首页 > 最新文献

J. Chem. Inf. Comput. Sci.最新文献

英文 中文
A Proposition of Modifications and Extensions of Cloud Computing Standards for Trust Characteristics Measures 基于信任特征度量的云计算标准的修改与扩展
Pub Date : 2019-07-25 DOI: 10.5539/cis.v12n3p27
S. Eftekhar, W. Suryn
In recent years, we have witnessed a marked rise in the number of cloud service providers with each offering a plethora of cloud services with different objectives. Gaining confidence for cloud technology adoption as well as selecting a suitable cloud service provider, both require a proper evaluation of cloud service trust characteristics. Hence, the evaluation of cloud services before used by the customer is of utmost importance. In this article, we adapt the extracted trust characteristics from both system and software quality standards and cloud computing standards, for evaluating cloud services. Moreover, we derive measures for each trust characteristics to evaluate the trustworthiness of different cloud service providers, and generalize these trust measures for any type of cloud services (e.g. Software as a Service, Platform as a Service, and Infrastructure as a Service). Our work thereby demonstrates a way to apply generalized trust measures for cloud services and therefore contributes to a better understanding of cloud services to evaluate their quality characteristics. As part of our ongoing research, the results of this study will be used to develop a comprehensive cloud trust model.
近年来,我们目睹了云服务提供商数量的显著增加,每个云服务提供商都提供了大量的云服务,目的不同。获得采用云技术的信心以及选择合适的云服务提供商,都需要对云服务信任特征进行适当的评估。因此,在客户使用云服务之前对其进行评估是至关重要的。在本文中,我们将从系统和软件质量标准以及云计算标准中提取的信任特征用于评估云服务。此外,我们推导了每个信任特征的度量来评估不同云服务提供商的可信度,并将这些信任度量推广到任何类型的云服务(例如软件即服务、平台即服务和基础设施即服务)。因此,我们的工作展示了一种对云服务应用广义信任度量的方法,从而有助于更好地理解云服务以评估其质量特征。作为我们正在进行的研究的一部分,本研究的结果将用于开发一个全面的云信任模型。
{"title":"A Proposition of Modifications and Extensions of Cloud Computing Standards for Trust Characteristics Measures","authors":"S. Eftekhar, W. Suryn","doi":"10.5539/cis.v12n3p27","DOIUrl":"https://doi.org/10.5539/cis.v12n3p27","url":null,"abstract":"In recent years, we have witnessed a marked rise in the number of cloud service providers with each offering a plethora of cloud services with different objectives. Gaining confidence for cloud technology adoption as well as selecting a suitable cloud service provider, both require a proper evaluation of cloud service trust characteristics. Hence, the evaluation of cloud services before used by the customer is of utmost importance. In this article, we adapt the extracted trust characteristics from both system and software quality standards and cloud computing standards, for evaluating cloud services. Moreover, we derive measures for each trust characteristics to evaluate the trustworthiness of different cloud service providers, and generalize these trust measures for any type of cloud services (e.g. Software as a Service, Platform as a Service, and Infrastructure as a Service). Our work thereby demonstrates a way to apply generalized trust measures for cloud services and therefore contributes to a better understanding of cloud services to evaluate their quality characteristics. As part of our ongoing research, the results of this study will be used to develop a comprehensive cloud trust model.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"132 31","pages":"27-41"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91433095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IT Professionals' Personality, Personal Characteristics, and Commitment: Evidence from a National Survey IT专业人员的个性、个人特征与承诺:来自全国调查的证据
Pub Date : 2019-07-25 DOI: 10.5539/cis.v12n3p58
J. Syed, Ruth M. Tappin
Drawing on personality traits theory (Costa & McCrae, 1985) and organizational commitment theory (Mowday, Steers & Porter, 1979), the purpose of the present study was to investigate, through four separate hierarchical regression procedures, the effect of a set of independent variables (neuroticism, gender, and generational age) on four separate dependent variables (DV): overall organizational commitment (OC), affective commitment (AC), continuance commitment (CC), and normative commitment (NC). The sample consisted of responses from 279 IT professionals in the United States, drawn from a national sample from the merged cross-sectional GSS 1972-2014 Cross-Sectional Cumulative Data, Release 5, March 24, 2016. Results of multiple regressions analyses revealed that, among IT professionals, neuroticism did not predict overall OC, AC, CC, or NC. Generational age predicted OC, AC, and CC with statistical significance. Gender predicted CC; none of the independent variables (IVs) predicted NC. Directions for future research are offered.
