首页 > 最新文献

International Journal of Information Technology and Computer Science最新文献

英文 中文
Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication 基于物联网的车辆系统在5G通信中的双层加密
Pub Date : 2022-04-08 DOI: 10.5815/ijitcs.2022.02.02
Sajid Bin-Faisal, Dip Nandi, Mashiour Rahman
In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.
在5G时代的现代通信场景中,服务质量是用户最关心的问题。此外,在这种情况下,安全的概念也不能忽视。在面向物联网的服务中,如车辆和VANET系统,需要网络表示层的安全性。这项工作是在服务存储和获取服务文件的安全机制之上进行的。为了加强文件和数据的安全性,以保持在5G中实施的物联网支持服务的完整性和机密性,已经制定了多层文件和内容加密的新方案。该加密方案设计用于通过非对称密钥加密(RSA)进行密码加密,并通过对称密钥加密(AES-128)增强对内部内容或数据安全性的关注。该双层文件加密系统与其他安全方案相比具有独特性和可变性。
{"title":"Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication","authors":"Sajid Bin-Faisal, Dip Nandi, Mashiour Rahman","doi":"10.5815/ijitcs.2022.02.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.02.02","url":null,"abstract":"In modern communication scenario of the 5G era, the service quality is the greatest concern for the users. Also, the concept of security can’t be neglected in this case. In the IoT oriented services like vehicle and VANET systems, the security in the presentation layer of the network is required. This work is over the security mechanism of the service storage and fetching the files for service. A new scheme of multi layered file and content encryption has been produced in order to strengthen the security of the file and data to maintain integrity and confidentiality of the IoT enabled services implemented in 5G. The encryption scheme is designed for the password encryption through asymmetric key cryptography (RSA) along with an enhanced concern of internal content or data security with symmetric key (AES-128) cryptography. This encryption system of double layer for a file makes the study unique and differentiable than other security schemes.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131663320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Improved Cryptography Algorithm 改进密码算法的实现
Pub Date : 2022-04-08 DOI: 10.5815/ijitcs.2022.02.04
Rohit Verma, Jyoti Dhiman
A network is an interconnected group of independent computing devices which uses a different set of protocols to communicate with each other independently and meaningfully. This communication should be carried out securely. Due to different attacks, this security sometimes gets compromised. So, to communicate securely different cryptography algorithms are used i.e., symmetric and asymmetric algorithms. Cryptography helps to achieve authentication, confidentiality, integrity, non-repudiation, and availability of data. Nowadays many algorithms provide security to data but these algorithms have various security flaws. To improve the strength of these algorithms, a new security protocol is designed using features of symmetric key and asymmetric key algorithms. The security principles can be achieved by AES and RSA algorithms. The main purpose of designing this algorithm is to provide better security to data in transit against passive as well as from active attacks. The new proposed hybrid algorithm is implemented in MATLAB R2019a. This algorithm will be analysed and compared on three parameters like avalanche effect, performance, and security against attacks. The proposed model will contribute towards improving the excellence of educators and academics, as well as increase competitiveness of educational programmes on cybersecurity among similar institutions in the EU countries.
