Pub Date : 2023-04-08DOI: 10.5815/ijitcs.2023.02.04
Samuel M. Alade
One area that has seen rapid growth and differing perspectives from many developers in recent years is document management. This idea has advanced beyond some of the steps where developers have made it simple for anyone to access papers in a matter of seconds. It is impossible to overstate the importance of document management systems as a necessity in the workplace environment of an organization. Interviews, scenario creation using participants' and stakeholders' first-hand accounts, and examination of current procedures and structures were all used to collect data. The development approach followed a software development methodology called Object-Oriented Hypermedia Design Methodology. With the help of Unified Modeling Language (UML) tools, a web-based electronic document management system (WBEDMS) was created. Its database was created using MySQL, and the system was constructed using web technologies including XAMPP, HTML, and PHP Programming language. The results of the system evaluation showed a successful outcome. After using the system that was created, respondents' satisfaction with it was 96.60%. This shows that the document system was regarded as adequate and excellent enough to achieve or meet the specified requirement when users (secretaries and departmental personnel) used it. Result showed that the system developed yielded an accuracy of 95% and usability of 99.20%. The report came to the conclusion that a suggested electronic document management system would improve user happiness, boost productivity, and guarantee time and data efficiency. It follows that well-known document management systems undoubtedly assist in holding and managing a substantial portion of the knowledge assets, which include documents and other associated items, of Organizations.
{"title":"Design and Implementation of a Web-based Document Management System","authors":"Samuel M. Alade","doi":"10.5815/ijitcs.2023.02.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.04","url":null,"abstract":"One area that has seen rapid growth and differing perspectives from many developers in recent years is document management. This idea has advanced beyond some of the steps where developers have made it simple for anyone to access papers in a matter of seconds. It is impossible to overstate the importance of document management systems as a necessity in the workplace environment of an organization. Interviews, scenario creation using participants' and stakeholders' first-hand accounts, and examination of current procedures and structures were all used to collect data. The development approach followed a software development methodology called Object-Oriented Hypermedia Design Methodology. With the help of Unified Modeling Language (UML) tools, a web-based electronic document management system (WBEDMS) was created. Its database was created using MySQL, and the system was constructed using web technologies including XAMPP, HTML, and PHP Programming language. The results of the system evaluation showed a successful outcome. After using the system that was created, respondents' satisfaction with it was 96.60%. This shows that the document system was regarded as adequate and excellent enough to achieve or meet the specified requirement when users (secretaries and departmental personnel) used it. Result showed that the system developed yielded an accuracy of 95% and usability of 99.20%. The report came to the conclusion that a suggested electronic document management system would improve user happiness, boost productivity, and guarantee time and data efficiency. It follows that well-known document management systems undoubtedly assist in holding and managing a substantial portion of the knowledge assets, which include documents and other associated items, of Organizations.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129660030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-08DOI: 10.5815/ijitcs.2023.02.05
S. Rangaswamy, Jinka Rakesh, Perla Leela charan, Deeptha Giridhar
An epileptic seizure is a type of seizure induced by aberrant brain activity caused by an epileptic condition, which is a brain Central Nervous System disorder (CNS). CNSs are relatively prevalent and include a wide range of symptoms, including loss of awareness, and strange behaviour. These symptoms frequently result in injuries as a result of walking imbalance, tongue biting, and hearing loss. For many researchers, detecting a prospective seizure in advance has been a difficult undertaking. In this research work we have used non-imaging data and applied supervised learning algorithms to determine the classification of epilepsy and try to improve the efficiency of the model, compared to the existing ones. Random Forest algorithm was found to have highest accuracy compared to other machine learning models. The paper can be helpful in diagnosing high-risk brain diseases and predicting diseases such as Alzheimer's with symptoms challenging to predict and diseases with overlapping symptoms and overlapping symptoms and attribute values. The scope of the research work can be further extended to determine at which stage the epilepsy is present in a patient, in order to provide a correct diagnosis and medical treatment.
