首页 > 最新文献

International Journal of Advanced Computer Science and Applications最新文献

英文 中文
Implementing a Blockchain, Smart Contract, and NFT Framework for Waste Management Systems in Emerging Economies: An Investigation in Vietnam 在新兴经济体中实施区块链、智能合约和NFT框架的废物管理系统:在越南的一项调查
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.01408107
Khiem H. G, K. V, Huong H. L, Quy T. L, P. N., N. K, T. N., B. K, Trong D. P. N., Hieu M. D., Bao Q. T., Khoa D. T.
.
{"title":"Implementing a Blockchain, Smart Contract, and NFT Framework for Waste Management Systems in Emerging Economies: An Investigation in Vietnam","authors":"Khiem H. G, K. V, Huong H. L, Quy T. L, P. N., N. K, T. N., B. K, Trong D. P. N., Hieu M. D., Bao Q. T., Khoa D. T.","doi":"10.14569/ijacsa.2023.01408107","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01408107","url":null,"abstract":".","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"31 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77811186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hamming Distance Approach to Reduce Role Mining Scalability 降低角色挖掘可扩展性的汉明距离方法
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140654
Nazirah Abd. Hamid, S. R. Selamat, R. Ahmad, M. Mohamad
Role-based Access Control has become the standard of practice for many organizations for restricting control on limited resources in complicated infrastructures or systems. The main objective of the role mining development is to define appropriate roles that can be applied to the specified security access policies. However, the mining scales in this kind of setting are extensive and can cause a huge load on the management of the systems. To resolve the above mentioned problems, this paper proposes a model that implements Hamming Distance approach by rearranging the existing matrix as the input data to overcome the scalability problem. The findings of the model show that the generated file size of all datasets substantially have been reduced compared to the original datasets It has also shown that Hamming Distance technique can successfully reduce the mining scale of datasets ranging between 30% and 47% and produce better candidate roles. Keywords—Role-based Access Control; role mining; hamming distance; data mining
基于角色的访问控制已经成为许多组织的标准实践,用于限制对复杂基础设施或系统中有限资源的控制。角色挖掘开发的主要目标是定义可应用于指定安全访问策略的适当角色。然而,在这种环境下的采矿规模是广泛的,并且会给系统的管理带来巨大的负担。为了解决上述问题,本文提出了一种模型,通过重新排列现有矩阵作为输入数据来实现汉明距离方法,以克服可扩展性问题。该模型的研究结果表明,与原始数据集相比,所有数据集生成的文件大小都大大减小了,并且表明汉明距离技术可以成功地将数据集的挖掘规模减小30%至47%,并产生更好的候选角色。关键词:基于角色的访问控制;角色采矿;汉明距离;数据挖掘
{"title":"Hamming Distance Approach to Reduce Role Mining Scalability","authors":"Nazirah Abd. Hamid, S. R. Selamat, R. Ahmad, M. Mohamad","doi":"10.14569/ijacsa.2023.0140654","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140654","url":null,"abstract":"Role-based Access Control has become the standard of practice for many organizations for restricting control on limited resources in complicated infrastructures or systems. The main objective of the role mining development is to define appropriate roles that can be applied to the specified security access policies. However, the mining scales in this kind of setting are extensive and can cause a huge load on the management of the systems. To resolve the above mentioned problems, this paper proposes a model that implements Hamming Distance approach by rearranging the existing matrix as the input data to overcome the scalability problem. The findings of the model show that the generated file size of all datasets substantially have been reduced compared to the original datasets It has also shown that Hamming Distance technique can successfully reduce the mining scale of datasets ranging between 30% and 47% and produce better candidate roles. Keywords—Role-based Access Control; role mining; hamming distance; data mining","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"116 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80438654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hate Speech Detection in Bahasa Indonesia: Challenges and Opportunities 印尼语中的仇恨言论检测:挑战与机遇
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.01406125
Endang Wahyu Pamungkas, Divi Galih Prasetyo Putri, A. Fatmawati
This study aims to provide an overview of the current research on detecting abusive language in Indonesian social media. The study examines existing datasets, methods, and challenges and opportunities in this field. The research found that most existing datasets for detecting abusive language were collected from social media platforms such as Twitter, Facebook, and Instagram, with Twitter being the most commonly used source. The study also found that hate speech is the most researched type of abusive language. Various models, including traditional machine learning and deep learning approaches, have been implemented for this task, with deep learning models showing more competitive results. However, the use of transformer-based models is less popular in Indonesian hate speech studies. The study also emphasizes the importance of exploring more diverse phenomena, such as islamophobia and political hate speech. Additionally, the study suggests crowdsourcing as a potential solution for the annotation approach for labeling datasets. Furthermore, it encourages researchers to consider code-mixing issues in abusive language datasets in Indonesia, as it could improve the overall model performance for detecting abusive language in Indonesian data. The study also suggests that the lack of effective regulations and the anonymity afforded to users on most social networking sites, as well as the increasing number of Twitter users in Indonesia, have contributed to the rising prevalence of hate speech in Indonesian social media. The study also notes the importance of considering code-mixed language, out-of-vocabulary words, grammatical errors, and limited context when working with social media data. Keywords—Abusive language; hate speech detection; machine learning; social media
