首页 > 最新文献

International Journal of Advanced Computer Science and Applications最新文献

英文 中文
Optimal Land-cover Classification Feature Selection in Arid Areas based on Sentinel-2 Imagery and Spectral Indices 基于Sentinel-2影像和光谱指数的干旱区土地覆盖分类特征优选
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140312
Mohammed Saeed, Asmala Ahmad, O. Mohd
org
org
{"title":"Optimal Land-cover Classification Feature Selection in Arid Areas based on Sentinel-2 Imagery and Spectral Indices","authors":"Mohammed Saeed, Asmala Ahmad, O. Mohd","doi":"10.14569/ijacsa.2023.0140312","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140312","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"186 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80627839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Single-valued Pentagonal Neutrosophic Geometric Programming Approach to Optimize Decision Maker’s Satisfaction Level 一种优化决策者满意度的单值五边形中性几何规划方法
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140439
Satyabrata Nath, P. Das, P. Debnath
Achieving the desired level of satisfaction for a decision-maker in any decision-making scenario is considered a challenging endeavor because minor modifications in the process might lead to incorrect findings and inaccurate decisions. In order to maximize the decision-maker’s satisfaction, this paper proposes a Single-valued Neutrosophic Geometric Programming model based on pentagonal fuzzy numbers. The decision-maker is typically assumed to be certain of the parameters, but in reality, this is not the case, hence the parameters are presented as neutrosophic fuzzy values. The decision-maker, with this strategy, is able to achieve varying levels of satisfaction and dissatisfaction for each constraint and even complete satisfaction for certain constraints. Here the decision maker aims to achieve the maximum level of satisfaction while maintaining the level of hesitation and minimizing dissatisfaction in order to retain an optimum solution. Furthermore, transforming the objective function into a constraint adds one more layer to the Ndimensional multi-parametrizes and . The advantages of this multi-parametrized proposed method over the existing ones are proven using numerical examples. Keywords—Decision making; pentagonal neutrosophic numbers; single-valued neutrosophic geometric programming; multi-parametric programming
在任何决策场景中,为决策者实现期望的满意水平被认为是一项具有挑战性的努力,因为过程中的微小修改可能导致不正确的发现和不准确的决策。为了使决策者的满意度最大化,提出了一种基于五边形模糊数的单值中性几何规划模型。决策者通常假定对这些参数是确定的,但实际情况并非如此,因此这些参数被表示为中性模糊值。有了这个策略,决策者能够对每个约束实现不同程度的满意和不满意,甚至对某些约束完全满意。在这里,决策者的目标是实现最大程度的满意度,同时保持犹豫的水平,并尽量减少不满,以保留最佳解决方案。此外,将目标函数转换为约束,为n维多参数化和多参数化问题增加了一层。通过数值算例证明了该多参数化方法相对于现有方法的优越性。Keywords-Decision制作;五边形嗜中性数;单值嗜中性几何规划;不确定型编程
{"title":"A Single-valued Pentagonal Neutrosophic Geometric Programming Approach to Optimize Decision Maker’s Satisfaction Level","authors":"Satyabrata Nath, P. Das, P. Debnath","doi":"10.14569/ijacsa.2023.0140439","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140439","url":null,"abstract":"Achieving the desired level of satisfaction for a decision-maker in any decision-making scenario is considered a challenging endeavor because minor modifications in the process might lead to incorrect findings and inaccurate decisions. In order to maximize the decision-maker’s satisfaction, this paper proposes a Single-valued Neutrosophic Geometric Programming model based on pentagonal fuzzy numbers. The decision-maker is typically assumed to be certain of the parameters, but in reality, this is not the case, hence the parameters are presented as neutrosophic fuzzy values. The decision-maker, with this strategy, is able to achieve varying levels of satisfaction and dissatisfaction for each constraint and even complete satisfaction for certain constraints. Here the decision maker aims to achieve the maximum level of satisfaction while maintaining the level of hesitation and minimizing dissatisfaction in order to retain an optimum solution. Furthermore, transforming the objective function into a constraint adds one more layer to the Ndimensional multi-parametrizes and . The advantages of this multi-parametrized proposed method over the existing ones are proven using numerical examples. Keywords—Decision making; pentagonal neutrosophic numbers; single-valued neutrosophic geometric programming; multi-parametric programming","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"75 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80664918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved 3D Rotation-based Geometric Data Perturbation Based on Medical Data Preservation in Big Data 基于大数据医疗数据保存的改进三维旋转几何数据摄动