本研究以人格特质理论(Costa & mcrae, 1985)和组织承诺理论(Mowday, Steers & Porter, 1979)为基础,通过四个独立的层次回归程序,探讨了神经质、性别和代际年龄等自变量对整体组织承诺、情感承诺、持续承诺和规范性承诺四个独立因变量的影响。样本包括279名美国IT专业人士的回答,这些回答来自于合并的GSS 1972-2014横截面累积数据的全国样本,发布于2016年3月24日。多元回归分析结果显示,在IT专业人员中,神经质并不能预测总体的OC、AC、CC或NC。代际年龄预测OC、AC、CC有统计学意义。性别预测CC;自变量(IVs)均未预测NC。提出了今后的研究方向。
{"title":"IT Professionals' Personality, Personal Characteristics, and Commitment: Evidence from a National Survey","authors":"J. Syed, Ruth M. Tappin","doi":"10.5539/cis.v12n3p58","DOIUrl":"https://doi.org/10.5539/cis.v12n3p58","url":null,"abstract":"Drawing on personality traits theory (Costa & McCrae, 1985) and organizational commitment theory (Mowday, Steers & Porter, 1979), the purpose of the present study was to investigate, through four separate hierarchical regression procedures, the effect of a set of independent variables (neuroticism, gender, and generational age) on four separate dependent variables (DV): overall organizational commitment (OC), affective commitment (AC), continuance commitment (CC), and normative commitment (NC). The sample consisted of responses from 279 IT professionals in the United States, drawn from a national sample from the merged cross-sectional GSS 1972-2014 Cross-Sectional Cumulative Data, Release 5, March 24, 2016. Results of multiple regressions analyses revealed that, among IT professionals, neuroticism did not predict overall OC, AC, CC, or NC. Generational age predicted OC, AC, and CC with statistical significance. Gender predicted CC; none of the independent variables (IVs) predicted NC. Directions for future research are offered.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"40 1","pages":"58-71"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87179791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis and Design of a Project Portfolio Management System 项目组合管理系统的分析与设计
Pub Date : 2019-07-25 DOI: 10.5539/cis.v12n3p42
Driss El Hannach, R. Marghoubi, Z. E. Akkaoui, Mohamed Dahchour
The paramount importance of project portfolios for business drives managers to search for highly efficient support tools to overcome complex challenges of their management. A major tradeoff is to acquire tools able to produce a convenient portfolio project prioritization process, on which business investments are decided. However, by using existing Project Portfolio Management Systems (PPMS), many concurrent projects in a portfolio are usually prioritized and planned in the upstream life-cycle phases according to financial criteria, and overlooking the portfolio alignment to enterprise strategies and the availability of resources, although their importance. In this paper, we propose a conceptual formalization of PPMS with respect to a double portfolio prioritization process that performs two levels of selections according to both: i.) Strategy alignment, including returns on investment, size, and total cost; and ii.) Execution capability, as the organization should be able to manage and deliver the selected projects' outcomes. The advantage of our PPMS framework is twofold. First, it is useful to be customized by designers to fit organization needs. Second it is built with respect to the double prioritization phase process, as an end-to-end process that guarantees optimal portfolios generation. Further, the proposed PPMS system and its identified functionalities are validated through an implementation of a prototype tool.