{"title":"Early and Accurate Diagnosis of a Neurological Disorder Epilepsy Using Machine Learning Techniques","authors":"S. Rangaswamy, Jinka Rakesh, Perla Leela charan, Deeptha Giridhar","doi":"10.5815/ijitcs.2023.02.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.05","url":null,"abstract":"An epileptic seizure is a type of seizure induced by aberrant brain activity caused by an epileptic condition, which is a brain Central Nervous System disorder (CNS). CNSs are relatively prevalent and include a wide range of symptoms, including loss of awareness, and strange behaviour. These symptoms frequently result in injuries as a result of walking imbalance, tongue biting, and hearing loss. For many researchers, detecting a prospective seizure in advance has been a difficult undertaking. In this research work we have used non-imaging data and applied supervised learning algorithms to determine the classification of epilepsy and try to improve the efficiency of the model, compared to the existing ones. Random Forest algorithm was found to have highest accuracy compared to other machine learning models. The paper can be helpful in diagnosing high-risk brain diseases and predicting diseases such as Alzheimer's with symptoms challenging to predict and diseases with overlapping symptoms and overlapping symptoms and attribute values. The scope of the research work can be further extended to determine at which stage the epilepsy is present in a patient, in order to provide a correct diagnosis and medical treatment.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130169072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-08DOI: 10.5815/ijitcs.2023.02.03
A. D. Lahe, Guddi Singh
In recent years, Machine learning is being used in various systems in wide variety of applications like Healthcare, Image processing, Computer Vision, Classifications, etc. Machine learning algorithms have shown that it can solve complex problem-solving capabilities close to humans or beyond humans as well. But recent studies show that Machine Learning Algorithms and models are vulnerable to various attacks which compromise security the systems. These attacks are hard to detect because they can hide in data at various stages of machine learning pipeline without being detected. This survey aims to analyse various security attacks on machine learning and categorize them depending on position of attacks in machine learning pipeline. This paper will focus on all aspects of machine learning security at various stages from training phase to testing phase instead of focusing on one type of security attack. Machine Learning pipeline, Attacker’s goals, Attacker’s knowledge, attacks on specified applications are considered in this paper. This paper also presented future scope of research of security attacks in machine learning. In this Survey paper, we concluded that Machine Learning Pipeline itself is vulnerable to different attacks so there is need to build a secure and robust Machine Learning Pipeline. Our survey has categorized these security attacks in details with respect to ML Pipeline stages.
{"title":"A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline","authors":"A. D. Lahe, Guddi Singh","doi":"10.5815/ijitcs.2023.02.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.03","url":null,"abstract":"In recent years, Machine learning is being used in various systems in wide variety of applications like Healthcare, Image processing, Computer Vision, Classifications, etc. Machine learning algorithms have shown that it can solve complex problem-solving capabilities close to humans or beyond humans as well. But recent studies show that Machine Learning Algorithms and models are vulnerable to various attacks which compromise security the systems. These attacks are hard to detect because they can hide in data at various stages of machine learning pipeline without being detected. This survey aims to analyse various security attacks on machine learning and categorize them depending on position of attacks in machine learning pipeline. This paper will focus on all aspects of machine learning security at various stages from training phase to testing phase instead of focusing on one type of security attack. Machine Learning pipeline, Attacker’s goals, Attacker’s knowledge, attacks on specified applications are considered in this paper. This paper also presented future scope of research of security attacks in machine learning. In this Survey paper, we concluded that Machine Learning Pipeline itself is vulnerable to different attacks so there is need to build a secure and robust Machine Learning Pipeline. Our survey has categorized these security attacks in details with respect to ML Pipeline stages.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130822398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-08DOI: 10.5815/ijitcs.2023.02.02
Sushma Kamlu, G. Shivanesh, Amlan Gain
This paper refers to work evaluating the performance of PI controllers integrated with optimization techniques designed for Single Ended Primary Inductance Converters (SEPIC). With the SEPIC converter, a constant voltage output can be retained while switching a range of dc voltages. Performance of PI controller has been combined with Artificial Bee Colony (ABC) Algorithm, Particle swarm optimization (PSO) Algorithm, Whale optimization algorithm (WOA). In this research, a performance analysis of the SEPIC dc-dc converter controller constructed with the aforementioned optimization strategies is carried out. Statistics proves WOA provides best stability exhibited with fast response when compared to other optimization techniques.