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140592
Jayanti Dansana, M. R. Kabat, P. Pattnaik
— With the rise in technology, a huge volume of data is being processed using data mining, especially in the healthcare sector. Usually, medical data consist of a lot of personal data, and third parties utilize it for the data mining process. Perturbation in health care data highly aids in preventing intruders from utilizing the patient’s privacy. One of the challenges in data perturbation is managing data utility and privacy protection. Medical data mining has certain special properties compared with other data mining fields. Hence, in this work, the machine learning (ML) based perturbation approach is introduced to provide more privacy to healthcare data. Here, clustering and IGDP-3DR processes are applied to improve healthcare privacy preservation. Initially, the dataset is pre-processed using data normalization. Then, the dimensionality is reduced by SVD with PCA (singular value decomposition with Principal component analysis). Then, the clustering process is performed by IFCM (Improved Fuzzy C means). The high-dimensional data are divided into several segments by IFCM, and every partition is set as a cluster. Then, improved Geometric Data Perturbation (IGDP) is used to perturb the clustered data. IGDP is a combination of GDP with 3D rotation (3DR). Finally, the perturbed data are classified using a machine learning (ML) classifier - kernel Support Vector Machine- Horse Herd Optimization (KSVM-HHO) to classify the perturbed data and ensure better accuracy. The overall evaluation of the proposed KSVM-HHO is carried out in the Python platform. The performance of the IGDP-KSVM-HHO is compared over the two benchmark datasets, Wisconsin prognostic breast cancer (WBC) and Pima Indians Diabetes (PID) dataset. For the WBC dataset, the proposed method obtains an overall accuracy of 98.08% perturbed data, and for the PID dataset, the proposed method obtains an overall accuracy of 98.04%.
-随着技术的发展,正在使用数据挖掘处理大量数据,特别是在医疗保健领域。通常,医疗数据由大量个人数据组成,第三方利用这些数据进行数据挖掘。在医疗保健数据的扰动高度有助于防止入侵者利用病人的隐私。数据扰动的挑战之一是管理数据效用和隐私保护。与其他数据挖掘领域相比,医疗数据挖掘具有一定的特殊性。因此,在这项工作中,引入了基于机器学习(ML)的扰动方法来为医疗保健数据提供更多隐私。在这里,应用聚类和IGDP-3DR流程来改进医疗保健隐私保护。首先,使用数据规范化对数据集进行预处理。然后,利用主成分分析的奇异值分解(singular value decomposition with Principal component analysis)进行SVD降维。然后,通过IFCM(改进模糊C均值)进行聚类处理。IFCM将高维数据分成若干段,并将每个分区设置为一个聚类。然后,采用改进的几何数据摄动(IGDP)对聚类数据进行摄动。IGDP是GDP与3D旋转(3DR)的组合。最后,使用机器学习(ML)分类器-核支持向量机-马群优化(KSVM-HHO)对扰动数据进行分类,以确保更好的精度。提出的KSVM-HHO的总体评估是在Python平台上进行的。IGDP-KSVM-HHO的性能在两个基准数据集上进行了比较,威斯康星州预后乳腺癌(WBC)和皮马印第安人糖尿病(PID)数据集。对于WBC数据集,所提方法得到的扰动数据总体准确率为98.08%,对于PID数据集,所提方法得到的扰动数据总体准确率为98.04%。
{"title":"Improved 3D Rotation-based Geometric Data Perturbation Based on Medical Data Preservation in Big Data","authors":"Jayanti Dansana, M. R. Kabat, P. Pattnaik","doi":"10.14569/ijacsa.2023.0140592","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140592","url":null,"abstract":"— With the rise in technology, a huge volume of data is being processed using data mining, especially in the healthcare sector. Usually, medical data consist of a lot of personal data, and third parties utilize it for the data mining process. Perturbation in health care data highly aids in preventing intruders from utilizing the patient’s privacy. One of the challenges in data perturbation is managing data utility and privacy protection. Medical data mining has certain special properties compared with other data mining fields. Hence, in this work, the machine learning (ML) based perturbation approach is introduced to provide more privacy to healthcare data. Here, clustering and IGDP-3DR processes are applied to improve healthcare privacy preservation. Initially, the dataset is pre-processed using data normalization. Then, the dimensionality is reduced by SVD with PCA (singular value decomposition with Principal