首页 > 最新文献

International Journal of Software Engineering and Computer Systems最新文献

英文 中文
A Domain-Specific Evaluation of the Performance of Selected Web-based Sentiment Analysis Platforms 选定的基于web的情感分析平台的特定领域性能评估
Pub Date : 2023-01-31 DOI: 10.15282/ijsecs.9.1.2023.1.0105
Manuel O. Diaz Jr.
There is now an increasing number of sentiment analysis software-as-a-service (SA-SaaS) offerings in the market. Approaches to sentiment analysis and their implementation as SA-SaaS vary, and there really is no sure way of knowing what SA-SaaS uses which approach. For potential users, SA-SaaS products are black boxes. Black boxes, however, can be evaluated using a set of standard input and a comparison of the output. Using a test data set drawn from human annotated samples in existing studies covering sentiment polarity of news headlines, this study compares the performance of selected popular and free (or at least free-to-try) SA-SaaS in terms of the accuracy, precision, recall and specificity of the sentiment classification using the black box testing methodology. SentiStrength, developed at the University of Wolverhampton in the UK, emerged as consistent performer across all metrics.
现在市场上有越来越多的情绪分析软件即服务(SA-SaaS)产品。情感分析的方法及其作为SA-SaaS的实现各不相同,并且确实无法确定哪种SA-SaaS使用哪种方法。对于潜在用户来说,SA-SaaS产品是黑盒。然而,黑盒可以使用一组标准输入和输出的比较来评估。使用现有研究中包含新闻标题情感极性的人类注释样本的测试数据集,本研究使用黑盒测试方法,比较了选定的流行和免费(或至少免费试用)SA-SaaS在情感分类的准确性、精密度、召回率和特异性方面的表现。英国伍尔弗汉普顿大学(University of Wolverhampton)开发的SentiStrength在所有指标上都表现一致。
{"title":"A Domain-Specific Evaluation of the Performance of Selected Web-based Sentiment Analysis Platforms","authors":"Manuel O. Diaz Jr.","doi":"10.15282/ijsecs.9.1.2023.1.0105","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.1.0105","url":null,"abstract":"There is now an increasing number of sentiment analysis software-as-a-service (SA-SaaS) offerings in the market. Approaches to sentiment analysis and their implementation as SA-SaaS vary, and there really is no sure way of knowing what SA-SaaS uses which approach. For potential users, SA-SaaS products are black boxes. Black boxes, however, can be evaluated using a set of standard input and a comparison of the output. Using a test data set drawn from human annotated samples in existing studies covering sentiment polarity of news headlines, this study compares the performance of selected popular and free (or at least free-to-try) SA-SaaS in terms of the accuracy, precision, recall and specificity of the sentiment classification using the black box testing methodology. SentiStrength, developed at the University of Wolverhampton in the UK, emerged as consistent performer across all metrics.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84280381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced On-demand Distance Vector Routing Protocol to prevent Blackhole Attack in MANET 增强的按需距离矢量路由协议防止黑洞攻击
Pub Date : 2023-01-24 DOI: 10.15282/ijsecs.9.1.2023.7.0111
O. M. Olanrewaju, Adebayo Abdulhafeez Abdulwasiu, Nuhu Abdulhafiz
Wireless networks are becoming increasingly popular. Mobile ad hoc networks are one category among the different types of wireless networks that transmit packets from the sender node to the receiver node without the use of abase station or infrastructure, as the nodes serve as both hosts and routers. These networks are referred to as mobile because they are movable. MANET is an ad-hoc network that can change positions at any time, and nodes can join or leave at any moment, making it vulnerable to attacks such as Blackhole. Existing solutions, in some ways, led to more memory space consumption, while others led to an overhead. This research proposes an Enhanced On-demand Distance Vector (AODV) routing protocol to prevent Blackhole attacks on MANETs using Diffie Hellman and Message Digest 5 (DHMD), implemented using Network Simulator 2 (NS2). The performance of the proposed protocol was evaluated using the following parameters: Packet Delivery Ratio, throughput, End to End (E2E)Delay, and routing overhead. It was concluded that DHMD has reduced network over head as it resulted to 23% while AODV resulted at 38%and memory consumption for DHMD gave 0.52ms compared to AODV that gave 0.81msdue to Blackhole prevention. This research will help to mitigate the effect of blackhole attacks in a network and increase network performance by reducing overhead and memory consumption.
