首页 > 最新文献

International Journal of Advanced Computer Science and Applications最新文献

英文 中文
Software Effort Estimation through Ensembling of Base Models in Machine Learning using a Voting Estimator 基于投票估计器的机器学习基本模型集成的软件工作量估计
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140222
Beesetti Kiran Kumar, Saurabh Bilgaiyan, B. Mishra
—For a long time, researchers have been working to predict the effort of software development with the help of various machine learning algorithms. These algorithms are known for better understanding the underlying facts inside the data and improving the prediction rate than conventional approaches such as line of code and functional point approaches. According to no free lunch theory, there is no single algorithm which gives better predictions on all the datasets. To remove this bias our work aims to provide a better model for software effort estimation and thereby reduce the distance between the actual and predicted effort for future projects. The authors proposed an ensembling of regressor models using voting estimator for better predictions to reduce the error rate to over the biasness provide by single machine learning algorithm. The results obtained show that the ensemble models were better than those from the single models used on different datasets.
长期以来,研究人员一直致力于在各种机器学习算法的帮助下预测软件开发的工作量。与代码行和功能点方法等传统方法相比,这些算法以更好地理解数据中的潜在事实和提高预测率而闻名。根据没有免费的午餐理论,没有一种算法能在所有数据集上给出更好的预测。为了消除这种偏见,我们的工作旨在为软件工作量估计提供一个更好的模型,从而减少未来项目的实际工作量和预测工作量之间的距离。作者提出了一种使用投票估计器的回归模型集成,以更好地预测,以减少错误率,超过单一机器学习算法提供的偏差。结果表明,在不同的数据集上,集成模型优于单一模型。
{"title":"Software Effort Estimation through Ensembling of Base Models in Machine Learning using a Voting Estimator","authors":"Beesetti Kiran Kumar, Saurabh Bilgaiyan, B. Mishra","doi":"10.14569/ijacsa.2023.0140222","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140222","url":null,"abstract":"—For a long time, researchers have been working to predict the effort of software development with the help of various machine learning algorithms. These algorithms are known for better understanding the underlying facts inside the data and improving the prediction rate than conventional approaches such as line of code and functional point approaches. According to no free lunch theory, there is no single algorithm which gives better predictions on all the datasets. To remove this bias our work aims to provide a better model for software effort estimation and thereby reduce the distance between the actual and predicted effort for future projects. The authors proposed an ensembling of regressor models using voting estimator for better predictions to reduce the error rate to over the biasness provide by single machine learning algorithm. The results obtained show that the ensemble models were better than those from the single models used on different datasets.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73155373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hamming Distance Approach to Reduce Role Mining Scalability 降低角色挖掘可扩展性的汉明距离方法
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140654
Nazirah Abd. Hamid, S. R. Selamat, R. Ahmad, M. Mohamad
Role-based Access Control has become the standard of practice for many organizations for restricting control on limited resources in complicated infrastructures or systems. The main objective of the role mining development is to define appropriate roles that can be applied to the specified security access policies. However, the mining scales in this kind of setting are extensive and can cause a huge load on the management of the systems. To resolve the above mentioned problems, this paper proposes a model that implements Hamming Distance approach by rearranging the existing matrix as the input data to overcome the scalability problem. The findings of the model show that the generated file size of all datasets substantially have been reduced compared to the original datasets It has also shown that Hamming Distance technique can successfully reduce the mining scale of datasets ranging between 30% and 47% and produce better candidate roles. Keywords—Role-based Access Control; role mining; hamming distance; data mining