component analysis). Then, the clustering process is performed by IFCM (Improved Fuzzy C means). The high-dimensional data are divided into several segments by IFCM, and every partition is set as a cluster. Then, improved Geometric Data Perturbation (IGDP) is used to perturb the clustered data. IGDP is a combination of GDP with 3D rotation (3DR). Finally, the perturbed data are classified using a machine learning (ML) classifier - kernel Support Vector Machine- Horse Herd Optimization (KSVM-HHO) to classify the perturbed data and ensure better accuracy. The overall evaluation of the proposed KSVM-HHO is carried out in the Python platform. The performance of the IGDP-KSVM-HHO is compared over the two benchmark datasets, Wisconsin prognostic breast cancer (WBC) and Pima Indians Diabetes (PID) dataset. For the WBC dataset, the proposed method obtains an overall accuracy of 98.08% perturbed data, and for the PID dataset, the proposed method obtains an overall accuracy of 98.04%.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"70 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80672950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Testcase Recommendation System to Engage Students in Learning: A Practice Study in Fundamental Programming Courses 应用自适应测试案例推荐系统让学生参与学习:程式设计基础课程的实践研究
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.01406118
Tien Vu-Van, Huy Tran, Thanh-Van Le, Hoang-Anh Pham, Nguyen Huynh-Tuong
This paper proposes a testcase recommendation system (TRS) to assist beginner-level learners in introductory programming courses with completing assignments on a learning management system (LMS). These learners often struggle to generate complex testcases and handle numerous code errors, leading to disengaging their attention from the study. The proposed TRS addresses this problem by applying the recommendation system using singular value decomposition (SVD) and the zone of proximal development (ZPD) to provide a small and appropriate set of testcases based on the learner’s ability. We implement this TRS to the university-level Fundamental Programming courses for evaluation. The data analysis has demonstrated that TRS significantly increases student interactions with the system. Keywords—Testcases recommendation system (TRS); learning management system (LMS); zone of proximal development (ZPD); singular value decomposition (SVD)
本文提出了一个测试用例推荐系统(TRS),以帮助初学者在入门编程课程中完成学习管理系统(LMS)上的作业。这些学习者经常努力生成复杂的测试用例并处理大量的代码错误,导致他们从学习中分散注意力。提出的TRS通过使用奇异值分解(SVD)和最近发展区(ZPD)的推荐系统根据学习者的能力提供小而适当的测试用例集来解决这一问题。我们实施这个TRS对大学层次的编程基础课程进行评估。数据分析表明,TRS显著增加了学生与系统的互动。关键词:测试用例推荐系统;学习管理系统(LMS);最近发展区;奇异值分解(SVD)
{"title":"An Adaptive Testcase Recommendation System to Engage Students in Learning: A Practice Study in Fundamental Programming Courses","authors":"Tien Vu-Van, Huy Tran, Thanh-Van Le, Hoang-Anh Pham, Nguyen Huynh-Tuong","doi":"10.14569/ijacsa.2023.01406118","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01406118","url":null,"abstract":"This paper proposes a testcase recommendation system (TRS) to assist beginner-level learners in introductory programming courses with completing assignments on a learning management system (LMS). These learners often struggle to generate complex testcases and handle numerous code errors, leading to disengaging their attention from the study. The proposed TRS addresses this problem by applying the recommendation system using singular value decomposition (SVD) and the zone of proximal development (ZPD) to provide a small and appropriate set of testcases based on the learner’s ability. We implement this TRS to the university-level Fundamental Programming courses for evaluation. The data analysis has demonstrated that TRS significantly increases student interactions with the system. Keywords—Testcases recommendation system (TRS); learning management system (LMS); zone of proximal development (ZPD); singular value decomposition (SVD)","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81032414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Framework for Detecting Network Intrusions Based on Machine Learning Methods 基于机器学习方法的网络入侵检测新框架
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140755
B. Omarov, Nazgul Abdinurova, Zhamshidbek Abdulkhamidov