项目投资组合对企业的重要性驱使管理者寻找高效的支持工具来克服他们管理的复杂挑战。一个主要的权衡是获得能够产生一个方便的投资组合项目优先排序过程的工具,在这个过程上决定商业投资。然而,通过使用现有的项目投资组合管理系统(PPMS),投资组合中的许多并发项目通常在上游生命周期阶段根据财务标准进行优先级排序和计划,并且忽略了投资组合与企业战略和资源可用性的一致性,尽管它们很重要。在本文中,我们提出了一个关于双重投资组合优先排序过程的PPMS的概念形式化,该过程根据两者执行两个级别的选择:战略一致性,包括投资回报、规模和总成本;和ii)。执行能力,因为组织应该能够管理和交付所选项目的结果。我们的PPMS框架的优势是双重的。首先,由设计人员定制以适应组织需要是很有用的。其次,它是根据双重优先级阶段过程构建的,作为保证最佳投资组合生成的端到端过程。此外,通过原型工具的实现验证了所提出的PPMS系统及其确定的功能。
{"title":"Analysis and Design of a Project Portfolio Management System","authors":"Driss El Hannach, R. Marghoubi, Z. E. Akkaoui, Mohamed Dahchour","doi":"10.5539/cis.v12n3p42","DOIUrl":"https://doi.org/10.5539/cis.v12n3p42","url":null,"abstract":"The paramount importance of project portfolios for business drives managers to search for highly efficient support tools to overcome complex challenges of their management. A major tradeoff is to acquire tools able to produce a convenient portfolio project prioritization process, on which business investments are decided. However, by using existing Project Portfolio Management Systems (PPMS), many concurrent projects in a portfolio are usually prioritized and planned in the upstream life-cycle phases according to financial criteria, and overlooking the portfolio alignment to enterprise strategies and the availability of resources, although their importance. In this paper, we propose a conceptual formalization of PPMS with respect to a double portfolio prioritization process that performs two levels of selections according to both: i.) Strategy alignment, including returns on investment, size, and total cost; and ii.) Execution capability, as the organization should be able to manage and deliver the selected projects' outcomes. The advantage of our PPMS framework is twofold. First, it is useful to be customized by designers to fit organization needs. Second it is built with respect to the double prioritization phase process, as an end-to-end process that guarantees optimal portfolios generation. Further, the proposed PPMS system and its identified functionalities are validated through an implementation of a prototype tool.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"25 1","pages":"42-57"},"PeriodicalIF":0.0,"publicationDate":"2019-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87658512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Information Systems Risk Management: Litterature Review 信息系统风险管理:文献综述
Pub Date : 2019-06-17 DOI: 10.5539/CIS.V12N3P1
Soumaya Amraoui, Mina Elmaallam, Hicham Bensaid, A. Kriouile
The security of a company's information system (IS) is an important requirement for the pursuit of its business. Risk management contributes to the protection of the IS assets. It saves the organism from the losses caused by the emergence of unwanted events having an incidence on the IS objectives and consequently on its strategy. It has also an important role in the decision making about entering new opportunities. In addition, it promises an optimal allocation of information system resources. The risk management process aims to analyze what can happen and what are the eventual consequences for the organization before deciding what needs to be done and reducing the risks to an acceptable level. This paper presents a literature review of IS risk management and gives a comparative analyse of its processes, methods and standards.
企业信息系统的安全性是企业开展业务的重要要求。风险管理有助于保护信息系统资产。它使有机体免于因不希望的事件的出现而造成的损失,这些事件对IS的目标产生了影响,从而影响了它的战略。它在进入新机会的决策中也起着重要作用。此外,它还保证了信息系统资源的最优配置。风险管理过程的目的是在决定需要做什么并将风险降低到可接受的水平之前,分析可能发生的情况以及对组织的最终后果。本文介绍了信息系统风险管理的文献综述,并对其过程、方法和标准进行了比较分析。
{"title":"Information Systems Risk Management: Litterature Review","authors":"Soumaya Amraoui, Mina Elmaallam, Hicham Bensaid, A. Kriouile","doi":"10.5539/CIS.V12N3P1","DOIUrl":"https://doi.org/10.5539/CIS.V12N3P1","url":null,"abstract":"The security of a company's information system (IS) is an important requirement for the pursuit of its business. Risk management contributes to the protection of the IS assets. It saves the organism from the losses caused by the emergence of unwanted events having an incidence on the IS objectives and consequently on its strategy. It has also an important role in the decision making about entering new opportunities. In addition, it promises an optimal allocation of information system resources. The risk management process aims to analyze what can happen and what are the eventual consequences for the organization before deciding what needs to be done and reducing the risks to an acceptable level. This paper presents a literature review of IS risk management and gives a comparative analyse of its processes, methods and standards.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"72 1","pages":"1-20"},"PeriodicalIF":0.0,"publicationDate":"2019-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90896803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network 基于轮廓匹配和神经网络的阿拉伯手写字符识别
Pub Date : 2019-04-30 DOI: 10.5539/CIS.V12N2P126
Marwan Abo Zanona, A. Abuhamdah, B. El-Zaghmouri
Complexity of Arabic writing language makes its handwritten recognition very complex in terms of computer algorithms. The Arabic handwritten recognition has high importance in modern applications. The contour analysis of word image can extract special contour features that discriminate one character from another by the mean of vector features. This paper implements a set of pre-processing functions over a handwritten Arabic characters, with contour analysis, to enter the contour vector to neural network to recognize it. The selection of this set of pre-processing algorithms was completed after hundreds of tests and validation. The feed forward neural network architecture was trained using many patterns regardless of the Arabic font style building a rigid recognition model. Because of the shortcomings in Arabic written databases or datasets, the testing was done by non-standard data set. The presented algorithm structure got recognition ratio about 97%.
