the SEPIC dc-dc converter controller constructed with the aforementioned optimization strategies is carried out. Statistics proves WOA provides best stability exhibited with fast response when compared to other optimization techniques.
本文研究了单端初级电感变换器(SEPIC) PI控制器与优化技术相结合的性能评估工作。使用SEPIC转换器,在切换直流电压范围时可以保持恒定的电压输出。PI控制器的性能与人工蜂群(ABC)算法、粒子群优化(PSO)算法、鲸鱼优化算法(WOA)相结合。本研究对采用上述优化策略构建的SEPIC dc-dc变换器控制器进行了性能分析。统计数据证明,与其他优化技术相比,WOA提供了最佳的稳定性和快速响应。
{"title":"Optimizing PI Controller for SEPIC Converter with Optimization Algorithm","authors":"Sushma Kamlu, G. Shivanesh, Amlan Gain","doi":"10.5815/ijitcs.2023.02.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.02","url":null,"abstract":"This paper refers to work evaluating the performance of PI controllers integrated with optimization techniques designed for Single Ended Primary Inductance Converters (SEPIC). With the SEPIC converter, a constant voltage output can be retained while switching a range of dc voltages. Performance of PI controller has been combined with Artificial Bee Colony (ABC) Algorithm, Particle swarm optimization (PSO) Algorithm, Whale optimization algorithm (WOA). In this research, a performance analysis of the SEPIC dc-dc converter controller constructed with the aforementioned optimization strategies is carried out. Statistics proves WOA provides best stability exhibited with fast response when compared to other optimization techniques.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of IoT Cloud-based Platform for Smart Farming in the Sub-saharan Africa with Implementation of Smart-irrigation as Test-Case 在撒哈拉以南非洲开发基于物联网云的智能农业平台,并实施智能灌溉作为测试案例
Pub Date : 2023-04-08 DOI: 10.5815/ijitcs.2023.02.01
S. Okoh, E. N. Onwuka, Bala Alhaji Salihu, S. Zubairu, P. Dibal, E. Nwankwo
UN Department of Economics and Social Affairs predicted that the world population will increase by 2 billion in 2050 with over 50% from the Sub-Saharan Africa (SSA). Considering the level of poverty and food insecurity in the region, there is an urgent need for a sustainable increase in agricultural produce. However, farming approach in the region is primarily traditional. Traditional farming is characterized by high labor costs, low production, and under/oversupply of farm inputs. All these factors make farming unappealing to many. The use of digital technologies such as broadband, Internet of Things (IoT), Cloud computing, and Big Data Analytics promise improved returns on agricultural investments and could make farming appealing even to the youth. However, initial cost of smart farming could be high. Therefore, development of a dedicated IoT cloud-based platform is imperative. Then farmers could subscribe and have their farms managed on the platform. It should be noted that majority of farmers in SSA are smallholders who are poor, uneducated, and live in rural areas but produce about 80% of the food. They majorly use 2G phones, which are not internet enabled. These peculiarities must be factored into the design of any functional IoT platform that would serve this group. This paper presents the development of such a platform, which was tested with smart irrigation of maize crops in a testbed. Besides the convenience provided by the smart system, it recorded irrigation water saving of over 36% compared to the control method which demonstrates how irrigation is done traditionally.
