首页 > 最新文献

International Journal of Informatics and Communication Technology (IJ-ICT)最新文献

英文 中文
Factors affecting customers intention towards online pharmacies in Indonesian market 影响印尼市场顾客对网上药店消费意向的因素
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp91-100
Ferawaty Ferawaty, Wakky Antonio, Adilla Anggraeni
Online pharmacies are a promising business model for promoting online sales of medicines. The purpose of this study is to investigate how technology acceptance model (TAM) variables (perceived ease of use and perceived usefulness), perceived trust, perceived performance risk, and perceived physical risk influence customers' intention to use online pharmacy. A questionnaire survey was used to collect data for the planned study. The results showed that perception of trust is a critical factor influencing costomers intention to use an online pharmacy. The reluctance of customers to buy medicines, categorized as risk, through online pharmacies which was originally thought to be a determining factor, has no impact if customer trust in online pharmacy has been formed. This study has several relevances for advancing online pharmacy promotion including the importances of user-friendly and benefits provided by online pharmacies provider. It is very important how online pharmacies providers can increase customers trust in terms of legality, quality and security of personal data.
网上药店是促进药品在线销售的一种前景广阔的商业模式。本研究旨在探讨技术接受模型(TAM)变量(感知易用性和感知有用性)、感知信任、感知绩效风险和感知物理风险如何影响顾客使用网上药店的意愿。本研究采用问卷调查的方式收集数据。结果显示,信任感是影响顾客使用网上药店意愿的关键因素。顾客不愿通过网上药店购买被归类为风险的药品,原本被认为是一个决定性因素,但如果顾客对网上药店形成了信任,那么这一因素就不会产生影响。这项研究对促进网上药店的推广有多方面的意义,包括网上药店提供商提供的用户友好和好处的重要性。网上药店提供商如何在合法性、质量和个人数据安全方面提高客户信任度非常重要。
{"title":"Factors affecting customers intention towards online pharmacies in Indonesian market","authors":"Ferawaty Ferawaty, Wakky Antonio, Adilla Anggraeni","doi":"10.11591/ijict.v13i1.pp91-100","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp91-100","url":null,"abstract":"Online pharmacies are a promising business model for promoting online sales of medicines. The purpose of this study is to investigate how technology acceptance model (TAM) variables (perceived ease of use and perceived usefulness), perceived trust, perceived performance risk, and perceived physical risk influence customers' intention to use online pharmacy. A questionnaire survey was used to collect data for the planned study. The results showed that perception of trust is a critical factor influencing costomers intention to use an online pharmacy. The reluctance of customers to buy medicines, categorized as risk, through online pharmacies which was originally thought to be a determining factor, has no impact if customer trust in online pharmacy has been formed. This study has several relevances for advancing online pharmacy promotion including the importances of user-friendly and benefits provided by online pharmacies provider. It is very important how online pharmacies providers can increase customers trust in terms of legality, quality and security of personal data.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140745098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting anomalies in computer networks using autoencoder-based representation learning 利用基于自动编码器的表征学习预测计算机网络中的异常情况
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp9-26
Shehram Sikander Khan, A. Mailewa
Recent improvements in the internet of things (IoT), cloud services, and network data variety have increased the demand for complex anomaly detection algorithms in network intrusion detection systems (IDSs) capable of dealing with sophisticated network threats. Academics are interested in deep and machine learning (ML) breakthroughs because they have the potential to address complex challenges such as zero-day attacks. In comparison to firewalls, IDS are the initial line of network security. This study suggests merging supervised and unsupervised learning in identification systems IDS. Support vector machine (SVM) is an anomaly-based classification classifier. Deep autoencoder (DAE) lowers dimensionality. DAE are compared to principal component analysis (PCA) in this study, and hyper-parameters for F-1 micro score and balanced accuracy are specified. We have an uneven set of data classes. precision-recall curves, average precision (AP) score, train-test times, t-SNE, grid search, and L1/L2 regularization methods are used. KDDTrain+ and KDDTest+ datasets will be used in our model. For classification and performance, the DAE+SVM neural network technique is successful. Autoencoders outperformed linear PCA in terms of capturing valuable input attributes using t-SNE to embed high dimensional inputs on a two-dimensional plane. Our neural system outperforms solo SVM and PCA encoded SVM in multi-class scenarios.
