首页 > 最新文献

Journal of Engineering and Applied Sciences最新文献

英文 中文
Research on Self-Propagating High-Temperature Synthesis of Ceramic Matrix Composites 陶瓷基复合材料自传播高温合成研究
Pub Date : 2023-08-22 DOI: 10.11648/j.eas.20230804.13
Deshui Yu, Yan Zhang, Jianping Zhou, Daqian Sun, Hongmei Li
{"title":"Research on Self-Propagating High-Temperature Synthesis of Ceramic Matrix Composites","authors":"Deshui Yu, Yan Zhang, Jianping Zhou, Daqian Sun, Hongmei Li","doi":"10.11648/j.eas.20230804.13","DOIUrl":"https://doi.org/10.11648/j.eas.20230804.13","url":null,"abstract":"","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79414464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges and Opportunities of Irrigated Wheat (Triticum Estievum L.) Production in Jimma Zone South West Ethiopia: A Review 灌溉小麦面临的挑战与机遇埃塞俄比亚西南部Jimma地区的生产综述
Pub Date : 2023-08-04 DOI: 10.11648/j.eas.20230804.12
Etefa Tilahun Ashine
: Wheat Production Initiative was designed to make the country self-sufficient in wheat production. The highlands of the central, south-eastern, and North West parts of the country are the main wheat-growing areas, however, there was no/little experience of wheat production in the lowland. Poor irrigation management that results in either excessive or inadequate water application can significantly reduce the potential for profitability. Increasing irrigation efficiency by applying improved water management strategies could be the prime objective for sustainable irrigated agriculture. In Jimma zone, even though there are a plenty of available natural resources such as land, water and suitable agro-ecology, there were some water deficit because of their location (physical nature) in the gorges and not suitable for surface irrigation and demand sophisticated irrigation technology. In this study different literatures were seen in addition to site observation at different irrigated wheat cluster farming to identify the different challenges and opportunities of irrigated wheat production. The major challenges for the production of irrigated wheat in Jimma zone were limited study on the suitability of the specific area of land for irrigated wheat farming, limited agricultural inputs, in adequate and low performance of small scale irrigation schemes, disease and pest problem, lack of market access, lack of financial support for irrigated wheat, and low quality of wheat products. Availability of water resources and irrigable land and high demand of wheat from the consumer side are among the opportunities that encourage farmers and other stakeholders to involve in the irrigated wheat production in Jimma Zone. The quality of irrigated wheat has to get an attention from the producer side.
:《小麦生产倡议》旨在使该国在小麦生产方面实现自给自足。该国中部、东南部和西北部的高地是主要的小麦种植区,然而,低地几乎没有小麦生产的经验。灌溉管理不善导致用水过量或不足,可大大降低潜在的盈利能力。通过采用改进的水管理战略来提高灌溉效率可能是可持续灌溉农业的主要目标。在吉马地区,虽然有充足的土地、水等自然资源和适宜的农业生态,但由于其所处的地理位置(物理性质),不适合地面灌溉,需要复杂的灌溉技术,因此存在一定的水分亏缺。在本研究中,除了对不同的灌溉小麦集群农业进行现场观察外,还看到了不同的文献,以确定灌溉小麦生产的不同挑战和机遇。吉马地区灌溉小麦生产面临的主要挑战是:对特定土地面积是否适合灌溉小麦的研究有限、农业投入有限、小规模灌溉计划不足且成效不佳、病虫害问题、缺乏市场准入、对灌溉小麦缺乏财政支持以及小麦产品质量低。水资源和可灌溉土地的可用性以及消费者对小麦的高需求是鼓励农民和其他利益相关者参与吉马地区灌溉小麦生产的机会之一。灌溉小麦的质量必须得到生产者的重视。
{"title":"Challenges and Opportunities of Irrigated Wheat (<i>Triticum Estievum</i> L.) Production in Jimma Zone South West Ethiopia: A Review","authors":"Etefa Tilahun Ashine","doi":"10.11648/j.eas.20230804.12","DOIUrl":"https://doi.org/10.11648/j.eas.20230804.12","url":null,"abstract":": Wheat Production Initiative was designed to make the country self-sufficient in wheat production. The highlands of the central, south-eastern, and North West parts of the country are the main wheat-growing areas, however, there was no/little experience of wheat production in the lowland. Poor irrigation management that results in either excessive or inadequate water application can significantly reduce the potential for profitability. Increasing irrigation efficiency by applying improved water management strategies could be the prime objective for sustainable irrigated agriculture. In Jimma zone, even though there are a plenty of available natural resources such as land, water and suitable agro-ecology, there were some water deficit because of their location (physical nature) in the gorges and not suitable for surface irrigation and demand sophisticated irrigation technology. In this study different literatures were seen in addition to