联合国经济和社会事务部预测,到2050年,世界人口将增加20亿,其中超过50%来自撒哈拉以南非洲(SSA)。考虑到该区域的贫困和粮食不安全程度,迫切需要可持续地增加农产品。然而,该地区的耕作方式主要是传统的。传统农业的特点是劳动力成本高,产量低,农业投入不足/供过于求。所有这些因素使得农业对许多人没有吸引力。宽带、物联网(IoT)、云计算和大数据分析等数字技术的使用有望提高农业投资的回报,甚至可能使农业对年轻人产生吸引力。然而,智能农业的初始成本可能很高。因此,开发一个专用的基于云的物联网平台势在必行。然后农民们就可以在这个平台上订阅并管理他们的农场。应该指出的是,SSA的大多数农民都是小农,他们贫穷,没有受过教育,生活在农村地区,但生产了大约80%的粮食。他们主要使用不支持互联网的2G手机。任何为这一群体服务的功能物联网平台的设计都必须考虑到这些特性。本文介绍了该平台的开发过程,并在玉米作物智能灌溉试验台上进行了试验。除了智能系统提供的便利之外,与传统的灌溉方式相比,它记录了超过36%的灌溉节水。
{"title":"Development of IoT Cloud-based Platform for Smart Farming in the Sub-saharan Africa with Implementation of Smart-irrigation as Test-Case","authors":"S. Okoh, E. N. Onwuka, Bala Alhaji Salihu, S. Zubairu, P. Dibal, E. Nwankwo","doi":"10.5815/ijitcs.2023.02.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.01","url":null,"abstract":"UN Department of Economics and Social Affairs predicted that the world population will increase by 2 billion in 2050 with over 50% from the Sub-Saharan Africa (SSA). Considering the level of poverty and food insecurity in the region, there is an urgent need for a sustainable increase in agricultural produce. However, farming approach in the region is primarily traditional. Traditional farming is characterized by high labor costs, low production, and under/oversupply of farm inputs. All these factors make farming unappealing to many. The use of digital technologies such as broadband, Internet of Things (IoT), Cloud computing, and Big Data Analytics promise improved returns on agricultural investments and could make farming appealing even to the youth. However, initial cost of smart farming could be high. Therefore, development of a dedicated IoT cloud-based platform is imperative. Then farmers could subscribe and have their farms managed on the platform. It should be noted that majority of farmers in SSA are smallholders who are poor, uneducated, and live in rural areas but produce about 80% of the food. They majorly use 2G phones, which are not internet enabled. These peculiarities must be factored into the design of any functional IoT platform that would serve this group. This paper presents the development of such a platform, which was tested with smart irrigation of maize crops in a testbed. Besides the convenience provided by the smart system, it recorded irrigation water saving of over 36% compared to the control method which demonstrates how irrigation is done traditionally.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Scalability of Matrix Factorization and Neighborhood Based Recommender Systems 基于矩阵分解和邻域的推荐系统的可扩展性评价
Pub Date : 2023-02-08 DOI: 10.5815/ijitcs.2023.01.03
Nikita Taneja, H. Thakur
Recommendation Systems are everywhere, from offline shopping malls to major e-commerce websites, all use recommendation systems to enhance customer experience and grow profit. With a growing customer base, the requirement to store their interest, behavior and respond accordingly requires plenty of scalability. Thus, it is very important for companies to select a scalable recommender system, which can provide the recommendations not just accurately but with low latency as well. This paper focuses on the comparison between the four methods KMeans, KNN, SVD, and SVD++ to find out the better algorithm in terms of scalability. We have analyzed the methods on different parameters i.e., Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Precision, Recall and Running Time (Scalability). Results are elaborated such that selection becomes quite easy depending upon the user requirements.
推荐系统无处不在,从线下购物中心到大型电子商务网站,都使用推荐系统来提升客户体验和增加利润。随着客户群的增长,需要存储他们的兴趣、行为和相应的响应,这需要大量的可扩展性。因此,对于公司来说,选择一个可扩展的推荐系统是非常重要的,它不仅可以准确地提供推荐,而且延迟也很低。本文重点对KMeans、KNN、SVD和svd++四种方法进行比较,找出在可扩展性方面更好的算法。我们分析了不同参数的方法,即均方根误差(RMSE),平均绝对误差(MAE),精度,召回率和运行时间(可扩展性)。结果详细说明,选择变得相当容易,取决于用户的要求。
{"title":"Evaluating the Scalability of Matrix Factorization and Neighborhood Based Recommender Systems","authors":"Nikita Taneja, H. Thakur","doi":"10.5815/ijitcs.2023.01.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.03","url":null,"abstract":"Recommendation Systems are everywhere, from offline shopping malls to major e-commerce websites, all use recommendation systems to enhance customer experience and grow profit. With a growing customer base, the requirement to store their interest, behavior and respond accordingly requires plenty of scalability. Thus, it is very important for companies to select a scalable recommender system, which can provide the recommendations not just accurately but with low latency as well. This paper focuses on the comparison between the four methods KMeans, KNN, SVD, and SVD++ to find out the better algorithm in terms of scalability. We have analyzed the methods on different parameters i.e., Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Precision, Recall and Running Time (Scalability). Results are elaborated such that selection becomes quite easy depending upon the user requirements.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontology-driven Intelligent IT Incident Management Model 本体驱动的智能IT事件管理模型
Pub Date : 2023-02-08 DOI: 10.5815/ijitcs.2023.01.04
Bisrat Betru, Fekade Getahun
A significant number of Information Technology incidents are reported through email. To design and implement an intelligent incident management system, it is significant to automatically classify the reported incident to a given incident category. This requires the extraction of semantic content from the reported email text. In this research work, we have attempted to classify a reported incident to a given category based on its semantic content using ontology. We have developed an Incident Ontology that can serve as a knowledge base for the incident management system. We have also developed an automatic incident classifier that matches the semantical units of the incident report with concepts in the incident ontology. According to our evaluation, ontology-driven incident classification facilitates the process of Information Technology incident management in a better way since the model shows 100% recall, 66% precision, and 79% F1-Score for sample incident reports.