{"title":"Optimizing PI Controller for SEPIC Converter with Optimization Algorithm","authors":"Sushma Kamlu, G. Shivanesh, Amlan Gain","doi":"10.5815/ijitcs.2023.02.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.02","url":null,"abstract":"This paper refers to work evaluating the performance of PI controllers integrated with optimization techniques designed for Single Ended Primary Inductance Converters (SEPIC). With the SEPIC converter, a constant voltage output can be retained while switching a range of dc voltages. Performance of PI controller has been combined with Artificial Bee Colony (ABC) Algorithm, Particle swarm optimization (PSO) Algorithm, Whale optimization algorithm (WOA). In this research, a performance analysis of the SEPIC dc-dc converter controller constructed with the aforementioned optimization strategies is carried out. Statistics proves WOA provides best stability exhibited with fast response when compared to other optimization techniques.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-08DOI: 10.5815/ijitcs.2023.02.01
S. Okoh, E. N. Onwuka, Bala Alhaji Salihu, S. Zubairu, P. Dibal, E. Nwankwo
UN Department of Economics and Social Affairs predicted that the world population will increase by 2 billion in 2050 with over 50% from the Sub-Saharan Africa (SSA). Considering the level of poverty and food insecurity in the region, there is an urgent need for a sustainable increase in agricultural produce. However, farming approach in the region is primarily traditional. Traditional farming is characterized by high labor costs, low production, and under/oversupply of farm inputs. All these factors make farming unappealing to many. The use of digital technologies such as broadband, Internet of Things (IoT), Cloud computing, and Big Data Analytics promise improved returns on agricultural investments and could make farming appealing even to the youth. However, initial cost of smart farming could be high. Therefore, development of a dedicated IoT cloud-based platform is imperative. Then farmers could subscribe and have their farms managed on the platform. It should be noted that majority of farmers in SSA are smallholders who are poor, uneducated, and live in rural areas but produce about 80% of the food. They majorly use 2G phones, which are not internet enabled. These peculiarities must be factored into the design of any functional IoT platform that would serve this group. This paper presents the development of such a platform, which was tested with smart irrigation of maize crops in a testbed. Besides the convenience provided by the smart system, it recorded irrigation water saving of over 36% compared to the control method which demonstrates how irrigation is done traditionally.
{"title":"Development of IoT Cloud-based Platform for Smart Farming in the Sub-saharan Africa with Implementation of Smart-irrigation as Test-Case","authors":"S. Okoh, E. N. Onwuka, Bala Alhaji Salihu, S. Zubairu, P. Dibal, E. Nwankwo","doi":"10.5815/ijitcs.2023.02.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.02.01","url":null,"abstract":"UN Department of Economics and Social Affairs predicted that the world population will increase by 2 billion in 2050 with over 50% from the Sub-Saharan Africa (SSA). Considering the level of poverty and food insecurity in the region, there is an urgent need for a sustainable increase in agricultural produce. However, farming approach in the region is primarily traditional. Traditional farming is characterized by high labor costs, low production, and under/oversupply of farm inputs. All these factors make farming unappealing to many. The use of digital technologies such as broadband, Internet of Things (IoT), Cloud computing, and Big Data Analytics promise improved returns on agricultural investments and could make farming appealing even to the youth. However, initial cost of smart farming could be high. Therefore, development of a dedicated IoT cloud-based platform is imperative. Then farmers could subscribe and have their farms managed on the platform. It should be noted that majority of farmers in SSA are smallholders who are poor, uneducated, and live in rural areas but produce about 80% of the food. They majorly use 2G phones, which are not internet enabled. These peculiarities must be factored into the design of any functional IoT platform that would serve this group. This paper presents the development of such a platform, which was tested with smart irrigation of maize crops in a testbed. Besides the convenience provided by the smart system, it recorded irrigation water saving of over 36% compared to the control method which demonstrates how irrigation is done traditionally.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125606319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-08DOI: 10.5815/ijitcs.2023.01.03
Nikita Taneja, H. Thakur
Recommendation Systems are everywhere, from offline shopping malls to major e-commerce websites, all use recommendation systems to enhance customer experience and grow profit. With a growing customer base, the requirement to store their interest, behavior and respond accordingly requires plenty of scalability. Thus, it is very important for companies to select a scalable recommender system, which can provide the recommendations not just accurately but with low latency as well. This paper focuses on the comparison between the four methods KMeans, KNN, SVD, and SVD++ to find out the better algorithm in terms of scalability. We have analyzed the methods on different parameters i.e., Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Precision, Recall and Running Time (Scalability). Results are elaborated such that selection becomes quite easy depending upon the user requirements.