site observation at different irrigated wheat cluster farming to identify the different challenges and opportunities of irrigated wheat production. The major challenges for the production of irrigated wheat in Jimma zone were limited study on the suitability of the specific area of land for irrigated wheat farming, limited agricultural inputs, in adequate and low performance of small scale irrigation schemes, disease and pest problem, lack of market access, lack of financial support for irrigated wheat, and low quality of wheat products. Availability of water resources and irrigable land and high demand of wheat from the consumer side are among the opportunities that encourage farmers and other stakeholders to involve in the irrigated wheat production in Jimma Zone. The quality of irrigated wheat has to get an attention from the producer side.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80254316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterization of Radio-Waste from TRIGA II Research Reactor and Assessment of Corresponding Radiation Dose in Bangladesh 孟加拉TRIGA II研究堆放射性废物特性及辐射剂量评估
Pub Date : 2023-08-04 DOI: 10.11648/j.eas.20230804.11
R. Moshiur, K. Islam, Humaira Takia, Khokon Hossen, Moinul Islam, S. Ghose
: During the reactor operation a significant amount of high and intermediate level radioactive wastes are inevitably raised, which are managed and finally disposed of with particular care. The ion exchange resin is used to purify water during the operation of 3 MW TRIGA Mark II research reactor in Bangladesh, when the decontamination efficiency is insufficient to maintain the required primary coolant quality. Five spent ion exchange resin samples and eleven liquid samples from exhausted coolant of 3 MW TRIGA Mark II research reactor were analyzed by using HPGe detector having 40% relative efficiency and 1.8 keV resolution coupled with computer-based MCA. Two radionuclides 54 Mn, 60 Co have been recognized in the spent ion-exchange resin and three radionuclides such as 137 Cs, 60 Co, and 65 Zn have been identified in the liquid radio wastes samples. The specific activity concentrations of these nuclides and the Inhalation dose for the corresponding nuclide for different body parts such as bladder, Bone surface, Brain, Breast, Stomach, Kidneys, Liver, Red Marrow, lungs, Skin and Thyroid for public are also evaluated according to the ICRP 68. Rad Toolbox software was used for the assessment. The maximum inhalation dose is originated from 137 Cs and lung is found to be the maximum radiation sensitive organ, received maximum dose of 53.5 m Sv from 60 Co (1332 keV). The experiment results would be helpful to develop a policy for radioactive waste management that produced during the operation and maintenance of a research reactor.
在反应堆运行过程中,不可避免地会产生大量的高放射性和中放射性废物,这些废物需要特别小心地加以管理和处理。在孟加拉国3mw TRIGA Mark II型研究堆运行过程中,当净化效率不足以维持所需的一次冷却剂质量时,使用离子交换树脂对水进行净化。采用相对效率为40%,分辨率为1.8 keV的HPGe探测器,结合计算机MCA,对3mw TRIGA Mark II研究堆的5个废离子交换树脂样品和11个废冷却液样品进行了分析。在废离子交换树脂中鉴定出两种放射性核素54mn, 60co,在液态放射性废物样品中鉴定出三种放射性核素137cs, 60co和65zn。这些核素的比活性浓度和相应的核素在人体不同部位如膀胱、骨表面、脑、乳房、胃、肾、肝、红骨髓、肺、皮肤和甲状腺的吸入剂量也根据ICRP 68进行了评估。使用Rad Toolbox软件进行评估。最大吸入剂量来源于137cs,肺是最大辐射敏感器官,60co (1332kev)的最大吸入剂量为53.5 m Sv。实验结果将有助于制定研究堆运行和维护过程中产生的放射性废物管理政策。
{"title":"Characterization of Radio-Waste from TRIGA II Research Reactor and Assessment of Corresponding Radiation Dose in Bangladesh","authors":"R. Moshiur, K. Islam, Humaira Takia, Khokon Hossen, Moinul Islam, S. Ghose","doi":"10.11648/j.eas.20230804.11","DOIUrl":"https://doi.org/10.11648/j.eas.20230804.11","url":null,"abstract":": During the reactor operation a significant amount of high and intermediate level radioactive wastes are inevitably raised, which are managed and finally disposed of with particular care. The ion exchange resin is used to purify water during the operation of 3 MW TRIGA Mark II research reactor in Bangladesh, when the decontamination efficiency is insufficient to maintain the required primary coolant quality. Five spent ion exchange resin samples and eleven liquid samples from exhausted coolant of 3 MW TRIGA Mark II research reactor were analyzed by using HPGe detector having 40% relative efficiency and 1.8 keV resolution coupled with computer-based MCA. Two radionuclides 54 Mn, 60 Co have been recognized in the spent ion-exchange resin and three radionuclides such as 137 Cs, 60 Co, and 