相当数量的资讯科技事故是透过电子邮件报告的。为了设计和实现智能事件管理系统,将报告的事件自动分类到给定的事件类别是非常重要的。这需要从报告的电子邮件文本中提取语义内容。在这项研究工作中,我们尝试使用本体将报告的事件根据其语义内容分类到给定的类别。我们已经开发了一个事件本体,它可以作为事件管理系统的知识库。我们还开发了一个自动事件分类器,它将事件报告的语义单元与事件本体中的概念相匹配。根据我们的评估,本体驱动的事件分类以更好的方式促进了信息技术事件管理过程,因为该模型显示了100%的召回率,66%的准确率和79%的样本事件报告F1-Score。
{"title":"Ontology-driven Intelligent IT Incident Management Model","authors":"Bisrat Betru, Fekade Getahun","doi":"10.5815/ijitcs.2023.01.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.04","url":null,"abstract":"A significant number of Information Technology incidents are reported through email. To design and implement an intelligent incident management system, it is significant to automatically classify the reported incident to a given incident category. This requires the extraction of semantic content from the reported email text. In this research work, we have attempted to classify a reported incident to a given category based on its semantic content using ontology. We have developed an Incident Ontology that can serve as a knowledge base for the incident management system. We have also developed an automatic incident classifier that matches the semantical units of the incident report with concepts in the incident ontology. According to our evaluation, ontology-driven incident classification facilitates the process of Information Technology incident management in a better way since the model shows 100% recall, 66% precision, and 79% F1-Score for sample incident reports.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Trust Management System for the Nigerian Cyber-health Community 尼日利亚网络健康社区的信任管理系统
Pub Date : 2023-02-08 DOI: 10.5815/ijitcs.2023.01.02
Ifeoluwa Jenyo, E. A. Amusan, J. Emuoyibofarhe
Trust is a basic requirement for the acceptance and adoption of new services related to health care, and therefore, vital in ensuring that the integrity of shared patient information among multi-care providers is preserved and that no one has tampered with it. The cyber-health community in Nigeria is in its infant stage with health care systems and services being mostly fragmented, disjointed, and heterogeneous with strong local autonomy and distributed among several healthcare givers platforms. There is the need for a trust management structure for guaranteed privacy and confidentiality to mitigate vulnerabilities to privacy thefts. In this paper, we developed an efficient Trust Management System that hybridized Real-Time Integrity Check (RTIC) and Dynamic Trust Negotiation (DTN) premised on the Confidentiality, Integrity, and Availability (CIA) model of information security. This was achieved through the design and implementation of an indigenous and generic architectural framework and model for a secured Trust Management System with the use of the advanced encryption standard (AES-256) algorithm for securing health records during transmission. The developed system achieved Reliabity score, Accuracy and Availability of 0.97, 91.30% and 96.52% respectively.