基于角色的访问控制已经成为许多组织的标准实践,用于限制对复杂基础设施或系统中有限资源的控制。角色挖掘开发的主要目标是定义可应用于指定安全访问策略的适当角色。然而,在这种环境下的采矿规模是广泛的,并且会给系统的管理带来巨大的负担。为了解决上述问题,本文提出了一种模型,通过重新排列现有矩阵作为输入数据来实现汉明距离方法,以克服可扩展性问题。该模型的研究结果表明,与原始数据集相比,所有数据集生成的文件大小都大大减小了,并且表明汉明距离技术可以成功地将数据集的挖掘规模减小30%至47%,并产生更好的候选角色。关键词:基于角色的访问控制;角色采矿;汉明距离;数据挖掘
{"title":"Hamming Distance Approach to Reduce Role Mining Scalability","authors":"Nazirah Abd. Hamid, S. R. Selamat, R. Ahmad, M. Mohamad","doi":"10.14569/ijacsa.2023.0140654","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140654","url":null,"abstract":"Role-based Access Control has become the standard of practice for many organizations for restricting control on limited resources in complicated infrastructures or systems. The main objective of the role mining development is to define appropriate roles that can be applied to the specified security access policies. However, the mining scales in this kind of setting are extensive and can cause a huge load on the management of the systems. To resolve the above mentioned problems, this paper proposes a model that implements Hamming Distance approach by rearranging the existing matrix as the input data to overcome the scalability problem. The findings of the model show that the generated file size of all datasets substantially have been reduced compared to the original datasets It has also shown that Hamming Distance technique can successfully reduce the mining scale of datasets ranging between 30% and 47% and produce better candidate roles. Keywords—Role-based Access Control; role mining; hamming distance; data mining","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80438654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Security and Multi-Cloud Load Balancing for Data in Edge-based Computing Applications 边缘计算应用中数据的集成安全与多云负载均衡
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140802
R. Dornala
— Edge computing has gained significant attention in recent years due to its ability to process data closer to the source, resulting in reduced latency and improved performance. However, ensuring data security and efficient data management in edge-based computing applications poses significant challenges. This paper proposes an ensemble security approach and a multi-cloud load-balancing strategy to address these challenges. The ensemble security approach leverages multiple security mechanisms, such as encryption, authentication, and intrusion detection systems, to provide a layered defense against potential threats. By combining these mechanisms, the system can detect and mitigate security breaches at various levels, ensuring the integrity and confidentiality of data in edge-based environments. The multi-cloud load balancing strategy also aims to optimize resource utilization and performance by distributing data processing tasks across multiple cloud service providers. This approach takes advantage of the flexibility and scalability offered by the cloud, allowing for dynamic workload allocation based on factors like network conditions and computational capabilities. To evaluate the effectiveness of the proposed approach, we conducted experiments using a realistic edge-based computing environment. The results demonstrate that the ensemble security approach effectively detects and prevents security threats, while the multi-cloud load balancing strategy with edge computing to improve the overall system performance and resource utilization.
-边缘计算近年来获得了极大的关注,因为它能够更接近源地处理数据,从而减少延迟并提高性能。然而,在基于边缘计算的应用中,确保数据安全和有效的数据管理是一个重大挑战。本文提出了一种集成安全方法和多云负载平衡策略来解决这些挑战。集成安全方法利用多种安全机制,如加密、身份验证和入侵检测系统,提供针对潜在威胁的分层防御。通过结合这些机制,系统可以检测和减轻不同级别的安全漏洞,确保边缘环境中数据的完整性和机密性。多云负载平衡策略还旨在通过跨多个云服务提供商分配数据处理任务来优化资源利用率和性能。这种方法利用了云提供的灵活性和可伸缩性,允许基于网络条件和计算能力等因素进行动态工作负载分配。为了评估所提出方法的有效性,我们使用现实的基于边缘的计算环境进行了实验。结果表明,集成安全方法可以有效地检测和防范安全威胁,而多云负载均衡策略结合边缘计算可以提高系统整体性能和资源利用率。