—In the rapidly evolving landscape of cyber threats, the efficacy of traditional rule-based network intrusion detection systems has become increasingly questionable. This paper introduces a novel framework for identifying network intrusions, leveraging the power of advanced machine learning techniques. The proposed methodology steps away from the rigidity of conventional systems, bringing a flexible, adaptive, and intuitive approach to the forefront of network security. This study employs a diverse blend of machine learning models including but not limited to, Convolutional Neural Networks (CNNs), Support Vector Machines (SVMs), and Random Forests. This research explores an innovative feature extraction and selection technique that enables the model to focus on high-priority potential threats, minimizing noise and improving detection accuracy. The framework's performance has been rigorously evaluated through a series of experiments on benchmark datasets. The results consistently surpass traditional methods, demonstrating a remarkable increase in detection rates and a significant reduction in false positives. Further, the machine learning-based model demonstrated its ability to adapt to new threat landscapes, indicating its suitability in real-world scenarios. By marrying the agility of machine learning with the concreteness of network intrusion detection, this research opens up new avenues for dynamic and resilient cybersecurity. The framework offers an innovative solution that can identify, learn, and adapt to evolving network intrusions, shaping the future of cyber defense strategies.
在快速发展的网络威胁环境中,传统的基于规则的网络入侵检测系统的有效性越来越受到质疑。本文介绍了一个新的框架来识别网络入侵,利用先进的机器学习技术的力量。所提出的方法远离传统系统的刚性,将灵活,自适应和直观的方法带到网络安全的最前沿。本研究采用了多种机器学习模型,包括但不限于卷积神经网络(cnn)、支持向量机(svm)和随机森林。本研究探索了一种创新的特征提取和选择技术,使模型能够专注于高优先级的潜在威胁,最小化噪声并提高检测精度。通过一系列的基准数据集实验,对该框架的性能进行了严格的评估。结果始终优于传统方法,显示出显着提高检出率和显着减少假阳性。此外,基于机器学习的模型证明了其适应新威胁环境的能力,表明其在现实场景中的适用性。通过将机器学习的敏捷性与网络入侵检测的具体性相结合,本研究为动态和弹性网络安全开辟了新的途径。该框架提供了一种创新的解决方案,可以识别、学习和适应不断发展的网络入侵,塑造未来的网络防御战略。
{"title":"A Novel Framework for Detecting Network Intrusions Based on Machine Learning Methods","authors":"B. Omarov, Nazgul Abdinurova, Zhamshidbek Abdulkhamidov","doi":"10.14569/ijacsa.2023.0140755","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140755","url":null,"abstract":"—In the rapidly evolving landscape of cyber threats, the efficacy of traditional rule-based network intrusion detection systems has become increasingly questionable. This paper introduces a novel framework for identifying network intrusions, leveraging the power of advanced machine learning techniques. The proposed methodology steps away from the rigidity of conventional systems, bringing a flexible, adaptive, and intuitive approach to the forefront of network security. This study employs a diverse blend of machine learning models including but not limited to, Convolutional Neural Networks (CNNs), Support Vector Machines (SVMs), and Random Forests. This research explores an innovative feature extraction and selection technique that enables the model to focus on high-priority potential threats, minimizing noise and improving detection accuracy. The framework's performance has been rigorously evaluated through a series of experiments on benchmark datasets. The results consistently surpass traditional methods, demonstrating a remarkable increase in detection rates and a significant reduction in false positives. Further, the machine learning-based model demonstrated its ability to adapt to new threat landscapes, indicating its suitability in real-world scenarios. By marrying the agility of machine learning with the concreteness of network intrusion detection, this research opens up new avenues for dynamic and resilient cybersecurity. The framework offers an innovative solution that can identify, learn, and adapt to evolving network intrusions, shaping the future of cyber defense strategies.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"4 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84894582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iris Recognition Through Edge Detection Methods: Application in Flight Simulator User Identification 基于边缘检测的虹膜识别方法在飞行模拟器用户识别中的应用
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140425
