首页 > 最新文献

The International Arab Journal of Information Technology最新文献

英文 中文
An On-Site Electronic Voting System Using Blockchain and Biometrics 使用区块链和生物识别技术的现场电子投票系统
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/13
Shu-Fen Tu, Ching-Sheng Hsu, Bo-Long You
Electronic voting (e-voting) improves the convenience of voting and the efficiency of vote counting. With the rise of blockchain technology, many studies have proposed e-voting systems using blockchain technology. Most of them consider the usage scenario of remote voting and pay less attention to that of voting conducted at polling stations. In view of this research gap, this study proposed a blockchain-based system for e-voting at polling stations. We designed a system process integrating blockchain technology and voter’s biometrics to prevent data tampering and imposter voting. In addition, the blockchain platform adopted in our proposed system is Hyperledger Fabric (HF). Therefore, based on the HF framework, we specified how to deploy a blockchain network customized for this study. Finally, this study provided a property analysis of the proposed system and implemented a simulation system. In conclusion, the proposed system meets the requirements e-voting from two aspects. First, in terms of technology, our system adopted blockchain, digital signature, and biometric identification to achieve eligibility and immutability. Second, in terms of system process, the roles of government agencies and inspectors are incorporated to achieve transparency, receipt-freeness and accessibility
电子投票(e-voting)提高了投票的便利性和计票的效率。随着区块链技术的兴起,许多研究提出了使用区块链技术的电子投票系统。他们大多考虑远程投票的使用场景,而较少关注在投票站进行的投票。鉴于这一研究差距,本研究提出了一种基于区块链的投票站电子投票系统。我们设计了一个集成区块链技术和选民生物识别技术的系统流程,以防止数据篡改和冒名投票。此外,我们提出的系统采用的区块链平台是Hyperledger Fabric (HF)。因此,基于HF框架,我们指定了如何部署为本研究定制的区块链网络。最后,对所提出的系统进行了性能分析,并实现了仿真系统。综上所述,本系统从两个方面满足了电子投票的要求。首先,在技术方面,我们的系统采用了区块链、数字签名和生物识别技术,实现了资格和不变性。第二,在制度流程方面,纳入政府机构和检查人员的角色,实现透明、无收据和可及性
{"title":"An On-Site Electronic Voting System Using Blockchain and Biometrics","authors":"Shu-Fen Tu, Ching-Sheng Hsu, Bo-Long You","doi":"10.34028/iajit/20/5/13","DOIUrl":"https://doi.org/10.34028/iajit/20/5/13","url":null,"abstract":"Electronic voting (e-voting) improves the convenience of voting and the efficiency of vote counting. With the rise of blockchain technology, many studies have proposed e-voting systems using blockchain technology. Most of them consider the usage scenario of remote voting and pay less attention to that of voting conducted at polling stations. In view of this research gap, this study proposed a blockchain-based system for e-voting at polling stations. We designed a system process integrating blockchain technology and voter’s biometrics to prevent data tampering and imposter voting. In addition, the blockchain platform adopted in our proposed system is Hyperledger Fabric (HF). Therefore, based on the HF framework, we specified how to deploy a blockchain network customized for this study. Finally, this study provided a property analysis of the proposed system and implemented a simulation system. In conclusion, the proposed system meets the requirements e-voting from two aspects. First, in terms of technology, our system adopted blockchain, digital signature, and biometric identification to achieve eligibility and immutability. Second, in terms of system process, the roles of government agencies and inspectors are incorporated to achieve transparency, receipt-freeness and accessibility","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115801103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
دور تحليل مخرجات شبكات الحاسب الآلي في مواجهة الجريمة 计算机网络产出分析应对犯罪的作用
Pub Date : 1900-01-01 DOI: 10.26735/16585933.2018.002
عبد المجيد, محمد صادق عبد الرزاق
{"title":"دور تحليل مخرجات شبكات الحاسب الآلي في مواجهة الجريمة","authors":"عبد المجيد, محمد صادق عبد الرزاق","doi":"10.26735/16585933.2018.002","DOIUrl":"https://doi.org/10.26735/16585933.2018.002","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ciphertext-Only Attack on RSA Using Lattice Basis Reduction 基于格基约简的RSA纯密文攻击