{"title":"Ensemble Security and Multi-Cloud Load Balancing for Data in Edge-based Computing Applications","authors":"R. Dornala","doi":"10.14569/ijacsa.2023.0140802","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140802","url":null,"abstract":"— Edge computing has gained significant attention in recent years due to its ability to process data closer to the source, resulting in reduced latency and improved performance. However, ensuring data security and efficient data management in edge-based computing applications poses significant challenges. This paper proposes an ensemble security approach and a multi-cloud load-balancing strategy to address these challenges. The ensemble security approach leverages multiple security mechanisms, such as encryption, authentication, and intrusion detection systems, to provide a layered defense against potential threats. By combining these mechanisms, the system can detect and mitigate security breaches at various levels, ensuring the integrity and confidentiality of data in edge-based environments. The multi-cloud load balancing strategy also aims to optimize resource utilization and performance by distributing data processing tasks across multiple cloud service providers. This approach takes advantage of the flexibility and scalability offered by the cloud, allowing for dynamic workload allocation based on factors like network conditions and computational capabilities. To evaluate the effectiveness of the proposed approach, we conducted experiments using a realistic edge-based computing environment. The results demonstrate that the ensemble security approach effectively detects and prevents security threats, while the multi-cloud load balancing strategy with edge computing to improve the overall system performance and resource utilization.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76622033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of an Ontology-based Document Collection for the IT Job Offer in Morocco 基于本体的摩洛哥IT招聘文档集的构建
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140749
Zineb Elkaimbillah, B. E. Asri, M. Mikram, Maryem Rhanoui
—Information Technology (IT) job offers are available on the web in a heterogeneous way. It is difficult for a candidate looking for an IT job to retrieve the exact information they need to locate the ideal match for their profile, without wasting time on useless searches. Traditional IT job search systems are based on simple keywords that are generally not adapted to provide detailed answers because they do not take into account semantic links. In this article, an ontology is developed to meet the expectations of IT profiles from the IT job descriptions accumulated and pre-annotated using the UBIAI tool. The classes and subclasses of the ontology are designed using the Protégé 5.5.0 editor. Then the properties of objects and data are defined to improve the ontology. The ontology results are validated using DL queries by asking a number of questions to retrieve the requested information for each IT profile, and the ontology answers all these questions adequately. Finally, various plugins are used to display an ontology in a graphical representation.
信息技术(IT)的工作机会在网络上以不同的方式提供。对于寻找It工作的求职者来说,很难检索到他们需要的准确信息,从而为他们的个人资料找到理想的匹配,而不浪费时间在无用的搜索上。传统的IT求职系统基于简单的关键词,通常不适合提供详细的答案,因为它们没有考虑到语义链接。在本文中,开发了一个本体,以满足使用UBIAI工具积累和预注释的IT工作描述的IT概要的期望。本体的类和子类是使用prot 5.5.0编辑器设计的。然后定义对象和数据的属性,对本体进行改进。本体结果使用DL查询进行验证,通过询问许多问题来检索每个IT概要文件所请求的信息,并且本体充分回答了所有这些问题。最后,使用各种插件以图形表示方式显示本体。
{"title":"Construction of an Ontology-based Document Collection for the IT Job Offer in Morocco","authors":"Zineb Elkaimbillah, B. E. Asri, M. Mikram, Maryem Rhanoui","doi":"10.14569/ijacsa.2023.0140749","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140749","url":null,"abstract":"—Information Technology (IT) job offers are available on the web in a heterogeneous way. It is difficult for a candidate looking for an IT job to retrieve the exact information they need to locate the ideal match for their profile, without wasting time on useless searches. Traditional IT job search systems are based on simple keywords that are generally not adapted to provide detailed answers because they do not take into account semantic links. In this article, an ontology is developed to meet the expectations of IT profiles from the IT job descriptions accumulated and pre-annotated using the UBIAI tool. The classes and subclasses of the ontology are designed using the Protégé 5.5.0 editor. Then the properties of objects and data are defined to improve the ontology. The ontology results are validated using DL queries by asking a number of questions to retrieve the requested information for each IT profile, and the ontology answers all these questions adequately. Finally, various plugins are used to display an ontology in a graphical representation.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76792988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Improved Ant Colony Algorithm Integrating Adaptive Parameter Configuration in Robot Mobile Path Design 集成自适应参数配置的改进蚁群算法在机器人移动路径设计中的应用