阿拉伯文字的复杂性使其手写识别在计算机算法方面非常复杂。阿拉伯语手写识别在现代应用中具有重要的意义。字图像的轮廓分析是通过向量特征的均值提取出区分字符的特殊轮廓特征。本文实现了一套针对手写阿拉伯文字符的预处理函数,通过轮廓分析,将轮廓向量输入到神经网络中进行识别。这套预处理算法的选择是经过数百次测试和验证后完成的。该前馈神经网络体系结构采用多种模式进行训练,而不考虑阿拉伯文字体风格,建立了严格的识别模型。由于阿拉伯文文字数据库或数据集的不足,采用非标准数据集进行测试。该算法结构的识别率约为97%。
{"title":"Arabic Hand Written Character Recognition Based on Contour Matching and Neural Network","authors":"Marwan Abo Zanona, A. Abuhamdah, B. El-Zaghmouri","doi":"10.5539/CIS.V12N2P126","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P126","url":null,"abstract":"Complexity of Arabic writing language makes its handwritten recognition very complex in terms of computer algorithms. The Arabic handwritten recognition has high importance in modern applications. The contour analysis of word image can extract special contour features that discriminate one character from another by the mean of vector features. This paper implements a set of pre-processing functions over a handwritten Arabic characters, with contour analysis, to enter the contour vector to neural network to recognize it. The selection of this set of pre-processing algorithms was completed after hundreds of tests and validation. The feed forward neural network architecture was trained using many patterns regardless of the Arabic font style building a rigid recognition model. Because of the shortcomings in Arabic written databases or datasets, the testing was done by non-standard data set. The presented algorithm structure got recognition ratio about 97%.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"18 1","pages":"126-137"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74113356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Image Processing & Neural Network Based Breast Cancer Detection 基于图像处理和神经网络的乳腺癌检测
Pub Date : 2019-04-30 DOI: 10.5539/CIS.V12N2P146
Marwan Abo Zanona
A large percentage of cancer patients are breast cancer patients. The main available methodology to examine the breast cancer is the Mammography. It detects the signs of breast cancer as different signs supports the experts’ decision. Actually, the Mammography is based on human perception and observations. So, build an AI computerized system will take major role in early signs detection. This paper presents an image processing with aid of artificial neural networks computations for computerized signs detection and exploration of breast cancer. The input material is the mammogram images, and the output helps the pathologists to take a decision. A set of input mammogram images was used for development, testing, and evaluation. The mammographic image will be preprocessed and then the features will be extracted using discrete wavelet transformation with aid of Weiner filtration. A historical data of extracted features were used to train a neural network, while the historical extracted features contains both Cancer and non-Cancer images. The combination of neural network machine learning, and rigid image processing techniques resulted accurate outputs. The methodology and results are showed and discussed later in this paper.
