首页 > 最新文献

Oriental journal of computer science and technology最新文献

英文 中文
Classical and Fuzzy Based Image Enhancement Techniques for Banana Root Disease Diagnosis: A Review and Validation 经典与模糊图像增强技术在香蕉根病诊断中的应用综述与验证
Pub Date : 2020-05-30 DOI: 10.13005/ojcst13.01.05
D. Suryaprabha, J. Satheeshkumar, N. Seenivasan
A vital step in automation of plant root disease diagnosis is to extract root region from the input images in an automatic and consistent manner. However, performance of segmentation algorithm over root images directly depends on the quality of input images. During acquisition, the captured root images are distorted by numerous external factors like lighting conditions, dust and so on. Hence it is essential to incorporate an image enhancement algorithm as a pre-processing step in the plant root disease diagnosis module. Image quality can be improved either by manipulating the pixels through spatial or frequency domain. In spatial domain, images are directly manipulated using their pixel values and alternatively in frequency domain, images are indirectly manipulated using transformations. Spatial based enhancement methods are considered as favourable approach for real time root images as it is simple and easy to understand with low computational complexity. In this study, real time banana root images were enhanced by attempting with different spatial based image enhancement techniques. Different classical point processing methods (contrast stretching, logarithmic transformation, power law transformation, histogram equalization, adaptive histogram equalization and histogram matching) and fuzzy based enhancement methods using fuzzy intensification operator and fuzzy if-then rule based methods were tried to enhance the banana root images. Quality of the enhanced root Article History Received: 7 April 2020 Accepted: 19 May 2020
植物根病诊断自动化的关键步骤是从输入图像中自动、一致地提取根区域。然而,根图像分割算法的性能直接取决于输入图像的质量。在采集过程中,采集到的树根图像会受到光照条件、灰尘等诸多外部因素的影响而失真。因此,在植物根病诊断模块中加入图像增强算法作为预处理步骤是必要的。图像质量可以通过空间或频域操纵像素来提高。在空间域中,使用图像的像素值直接对图像进行操作;在频率域中,使用变换对图像进行间接操作。基于空间的增强方法以其简单易懂、计算复杂度低而被认为是实时根图像增强的有利方法。本研究通过尝试不同的基于空间的图像增强技术,对实时香蕉根图像进行增强。尝试了不同的经典点处理方法(对比度拉伸、对数变换、幂律变换、直方图均衡化、自适应直方图均衡化和直方图匹配)以及基于模糊增强算子和基于模糊if-then规则的模糊增强方法对香蕉根图像进行增强。增强根文章历史质量接收日期:2020年4月7日接收日期:2020年5月19日
{"title":"Classical and Fuzzy Based Image Enhancement Techniques for Banana Root Disease Diagnosis: A Review and Validation","authors":"D. Suryaprabha, J. Satheeshkumar, N. Seenivasan","doi":"10.13005/ojcst13.01.05","DOIUrl":"https://doi.org/10.13005/ojcst13.01.05","url":null,"abstract":"A vital step in automation of plant root disease diagnosis is to extract root region from the input images in an automatic and consistent manner. However, performance of segmentation algorithm over root images directly depends on the quality of input images. During acquisition, the captured root images are distorted by numerous external factors like lighting conditions, dust and so on. Hence it is essential to incorporate an image enhancement algorithm as a pre-processing step in the plant root disease diagnosis module. Image quality can be improved either by manipulating the pixels through spatial or frequency domain. In spatial domain, images are directly manipulated using their pixel values and alternatively in frequency domain, images are indirectly manipulated using transformations. Spatial based enhancement methods are considered as favourable approach for real time root images as it is simple and easy to understand with low computational complexity. In this study, real time banana root images were enhanced by attempting with different spatial based image enhancement techniques. Different classical point processing methods (contrast stretching, logarithmic transformation, power law transformation, histogram equalization, adaptive histogram equalization and histogram matching) and fuzzy based enhancement methods using fuzzy intensification operator and fuzzy if-then rule based methods were tried to enhance the banana root images. Quality of the enhanced root Article History Received: 7 April 2020 Accepted: 19 May 2020","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123031875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEPRESSIKA: An Early Risk of Depression Detection through Opinions 抑郁:通过意见发现抑郁的早期风险
Pub Date : 2020-05-30 DOI: 10.13005/ojcst13.01.03
Abhusan Chataut, J. Chatterjee, Rabi Shankar Rouniyar
