首页 > 最新文献

Inf. Comput.最新文献

英文 中文
A Single-Product Multi-Period Inventory Routing Problem under Intermittent Demand 间歇需求下的单产品多周期库存路径问题
Pub Date : 2023-06-12 DOI: 10.3390/info14060331
Xin Song, Daofang Chang, Tian Luo
Demand fluctuations and uncertainty bring challenges to inventory management, and intermittent demand patterns increase the risk of inventory backlogs and raise inventory holding costs. In previous studies on inventory routing problems, different variants have been proposed to cope with complicated industrial scenarios. However, there are few studies on inventory routing problems with intermittent demand patterns. To solve this problem, we introduce a lateral transshipment strategy and build a single-product multi-period inventory routing mixed integer programming model to reduce customers’ inventory backlogs, balance regional inventory, reduce inventory holding costs, and improve inventory management efficiency. Furthermore, we design an adaptive large-neighborhood search algorithm with new operators to improve the solving efficiency. The experimental results show that an appropriate transshipment price can reduce the share of distribution costs. Another finding is that higher-capacity vehicles lead to higher revenue. Our findings not only expand the scope of the IRP domain but also provide actionable management insights for business practitioners.
需求波动和不确定性给库存管理带来挑战,间歇性需求模式增加了库存积压的风险,提高了库存持有成本。在以往关于库存路径问题的研究中,针对复杂的工业场景提出了不同的变量。然而,对于间歇性需求模式下的库存路径问题的研究却很少。针对这一问题,引入横向转运策略,建立单品多周期库存路径混合整数规划模型,以减少客户库存积压,平衡区域库存,降低库存持有成本,提高库存管理效率。在此基础上,设计了一种带有新算子的自适应大邻域搜索算法,提高了求解效率。实验结果表明,适当的转运价格可以降低配送成本的分担。另一个发现是,更高容量的汽车带来更高的收入。我们的发现不仅扩展了IRP领域的范围,而且为业务从业者提供了可操作的管理见解。
{"title":"A Single-Product Multi-Period Inventory Routing Problem under Intermittent Demand","authors":"Xin Song, Daofang Chang, Tian Luo","doi":"10.3390/info14060331","DOIUrl":"https://doi.org/10.3390/info14060331","url":null,"abstract":"Demand fluctuations and uncertainty bring challenges to inventory management, and intermittent demand patterns increase the risk of inventory backlogs and raise inventory holding costs. In previous studies on inventory routing problems, different variants have been proposed to cope with complicated industrial scenarios. However, there are few studies on inventory routing problems with intermittent demand patterns. To solve this problem, we introduce a lateral transshipment strategy and build a single-product multi-period inventory routing mixed integer programming model to reduce customers’ inventory backlogs, balance regional inventory, reduce inventory holding costs, and improve inventory management efficiency. Furthermore, we design an adaptive large-neighborhood search algorithm with new operators to improve the solving efficiency. The experimental results show that an appropriate transshipment price can reduce the share of distribution costs. Another finding is that higher-capacity vehicles lead to higher revenue. Our findings not only expand the scope of the IRP domain but also provide actionable management insights for business practitioners.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"59 1","pages":"331"},"PeriodicalIF":0.0,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84000743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perceived Importance of Metrics for Agile Scrum Environments 对敏捷Scrum环境中度量标准的感知重要性
Pub Date : 2023-06-11 DOI: 10.3390/info14060327
F. Almeida, P. Carneiro
Metrics are key elements that can give us valuable information about the effectiveness of agile software development processes, particularly considering the Scrum environment. This study aims to learn about the metrics adopted to assess agile development processes and explore the impact of how the role performed by each member in Scrum contributed to increasing/reducing the perception of the importance of these metrics. The impact of years of experience in Scrum on this perception was also explored. To this end, a quantitative study was conducted with 191 Scrum professionals in companies based in Portugal. The results show that the Scrum role is not a determining factor, while individuals with more years of experience have a higher perception of the importance of metrics related to team performance. The same conclusion is observed for the business value metric of the product backlog and the percentage of test automation in the testing phase. The findings allow for extending the knowledge about Scrum project management processes and their teams, in addition to offering important insights into the implementation of metrics for software engineering companies that adopt Scrum.