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140844
Jin-Il Han
—Under the background of the continuous progress of Industry 4.0 reform, the market demand for mobile robots in major world economies is gradually increasing. In order to improve the mobile robot's movement path planning quality and obstacle avoidance ability, this research adjusted the node selection method, pheromone update mechanism, transition probability and volatility coefficient calculation method of the ant colony algorithm, and improved the search direction setting and cost estimation calculation method of the A* algorithm. Thus, a robot movement path planning model can be designed with respect to the improved ant colony algorithm and A* algorithm. The simulation experiment results on grid maps show that the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the Tianniu whisker search algorithm, and the particle swarm algorithm designed in this study converged after 8, 37, 23, and 26 iterations, respectively. The minimum path lengths after convergence were 13.24m, 17.82m, 16.24m, and 17.05m, respectively. When the edge length of the grid map is 100m, the minimum planning length and total moving time of the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the longicorn whisker search algorithm, and the particle swarm algorithm designed in this study are 49m, 104m, 75m, 93m and 49s, 142s, 93s, and 127s, respectively. This indicates that the model designed in this study can effectively shorten the mobile path and training time while completing mobile tasks. The results of this study have a certain reference value for optimizing the robot's movement mode and obstacle avoidance ability.
-在工业4.0改革不断推进的背景下,世界主要经济体对移动机器人的市场需求逐渐增加。为了提高移动机器人的运动路径规划质量和避障能力,本研究对蚁群算法的节点选择方法、信息素更新机制、转移概率和波动系数计算方法进行了调整,对A*算法的搜索方向设置和代价估计计算方法进行了改进。因此,可以根据改进的蚁群算法和a *算法设计机器人运动路径规划模型。网格地图上的仿真实验结果表明,本文设计的改进算法、传统蚁群算法、天牛须搜索算法和粒子群算法构建的规划模型分别经过8次、37次、23次和26次迭代后收敛。收敛后的最小路径长度分别为13.24m、17.82m、16.24m和17.05m。当网格图边缘长度为100m时,本文设计的改进算法、传统蚁群算法、天角须搜索算法和粒子群算法构建的规划模型的最小规划长度和总移动时间分别为49m、104m、75m、93m和49s、142s、93s、127s。这表明本研究设计的模型在完成移动任务的同时,可以有效缩短移动路径和训练时间。研究结果对优化机器人的运动方式和避障能力具有一定的参考价值。
{"title":"Application of Improved Ant Colony Algorithm Integrating Adaptive Parameter Configuration in Robot Mobile Path Design","authors":"Jin-Il Han","doi":"10.14569/ijacsa.2023.0140844","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140844","url":null,"abstract":"—Under the background of the continuous progress of Industry 4.0 reform, the market demand for mobile robots in major world economies is gradually increasing. In order to improve the mobile robot's movement path planning quality and obstacle avoidance ability, this research adjusted the node selection method, pheromone update mechanism, transition probability and volatility coefficient calculation method of the ant colony algorithm, and improved the search direction setting and cost estimation calculation method of the A* algorithm. Thus, a robot movement path planning model can be designed with respect to the improved ant colony algorithm and A* algorithm. The simulation experiment results on grid maps show that the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the Tianniu whisker search algorithm, and the particle swarm algorithm designed in this study converged after 8, 37, 23, and 26 iterations, respectively. The minimum path lengths after convergence were 13.24m, 17.82m, 16.24m, and 17.05m, respectively. When the edge length of the grid map is 100m, the minimum planning length and total moving time of the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the longicorn whisker search algorithm, and the particle swarm algorithm designed in this study are 49m, 104m, 75m, 93m and 49s, 142s, 93s, and 127s, respectively. This indicates that the model designed in this study can effectively shorten the mobile path and training time while completing mobile tasks. The results of this study have a certain reference value for optimizing the robot's movement mode and obstacle avoidance ability.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77182836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge Graph based Representation to Extract Value from Open Government Data 基于知识图谱的政府公开数据价值提取方法