网络是一组相互连接的独立计算设备,这些设备使用不同的协议集相互独立而有意义地进行通信。这种通信应该安全地进行。由于不同的攻击,这种安全性有时会受到损害。因此,为了安全通信,使用了不同的加密算法,即对称算法和非对称算法。密码学有助于实现数据的身份验证、机密性、完整性、不可否认性和可用性。目前,许多算法为数据提供了安全保障,但这些算法存在各种安全漏洞。为了提高这些算法的安全性,利用对称密钥和非对称密钥算法的特点,设计了一种新的安全协议。安全原理可通过AES和RSA算法实现。设计该算法的主要目的是为传输中的数据提供更好的安全性,使其免受被动攻击和主动攻击。在MATLAB R2019a中实现了该混合算法。本文将从雪崩效应、性能和抗攻击安全性三个方面对该算法进行分析和比较。拟议的模式将有助于提高教育工作者和学者的卓越水平,并提高欧盟国家类似机构中网络安全教育项目的竞争力。
{"title":"Implementation of Improved Cryptography Algorithm","authors":"Rohit Verma, Jyoti Dhiman","doi":"10.5815/ijitcs.2022.02.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.02.04","url":null,"abstract":"A network is an interconnected group of independent computing devices which uses a different set of protocols to communicate with each other independently and meaningfully. This communication should be carried out securely. Due to different attacks, this security sometimes gets compromised. So, to communicate securely different cryptography algorithms are used i.e., symmetric and asymmetric algorithms. Cryptography helps to achieve authentication, confidentiality, integrity, non-repudiation, and availability of data. Nowadays many algorithms provide security to data but these algorithms have various security flaws. To improve the strength of these algorithms, a new security protocol is designed using features of symmetric key and asymmetric key algorithms. The security principles can be achieved by AES and RSA algorithms. The main purpose of designing this algorithm is to provide better security to data in transit against passive as well as from active attacks. The new proposed hybrid algorithm is implemented in MATLAB R2019a. This algorithm will be analysed and compared on three parameters like avalanche effect, performance, and security against attacks. The proposed model will contribute towards improving the excellence of educators and academics, as well as increase competitiveness of educational programmes on cybersecurity among similar institutions in the EU countries.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123576575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Road Rush: A Review on Road Traffic Analytics Systems and A Proposed Alternative 道路交通拥挤:道路交通分析系统综述及建议的替代方案
Pub Date : 2022-04-08 DOI: 10.5815/ijitcs.2022.02.05
Kaniz Fatema Fomy, Ashik Mahmud, Musabbir Islam, Shamsur Rahim
Road traffic congestion is a recurring occurrence causing enormous loss of valuable working hours around the world. It is impossible to eradicate such a problem overnight. Rather it could be handled intelligently with the help of modern technologies. Researchers and practitioners have introduced several algorithms, frameworks, systems to mitigate traffic congestion. This paper presents a systematic literature review on existing research and critically analyze the applications on traffic analytics systems. After designing a review protocol, each work was evaluated based on the five research questions and criteria. After critically and carefully analyzing the existing works, this paper also identified the advantages as well as the limitations of the existing approaches towards solving traffic congestion. Based on the findings, a prototype of a mobile application is proposed that can be considered as an improved alternative to the existing works. Finally, this study provides future research directions and improvement scopes in this field.
道路交通拥堵在世界各地经常发生,造成宝贵工作时间的巨大损失。要在一夜之间根除这个问题是不可能的。相反,在现代技术的帮助下,它可以被智能地处理。研究人员和实践者已经引入了几种算法、框架和系统来缓解交通拥堵。本文对现有研究进行了系统的文献综述,并对交通分析系统的应用进行了批判性的分析。在设计了审查方案后,根据五个研究问题和标准对每项工作进行评估。经过对现有工作的批判性和仔细分析,本文还确定了现有解决交通拥堵方法的优点和局限性。根据调查结果,提出了一个移动应用程序的原型,可以被认为是现有工作的改进替代方案。最后,提出了该领域未来的研究方向和改进范围。
{"title":"Road Rush: A Review on Road Traffic Analytics Systems and A Proposed Alternative","authors":"Kaniz Fatema Fomy, Ashik Mahmud, Musabbir Islam, Shamsur Rahim","doi":"10.5815/ijitcs.2022.02.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.02.05","url":null,"abstract":"Road traffic congestion is a recurring occurrence causing enormous loss of valuable working hours around the world. It is impossible to eradicate such a problem overnight. Rather it could be handled intelligently with the help of modern technologies. Researchers and practitioners have introduced several algorithms, frameworks, systems to mitigate traffic congestion. This paper presents a systematic literature review on existing research and critically analyze the applications on traffic analytics systems. After designing a review protocol, each work was evaluated based on the five research questions and criteria. After critically and carefully analyzing the existing works, this paper also identified the advantages as well as the limitations of the existing approaches towards solving traffic congestion. Based on the findings, a prototype of a mobile application is proposed that can be considered as an improved alternative to the existing works. Finally, this study provides future research directions and improvement scopes in this field.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122346388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System 电子安全学生工业工作实习计划就业系统的发展
