P. S. Metkewar, Shrivats Sharma, Lubna Hamid Shah, A. Prasanth
When it comes to international trade, India is one of the most important nations. This paper intends to analyze the effect of International Trade on a nation’s GDP growth through the process of visualizing the current trends. For this research, some statistical (economical) data is considered and its effect on the GDP is analyzed for the previous accounting years ranging from 2015 to 2021. The data considered for this include – the monetary value of exports from India (in US$ Millions), the monetary value of imports from India (in US$ Millions), India’s share of exports to the nation out of all the nations, India’s share of imports to the nation out of all the nations in, export growth rate, import growth rate, currency exchange rate, Inflation rate. This paper examines and explains how these economic factors influence a country’s (India’s) GDP growth through the process of visualization.
在国际贸易方面,印度是最重要的国家之一。本文旨在通过对当前趋势的可视化过程,分析国际贸易对国家 GDP 增长的影响。本研究考虑了一些统计(经济)数据,并分析了从 2015 年到 2021 年的前几个会计年度的数据对国内生产总值的影响。考虑的数据包括--印度出口的货币价值(单位:百万美元)、从印度进口的货币价值(单位:百万美元)、印度在所有国家中的出口份额、印度在所有国家中的进口份额、出口增长率、进口增长率、货币汇率、通货膨胀率。本文通过可视化过程研究并解释了这些经济因素如何影响一个国家(印度)的国内生产总值增长。
{"title":"Visualization Process of International Trade and its impact on GDP through Multi-criteria Decision Model: A Case Study of India’s Merchandise Trade","authors":"P. S. Metkewar, Shrivats Sharma, Lubna Hamid Shah, A. Prasanth","doi":"10.4108/eetsis.5296","DOIUrl":"https://doi.org/10.4108/eetsis.5296","url":null,"abstract":"When it comes to international trade, India is one of the most important nations. This paper intends to analyze the effect of International Trade on a nation’s GDP growth through the process of visualizing the current trends. For this research, some statistical (economical) data is considered and its effect on the GDP is analyzed for the previous accounting years ranging from 2015 to 2021. The data considered for this include – the monetary value of exports from India (in US$ Millions), the monetary value of imports from India (in US$ Millions), India’s share of exports to the nation out of all the nations, India’s share of imports to the nation out of all the nations in, export growth rate, import growth rate, currency exchange rate, Inflation rate. This paper examines and explains how these economic factors influence a country’s (India’s) GDP growth through the process of visualization.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"13 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140266303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Despite these efforts' merit, academics have had trouble keeping up with the radical shifts in how software is created and supplied to clients. DevOps has revolutionized the way IT businesses are intended to operate as the result of years of hard effort and improvement to software delivery methods, techniques, and philosophies. Despite its widespread use and the positive effects, it has had on IT businesses' bottom lines, few people outside of the industry really understand what it is, how it operates, or if it can genuinely lead to better IT performance. This study provides a methodology that bridges the gap between these macro-level elements and the actual results of IT departments by focusing on the enabling components of DevOps, such as technological and management skills, and IT culture. Moreover, this study suggests the values of a perfect DevOps organization, which have a profound impact on IT Outcomes when they are in harmony with the firm's Delivery Approach. Information technology (IT) experts with prior DevOps experience were used to compile the survey results. In all, 176 American respondents provided their information. This alignment, in turn, has a substantial impact on IT Outcomes. This study adds not only to the growing body of literature on DevOps and software delivery, which is essential to the success of any IT firm, but also to the development of important underlying theory in these areas.