最近,物联网(IoT)、云服务和网络数据种类的改进增加了对能够应对复杂网络威胁的网络入侵检测系统(IDS)中复杂异常检测算法的需求。学术界对深度学习和机器学习(ML)的突破很感兴趣,因为它们有可能应对零日攻击等复杂挑战。与防火墙相比,IDS 是网络安全的第一道防线。本研究建议在 IDS 识别系统中融合监督学习和非监督学习。支持向量机(SVM)是一种基于异常的分类器。深度自动编码器(DAE)可降低维度。在这项研究中,DAE 与主成分分析(PCA)进行了比较,并指定了 F-1 微分和平衡准确率的超参数。我们使用了精度-召回曲线、平均精度 (AP) 分数、训练-测试时间、t-SNE、网格搜索和 L1/L2 正则化方法。我们的模型将使用 KDDTrain+ 和 KDDTest+ 数据集。在分类和性能方面,DAE+SVM 神经网络技术是成功的。在利用 t-SNE 将高维输入嵌入二维平面以捕捉有价值的输入属性方面,自动编码器的表现优于线性 PCA。在多类场景中,我们的神经系统优于独奏 SVM 和 PCA 编码 SVM。
{"title":"Predicting anomalies in computer networks using autoencoder-based representation learning","authors":"Shehram Sikander Khan, A. Mailewa","doi":"10.11591/ijict.v13i1.pp9-26","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp9-26","url":null,"abstract":"Recent improvements in the internet of things (IoT), cloud services, and network data variety have increased the demand for complex anomaly detection algorithms in network intrusion detection systems (IDSs) capable of dealing with sophisticated network threats. Academics are interested in deep and machine learning (ML) breakthroughs because they have the potential to address complex challenges such as zero-day attacks. In comparison to firewalls, IDS are the initial line of network security. This study suggests merging supervised and unsupervised learning in identification systems IDS. Support vector machine (SVM) is an anomaly-based classification classifier. Deep autoencoder (DAE) lowers dimensionality. DAE are compared to principal component analysis (PCA) in this study, and hyper-parameters for F-1 micro score and balanced accuracy are specified. We have an uneven set of data classes. precision-recall curves, average precision (AP) score, train-test times, t-SNE, grid search, and L1/L2 regularization methods are used. KDDTrain+ and KDDTest+ datasets will be used in our model. For classification and performance, the DAE+SVM neural network technique is successful. Autoencoders outperformed linear PCA in terms of capturing valuable input attributes using t-SNE to embed high dimensional inputs on a two-dimensional plane. Our neural system outperforms solo SVM and PCA encoded SVM in multi-class scenarios.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"21 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140742004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic accident classification using IndoBERT 使用 IndoBERT 进行交通事故分类
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp42-49
Muhammad Alwan Naufal, A. S. Girsang
Traffic accidents are a widespread concern globally, causing loss of life, injuries, and economic burdens. Efficiently classifying accident types is crucial for effective accident management and prevention. This study proposes a practical approach for traffic accident classification using IndoBERT, a language model specifically trained for Indonesian. The classification task involves sorting accidents into four classes: car accidents, motorcycle accidents, bus accidents, and others. The proposed model achieves a 94% accuracy in categorizing these accidents. To assess its performance, we compared IndoBERT with traditional methods, random forest (RF) and support vector machine (SVM), which achieved accuracy scores of 85% and 87%, respectively. The IndoBERT-based model demonstrates its effectiveness in handling the complexities of the Indonesian language, providing a useful tool for traffic accident classification and contributing to improved accident management and prevention strategies.