Sundas Khan, Samra Urooj Khan, Onyeka J. Nwobodo, K. Cyran
— To meet the increasing security requirement of authorized users of flight simulators, personal identification is becoming more and more important. Iris recognition stands out as one of the most accurate biometric methods in use today. Iris recognition is done through different edge detection methods. Therefore, it is important to have an understanding of the different edge detection methods that are in use these days. Specifically, the biomedical research shows that irises are as different as fingerprints or the other patterns of the recognition. Furthermore, because the iris is a visible organism, its exterior look can be examined remotely using a machine vision system. The main part of this paper delves into concerns concerning the selection of the best results giving method of the recognition. In this paper, three edge detection methods, namely Canny, Sobel and Prewitt, are applied to the image of eye (iris) and their comparative analysis is discussed. These methods are applied using the Software MATLAB. The datasets used for this purpose are CASIA and MMU. The results indicate that the performance of Canny edge detection method is best as compared to Sobel and Prewitt. Image quality is a key requirement in image-based object recognition. This paper provides the quality evaluation of the images using different metrics like PSNR, SNR, MSE and SSIM. However, SSIM is considered best image quality metric as compared to PSNR, SNR and MSE.
为了满足飞行模拟器授权用户日益增长的安全需求,个人身份识别变得越来越重要。虹膜识别是当今使用的最准确的生物识别方法之一。虹膜识别是通过不同的边缘检测方法完成的。因此,了解目前使用的不同边缘检测方法是很重要的。具体来说,生物医学研究表明,虹膜与指纹或其他识别模式一样不同。此外,由于虹膜是一种可见的有机体,因此可以使用机器视觉系统远程检查其外观。本文的主要部分探讨了最佳结果的选择问题,给出了识别的方法。本文将Canny、Sobel和Prewitt三种边缘检测方法应用于人眼(虹膜)图像,并对其进行对比分析。这些方法在MATLAB软件中得到了应用。用于此目的的数据集是CASIA和MMU。结果表明,Canny边缘检测方法的性能优于Sobel和Prewitt边缘检测方法。在基于图像的目标识别中,图像质量是一个关键的要求。本文采用PSNR、SNR、MSE和SSIM等指标对图像进行质量评价。然而,与PSNR、SNR和MSE相比,SSIM被认为是最好的图像质量度量。Keywords-Identification;身份验证;检测;精明的;索贝尔;普瑞维特;PSNR值;信噪比;SSIM;均方误差
{"title":"Iris Recognition Through Edge Detection Methods: Application in Flight Simulator User Identification","authors":"Sundas Khan, Samra Urooj Khan, Onyeka J. Nwobodo, K. Cyran","doi":"10.14569/ijacsa.2023.0140425","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140425","url":null,"abstract":"— To meet the increasing security requirement of authorized users of flight simulators, personal identification is becoming more and more important. Iris recognition stands out as one of the most accurate biometric methods in use today. Iris recognition is done through different edge detection methods. Therefore, it is important to have an understanding of the different edge detection methods that are in use these days. Specifically, the biomedical research shows that irises are as different as fingerprints or the other patterns of the recognition. Furthermore, because the iris is a visible organism, its exterior look can be examined remotely using a machine vision system. The main part of this paper delves into concerns concerning the selection of the best results giving method of the recognition. In this paper, three edge detection methods, namely Canny, Sobel and Prewitt, are applied to the image of eye (iris) and their comparative analysis is discussed. These methods are applied using the Software MATLAB. The datasets used for this purpose are CASIA and MMU. The results indicate that the performance of Canny edge detection method is best as compared to Sobel and Prewitt. Image quality is a key requirement in image-based object recognition. This paper provides the quality evaluation of the images using different metrics like PSNR, SNR, MSE and SSIM. However, SSIM is considered best image quality metric as compared to PSNR, SNR and MSE.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"54 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83613365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactive Acquisition using Bot on Discord 在Discord上使用Bot进行主动获取
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140533
N. Cahyani, D. Pratama, N. H. A. Rahman
org
org