尽管这些努力有其可取之处,但学术界一直难以跟上软件创建和向客户提供方式的重大转变。经过多年的艰苦努力和对软件交付方法、技术和理念的改进,DevOps 彻底改变了 IT 企业的运营方式。尽管 DevOps 得到了广泛应用,并对 IT 企业的底线产生了积极影响,但很少有业内外人士真正了解 DevOps 是什么、如何运作,以及是否能真正提高 IT 性能。本研究提供了一种方法,通过关注 DevOps 的有利因素(如技术和管理技能以及 IT 文化),缩小了这些宏观因素与 IT 部门实际成果之间的差距。此外,本研究还提出了完美 DevOps 组织的价值观,当这些价值观与公司的交付方法相协调时,会对 IT 成果产生深远影响。具有 DevOps 经验的信息技术(IT)专家被用来汇编调查结果。共有 176 名美国受访者提供了信息。这种一致性反过来会对 IT 成果产生重大影响。DevOps 和软件交付对任何一家 IT 公司的成功都至关重要,这项研究不仅丰富了有关 DevOps 和软件交付的文献,还发展了这些领域的重要基础理论。
{"title":"Gaining an Understanding of DevOps from its Enablers to Its Impact on Performance","authors":"Arvind Kumar Bhardwaj, Sandeep Rangineni","doi":"10.4108/eetsis.5228","DOIUrl":"https://doi.org/10.4108/eetsis.5228","url":null,"abstract":"Despite these efforts' merit, academics have had trouble keeping up with the radical shifts in how software is created and supplied to clients. DevOps has revolutionized the way IT businesses are intended to operate as the result of years of hard effort and improvement to software delivery methods, techniques, and philosophies. Despite its widespread use and the positive effects, it has had on IT businesses' bottom lines, few people outside of the industry really understand what it is, how it operates, or if it can genuinely lead to better IT performance. This study provides a methodology that bridges the gap between these macro-level elements and the actual results of IT departments by focusing on the enabling components of DevOps, such as technological and management skills, and IT culture. Moreover, this study suggests the values of a perfect DevOps organization, which have a profound impact on IT Outcomes when they are in harmony with the firm's Delivery Approach. Information technology (IT) experts with prior DevOps experience were used to compile the survey results. In all, 176 American respondents provided their information. This alignment, in turn, has a substantial impact on IT Outcomes. This study adds not only to the growing body of literature on DevOps and software delivery, which is essential to the success of any IT firm, but also to the development of important underlying theory in these areas.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"77 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140421409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pranjali, Srividya Ramisetty, Vani B Telagade, S. D. Adiga
As technology continues to advance, data has become an increasingly important element in the sphere of Information Technology. However, enormous data generated by devices presents a major challenge in handling it in real time. Data encryption is a crucial component in ensuring data security and privacy during its transmission in network. Unfortunately, many applications disregard data encryption in order to achieve higher performance. The work proposes a solution to this problem by introducing a data encryption process that is, the Realizable Data Encryption Strategy (RDES) and Deoxyribonucleic Acid (DNA) computing, a revolutionary cryptographic method that improves information security by preventing authorized access to sensitive data, being used. Information security is improved by DNA symmetric cryptography being suggested. The outcomes show that plain-text encryption is a very secure procedure. The RDES approach is designed to improve privacy protection within the constraints of real-time processing. By implementing the RDES approach, data privacy and security can be significantly enhanced without compromising performance.
{"title":"A Realizable Data Encryption Strategy","authors":"Pranjali, Srividya Ramisetty, Vani B Telagade, S. D. Adiga","doi":"10.4108/eetsis.5230","DOIUrl":"https://doi.org/10.4108/eetsis.5230","url":null,"abstract":"As technology continues to advance, data has become an increasingly important element in the sphere of Information Technology. However, enormous data generated by devices presents a major challenge in handling it in real time. Data encryption is a crucial component in ensuring data security and privacy during its transmission in network. Unfortunately, many applications disregard data encryption in order to achieve higher performance. The work proposes a solution to this problem by introducing a data encryption process that is, the Realizable Data Encryption Strategy (RDES) and Deoxyribonucleic Acid (DNA) computing, a revolutionary cryptographic method that improves information security by preventing authorized access to sensitive data, being used. Information security is improved by DNA symmetric cryptography being suggested. The outcomes show that plain-text encryption is a very secure procedure. The RDES approach is designed to improve privacy protection within the constraints of real-time processing. By implementing the RDES approach, data privacy and security can be significantly enhanced without compromising performance.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"15 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140423191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jayaraj Viswanathan, Kuralamudhan E, Navaneethan S, Veluchamy S
Face recognition offers a wide range of valuable applications in social media, security, and surveillance contexts. The software used for building facial recognition algorithms is Python and OpenCV. "Attendance using Face Recognition" is a method for tracking and managing attendance that makes use of facial recognition technology. By seamlessly integrating the 'Face Recognition' module, a native Python feature, and the OpenCV library, our system excels in accuracy and dependability. The system then stores attendance records in a database and provides real-time reports. In this article, we demonstrate how to create a face recognition system in Python utilizing the built-in "Face Recognition" module and the OpenCV library. Our results show that our system achieves high accuracy and robustness while being efficient and scalable, catering to a wide spectrum of educational institutions, organizations, and enterprises.