无线网络正变得越来越流行。移动自组织网络是不同类型的无线网络中的一类,它在不使用基站或基础设施的情况下将数据包从发送方节点传输到接收方节点,因为节点既充当主机又充当路由器。这些网络被称为移动网络,因为它们是可移动的。MANET是一种可以随时改变位置的自组织网络,节点可以随时加入或离开,这使得它很容易受到像黑洞这样的攻击。现有的解决方案在某些方面导致了更多的内存空间消耗,而其他解决方案则导致了开销。本研究提出了一种增强的按需距离矢量(AODV)路由协议,使用Diffie Hellman和消息摘要5 (DHMD)来防止对manet的黑洞攻击,并使用网络模拟器2 (NS2)实现。该协议的性能通过以下参数进行评估:包投递率、吞吐量、端到端(E2E)延迟和路由开销。得出的结论是,DHMD减少了网络开销,减少了23%,而AODV减少了38%,由于黑洞预防,DHMD的内存消耗为0.52ms,而AODV的内存消耗为0.81ms。本研究将有助于减轻网络中黑洞攻击的影响,并通过减少开销和内存消耗来提高网络性能。
{"title":"Enhanced On-demand Distance Vector Routing Protocol to prevent Blackhole Attack in MANET","authors":"O. M. Olanrewaju, Adebayo Abdulhafeez Abdulwasiu, Nuhu Abdulhafiz","doi":"10.15282/ijsecs.9.1.2023.7.0111","DOIUrl":"https://doi.org/10.15282/ijsecs.9.1.2023.7.0111","url":null,"abstract":"Wireless networks are becoming increasingly popular. Mobile ad hoc networks are one category among the different types of wireless networks that transmit packets from the sender node to the receiver node without the use of abase station or infrastructure, as the nodes serve as both hosts and routers. These networks are referred to as mobile because they are movable. MANET is an ad-hoc network that can change positions at any time, and nodes can join or leave at any moment, making it vulnerable to attacks such as Blackhole. Existing solutions, in some ways, led to more memory space consumption, while others led to an overhead. This research proposes an Enhanced On-demand Distance Vector (AODV) routing protocol to prevent Blackhole attacks on MANETs using Diffie Hellman and Message Digest 5 (DHMD), implemented using Network Simulator 2 (NS2). The performance of the proposed protocol was evaluated using the following parameters: Packet Delivery Ratio, throughput, End to End (E2E)Delay, and routing overhead. It was concluded that DHMD has reduced network over head as it resulted to 23% while AODV resulted at 38%and memory consumption for DHMD gave 0.52ms compared to AODV that gave 0.81msdue to Blackhole prevention. This research will help to mitigate the effect of blackhole attacks in a network and increase network performance by reducing overhead and memory consumption.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"40 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86016290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Detection System Using Cloud Sandbox, Machine Learning 使用云沙箱、机器学习的恶意软件检测系统
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.3.0100
Mohd Azuwan EfendyMail, Mohd Faizal Ab Razak, Munirah Ab. Rahman
Today's internet continues to move forward, and with it comes the development of many applications. Therefore, these applications are also directly accessible via the Internet, which makes it one of the important things these days. In addition to this, these applications are sometimes developed as software that can be installed on users computers, laptops and even smartphones, which often attracts many attackers to compromise their computers with malware that is unintentionally installed in the computer. Gadgets and even computer systems. computer background. Many solutions have been employed to detect if these malware are installed. This paper aims to evaluate and study the effectiveness of machine learning methods in detecting and classifying malware being installed. This paper employs heuristics and machine learning classifiers to identify malware attacks detected in each website or software application. The study compares 3 classifiers to find the best machine learning classifier for detecting malware attacks. Prove that the cloud sandbox can achieve a high detection accuracy of 99.8% true positive rate value when identifying malware attacks? Use website features. Results show that Cloud Sandbox is an effective classifier for detecting malware attacks.