{"title":"Evaluating the Scalability of Matrix Factorization and Neighborhood Based Recommender Systems","authors":"Nikita Taneja, H. Thakur","doi":"10.5815/ijitcs.2023.01.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.03","url":null,"abstract":"Recommendation Systems are everywhere, from offline shopping malls to major e-commerce websites, all use recommendation systems to enhance customer experience and grow profit. With a growing customer base, the requirement to store their interest, behavior and respond accordingly requires plenty of scalability. Thus, it is very important for companies to select a scalable recommender system, which can provide the recommendations not just accurately but with low latency as well. This paper focuses on the comparison between the four methods KMeans, KNN, SVD, and SVD++ to find out the better algorithm in terms of scalability. We have analyzed the methods on different parameters i.e., Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Precision, Recall and Running Time (Scalability). Results are elaborated such that selection becomes quite easy depending upon the user requirements.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124010163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-08DOI: 10.5815/ijitcs.2023.01.04
Bisrat Betru, Fekade Getahun
A significant number of Information Technology incidents are reported through email. To design and implement an intelligent incident management system, it is significant to automatically classify the reported incident to a given incident category. This requires the extraction of semantic content from the reported email text. In this research work, we have attempted to classify a reported incident to a given category based on its semantic content using ontology. We have developed an Incident Ontology that can serve as a knowledge base for the incident management system. We have also developed an automatic incident classifier that matches the semantical units of the incident report with concepts in the incident ontology. According to our evaluation, ontology-driven incident classification facilitates the process of Information Technology incident management in a better way since the model shows 100% recall, 66% precision, and 79% F1-Score for sample incident reports.
{"title":"Ontology-driven Intelligent IT Incident Management Model","authors":"Bisrat Betru, Fekade Getahun","doi":"10.5815/ijitcs.2023.01.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.04","url":null,"abstract":"A significant number of Information Technology incidents are reported through email. To design and implement an intelligent incident management system, it is significant to automatically classify the reported incident to a given incident category. This requires the extraction of semantic content from the reported email text. In this research work, we have attempted to classify a reported incident to a given category based on its semantic content using ontology. We have developed an Incident Ontology that can serve as a knowledge base for the incident management system. We have also developed an automatic incident classifier that matches the semantical units of the incident report with concepts in the incident ontology. According to our evaluation, ontology-driven incident classification facilitates the process of Information Technology incident management in a better way since the model shows 100% recall, 66% precision, and 79% F1-Score for sample incident reports.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-08DOI: 10.5815/ijitcs.2023.01.02
Ifeoluwa Jenyo, E. A. Amusan, J. Emuoyibofarhe
Trust is a basic requirement for the acceptance and adoption of new services related to health care, and therefore, vital in ensuring that the integrity of shared patient information among multi-care providers is preserved and that no one has tampered with it. The cyber-health community in Nigeria is in its infant stage with health care systems and services being mostly fragmented, disjointed, and heterogeneous with strong local autonomy and distributed among several healthcare givers platforms. There is the need for a trust management structure for guaranteed privacy and confidentiality to mitigate vulnerabilities to privacy thefts. In this paper, we developed an efficient Trust Management System that hybridized Real-Time Integrity Check (RTIC) and Dynamic Trust Negotiation (DTN) premised on the Confidentiality, Integrity, and Availability (CIA) model of information security. This was achieved through the design and implementation of an indigenous and generic architectural framework and model for a secured Trust Management System with the use of the advanced encryption standard (AES-256) algorithm for securing health records during transmission. The developed system achieved Reliabity score, Accuracy and Availability of 0.97, 91.30% and 96.52% respectively.
{"title":"A Trust Management System for the Nigerian Cyber-health Community","authors":"Ifeoluwa Jenyo, E. A. Amusan, J. Emuoyibofarhe","doi":"10.5815/ijitcs.2023.01.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.02","url":null,"abstract":"Trust is a basic requirement for the acceptance and adoption of new services related to health care, and therefore, vital in ensuring that the integrity of shared patient information among multi-care providers is preserved and that no one has tampered with it. The cyber-health community in Nigeria is in its infant stage with health care systems and services being mostly fragmented, disjointed, and heterogeneous with strong local autonomy and distributed among several healthcare givers platforms. There is the need for a trust management structure for guaranteed privacy and confidentiality to mitigate vulnerabilities to privacy thefts. In this paper, we developed an efficient Trust Management System that hybridized Real-Time Integrity Check (RTIC) and Dynamic Trust Negotiation (DTN) premised on the Confidentiality, Integrity, and Availability (CIA) model of information security. This was achieved through the design and implementation of an indigenous and generic architectural framework and model for a secured Trust Management System with the use of the advanced encryption standard (AES-256) algorithm for securing health records during transmission. The developed system achieved Reliabity score, Accuracy and Availability of 0.97, 91.30% and 96.52% respectively.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126685191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-08DOI: 10.5815/ijitcs.2023.01.05
S. Akuma, Promise Anendah
Information systems have come a long way in the 21st century, with search engines emerging as the most popular and well-known retrieval systems. Several techniques have been used by researchers to improve the retrieval of relevant results from search engines. One of the approaches employed for improving relevant feedback of a retrieval system is Query Expansion (QE). The challenge associated with this technique is how to select the most relevant terms for the expansion. In this research work, we propose a query expansion technique based on Azak & Deepak's WWQE model. Our extended WWQE technique adopts Candidate Expansion Terms selection with the use of in-links and out-links. The top two relevant Wikipedia articles from the user's initial search were found using a custom search engine over Wikipedia. Following that, we ranked further Wikipedia articles that are semantically connected to the top two Wikipedia articles based on cosine similarity using TF-IDF Vectorizer. The expansion terms were then taken from the top 5 document titles. The results of the evaluation of our methodology utilizing TREC query topics (126-175) revealed that the system with extended features gave ranked results that were 11% better than those from the system with unexpanded queries.