Pub Date : 2022-04-08 DOI: 10.5815/ijitcs.2022.02.03
O. S. Adebayo, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, Lateefah Abdulazeez
This research developed a secured student industrial work experience scheme (SIWES) placement system to take care of the security challenges of the existing automated systems. There are attempts by researchers to ameliorate the challenges associated with the scheme by developing various systems. However, the developed systems are subjected to security vulnerabilities. This research, in an attempt to avert the security challenges associated with the existing automated systems, designed a new scheme which includes security architectures in the kernel and application layers. This new system was able to achieve two important tasks; first, the system automation and second, the inclusion of security architectures to cubs the application’s vulnerabilities. The present process involves students manually seeking placement to undergo the program, and due to this, students end up applying at organizations that are not relevant to what they are studying. Despite the fact there are no much existing systems that digitally caters for this component of the scheme, the available existing systems are subjected to security vulnerability. Therefore, leveraging on secure web application technologies using Unified Modelling Languages for design, HTML, CSS, JavaScript, PHP for its implementation and user privilege and password hash to ensure its security, this project developed a secure solution to this pertinent challenge. The system is tested using unit testing component of each design, integration testing and general system testing. The implementation shows the system works according to the design, by ensuring all units of the development perform necessary functions of data storage, data retrieval, error alerting, and interface/server appropriate communication. In addition, the security architecture, design and implementation of the system’s design are better than the existing ones.
本研究开发了一个安全的学生工业工作经验计划(SIWES)安置系统,以照顾现有自动化系统的安全挑战。研究人员试图通过开发各种系统来改善与该计划相关的挑战。但是,开发出来的系统存在安全漏洞。为了避免现有自动化系统存在的安全问题,本研究设计了一种包含内核层和应用层安全架构的新方案。这个新系统能够完成两项重要任务;首先是系统自动化,其次是包含安全体系结构以弥补应用程序的漏洞。目前的流程需要学生手动寻找实习机会,因此,学生最终会申请与他们所学专业无关的组织。尽管没有多少现有系统以数字方式满足该方案的这一组成部分,但可用的现有系统容易受到安全漏洞的影响。因此,利用安全的web应用技术,采用统一建模语言进行设计,HTML、CSS、JavaScript、PHP进行实现,用户权限和密码哈希确保其安全性,本项目开发了一个安全的解决方案来应对这一相关挑战。系统的测试采用了每个设计的单元测试组件、集成测试和一般系统测试。通过确保开发的所有单元执行数据存储、数据检索、错误警报和接口/服务器适当通信的必要功能,实现表明系统按照设计工作。此外,该系统的安全架构、设计和实现都优于现有的系统。
{"title":"Development of an Electronic Secure Students’ Industrial Works Experience Scheme Placement System","authors":"O. S. Adebayo, Bashir Sulaimon Adebayo, Monday Jubril Abdullah, Omale Samuel Enemona, Lateefah Abdulazeez","doi":"10.5815/ijitcs.2022.02.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.02.03","url":null,"abstract":"This research developed a secured student industrial work experience scheme (SIWES) placement system to take care of the security challenges of the existing automated systems. There are attempts by researchers to ameliorate the challenges associated with the scheme by developing various systems. However, the developed systems are subjected to security vulnerabilities. This research, in an attempt to avert the security challenges associated with the existing automated systems, designed a new scheme which includes security architectures in the kernel and application layers. This new system was able to achieve two important tasks; first, the system automation and second, the inclusion of security architectures to cubs the application’s vulnerabilities. The present process involves students manually seeking placement to undergo the program, and due to this, students end up applying at organizations that are not relevant to what they are studying. Despite the fact there are no much existing systems that digitally caters for this component of the scheme, the available existing systems are subjected to security vulnerability. Therefore, leveraging on secure web application technologies using Unified Modelling Languages for design, HTML, CSS, JavaScript, PHP for its implementation and user privilege and password hash to ensure its security, this project developed a secure solution to this pertinent challenge. The system is tested using unit testing component of each design, integration testing and general system testing. The implementation shows the system works according to the design, by ensuring all units of the development perform necessary functions of data storage, data retrieval, error alerting, and interface/server appropriate communication. In addition, the security architecture, design and implementation of the system’s design are better than the existing ones.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115214799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markov Models Applications in Natural Language Processing: A Survey 马尔可夫模型在自然语言处理中的应用综述