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140329
Kawtar Younsi Dahbi, D. Chiadmi, Hind Lamharhar
{"title":"Knowledge Graph based Representation to Extract Value from Open Government Data","authors":"Kawtar Younsi Dahbi, D. Chiadmi, Hind Lamharhar","doi":"10.14569/ijacsa.2023.0140329","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140329","url":null,"abstract":"","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81339129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patient Health Monitoring System Development using ESP8266 and Arduino with IoT Platform 基于ESP8266和Arduino物联网平台的患者健康监测系统开发
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140467
J. Alsayaydeh, Mohd Faizal bin Yusof, Muhammad Zulhakim Bin Abdul Halim, M. N. S. Zainudin, S. Herawan
The Internet of Things (IoT) has emerged as a transformative technology that has revolutionized the field of healthcare. One of the most promising applications of Internet of Things (IoT) in healthcare is patient health monitoring, which allows healthcare providers to remotely monitor patients' health and provide prompt medical attention when needed. This research work focuses on developing an Internet of Things (IoT)based patient health monitoring system aimed at providing a solution for patients, particularly the elderly, who face the risk of unexpected death due to the lack of medical attention. The proposed system utilizes a heartbeat sensor and an Infrared IR temperature sensor connected to Arduino UNO and Nodemcu, respectively, to monitor the patient's vital signs. The sensors collect the data, which is then sent to an Internet of Things (IoT) web platform via a Wi-Fi connection. The Internet of Things (IoT) platform displays the real-time data of the patient's health status, including the temperature and heartbeat rate, which can be monitored by doctors and nurses. The system is designed to send alerts to healthcare providers in the event of any medical emergency, ensuring that prompt medical attention can be provided to the patient. The significance of this research work lies in its potential to revolutionize the healthcare industry by providing a more efficient and effective means of patient health monitoring. The system can be used to monitor a large number of patients simultaneously, which is particularly beneficial in hospitals with a large patient load. Moreover, it can reduce the workload of healthcare providers, allowing them to focus on other critical tasks. This innovative system has the potential to improve the overall quality of healthcare services and lead to better health outcomes for the society. Keywords—Patient health monitoring; Internet of Things (IoT); Arduino UNO; Nodemcu ESP8266; thingspeak; wearable device; temperature value; heartbeat value; remotely
物联网(IoT)已经成为一种革命性的技术,彻底改变了医疗保健领域。物联网(IoT)在医疗保健领域最有前途的应用之一是患者健康监测,它允许医疗保健提供者远程监测患者的健康状况,并在需要时提供及时的医疗护理。本研究工作的重点是开发一种基于物联网(IoT)的患者健康监测系统,旨在为因缺乏医疗照顾而面临意外死亡风险的患者,特别是老年人提供解决方案。该系统利用一个心跳传感器和一个红外红外温度传感器分别连接到Arduino UNO和Nodemcu,来监测患者的生命体征。传感器收集数据,然后通过Wi-Fi连接发送到物联网(IoT)网络平台。物联网(IoT)平台显示患者健康状况的实时数据,包括体温和心率,医生和护士可以监控这些数据。该系统旨在在发生任何医疗紧急情况时向医疗保健提供者发送警报,确保向患者提供及时的医疗护理。这项研究工作的意义在于,它有可能通过提供一种更高效、更有效的患者健康监测手段,彻底改变医疗保健行业。该系统可用于同时监测大量患者,这对患者负荷较大的医院尤其有益。此外,它可以减少医疗保健提供者的工作量,使他们能够专注于其他关键任务。这一创新系统有潜力提高医疗保健服务的整体质量,并为社会带来更好的健康结果。关键词:患者健康监测;物联网(IoT);Arduino UNO;Nodemcu ESP8266;thingspeak;可穿戴设备;温度价值;心跳值;远程