很大一部分癌症患者是乳腺癌患者。检查乳腺癌的主要方法是乳房x光检查。它检测乳腺癌的迹象,因为不同的迹象支持专家的决定。实际上,乳房x光检查是基于人类的感知和观察。因此,建立一个人工智能计算机系统将在早期症状检测中发挥重要作用。本文提出了一种基于人工神经网络计算的图像处理方法,用于乳腺癌的计算机体征检测和探查。输入材料是乳房x光片图像,输出帮助病理学家做出决定。一组输入的乳房x线照片用于开发、测试和评估。对乳房x线图像进行预处理,然后利用离散小波变换结合维纳滤波提取特征。提取的历史特征数据用于训练神经网络,而历史提取的特征同时包含癌症和非癌症图像。神经网络机器学习和严格的图像处理技术的结合产生了准确的输出。本文稍后将展示和讨论方法和结果。
{"title":"Image Processing & Neural Network Based Breast Cancer Detection","authors":"Marwan Abo Zanona","doi":"10.5539/CIS.V12N2P146","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P146","url":null,"abstract":"A large percentage of cancer patients are breast cancer patients. The main available methodology to examine the breast cancer is the Mammography. It detects the signs of breast cancer as different signs supports the experts’ decision. Actually, the Mammography is based on human perception and observations. So, build an AI computerized system will take major role in early signs detection. This paper presents an image processing with aid of artificial neural networks computations for computerized signs detection and exploration of breast cancer. The input material is the mammogram images, and the output helps the pathologists to take a decision. A set of input mammogram images was used for development, testing, and evaluation. The mammographic image will be preprocessed and then the features will be extracted using discrete wavelet transformation with aid of Weiner filtration. A historical data of extracted features were used to train a neural network, while the historical extracted features contains both Cancer and non-Cancer images. The combination of neural network machine learning, and rigid image processing techniques resulted accurate outputs. The methodology and results are showed and discussed later in this paper.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"8 1","pages":"146-"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90323121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Efficient Tracing in Software Product Lines: Research Methodology 面向软件产品线的高效跟踪:研究方法
Pub Date : 2019-04-30 DOI: 10.5539/CIS.V12N2P138
Zineb Mcharfi, B. E. Asri
Software Product Lines represent a solution for massive development with minimum costs, while assuring product high quality and interesting time to market. In fact, Software Product Lines systems are used for massive productions, and are based on systematic reuse of commun components, while offering the ability to add specific development, in order to satisfy particular users or market needs. However, to maintain such complex and large-scale systems, it is mandatory to adopt a suitable tracing policy that satisfies the system constraints, especially cost and complexity. Unfortunately, tracing is rearly applied in Software Product Lines as it presents several constraints, especially its cost. Through our research work, we tried to come up with elements that would help break this prejudice. Therefore, we worked on a cost and Return on Investment estimation model that helps identify the optimal conditions (phase and policy) for implementing a tracing solution. As a result of our work, we found that implementing specific trace links, in a targeted approach that meets business goals, and starting from the Domain Engineering phase, costs less and presents the most interesting Return on Investment. To conduct this study and reach those findings, we followed the Design Science Research Methodology. In this article, we detail the steps of our research according to this methodology’s phases.