Deep learning is a very dynamic area in Sentiment Classification. Text analytics is the process of understanding text and making actionable decisions and acting on it. be it Amazon Alexa, Siri, Cortana everything is made up of Natural Language Processing. Text to speech and Speech to text are generating so many data sets every day. The internet has the largest repository of data, it is hard to define what to exactly do with it. sentiment are the opinions or the way of feelings of the public usually in the sequential form, in which many people face difficulty in living their daily life. Some are even ending their life just they are depressed. The approach here is to help the people suffering from depression with appropriate methodology to use in this work. Depressika: Early Risk of Depression Detection with opinions is a web application which detects the early risk of depression from the social media posts created by the users with appropriate Recurrent Neural Networks [RNN]. This is a classification problem of the Machine Learning [ML]. Depressika builds on Waterfall Methodology of application development using the Keras, Tensor Flow, Scikit-Learn and Matplotlib to carryout and process sequential data and the overall process of development is carried out by Python programming Language. CONTACT Jyotir Moy Chatterjee jyotirchatterjee@gmail.com Department of IT, LBEF (APUTI), Kathmandu, Nepal. © 2020 The Author(s). Published by Oriental Scientific Publishing Company This is an Open Access article licensed under a Creative Commons license: Attribution 4.0 International (CC-BY). Doi: 10.13005/ojcst13.01.03 Article History Received: 27 January 2020 Accepted: 13 March 2020
深度学习是情感分类中一个非常活跃的领域。文本分析是理解文本并做出可操作决策并据此采取行动的过程。无论是亚马逊Alexa, Siri,小娜,一切都是由自然语言处理组成的。文本到语音和语音到文本每天都会产生如此多的数据集。互联网拥有最大的数据存储库,很难定义该如何处理这些数据。情感是公众的意见或感受方式,通常以顺序形式出现,许多人在日常生活中面临困难。有些人甚至因为抑郁而结束了自己的生命。这里的方法是帮助患有抑郁症的人在这项工作中使用适当的方法。Depressika:早期抑郁风险检测与意见是一个网络应用程序,通过适当的递归神经网络(RNN)从用户创建的社交媒体帖子中检测抑郁症的早期风险。这是机器学习中的一个分类问题。depression sika基于瀑布式应用程序开发方法,使用Keras、Tensor Flow、Scikit-Learn和Matplotlib来执行和处理顺序数据,整个开发过程由Python编程语言完成。联系Jyotir Moy Chatterjee jyotirchatterjee@gmail.com尼泊尔加德满都LBEF (APUTI) IT部。©2020作者。这是一篇基于知识共享许可协议的开放获取文章:Attribution 4.0 International (CC-BY)。收稿日期:2020年1月27日收稿日期:2020年3月13日
{"title":"DEPRESSIKA: An Early Risk of Depression Detection through Opinions","authors":"Abhusan Chataut, J. Chatterjee, Rabi Shankar Rouniyar","doi":"10.13005/ojcst13.01.03","DOIUrl":"https://doi.org/10.13005/ojcst13.01.03","url":null,"abstract":"Deep learning is a very dynamic area in Sentiment Classification. Text analytics is the process of understanding text and making actionable decisions and acting on it. be it Amazon Alexa, Siri, Cortana everything is made up of Natural Language Processing. Text to speech and Speech to text are generating so many data sets every day. The internet has the largest repository of data, it is hard to define what to exactly do with it. sentiment are the opinions or the way of feelings of the public usually in the sequential form, in which many people face difficulty in living their daily life. Some are even ending their life just they are depressed. The approach here is to help the people suffering from depression with appropriate methodology to use in this work. Depressika: Early Risk of Depression Detection with opinions is a web application which detects the early risk of depression from the social media posts created by the users with appropriate Recurrent Neural Networks [RNN]. This is a classification problem of the Machine Learning [ML]. Depressika builds on Waterfall Methodology of application development using the Keras, Tensor Flow, Scikit-Learn and Matplotlib to carryout and process sequential data and the overall process of development is carried out by Python programming Language. CONTACT Jyotir Moy Chatterjee jyotirchatterjee@gmail.com Department of IT, LBEF (APUTI), Kathmandu, Nepal. © 2020 The Author(s). Published by Oriental Scientific Publishing Company This is an Open Access article licensed under a Creative Commons license: Attribution 4.0 International (CC-BY). Doi: 10.13005/ojcst13.01.03 Article History Received: 27 January 2020 Accepted: 13 March 2020","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123004685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of Machine Learning and other Artificial Intelligence paradigms in Cybersecurity 机器学习和其他人工智能范例在网络安全中的表现
Pub Date : 2020-05-29 DOI: 10.13005/ojcst13.01.01
G. Kabanda
Cybersecurity systems are required at the application, network, host, and data levels. The research is purposed to evaluate Artificial Intelligence paradigms for use in network detection and prevention systems. This is purposed to develop a Cybersecurity system that uses artificial intelligence paradigms and can handle a high degree of complexity. The Pragmatism paradigm is elaborately associated with the Mixed Method Research (MMR), and is the research philosophy used in this research. Pragmatism recognizes the full rationale of the congruence between knowledge and action. The Pragmatic paradigm advocates a relational epistemology, a non-singular reality ontology, a mixed methods methodology, and a value-laden axiology. A qualitative approach where Focus Group discussions were held was used. The Artificial Intelligence paradigms evaluated include machine learning methods, autonomous robotic vehicle, artificial neural networks, and fuzzy logic. A discussion was held on the performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms.