交通事故是全球普遍关注的问题,造成人员伤亡和经济负担。对事故类型进行有效分类对于有效管理和预防事故至关重要。本研究提出了一种实用的交通事故分类方法,即使用专门针对印尼语训练的语言模型 IndoBERT 进行分类。分类任务包括将事故分为四类:汽车事故、摩托车事故、公共汽车事故和其他事故。所建议的模型在对这些事故进行分类时达到了 94% 的准确率。为了评估其性能,我们将 IndoBERT 与传统方法随机森林(RF)和支持向量机(SVM)进行了比较,这两种方法的准确率分别为 85% 和 87%。基于 IndoBERT 的模型证明了其在处理复杂的印尼语方面的有效性,为交通事故分类提供了有用的工具,有助于改进事故管理和预防策略。
{"title":"Traffic accident classification using IndoBERT","authors":"Muhammad Alwan Naufal, A. S. Girsang","doi":"10.11591/ijict.v13i1.pp42-49","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp42-49","url":null,"abstract":"Traffic accidents are a widespread concern globally, causing loss of life, injuries, and economic burdens. Efficiently classifying accident types is crucial for effective accident management and prevention. This study proposes a practical approach for traffic accident classification using IndoBERT, a language model specifically trained for Indonesian. The classification task involves sorting accidents into four classes: car accidents, motorcycle accidents, bus accidents, and others. The proposed model achieves a 94% accuracy in categorizing these accidents. To assess its performance, we compared IndoBERT with traditional methods, random forest (RF) and support vector machine (SVM), which achieved accuracy scores of 85% and 87%, respectively. The IndoBERT-based model demonstrates its effectiveness in handling the complexities of the Indonesian language, providing a useful tool for traffic accident classification and contributing to improved accident management and prevention strategies.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"30 16","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140744987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review-based analysis of clustering approaches in a recommendation system 基于评论的推荐系统聚类方法分析
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp1-8
Sabeena Yasmin Hera, Mohammad Amjad
Because of the explosion in data, it is now incredibly difficult for a single person to filter through all of the information and extract what they need. As a result, information filtering algorithms are necessary to uncover meaningful information from the massive amount of data already available online. Users can benefit from recommendation systems (RSs) since they simplify the process of identifying relevant information. User ratings are incredibly significant for creating recommendations. Previously, academics relied on historical user ratings to predict future ratings, but today, consumers are paying more attention to user reviews because they contain so much relevant information about the user's decision. The proposed approach uses written testimonials to overcome the issue of doubt in the ratings' pasts. Using two data sets, we performed experimental evaluations of the proposed framework. For prediction, clustering algorithms are used with natural language processing in this strategy. It also evaluates the findings of various methods, such as the K-mean, spectral, and hierarchical clustering algorithms, and offers conclusions on which strategy is optimal for the supplied use cases. In addition, we demonstrate that the proposed technique outperforms alternatives that do not involve clustering.
由于数据的爆炸式增长,现在一个人很难从所有信息中筛选出自己需要的信息。因此,有必要使用信息过滤算法,从网上已有的海量数据中挖掘出有意义的信息。用户可以从推荐系统(RS)中获益,因为它们简化了识别相关信息的过程。用户评级对于创建推荐具有难以置信的重要意义。以前,学术界依靠历史用户评分来预测未来评分,但如今,消费者更加关注用户评论,因为它们包含了大量与用户决策相关的信息。所提出的方法利用书面推荐来克服对过去评分的怀疑问题。我们使用两个数据集对所提出的框架进行了实验评估。在预测方面,该策略使用了聚类算法和自然语言处理技术。它还评估了各种方法(如 K 均值、光谱和分层聚类算法)的结果,并就哪种策略最适合所提供的使用案例给出了结论。此外,我们还证明了所提出的技术优于不涉及聚类的其他方法。
{"title":"Review-based analysis of clustering approaches in a recommendation system","authors":"Sabeena Yasmin Hera, Mohammad Amjad","doi":"10.11591/ijict.v13i1.pp1-8","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp1-8","url":null,"abstract":"Because of the explosion in data, it is now incredibly difficult for a single person to filter through all of the information and extract what they need. As a result, information filtering algorithms are necessary to uncover meaningful information from the massive amount of data already available online. Users can benefit from recommendation systems (RSs) since they simplify the process of identifying relevant information. User ratings are incredibly significant for creating recommendations. Previously, academics relied on historical user ratings to predict future ratings, but today, consumers are paying more attention to user reviews because they contain so much relevant information about the user's decision. The proposed approach uses written testimonials to overcome the issue of doubt in the ratings' pasts. Using two data sets, we performed experimental evaluations of the proposed framework. For prediction, clustering algorithms are used with natural language processing in this strategy. It also evaluates the findings of various methods, such as the K-mean, spectral, and hierarchical clustering algorithms, and offers conclusions on which strategy is optimal for the supplied use cases. In addition, we demonstrate that the proposed technique outperforms alternatives that do not involve clustering.