软件产品线代表了以最低成本进行大规模开发的解决方案,同时保证了产品的高质量和有趣的上市时间。事实上,软件产品线系统用于大规模生产,并且基于公共组件的系统重用,同时提供添加特定开发的能力,以满足特定用户或市场需求。然而,为了维护如此复杂和大规模的系统,必须采用合适的跟踪策略,以满足系统约束,特别是成本和复杂性。不幸的是,跟踪在软件产品线中很少应用,因为它提出了一些限制,特别是它的成本。通过我们的研究工作,我们试图找出有助于打破这种偏见的因素。因此,我们致力于成本和投资回报评估模型,该模型有助于确定实现跟踪解决方案的最佳条件(阶段和策略)。作为我们工作的结果,我们发现在满足业务目标的目标方法中实现特定的跟踪链接,并从领域工程阶段开始,成本更低,并且呈现出最有趣的投资回报。为了进行这项研究并得出这些发现,我们遵循了设计科学研究方法论。在本文中,我们根据该方法的阶段详细介绍了我们的研究步骤。
{"title":"Towards Efficient Tracing in Software Product Lines: Research Methodology","authors":"Zineb Mcharfi, B. E. Asri","doi":"10.5539/CIS.V12N2P138","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P138","url":null,"abstract":"Software Product Lines represent a solution for massive development with minimum costs, while assuring product high quality and interesting time to market. In fact, Software Product Lines systems are used for massive productions, and are based on systematic reuse of commun components, while offering the ability to add specific development, in order to satisfy particular users or market needs. However, to maintain such complex and large-scale systems, it is mandatory to adopt a suitable tracing policy that satisfies the system constraints, especially cost and complexity. Unfortunately, tracing is rearly applied in Software Product Lines as it presents several constraints, especially its cost. Through our research work, we tried to come up with elements that would help break this prejudice. Therefore, we worked on a cost and Return on Investment estimation model that helps identify the optimal conditions (phase and policy) for implementing a tracing solution. As a result of our work, we found that implementing specific trace links, in a targeted approach that meets business goals, and starting from the Domain Engineering phase, costs less and presents the most interesting Return on Investment. To conduct this study and reach those findings, we followed the Design Science Research Methodology. In this article, we detail the steps of our research according to this methodology’s phases.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"173 1","pages":"138-145"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79580721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unsupervised Characterization and Visualization of Students' Academic Performance Features 学生学业表现特征的无监督表征与可视化
Pub Date : 2019-04-30 DOI: 10.5539/CIS.V12N2P103
Udoinyang Godwin Inyang, U. Umoh, Ifeoma Nnaemeka, Samuel A. Robinson
The large nature of students’ dataset has made it difficult to find patterns associated with students’ academic performance (AP) using conventional methods. This has increased the rate of drop-outs, graduands with weak class of degree (CoD) and students that spend more than the minimum stipulated duration of studies. It is necessary to determine students’ AP using educational data mining (EDM) tools in order to know students who are likely to perform poorly at an early stage of their studies. This paper explores k-means and self-organizing map (SOM) in mining pieces of knowledge relating to the natural number of clusters in students’ dataset and the association of the input features using selected demographic, pre-admission and first year performance. Matlab 2015a was the programming environment and the dataset consists of nine sets of computer science graduands. Cluster validity assessment with k-means discovered four (4) clusters with correlation metric yielding the highest mean silhouette value of 0.5912.  SOM provided an hexagonal grid visual of feature component planes and scatter plots of each significant input attribute. The result shows that the significant attributes were highly correlated with each other except entry mode (EM), indicating that the impact of EM on CoD varies with students irrespective of mode of admission. Also, four distinct clusters were also discovered in the dataset by SOM —7.7% belonging to cluster 1 (first class), and 25% for cluster 2 (2nd class Upper) while Clusters 3 and 4 had 35% proportion each. This validates the results of k-means and further confirms the importance of early detection of students’ AP and confirms the effectiveness of SOM as a cluster validity tool. As further work, the labels from SOM will be associated with records in the dataset for association rule mining, supervised learning and prediction of students’ AP.
学生数据集的庞大性质使得使用传统方法很难找到与学生学习成绩(AP)相关的模式。这增加了辍学率、学位等级较低的毕业生以及学习时间超过规定最低期限的学生的比例。有必要使用教育数据挖掘(EDM)工具来确定学生的AP,以便了解哪些学生可能在学习的早期阶段表现不佳。本文探讨了k-means和自组织地图(SOM)在挖掘与学生数据集中聚类自然数相关的知识片段以及使用选定的人口统计、入学前和第一年表现的输入特征的关联方面的应用。以Matlab 2015a为编程环境,数据集由9组计算机科学专业毕业生组成。用k-means进行聚类效度评估,发现了4个聚类,相关度量的平均剪影值最高,为0.5912。SOM提供了特征分量平面的六角形网格视觉和每个重要输入属性的散点图。结果表明,除入学方式外,其他显著性属性均呈高度相关,表明入学方式对CoD的影响在不同录取方式的学生中存在差异。此外,SOM还在数据集中发现了4个不同的集群,其中7.7%属于集群1(第一类),25%属于集群2(第二类上层),而集群3和4各占35%的比例。这验证了k-means的结果,进一步证实了早期发现学生AP的重要性,并证实了SOM作为聚类效度工具的有效性。作为进一步的工作,SOM的标签将与数据集中的记录相关联,用于关联规则挖掘、监督学习和学生AP预测。