Pub Date : 1900-01-01 DOI: 10.34028/iajit/18/2/13
We use lattice basis reduction for ciphertext-only attack on RSA. Our attack is applicable in the conditions when known attacks are not applicable, and, contrary to known attacks, it does not require prior knowledge of a part of a message or key, small encryption key, e, or message broadcasting. Our attack is successful when a vector, comprised of a message and its exponent, is likely to be the shortest in the lattice, and meets Minkowski's Second Theorem bound. We have conducted experiments for message, keys, and encryption/decryption keys with sizes from 40 to 8193 bits, with dozens of thousands of successful RSA cracks. It took about 45 seconds for cracking 2001 messages of 2050 bits and for large public key values related with Euler’s totient function, and the same order private keys. Based on our findings, for RSA not to be susceptible to the proposed attack, it is recommended avoiding RSA public key form used in our experiments
我们将格基约简用于RSA的纯密文攻击。我们的攻击适用于已知攻击不适用的情况,并且与已知攻击相反,它不需要事先知道消息或密钥的一部分、小加密密钥、e或消息广播。当由消息及其指数组成的向量很可能是晶格中最短的,并且满足闵可夫斯基第二定理界时,我们的攻击是成功的。我们已经对大小从40到8193位的消息、密钥和加密/解密密钥进行了实验,并成功地进行了成千上万次RSA破解。破解2050位的2001条消息,以及与欧拉函数相关的大公钥值和相同顺序的私钥,大约需要45秒。根据我们的研究结果,为了使RSA不容易受到提议的攻击,建议避免在我们的实验中使用RSA公钥形式
{"title":"Ciphertext-Only Attack on RSA Using Lattice Basis Reduction","authors":"","doi":"10.34028/iajit/18/2/13","DOIUrl":"https://doi.org/10.34028/iajit/18/2/13","url":null,"abstract":"We use lattice basis reduction for ciphertext-only attack on RSA. Our attack is applicable in the conditions when known attacks are not applicable, and, contrary to known attacks, it does not require prior knowledge of a part of a message or key, small encryption key, e, or message broadcasting. Our attack is successful when a vector, comprised of a message and its exponent, is likely to be the shortest in the lattice, and meets Minkowski's Second Theorem bound. We have conducted experiments for message, keys, and encryption/decryption keys with sizes from 40 to 8193 bits, with dozens of thousands of successful RSA cracks. It took about 45 seconds for cracking 2001 messages of 2050 bits and for large public key values related with Euler’s totient function, and the same order private keys. Based on our findings, for RSA not to be susceptible to the proposed attack, it is recommended avoiding RSA public key form used in our experiments","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121825847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
استخدام فيديوهات تفاعلية على موقع يوتيوب (YouTube) للتعامل مع التهديدات الأمنية في مجال تكنولوجيا المعلومات والاتصالات 利用YouTube互动视频处理信息和通信技术安全威胁
Pub Date : 1900-01-01 DOI: 10.26735/16585933.2018.004
يسلم السقاف
{"title":"استخدام فيديوهات تفاعلية على موقع يوتيوب (YouTube) للتعامل مع التهديدات الأمنية في مجال تكنولوجيا المعلومات والاتصالات","authors":"يسلم السقاف","doi":"10.26735/16585933.2018.004","DOIUrl":"https://doi.org/10.26735/16585933.2018.004","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"780 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122628959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments 多风环境下具有时间和能量优先的四旋翼飞行器航路规划优化
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/11
H. Incekara, M. Selek, F. Basçiftçi
Route planning studies are of great importance for quadrotors, which are widely used in military and civil fields, to perform their duties autonomously and efficiently. In the study, a method is proposed that enables Quadrotor Route Planning (QRP) to be optimized with time priority and energy priority by using Genetic Algorithm (GA). For the proposed method, the Wind Effected QRP-App (WEQRP-App) desktop software was developed with the Visual Studio C# programming language. In the developed WEQRP-App, real location information from GMAP.Net map plugin and real wind data from the website of the General Directorate of Meteorology were used. Using Wind Effected Quadrotor Route Planning (WEQRP) method, more realistic planning was made before the flight and the flight efficiency was increased in terms of time and energy priority. Thus, it is foreseen that safer and less costly autonomous flights will take place when compared to the Standard QRP (SQRP) created without taking into account the wind effect, by avoiding the problems that arise due to unexpected energy consumption during the flight mission. When the results obtained from the proposed method were examined, it has been observed that WEQRP provides the improvements up to 13,5% in flight times and up to 27,4% in energy consumption according to SQRP