信任是接受和采用与卫生保健有关的新服务的一项基本要求,因此,信任对于确保多个保健提供者之间共享的患者信息的完整性以及没有人对其进行篡改至关重要。尼日利亚的网络卫生社区处于初级阶段,卫生保健系统和服务大多是分散的、脱节的和异构的,具有很强的地方自主权,分布在几个医疗保健提供者平台上。需要一个信任管理结构来保证隐私和机密性,以减轻隐私盗窃的脆弱性。本文以信息安全的机密性、完整性和可用性(CIA)模型为前提,开发了一种混合实时完整性检查(RTIC)和动态信任协商(DTN)的高效信任管理系统。这是通过为安全信任管理系统设计和实施本地通用架构框架和模型来实现的,该系统使用高级加密标准(AES-256)算法来保护传输过程中的健康记录。该系统的可靠性评分为0.97,准确率为91.30%,可用性为96.52%。
{"title":"A Trust Management System for the Nigerian Cyber-health Community","authors":"Ifeoluwa Jenyo, E. A. Amusan, J. Emuoyibofarhe","doi":"10.5815/ijitcs.2023.01.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.02","url":null,"abstract":"Trust is a basic requirement for the acceptance and adoption of new services related to health care, and therefore, vital in ensuring that the integrity of shared patient information among multi-care providers is preserved and that no one has tampered with it. The cyber-health community in Nigeria is in its infant stage with health care systems and services being mostly fragmented, disjointed, and heterogeneous with strong local autonomy and distributed among several healthcare givers platforms. There is the need for a trust management structure for guaranteed privacy and confidentiality to mitigate vulnerabilities to privacy thefts. In this paper, we developed an efficient Trust Management System that hybridized Real-Time Integrity Check (RTIC) and Dynamic Trust Negotiation (DTN) premised on the Confidentiality, Integrity, and Availability (CIA) model of information security. This was achieved through the design and implementation of an indigenous and generic architectural framework and model for a secured Trust Management System with the use of the advanced encryption standard (AES-256) algorithm for securing health records during transmission. The developed system achieved Reliabity score, Accuracy and Availability of 0.97, 91.30% and 96.52% respectively.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126685191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Query Expansion Approach for Improving Web Search Ranking 一种新的提高网络搜索排名的查询扩展方法
Pub Date : 2023-02-08 DOI: 10.5815/ijitcs.2023.01.05
S. Akuma, Promise Anendah
Information systems have come a long way in the 21st century, with search engines emerging as the most popular and well-known retrieval systems. Several techniques have been used by researchers to improve the retrieval of relevant results from search engines. One of the approaches employed for improving relevant feedback of a retrieval system is Query Expansion (QE). The challenge associated with this technique is how to select the most relevant terms for the expansion. In this research work, we propose a query expansion technique based on Azak & Deepak's WWQE model. Our extended WWQE technique adopts Candidate Expansion Terms selection with the use of in-links and out-links. The top two relevant Wikipedia articles from the user's initial search were found using a custom search engine over Wikipedia. Following that, we ranked further Wikipedia articles that are semantically connected to the top two Wikipedia articles based on cosine similarity using TF-IDF Vectorizer. The expansion terms were then taken from the top 5 document titles. The results of the evaluation of our methodology utilizing TREC query topics (126-175) revealed that the system with extended features gave ranked results that were 11% better than those from the system with unexpanded queries.
信息系统在21世纪已经走过了漫长的道路,搜索引擎成为最流行和最知名的检索系统。研究人员已经使用了几种技术来改进从搜索引擎中检索相关结果。查询扩展(Query Expansion, QE)是改进检索系统相关反馈的方法之一。与此技术相关的挑战是如何为展开选择最相关的术语。在本研究中,我们提出了一种基于Azak & Deepak的WWQE模型的查询扩展技术。我们的扩展WWQE技术采用候选展开项选择,并使用内链接和外链接。用户首次搜索的前两篇相关维基百科文章是通过自定义搜索引擎在维基百科上找到的。接下来,我们使用TF-IDF Vectorizer基于余弦相似度对语义上与前两篇维基百科文章相关的维基百科文章进行排名。然后从前5个文档标题中选取扩展术语。利用TREC查询主题(126-175)对我们的方法进行评估的结果显示,具有扩展特征的系统给出的排名结果比具有未扩展查询的系统的排名结果高出11%。
{"title":"A New Query Expansion Approach for Improving Web Search Ranking","authors":"S. Akuma, Promise Anendah","doi":"10.5815/ijitcs.2023.01.