本研究旨在概述当前印尼社交媒体中检测辱骂语言的研究。该研究考察了该领域现有的数据集、方法以及挑战和机遇。研究发现,大多数现有的用于检测辱骂性语言的数据集都是从Twitter、Facebook和Instagram等社交媒体平台收集的,其中Twitter是最常用的来源。该研究还发现,仇恨言论是研究最多的辱骂语言类型。各种模型,包括传统的机器学习和深度学习方法,已经实现了这项任务,深度学习模型显示出更有竞争力的结果。然而,在印度尼西亚的仇恨言论研究中,使用基于转换的模型不太受欢迎。该研究还强调了探索更多不同现象的重要性,比如伊斯兰恐惧症和政治仇恨言论。此外,该研究建议将众包作为标注数据集的注释方法的潜在解决方案。此外,它鼓励研究人员考虑印度尼西亚滥用语言数据集中的代码混合问题,因为它可以提高印度尼西亚数据中检测滥用语言的整体模型性能。该研究还表明,缺乏有效的监管,大多数社交网站上用户的匿名性,以及印尼Twitter用户数量的增加,都导致了印尼社交媒体上仇恨言论的盛行。该研究还指出,在处理社交媒体数据时,考虑代码混合语言、词汇外单词、语法错误和有限上下文的重要性。Keywords-Abusive语言;仇恨语音检测;机器学习;社交媒体
{"title":"Hate Speech Detection in Bahasa Indonesia: Challenges and Opportunities","authors":"Endang Wahyu Pamungkas, Divi Galih Prasetyo Putri, A. Fatmawati","doi":"10.14569/ijacsa.2023.01406125","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01406125","url":null,"abstract":"This study aims to provide an overview of the current research on detecting abusive language in Indonesian social media. The study examines existing datasets, methods, and challenges and opportunities in this field. The research found that most existing datasets for detecting abusive language were collected from social media platforms such as Twitter, Facebook, and Instagram, with Twitter being the most commonly used source. The study also found that hate speech is the most researched type of abusive language. Various models, including traditional machine learning and deep learning approaches, have been implemented for this task, with deep learning models showing more competitive results. However, the use of transformer-based models is less popular in Indonesian hate speech studies. The study also emphasizes the importance of exploring more diverse phenomena, such as islamophobia and political hate speech. Additionally, the study suggests crowdsourcing as a potential solution for the annotation approach for labeling datasets. Furthermore, it encourages researchers to consider code-mixing issues in abusive language datasets in Indonesia, as it could improve the overall model performance for detecting abusive language in Indonesian data. The study also suggests that the lack of effective regulations and the anonymity afforded to users on most social networking sites, as well as the increasing number of Twitter users in Indonesia, have contributed to the rising prevalence of hate speech in Indonesian social media. The study also notes the importance of considering code-mixed language, out-of-vocabulary words, grammatical errors, and limited context when working with social media data. Keywords—Abusive language; hate speech detection; machine learning; social media","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"5 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76312984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Security and Multi-Cloud Load Balancing for Data in Edge-based Computing Applications 边缘计算应用中数据的集成安全与多云负载均衡
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140802
R. Dornala
— Edge computing has gained significant attention in recent years due to its ability to process data closer to the source, resulting in reduced latency and improved performance. However, ensuring data security and efficient data management in edge-based computing applications poses significant challenges. This paper proposes an ensemble security approach and a multi-cloud load-balancing strategy to address these challenges. The ensemble security approach leverages multiple security mechanisms, such as encryption, authentication, and intrusion detection systems, to provide a layered defense against potential threats. By combining these mechanisms, the system can detect and mitigate security breaches at various levels, ensuring the integrity and confidentiality of data in edge-based environments. The multi-cloud load balancing strategy also aims to optimize resource utilization and performance by distributing data processing tasks across multiple cloud service providers. This approach takes advantage of the flexibility and scalability offered by the cloud, allowing for dynamic workload allocation based on factors like network conditions and computational capabilities. To evaluate the effectiveness of the proposed approach, we conducted experiments using a realistic edge-based computing environment. The results demonstrate that the ensemble security approach effectively detects and prevents security threats, while the multi-cloud load balancing strategy with edge computing to improve the overall system performance and resource utilization.