四旋翼飞行器广泛应用于军事和民用领域,航路规划研究对其自主高效地执行任务具有重要意义。提出了一种利用遗传算法(GA)对四旋翼飞行器航路规划(QRP)进行时间优先和能量优先优化的方法。针对所提出的方法,利用Visual Studio c#编程语言开发了Wind effects QRP-App (WEQRP-App)桌面软件。在开发的WEQRP-App中,真实位置信息来源于GMAP。Net地图插件和气象总局网站上的真实风数据被使用。采用风影响四旋翼航路规划(WEQRP)方法,在飞行前进行更真实的规划,从时间和能量优先度上提高了飞行效率。因此,可以预见的是,与没有考虑风效应的标准QRP (SQRP)相比,通过避免飞行任务期间因意外能源消耗而产生的问题,将实现更安全、成本更低的自主飞行。当从所提出的方法中获得的结果进行检验时,已经观察到WEQRP提供了高达13.5%的飞行时间改进和高达27.4%的能量消耗根据SQRP
{"title":"Optimization of Quadrotor Route Planning with Time and Energy Priority in Windy Environments","authors":"H. Incekara, M. Selek, F. Basçiftçi","doi":"10.34028/iajit/20/5/11","DOIUrl":"https://doi.org/10.34028/iajit/20/5/11","url":null,"abstract":"Route planning studies are of great importance for quadrotors, which are widely used in military and civil fields, to perform their duties autonomously and efficiently. In the study, a method is proposed that enables Quadrotor Route Planning (QRP) to be optimized with time priority and energy priority by using Genetic Algorithm (GA). For the proposed method, the Wind Effected QRP-App (WEQRP-App) desktop software was developed with the Visual Studio C# programming language. In the developed WEQRP-App, real location information from GMAP.Net map plugin and real wind data from the website of the General Directorate of Meteorology were used. Using Wind Effected Quadrotor Route Planning (WEQRP) method, more realistic planning was made before the flight and the flight efficiency was increased in terms of time and energy priority. Thus, it is foreseen that safer and less costly autonomous flights will take place when compared to the Standard QRP (SQRP) created without taking into account the wind effect, by avoiding the problems that arise due to unexpected energy consumption during the flight mission. When the results obtained from the proposed method were examined, it has been observed that WEQRP provides the improvements up to 13,5% in flight times and up to 27,4% in energy consumption according to SQRP","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116966552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption 使用代理重新加密的基于区块链的可扩展和安全的EHR数据共享
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/2
Naresh Sammeta, L. Parthiban
Electronic Health Record (EHR) includes highly sensitive data like medical images, prescriptions, medical test result, medical history of patients, etc., These sensitive data cannot be transmitted in its original form in the network due to security issues. Hence, encryption is done prior to transmission. To increase the speed of data transfer and to overcome the storage issues, data is usually transferred through the cloud. Hence, to ensure the security and scalability of the data, a third-party encryption called re-encryption is performed at the proxy cloud. This re-encryption ensures that the data can be reliably transmitted through the network. In this research, a novel scheme called block-chain based EHR data sharing using chaotic re-encryption (BC-EDS-CR) is proposed. In the proposed scheme, re-encryption is performed using chaos theory. The proposed re-encryption scheme ensures that the cloud administrator cannot access the medical data. Metrics such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index (SSIM), entropy and correlation coefficient are used in evaluating this scheme. It was found that the proposed scheme outperforms the existing methods by achieving a PSNR of 57.66, SSIM of 0.985 and MSE of 0.058.