Pub Date : 2022-04-08 DOI: 10.5815/ijitcs.2022.02.01
Talal Almutiri, F. Nadeem
Markov models are one of the widely used techniques in machine learning to process natural language. Markov Chains and Hidden Markov Models are stochastic techniques employed for modeling systems that are dynamic and where the future state relies on the current state. The Markov chain, which generates a sequence of words to create a complete sentence, is frequently used in generating natural language. The hidden Markov model is employed in named-entity recognition and the tagging of parts of speech, which tries to predict hidden tags based on observed words. This paper reviews Markov models' use in three applications of natural language processing (NLP): natural language generation, named-entity recognition, and parts of speech tagging. Nowadays, researchers try to reduce dependence on lexicon or annotation tasks in NLP. In this paper, we have focused on Markov Models as a stochastic approach to process NLP. A literature review was conducted to summarize research attempts with focusing on methods/techniques that used Markov Models to process NLP, their advantages, and disadvantages. Most NLP research studies apply supervised models with the improvement of using Markov models to decrease the dependency on annotation tasks. Some others employed unsupervised solutions for reducing dependence on a lexicon or labeled datasets.
马尔可夫模型是机器学习中广泛使用的处理自然语言的技术之一。马尔可夫链和隐马尔可夫模型是用于动态系统建模的随机技术,其中未来状态依赖于当前状态。马尔可夫链生成一系列单词来创建一个完整的句子,经常用于生成自然语言。隐马尔可夫模型用于命名实体识别和词性标注,试图根据观察到的单词预测隐藏标签。本文综述了马尔可夫模型在自然语言处理(NLP)中的三个应用:自然语言生成、命名实体识别和词性标注。目前,研究人员试图在自然语言处理中减少对词典或注释任务的依赖。在本文中,我们重点研究了马尔可夫模型作为过程NLP的一种随机方法。通过文献综述,总结了利用马尔可夫模型处理自然语言处理的方法/技术的研究尝试,以及它们的优缺点。大多数NLP研究都采用监督模型,并改进了使用马尔可夫模型来减少对标注任务的依赖。其他一些人采用无监督的解决方案来减少对词典或标记数据集的依赖。
{"title":"Markov Models Applications in Natural Language Processing: A Survey","authors":"Talal Almutiri, F. Nadeem","doi":"10.5815/ijitcs.2022.02.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.02.01","url":null,"abstract":"Markov models are one of the widely used techniques in machine learning to process natural language. Markov Chains and Hidden Markov Models are stochastic techniques employed for modeling systems that are dynamic and where the future state relies on the current state. The Markov chain, which generates a sequence of words to create a complete sentence, is frequently used in generating natural language. The hidden Markov model is employed in named-entity recognition and the tagging of parts of speech, which tries to predict hidden tags based on observed words. This paper reviews Markov models' use in three applications of natural language processing (NLP): natural language generation, named-entity recognition, and parts of speech tagging. Nowadays, researchers try to reduce dependence on lexicon or annotation tasks in NLP. In this paper, we have focused on Markov Models as a stochastic approach to process NLP. A literature review was conducted to summarize research attempts with focusing on methods/techniques that used Markov Models to process NLP, their advantages, and disadvantages. Most NLP research studies apply supervised models with the improvement of using Markov models to decrease the dependency on annotation tasks. Some others employed unsupervised solutions for reducing dependence on a lexicon or labeled datasets.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technology Adoption in Pakistani Banking Industry using UTAUT 使用UTAUT的巴基斯坦银行业技术采用
Pub Date : 2022-02-08 DOI: 10.5815/ijitcs.2022.01.04
M. M. Khan, Waqas Mahmood
The success of any software product could be measured by its uses and adoption of that technology by the end-users. In this study, we investigate the factors on which bank user intents to adopt internet banking in Pakistan. A survey was conducted on Pakistani banking industry customers using the unified theory of acceptance and use of technology (UTAUT) model which explains the intention of bank users to use the banking systems. The four predictors of UTAUT which were facilitating conditions, social influence, effort expectancy and performance expectancy were significant in predicting the intention of bank users to adopt the banking systems. Finally, we discuss the results, restrictions, implications and future recommendations. The findings of the study may help to provide insights into a better approach to promote e-banking acceptance.