{"title":"A New Query Expansion Approach for Improving Web Search Ranking","authors":"S. Akuma, Promise Anendah","doi":"10.5815/ijitcs.2023.01.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.05","url":null,"abstract":"Information systems have come a long way in the 21st century, with search engines emerging as the most popular and well-known retrieval systems. Several techniques have been used by researchers to improve the retrieval of relevant results from search engines. One of the approaches employed for improving relevant feedback of a retrieval system is Query Expansion (QE). The challenge associated with this technique is how to select the most relevant terms for the expansion. In this research work, we propose a query expansion technique based on Azak & Deepak's WWQE model. Our extended WWQE technique adopts Candidate Expansion Terms selection with the use of in-links and out-links. The top two relevant Wikipedia articles from the user's initial search were found using a custom search engine over Wikipedia. Following that, we ranked further Wikipedia articles that are semantically connected to the top two Wikipedia articles based on cosine similarity using TF-IDF Vectorizer. The expansion terms were then taken from the top 5 document titles. The results of the evaluation of our methodology utilizing TREC query topics (126-175) revealed that the system with extended features gave ranked results that were 11% better than those from the system with unexpanded queries.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134440763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-08DOI: 10.5815/ijitcs.2023.01.01
T. N. Rodrigues
This work presents a parallel implementation of a graph-generating algorithm designed to be straightforwardly adapted to traverse large datasets. This new approach has been validated in a correlated scenario known as the word ladder problem. The new parallel algorithm induces the same topological structure proposed by its serial version and also builds the shortest path between any pair of words to be connected by a ladder of words. The implemented parallelism paradigm is the Multiple Instruction Stream - Multiple Data Stream (MIMD) and the test suite embraces 23-word ladder instances whose intermediate words were extracted from a dictionary of 183,719 words (dataset). The word morph quality (the shortest path between two input words) and the word morph performance (CPU time) were evaluated against a serial implementation of the original algorithm. The proposed parallel algorithm generated the optimal solution for each pair of words tested, that is, the minimum word ladder connecting an initial word to a final word was found. Thus, there was no negative impact on the quality of the solutions comparing them with those obtained through the serial ANG algorithm. However, there was an outstanding improvement considering the CPU time required to build the word ladder solutions. In fact, the time improvement was up to 99.85%, and speedups greater than 2.0X were achieved with the parallel algorithm.
{"title":"A Fast Topological Parallel Algorithm for Traversing Large Datasets","authors":"T. N. Rodrigues","doi":"10.5815/ijitcs.2023.01.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2023.01.01","url":null,"abstract":"This work presents a parallel implementation of a graph-generating algorithm designed to be straightforwardly adapted to traverse large datasets. This new approach has been validated in a correlated scenario known as the word ladder problem. The new parallel algorithm induces the same topological structure proposed by its serial version and also builds the shortest path between any pair of words to be connected by a ladder of words. The implemented parallelism paradigm is the Multiple Instruction Stream - Multiple Data Stream (MIMD) and the test suite embraces 23-word ladder instances whose intermediate words were extracted from a dictionary of 183,719 words (dataset). The word morph quality (the shortest path between two input words) and the word morph performance (CPU time) were evaluated against a serial implementation of the original algorithm. The proposed parallel algorithm generated the optimal solution for each pair of words tested, that is, the minimum word ladder connecting an initial word to a final word was found. Thus, there was no negative impact on the quality of the solutions comparing them with those obtained through the serial ANG algorithm. However, there was an outstanding improvement considering the CPU time required to build the word ladder solutions. In fact, the time improvement was up to 99.85%, and speedups greater than 2.0X were achieved with the parallel algorithm.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126412845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}