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"26 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hen maternal care inspired optimization framework for attack detection in wireless smart grid network 针对无线智能电网网络攻击检测的母婴护理启发优化框架
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp123-130
Narmadha Ganesamoorthy, B. Sakthivel, Deivasigamani Subbramania, K. Balasubadra
In the power grid, communication networks play an important role in exchanging smart grid-based information. In contrast to wired communication, wireless communication offers many benefits in terms of easy setup connections and low-cost high-speed links. Conversely, wireless communications are commonly more vulnerable to security threats than wired ones. All power equipment devices and appliances in the smart distribution grid (SDG) are communicated through wireless networks only. Most security research focuses on keeping the SDG network from different types of attacks. The denial-of-service (DoS) attack is consuming more energy in the network leads to a permanent breakdown of memory. This work proposes a new metaheuristic optimization inspired by maternal care of hen to their children called hen maternal care (HMCO) inspired optimization. The HMCO algorithm mimics the care shown by hen for their children in nature. The mother hen is always watchful and protects its chicks against predators. All chickens utilize different calls to designate flying predators like falcons and owls from ground seekers like foxes and coyotes, showing that they can both survey a danger and advise different chickens how to set themselves up. Our method shows greater performance among other standard algorithms.
在电网中,通信网络在交换智能电网信息方面发挥着重要作用。与有线通信相比,无线通信具有安装连接简便、高速链接成本低等诸多优势。相反,无线通信通常比有线通信更容易受到安全威胁。智能配电网(SDG)中的所有电力设备装置和电器都只能通过无线网络进行通信。大多数安全研究的重点是防止 SDG 网络受到不同类型的攻击。拒绝服务(DoS)攻击在网络中消耗更多能量,导致内存永久瘫痪。这项工作提出了一种新的元搜索优化方法,其灵感来自母鸡对其子女的母性关怀,称为母鸡母性关怀(HMCO)启发优化。HMCO 算法模仿了自然界中母鸡对子女的关爱。母鸡总是小心翼翼地保护小鸡,防止天敌入侵。所有的鸡都会发出不同的叫声,将猎鹰和猫头鹰等飞行捕食者与狐狸和郊狼等地面捕食者区分开来,这表明它们既能勘察危险,又能建议不同的鸡如何进行自我保护。与其他标准算法相比,我们的方法表现出更高的性能。
{"title":"Hen maternal care inspired optimization framework for attack detection in wireless smart grid network","authors":"Narmadha Ganesamoorthy, B. Sakthivel, Deivasigamani Subbramania, K. Balasubadra","doi":"10.11591/ijict.v13i1.pp123-130","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp123-130","url":null,"abstract":"In the power grid, communication networks play an important role in exchanging smart grid-based information. In contrast to wired communication, wireless communication offers many benefits in terms of easy setup connections and low-cost high-speed links. Conversely, wireless communications are commonly more vulnerable to security threats than wired ones. All power equipment devices and appliances in the smart distribution grid (SDG) are communicated through wireless networks only. Most security research focuses on keeping the SDG network from different types of attacks. The denial-of-service (DoS) attack is consuming more energy in the network leads to a permanent breakdown of memory. This work proposes a new metaheuristic optimization inspired by maternal care of hen to their children called hen maternal care (HMCO) inspired optimization. The HMCO algorithm mimics the care shown by hen for their children in nature. The mother hen is always watchful and protects its chicks against predators. All chickens utilize different calls to designate flying predators like falcons and owls from ground seekers like foxes and coyotes, showing that they can both survey a danger and advise different chickens how to set themselves up. Our method shows greater performance among other standard algorithms.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"13 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140744552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A custom-built deep learning approach for text extraction from identity card images 从身份证图像中提取文本的定制深度学习方法
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp34-41
Geerish Suddul, Jean Fabrice Laurent Seguin