在应用程序、网络、主机和数据级别都需要网络安全系统。该研究旨在评估用于网络检测和预防系统的人工智能范例。其目的是开发一个使用人工智能范例并能处理高度复杂性的网络安全系统。实用主义范式与混合方法研究(MMR)密切相关,是本研究中使用的研究哲学。实用主义认识到知识和行动之间一致的充分理由。语用学范式主张关系认识论、非单一现实本体论、混合方法方法论和价值承载价值论。采用了进行焦点小组讨论的定性方法。评估的人工智能范例包括机器学习方法、自主机器人车辆、人工神经网络和模糊逻辑。讨论了支持向量机、人工神经网络、k近邻、朴素贝叶斯和决策树算法的性能。
{"title":"Performance of Machine Learning and other Artificial Intelligence paradigms in Cybersecurity","authors":"G. Kabanda","doi":"10.13005/ojcst13.01.01","DOIUrl":"https://doi.org/10.13005/ojcst13.01.01","url":null,"abstract":"Cybersecurity systems are required at the application, network, host, and data levels. The research is purposed to evaluate Artificial Intelligence paradigms for use in network detection and prevention systems. This is purposed to develop a Cybersecurity system that uses artificial intelligence paradigms and can handle a high degree of complexity. The Pragmatism paradigm is elaborately associated with the Mixed Method Research (MMR), and is the research philosophy used in this research. Pragmatism recognizes the full rationale of the congruence between knowledge and action. The Pragmatic paradigm advocates a relational epistemology, a non-singular reality ontology, a mixed methods methodology, and a value-laden axiology. A qualitative approach where Focus Group discussions were held was used. The Artificial Intelligence paradigms evaluated include machine learning methods, autonomous robotic vehicle, artificial neural networks, and fuzzy logic. A discussion was held on the performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"4320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116838925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Diverging Mysterious in Green Supply Chain Management 绿色供应链管理中的发散之谜
Pub Date : 2020-05-27 DOI: 10.13005/ojcst13.01.02
Shahzad Ashraf, Tauqeer Ahmed, Sehrish Saleem, Zeeshan Aslam, S. Shahzad
The sustainability and environmental considerations have slowly become divergences, but having greatest influence in the supply chain management that must be contemplates to examine the environmental and organizational factors. The research considers environmental and sustainable strategies within companies, the efficient supply chain management strategies for manufacturers and consumers, and to the environment friendly product design and services, taking a case-by-case perspective and concentrating on enterprise businesses scale. Our finding reveals that green supply chain management firms are delivering exuberant environmental efficiency at an added cost. Among the identified obstacles we identified different obstacles and conceptual relations and barriers are graded based on dependency and driving sand. In future, green policies have greater customer services avenues thereby, appeal for suppliers, manufacturers and officials.