{"title":"Patient Health Monitoring System Development using ESP8266 and Arduino with IoT Platform","authors":"J. Alsayaydeh, Mohd Faizal bin Yusof, Muhammad Zulhakim Bin Abdul Halim, M. N. S. Zainudin, S. Herawan","doi":"10.14569/ijacsa.2023.0140467","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140467","url":null,"abstract":"The Internet of Things (IoT) has emerged as a transformative technology that has revolutionized the field of healthcare. One of the most promising applications of Internet of Things (IoT) in healthcare is patient health monitoring, which allows healthcare providers to remotely monitor patients' health and provide prompt medical attention when needed. This research work focuses on developing an Internet of Things (IoT)based patient health monitoring system aimed at providing a solution for patients, particularly the elderly, who face the risk of unexpected death due to the lack of medical attention. The proposed system utilizes a heartbeat sensor and an Infrared IR temperature sensor connected to Arduino UNO and Nodemcu, respectively, to monitor the patient's vital signs. The sensors collect the data, which is then sent to an Internet of Things (IoT) web platform via a Wi-Fi connection. The Internet of Things (IoT) platform displays the real-time data of the patient's health status, including the temperature and heartbeat rate, which can be monitored by doctors and nurses. The system is designed to send alerts to healthcare providers in the event of any medical emergency, ensuring that prompt medical attention can be provided to the patient. The significance of this research work lies in its potential to revolutionize the healthcare industry by providing a more efficient and effective means of patient health monitoring. The system can be used to monitor a large number of patients simultaneously, which is particularly beneficial in hospitals with a large patient load. Moreover, it can reduce the workload of healthcare providers, allowing them to focus on other critical tasks. This innovative system has the potential to improve the overall quality of healthcare services and lead to better health outcomes for the society. Keywords—Patient health monitoring; Internet of Things (IoT); Arduino UNO; Nodemcu ESP8266; thingspeak; wearable device; temperature value; heartbeat value; remotely","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81401751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SLAM Mapping Method of Laser Radar for Tobacco Production Line Inspection Robot Based on Improved RBPF 基于改进RBPF的烟草生产线检测机器人激光雷达SLAM制图方法
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140894
Zhiyuan Liang, Pengtao He, Wenbin Liang, Xiaolei Zhao, Bin Wei
—The study focuses on the laser radar SLAM mapping method employed by the tobacco production line inspection robot, utilizing an enhanced RBPF approach. It involves the construction of a well-structured two-dimensional map of the inspection environment for the tobacco production line inspection robot. This construction aims to ensure the seamless execution of inspection tasks along the tobacco production line. The fusion of wheel odometer and IMU data is accomplished using the extended Kalman filter algorithm, wherein the resulting fused odometer motion model and LiDAR observation model jointly serve as the hybrid proposal distribution. In the hybrid proposal distribution, the iterative nearest point method is used to find the sampling particles in the high probability area, and the matching score during particle matching scanning is used as the fitness value, and the Drosophila optimization strategy is used to adjust the particle distribution. Then, the weight of each particle after optimization is solved, and the particles are adaptively resampled according to the size of the weight after solution, and the inspection map of the inspection robot of the tobacco production line is updated according to the updated position and posture information and observation information of the particles of the inspection robot of the tobacco production line. The experimental results show that this method can realize the laser radar SLAM mapping of the tobacco production line inspection robot, and it can build a more ideal two-dimensional map of the inspection environment of the tobacco production line inspection robot with fewer particles. If it is applied to practical work, a more ideal work effect can be achieved.