指标是能够给我们提供关于敏捷软件开发过程有效性的有价值信息的关键元素,特别是考虑到Scrum环境。本研究旨在了解用于评估敏捷开发过程的指标,并探讨Scrum中每个成员所扮演的角色对增加/减少这些指标重要性的感知的影响。我们还探讨了多年的Scrum经验对这种看法的影响。为此,我们对葡萄牙公司的191名Scrum专业人员进行了定量研究。结果表明,Scrum角色并不是一个决定性因素,而具有更多年经验的个人对与团队绩效相关的指标的重要性有更高的认识。对于产品待办事项列表的业务价值度量和测试阶段中测试自动化的百分比,可以观察到相同的结论。这些发现可以扩展关于Scrum项目管理过程及其团队的知识,此外还为采用Scrum的软件工程公司提供了实现指标的重要见解。
{"title":"Perceived Importance of Metrics for Agile Scrum Environments","authors":"F. Almeida, P. Carneiro","doi":"10.3390/info14060327","DOIUrl":"https://doi.org/10.3390/info14060327","url":null,"abstract":"Metrics are key elements that can give us valuable information about the effectiveness of agile software development processes, particularly considering the Scrum environment. This study aims to learn about the metrics adopted to assess agile development processes and explore the impact of how the role performed by each member in Scrum contributed to increasing/reducing the perception of the importance of these metrics. The impact of years of experience in Scrum on this perception was also explored. To this end, a quantitative study was conducted with 191 Scrum professionals in companies based in Portugal. The results show that the Scrum role is not a determining factor, while individuals with more years of experience have a higher perception of the importance of metrics related to team performance. The same conclusion is observed for the business value metric of the product backlog and the percentage of test automation in the testing phase. The findings allow for extending the knowledge about Scrum project management processes and their teams, in addition to offering important insights into the implementation of metrics for software engineering companies that adopt Scrum.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"96 1","pages":"327"},"PeriodicalIF":0.0,"publicationDate":"2023-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85310113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trend Analysis of Decentralized Autonomous Organization Using Big Data Analytics 利用大数据分析去中心化自治组织的趋势分析
Pub Date : 2023-06-09 DOI: 10.3390/info14060326
H. Park, Ivan Ureta, Boyoung Kim
Decentralized Autonomous Organizations (DAOs) have gained widespread attention in academia and industry as potential future models for decentralized governance and organization. In order to understand the trends and future potential of this rapidly growing technology, it is crucial to conduct research in the field. This research aims at a data-driven approach for the objective content analysis of big data related to DAOs, using text mining and Latent Dirichlet Allocation (LDA)-based topic modeling. The study analyzed tweets with the hashtag #DAO and all Reddit data with “DAO”. The results were from the identification of the top 100 frequently appearing keywords, as well as the top 20 keywords with high network centrality, and key topics related to finance, gaming, and fundraising, from both Twitter and Reddit. The analysis revealed twelve topics from Twitter and eight topics from Reddit, with the term “community” frequently appearing across many of these topics. The findings provide valuable insights into the current trend and future potential of DAOs, and should be used by researchers to guide further research in the field and by decision makers to explore innovative ways to govern the organizations.