65 Zn have been identified in the liquid radio wastes samples. The specific activity concentrations of these nuclides and the Inhalation dose for the corresponding nuclide for different body parts such as bladder, Bone surface, Brain, Breast, Stomach, Kidneys, Liver, Red Marrow, lungs, Skin and Thyroid for public are also evaluated according to the ICRP 68. Rad Toolbox software was used for the assessment. The maximum inhalation dose is originated from 137 Cs and lung is found to be the maximum radiation sensitive organ, received maximum dose of 53.5 m Sv from 60 Co (1332 keV). The experiment results would be helpful to develop a policy for radioactive waste management that produced during the operation and maintenance of a research reactor.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85476794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Forward Kinematics of 2R Robotic Arm 2R机械臂正运动学分析
Pub Date : 2023-05-18 DOI: 10.11648/j.eas.20230802.11
Fatima Mohammad Amin
: In Kinematics, the analysis of acceleration and velocity is usually done whereas the forces are neglected. The machine’s smallest unit is the link, which is akin to a cell in the human body. Robotics is built on the foundation of machines. A pair is established by the combination of links which leads to the construction of linkage. A mechanical linkage is a collection of bodies that are connected to control forces and movement. The combination of linkage (also known as Mechanism) generates Machine. The robot’s kinematics equations are used in robotics, video games and animation. Inverse kinematics is the mathematical process of determining variable joint parameters necessary to place an object at the end of a kinematic chain in a specific position and orientation with respect to the start of the chain, such as robot manipulator or skeleton of an animated character. The role of Forward and Inverse Kinematics in a 2R Robotic Arm are studied with successful demonstrations. Forward Kinematics of a 2R Robotic Arm using Matlab and Python confirming similar results are exhibited (Figure 8 and Figure 9). Matlab illustrated 2D Path Tracing for 2R Robotic Arm with Inverse Kinematics. Finally, inverse kinematics of 2R Robotic Arm in Matlab using fuzzy logic is modelled successfully. Thus, it helps in the understanding of kinematics and can be used in the simulation of machines.
在运动学中,通常只分析加速度和速度,而忽略力。机器最小的单元是连接,类似于人体的细胞。机器人是建立在机器的基础上的。一对是通过链接的组合来建立的,从而导致链接的构建。机械连杆是连接起来控制力和运动的物体的集合。连杆机构(又称机构)的组合产生机器。机器人的运动学方程用于机器人、视频游戏和动画。逆运动学是确定可变关节参数的数学过程,这些参数是将运动链末端的物体放置在相对于链起点的特定位置和方向上所必需的,例如机器人操纵器或动画人物的骨架。研究了正运动学和逆运动学在2R机械臂中的作用,并进行了成功的演示。使用Matlab和Python对2R机械臂进行了正运动学分析,证实了类似的结果(图8和图9)。Matlab用逆运动学说明了2R机械臂的二维路径跟踪。最后,利用模糊逻辑在Matlab中对2R机械臂的逆运动学进行了成功的建模。因此,它有助于对运动学的理解,并可用于机器的仿真。
{"title":"Analysis of Forward Kinematics of 2R Robotic Arm","authors":"Fatima Mohammad Amin","doi":"10.11648/j.eas.20230802.11","DOIUrl":"https://doi.org/10.11648/j.eas.20230802.11","url":null,"abstract":": In Kinematics, the analysis of acceleration and velocity is usually done whereas the forces are neglected. The machine’s smallest unit is the link, which is akin to a cell in the human body. Robotics is built on the foundation of machines. A pair is established by the combination of links which leads to the construction of linkage. A mechanical linkage is a collection of bodies that are connected to control forces and movement. The combination of linkage (also known as Mechanism) generates Machine. The robot’s kinematics equations are used in robotics, video games and animation. Inverse kinematics is the mathematical process of determining variable joint parameters necessary to place an object at the end of a kinematic chain in a specific position and orientation with respect to the start of the chain, such as robot manipulator or skeleton of an animated character. The role of Forward and Inverse Kinematics in a 2R Robotic Arm are studied with successful demonstrations. Forward Kinematics of a 2R Robotic Arm using Matlab and Python confirming similar results are exhibited (Figure 8 and Figure 9). Matlab illustrated 2D Path Tracing for 2R Robotic Arm with Inverse Kinematics. Finally, inverse kinematics of 2R Robotic Arm in Matlab using fuzzy logic is modelled successfully. Thus, it helps in the understanding of kinematics and can be used in the simulation of machines.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91193663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Bi-Stable Vibration Energy Harvesting System Using Duffing-Type Motion Model 基于duffing型运动模型的双稳态振动能量收集系统的开发