任何软件产品的成功都可以通过最终用户对该技术的使用和采用来衡量。在这项研究中,我们调查了影响巴基斯坦银行用户采用网上银行的因素。对巴基斯坦银行业客户进行了一项调查,使用统一理论的接受和使用技术(UTAUT)模型,解释了银行用户使用银行系统的意图。便利条件、社会影响、努力期望和绩效期望这四个UTAUT预测因子在预测银行用户采用银行系统的意愿方面具有重要意义。最后,我们讨论了结果、限制、影响和未来的建议。研究结果可能有助于提供更好的方法来促进电子银行的接受度。
{"title":"Technology Adoption in Pakistani Banking Industry using UTAUT","authors":"M. M. Khan, Waqas Mahmood","doi":"10.5815/ijitcs.2022.01.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.01.04","url":null,"abstract":"The success of any software product could be measured by its uses and adoption of that technology by the end-users. In this study, we investigate the factors on which bank user intents to adopt internet banking in Pakistan. A survey was conducted on Pakistani banking industry customers using the unified theory of acceptance and use of technology (UTAUT) model which explains the intention of bank users to use the banking systems. The four predictors of UTAUT which were facilitating conditions, social influence, effort expectancy and performance expectancy were significant in predicting the intention of bank users to adopt the banking systems. Finally, we discuss the results, restrictions, implications and future recommendations. The findings of the study may help to provide insights into a better approach to promote e-banking acceptance.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131916849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Decentralized Self-adaptation in the Presence of Partial Knowledge with Reduced Coordination Overhead 减少协调开销的局部知识下的分散自适应
Pub Date : 2022-02-08 DOI: 10.5815/ijitcs.2022.01.02
Kishan Kumar Ganguly, Moumita Asad, K. Sakib
Decentralized self-adaptive systems consist of multiple control loops that adapt some local and system-level global goals of each locally managed system or component in a decentralized setting. As each component works together in a decentralized environment, a control loop cannot take adaptation decisions independently. Therefore, all the control loops need to exchange their adaptation decisions to infer a global knowledge about the system. Decentralized self-adaptation approaches in the literature uses the global knowledge to take decisions that optimize both local and global goals. However, coordinating in such an unbounded manner impairs scalability. This paper proposes a decentralized self-adaptation technique using reinforcement learning that incorporates partial knowledge in order to reduce coordination overhead. The Q-learning algorithm based on Interaction Driven Markov Games is utilized to take adaptation decisions as it enables coordination only when it is beneficial. Rather than using unbounded number of peers, the adaptation control loop coordinates with a single peer control loop. The proposed approach was evaluated on a service-based Tele Assistance System. It was compared to random, independent and multiagent learners that assume global knowledge. It was observed that, in all cases, the proposed approach conformed to both local and global goals while maintaining comparatively lower coordination overhead.