{"title":"Proactive Acquisition using Bot on Discord","authors":"N. Cahyani, D. Pratama, N. H. A. Rahman","doi":"10.14569/ijacsa.2023.0140533","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140533","url":null,"abstract":"org","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"43 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81828055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Scheduling using Advanced Cat Swarm Optimization Algorithm to Improve Performance in Fog Computing 利用先进的Cat群算法提高雾计算性能的最优调度
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.01407114
Xiaoyan Huo, Xue-ming Wang
—Fog computing can be considered a decentralized computing approach that essentially extends the capabilities offered by cloud computing to the periphery of the network. In addition, due to its proximity to the user, fog computing proves to be highly efficient in minimizing the volume of data that needs to be transmitted, reducing overall network traffic, and shortening the distance that data must travel. But this technology, like other new technologies, has challenges, and scheduling and optimal allocation of resources is one of the most important of these challenges. Accordingly, this research aims to propose an optimal solution for efficient scheduling within the fog computing environment through the application of the advanced cat swarm optimization algorithm. In this solution, the two main behaviors of cats are implemented in the form of seek and tracking states. Accordingly, processing nodes are periodically examined and categorized based on the number of available resources; servers with highly available resources are prioritized in the scheduling process for efficient scheduling. Subsequently, the congested servers, which may be experiencing various issues, are migrated to alternative servers with ample resources using the virtual machine live migration technique. Ultimately, the effectiveness of the proposed solution is assessed using the iFogSim simulator, demonstrating notable reductions in execution time and energy consumption. So, the proposed solution has led to a 20% reduction in execution time while also improving energy efficiency by more than 15% on average. This optimization represents a trade-off between improving performance and reducing resource consumption.
雾计算可以被认为是一种分散的计算方法,它本质上是将云计算提供的功能扩展到网络的外围。此外,由于雾计算离用户很近,因此在最小化需要传输的数据量、减少整体网络流量和缩短数据必须传输的距离方面被证明是非常高效的。但是,与其他新技术一样,这种技术也存在挑战,而资源的调度和最佳分配是这些挑战中最重要的挑战之一。因此,本研究旨在通过应用先进的猫群优化算法,提出雾计算环境下高效调度的最优解。在此解决方案中,猫的两种主要行为以寻求和跟踪状态的形式实现。相应地,根据可用资源的数量对处理节点进行定期检查和分类;具有高可用性资源的服务器在调度过程中具有优先级,以实现高效调度。随后,使用虚拟机实时迁移技术将可能遇到各种问题的拥塞服务器迁移到具有充足资源的备选服务器。最后,使用iFogSim模拟器评估了所提出的解决方案的有效性,证明了执行时间和能耗的显着减少。因此,提出的解决方案使执行时间减少了20%,同时平均提高了15%以上的能源效率。这种优化代表了提高性能和减少资源消耗之间的权衡。
{"title":"Optimal Scheduling using Advanced Cat Swarm Optimization Algorithm to Improve Performance in Fog Computing","authors":"Xiaoyan Huo, Xue-ming Wang","doi":"10.14569/ijacsa.2023.01407114","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.01407114","url":null,"abstract":"—Fog computing can be considered a decentralized computing approach that essentially extends the capabilities offered by cloud computing to the periphery of the network. In addition, due to its proximity to the user, fog computing proves to be highly efficient in minimizing the volume of data that needs to be transmitted, reducing overall network traffic, and shortening the distance that data must travel. But this technology, like other new technologies, has challenges, and scheduling and optimal allocation of resources is one of the most important of these challenges. Accordingly, this research aims to propose an optimal solution for efficient scheduling within the fog computing environment through the application of the advanced cat swarm optimization algorithm. In this solution, the two main behaviors of cats are implemented in the form of seek and tracking states. Accordingly, processing nodes are periodically examined and categorized based on the number of available resources; servers with highly available resources are prioritized in the scheduling process for efficient scheduling. Subsequently, the congested servers, which may be experiencing various issues, are migrated to alternative servers with ample resources using the virtual machine live migration technique. Ultimately, the effectiveness of the proposed solution is assessed using the iFogSim simulator, demonstrating notable reductions in execution time and energy consumption. So, the proposed solution has led to a 20% reduction in execution time while also improving energy efficiency by more than 15% on average. This optimization represents a trade-off between improving performance and reducing resource consumption.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"17 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85316991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Enabled Hall-Effect IoT-System for Monitoring Building Vibrations 用于监测建筑物振动的机器学习霍尔效应物联网系统