去中心化自治组织(Decentralized Autonomous Organizations, dao)作为去中心化治理和组织的潜在未来模式,在学术界和工业界得到了广泛关注。为了了解这种快速发展的技术的趋势和未来潜力,在该领域进行研究是至关重要的。本研究旨在利用文本挖掘和基于潜在狄利克雷分配(Latent Dirichlet Allocation, LDA)的主题建模,为dao相关大数据的客观内容分析提供数据驱动方法。该研究分析了带有#DAO标签的推文和所有带有“DAO”的Reddit数据。结果是通过识别Twitter和Reddit上出现频率最高的100个关键词,以及网络中心度最高的20个关键词,以及与金融、游戏和筹款相关的关键话题。该分析揭示了推特上的12个话题和Reddit上的8个话题,其中“社区”一词经常出现在这些话题中。这些发现为dao的当前趋势和未来潜力提供了有价值的见解,应该被研究人员用来指导该领域的进一步研究,并被决策者用来探索治理组织的创新方法。
{"title":"Trend Analysis of Decentralized Autonomous Organization Using Big Data Analytics","authors":"H. Park, Ivan Ureta, Boyoung Kim","doi":"10.3390/info14060326","DOIUrl":"https://doi.org/10.3390/info14060326","url":null,"abstract":"Decentralized Autonomous Organizations (DAOs) have gained widespread attention in academia and industry as potential future models for decentralized governance and organization. In order to understand the trends and future potential of this rapidly growing technology, it is crucial to conduct research in the field. This research aims at a data-driven approach for the objective content analysis of big data related to DAOs, using text mining and Latent Dirichlet Allocation (LDA)-based topic modeling. The study analyzed tweets with the hashtag #DAO and all Reddit data with “DAO”. The results were from the identification of the top 100 frequently appearing keywords, as well as the top 20 keywords with high network centrality, and key topics related to finance, gaming, and fundraising, from both Twitter and Reddit. The analysis revealed twelve topics from Twitter and eight topics from Reddit, with the term “community” frequently appearing across many of these topics. The findings provide valuable insights into the current trend and future potential of DAOs, and should be used by researchers to guide further research in the field and by decision makers to explore innovative ways to govern the organizations.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"33 1","pages":"326"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90580986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Monetary Compensation and Private Information Sharing in Augmented Reality Applications 增强现实应用中的货币补偿与私有信息共享
Pub Date : 2023-06-08 DOI: 10.3390/info14060325
Gilad Taub, Avshalom Elmalech, Noa Aharony, Ariel Rosenfeld
This research studied people’s responses to requests that ask for accessing their personal information when using augmented reality (AR) technology. AR is a new technology that superimposes digital information onto the real world, creating a unique user experience. As such, AR is often associated with the collection and use of personal information, which may lead to significant privacy concerns. To investigate these potential concerns, we adopted an experimental approach and examined people’s actual responses to real-world requests for various types of personal information while using a designated AR application on their personal smartphones. Our results indicate that the majority (57%) of people are willing to share sensitive personal information with an unknown third party without any compensation other than using the application. Moreover, there is variability in the individuals’ willingness to allow access to various kinds of personal information. For example, while 75% of participants were open to granting access to their microphone, only 35% of participants agreed to allow access to their contacts. Lastly, monetary compensation is linked with an increased willingness to share personal information. When no compensation was offered, only 35% of the participants agreed to grant access to their contacts, but when a low compensation was offered, 57.5% of the participants agreed. These findings combine to suggest several practical implications for the development and distribution of AR technologies.