{"title":"Smart Attendance System using Face Recognition","authors":"Jayaraj Viswanathan, Kuralamudhan E, Navaneethan S, Veluchamy S","doi":"10.4108/eetsis.5203","DOIUrl":"https://doi.org/10.4108/eetsis.5203","url":null,"abstract":" \u0000Face recognition offers a wide range of valuable applications in social media, security, and surveillance contexts. The software used for building facial recognition algorithms is Python and OpenCV. \"Attendance using Face Recognition\" is a method for tracking and managing attendance that makes use of facial recognition technology. By seamlessly integrating the 'Face Recognition' module, a native Python feature, and the OpenCV library, our system excels in accuracy and dependability. The system then stores attendance records in a database and provides real-time reports. In this article, we demonstrate how to create a face recognition system in Python utilizing the built-in \"Face Recognition\" module and the OpenCV library. Our results show that our system achieves high accuracy and robustness while being efficient and scalable, catering to a wide spectrum of educational institutions, organizations, and enterprises.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"181 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140428619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The significance of PID control within the management system of stepper motors is noteworthy; nonetheless, it is worth noting that stepper motors are susceptible to issues such as low power, step loss, and vibration. The conventional Proportional-Integral-Derivative (PID) control method is insufficient in addressing the control challenge specific to stepper motor management systems. Hence, this research work presents an enhanced fuzzy control method that integrates the principles of fuzzy control theory with traditional PID control theory. The integration of fuzzy control into the P ID control is undertaken to create a fuzzy controller that satisfies the demands of stepper motor control. Additionally, the division of indices is conducted in accordance with the specifications of the fuzzy controller in order to mitigate the disruptive elements of PID control. then, the use of fuzzy control rules is employed to achieve control over the stepper motor, resulting in the development of an enhanced scheme that is then subjected to rigorous validation. The present study employs a MATLAB simulation to compare the performance of the enhanced fuzzy control algorithm with that of the P-ID control method. The results demonstrate that the improved fuzzy control algorithm significantly enhances the stability and dynamic performance of the stepper motor. Superior to traditional Proportional-Integral-Derivative (PID) control.
{"title":"Research step of PID control method of stepper motor based on improved fuzzy control algorithm","authors":"Zichi Zhang, Xiangding Meng, Yilei Kou","doi":"10.4108/eetsis.5205","DOIUrl":"https://doi.org/10.4108/eetsis.5205","url":null,"abstract":"The significance of PID control within the management system of stepper motors is noteworthy; nonetheless, it is worth noting that stepper motors are susceptible to issues such as low power, step loss, and vibration. The conventional Proportional-Integral-Derivative (PID) control method is insufficient in addressing the control challenge specific to stepper motor management systems. Hence, this research work presents an enhanced fuzzy control method that integrates the principles of fuzzy control theory with traditional PID control theory. The integration of fuzzy control into the P ID control is undertaken to create a fuzzy controller that satisfies the demands of stepper motor control. Additionally, the division of indices is conducted in accordance with the specifications of the fuzzy controller in order to mitigate the disruptive elements of PID control. then, the use of fuzzy control rules is employed to achieve control over the stepper motor, resulting in the development of an enhanced scheme that is then subjected to rigorous validation. The present study employs a MATLAB simulation to compare the performance of the enhanced fuzzy control algorithm with that of the P-ID control method. The results demonstrate that the improved fuzzy control algorithm significantly enhances the stability and dynamic performance of the stepper motor. Superior to traditional Proportional-Integral-Derivative (PID) control.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"33 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140429446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel approach to monitoring the status of electrical equipment using Internet of Things (IoT) and relaying-aided transmission technologies, where data rate is used as a key metric for evaluating system monitoring performance. In this framework, relaying plays a pivotal role, enhancing the robustness and efficiency of data transmission in the monitoring process. We employ the optimal relay selection algorithms to identify and employ the most effective relay to assist in the transmission, thereby optimizing the communication link between the electrical equipment and the monitoring system. To provide a comprehensive understanding of the system's capabilities, we delve into the analytical aspects by deriving expressions for the data rate. These expressions offer insights into the theoretical performance limits and the factors influencing the efficiency of the system. The theoretical framework is further complemented by a series of simulations. These simulations validate the analytical models developed in the study, and provide practical scenarios to demonstrate the real-world applicability and effectiveness of the proposed IoT and relaying-aided transmission technologies in monitoring electrical equipment.