Information found on an identity card is needed for different essential tasks and manually extracting this information is time consuming, resource exhaustive and may be prone to human error. In this study, an optical character recognition (OCR) approach using deep learning techniques is proposed to automatically extract text related information from the image of an identity card in view of developing an automated client onboarding system. The OCR problem is divided into two main parts. Firstly, a custom-built image segmentation model, based on the U-net architecture, is used to detect the location of the text to be extracted. Secondly, using the location of the identified text fields, a (CRNN) based on long short-term memory (LSTM) cells is trained to recognise the characters and build words. Experimental results, based on the national identity card of the Republic of Mauritius, demonstrate that our approach achieves higher accuracy compared to other studies. Our text detection module has an intersection over union (IOU) measure of 0.70 with a pixel accuracy of 98% for text detection and the text recognition module achieved a mean word recognition accuracy of around 97% on main fields of the identity card.
不同的基本任务都需要身份证上的信息,而手动提取这些信息既费时又耗费资源,还容易出现人为错误。本研究提出了一种使用深度学习技术的光学字符识别(OCR)方法,用于从身份证图像中自动提取与文本相关的信息,以开发自动客户登录系统。光学字符识别问题分为两个主要部分。首先,使用基于 U-net 架构的定制图像分割模型来检测待提取文本的位置。其次,利用识别出的文本字段的位置,训练一个基于长短期记忆(LSTM)单元的(CRNN)来识别字符和造词。基于毛里求斯共和国国民身份证的实验结果表明,与其他研究相比,我们的方法实现了更高的准确性。我们的文本检测模块的 "交集大于联合"(IOU)测量值为 0.70,文本检测的像素准确率为 98%,文本识别模块对身份证主要字段的平均单词识别准确率约为 97%。
{"title":"A custom-built deep learning approach for text extraction from identity card images","authors":"Geerish Suddul, Jean Fabrice Laurent Seguin","doi":"10.11591/ijict.v13i1.pp34-41","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp34-41","url":null,"abstract":"Information found on an identity card is needed for different essential tasks and manually extracting this information is time consuming, resource exhaustive and may be prone to human error. In this study, an optical character recognition (OCR) approach using deep learning techniques is proposed to automatically extract text related information from the image of an identity card in view of developing an automated client onboarding system. The OCR problem is divided into two main parts. Firstly, a custom-built image segmentation model, based on the U-net architecture, is used to detect the location of the text to be extracted. Secondly, using the location of the identified text fields, a (CRNN) based on long short-term memory (LSTM) cells is trained to recognise the characters and build words. Experimental results, based on the national identity card of the Republic of Mauritius, demonstrate that our approach achieves higher accuracy compared to other studies. Our text detection module has an intersection over union (IOU) measure of 0.70 with a pixel accuracy of 98% for text detection and the text recognition module achieved a mean word recognition accuracy of around 97% on main fields of the identity card.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"40 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140743643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote practical instruction using web browsers 使用网络浏览器进行远程实践教学
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp57-66
Nagaki Kentarou, Fujita Satoshi
This paper introduces a novel approach to remote coaching, specifically targeting the body movements of learners participating remotely. The proposed system employs a smartphone camera to capture the learner’s body and represent it as a 3D avatar. The instructor can then offer guidance and instruction by manipulating the 3D avatar’s shape, which is displayed on a web browser. The main challenge faced by the system is to enable the sharing and editing of 3D objects among users. Since the HTML5 drag-and-drop feature is inadequate for transforming virtual objects consisting of multiple interconnected rigid bodies, the system tracks the pivot point of the manipulated rigid body. It assigns attributes such as pivot points and action points to each object, extending beyond their 2D screen coordinates. To implement the system, an interactive web application framework following the model-view-view-model (MVVM) architecture is utilized, incorporating Vue.js, Three.js, and Google Firebase. The prototype system takes advantage of the data binding capability of the framework and successfully operates within the 3D space of a web browser. Experimental results demonstrate that it can effectively share transformation information with an average delay of 300 ms.