电子健康记录(Electronic Health Record, EHR)包含医疗图像、处方、医疗检查结果、患者病史等高度敏感的数据,由于安全问题,这些敏感数据无法在网络中以原始形式传输。因此,加密是在传输之前完成的。为了提高数据传输的速度并克服存储问题,数据通常通过云传输。因此,为了确保数据的安全性和可伸缩性,在代理云上执行称为重新加密的第三方加密。这种重新加密确保了数据可以通过网络可靠地传输。本研究提出了一种基于区块链的混沌重加密EHR数据共享方案(BC-EDS-CR)。在该方案中,利用混沌理论进行重加密。提出的重新加密方案可确保云管理员无法访问医疗数据。采用峰值信噪比(PSNR)、均方误差(MSE)、结构相似指数(SSIM)、熵和相关系数等指标对该方案进行评价。结果表明,该方案的PSNR为57.66,SSIM为0.985,MSE为0.058,优于现有方法。
{"title":"Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption","authors":"Naresh Sammeta, L. Parthiban","doi":"10.34028/iajit/20/5/2","DOIUrl":"https://doi.org/10.34028/iajit/20/5/2","url":null,"abstract":"Electronic Health Record (EHR) includes highly sensitive data like medical images, prescriptions, medical test result, medical history of patients, etc., These sensitive data cannot be transmitted in its original form in the network due to security issues. Hence, encryption is done prior to transmission. To increase the speed of data transfer and to overcome the storage issues, data is usually transferred through the cloud. Hence, to ensure the security and scalability of the data, a third-party encryption called re-encryption is performed at the proxy cloud. This re-encryption ensures that the data can be reliably transmitted through the network. In this research, a novel scheme called block-chain based EHR data sharing using chaotic re-encryption (BC-EDS-CR) is proposed. In the proposed scheme, re-encryption is performed using chaos theory. The proposed re-encryption scheme ensures that the cloud administrator cannot access the medical data. Metrics such as Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Structural Similarity Index (SSIM), entropy and correlation coefficient are used in evaluating this scheme. It was found that the proposed scheme outperforms the existing methods by achieving a PSNR of 57.66, SSIM of 0.985 and MSE of 0.058.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GovdeTurk: A Novel Turkish Natural Language Processing Tool for Stemming, Morphological Labelling and Verb Negation 一个新颖的土耳其语自然语言处理工具,用于词干提取,形态标记和动词否定
Pub Date : 1900-01-01 DOI: 10.34028/iajit/18/2/3
GovdeTurk is a tool for stemming, morphological labeling and verb negation for Turkish language. We designed comprehensive finite automata to represent Turkish grammar rules. Based on these automata, GovdeTurk finds the stem of the word by removing the inflectional suffixes in a longest match strategy. Levenshtein Distance is used to correct spelling errors that may occur during suffix removal. Morphological labeling identifies the functionality of a given token. Nine different dictionaries are constructed for each specific word type. These dictionaries are used in the stemming and morphological labeling. Verb negation module is developed for lexicon based sentiment analysis. GovdeTurk is tested on a dataset of one million words. The results are compared with Zemberek and Turkish Snowball Algorithm. While the closest competitor, Zemberek, in the stemming step has an accuracy of 80%, GovdeTurk gives 97.3% of accuracy. Morphological labeling accuracy of GovdeTurk is 93.6%. With outperforming results, our model becomes foremost among its competitors
GovdeTurk是一个土耳其语词干提取、词形标注和动词否定工具。我们设计了全面的有限自动机来表示土耳其语法规则。基于这些自动机,GovdeTurk通过在最长匹配策略中去除屈折后缀来找到单词的词干。Levenshtein Distance用于纠正后缀删除过程中可能出现的拼写错误。形态标记识别给定标记的功能。为每个特定的单词类型构建了9个不同的字典。这些词典用于词干提取和词法标注。针对基于词汇的情感分析,开发了动词否定模块。GovdeTurk在100万个单词的数据集上进行了测试。结果与Zemberek算法和土耳其雪球算法进行了比较。虽然最接近的竞争对手Zemberek在词干步骤中的准确率为80%,但GovdeTurk的准确率为97.3%。godeturk的形态学标注准确率为93.6%。我们的模型表现优异,在竞争对手中名列前茅
{"title":"GovdeTurk: A Novel Turkish Natural Language Processing Tool for Stemming, Morphological Labelling and Verb Negation","authors":"","doi":"10.34028/iajit/18/2/3","DOIUrl":"https://doi.org/10.34028/iajit/18/2/3","url":null,"abstract":"GovdeTurk is a tool for stemming, morphological labeling and verb negation for Turkish language. We designed comprehensive finite automata to represent Turkish grammar rules. Based on these automata, GovdeTurk finds the stem of the word by removing the inflectional suffixes in a longest match strategy. Levenshtein Distance is used to correct spelling errors that may occur during suffix