这项研究研究了人们在使用增强现实(AR)技术时,对访问他们个人信息的请求的反应。AR是一项新技术,它将数字信息叠加到现实世界中,创造独特的用户体验。因此,AR通常与个人信息的收集和使用有关,这可能会导致重大的隐私问题。为了调查这些潜在的问题,我们采用了一种实验方法,研究了人们在使用个人智能手机上指定的AR应用程序时对各种个人信息请求的实际反应。我们的研究结果表明,大多数(57%)的人愿意与未知的第三方分享敏感的个人信息,除了使用应用程序之外,不需要任何补偿。此外,个人允许访问各种个人信息的意愿存在可变性。例如,虽然75%的参与者愿意允许访问他们的麦克风,但只有35%的参与者同意允许访问他们的联系人。最后,金钱补偿与分享个人信息的意愿增加有关。当没有提供补偿时,只有35%的参与者同意访问他们的联系人,但当提供低补偿时,57.5%的参与者同意。这些发现结合起来,对AR技术的开发和推广提出了一些实际意义。
{"title":"Monetary Compensation and Private Information Sharing in Augmented Reality Applications","authors":"Gilad Taub, Avshalom Elmalech, Noa Aharony, Ariel Rosenfeld","doi":"10.3390/info14060325","DOIUrl":"https://doi.org/10.3390/info14060325","url":null,"abstract":"This research studied people’s responses to requests that ask for accessing their personal information when using augmented reality (AR) technology. AR is a new technology that superimposes digital information onto the real world, creating a unique user experience. As such, AR is often associated with the collection and use of personal information, which may lead to significant privacy concerns. To investigate these potential concerns, we adopted an experimental approach and examined people’s actual responses to real-world requests for various types of personal information while using a designated AR application on their personal smartphones. Our results indicate that the majority (57%) of people are willing to share sensitive personal information with an unknown third party without any compensation other than using the application. Moreover, there is variability in the individuals’ willingness to allow access to various kinds of personal information. For example, while 75% of participants were open to granting access to their microphone, only 35% of participants agreed to allow access to their contacts. Lastly, monetary compensation is linked with an increased willingness to share personal information. When no compensation was offered, only 35% of the participants agreed to grant access to their contacts, but when a low compensation was offered, 57.5% of the participants agreed. These findings combine to suggest several practical implications for the development and distribution of AR technologies.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"49 1","pages":"325"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83688044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corporate Responsibility in the Digital Era 数字时代的企业责任
Pub Date : 2023-06-08 DOI: 10.3390/info14060324
M. Wynn, Peter Jones
As the digital era advances, many industries continue to expand their use of digital technologies to support company operations, notably at the customer interface, bringing new commercial opportunities and increased efficiencies. However, there are new sets of responsibilities associated with the deployment of these technologies, encompassed within the emerging concept of corporate digital responsibility (CDR), which to date has received little attention in the academic literature. This exploratory paper thus looks to make a small contribution to addressing this gap in the literature. The paper adopts a qualitative, inductive research method, employing an initial scoping literature review followed by two case studies. Based on the research findings, a simple model of CDR parameters is put forward. The article includes a discussion of a number of emergent issues—fair and equitable access, personal and social well-being, environmental implications, and cross-supply chain complexities—and a conclusion that summarises the main findings and suggests possible directions for future research.
随着数字时代的发展,许多行业继续扩大数字技术的使用,以支持公司运营,特别是在客户界面,带来新的商业机会和提高效率。然而,与这些技术的部署相关的新责任集包含在新兴的企业数字责任(CDR)概念中,迄今为止在学术文献中很少受到关注。因此,这篇探索性论文看起来对解决文献中的这一差距做出了小小的贡献。本文采用定性、归纳的研究方法,采用初步的范围文献综述,然后进行两个案例研究。在此基础上,提出了一种简单的CDR参数模型。这篇文章包括对一些新兴问题的讨论——公平和公平的获取、个人和社会福祉、环境影响和跨供应链复杂性——以及总结主要发现并提出未来研究可能方向的结论。
{"title":"Corporate Responsibility in the Digital Era","authors":"M. Wynn, Peter Jones","doi":"10.3390/info14060324","DOIUrl":"https://doi.org/10.3390/info14060324","url":null,"abstract":"As the digital era advances, many industries continue to expand their use of digital technologies to support company operations, notably at the customer interface, bringing new commercial opportunities and increased efficiencies. However, there are new sets of responsibilities associated with the deployment of these technologies, encompassed within the emerging concept of corporate digital responsibility (CDR), which to date has received little attention in the academic literature. This exploratory paper thus looks to make a small contribution to addressing this gap in the literature. The paper adopts a qualitative, inductive research method, employing an initial scoping literature review followed by two case studies. Based on the research findings, a simple model of CDR parameters is put forward. The article includes a discussion of a number of emergent issues—fair and equitable access, personal and social well-being, environmental implications, and cross-supply chain complexities—and a conclusion that summarises the main findings and suggests possible directions for future research.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"168 1","pages":"324"},"PeriodicalIF":0.0,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73408946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Agile Software Requirements Engineering Challenges-Solutions - A Conceptual Framework from Systematic Literature Review 敏捷软件需求工程挑战-解决方案-来自系统文献综述的概念框架