-边缘计算近年来获得了极大的关注,因为它能够更接近源地处理数据,从而减少延迟并提高性能。然而,在基于边缘计算的应用中,确保数据安全和有效的数据管理是一个重大挑战。本文提出了一种集成安全方法和多云负载平衡策略来解决这些挑战。集成安全方法利用多种安全机制,如加密、身份验证和入侵检测系统,提供针对潜在威胁的分层防御。通过结合这些机制,系统可以检测和减轻不同级别的安全漏洞,确保边缘环境中数据的完整性和机密性。多云负载平衡策略还旨在通过跨多个云服务提供商分配数据处理任务来优化资源利用率和性能。这种方法利用了云提供的灵活性和可伸缩性,允许基于网络条件和计算能力等因素进行动态工作负载分配。为了评估所提出方法的有效性,我们使用现实的基于边缘的计算环境进行了实验。结果表明,集成安全方法可以有效地检测和防范安全威胁,而多云负载均衡策略结合边缘计算可以提高系统整体性能和资源利用率。
{"title":"Ensemble Security and Multi-Cloud Load Balancing for Data in Edge-based Computing Applications","authors":"R. Dornala","doi":"10.14569/ijacsa.2023.0140802","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140802","url":null,"abstract":"— Edge computing has gained significant attention in recent years due to its ability to process data closer to the source, resulting in reduced latency and improved performance. However, ensuring data security and efficient data management in edge-based computing applications poses significant challenges. This paper proposes an ensemble security approach and a multi-cloud load-balancing strategy to address these challenges. The ensemble security approach leverages multiple security mechanisms, such as encryption, authentication, and intrusion detection systems, to provide a layered defense against potential threats. By combining these mechanisms, the system can detect and mitigate security breaches at various levels, ensuring the integrity and confidentiality of data in edge-based environments. The multi-cloud load balancing strategy also aims to optimize resource utilization and performance by distributing data processing tasks across multiple cloud service providers. This approach takes advantage of the flexibility and scalability offered by the cloud, allowing for dynamic workload allocation based on factors like network conditions and computational capabilities. To evaluate the effectiveness of the proposed approach, we conducted experiments using a realistic edge-based computing environment. The results demonstrate that the ensemble security approach effectively detects and prevents security threats, while the multi-cloud load balancing strategy with edge computing to improve the overall system performance and resource utilization.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"11 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76622033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities 尼日利亚大学具有安全容错和恢复能力的自适应学习者cbt
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140816
B.O. Malasowe, M. Akazue, Ejaita Abugor Okpako, Fidelis Obukowho Aghware, A. Ojugo, Dr. Ojie
—The post covid-19 studies have reported significant negative impact witnessed on global education and learning with the closure of schools’ physical infrastructure from 2020 to 2022. Its effects today continues to ripple across the learning processes even with advances in e-learning or media literacy. The adoption and integration therein of e-learning on the Nigerian frontier is yet to be fully harnessed. From traditional to blended learning, and to virtual learning – Nigeria must rise, and develop new strategies to address issues with her educational theories as well as to bridge the gap and negative impact of the post covid-19 pandemic. This study implements a virtual learning framework that adequately fuses the alternative delivery asynchronous-learning with traditional synchronous learning for adoption in the Nigerian Educational System. Result showcases improved cognition in learners, engaged qualitative learning
- 2019冠状病毒病后研究报告称,2020年至2022年期间学校有形基础设施关闭对全球教育和学习产生了重大负面影响。今天,它的影响继续波及整个学习过程,甚至随着电子学习或媒体素养的进步。尼日利亚边境地区电子学习的采用和整合尚未得到充分利用。从传统学习到混合学习,再到虚拟学习,尼日利亚必须崛起,并制定新的战略,以其教育理论解决问题,并弥合covid-19大流行后的差距和负面影响。本研究实现了一个虚拟学习框架,该框架充分融合了尼日利亚教育系统采用的另类交付异步学习与传统同步学习。结果显示学习者的认知得到改善,从事定性学习
{"title":"Adaptive Learner-CBT with Secured Fault-Tolerant and Resumption Capability for Nigerian Universities","authors":"B.O. Malasowe, M. Akazue, Ejaita Abugor Okpako, Fidelis Obukowho Aghware, A. Ojugo, Dr. Ojie","doi":"10.14569/ijacsa.2023.0140816","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140816","url":null,"abstract":"—The post covid-19 studies have reported significant negative impact witnessed on global education and learning with the closure of schools’ physical infrastructure from 2020 to 2022. Its effects today continues to ripple across the learning processes even with advances in e-learning or media literacy. The adoption and integration therein of e-learning on the Nigerian frontier is yet to be fully