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140205
E. Lattanzi, Paolo Capellacci, Valerio Freschi
—Vibration monitoring of civil infrastructures is a fundamental task to assess their structural health, which can be nowadays carried on at reduced costs thanks to new sensing devices and embedded hardware platforms. In this work, we present a system for monitoring vibrations in buildings based on a novel, cheap, Hall-effect vibration sensor that is interfaced with a commercially available embedded hardware platform, in order to support communication toward cloud based services by means of IoT communication protocols. Two deep learning neural networks have been implemented and tested to demonstrate the capability of performing nontrivial prediction tasks directly on board of the embedded platform, an important feature to conceive dynamical policies for deciding whether to perform a recognition task on the final (resource constrained) device, or delegate it to the cloud according to specific energy, latency, accuracy requirements. Experimental evaluation on two use cases, namely the detection of a seismic event and the count of steps made by people transiting in a public building highlight the potential of the adopted solution; for instance, recognition of walking-induced vibrations can be achieved with an accuracy of 96% in real-time within time windows of 500ms. Overall, the results of the empirical investigation show the flexibility of the proposed solution as a promising alternative for the design of vibration monitoring systems in built environments.
-民用基础设施的振动监测是评估其结构健康的一项基本任务,由于新的传感设备和嵌入式硬件平台,现在可以以较低的成本进行。在这项工作中,我们提出了一个用于监测建筑物振动的系统,该系统基于一种新型、廉价的霍尔效应振动传感器,该传感器与商业上可用的嵌入式硬件平台接口,以便通过物联网通信协议支持对基于云服务的通信。已经实现并测试了两个深度学习神经网络,以证明直接在嵌入式平台上执行重要预测任务的能力,这是一个重要的特征,可以构思动态策略,以决定是否在最终(资源受限)设备上执行识别任务,或者根据特定的能量、延迟、准确性要求将其委托给云。对两个用例的实验评估,即地震事件检测和公共建筑中行人的步数计数,突出了所采用解决方案的潜力;例如,在500毫秒的时间窗口内,对步行引起的振动的实时识别精度可以达到96%。总体而言,实证调查的结果表明,所提出的解决方案的灵活性,作为一个有希望的替代方案,在建筑环境中的振动监测系统的设计。
{"title":"A Machine Learning Enabled Hall-Effect IoT-System for Monitoring Building Vibrations","authors":"E. Lattanzi, Paolo Capellacci, Valerio Freschi","doi":"10.14569/ijacsa.2023.0140205","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140205","url":null,"abstract":"—Vibration monitoring of civil infrastructures is a fundamental task to assess their structural health, which can be nowadays carried on at reduced costs thanks to new sensing devices and embedded hardware platforms. In this work, we present a system for monitoring vibrations in buildings based on a novel, cheap, Hall-effect vibration sensor that is interfaced with a commercially available embedded hardware platform, in order to support communication toward cloud based services by means of IoT communication protocols. Two deep learning neural networks have been implemented and tested to demonstrate the capability of performing nontrivial prediction tasks directly on board of the embedded platform, an important feature to conceive dynamical policies for deciding whether to perform a recognition task on the final (resource constrained) device, or delegate it to the cloud according to specific energy, latency, accuracy requirements. Experimental evaluation on two use cases, namely the detection of a seismic event and the count of steps made by people transiting in a public building highlight the potential of the adopted solution; for instance, recognition of walking-induced vibrations can be achieved with an accuracy of 96% in real-time within time windows of 500ms. Overall, the results of the empirical investigation show the flexibility of the proposed solution as a promising alternative for the design of vibration monitoring systems in built environments.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"12 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85378288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Big Data and AI in Mobile Shopping: A Study in the Context of Jordan 在移动购物中利用大数据和人工智能:以约旦为例的研究