{"title":"IoT and Relaying Aided Transmission Technologies for Monitoring Electrical Equipment Status","authors":"Yawen Yi, Chuan Chen, Ziran Chen, Ganxin Jie, Yong Tu, Qijun Zhang","doi":"10.4108/eetsis.4839","DOIUrl":"https://doi.org/10.4108/eetsis.4839","url":null,"abstract":"This paper presents a novel approach to monitoring the status of electrical equipment using Internet of Things (IoT) and relaying-aided transmission technologies, where data rate is used as a key metric for evaluating system monitoring performance. In this framework, relaying plays a pivotal role, enhancing the robustness and efficiency of data transmission in the monitoring process. We employ the optimal relay selection algorithms to identify and employ the most effective relay to assist in the transmission, thereby optimizing the communication link between the electrical equipment and the monitoring system. To provide a comprehensive understanding of the system's capabilities, we delve into the analytical aspects by deriving expressions for the data rate. These expressions offer insights into the theoretical performance limits and the factors influencing the efficiency of the system. The theoretical framework is further complemented by a series of simulations. These simulations validate the analytical models developed in the study, and provide practical scenarios to demonstrate the real-world applicability and effectiveness of the proposed IoT and relaying-aided transmission technologies in monitoring electrical equipment.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140435932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Short films and photojournalism are crucial parts of video communication, yet there are issues including poor video integration, inconsistency between short videos and photojournalism, and slow communication speed. In order to evaluate and analyse video communication, this research offers a data mining algorithm. First, the database's images and videos are chosen and analysed using a mining algorithm, and then the indicators are reduced by dividing them into groups based on the specifications for video dissemination. video transmission distractions. The mining algorithm then analyses the video propagation, creates a plan that satisfies the criteria, and refines the plans that satisfies the criteria. Analyse. The integration level, timeliness, and compliance rate of data mining algorithms for video propagation are superior to traditional video dissemination method under specific analysis criteria, according to MATLAB simulation.
{"title":"Research on the application of data mining algorithm in photojournalism and short video communication","authors":"Yidi Wang, Yan Song Zhang","doi":"10.4108/eetsis.5180","DOIUrl":"https://doi.org/10.4108/eetsis.5180","url":null,"abstract":"Short films and photojournalism are crucial parts of video communication, yet there are issues including poor video integration, inconsistency between short videos and photojournalism, and slow communication speed. In order to evaluate and analyse video communication, this research offers a data mining algorithm. First, the database's images and videos are chosen and analysed using a mining algorithm, and then the indicators are reduced by dividing them into groups based on the specifications for video dissemination. video transmission distractions. The mining algorithm then analyses the video propagation, creates a plan that satisfies the criteria, and refines the plans that satisfies the criteria. Analyse. The integration level, timeliness, and compliance rate of data mining algorithms for video propagation are superior to traditional video dissemination method under specific analysis criteria, according to MATLAB simulation.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"37 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140440788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The tremendous headway of web empowered gadgets develops the clients dependably strong in virtual redirection affiliations. Individuals from social affairs getting moment notices with respect to news, amusement, training, business, and different themes. The development of artificial intelligence-based classification models plays an optimum role in making deeper analysis of text data. The massive growth of text-based communication impacts the social decisions also. People rely on news and updates coming over in social media and networking groups. Micro blogs such as tweeter, facebooks manipulate the news as faster as possible. The quality of classification of fake news and real news depends on the processing steps. The proposed articles focused on deriving a significant method for pre-processing the dataset and feature extraction of the unique data. Dataset is considered as the input data for analyzing the presence of fake news. The extraction of unique features from the data is implemented using Bags of relevant tags (BORT) extraction and Bags of relevant meta words (BORMW).