removal. Morphological labeling identifies the functionality of a given token. Nine different dictionaries are constructed for each specific word type. These dictionaries are used in the stemming and morphological labeling. Verb negation module is developed for lexicon based sentiment analysis. GovdeTurk is tested on a dataset of one million words. The results are compared with Zemberek and Turkish Snowball Algorithm. While the closest competitor, Zemberek, in the stemming step has an accuracy of 80%, GovdeTurk gives 97.3% of accuracy. Morphological labeling accuracy of GovdeTurk is 93.6%. With outperforming results, our model becomes foremost among its competitors","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126598058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System 智能自适应神经模糊方法在构件软件系统可重用性中的应用
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/10
Jyoti Agarwal, M. Kumar, Mugdha Sharma, Deepak Verma, Richa Sharma
Component Based Software System (CBSS) provides an easy and efficient way to develop new software application with the help of existing software components of similar functionalities. It increases the reusability of software components and reduce the development time, cost and effort of software developers. To select the appropriate component, it become essential to assess the reusability of software components so that suitable component can be selected to reuse in another application. For assessing the reusability of CBSS, several factors are required to be considered. In this paper, four reusability sub-factors Interface Complexity (IC), Understandability (Un), Customizability (Co) and Reliability (Re) are used as input variables and reusability is assessed using Fuzzy Inference System (FIS) and Adaptive Neuro Fuzzy Inference System (ANFIS) approach because these two approaches are commonly used approach for assessing the quality factors. For experimental work, one case study has been done where rules are generated to assess reusability using four different reusability factors by taking feedback from researchers and academicians using online survey. Reusability was assessed for ten different values of input variables. Experiment shows that results obtained from ANFIS method were closer to the original values. Root Mean Square Error (RMSE) of FIS results was 6.05% which was further reduced by the application of ANFIS approach and finally 2.20% of RMSE was achieved. This research work will be helpful for software developers and researchers to assess the reusability of software components and they will be able to take corrective decision for choosing the appropriate component to be reused in new software applications, which will reduce their effort, time and cost of development
基于组件的软件系统(Component Based Software System, CBSS)提供了一种简单有效的方法,可以利用已有的功能相似的软件组件开发新的软件应用程序。它增加了软件组件的可重用性,减少了软件开发人员的开发时间、成本和工作量。为了选择合适的组件,必须评估软件组件的可重用性,以便选择合适的组件以在另一个应用程序中重用。为了评估CBSS的可重用性,需要考虑几个因素。本文以界面复杂性(IC)、可理解性(Un)、可定制性(Co)和可靠性(Re)四个可重用子因素作为输入变量,采用模糊推理系统(FIS)和自适应神经模糊推理系统(ANFIS)方法对可重用性进行评估,因为这两种方法是评估质量因素的常用方法。对于实验工作,已经完成了一个案例研究,其中通过使用在线调查从研究人员和学者那里获得反馈,生成规则来使用四种不同的可重用性因素来评估可重用性。对十个不同的输入变量值进行了可重用性评估。实验表明,ANFIS方法得到的结果更接近于原始值。FIS结果的均方根误差(RMSE)为6.05%,通过应用ANFIS方法进一步减小,最终RMSE为2.20%。这项研究工作将有助于软件开发人员和研究人员评估软件组件的可重用性,他们将能够在新的软件应用程序中选择合适的组件来进行重用,从而减少他们的工作、时间和开发成本
{"title":"Application of Intelligent Adaptive Neuro Fuzzy Method for Reusability of Component Based Software System","authors":"Jyoti Agarwal, M. Kumar, Mugdha Sharma, Deepak Verma, Richa Sharma","doi":"10.34028/iajit/20/5/10","DOIUrl":"https://doi.org/10.34028/iajit/20/5/10","url":null,"abstract":"Component Based Software System (CBSS) provides an easy and efficient way to develop new software application with the help of existing software components of similar functionalities. It increases the reusability of software components and reduce the development time, cost and effort of software developers. To select the appropriate component, it become essential to assess the reusability of software components so that suitable component can be selected to reuse in another application. For assessing the reusability of CBSS, several factors are required