Pub Date : 2023-06-06 DOI: 10.3390/info14060322
Zoe Hoy, X. Xu
Agile software requirements engineering processes enable quick responses to reflect changes in the client’s software requirements. However, there are challenges associated with agile requirements engineering processes, which hinder fast, sustainable software development. Research addressing the challenges with available solutions is patchy, diverse and inclusive. In this study, we use a systematic literature review coupled with thematic classification and gap mapping analysis to examine extant solutions against challenges; the typologies/classifications of challenges faced with agile software development in general and specifically in requirements engineering and how the solutions address the challenges. Our study covers the period from 2009 to 2023. Scopus—the largest database for credible academic publications was searched. Using the exclusion criteria to filter the articles, a total of 78 valid papers were selected and reviewed. Following our investigation, we develop a framework that takes a three-dimensional view of agile requirements engineering solutions and suggest an orchestrated approach balancing the focus between the business context, project management and agile techniques. This study contributes to the theoretical frontier of agile software requirement engineering approaches and guidelines for practice.
敏捷软件需求工程过程能够快速响应客户软件需求的变化。然而,与敏捷需求工程过程相关的挑战阻碍了快速、可持续的软件开发。用现有解决方案解决挑战的研究是不完整的、多样化的和包容性的。在本研究中,我们采用系统的文献综述,结合专题分类和差距映射分析来研究现有的解决方案;敏捷软件开发所面临的挑战的类型/分类,特别是在需求工程中,以及解决方案如何应对这些挑战。我们的研究时间为2009年至2023年。scopus是最大的可信学术出版物数据库。采用排除标准对文章进行筛选,共筛选出78篇有效论文。根据我们的调查,我们开发了一个框架,该框架采用了敏捷需求工程解决方案的三维视图,并建议采用一种协调的方法来平衡业务上下文、项目管理和敏捷技术之间的关注点。本研究为敏捷软件需求工程方法的理论前沿和实践指导做出了贡献。
{"title":"Agile Software Requirements Engineering Challenges-Solutions - A Conceptual Framework from Systematic Literature Review","authors":"Zoe Hoy, X. Xu","doi":"10.3390/info14060322","DOIUrl":"https://doi.org/10.3390/info14060322","url":null,"abstract":"Agile software requirements engineering processes enable quick responses to reflect changes in the client’s software requirements. However, there are challenges associated with agile requirements engineering processes, which hinder fast, sustainable software development. Research addressing the challenges with available solutions is patchy, diverse and inclusive. In this study, we use a systematic literature review coupled with thematic classification and gap mapping analysis to examine extant solutions against challenges; the typologies/classifications of challenges faced with agile software development in general and specifically in requirements engineering and how the solutions address the challenges. Our study covers the period from 2009 to 2023. Scopus—the largest database for credible academic publications was searched. Using the exclusion criteria to filter the articles, a total of 78 valid papers were selected and reviewed. Following our investigation, we develop a framework that takes a three-dimensional view of agile requirements engineering solutions and suggest an orchestrated approach balancing the focus between the business context, project management and agile techniques. This study contributes to the theoretical frontier of agile software requirement engineering approaches and guidelines for practice.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"4 1","pages":"322"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88830078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
M-Ary Direct Modulation Chirp Spread Spectrum for Spectrally Efficient Communications 用于频谱高效通信的直接调制啁啾扩频
Pub Date : 2023-06-06 DOI: 10.3390/info14060323
Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, E. Radoi, A. Guéroui
Spread spectrum techniques, such as the Chirp Spread Spectrum (CSS) used by LoRa technology, are important for machine-to-machine communication in the context of the Internet of Things. They offer high processing gain, reliable communication over long ranges, robustness to interference and noise in harsh environments, etc. However, these features are compromised by their poor spectral efficiency, resulting in a very low data transmission rate. This paper deals with a spectrally efficient variant of CSS. The system uses M-ary phase keying to modulate the data and exploits CSS’s properties to transmit the modulated symbols as overlapping chirps. The overlapping of chirp signals may affect the system performance due to inter-symbol interference. Therefore, we analyse the relationship between the number of overlaps and the effect of inter-symbol interference (ISI), and we also determine the BER expression as a function of the number of overlaps. Finally, we derive the optimal number of overlapping symbols that corresponds to the minimum error probability.