-重点研究烟草生产线检测机器人采用的激光雷达SLAM测绘方法,利用增强的RBPF方法。它涉及构建结构良好的烟草生产线检测机器人检测环境的二维地图。该建设旨在确保烟草生产线检验任务的无缝执行。采用扩展卡尔曼滤波算法实现车轮里程表与IMU数据的融合,融合后的里程表运动模型与LiDAR观测模型共同作为混合建议分布。在混合建议分布中,采用迭代最近点法在高概率区域寻找采样粒子,以粒子匹配扫描时的匹配分数作为适应度值,采用果蝇优化策略对粒子分布进行调整。然后,对优化后的每个粒子的权重进行求解,并根据求解后的权重大小对粒子进行自适应重采样,并根据烟草生产线检测机器人粒子的更新位置姿态信息和观测信息更新烟草生产线检测机器人的检测地图。实验结果表明,该方法能够实现烟草生产线检测机器人的激光雷达SLAM制图,能够以更少的粒子构建更理想的烟草生产线检测机器人检测环境二维地图。如果应用到实际工作中,可以达到更理想的工作效果。
{"title":"SLAM Mapping Method of Laser Radar for Tobacco Production Line Inspection Robot Based on Improved RBPF","authors":"Zhiyuan Liang, Pengtao He, Wenbin Liang, Xiaolei Zhao, Bin Wei","doi":"10.14569/ijacsa.2023.0140894","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140894","url":null,"abstract":"—The study focuses on the laser radar SLAM mapping method employed by the tobacco production line inspection robot, utilizing an enhanced RBPF approach. It involves the construction of a well-structured two-dimensional map of the inspection environment for the tobacco production line inspection robot. This construction aims to ensure the seamless execution of inspection tasks along the tobacco production line. The fusion of wheel odometer and IMU data is accomplished using the extended Kalman filter algorithm, wherein the resulting fused odometer motion model and LiDAR observation model jointly serve as the hybrid proposal distribution. In the hybrid proposal distribution, the iterative nearest point method is used to find the sampling particles in the high probability area, and the matching score during particle matching scanning is used as the fitness value, and the Drosophila optimization strategy is used to adjust the particle distribution. Then, the weight of each particle after optimization is solved, and the particles are adaptively resampled according to the size of the weight after solution, and the inspection map of the inspection robot of the tobacco production line is updated according to the updated position and posture information and observation information of the particles of the inspection robot of the tobacco production line. The experimental results show that this method can realize the laser radar SLAM mapping of the tobacco production line inspection robot, and it can build a more ideal two-dimensional map of the inspection environment of the tobacco production line inspection robot with fewer particles. If it is applied to practical work, a more ideal work effect can be achieved.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82258921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Evaluation of Genetic Algorithms to Solve the DNA Assembly Optimization Problem 遗传算法解决DNA装配优化问题的实验评价
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140333
Hachemi Bennaceur, Meznah Almutairy, Nora Alqhtani
org
org
{"title":"Experimental Evaluation of Genetic Algorithms to Solve the DNA Assembly Optimization Problem","authors":"Hachemi Bennaceur, Meznah Almutairy, Nora Alqhtani","doi":"10.14569/ijacsa.2023.0140333","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140333","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78663318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hate Speech Detection in Bahasa Indonesia: Challenges and Opportunities 印尼语中的仇恨言论检测:挑战与机遇
IF 0.9 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.01406125
Endang Wahyu Pamungkas, Divi Galih Prasetyo Putri, A. Fatmawati