IF 0.9 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-01 DOI: 10.14569/ijacsa.2023.0140725
Maher Abuhamdeh, O. Qtaish, Hasan Kanaker, Ahmad Alshanty, Nidal Yousef, A. Alali
—This study investigates the current state of mobile shopping in Jordan and the integration of big data and AI technologies in this context. A mixed-methods approach, combining qualitative and quantitative data collection techniques, utilized to gather comprehensive insights. The survey questionnaire distributed to 105 individuals engaged in mobile shopping in Jordan. The findings highlight the popularity of mobile shopping and the preference for mobile apps as the primary platform. Personalized product recommendations emerged as a crucial factor in enhancing the mobile shopping experience. Privacy concerns regarding data sharing were present among respondents. Trust in AI-powered virtual assistants varied, indicating the potential for leveraging AI technologies. Respondents recognized the potential of big data and AI in improving the mobile shopping experience. The study concludes that businesses can enhance mobile shopping by utilizing AI-powered virtual assistants and prioritizing data security. The findings contribute to understanding mobile shopping dynamics and provide guidance for businesses and policymakers in optimizing mobile shopping experiences and driving economic growth in Jordan's digital economy. Future research and implementation efforts are encouraged to harness the potential of big data and AI in the mobile shopping landscape.
-本研究调查了约旦移动购物的现状,以及在此背景下大数据和人工智能技术的整合。一种混合方法的方法,结合定性和定量数据收集技术,用于收集全面的见解。调查问卷分发给105名在约旦从事移动购物的个人。调查结果强调了移动购物的流行,以及人们对移动应用程序作为主要平台的偏好。个性化的产品推荐成为提升移动购物体验的关键因素。受访者对数据共享的隐私问题表示担忧。人们对人工智能虚拟助手的信任度各不相同,这表明了利用人工智能技术的潜力。受访者认识到大数据和人工智能在改善移动购物体验方面的潜力。该研究的结论是,企业可以通过利用人工智能驱动的虚拟助手和优先考虑数据安全来增强移动购物。研究结果有助于了解移动购物动态,并为企业和政策制定者优化移动购物体验和推动约旦数字经济的经济增长提供指导。鼓励未来的研究和实施工作,以利用大数据和人工智能在移动购物领域的潜力。
{"title":"Leveraging Big Data and AI in Mobile Shopping: A Study in the Context of Jordan","authors":"Maher Abuhamdeh, O. Qtaish, Hasan Kanaker, Ahmad Alshanty, Nidal Yousef, A. Alali","doi":"10.14569/ijacsa.2023.0140725","DOIUrl":"https://doi.org/10.14569/ijacsa.2023.0140725","url":null,"abstract":"—This study investigates the current state of mobile shopping in Jordan and the integration of big data and AI technologies in this context. A mixed-methods approach, combining qualitative and quantitative data collection techniques, utilized to gather comprehensive insights. The survey questionnaire distributed to 105 individuals engaged in mobile shopping in Jordan. The findings highlight the popularity of mobile shopping and the preference for mobile apps as the primary platform. Personalized product recommendations emerged as a crucial factor in enhancing the mobile shopping experience. Privacy concerns regarding data sharing were present among respondents. Trust in AI-powered virtual assistants varied, indicating the potential for leveraging AI technologies. Respondents recognized the potential of big data and AI in improving the mobile shopping experience. The study concludes that businesses can enhance mobile shopping by utilizing AI-powered virtual assistants and prioritizing data security. The findings contribute to understanding mobile shopping dynamics and provide guidance for businesses and policymakers in optimizing mobile shopping experiences and driving economic growth in Jordan's digital economy. Future research and implementation efforts are encouraged to harness the potential of big data and AI in the mobile shopping landscape.","PeriodicalId":13824,"journal":{"name":"International Journal of Advanced Computer Science and Applications","volume":"47 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83134844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Advanced Computer Science and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1