可持续性和环境方面的考虑已经慢慢成为分歧,但在供应链管理中有最大的影响,必须考虑检查环境和组织因素。研究考虑了企业内部的环境和可持续发展战略,制造商和消费者的高效供应链管理战略,以及环境友好的产品设计和服务,采取个案分析的角度,集中在企业的业务规模。我们的发现表明,绿色供应链管理公司正在以额外的成本提供旺盛的环境效率。在确定的障碍中,我们确定了不同的障碍和概念关系,障碍是根据依赖性和驾驶沙子分级的。未来,绿色政策将有更大的客户服务渠道,从而吸引供应商、制造商和官员。
{"title":"Diverging Mysterious in Green Supply Chain Management","authors":"Shahzad Ashraf, Tauqeer Ahmed, Sehrish Saleem, Zeeshan Aslam, S. Shahzad","doi":"10.13005/ojcst13.01.02","DOIUrl":"https://doi.org/10.13005/ojcst13.01.02","url":null,"abstract":"The sustainability and environmental considerations have slowly become divergences, but having greatest influence in the supply chain management that must be contemplates to examine the environmental and organizational factors. The research considers environmental and sustainable strategies within companies, the efficient supply chain management strategies for manufacturers and consumers, and to the environment friendly product design and services, taking a case-by-case perspective and concentrating on enterprise businesses scale. Our finding reveals that green supply chain management firms are delivering exuberant environmental efficiency at an added cost. Among the identified obstacles we identified different obstacles and conceptual relations and barriers are graded based on dependency and driving sand. In future, green policies have greater customer services avenues thereby, appeal for suppliers, manufacturers and officials.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129543795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
QoS Priorities in ERP Implementation – A Study of Manufacturing Industry of Nepal ERP实施中的QoS优先级——尼泊尔制造业研究
Pub Date : 2020-02-15 DOI: 10.13005/ojcst12.04.03
S. Giri, R. Thakur, J. Chatterjee
ERP, or Enterprise Resource Planning systems help business management, which consists of a well-designed interface that incorporates different programs to integrate and manage all company functions at intervals of a company, these sets incorporate applications for human resources, monetary and accounting, sales and distribution, project management, materials management, SCM, or Supply Chain Management and quality management. Currently, organizations are running to improve their ability to survive in the global market competitions of the 21st century. While the organizations try to advance in their level of agility, changing and modifying the process of decisionmaking to make it more efficient and effective to satisfy the successive variations of the market. Different views are gathered regarding ERP implementation of ERP in manufacturing. Even we have taken certain essential components of ERP for a better understanding of ERP. Ease of use, usefulness, quality, and trust on ERP services have been taken an independent variable that affects user’s decision to adopt ERP. The role of ERP technology in manufacturing facilities are broken into more categories for detail concept. Quantitative data analysis methods were usually used for questionnaire data analysis which was utilized to analyze statistical data and after that collection of interview data was done. A researcher has applied different statistical tools like Chi-Square Tests, Anova, etc. to analyze the collected data. A researcher essential portion is to analyze and interpret data that relates to modifying data which explains the solution to the research question with some additional future recommendation for more quality research. Article History Received: 19 October 2019 Accepted: 03 December 2019
ERP或企业资源计划系统帮助企业管理,它由一个精心设计的接口组成,该接口包含不同的程序,以整合和管理公司的所有功能,这些集合包含人力资源,财务和会计,销售和分销,项目管理,材料管理,SCM或供应链管理和质量管理的应用程序。在21世纪的全球市场竞争中,组织为了提高生存能力而进行跑步。当组织试图提高他们的敏捷性水平时,改变和修改决策过程,使其更加高效和有效,以满足市场的连续变化。关于ERP在制造业的实施,收集了不同的观点。甚至为了更好地理解ERP,我们也采取了ERP的一些基本组成部分。ERP服务的易用性、有用性、质量和可信度已被视为影响用户采用ERP决策的独立变量。本文将ERP技术在制造设施中的作用划分为多个类别,并给出了详细的概念。问卷数据分析通常采用定量数据分析方法,先对统计数据进行分析,然后进行访谈数据的收集。研究人员使用不同的统计工具,如卡方检验,方差分析等来分析收集的数据。研究人员的基本部分是分析和解释数据,这些数据与修改数据有关,这些数据解释了研究问题的解决方案,并提供了一些额外的未来建议,以进行更优质的研究。收稿日期:2019年10月19日收稿日期:2019年12月03日