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.05","url":null,"abstract":"Information systems have come a long way in the 21st century, with search engines emerging as the most popular and well-known retrieval systems. Several techniques have been used by researchers to improve the retrieval of relevant results from search engines. One of the approaches employed for improving relevant feedback of a retrieval system is Query Expansion (QE). The challenge associated with this technique is how to select the most relevant terms for the expansion. In this research work, we propose a query expansion technique based on Azak & Deepak's WWQE model. Our extended WWQE technique adopts Candidate Expansion Terms selection with the use of in-links and out-links. The top two relevant Wikipedia articles from the user's initial search were found using a custom search engine over Wikipedia. Following that, we ranked further Wikipedia articles that are semantically connected to the top two Wikipedia articles based on cosine similarity using TF-IDF Vectorizer. The expansion terms were then taken from the top 5 document titles. The results of the evaluation of our methodology utilizing TREC query topics (126-175) revealed that the system with extended features gave ranked results that were 11% better than those from the system with unexpanded queries.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134440763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fast Topological Parallel Algorithm for Traversing Large Datasets 一种快速拓扑并行遍历大型数据集的算法
Pub Date : 2023-02-08 DOI: 10.5815/ijitcs.2023.01.01
T. N. Rodrigues
This work presents a parallel implementation of a graph-generating algorithm designed to be straightforwardly adapted to traverse large datasets. This new approach has been validated in a correlated scenario known as the word ladder problem. The new parallel algorithm induces the same topological structure proposed by its serial version and also builds the shortest path between any pair of words to be connected by a ladder of words. The implemented parallelism paradigm is the Multiple Instruction Stream - Multiple Data Stream (MIMD) and the test suite embraces 23-word ladder instances whose intermediate words were extracted from a dictionary of 183,719 words (dataset). The word morph quality (the shortest path between two input words) and the word morph performance (CPU time) were evaluated against a serial implementation of the original algorithm. The proposed parallel algorithm generated the optimal solution for each pair of words tested, that is, the minimum word ladder connecting an initial word to a final word was found. Thus, there was no negative impact on the quality of the solutions comparing them with those obtained through the serial ANG algorithm. However, there was an outstanding improvement considering the CPU time required to build the word ladder solutions. In fact, the time improvement was up to 99.85%, and speedups greater than 2.0X were achieved with the parallel algorithm.
这项工作提出了一个图形生成算法的并行实现,旨在直接适应遍历大型数据集。这种新方法已经在一个被称为单词阶梯问题的相关场景中得到了验证。新的并行算法引入了与串行算法相同的拓扑结构,并通过单词阶梯建立了任意一对单词之间的最短路径。实现的并行性范例是多指令流-多数据流(MIMD),测试套件包含23个单词的阶梯实例,其中间单词是从183,719个单词的字典(数据集)中提取的。根据原始算法的串行实现,评估了词形质量(两个输入词之间的最短路径)和词形性能(CPU时间)。提出的并行算法为每对被测单词生成最优解,即找到连接初始单词和最终单词的最小单词阶梯。因此,与串行ANG算法得到的解相比,对解的质量没有负面影响。然而,考虑到构建单词阶梯解决方案所需的CPU时间,这是一个显著的改进。实际上,该并行算法的时间改进可达99.85%,速度提升大于2.0X。
{"title":"A Fast Topological Parallel Algorithm for Traversing Large Datasets","authors":"T. N. Rodrigues","doi":"10.5815/ijitcs.2023.01.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.01","url":null,"abstract":"This work presents a parallel implementation of a graph-generating algorithm designed to be straightforwardly adapted to traverse large datasets. This new approach has been validated in a correlated scenario known as the word ladder problem. The new parallel algorithm induces the same topological structure proposed by its serial version and also builds the shortest path between any pair of words to be connected by a ladder of words. The implemented parallelism paradigm is the Multiple Instruction Stream - Multiple Data Stream (MIMD) and the test suite embraces 23-word ladder instances whose intermediate words were extracted from a dictionary of 183,719 words (dataset). The word morph quality (the shortest path between two input words) and the word morph performance (CPU time) were evaluated against a serial implementation of the original algorithm. The proposed parallel algorithm generated the optimal solution for each pair of words tested, that is, the minimum word ladder connecting an initial word to a final word was found. Thus, there was no negative impact on the quality of the solutions comparing them with those obtained through the serial ANG algorithm. However, there was an outstanding improvement considering the CPU time required to build the word ladder solutions. In fact, the time improvement was up to 99.85%, and speedups greater than 2.0X were achieved with the parallel algorithm.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1