Pub Date : 2023-03-21 DOI: 10.11648/j.eas.20230801.12
Xuguang Zhang, Wei Zhao, Jingchao Guan, Apollo B. Fukuchi, Xilu Zhao
: Vibration power generation is an important issue in development of renewable energy. If a vibration system with a maximum possible amplitude is designed, it can be advantageous in improving the vibration power generation efficiency. In this study, we propose a Duffing-type bi-stable vibration energy harvesting system that utilizes the stochastic resonance phenomenon, which can significantly expand the vibration amplitude. We designed the motion rail shape of the bistable vibration model using the Duffing function
振动发电是可再生能源发展中的一个重要问题。设计具有最大可能幅值的振动系统,有利于提高振动发电效率。在本研究中,我们提出了一种利用随机共振现象的duffing型双稳态振动能量收集系统,该系统可以显着扩大振动幅值。利用Duffing函数设计了双稳振动模型的运动轨迹形状
{"title":"Development of Bi-Stable Vibration Energy Harvesting System Using Duffing-Type Motion Model","authors":"Xuguang Zhang, Wei Zhao, Jingchao Guan, Apollo B. Fukuchi, Xilu Zhao","doi":"10.11648/j.eas.20230801.12","DOIUrl":"https://doi.org/10.11648/j.eas.20230801.12","url":null,"abstract":": Vibration power generation is an important issue in development of renewable energy. If a vibration system with a maximum possible amplitude is designed, it can be advantageous in improving the vibration power generation efficiency. In this study, we propose a Duffing-type bi-stable vibration energy harvesting system that utilizes the stochastic resonance phenomenon, which can significantly expand the vibration amplitude. We designed the motion rail shape of the bistable vibration model using the Duffing function","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74369181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis for Arabic Sentiment Analysis ModelsIn E-Marketing Using Deep Learning Techniques 基于深度学习技术的网络营销中阿拉伯情感分析模型的比较分析
Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050102
Sara Almutairi, F. Alotaibi
The Internet has a huge amount of information when it comes to analysis, much of which is valuable and significant. Arabic Sentiment Analysis (SA) is a method responsible for analyzing people’s thoughts, feelings, and responses to a variety of products and services on social networking and commercial sites. Several researchers utilize sentiment analysis to determine the opinions of customers in various areas, including e-marketing, business, and other fields. Deep learning (DL) is a useful technology for developing sentiment analysis models to improve e-marketing operations. There are a few studies targeting Arabic sentiment analysis (ASA) in e-marketing using deep learning algorithms. Due to a number of difficulties in the Arabic language, such as the language’s morphological features, the diversity of dialects, and the absence of suitable corpora, sentiment analysis on Arabic material is restricted. In this paper, we will compare several Arabic sentiment analysis models. Also, we discuss the deep learning algorithms that are employed in Arabic sentiment analysis. The domain of the collected papers is Arabic sentiment analysis in e-marketing using deep learning. Our first contribution is to introduce and present deep learning models that are used in ASA. Secondly, investigate and study Arabic datasets utilized for Arabic sentence analysis. We create and develop a new Arabic dataset for Saudi Arabian communication companies, namely Sara-Dataset, to increase the quality and quantity of their services. Third, each collected study is assessed in terms of its methodology, contributions, deep learning techniques, performance, Arabic datasets in emarketing, and potential improvements in developing Arabic sentiment analysis models. Fourth, we analyzed several papers’ performance in terms of accuracy, F-measure, recall, pre-procession, and area under the curve (AUC). Also, our comparative analysis includes feature selection (e.g., domain-specific selection) methods that are used in Arabic sentiment analysis. Fifth, we also discuss how to improve Arabic sentiment analysis using preprocessing techniques (e.g., word embedding). Finally, we provide a design model for analyzing Arabic sentiment about communications services provided by Saudi Arabian enterprises.