扩频技术,如LoRa技术使用的Chirp扩频(CSS),对于物联网背景下的机器对机器通信非常重要。它们提供高处理增益,远距离可靠通信,在恶劣环境下对干扰和噪声的鲁棒性等。然而,这些特性受到其较差的频谱效率的影响,导致数据传输速率非常低。本文讨论了一种光谱高效的CSS变体。该系统使用m相位键控来调制数据,并利用CSS的特性将调制后的符号作为重叠啁啾传输。由于码间干扰,啁啾信号的重叠会影响系统的性能。因此,我们分析了重叠数与码间干扰(ISI)影响之间的关系,并确定了误码率的表达式作为重叠数的函数。最后,我们推导出与最小误差概率相对应的重叠符号的最优数量。
{"title":"M-Ary Direct Modulation Chirp Spread Spectrum for Spectrally Efficient Communications","authors":"Jocelyn Edinio Zacko Gbadouissa, Ado Adamou Abba Ari, E. Radoi, A. Guéroui","doi":"10.3390/info14060323","DOIUrl":"https://doi.org/10.3390/info14060323","url":null,"abstract":"Spread spectrum techniques, such as the Chirp Spread Spectrum (CSS) used by LoRa technology, are important for machine-to-machine communication in the context of the Internet of Things. They offer high processing gain, reliable communication over long ranges, robustness to interference and noise in harsh environments, etc. However, these features are compromised by their poor spectral efficiency, resulting in a very low data transmission rate. This paper deals with a spectrally efficient variant of CSS. The system uses M-ary phase keying to modulate the data and exploits CSS’s properties to transmit the modulated symbols as overlapping chirps. The overlapping of chirp signals may affect the system performance due to inter-symbol interference. Therefore, we analyse the relationship between the number of overlaps and the effect of inter-symbol interference (ISI), and we also determine the BER expression as a function of the number of overlaps. Finally, we derive the optimal number of overlapping symbols that corresponds to the minimum error probability.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"114 1","pages":"323"},"PeriodicalIF":0.0,"publicationDate":"2023-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77715490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Task Romanian Email Classification in a Business Context 多任务罗马尼亚电子邮件分类在商业环境
Pub Date : 2023-06-03 DOI: 10.3390/info14060321
A. Dima, Stefan Ruseti, Denis Iorga, C. Banica, Mihai Dascalu
Email classification systems are essential for handling and organizing the massive flow of communication, especially in a business context. Although many solutions exist, the lack of standardized classification categories limits their applicability. Furthermore, the lack of Romanian language business-oriented public datasets makes the development of such solutions difficult. To this end, we introduce a versatile automated email classification system based on a novel public dataset of 1447 manually annotated Romanian business-oriented emails. Our corpus is annotated with 5 token-related labels, as well as 5 sequence-related classes. We establish a strong baseline using pre-trained Transformer models for token classification and multi-task classification, achieving an F1-score of 0.752 and 0.764, respectively. We publicly release our code together with the dataset of labeled emails.