harnessed. From traditional to blended learning, and to virtual learning – Nigeria must rise, and develop new strategies to address issues with her educational theories as well as to bridge the gap and negative impact of the post covid-19 pandemic. This study implements a virtual learning framework that adequately fuses the alternative delivery asynchronous-learning with traditional synchronous learning for adoption in the Nigerian Educational System. Result showcases improved cognition in learners, engaged qualitative learning","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"252 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78527235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Personalized Music Recommendation Based on Interest and Emotion: A Comparison of Multiple Algorithms 基于兴趣和情感的个性化音乐推荐:多种算法的比较
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140426
Xiuli Yan
Recommendation algorithms can greatly improve the efficiency of information retrieval for users. This article briefly introduced recommendation algorithms based on association rules and algorithms based on interest and emotion analysis. After crawling music and comment data from the NetEase Cloud platform, a simulation experiment was conducted. Firstly, the performance of the Back-Propagation Neural Network (BPNN) in the interest and emotion-based algorithm for recommending music was tested, and then the impact of the proportion of emotion weight between comments and music on the emotion analysis-based algorithm was tested. Finally, the three recommendation algorithms based on association rules, user ratings, and interest and emotion analysis were compared. The results showed that when the BPNN used the dominant interest and emotion and secondary interest and emotion as judgment criteria, the accuracy of interest and emotion recognition for music and comments was higher. When the proportion of interest and emotion weight between comments and music was 6:4, the interest and emotion analysis-based recommendation algorithm had the highest accuracy. The interest and emotion-based recommendation algorithm had higher recommendation accuracy than the association rule-based and user rating-based algorithms, and could provide users with more personalized and emotional music recommendations. Keywords—Interest and emotion; recommendation algorithm; music; personalization
推荐算法可以极大地提高用户信息检索的效率。本文简要介绍了基于关联规则的推荐算法和基于兴趣和情感分析的推荐算法。从网易云平台抓取音乐和评论数据,进行仿真实验。首先测试了反向传播神经网络(BPNN)在基于兴趣和情感的音乐推荐算法中的性能,然后测试了评论和音乐之间的情感权重比例对基于情感分析的算法的影响。最后,对基于关联规则、用户评分、兴趣和情感分析的三种推荐算法进行了比较。结果表明,当BPNN以主导兴趣和情感和次要兴趣和情感作为判断标准时,对音乐和评论的兴趣和情感识别准确率更高。当评论与音乐的兴趣和情感权重比例为6:4时,基于兴趣和情感分析的推荐算法准确率最高。基于兴趣和情感的推荐算法比基于关联规则和基于用户评分的推荐算法具有更高的推荐准确率,可以为用户提供更加个性化和情感化的音乐推荐。关键词:兴趣与情感;推荐算法;音乐;个性化
{"title":"Personalized Music Recommendation Based on Interest and Emotion: A Comparison of Multiple Algorithms","authors":"Xiuli Yan","doi":"10.14569/ijacsa.2023.0140426","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140426","url":null,"abstract":"Recommendation algorithms can greatly improve the efficiency of information retrieval for users. This article briefly introduced recommendation algorithms based on association rules and algorithms based on interest and emotion analysis. After crawling music and comment data from the NetEase Cloud platform, a simulation experiment was conducted. Firstly, the performance of the Back-Propagation Neural Network (BPNN) in the interest and emotion-based algorithm for recommending music was tested, and then the impact of the proportion of emotion weight between comments and music on the emotion analysis-based algorithm was tested. Finally, the three recommendation algorithms based on association rules, user ratings, and interest and emotion analysis were compared. The results showed that when the BPNN used the dominant interest and emotion and secondary interest and emotion as judgment criteria, the accuracy of interest and emotion recognition for music and comments was higher. When the proportion of interest and emotion weight between comments and music was 6:4, the interest and emotion analysis-based recommendation algorithm had the highest accuracy. The interest and emotion-based recommendation algorithm had higher recommendation accuracy than the association rule-based and user rating-based algorithms, and could provide users with more personalized and emotional music recommendations. Keywords—Interest and emotion; recommendation algorithm; music; personalization","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"9 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78602295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Evaluation of Genetic Algorithms to Solve the DNA Assembly Optimization Problem 遗传算法解决DNA装配优化问题的实验评价