This study aims to provide an overview of the current research on detecting abusive language in Indonesian social media. The study examines existing datasets, methods, and challenges and opportunities in this field. The research found that most existing datasets for detecting abusive language were collected from social media platforms such as Twitter, Facebook, and Instagram, with Twitter being the most commonly used source. The study also found that hate speech is the most researched type of abusive language. Various models, including traditional machine learning and deep learning approaches, have been implemented for this task, with deep learning models showing more competitive results. However, the use of transformer-based models is less popular in Indonesian hate speech studies. The study also emphasizes the importance of exploring more diverse phenomena, such as islamophobia and political hate speech. Additionally, the study suggests crowdsourcing as a potential solution for the annotation approach for labeling datasets. Furthermore, it encourages researchers to consider code-mixing issues in abusive language datasets in Indonesia, as it could improve the overall model performance for detecting abusive language in Indonesian data. The study also suggests that the lack of effective regulations and the anonymity afforded to users on most social networking sites, as well as the increasing number of Twitter users in Indonesia, have contributed to the rising prevalence of hate speech in Indonesian social media. The study also notes the importance of considering code-mixed language, out-of-vocabulary words, grammatical errors, and limited context when working with social media data. Keywords—Abusive language; hate speech detection; machine learning; social media
本研究旨在概述当前印尼社交媒体中检测辱骂语言的研究。该研究考察了该领域现有的数据集、方法以及挑战和机遇。研究发现,大多数现有的用于检测辱骂性语言的数据集都是从Twitter、Facebook和Instagram等社交媒体平台收集的,其中Twitter是最常用的来源。该研究还发现,仇恨言论是研究最多的辱骂语言类型。各种模型,包括传统的机器学习和深度学习方法,已经实现了这项任务,深度学习模型显示出更有竞争力的结果。然而,在印度尼西亚的仇恨言论研究中,使用基于转换的模型不太受欢迎。该研究还强调了探索更多不同现象的重要性,比如伊斯兰恐惧症和政治仇恨言论。此外,该研究建议将众包作为标注数据集的注释方法的潜在解决方案。此外,它鼓励研究人员考虑印度尼西亚滥用语言数据集中的代码混合问题,因为它可以提高印度尼西亚数据中检测滥用语言的整体模型性能。该研究还表明,缺乏有效的监管,大多数社交网站上用户的匿名性,以及印尼Twitter用户数量的增加,都导致了印尼社交媒体上仇恨言论的盛行。该研究还指出,在处理社交媒体数据时,考虑代码混合语言、词汇外单词、语法错误和有限上下文的重要性。Keywords-Abusive语言;仇恨语音检测;机器学习;社交媒体
{"title":"Hate Speech Detection in Bahasa Indonesia: Challenges and Opportunities","authors":"Endang Wahyu Pamungkas, Divi Galih Prasetyo Putri, A. Fatmawati","doi":"10.14569/ijacsa.2023.01406125","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01406125","url":null,"abstract":"This study aims to provide an overview of the current research on detecting abusive language in Indonesian social media. The study examines existing datasets, methods, and challenges and opportunities in this field. The research found that most existing datasets for detecting abusive language were collected from social media platforms such as Twitter, Facebook, and Instagram, with Twitter being the most commonly used source. The study also found that hate speech is the most researched type of abusive language. Various models, including traditional machine learning and deep learning approaches, have been implemented for this task, with deep learning models showing more competitive results. However, the use of transformer-based models is less popular in Indonesian hate speech studies. The study also emphasizes the importance of exploring more diverse phenomena, such as islamophobia and political hate speech. Additionally, the study suggests crowdsourcing as a potential solution for the annotation approach for labeling datasets. Furthermore, it encourages researchers to consider code-mixing issues in abusive language datasets in Indonesia, as it could improve the overall model performance for detecting abusive language in Indonesian data. The study also suggests that the lack of effective regulations and the anonymity afforded to users on most social networking sites, as well as the increasing number of Twitter users in Indonesia, have contributed to the rising prevalence of hate speech in Indonesian social media. The study also notes the importance of considering code-mixed language, out-of-vocabulary words, grammatical errors, and limited context when working with social media data. Keywords—Abusive language; hate speech detection; machine learning; social media","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76312984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Advanced Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1