电子邮件分类系统对于处理和组织大量的通信流至关重要,特别是在业务环境中。虽然存在许多解决方案,但缺乏标准化的分类类别限制了它们的适用性。此外,缺乏面向商业的罗马尼亚语公共数据集使得开发此类解决方案变得困难。为此,我们介绍了一个多功能的自动电子邮件分类系统,该系统基于一个新的公共数据集,该数据集包含1447封手动注释的罗马尼亚商业电子邮件。我们的语料库有5个与标记相关的标签,以及5个与序列相关的类。我们使用预训练的Transformer模型建立了一个强大的基线,用于令牌分类和多任务分类,分别获得了0.752和0.764的f1得分。我们公开发布了我们的代码以及标记电子邮件的数据集。
{"title":"Multi-Task Romanian Email Classification in a Business Context","authors":"A. Dima, Stefan Ruseti, Denis Iorga, C. Banica, Mihai Dascalu","doi":"10.3390/info14060321","DOIUrl":"https://doi.org/10.3390/info14060321","url":null,"abstract":"Email classification systems are essential for handling and organizing the massive flow of communication, especially in a business context. Although many solutions exist, the lack of standardized classification categories limits their applicability. Furthermore, the lack of Romanian language business-oriented public datasets makes the development of such solutions difficult. To this end, we introduce a versatile automated email classification system based on a novel public dataset of 1447 manually annotated Romanian business-oriented emails. Our corpus is annotated with 5 token-related labels, as well as 5 sequence-related classes. We establish a strong baseline using pre-trained Transformer models for token classification and multi-task classification, achieving an F1-score of 0.752 and 0.764, respectively. We publicly release our code together with the dataset of labeled emails.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"241 1","pages":"321"},"PeriodicalIF":0.0,"publicationDate":"2023-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74489681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpretation of Bahasa Isyarat Malaysia (BIM) Using SSD-MobileNet-V2 FPNLite and COCO mAP 使用SSD-MobileNet-V2 FPNLite和COCO mAP的马来文BIM解释
Pub Date : 2023-05-31 DOI: 10.3390/info14060319
Iffah Zulaikha Saiful Bahri, S. Saon, A. Mahamad, K. Isa, U. Fadlilah, Mohd Anuaruddin Bin Ahmadon, S. Yamaguchi
This research proposes a study on two-way communication between deaf/mute and normal people using an Android application. Despite advancements in technology, there is still a lack of mobile applications that facilitate two-way communication between deaf/mute and normal people, especially by using Bahasa Isyarat Malaysia (BIM). This project consists of three parts: First, we use BIM letters, which enables the recognition of BIM letters and BIM combined letters to form a word. In this part, a MobileNet pre-trained model is implemented to train the model with a total of 87,000 images for 29 classes, with a 10% test size and a 90% training size. The second part is BIM word hand gestures, which consists of five classes that are trained with the SSD-MobileNet-V2 FPNLite 320 × 320 pre-trained model with a speed of 22 s/frame rate and COCO mAP of 22.2, with a total of 500 images for all five classes and first-time training set to 2000 steps, while the second- and third-time training are set to 2500 steps. The third part is Android application development using Android Studio, which contains the features of the BIM letters and BIM word hand gestures, with the trained models converted into TensorFlow Lite. This feature also includes the conversion of speech to text, whereby this feature allows converting speech to text through the Android application. Thus, BIM letters obtain 99.75% accuracy after training the models, while BIM word hand gestures obtain 61.60% accuracy. The suggested system is validated as a result of these simulations and tests.