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140333
Hachemi Bennaceur, Meznah Almutairy, Nora Alqhtani
org
org
{"title":"Experimental Evaluation of Genetic Algorithms to Solve the DNA Assembly Optimization Problem","authors":"Hachemi Bennaceur, Meznah Almutairy, Nora Alqhtani","doi":"10.14569/ijacsa.2023.0140333","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140333","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"7 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78663318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Developing a Computer Simulation to Study the Behavior of Factors Affecting the Flooding of the Gash River 建立影响裂谷河洪水因素行为的计算机模拟研究
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140110
Abdalilah. G. I. Alhalangy
—In recent years, the city of Kassala has suffered from frequent flooding disasters in the Gash River, which is the city's lifeblood. But the problem of frequent flooding of the river has made it a life-threatening nightmare. The importance of research lies in the fact that it is one of the few attempts to discuss and study the causes and effects of the Gash River floods. It aims to identify the factors affecting river floods. It proposes an algorithm to simulate flooding by randomly generating different factors that effectively affect river flooding. The descriptive analytical approach, the analytical, inductive approach, and the analytical deductive approach to desk research were used, taking advantage of the primary statistical method in its observation and evaluation, which relies on primary and secondary information to help make scientific, practical, and objective. The research came out with significant results related to the problems that threaten the town of Kassala from the frequent floods of the Gash River. The study's results proved that there is a deviation and discrepancy between the floods rate during the year, which gives a negative indication, and that deposited quantities vary in different proportions from one period to another, which causes a significant threat in the future. The research suggests other solutions that help reduce the problems and their effects. In addition to the above, the study proposes various recommendations that will be the basis for future studies to reach the required solutions and goals.
近年来,卡萨拉市频繁遭受加什河的洪水灾害,这是该市的命脉。但是河水频繁泛滥的问题使它成为威胁生命的噩梦。这项研究的重要性在于,它是为数不多的讨论和研究裂谷河洪水成因和影响的尝试之一。它的目的是确定影响河流洪水的因素。提出了一种通过随机生成有效影响河流洪水的不同因子来模拟洪水的算法。案头研究采用描述性分析方法、分析归纳法和分析演绎法,利用初级统计方法进行观察和评价,依靠一手信息和二手信息,使其具有科学性、实用性和客观性。这项研究得出了与Gash河频繁洪水威胁卡萨拉镇的问题有关的重要结果。研究结果表明,年内洪水率之间存在偏差和差异,这是一个消极的指示,沉积物量在不同时期以不同的比例变化,这对未来造成了重大威胁。该研究提出了其他有助于减少问题及其影响的解决方案。除此之外,研究还提出了各种建议,这些建议将成为未来研究的基础,以达到所需的解决方案和目标。
{"title":"Developing a Computer Simulation to Study the Behavior of Factors Affecting the Flooding of the Gash River","authors":"Abdalilah. G. I. Alhalangy","doi":"10.14569/ijacsa.2023.0140110","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140110","url":null,"abstract":"—In recent years, the city of Kassala has suffered from frequent flooding disasters in the Gash River, which is the city's lifeblood. But the problem of frequent flooding of the river has made it a life-threatening nightmare. The importance of research lies in the fact that it is one of the few attempts to discuss and study the causes and effects of the Gash River floods. It aims to identify the factors affecting river floods. It proposes an algorithm to simulate flooding by randomly generating different factors that effectively affect river flooding. The descriptive analytical approach, the analytical, inductive approach, and the analytical deductive approach to desk research were used, taking advantage of the primary statistical method in its observation and evaluation, which relies on primary and secondary information to help make scientific, practical, and objective. The research came out with significant results related to the problems that threaten the town of Kassala from the frequent floods of the Gash River. The study's results proved that there is a deviation and discrepancy between the floods rate during the year, which gives a negative indication, and that deposited quantities vary in different proportions from one period to another, which causes a significant threat in the future. The research suggests other solutions that help reduce the problems and their effects. In addition to the above, the study proposes various recommendations that will be the basis for future studies to reach the required solutions and goals.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"168 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76892042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Improved Ant Colony Algorithm Integrating Adaptive Parameter Configuration in Robot Mobile Path Design 集成自适应参数配置的改进蚁群算法在机器人移动路径设计中的应用