to be considered. In this paper, four reusability sub-factors Interface Complexity (IC), Understandability (Un), Customizability (Co) and Reliability (Re) are used as input variables and reusability is assessed using Fuzzy Inference System (FIS) and Adaptive Neuro Fuzzy Inference System (ANFIS) approach because these two approaches are commonly used approach for assessing the quality factors. For experimental work, one case study has been done where rules are generated to assess reusability using four different reusability factors by taking feedback from researchers and academicians using online survey. Reusability was assessed for ten different values of input variables. Experiment shows that results obtained from ANFIS method were closer to the original values. Root Mean Square Error (RMSE) of FIS results was 6.05% which was further reduced by the application of ANFIS approach and finally 2.20% of RMSE was achieved. This research work will be helpful for software developers and researchers to assess the reusability of software components and they will be able to take corrective decision for choosing the appropriate component to be reused in new software applications, which will reduce their effort, time and cost of development","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124627536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer 基于BTLBO和RNCA的混合特征选择诊断乳腺癌
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/5
Mohan Allam, Nandhini Malaiyappan
Feature selection is a feasible solution to improve the speed and performance of machine learning models. Optimization algorithms are doing a significant job in searching for optimal variables from feature space. Recent feature selection methods are purely depending on various meta heuristic algorithms for searching a good combination of features without considering the importance of individual features, which makes classification models to suffer from local optima or overfitting problems. In this paper, a novel hybrid feature subset selection technique is introduced based on Regularized Neighborhood Component Analysis (RNCA) and Binary Teaching Learning Based Optimization (BTLBO) algorithms to overcome the above problems. RNCA algorithm assigns weights to the attributes based on their contribution in building the learning models for classification. BTLBO algorithm computes the fitness of individuals with respect to the weights of features and selects the best ones. The results of similar feature selection methods are matched with the proposed hybrid model and proved better performance in terms of classification accuracy, recall and AUC measures over breast cancer datasets.
特征选择是提高机器学习模型速度和性能的可行方案。优化算法在从特征空间中寻找最优变量方面做着重要的工作。目前的特征选择方法纯粹依靠各种元启发式算法来搜索良好的特征组合,而不考虑单个特征的重要性,这使得分类模型容易出现局部最优或过拟合问题。本文提出了一种基于正则化邻域成分分析(RNCA)和二元教学优化(BTLBO)算法的混合特征子集选择技术,以克服上述问题。RNCA算法根据属性在构建分类学习模型中的贡献为属性分配权重。BTLBO算法根据特征的权重计算个体的适应度,并选择最优的个体。相似特征选择方法的结果与所提出的混合模型相匹配,并在乳腺癌数据集的分类精度、召回率和AUC度量方面证明了更好的性能。
{"title":"Hybrid Feature Selection based on BTLBO and RNCA to Diagnose the Breast Cancer","authors":"Mohan Allam, Nandhini Malaiyappan","doi":"10.34028/iajit/20/5/5","DOIUrl":"https://doi.org/10.34028/iajit/20/5/5","url":null,"abstract":"Feature selection is a feasible solution to improve the speed and performance of machine learning models. Optimization algorithms are doing a significant job in searching for optimal variables from feature space. Recent feature selection methods are purely depending on various meta heuristic algorithms for searching a good combination of features without considering the importance of individual features, which makes classification models to suffer from local optima or overfitting problems. In this paper, a novel hybrid feature subset selection technique is introduced based on Regularized Neighborhood Component Analysis (RNCA) and Binary Teaching Learning Based Optimization (BTLBO) algorithms to overcome the above problems. RNCA algorithm assigns weights to the attributes based on their contribution in building the learning models for classification. BTLBO algorithm computes the fitness of individuals with respect to the weights of features and selects the best ones. The results of similar feature selection methods are matched with the proposed hybrid model and proved better performance in terms of classification accuracy, recall and AUC measures over breast cancer datasets.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130067661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Focused Crawler Based on Reinforcement Learning and Decaying Epsilon-Greedy Exploration Policy 基于强化学习和衰减Epsilon-Greedy探索策略的聚焦爬虫