本研究提出使用Android应用程序对聋哑人与正常人之间的双向交流进行研究。尽管技术进步,但仍然缺乏促进聋哑人与正常人之间双向交流的移动应用程序,特别是使用马来西亚语(BIM)。本项目由三部分组成:首先,我们使用BIM字母,可以识别BIM字母和BIM组合字母组成一个单词。在这一部分中,我们实现了一个MobileNet预训练模型,对29个类共87000张图像的模型进行训练,测试大小为10%,训练大小为90%。第二部分是BIM单词手势,由五个类组成,使用SSD-MobileNet-V2 FPNLite 320 × 320预训练模型进行训练,速度为22 s/帧率,COCO mAP为22.2,五个类总共500张图像,第一次训练设置为2000步,第二次和第三次训练设置为2500步。第三部分是使用Android Studio进行Android应用程序开发,其中包含BIM字母和BIM单词手势的特征,并将训练好的模型转换为TensorFlow Lite。该功能还包括语音到文本的转换,即该功能允许通过Android应用程序将语音转换为文本。因此,经过模型训练后,BIM字母的准确率达到99.75%,而BIM单词手势的准确率达到61.60%。通过仿真和测试,验证了该系统的有效性。
{"title":"Interpretation of Bahasa Isyarat Malaysia (BIM) Using SSD-MobileNet-V2 FPNLite and COCO mAP","authors":"Iffah Zulaikha Saiful Bahri, S. Saon, A. Mahamad, K. Isa, U. Fadlilah, Mohd Anuaruddin Bin Ahmadon, S. Yamaguchi","doi":"10.3390/info14060319","DOIUrl":"https://doi.org/10.3390/info14060319","url":null,"abstract":"This research proposes a study on two-way communication between deaf/mute and normal people using an Android application. Despite advancements in technology, there is still a lack of mobile applications that facilitate two-way communication between deaf/mute and normal people, especially by using Bahasa Isyarat Malaysia (BIM). This project consists of three parts: First, we use BIM letters, which enables the recognition of BIM letters and BIM combined letters to form a word. In this part, a MobileNet pre-trained model is implemented to train the model with a total of 87,000 images for 29 classes, with a 10% test size and a 90% training size. The second part is BIM word hand gestures, which consists of five classes that are trained with the SSD-MobileNet-V2 FPNLite 320 × 320 pre-trained model with a speed of 22 s/frame rate and COCO mAP of 22.2, with a total of 500 images for all five classes and first-time training set to 2000 steps, while the second- and third-time training are set to 2500 steps. The third part is Android application development using Android Studio, which contains the features of the BIM letters and BIM word hand gestures, with the trained models converted into TensorFlow Lite. This feature also includes the conversion of speech to text, whereby this feature allows converting speech to text through the Android application. Thus, BIM letters obtain 99.75% accuracy after training the models, while BIM word hand gestures obtain 61.60% accuracy. The suggested system is validated as a result of these simulations and tests.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"5 1","pages":"319"},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86494484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Security Issues in Human Activity Recognition Systems (HARSs) 利用人体活动识别系统(HARSs)的安全问题
Pub Date : 2023-05-30 DOI: 10.3390/info14060315
S. Sakka, V. Liagkou, C. Stylios
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.
人体活动识别系统(HARSs)在广泛的现实应用中至关重要,是一个充满活力的学术研究领域。虽然它们在许多领域被采用,如环境、农业和医疗保健,它们被认为是辅助技术,但它们似乎忽视了安全和隐私方面的问题。这个问题的发生是由于基于传感器的hars的普遍性。传感器是具有低功耗和计算能力的设备,加入了位于动态和异构通信环境中的机器学习应用程序,并且没有通用的统一方法来评估其安全性/隐私性,而只有单独的解决方案。在这项工作中,我们特别研究了hars,并尝试扩展这些系统的现有技术,同时考虑到所有参与组件的安全性/隐私性。最初,在这项工作中,我们展示了现实生活中的医疗物联网应用程序的架构和参与实体之间的数据流。然后,我们简要回顾了安全和隐私问题,并提出了每个系统层可能存在的漏洞。我们在通信层上引入了一种体系结构,它提供相互身份验证,解决了许多安全和隐私问题,特别是中间人攻击(MitM)。依靠建议的解决方案,我们通过提供一个值得信赖的应用程序来防止对关键信息的未经授权的访问。
{"title":"Exploiting Security Issues in Human Activity Recognition Systems (HARSs)","authors":"S. Sakka, V. Liagkou, C. Stylios","doi":"10.3390/info14060315","DOIUrl":"https://doi.org/10.3390/info14060315","url":null,"abstract":"Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.","PeriodicalId":13622,"journal":{"name":"Inf. Comput.","volume":"41 1","pages":"315"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73813438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Inf. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1