本文介绍了一种新颖的远程辅导方法,特别是针对远程参与学习者的肢体动作。所提议的系统利用智能手机摄像头捕捉学习者的身体,并将其表现为三维头像。然后,指导者可以通过操纵显示在网络浏览器上的三维头像的形状来提供指导和指示。该系统面临的主要挑战是如何在用户之间共享和编辑三维对象。由于 HTML5 的拖放功能不足以转换由多个相互连接的刚体组成的虚拟对象,因此系统会跟踪所操作刚体的支点。它为每个对象分配了支点和动作点等属性,超出了它们的二维屏幕坐标。为了实现该系统,我们使用了一个交互式网络应用框架,该框架采用了模型-视图-视图-模型(MVVM)架构,结合了 Vue.js、Three.js 和 Google Firebase。原型系统利用该框架的数据绑定功能,成功地在网络浏览器的三维空间中运行。实验结果表明,它能有效地共享变换信息,平均延迟为 300 毫秒。
{"title":"Remote practical instruction using web browsers","authors":"Nagaki Kentarou, Fujita Satoshi","doi":"10.11591/ijict.v13i1.pp57-66","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp57-66","url":null,"abstract":"This paper introduces a novel approach to remote coaching, specifically targeting the body movements of learners participating remotely. The proposed system employs a smartphone camera to capture the learner’s body and represent it as a 3D avatar. The instructor can then offer guidance and instruction by manipulating the 3D avatar’s shape, which is displayed on a web browser. The main challenge faced by the system is to enable the sharing and editing of 3D objects among users. Since the HTML5 drag-and-drop feature is inadequate for transforming virtual objects consisting of multiple interconnected rigid bodies, the system tracks the pivot point of the manipulated rigid body. It assigns attributes such as pivot points and action points to each object, extending beyond their 2D screen coordinates. To implement the system, an interactive web application framework following the model-view-view-model (MVVM) architecture is utilized, incorporating Vue.js, Three.js, and Google Firebase. The prototype system takes advantage of the data binding capability of the framework and successfully operates within the 3D space of a web browser. Experimental results demonstrate that it can effectively share transformation information with an average delay of 300 ms.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"6 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140745225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting rainfall runoff in Southern Nigeria using a fused hybrid deep learning ensemble 利用融合混合深度学习集合预测尼日利亚南部的降雨径流
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp108-115
A. Ojugo, P. Ejeh, C. Odiakaose, Andrew Okonji Eboka, F. Emordi
Rainfall as an environmental feat can change fast and yield significant influence in downstream hydrology known as runoff with a variety of implications such as erosion, water quality, and infrastructures. These, in turn impact the quality of life, sewage systems, agriculture, and tourism of a nation to mention a few. It chaotic, complex, and dynamic nature has necessitated studies in the quest for future direction of such runoff via prediction models. With little successes in use of knowledge driven models, many studies have now turned to data-driven models. Dataset is retrieved from Metrological Center in Lagos, Nigeria for the period 1999-2019 for the Benin-Owena River Basin. Data is split: 70% for train and 30% for test. Our study adapts a spatial-temporal profile hidden Markov trained deep neural network. Result yields a sensitivity of 0.9, specificity 0.19, accuracy of 0.74, and improvement rate of classification of 0.12. Other ensembles underperformed when compared to proposed model. The study reveals annual rainfall is an effect of variation cycle. Models will help simulate future floods and provide lead time warnings in flood management.