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/14
Parisa Begum Kaleel, Shina Sheen
In order to serve a diversified user base with a range of purposes, general search engines offer search results for a wide variety of topics and material categories on the internet. While Focused Crawlers (FC) deliver more specialized and targeted results inside particular domains or verticals, general search engines give a wider coverage of the web. For a vertical search engine, the performance of a focused crawler is extremely important, and several ways of improvement are applied. We propose an intelligent, focused crawler which uses Reinforcement Learning (RL) to prioritize the hyperlinks for long-term profit. Our implementation differs from other RL based works by encouraging learning at an early stage using a decaying ϵ-greedy policy to select the next link and hence enables the crawler to use the experience gained to improve its performance with more relevant pages. With an increase in the infertility rate all over the world, searching for information regarding the issues and details about artificial reproduction treatments available is in need by many people. Hence, we have considered infertility domain as a case study and collected web pages from scratch. We compare the performance of crawling tasks following ϵ-greedy and decaying ϵ-greedy policies. Experimental results show that crawlers following a decaying ϵ-greedy policy demonstrate better performance
为了满足多样化的用户群和不同的目的,一般的搜索引擎为互联网上各种各样的主题和材料类别提供搜索结果。当聚焦爬虫(FC)在特定领域或垂直领域提供更专业和有针对性的结果时,通用搜索引擎提供更广泛的网络覆盖。对于垂直搜索引擎来说,聚焦爬虫的性能是极其重要的,并应用了几种改进方法。我们提出了一个智能的、集中的爬虫,它使用强化学习(RL)来优先考虑长期利润的超链接。我们的实现与其他基于强化学习的工作不同,它鼓励在早期阶段使用衰减ϵ-greedy策略来选择下一个链接,从而使爬虫能够使用获得的经验来使用更多相关页面来提高其性能。随着全世界不孕率的增加,许多人都需要搜索有关人工生殖治疗的问题和细节的信息。因此,我们将不孕不育领域作为案例研究,并从零开始收集网页。我们比较了ϵ-greedy策略和衰减ϵ-greedy策略下爬行任务的性能。实验结果表明,采用衰减ϵ-greedy策略的爬虫具有较好的性能
{"title":"Focused Crawler Based on Reinforcement Learning and Decaying Epsilon-Greedy Exploration Policy","authors":"Parisa Begum Kaleel, Shina Sheen","doi":"10.34028/iajit/20/5/14","DOIUrl":"https://doi.org/10.34028/iajit/20/5/14","url":null,"abstract":"In order to serve a diversified user base with a range of purposes, general search engines offer search results for a wide variety of topics and material categories on the internet. While Focused Crawlers (FC) deliver more specialized and targeted results inside particular domains or verticals, general search engines give a wider coverage of the web. For a vertical search engine, the performance of a focused crawler is extremely important, and several ways of improvement are applied. We propose an intelligent, focused crawler which uses Reinforcement Learning (RL) to prioritize the hyperlinks for long-term profit. Our implementation differs from other RL based works by encouraging learning at an early stage using a decaying ϵ-greedy policy to select the next link and hence enables the crawler to use the experience gained to improve its performance with more relevant pages. With an increase in the infertility rate all over the world, searching for information regarding the issues and details about artificial reproduction treatments available is in need by many people. Hence, we have considered infertility domain as a case study and collected web pages from scratch. We compare the performance of crawling tasks following ϵ-greedy and decaying ϵ-greedy policies. Experimental results show that crawlers following a decaying ϵ-greedy policy demonstrate better performance","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126811990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The International Arab Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1