{"title":"QoS Priorities in ERP Implementation – A Study of Manufacturing Industry of Nepal","authors":"S. Giri, R. Thakur, J. Chatterjee","doi":"10.13005/ojcst12.04.03","DOIUrl":"https://doi.org/10.13005/ojcst12.04.03","url":null,"abstract":"ERP, or Enterprise Resource Planning systems help business management, which consists of a well-designed interface that incorporates different programs to integrate and manage all company functions at intervals of a company, these sets incorporate applications for human resources, monetary and accounting, sales and distribution, project management, materials management, SCM, or Supply Chain Management and quality management. Currently, organizations are running to improve their ability to survive in the global market competitions of the 21st century. While the organizations try to advance in their level of agility, changing and modifying the process of decisionmaking to make it more efficient and effective to satisfy the successive variations of the market. Different views are gathered regarding ERP implementation of ERP in manufacturing. Even we have taken certain essential components of ERP for a better understanding of ERP. Ease of use, usefulness, quality, and trust on ERP services have been taken an independent variable that affects user’s decision to adopt ERP. The role of ERP technology in manufacturing facilities are broken into more categories for detail concept. Quantitative data analysis methods were usually used for questionnaire data analysis which was utilized to analyze statistical data and after that collection of interview data was done. A researcher has applied different statistical tools like Chi-Square Tests, Anova, etc. to analyze the collected data. A researcher essential portion is to analyze and interpret data that relates to modifying data which explains the solution to the research question with some additional future recommendation for more quality research. Article History Received: 19 October 2019 Accepted: 03 December 2019","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125419465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying Botnet on IoT by Using Supervised Learning Techniques 利用监督学习技术识别物联网上的僵尸网络
Pub Date : 2020-02-15 DOI: 10.13005/ojcst12.04.04
Amirhossein Rezaei
The security challenge on IoT (Internet of Things) is one of the hottest and most pertinent topics at the moment especially the several security challenges. The Botnet is one of the security challenges that most impact for several purposes. The network of private computers infected by malicious software and controlled as a group without the knowledge of owners and each of them running one or more bots is called Botnets. Normally, it is used for sending spam, stealing data, and performing DDoS attacks. One of the techniques that been used for detecting the Botnet is the Supervised Learning method. This study will examine several Supervised Learning methods such as; Linear Regression, Logistic Regression, Decision Tree, Naive Bayes, k- Nearest Neighbors, Random Forest, Gradient Boosting Machines, and Support Vector Machine for identifying the Botnet in IoT with the aim of finding which Supervised Learning technique can achieve the highest accuracy and fastest detection as well as with minimizing the dependent variable.
物联网的安全挑战是当前最热门和最相关的话题之一,特别是几个安全挑战。僵尸网络是影响最广泛的安全挑战之一。被恶意软件感染的私人电脑组成的网络,在所有者不知情的情况下被控制成一个群体,每台电脑都运行一个或多个机器人,这种网络被称为僵尸网络。通常用于发送垃圾邮件、窃取数据、进行DDoS攻击。用于检测僵尸网络的技术之一是监督学习方法。本研究将考察几种监督学习方法,如;线性回归,逻辑回归,决策树,朴素贝叶斯,k近邻,随机森林,梯度增强机和支持向量机用于识别物联网中的僵尸网络,目的是找到哪种监督学习技术可以实现最高的准确性和最快的检测以及最小化因变量。
{"title":"Identifying Botnet on IoT by Using Supervised Learning Techniques","authors":"Amirhossein Rezaei","doi":"10.13005/ojcst12.04.04","DOIUrl":"https://doi.org/10.13005/ojcst12.04.04","url":null,"abstract":"The security challenge on IoT (Internet of Things) is one of the hottest and most pertinent topics at the moment especially the several security challenges. The Botnet is one of the security challenges that most impact for several purposes. The network of private computers infected by malicious software and controlled as a group without the knowledge of owners and each of them running one or more bots is called Botnets. Normally, it is used for sending spam, stealing data, and performing DDoS attacks. One of the techniques that been used for detecting the Botnet is the Supervised Learning method. This study will examine several Supervised Learning methods such as; Linear Regression, Logistic Regression, Decision Tree, Naive Bayes, k- Nearest Neighbors, Random Forest, Gradient Boosting Machines, and Support Vector Machine for identifying the Botnet in IoT with the aim of finding which Supervised Learning technique can achieve the highest accuracy and fastest detection as well as with minimizing the dependent variable.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128439440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Evaluation of Big Data Analytics Projects and the Project Predictive Analytics Approach 大数据分析项目的评估和项目预测分析方法
Pub Date : 2020-02-15 DOI: 10.13005/ojcst12.04.01
G. Kabanda