降雨作为一种环境特征,会迅速发生变化,并对下游水文(即径流)产生重大影响,带来侵蚀、水质和基础设施等各种问题。这些反过来又会影响一个国家的生活质量、污水处理系统、农业和旅游业等等。由于径流具有混乱、复杂和动态的性质,因此有必要通过预测模型来研究径流的未来走向。由于在使用知识驱动模型方面收效甚微,许多研究现在转向了数据驱动模型。数据集取自尼日利亚拉各斯气象中心 1999-2019 年期间贝宁-奥韦纳河流域的数据。数据分为两部分:70% 用于训练,30% 用于测试。我们的研究采用了时空轮廓隐藏马尔科夫训练的深度神经网络。结果显示,灵敏度为 0.9,特异度为 0.19,准确度为 0.74,分类改进率为 0.12。与提出的模型相比,其他集合的表现不佳。该研究揭示了年降雨量受变异周期的影响。模型将有助于模拟未来的洪水,并为洪水管理提供预警。
{"title":"Predicting rainfall runoff in Southern Nigeria using a fused hybrid deep learning ensemble","authors":"A. Ojugo, P. Ejeh, C. Odiakaose, Andrew Okonji Eboka, F. Emordi","doi":"10.11591/ijict.v13i1.pp108-115","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp108-115","url":null,"abstract":"Rainfall as an environmental feat can change fast and yield significant influence in downstream hydrology known as runoff with a variety of implications such as erosion, water quality, and infrastructures. These, in turn impact the quality of life, sewage systems, agriculture, and tourism of a nation to mention a few. It chaotic, complex, and dynamic nature has necessitated studies in the quest for future direction of such runoff via prediction models. With little successes in use of knowledge driven models, many studies have now turned to data-driven models. Dataset is retrieved from Metrological Center in Lagos, Nigeria for the period 1999-2019 for the Benin-Owena River Basin. Data is split: 70% for train and 30% for test. Our study adapts a spatial-temporal profile hidden Markov trained deep neural network. Result yields a sensitivity of 0.9, specificity 0.19, accuracy of 0.74, and improvement rate of classification of 0.12. Other ensembles underperformed when compared to proposed model. The study reveals annual rainfall is an effect of variation cycle. Models will help simulate future floods and provide lead time warnings in flood management.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"12 42","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140745544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the cyber forensics landscape a review of recent innovations 驾驭网络取证环境,回顾最新创新成果
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp27-33
Gyana Ranjana Panigrahi, N. Barpanda, Dr. Prabira Kumar Sethy
The extensive relevance of digital forensics in today's data-driven environment has been emphasized in this article. The free software and the commercial software community are debatable, despite users and developers often differing views on important topics like software safety and usability. This article primarily uses pre-defined criteria and a platform-oriented approach to examine promising freeware (Magnet Forensics and Sleuth Kit) vs. profitable (ProDiscover and Oxygen Forensic Suite) mobile forensics tools. Under diverse settings, the tools' capacity to develop and analyze forensically sound digital forensic media sources is validated. After erasing data, each media type was tested again after formatting. The study concludes with a comparison matrix that may aid in determining the best-fit option for the investigation's requirements among the tools. The findings indicate the potential for freeware to supplant numerous proprietary applications, as users can opt for freeware instead of incurring costs associated with proprietary software. Furthermore, this perception can be put into practice.