当涉及到分析时,互联网上有大量的信息,其中许多是有价值的和重要的。阿拉伯情绪分析(SA)是一种负责分析人们对社交网络和商业网站上各种产品和服务的想法、感受和反应的方法。一些研究人员利用情感分析来确定客户在各个领域的意见,包括电子营销、商业和其他领域。深度学习(DL)是开发情感分析模型以改进电子营销运营的有用技术。有一些研究针对阿拉伯语情感分析(ASA)在电子营销中使用深度学习算法。由于阿拉伯文的形态学特征、方言的多样性以及缺乏合适的语料库等诸多困难,对阿拉伯文材料的情感分析受到了限制。在本文中,我们将比较几种阿拉伯语情感分析模型。此外,我们还讨论了用于阿拉伯语情感分析的深度学习算法。收集的论文领域是使用深度学习的电子营销中的阿拉伯语情感分析。我们的第一个贡献是介绍和展示用于ASA的深度学习模型。其次,调查和研究用于阿拉伯语句子分析的阿拉伯语数据集。我们为沙特阿拉伯通信公司创建和开发了一个新的阿拉伯语数据集,即Sara-Dataset,以提高他们服务的质量和数量。第三,每个收集到的研究都根据其方法、贡献、深度学习技术、性能、营销中的阿拉伯语数据集以及开发阿拉伯语情感分析模型的潜在改进进行评估。第四,我们分析了几篇论文在准确率、f值、召回率、预处理和曲线下面积(AUC)方面的表现。此外,我们的比较分析包括阿拉伯语情感分析中使用的特征选择(例如,特定领域选择)方法。第五,我们还讨论了如何使用预处理技术(例如,词嵌入)改进阿拉伯语情感分析。最后,我们提供了一个设计模型来分析阿拉伯人对沙特阿拉伯企业提供的通信服务的看法。
{"title":"A Comparative Analysis for Arabic Sentiment Analysis Models\u0000In E-Marketing Using Deep Learning Techniques","authors":"Sara Almutairi, F. Alotaibi","doi":"10.5455/jeas.2023050102","DOIUrl":"https://doi.org/10.5455/jeas.2023050102","url":null,"abstract":"The Internet has a huge amount of information when it comes to analysis, much of which is valuable and significant. Arabic Sentiment Analysis (SA) is a method responsible for analyzing people’s thoughts, feelings, and responses to a variety of products and services on social networking and commercial sites. Several researchers utilize sentiment analysis to determine the opinions of customers in various areas, including e-marketing, business, and other fields. Deep learning (DL) is a useful technology for developing sentiment analysis models to improve e-marketing operations. There are a few studies targeting Arabic sentiment analysis (ASA) in e-marketing using deep learning algorithms. Due to a number of difficulties in the Arabic language, such as the language’s morphological features, the diversity of dialects, and the absence of suitable corpora, sentiment analysis on Arabic material is restricted. In this paper, we will compare several Arabic sentiment analysis models. Also, we discuss the deep learning algorithms that are employed in Arabic sentiment analysis. The domain of the collected papers is Arabic sentiment analysis in e-marketing using deep learning. Our first contribution is to introduce and present deep learning models that are used in ASA. Secondly, investigate and study Arabic datasets utilized for Arabic sentence analysis. We create and develop a new Arabic dataset for Saudi Arabian communication companies, namely Sara-Dataset, to increase the quality and quantity of their services. Third, each collected study is assessed in terms of its methodology, contributions, deep learning techniques, performance, Arabic datasets in emarketing, and potential improvements in developing Arabic sentiment analysis models. Fourth, we analyzed several papers’ performance in terms of accuracy, F-measure, recall, pre-procession, and area under the curve (AUC). Also, our comparative analysis includes feature selection (e.g., domain-specific selection) methods that are used in Arabic sentiment analysis. Fifth, we also discuss how to improve Arabic sentiment analysis using preprocessing techniques (e.g., word embedding). Finally, we provide a design model for analyzing Arabic sentiment about communications services provided by Saudi Arabian enterprises.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87516608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measurement of Benefits, Reasons, and Barriers to Students’ Adoption of Electronic Applications 衡量学生采用电子应用程序的好处、原因和障碍
Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050101
M. Alghamdi
Over the past decade, electronic applications, particularly social networking applications (SNAs), have been gaining considerable popularity, including among educated young people. The advantages of SNAs are apparent in many sectors, with education being no exception. SNAs are also playing the main role in enhancing the quality of education. The aim of this paper is to explore SNAs use (e.g., Twitter, Facebook, and YouTube) in higher education students enrolled at Albaha University, Saudi Arabia, focusing on their associated advantages, barriers, and reasons for adoption, as well as differences between the participants with respect to the study variables. The research methodology was a survey approach and the sample size reached 243 students, including 123 males and 120 females. The survey was distributed to students electronically. The results indicate that most students benefit from SNAs, and these resources motivate them to engage with SNAs to enhance their education. Barriers were also identified that must be addressed for effective education. No difference was found between male and female students in terms of benefiting from SNAs, as well as the reasons and barriers, thereby indicating the availability of SNAs for both genders and the flexibility of their use at any time and place, as well as awareness in both genders about their use. A noticeable difference was identified in the extent of the benefits derived from SNAs between participants older and younger than 20 years, and differences were also found in the reasons underpinning these benefits. This reflects a disparity in the use and mastery of SNAs between the two age groups. Students aged 20-25 years also encountered greater barriers to SNAs use compared to students aged younger than 20 years, which may be attributed to the lower familiarity of older students with SNAs.