分散自适应系统由多个控制回路组成,这些控制回路适应分散设置中每个本地管理系统或组件的一些局部和系统级全局目标。由于每个组件在分散的环境中一起工作,控制回路不能独立地做出适应决策。因此,所有的控制回路需要交换它们的适应决策来推断关于系统的全局知识。文献中的分散自适应方法使用全局知识来做出优化局部和全局目标的决策。然而,以这种无界的方式进行协调会损害可伸缩性。为了减少协调开销,本文提出了一种采用局部知识强化学习的分散自适应技术。基于交互驱动马尔可夫博弈的Q-learning算法被用于做出适应性决策,因为它只在有益的情况下才会进行协调。该自适应控制环与单个对等控制环协调,而不是使用无限数量的对等体。在基于服务的电话援助系统上对提议的方法进行了评价。将其与假设全局知识的随机、独立和多智能体学习器进行比较。有人指出,在所有情况下,拟议的办法都符合地方和全球目标,同时保持较低的协调间接费用。
{"title":"Decentralized Self-adaptation in the Presence of Partial Knowledge with Reduced Coordination Overhead","authors":"Kishan Kumar Ganguly, Moumita Asad, K. Sakib","doi":"10.5815/ijitcs.2022.01.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.01.02","url":null,"abstract":"Decentralized self-adaptive systems consist of multiple control loops that adapt some local and system-level global goals of each locally managed system or component in a decentralized setting. As each component works together in a decentralized environment, a control loop cannot take adaptation decisions independently. Therefore, all the control loops need to exchange their adaptation decisions to infer a global knowledge about the system. Decentralized self-adaptation approaches in the literature uses the global knowledge to take decisions that optimize both local and global goals. However, coordinating in such an unbounded manner impairs scalability. This paper proposes a decentralized self-adaptation technique using reinforcement learning that incorporates partial knowledge in order to reduce coordination overhead. The Q-learning algorithm based on Interaction Driven Markov Games is utilized to take adaptation decisions as it enables coordination only when it is beneficial. Rather than using unbounded number of peers, the adaptation control loop coordinates with a single peer control loop. The proposed approach was evaluated on a service-based Tele Assistance System. It was compared to random, independent and multiagent learners that assume global knowledge. It was observed that, in all cases, the proposed approach conformed to both local and global goals while maintaining comparatively lower coordination overhead.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123456989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Component Learning Community for Informal Education to Support Culinary Community at Era New Normal Covid-19: A Systematic Literature Review 新常态时代非正式教育支持烹饪社区的组成部分学习社区Covid-19:系统文献综述
Pub Date : 2022-02-08 DOI: 10.5815/ijitcs.2022.01.03
Winanti, F. Goestjahjanti
Informal education will be successful as an alternative for the community because not all people are able to receive formal education. This study uses a qualitative method with a systematic literature review (SLR) technique to look for learning community components in informal education to support learning in the culinary community in the new normal era of Covid-19. The author collects, studies, and analyzes reference sources according to the specified keywords. Found 53 papers from 2002 to 2021 with background authors from academia, industry, and the public sector with reference sources from journals, conferences, white papers, and research reports. Systematic literature review results obtained 6 components of learning community in informal education, namely content, forum, method, technology, figure/layout, and human/social resources. The six components as a reference and the author's first step in the next research through searching for the characteristics of the learning community in the culinary field, then making a learning model of the culinary community. Because of the importance of the learning community component in informal education to help community members share knowledge, solve problems, share common goals and interests among community members.
非正式教育作为社区的另一种选择将是成功的,因为并非所有人都能接受正规教育。本研究采用定性方法和系统文献综述(SLR)技术,寻找非正规教育中的学习社区成分,以支持新常态下烹饪社区的学习。作者根据指定的关键词收集、研究和分析参考文献。检索2002年至2021年的53篇论文,背景作者来自学术界、工业界和公共部门,参考来源包括期刊、会议、白皮书和研究报告。系统的文献综述结果得到了非正式教育中学习社区的6个组成部分,即内容、论坛、方法、技术、图形/布局和人力/社会资源。这六个组成部分作为参考,是作者下一步研究的第一步,通过寻找烹饪领域的学习型社区的特征,进而构建烹饪社区的学习模型。由于学习社区在非正式教育中的重要性,它可以帮助社区成员分享知识、解决问题、分享共同的目标和兴趣。