{"title":"Unsupervised Characterization and Visualization of Students' Academic Performance Features","authors":"Udoinyang Godwin Inyang, U. Umoh, Ifeoma Nnaemeka, Samuel A. Robinson","doi":"10.5539/CIS.V12N2P103","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P103","url":null,"abstract":"The large nature of students’ dataset has made it difficult to find patterns associated with students’ academic performance (AP) using conventional methods. This has increased the rate of drop-outs, graduands with weak class of degree (CoD) and students that spend more than the minimum stipulated duration of studies. It is necessary to determine students’ AP using educational data mining (EDM) tools in order to know students who are likely to perform poorly at an early stage of their studies. This paper explores k-means and self-organizing map (SOM) in mining pieces of knowledge relating to the natural number of clusters in students’ dataset and the association of the input features using selected demographic, pre-admission and first year performance. Matlab 2015a was the programming environment and the dataset consists of nine sets of computer science graduands. Cluster validity assessment with k-means discovered four (4) clusters with correlation metric yielding the highest mean silhouette value of 0.5912.  SOM provided an hexagonal grid visual of feature component planes and scatter plots of each significant input attribute. The result shows that the significant attributes were highly correlated with each other except entry mode (EM), indicating that the impact of EM on CoD varies with students irrespective of mode of admission. Also, four distinct clusters were also discovered in the dataset by SOM —7.7% belonging to cluster 1 (first class), and 25% for cluster 2 (2nd class Upper) while Clusters 3 and 4 had 35% proportion each. This validates the results of k-means and further confirms the importance of early detection of students’ AP and confirms the effectiveness of SOM as a cluster validity tool. As further work, the labels from SOM will be associated with records in the dataset for association rule mining, supervised learning and prediction of students’ AP.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"98 1","pages":"103-116"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77343156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions 通过不同的技术、政策和行动来保护组织中的信息系统
Pub Date : 2019-04-30 DOI: 10.5539/CIS.V12N2P117
H. Alkahtani
Background: Information system use has substantially increased among the organization based on its effective integration of the resources and improved performance. The increasing reliance on the information system serves as a great security threat for the firms. Objective: The study intends to evaluate the security of the information system in the organization located in the region of Saudi Arabia, concerning the user’s awareness level. Methods: The quantitative design of the study is adopted which uses the survey approach. A close-ended questionnaire is used for evaluating the awareness level among the individuals. A total of 109 participants (males and females) in the Saudi Company were recruited for the study. Results: Despite the implementation of the policy, employees were unaware of it. The study highlights that the development of the firm’s information security policy requires the firm to make employees aware of the significance of the information security. Conclusion: The study concludes that the organization needs to educate the workforce of the information security policy and develop their necessary understanding of the information security system. This allows the employees to identify and report security threats and risks which helps in the improvement of information security awareness.
背景:在有效整合资源和提高绩效的基础上,信息系统在组织中的使用已大大增加。对信息系统的日益依赖对企业构成了巨大的安全威胁。目的:本研究旨在评估位于沙特阿拉伯地区的组织的信息系统的安全性,涉及用户的意识水平。方法:采用调查法进行定量设计。采用封闭式问卷对个体的认知水平进行评价。沙特公司总共招募了109名参与者(男性和女性)参与这项研究。结果:虽然实施了该政策,但员工并不知情。研究强调,企业信息安全政策的制定需要企业让员工意识到信息安全的重要性。结论:该研究的结论是,组织需要对员工进行信息安全政策的教育,并培养他们对信息安全系统的必要理解。这使员工能够识别和报告安全威胁和风险,有助于提高信息安全意识。