在过去十年中,电子应用程序,特别是社会网络应用程序(sna),已获得相当大的普及,包括在受过教育的年轻人中。国民核算体系的优势在许多部门都很明显,教育也不例外。国民核算体系在提高教育质量方面也发挥着重要作用。本文的目的是探讨sna在沙特阿拉伯阿尔巴哈大学的高等教育学生中的使用(例如,Twitter, Facebook和YouTube),重点关注他们的相关优势,障碍和采用的原因,以及参与者之间关于研究变量的差异。研究方法为调查法,样本量为243名学生,其中男生123名,女生120名。调查以电子方式分发给学生。结果表明,大多数学生受益于sna,这些资源激励他们参与sna以加强他们的教育。还确定了为有效教育必须解决的障碍。男女学生在受益于sna以及原因和障碍方面没有发现差异,从而表明男女学生都可以获得sna,在任何时间和地点都可以灵活地使用sna,以及男女学生都了解sna的使用情况。在年龄较大和年龄小于20岁的参与者之间,从sna中获得的益处程度存在显著差异,并且在支持这些益处的原因上也发现了差异。这反映了两个年龄组在使用和掌握国民核算体系方面的差异。与20岁以下的学生相比,20-25岁的学生在使用sna方面也遇到了更大的障碍,这可能是由于年龄较大的学生对sna的熟悉程度较低。
{"title":"Measurement of Benefits, Reasons, and Barriers to Students’ Adoption of Electronic Applications","authors":"M. Alghamdi","doi":"10.5455/jeas.2023050101","DOIUrl":"https://doi.org/10.5455/jeas.2023050101","url":null,"abstract":"Over the past decade, electronic applications, particularly social networking applications (SNAs), have been gaining considerable popularity, including among educated young people. The advantages of SNAs are apparent in many sectors, with education being no exception. SNAs are also playing the main role in enhancing the quality of education. The aim of this paper is to explore SNAs use (e.g., Twitter, Facebook, and YouTube) in higher education students enrolled at Albaha University, Saudi Arabia, focusing on their associated advantages, barriers, and reasons for adoption, as well as differences between the participants with respect to the study variables. The research methodology was a survey approach and the sample size reached 243 students, including 123 males and 120 females. The survey was distributed to students electronically. The results indicate that most students benefit from SNAs, and these resources motivate them to engage with SNAs to enhance their education. Barriers were also identified that must be addressed for effective education. No difference was found between male and female students in terms of benefiting from SNAs, as well as the reasons and barriers, thereby indicating the availability of SNAs for both genders and the flexibility of their use at any time and place, as well as awareness in both genders about their use. A noticeable difference was identified in the extent of the benefits derived from SNAs between participants older and younger than 20 years, and differences were also found in the reasons underpinning these benefits. This reflects a disparity in the use and mastery of SNAs between the two age groups. Students aged 20-25 years also encountered greater barriers to SNAs use compared to students aged younger than 20 years, which may be attributed to the lower familiarity of older students with SNAs.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87793943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing Serverless Applications with AWS Lambda: An Automatic Move to Serverless Architectures 使用AWS Lambda测试无服务器应用程序:自动迁移到无服务器架构
Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050104
Shamiksha Mishra, Abdullah Alenizi, S. Dutta
In serverless computing, servers' computing resources are distributed dynamically by the cloud service provider. Consumers are charged based on the usage of resources, not on prepurchase computing capability. Programming models, abstractions, and platforms for cloud services and technologies need to evolve. This paper aims to provide large scalability and low configuration costs for cloud applications. This paper explores testing strategies for a system that allows users to request rides on unicorns from the Wild Rydes fleet. The proposed application to build, deploy and tested, for serverless services developed for the Amazon Web Services cloud platform. The results have been obtained for the parameters Duration, Error count & success rate, Call, Throttle, Total concurrent execution and compare with the existing work. The results have a less duration, with very high success rate with zero error. This paper will help users to help in state of art transportation service so that people can travel faster and easier.