{"title":"Effective preprocessing and feature analysis on Twitter data for Fake news detection using RWS algorithm","authors":"M. Santhoshkumar, V. Divya","doi":"10.4108/eetsis.5157","DOIUrl":"https://doi.org/10.4108/eetsis.5157","url":null,"abstract":"The tremendous headway of web empowered gadgets develops the clients dependably strong in virtual redirection affiliations. Individuals from social affairs getting moment notices with respect to news, amusement, training, business, and different themes. The development of artificial intelligence-based classification models plays an optimum role in making deeper analysis of text data. The massive growth of text-based communication impacts the social decisions also. People rely on news and updates coming over in social media and networking groups. Micro blogs such as tweeter, facebooks manipulate the news as faster as possible. \u0000The quality of classification of fake news and real news depends on the processing steps. The proposed articles focused on deriving a significant method for pre-processing the dataset and feature extraction of the unique data. Dataset is considered as the input data for analyzing the presence of fake news. The extraction of unique features from the data is implemented using Bags of relevant tags (BORT) extraction and Bags of relevant meta words (BORMW).","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"82 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140448633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NTRODUCTION: In the digital age, citizens' online political engagement is crucial for the development and stability of society.OBJECTIVES: To gain insights into and address the challenges facing political engagement today, where effectively assessing and promoting citizen participation in the context of the information explosion and the popularization of social media has become a pressing issue.METHODS: Using the binomial search tree algorithm, which was introduced to analyze and predict citizens' political behaviors in the online environment, able to dig deeper into citizens' concerns, opinions, and interaction patterns on political topics by collecting large-scale online data and applying it to the binomial search tree algorithm.RESULTS: The binary search tree algorithm is able to efficiently and accurately reveal the complex features of citizens' online political engagement.CONCLUSION: The binomial search tree algorithm is more advantageous than traditional methods, providing deeper insights for government policymakers and social scientists, and this study is essential for advancing the understanding and enhancement of citizens' online political engagement.
{"title":"Survey and Analysis of Citizen Network Political Participation Based on Binary Search Tree Algorithm","authors":"Haixia Li","doi":"10.4108/eetsis.4922","DOIUrl":"https://doi.org/10.4108/eetsis.4922","url":null,"abstract":"NTRODUCTION: In the digital age, citizens' online political engagement is crucial for the development and stability of society.OBJECTIVES: To gain insights into and address the challenges facing political engagement today, where effectively assessing and promoting citizen participation in the context of the information explosion and the popularization of social media has become a pressing issue.METHODS: Using the binomial search tree algorithm, which was introduced to analyze and predict citizens' political behaviors in the online environment, able to dig deeper into citizens' concerns, opinions, and interaction patterns on political topics by collecting large-scale online data and applying it to the binomial search tree algorithm.RESULTS: The binary search tree algorithm is able to efficiently and accurately reveal the complex features of citizens' online political engagement.CONCLUSION: The binomial search tree algorithm is more advantageous than traditional methods, providing deeper insights for government policymakers and social scientists, and this study is essential for advancing the understanding and enhancement of citizens' online political engagement.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"675 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140446305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
INTRODCTION: The study of automatic marking methods in the Department of Language Translation is conducive to the fairness and rationality of marking by examining the comprehensive level of the students' language, as well as sharing the objectivity and pressure of the marking teachers in marking the scripts.OBJECTIVES: Aiming at the current automatic scoring methods of translation systems, which have the problems of not considering the global nature of influence features and low precision.METHODS: This paper proposes an automatic scoring method for translation system based on intelligent optimization algorithm to improve the deep network. First, by analyzing the language translation scoring problem, selecting the key scoring influencing factors and analyzing the correlation and principal components; then, improving the long and short-term memory network through the triangle search optimization algorithm and constructing the automatic scoring model of the translation system; finally, the high efficiency of the proposed method is verified through the analysis of simulation experiments.RESULTS: The proposed method is effective and improves the accuracy of the scoring model.CONCLUSION: solves the problem of inefficient scoring in the automatic scoring method of the translation system.
{"title":"Research on Automatic Scoring Method of Intelligent Translation System Based on TSO Optimized LSTM Networks","authors":"Wei Li","doi":"10.4108/eetsis.4858","DOIUrl":"https://doi.org/10.4108/eetsis.4858","url":null,"abstract":"INTRODCTION: The study of automatic marking methods in the Department of Language Translation is conducive to the fairness and rationality of marking by examining the comprehensive level of the students' language, as well as sharing the objectivity and pressure of the marking teachers in marking the scripts.OBJECTIVES: Aiming at the current automatic scoring methods of translation systems, which have the problems of not considering the global nature of influence features and low precision.METHODS: This paper proposes an automatic scoring method for translation system based on intelligent optimization algorithm to improve the deep network. First, by analyzing the language translation scoring problem, selecting the key scoring influencing factors and analyzing the correlation and principal components; then, improving the long and short-term memory network through the triangle search optimization algorithm and constructing the automatic scoring model of the translation system; finally, the high efficiency of the proposed method is verified through the analysis of simulation experiments.RESULTS: The proposed method is effective and improves the accuracy of the scoring model.CONCLUSION: solves the problem of inefficient scoring in the automatic scoring method of the translation system.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140447546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}