{"title":"Safeguarding the Information Systems in an Organization through Different Technologies, Policies, and Actions","authors":"H. Alkahtani","doi":"10.5539/CIS.V12N2P117","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P117","url":null,"abstract":"Background: Information system use has substantially increased among the organization based on its effective integration of the resources and improved performance. The increasing reliance on the information system serves as a great security threat for the firms. Objective: The study intends to evaluate the security of the information system in the organization located in the region of Saudi Arabia, concerning the user’s awareness level. Methods: The quantitative design of the study is adopted which uses the survey approach. A close-ended questionnaire is used for evaluating the awareness level among the individuals. A total of 109 participants (males and females) in the Saudi Company were recruited for the study. Results: Despite the implementation of the policy, employees were unaware of it. The study highlights that the development of the firm’s information security policy requires the firm to make employees aware of the significance of the information security. Conclusion: The study concludes that the organization needs to educate the workforce of the information security policy and develop their necessary understanding of the information security system. This allows the employees to identify and report security threats and risks which helps in the improvement of information security awareness.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"253 1","pages":"117-125"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74998487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion Spam Detection based on Annotation Extension and Neural Networks 基于标注扩展和神经网络的意见垃圾检测
Pub Date : 2019-04-05 DOI: 10.5539/CIS.V12N2P87
Yuanchao Liu, B. Pang
Online reviews play an increasingly important role in the purchase decisions of potential customers. Incidentally, driven by the desire to gain profit or publicity, spammers may be hired to write fake reviews and promote or demote the reputation of products or services. Correspondingly, opinion spam detection has attracted attention from both business and research communities in recent years. However, unlike other tasks such as news classification or blog classification, the existing review spam datasets are typically limited due to the expensiveness of human annotation, which may further affect detection performance even if excellent classifiers have been developed. We propose a novel approach in this paper to boost opinion spam detection performance by fully utilizing the existing labelled small-size dataset. We first design an annotation extension scheme that uses extra tree classifiers to train multiple estimators and then iteratively generate reliable labelled samples from unlabeled ones. Subsequently, we examine neural network scenarios on a newly extended dataset to learn the distributed representation. Experimental results suggest that the proposed approach has better generalization capability and improved performance than state-of-the-art methods.
在线评论在潜在客户的购买决策中扮演着越来越重要的角色。顺便说一句,在获得利润或宣传的欲望的驱使下,垃圾邮件发送者可能被雇佣来撰写虚假评论,以提高或降低产品或服务的声誉。相应地,近年来,垃圾意见检测也引起了企业界和研究界的广泛关注。然而,与新闻分类或博客分类等其他任务不同,由于人工注释的昂贵性,现有的评论垃圾邮件数据集通常受到限制,这可能会进一步影响检测性能,即使已经开发出优秀的分类器。本文提出了一种新的方法,通过充分利用现有的标记小尺寸数据集来提高意见垃圾邮件检测的性能。我们首先设计了一个注释扩展方案,该方案使用额外的树分类器来训练多个估计器,然后从未标记的样本迭代生成可靠的标记样本。随后,我们在一个新扩展的数据集上研究神经网络场景,以学习分布式表示。实验结果表明,该方法具有更好的泛化能力和性能。
{"title":"Opinion Spam Detection based on Annotation Extension and Neural Networks","authors":"Yuanchao Liu, B. Pang","doi":"10.5539/CIS.V12N2P87","DOIUrl":"https://doi.org/10.5539/CIS.V12N2P87","url":null,"abstract":"Online reviews play an increasingly important role in the purchase decisions of potential customers. Incidentally, driven by the desire to gain profit or publicity, spammers may be hired to write fake reviews and promote or demote the reputation of products or services. Correspondingly, opinion spam detection has attracted attention from both business and research communities in recent years. However, unlike other tasks such as news classification or blog classification, the existing review spam datasets are typically limited due to the expensiveness of human annotation, which may further affect detection performance even if excellent classifiers have been developed. We propose a novel approach in this paper to boost opinion spam detection performance by fully utilizing the existing labelled small-size dataset. We first design an annotation extension scheme that uses extra tree classifiers to train multiple estimators and then iteratively generate reliable labelled samples from unlabeled ones. Subsequently, we examine neural network scenarios on a newly extended dataset to learn the distributed representation. Experimental results suggest that the proposed approach has better generalization capability and improved performance than state-of-the-art methods.","PeriodicalId":14676,"journal":{"name":"J. Chem. Inf. Comput. Sci.","volume":"45 1","pages":"87-"},"PeriodicalIF":0.0,"publicationDate":"2019-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82812592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
J. Chem. Inf. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1