在无服务器计算中,服务器的计算资源由云服务提供商动态分配。消费者是根据资源的使用情况来收费的,而不是根据购买前的计算能力。云服务和技术的编程模型、抽象和平台需要发展。本文旨在为云应用提供大可扩展性和低配置成本。本文探讨了一个系统的测试策略,该系统允许用户请求乘坐Wild Rydes车队的独角兽。为Amazon Web services云平台开发的无服务器服务构建、部署和测试的拟议应用程序。得到了持续时间、错误数和成功率、调用、节流、总并发执行数等参数的计算结果,并与已有工作进行了比较。结果持续时间短,成功率高,零错误。本文将帮助用户在最先进的交通服务,使人们可以更快,更容易地旅行。
{"title":"Testing Serverless Applications with AWS Lambda: An Automatic Move to Serverless Architectures","authors":"Shamiksha Mishra, Abdullah Alenizi, S. Dutta","doi":"10.5455/jeas.2023050104","DOIUrl":"https://doi.org/10.5455/jeas.2023050104","url":null,"abstract":"In serverless computing, servers' computing resources are distributed dynamically by the cloud service provider. Consumers are charged based on the usage of resources, not on prepurchase computing capability. Programming models, abstractions, and platforms for cloud services and technologies need to evolve. This paper aims to provide large scalability and low configuration costs for cloud applications. This paper explores testing strategies for a system that allows users to request rides on unicorns from the Wild Rydes fleet. The proposed application to build, deploy and tested, for serverless services developed for the Amazon Web Services cloud platform. The results have been obtained for the parameters Duration, Error count & success rate, Call, Throttle, Total concurrent execution and compare with the existing work. The results have a less duration, with very high success rate with zero error. This paper will help users to help in state of art transportation service so that people can travel faster and easier.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78673567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Cybersecurity Awareness in Saudi Arabia 沙特阿拉伯的网络安全意识框架
Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050103
Mead Albediwi, Kishwar Sadaf
The rapid advancement in technology has improved people's lives, but it has also increased the risks that come with using the Internet, including cybercrimes. Lately, Saudi Arabia, a booming economy, has become one of the prime targets of cyberattacks. The massive amount of cyberattacks targeting Saudi Arabia can be attributed to the lack of cybersecurity awareness among Saudi people. The objective of this study is to propose methods on the national level to increase the awareness of cybersecurity among Saudi people. We conducted a cybersecurity assessment survey to assess the cybersecurity awareness among Saudi people. The survey result indicated negligent behavior and lack of awareness. To address this issue, we proposed a cybersecurity awareness framework which targets all strata of Saudi Arabia demography. The proposed framework not only emphasized training programs in schools, universities and organizations but also addresses the awareness issue in people from informal backgrounds. The framework also includes the importance of incident response and its role in reducing incidents.
科技的快速发展改善了人们的生活,但也增加了使用互联网的风险,包括网络犯罪。最近,经济蓬勃发展的沙特阿拉伯成为网络攻击的主要目标之一。针对沙特阿拉伯的大规模网络攻击可以归结为沙特民众缺乏网络安全意识。本研究的目的是提出国家层面的方法,以提高沙特人民的网络安全意识。我们进行了一项网络安全评估调查,以评估沙特人民的网络安全意识。调查结果显示了疏忽行为和缺乏意识。为了解决这个问题,我们提出了一个针对沙特阿拉伯所有阶层的网络安全意识框架。拟议的框架不仅强调了学校、大学和组织的培训项目,而且还解决了非正规背景人群的意识问题。该框架还包括事件响应的重要性及其在减少事件中的作用。
{"title":"A Framework for Cybersecurity Awareness in Saudi Arabia","authors":"Mead Albediwi, Kishwar Sadaf","doi":"10.5455/jeas.2023050103","DOIUrl":"https://doi.org/10.5455/jeas.2023050103","url":null,"abstract":"The rapid advancement in technology has improved people's lives, but it has also increased the risks that come with using the Internet, including cybercrimes. Lately, Saudi Arabia, a booming economy, has become one of the prime targets of cyberattacks. The massive amount of cyberattacks targeting Saudi Arabia can be attributed to the lack of cybersecurity awareness among Saudi people. The objective of this study is to propose methods on the national level to increase the awareness of cybersecurity among Saudi people. We conducted a cybersecurity assessment survey to assess the cybersecurity awareness among Saudi people. The survey result indicated negligent behavior and lack of awareness. To address this issue, we proposed a cybersecurity awareness framework which targets all strata of Saudi Arabia demography. The proposed framework not only emphasized training programs in schools, universities and organizations but also addresses the awareness issue in people from informal backgrounds. The framework also includes the importance of incident response and its role in reducing incidents.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"373 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77987683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Analysis and Detection System for New Host-Based Cryptojacking Malware Dataset 基于主机的新型加密劫持恶意软件数据集智能分析与检测系统
Pub Date : 2023-01-01 DOI: 10.5455/jeas.2023050105
Hadeel Almurshid
Cryptocurrency is a quickly growing technology in the finance industry, with the first cryptocurrency, Bitcoin, being created in 2009. Each cryptocurrency has its own unique hash value, and cryptocurrency mining involves participating in a guessing competition to release a unique hash into circulation, with the winner receiving a modest bonus in the form of bitcoin. However, as more bitcoins are discovered, it becomes increasingly difficult to obtain more, resulting in a need for extra computer resources and power. Consequently, the increasing popularity of cryptocurrency has led to a rise in cryptojacking malware, which secretly uses victims' computing resources to mine cryptocurrency. This malware can be either web-based or host-based, with similar execution and goals but differing in implementation and injection. Cryptojacking has affected numerous devices worldwide, but few studies have been carried out to detect it, especially the host-based type. Furthermore, the current studies on cryptojacking have limited datasets, which are often outdated or small, and the prediction models developed from these datasets may not be accurate. To address this gap, we conducted a thorough analysis of cryptojacking's behavior, lifecycle, impact, implementations, and possible detection methods. Additionally, we created an up-to-date dataset consisting of 114,985 samples, with 57,948 categorized as benign and 57,037 as cryptojacking. The dataset was used to build a smart cryptojacking detection system, with 5 different convolutional neural network models trained and evaluated against a subset of the dataset. The best performing model achieved an accuracy of 98.4%, an F1-Score of 98.3%, a precision of 98.4%, and a recall of 98.4%. Our proposed method, which involves running Windows executables in an isolated environment and closely monitoring their CPU usage, provides a thorough understanding of cryptojacking malware behavior and enables detection of the malware. The comprehensive dataset collected facilitates efficient detection model development. Additionally, evaluating the dataset with 5 different CNN algorithms and assessing their performance using established evaluation metrics ensures the effectiveness of our proposed method and dataset.