本文强调了数字取证在当今数据驱动环境中的广泛意义。尽管用户和开发者在软件安全性和可用性等重要问题上经常意见不一,但自由软件和商业软件社区仍存在争议。本文主要使用预定义的标准和面向平台的方法来研究有前途的免费软件(Magnet Forensics 和 Sleuth Kit)与盈利性移动取证工具(ProDiscover 和 Oxygen Forensic Suite)。在不同的环境下,这些工具开发和分析可靠的数字取证媒体源的能力得到了验证。擦除数据后,对格式化后的每种媒体类型再次进行测试。研究最后提供了一个比较矩阵,可帮助确定最适合调查要求的工具选项。研究结果表明,免费软件有可能取代许多专有应用软件,因为用户可以选择免费软件,而不必支付与专有软件相关的费用。此外,这种看法也可以付诸实践。
{"title":"Navigating the cyber forensics landscape a review of recent innovations","authors":"Gyana Ranjana Panigrahi, N. Barpanda, Dr. Prabira Kumar Sethy","doi":"10.11591/ijict.v13i1.pp27-33","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp27-33","url":null,"abstract":"The extensive relevance of digital forensics in today's data-driven environment has been emphasized in this article. The free software and the commercial software community are debatable, despite users and developers often differing views on important topics like software safety and usability. This article primarily uses pre-defined criteria and a platform-oriented approach to examine promising freeware (Magnet Forensics and Sleuth Kit) vs. profitable (ProDiscover and Oxygen Forensic Suite) mobile forensics tools. Under diverse settings, the tools' capacity to develop and analyze forensically sound digital forensic media sources is validated. After erasing data, each media type was tested again after formatting. The study concludes with a comparison matrix that may aid in determining the best-fit option for the investigation's requirements among the tools. The findings indicate the potential for freeware to supplant numerous proprietary applications, as users can opt for freeware instead of incurring costs associated with proprietary software. Furthermore, this perception can be put into practice.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"15 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indonesian generative chatbot model for student services using GPT 印度尼西亚使用 GPT 生成学生服务聊天机器人模型
Pub Date : 2024-04-04 DOI: 10.11591/ijict.v13i1.pp50-56
Shania Priccilia, A. S. Girsang
The accessibility of academic information greatly impacts the satisfaction and loyalty of university students. However, limited university resources often hinder students from conveniently accessing information services. To address this challenge, this research proposes the digitization of the question-answering process between students and student service staff through the implementation of generative chatbot. A generative chatbot can provide students with human-like responses to academic inquiries at their convenience. This research developed generative chatbot using pre-trained GPT-2 architecture in three different sizes, specifically designed for addressing practicum-related questions in a private university in Indonesia. The experiment utilized 1288 question-answer pairs in Indonesian and demonstrated the best performance with a BLEU score of 0.753, signifying good performance accuracy in generating text despite dataset limitations.
学术信息的可获取性在很大程度上影响着大学生的满意度和忠诚度。然而,有限的大学资源往往阻碍学生便捷地获取信息服务。为应对这一挑战,本研究提出通过实施生成式聊天机器人,将学生与学生服务人员之间的答疑过程数字化。生成式聊天机器人可以在学生方便的时候为他们提供类似于人类的学术询问回复。本研究使用预训练的 GPT-2 架构开发了三种不同大小的生成式聊天机器人,专门用于回答印度尼西亚一所私立大学的实习相关问题。实验使用了 1288 个印尼语问答对,结果表明,尽管数据集存在限制,但生成文本的准确性表现良好,BLEU 得分为 0.753,表现最佳。
{"title":"Indonesian generative chatbot model for student services using GPT","authors":"Shania Priccilia, A. S. Girsang","doi":"10.11591/ijict.v13i1.pp50-56","DOIUrl":"https://doi.org/10.11591/ijict.v13i1.pp50-56","url":null,"abstract":"The accessibility of academic information greatly impacts the satisfaction and loyalty of university students. However, limited university resources often hinder students from conveniently accessing information services. To address this challenge, this research proposes the digitization of the question-answering process between students and student service staff through the implementation of generative chatbot. A generative chatbot can provide students with human-like responses to academic inquiries at their convenience. This research developed generative chatbot using pre-trained GPT-2 architecture in three different sizes, specifically designed for addressing practicum-related questions in a private university in Indonesia. The experiment utilized 1288 question-answer pairs in Indonesian and demonstrated the best performance with a BLEU score of 0.753, signifying good performance accuracy in generating text despite dataset limitations.","PeriodicalId":245958,"journal":{"name":"International Journal of Informatics and Communication Technology (IJ-ICT)","volume":"24 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140743035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Informatics and Communication Technology (IJ-ICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1