{"title":"Component Learning Community for Informal Education to Support Culinary Community at Era New Normal Covid-19: A Systematic Literature Review","authors":"Winanti, F. Goestjahjanti","doi":"10.5815/ijitcs.2022.01.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.01.03","url":null,"abstract":"Informal education will be successful as an alternative for the community because not all people are able to receive formal education. This study uses a qualitative method with a systematic literature review (SLR) technique to look for learning community components in informal education to support learning in the culinary community in the new normal era of Covid-19. The author collects, studies, and analyzes reference sources according to the specified keywords. Found 53 papers from 2002 to 2021 with background authors from academia, industry, and the public sector with reference sources from journals, conferences, white papers, and research reports. Systematic literature review results obtained 6 components of learning community in informal education, namely content, forum, method, technology, figure/layout, and human/social resources. The six components as a reference and the author's first step in the next research through searching for the characteristics of the learning community in the culinary field, then making a learning model of the culinary community. Because of the importance of the learning community component in informal education to help community members share knowledge, solve problems, share common goals and interests among community members.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116959526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Leaf Disease Using Global and Local Features 利用全局和局部特征对叶片病害进行分类
Pub Date : 2022-02-08 DOI: 10.5815/ijitcs.2022.01.05
Prashengit Dhar, Md. Shohelur Rahman, Zainal Abedin
Leaf disease of plants causes great loss in productivity of crops. So proper take care of plants is mandatory. Plants can be affected by various diseases. So Early diagnosis of leaf disease is a good practice. Computer vision-based classification of leaf disease can be a great way in diagnosing diseases early. Early detection of diseases can lead to better treatment. Vision based technology can identify disease quickly. Though deep learning is trending and using vastly for recognition task, but it needs very large dataset and also consumes much time. This paper introduced a method to classify leaf diseases using Gist and LBP (Local Binary Pattern) feature. These manual feature extraction process need less time. Combination of gist and LBP features shows significant result in classification of leaf diseases. Gist is used as global feature and LBP as local feature. Gist can describe an image very well as a scene. LBP is robust to illumination changes and occlusions and computationally simple. Various diseases of different plants are considered in this study. Gist and LBP features from images are extracted separately. Images are pre-processed before feature extraction. Then both feature matrix is combined using concatenation method. Training and testing is done on different plants separately. Different machine learning model is applied on the feature vector. Result from different machine learning algorithms is also compared. SVM performs better in classifying plant's leaf dataset.
植物叶片病害对作物的生产力造成很大损失。因此,适当照顾植物是必须的。植物会受到各种疾病的影响。因此,早期诊断叶片病是一个很好的做法。基于计算机视觉的叶片疾病分类是早期诊断疾病的一种很好的方法。疾病的早期发现可以带来更好的治疗。基于视觉的技术可以快速识别疾病。虽然深度学习在识别任务中得到了广泛的应用,但它需要非常大的数据集,并且耗费大量的时间。本文介绍了一种利用Gist和LBP (Local Binary Pattern)特征对叶片病害进行分类的方法。这些人工特征提取过程需要较少的时间。gist和LBP特征的结合在叶病分类上有显著的效果。Gist作为全局特征,LBP作为局部特征。Gist可以很好地描述图像和场景。LBP对光照变化和遮挡具有鲁棒性,计算简单。本研究考虑了不同植物的各种病害。分别提取图像中的Gist和LBP特征。在提取特征之前,对图像进行预处理。然后用串联的方法将两个特征矩阵组合起来。培训和测试分别在不同的工厂进行。在特征向量上应用了不同的机器学习模型。比较了不同机器学习算法的结果。支持向量机对植物叶片数据集的分类效果较好。
{"title":"Classification of Leaf Disease Using Global and Local Features","authors":"Prashengit Dhar, Md. Shohelur Rahman, Zainal Abedin","doi":"10.5815/ijitcs.2022.01.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.01.05","url":null,"abstract":"Leaf disease of plants causes great loss in productivity of crops. So proper take care of plants is mandatory. Plants can be affected by various diseases. So Early diagnosis of leaf disease is a good practice. Computer vision-based classification of leaf disease can be a great way in diagnosing diseases early. Early detection of diseases can lead to better treatment. Vision based technology can identify disease quickly. Though deep learning is trending and using vastly for recognition task, but it needs very large dataset and also consumes much time. This paper introduced a method to classify leaf diseases using Gist and LBP (Local Binary Pattern) feature. These manual feature extraction process need less time. Combination of gist and LBP features shows significant result in classification of leaf diseases. Gist is used as global feature and LBP as local feature. Gist can describe an image very well as a scene. LBP is robust to illumination changes and occlusions and computationally simple. Various diseases of different plants are considered in this study. Gist and LBP features from images are extracted separately. Images are pre-processed before feature extraction. Then both feature matrix is combined using concatenation method. Training and testing is done on different plants separately. Different machine learning model is applied on the feature vector. Result from different machine learning algorithms is also compared. SVM performs better in classifying plant's leaf dataset.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132058921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of the Effect of Normalization Methods on ANFIS Success: Forestfire and Diabets Datasets 归一化方法对ANFIS成功的影响研究:森林火灾和糖尿病数据集