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140844
Jin-Il Han
—Under the background of the continuous progress of Industry 4.0 reform, the market demand for mobile robots in major world economies is gradually increasing. In order to improve the mobile robot's movement path planning quality and obstacle avoidance ability, this research adjusted the node selection method, pheromone update mechanism, transition probability and volatility coefficient calculation method of the ant colony algorithm, and improved the search direction setting and cost estimation calculation method of the A* algorithm. Thus, a robot movement path planning model can be designed with respect to the improved ant colony algorithm and A* algorithm. The simulation experiment results on grid maps show that the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the Tianniu whisker search algorithm, and the particle swarm algorithm designed in this study converged after 8, 37, 23, and 26 iterations, respectively. The minimum path lengths after convergence were 13.24m, 17.82m, 16.24m, and 17.05m, respectively. When the edge length of the grid map is 100m, the minimum planning length and total moving time of the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the longicorn whisker search algorithm, and the particle swarm algorithm designed in this study are 49m, 104m, 75m, 93m and 49s, 142s, 93s, and 127s, respectively. This indicates that the model designed in this study can effectively shorten the mobile path and training time while completing mobile tasks. The results of this study have a certain reference value for optimizing the robot's movement mode and obstacle avoidance ability.
-在工业4.0改革不断推进的背景下,世界主要经济体对移动机器人的市场需求逐渐增加。为了提高移动机器人的运动路径规划质量和避障能力,本研究对蚁群算法的节点选择方法、信息素更新机制、转移概率和波动系数计算方法进行了调整,对A*算法的搜索方向设置和代价估计计算方法进行了改进。因此,可以根据改进的蚁群算法和a *算法设计机器人运动路径规划模型。网格地图上的仿真实验结果表明,本文设计的改进算法、传统蚁群算法、天牛须搜索算法和粒子群算法构建的规划模型分别经过8次、37次、23次和26次迭代后收敛。收敛后的最小路径长度分别为13.24m、17.82m、16.24m和17.05m。当网格图边缘长度为100m时,本文设计的改进算法、传统蚁群算法、天角须搜索算法和粒子群算法构建的规划模型的最小规划长度和总移动时间分别为49m、104m、75m、93m和49s、142s、93s、127s。这表明本研究设计的模型在完成移动任务的同时,可以有效缩短移动路径和训练时间。研究结果对优化机器人的运动方式和避障能力具有一定的参考价值。
{"title":"Application of Improved Ant Colony Algorithm Integrating Adaptive Parameter Configuration in Robot Mobile Path Design","authors":"Jin-Il Han","doi":"10.14569/ijacsa.2023.0140844","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140844","url":null,"abstract":"—Under the background of the continuous progress of Industry 4.0 reform, the market demand for mobile robots in major world economies is gradually increasing. In order to improve the mobile robot's movement path planning quality and obstacle avoidance ability, this research adjusted the node selection method, pheromone update mechanism, transition probability and volatility coefficient calculation method of the ant colony algorithm, and improved the search direction setting and cost estimation calculation method of the A* algorithm. Thus, a robot movement path planning model can be designed with respect to the improved ant colony algorithm and A* algorithm. The simulation experiment results on grid maps show that the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the Tianniu whisker search algorithm, and the particle swarm algorithm designed in this study converged after 8, 37, 23, and 26 iterations, respectively. The minimum path lengths after convergence were 13.24m, 17.82m, 16.24m, and 17.05m, respectively. When the edge length of the grid map is 100m, the minimum planning length and total moving time of the planning model constructed in view of the improved algorithm, the traditional ant colony algorithm, the longicorn whisker search algorithm, and the particle swarm algorithm designed in this study are 49m, 104m, 75m, 93m and 49s, 142s, 93s, and 127s, respectively. This indicates that the model designed in this study can effectively shorten the mobile path and training time while completing mobile tasks. The results of this study have a certain reference value for optimizing the robot's movement mode and obstacle avoidance ability.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"110 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77182836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Settlement Prediction of Building Foundation in Smart City Based on BP Network 基于BP网络的智慧城市建筑地基沉降预测研究