Big Data is the process of managing large volumes of data obtained from several heterogeneous data types e.g. internal, external, structured and unstructured that can be used for collecting and analyzing enterprise data. The purpose of the paper is to conduct an evaluation of Big Data Analytics Projects which discusses why the projects fail and explain why and how the Project Predictive Analytics (PPA) approach may make a difference with respect to the future methods based on data mining, machine learning, and artificial intelligence. A qualitative research methodology was used. The research design was discourse analysis supported by document analysis. Laclau and Mouffe’s discourse theory was the most thoroughly poststructuralist approach. CONTACT Gabriel Kabanda gabrielkabanda@gmail.com Atlantic International University 900 Fort Street Mall 40 Honolulu,
大数据是管理从内部、外部、结构化和非结构化等多种异构数据类型中获取的大量数据的过程,这些数据可用于收集和分析企业数据。本文的目的是对大数据分析项目进行评估,讨论项目失败的原因,并解释为什么以及如何项目预测分析(PPA)方法可能会对基于数据挖掘,机器学习和人工智能的未来方法产生影响。采用定性研究方法。本研究采用语篇分析为主,文献分析为主的研究设计。拉克劳和墨菲的话语理论是最彻底的后结构主义方法。联系Gabriel Kabanda gabrielkabanda@gmail.com大西洋国际大学900 Fort Street Mall 40檀香山,
{"title":"An Evaluation of Big Data Analytics Projects and the Project Predictive Analytics Approach","authors":"G. Kabanda","doi":"10.13005/ojcst12.04.01","DOIUrl":"https://doi.org/10.13005/ojcst12.04.01","url":null,"abstract":"Big Data is the process of managing large volumes of data obtained from several heterogeneous data types e.g. internal, external, structured and unstructured that can be used for collecting and analyzing enterprise data. The purpose of the paper is to conduct an evaluation of Big Data Analytics Projects which discusses why the projects fail and explain why and how the Project Predictive Analytics (PPA) approach may make a difference with respect to the future methods based on data mining, machine learning, and artificial intelligence. A qualitative research methodology was used. The research design was discourse analysis supported by document analysis. Laclau and Mouffe’s discourse theory was the most thoroughly poststructuralist approach. CONTACT Gabriel Kabanda gabrielkabanda@gmail.com Atlantic International University 900 Fort Street Mall 40 Honolulu,","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132602284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Text and Voice Based Emotion Monitoring System 基于文本和语音的情绪监测系统
Pub Date : 2020-02-15 DOI: 10.13005/ojcst12.04.05
A. S. Naik
An Emotion monitoring system for a call-center is proposed. It aims to simplify the tracking and management of emotions extracted from call center Employee-Customer conversations. The system is composed of four modules: Emotion Detection, Emotion Analysis and Report Generation, Database Manager, and User Interface. The Emotion Detection module uses Tone Analyzer to extract them for reliable emotion; it also performs the Utterance Analysis for detecting emotion. The 14 emotions detected by the tone analyzer are happy, joy, anger, sad and neutral, etc. The Emotion Analysis module performs classification into the 3 categories: Neutral, Anger and Joy. By using this category, it applies the point-scoring technique for calculating the Employee Score. This module also polishes the output of the Emotion Detection module to provide a more presentable output of a sequence of emotions of the Employee and the Customer. The Database Manager is responsible for the management of the database wherein it handles the creation, and update of data. The Interface module serves as the view and user interface for the whole system. The system is comprised of an Android application for conversation and a web application to view reports. The Android application was developed using Android Studio to maintain the modularity and flexibility of the system. The local server monitors the conversation, it displays the detected emotions of both the Customer and the Employee. On the other hand, the web application was constructed using the Django Framework to maintain its modularity and abstraction by using a model. It provides reports and analysis of the emotions expressed by the customer during conversations. Using the Model View Template (MVT) approach, the Emotion monitoring system is scalable, reusable and modular. CONTACT Mr. Anil S Naik anil.nk287@gmail.com Department of Information Technology, Walchand Institute of Technology,