加密货币是金融行业一项快速发展的技术,第一个加密货币比特币于2009年创建。每种加密货币都有自己独特的哈希值,加密货币挖矿需要参加一场猜谜比赛,以释放一个独特的哈希值进入流通,获胜者将获得比特币形式的适度奖金。然而,随着越来越多的比特币被发现,获得更多比特币变得越来越困难,导致需要额外的计算机资源和电力。因此,加密货币的日益普及导致了加密劫持恶意软件的增加,这些恶意软件秘密地使用受害者的计算资源来挖掘加密货币。这种恶意软件既可以是基于网络的,也可以是基于主机的,它们具有相似的执行和目标,但在实现和注入方面有所不同。加密劫持已经影响了世界各地的许多设备,但很少有研究对其进行检测,特别是基于主机的类型。此外,目前对加密劫持的研究数据集有限,这些数据集往往是过时的或小的,并且根据这些数据集开发的预测模型可能不准确。为了解决这一差距,我们对加密劫持的行为、生命周期、影响、实现和可能的检测方法进行了彻底的分析。此外,我们创建了一个由114,985个样本组成的最新数据集,其中57,948个样本被归类为良性,57,037个样本被归类为加密劫持。该数据集被用于构建智能加密劫持检测系统,使用5种不同的卷积神经网络模型对数据集的一个子集进行训练和评估。表现最好的模型准确率为98.4%,F1-Score为98.3%,精密度为98.4%,召回率为98.4%。我们提出的方法,包括在隔离的环境中运行Windows可执行文件并密切监视其CPU使用情况,提供了对加密劫持恶意软件行为的透彻理解,并能够检测恶意软件。收集到的全面数据集有助于高效的检测模型开发。此外,用5种不同的CNN算法评估数据集,并使用既定的评估指标评估其性能,确保了我们提出的方法和数据集的有效性。
{"title":"Smart Analysis and Detection System for New Host-Based Cryptojacking Malware Dataset","authors":"Hadeel Almurshid","doi":"10.5455/jeas.2023050105","DOIUrl":"https://doi.org/10.5455/jeas.2023050105","url":null,"abstract":"Cryptocurrency is a quickly growing technology in the finance industry, with the first cryptocurrency, Bitcoin, being created in 2009. Each cryptocurrency has its own unique hash value, and cryptocurrency mining involves participating in a guessing competition to release a unique hash into circulation, with the winner receiving a modest bonus in the form of bitcoin. However, as more bitcoins are discovered, it becomes increasingly difficult to obtain more, resulting in a need for extra computer resources and power. Consequently, the increasing popularity of cryptocurrency has led to a rise in cryptojacking malware, which secretly uses victims' computing resources to mine cryptocurrency. This malware can be either web-based or host-based, with similar execution and goals but differing in implementation and injection. Cryptojacking has affected numerous devices worldwide, but few studies have been carried out to detect it, especially the host-based type. Furthermore, the current studies on cryptojacking have limited datasets, which are often outdated or small, and the prediction models developed from these datasets may not be accurate. To address this gap, we conducted a thorough analysis of cryptojacking's behavior, lifecycle, impact, implementations, and possible detection methods. Additionally, we created an up-to-date dataset consisting of 114,985 samples, with 57,948 categorized as benign and 57,037 as cryptojacking. The dataset was used to build a smart cryptojacking detection system, with 5 different convolutional neural network models trained and evaluated against a subset of the dataset. The best performing model achieved an accuracy of 98.4%, an F1-Score of 98.3%, a precision of 98.4%, and a recall of 98.4%. Our proposed method, which involves running Windows executables in an isolated environment and closely monitoring their CPU usage, provides a thorough understanding of cryptojacking malware behavior and enables detection of the malware. The comprehensive dataset collected facilitates efficient detection model development. Additionally, evaluating the dataset with 5 different CNN algorithms and assessing their performance using established evaluation metrics ensures the effectiveness of our proposed method and dataset.","PeriodicalId":15681,"journal":{"name":"Journal of Engineering and Applied Sciences","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84253979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Engineering and Applied Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1