Pub Date : 2022-02-08 DOI: 10.5815/ijitcs.2022.01.01
Mesut Polatgil
Machine learning and artificial intelligence techniques are more and more in our lives and studies in this field are increasing day by day. Data is vital for these studies. In order to draw meaningful conclusions from the available data, new methods are proposed and successful results are obtained. The preparation of the obtained data is very important in the studies to be carried out. Data preprocessing is very important in the preparation of data. The most critical stage of the data preprocessing process is the scaling or normalization of the data. Machine learning libraries such as scikit-learn and programming languages such as R provide the necessary libraries to scale data. However, it is not known exactly which normalization method will be applied and which will yield more successful results. The success of these normalization methods has been investigated on many different methods, but such a study has not been done on the adaptive neural fuzzy inference system (ANFIS). The aim of this study is to examine the success of normalization methods on ANFIS in terms of both classification and regression problems. So, for studies using the Anfis method, guidance will be provided on which normalization process will give better results in the data preprocessing stage. Four different normalization methods in the scikit-learn library were applied on the Diabets and Forestfire datasets in the UCI database. The results are presented separately for both classification and regression. It has been determined that min-max normalization in classification problems and working with original data in regression problems are more successful.
机器学习和人工智能技术越来越多地出现在我们的生活中,这一领域的研究也日益增多。数据对这些研究至关重要。为了从现有数据中得出有意义的结论,提出了新的方法并取得了成功的结果。在即将进行的研究中,准备所获得的数据是非常重要的。数据预处理在数据的准备过程中是非常重要的。数据预处理过程中最关键的阶段是数据的缩放或归一化。机器学习库(如scikit-learn)和编程语言(如R)提供了必要的库来扩展数据。然而,目前尚不清楚将采用哪种规范化方法,以及哪种规范化方法将产生更成功的结果。这些归一化方法的成功与否已经在许多不同的方法上进行了研究,但在自适应神经模糊推理系统(ANFIS)上还没有这样的研究。本研究的目的是检验归一化方法在分类和回归问题上对ANFIS的成功。因此,对于使用Anfis方法的研究,可以指导在数据预处理阶段,哪种归一化处理能获得更好的结果。将scikit-learn库中的4种不同归一化方法应用于UCI数据库中的diabetes和Forestfire数据集。分类和回归的结果分别给出。在分类问题中使用最小-最大归一化,在回归问题中使用原始数据处理更成功。
{"title":"Investigation of the Effect of Normalization Methods on ANFIS Success: Forestfire and Diabets Datasets","authors":"Mesut Polatgil","doi":"10.5815/ijitcs.2022.01.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.01.01","url":null,"abstract":"Machine learning and artificial intelligence techniques are more and more in our lives and studies in this field are increasing day by day. Data is vital for these studies. In order to draw meaningful conclusions from the available data, new methods are proposed and successful results are obtained. The preparation of the obtained data is very important in the studies to be carried out. Data preprocessing is very important in the preparation of data. The most critical stage of the data preprocessing process is the scaling or normalization of the data. Machine learning libraries such as scikit-learn and programming languages such as R provide the necessary libraries to scale data. However, it is not known exactly which normalization method will be applied and which will yield more successful results. The success of these normalization methods has been investigated on many different methods, but such a study has not been done on the adaptive neural fuzzy inference system (ANFIS). The aim of this study is to examine the success of normalization methods on ANFIS in terms of both classification and regression problems. So, for studies using the Anfis method, guidance will be provided on which normalization process will give better results in the data preprocessing stage. Four different normalization methods in the scikit-learn library were applied on the Diabets and Forestfire datasets in the UCI database. The results are presented separately for both classification and regression. It has been determined that min-max normalization in classification problems and working with original data in regression problems are more successful.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1