提出了一种面向呼叫中心的情绪监测系统。它旨在简化从呼叫中心员工-客户对话中提取的情绪的跟踪和管理。该系统由四个模块组成:情绪检测、情绪分析与报表生成、数据库管理和用户界面。情绪检测模块使用Tone Analyzer对其进行提取,获得可靠的情绪;它还执行话语分析来检测情绪。语调分析器检测到的14种情绪有高兴、高兴、愤怒、悲伤和中性等。情绪分析模块将情绪分为3类:中性、愤怒和快乐。通过使用这个类别,它应用计分技术来计算员工得分。该模块还改进了情绪检测模块的输出,以提供更美观的员工和客户情绪序列输出。数据库管理器负责管理数据库,其中处理数据的创建和更新。接口模块是整个系统的视图和用户界面。该系统由一个用于对话的Android应用程序和一个用于查看报表的web应用程序组成。为了保持系统的模块化和灵活性,使用Android Studio开发Android应用程序。本地服务器监视对话,它显示检测到的客户和员工的情绪。另一方面,web应用程序是使用Django框架构建的,通过使用模型来维护其模块化和抽象化。它提供客户在对话过程中所表达的情绪的报告和分析。采用模型视图模板(MVT)方法,情绪监测系统具有可扩展性、可重用性和模块化。联系Anil S Naik先生anil.nk287@gmail.com Walchand理工学院信息技术系
{"title":"Text and Voice Based Emotion Monitoring System","authors":"A. S. Naik","doi":"10.13005/ojcst12.04.05","DOIUrl":"https://doi.org/10.13005/ojcst12.04.05","url":null,"abstract":"An Emotion monitoring system for a call-center is proposed. It aims to simplify the tracking and management of emotions extracted from call center Employee-Customer conversations. The system is composed of four modules: Emotion Detection, Emotion Analysis and Report Generation, Database Manager, and User Interface. The Emotion Detection module uses Tone Analyzer to extract them for reliable emotion; it also performs the Utterance Analysis for detecting emotion. The 14 emotions detected by the tone analyzer are happy, joy, anger, sad and neutral, etc. The Emotion Analysis module performs classification into the 3 categories: Neutral, Anger and Joy. By using this category, it applies the point-scoring technique for calculating the Employee Score. This module also polishes the output of the Emotion Detection module to provide a more presentable output of a sequence of emotions of the Employee and the Customer. The Database Manager is responsible for the management of the database wherein it handles the creation, and update of data. The Interface module serves as the view and user interface for the whole system. The system is comprised of an Android application for conversation and a web application to view reports. The Android application was developed using Android Studio to maintain the modularity and flexibility of the system. The local server monitors the conversation, it displays the detected emotions of both the Customer and the Employee. On the other hand, the web application was constructed using the Django Framework to maintain its modularity and abstraction by using a model. It provides reports and analysis of the emotions expressed by the customer during conversations. Using the Model View Template (MVT) approach, the Emotion monitoring system is scalable, reusable and modular. CONTACT Mr. Anil S Naik anil.nk287@gmail.com Department of Information Technology, Walchand Institute of Technology,","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian Network Model for a Zimbabwean Cybersecurity System 津巴布韦网络安全系统的贝叶斯网络模型
Pub Date : 2020-02-15 DOI: 10.13005/ojcst12.04.02
G. Kabanda
The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM). CONTACT Gabriel Kabanda gabrielkabanda@gmail.com Atlantic International University 900 Fort Street Mall 40 Honolulu,
本研究的目的是开发一种基于贝叶斯网络的网络入侵检测和防御系统的结构,用于网络安全。基于互联网的技术使用的显著增长导致了网络安全的复杂性,使组织遭受网络攻击。因此,需要一个基于贝叶斯网络结构的网络入侵检测与防御系统。贝叶斯网络(BNs)被定义为用于多变量分析的图形概率模型,并且是具有相关概率分布函数的有向无环图。研究确定了适合发展中国家的网络安全框架;评估使用人工智能范例的网络检测和预防系统,如有限自动机、神经网络、遗传算法、模糊逻辑、支持向量机或各种基于数据挖掘的方法;分析了贝叶斯网络,可以表示为图形模型,并有方向性地表示因果关系;并开发了一个可以处理网络安全复杂性的贝叶斯网络模型。贝叶斯网络的理论框架主要受NIST网络安全框架、一般威慑理论、博弈论、复杂性理论和数据挖掘技术的影响。本研究中使用的实用主义范式作为一种哲学与混合方法研究(MMR)有着复杂的关系。在本研究中使用了混合方法方法,这在很大程度上是定量的,研究设计是一个调查和一个实验,但支持定性方法,焦点小组讨论举行。讨论了支持向量机、人工神经网络、k近邻、朴素贝叶斯和决策树算法的性能。讨论的替代改进解决方案包括使用机器学习算法,特别是人工神经网络(ANN),决策树C4.5,随机森林和支持向量机(SVM)。联系Gabriel Kabanda gabrielkabanda@gmail.com大西洋国际大学900 Fort Street Mall 40檀香山,
{"title":"Bayesian Network Model for a Zimbabwean Cybersecurity System","authors":"G. Kabanda","doi":"10.13005/ojcst12.04.02","DOIUrl":"https://doi.org/10.13005/ojcst12.04.02","url":null,"abstract":"The purpose of this research was to develop a structure for a network intrusion detection and prevention system based on the Bayesian Network for use in Cybersecurity. The phenomenal growth in the use of internet-based technologies has resulted in complexities in cybersecurity subjecting organizations to cyberattacks. What is required is a network intrusion detection and prevention system based on the Bayesian Network structure for use in Cybersecurity. Bayesian Networks (BNs) are defined as graphical probabilistic models for multivariate analysis and are directed acyclic graphs that have an associated probability distribution function. The research determined the cybersecurity framework appropriate for a developing nation; evaluated network detection and prevention systems that use Artificial Intelligence paradigms such as finite automata, neural networks, genetic algorithms, fuzzy