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140693
Luyao Wei
In the construction process of high-rise buildings, it is necessary to predict the settlement and deformation of the foundation, and the current prediction methods are mainly based on empirical theoretical calculations and methods and more accurate numerical analysis methods. In the face of the interference of complex and ever-changing terrain and parameter values on prediction methods, in order to accurately determine the settlement of building foundations, this study designed a smart city building foundation settlement prediction method based on BP neural network. Firstly, a real-time dynamic monitoring unit for building foundation settlement was constructed using Wireless Sensor Network (WSN) technology. Then, the monitoring data was used to calculate the relevant parameters of building foundation settlement through layer sum method. Finally, input the monitoring data into the BP network results, adjust the weights of the output layer and hidden layer using settlement related parameters, and output the settlement prediction results of the smart city building foundation through training. The study selected average error and prediction time as evaluation criteria to test the feasibility of the method proposed in this article. This method can effectively predict foundation settlement, with an average prediction error always less than 4% and a prediction process time always less than 49ms. Keyword—Smart city; intelligent architecture; foundation settlement; settlement prediction; BP neural network; parameter
在高层建筑的施工过程中,需要对地基的沉降和变形进行预测,目前的预测方法主要是基于经验理论计算方法和较为精确的数值分析方法。面对复杂多变的地形和参数值对预测方法的干扰,为了准确判断建筑地基沉降,本研究设计了一种基于BP神经网络的智慧城市建筑地基沉降预测方法。首先,利用无线传感器网络(WSN)技术构建了建筑物地基沉降实时动态监测单元。然后,利用监测数据,通过分层求和法计算建筑地基沉降的相关参数。最后将监测数据输入到BP网络结果中,利用沉降相关参数调整输出层和隐含层的权重,通过训练输出智慧城市建设基础的沉降预测结果。选取平均误差和预测时间作为评价标准,检验本文方法的可行性。该方法能有效预测地基沉降,平均预测误差始终小于4%,预测过程时间始终小于49ms。Keyword-Smart城市;智能建筑;基础沉降;沉降预测;BP神经网络;参数
{"title":"Research on Settlement Prediction of Building Foundation in Smart City Based on BP Network","authors":"Luyao Wei","doi":"10.14569/ijacsa.2023.0140693","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140693","url":null,"abstract":"In the construction process of high-rise buildings, it is necessary to predict the settlement and deformation of the foundation, and the current prediction methods are mainly based on empirical theoretical calculations and methods and more accurate numerical analysis methods. In the face of the interference of complex and ever-changing terrain and parameter values on prediction methods, in order to accurately determine the settlement of building foundations, this study designed a smart city building foundation settlement prediction method based on BP neural network. Firstly, a real-time dynamic monitoring unit for building foundation settlement was constructed using Wireless Sensor Network (WSN) technology. Then, the monitoring data was used to calculate the relevant parameters of building foundation settlement through layer sum method. Finally, input the monitoring data into the BP network results, adjust the weights of the output layer and hidden layer using settlement related parameters, and output the settlement prediction results of the smart city building foundation through training. The study selected average error and prediction time as evaluation criteria to test the feasibility of the method proposed in this article. This method can effectively predict foundation settlement, with an average prediction error always less than 4% and a prediction process time always less than 49ms. Keyword—Smart city; intelligent architecture; foundation settlement; settlement prediction; BP neural network; parameter","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"28 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79139772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Advanced Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1