logic, support-vector machines or diverse data-mining-based approaches; analysed Bayesian Networks that can be represented as graphical models and are directional to represent cause-effect relationships; and developed a Bayesian Network model that can handle complexity in cybersecurity. The theoretical framework on Bayesian Networks was largely informed by the NIST Cybersecurity Framework, General deterrence theory, Game theory, Complexity theory and data mining techniques. The Pragmatism paradigm used in this research, as a philosophy is intricately related to the Mixed Method Research (MMR). A mixed method approach was used in this research, which is largely quantitative with the research design being a survey and an experiment, but supported by qualitative approaches where Focus Group discussions were held. The performance of Support Vector Machines, Artificial Neural Network, K-Nearest Neighbour, Naive-Bayes and Decision Tree Algorithms was discussed. Alternative improved solutions discussed include the use of machine learning algorithms specifically Artificial Neural Networks (ANN), Decision Tree C4.5, Random Forests and Support Vector Machines (SVM). CONTACT Gabriel Kabanda gabrielkabanda@gmail.com Atlantic International University 900 Fort Street Mall 40 Honolulu,","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131662753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nanotechnology – Intentionality and Free-Will 纳米技术-意向性和自由意志
Pub Date : 2019-10-04 DOI: 10.13005/ojcst12.03.05
T. Gopal
Body modification (or body alteration) is the wilful altering of the human body by an individual in a way that lasts forever or for a very long time. This is usually for non-medical reasons that include sexual enhancement, a rite of passage, aesthetic reasons, denoting affiliation, trust and loyalty, religious reasons, shock value, and self-expression. It can range from the socially acceptable decoration (e.g., pierced ears or nose in many societies) to the religiously mandated. Body art is the modification of any part of the human body for artistic or aesthetic reasons. Nanotechnology is currently available to implant biometric devices in human beings, which can be monitored by software, satellites and utilized by Government and Industry. In fact several developers are currently bringing these technologies to the public and private sector at affordable prices. The context of “Technology Consumerism” compounded by Intentionality and Free-Will of its consumer’s results in many unintended consequences outlined in this paper. Geometry of Morphogenesis is the proposed theory for decoding body modification.
身体修饰(Body modification)是指个人以一种永久或很长时间的方式故意改变人体。这通常是出于非医学原因,包括性增强、成人仪式、审美原因、表示从属关系、信任和忠诚、宗教原因、震惊价值和自我表达。它的范围可以从社会上可接受的装饰(例如,在许多社会中,耳洞或鼻子)到宗教规定。人体艺术是出于艺术或审美的原因对人体任何部位的修饰。目前,纳米技术可用于将生物识别装置植入人体,这些装置可通过软件、卫星进行监测,并为政府和工业界所用。事实上,一些开发商目前正在以可承受的价格将这些技术引入公共和私营部门。“技术消费主义”的背景与消费者的意向性和自由意志相结合,导致了本文概述的许多意想不到的后果。形态发生几何是人体修饰解码的理论基础。
{"title":"Nanotechnology – Intentionality and Free-Will","authors":"T. Gopal","doi":"10.13005/ojcst12.03.05","DOIUrl":"https://doi.org/10.13005/ojcst12.03.05","url":null,"abstract":"Body modification (or body alteration) is the wilful altering of the human body by an individual in a way that lasts forever or for a very long time. This is usually for non-medical reasons that include sexual enhancement, a rite of passage, aesthetic reasons, denoting affiliation, trust and loyalty, religious reasons, shock value, and self-expression. It can range from the socially acceptable decoration (e.g., pierced ears or nose in many societies) to the religiously mandated. Body art is the modification of any part of the human body for artistic or aesthetic reasons. Nanotechnology is currently available to implant biometric devices in human beings, which can be monitored by software, satellites and utilized by Government and Industry. In fact several developers are currently bringing these technologies to the public and private sector at affordable prices. The context of “Technology Consumerism” compounded by Intentionality and Free-Will of its consumer’s results in many unintended consequences outlined in this paper. Geometry of Morphogenesis is the proposed theory for decoding body modification.","PeriodicalId":270258,"journal":{"name":"Oriental journal of computer science and technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122301344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Oriental journal of computer science and technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1