今天的互联网继续向前发展,随之而来的是许多应用程序的发展。因此,这些应用程序也可以通过Internet直接访问,这使得它成为当今重要的事情之一。除此之外,这些应用程序有时被开发为可以安装在用户计算机、笔记本电脑甚至智能手机上的软件,这通常会吸引许多攻击者使用无意中安装在计算机中的恶意软件来破坏他们的计算机。小工具甚至电脑系统。电脑背景。已经采用了许多解决方案来检测这些恶意软件是否已安装。本文旨在评估和研究机器学习方法在检测和分类已安装的恶意软件方面的有效性。本文采用启发式和机器学习分类器对每个网站或软件应用中检测到的恶意软件攻击进行识别。该研究比较了3种分类器,以找到检测恶意软件攻击的最佳机器学习分类器。证明云沙箱在识别恶意软件攻击时可以达到99.8%真阳性率的高检测准确率?利用网站功能。结果表明,云沙箱是检测恶意软件攻击的有效分类器。
{"title":"Malware Detection System Using Cloud Sandbox, Machine Learning","authors":"Mohd Azuwan EfendyMail, Mohd Faizal Ab Razak, Munirah Ab. Rahman","doi":"10.15282/ijsecs.8.2.2022.3.0100","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.3.0100","url":null,"abstract":"Today's internet continues to move forward, and with it comes the development of many applications. Therefore, these applications are also directly accessible via the Internet, which makes it one of the important things these days. In addition to this, these applications are sometimes developed as software that can be installed on users computers, laptops and even smartphones, which often attracts many attackers to compromise their computers with malware that is unintentionally installed in the computer. Gadgets and even computer systems. computer background. Many solutions have been employed to detect if these malware are installed. This paper aims to evaluate and study the effectiveness of machine learning methods in detecting and classifying malware being installed. This paper employs heuristics and machine learning classifiers to identify malware attacks detected in each website or software application. The study compares 3 classifiers to find the best machine learning classifier for detecting malware attacks. Prove that the cloud sandbox can achieve a high detection accuracy of 99.8% true positive rate value when identifying malware attacks? Use website features. Results show that Cloud Sandbox is an effective classifier for detecting malware attacks.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"2017 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84103194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Computer-Aided Diagnosis (CAD) System for Automatic Counting of Ki67 Cells in Meningioma 脑膜瘤Ki67细胞自动计数的计算机辅助诊断(CAD)系统
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.2.0099
Fahmi Akmal Dzulkifli, M. Y. Mashor, H. Jaafar
Meningioma is a type of primary brain tumour where this tumour arises in the three thin layers of tissues, called meninges. Tumour grading is usually used to describe tumour cells' characteristics and behaviours and how they look under a microscope. There were many techniques used for determining the grade of the tumour. Ki67 was the most common proliferation marker used to measure cell proliferation activity. Currently, pathologists used the manual counting technique to count the Ki67 cells before determining tumour grading. However, this technique was time-consuming, tiring and the counting results are often not accurate. Besides that, manual counting has poor reproducibility and discordant between counting values’ among the pathologist. Therefore, this study aimed to develop a Computer-Aided Design (CAD) software that automatically counts the Ki67 cells for determining tumour grading. The purpose of developing this software is to alleviate pathologists’ workload associated with counting Ki67 cells and scoring the Ki67 index. The CAD software was developed through seven stages. Based on Pearson Correlation Coefficient results, there was a good positive correlation between the proposed technique with the manual counting technique in counting positive and negative Ki67 cells with a correlation of 0.99 and 0.72 respectively. The proposed CAD system also showed promising results in computing the Ki67 labeling index with a low percentage absolute error of 1.85%.
脑膜瘤是一种原发性脑肿瘤,它起源于三层薄薄的组织,称为脑膜。肿瘤分级通常用于描述肿瘤细胞的特征和行为,以及它们在显微镜下的样子。有许多技术用于确定肿瘤的级别。Ki67是测量细胞增殖活性最常用的增殖标志物。目前,病理学家在确定肿瘤分级之前使用人工计数技术对Ki67细胞进行计数。然而,这种方法耗时,累人,计数结果往往不准确。此外,人工计数的重现性差,病理医师之间的计数值不一致。因此,本研究旨在开发一种计算机辅助设计(CAD)软件,自动计数Ki67细胞以确定肿瘤分级。开发该软件的目的是减轻病理学家与Ki67细胞计数和Ki67指数评分相关的工作量。CAD软件的开发共分七个阶段。Pearson相关系数结果显示,该技术与人工计数技术在Ki67阳性和阴性细胞计数上具有良好的正相关,相关系数分别为0.99和0.72。所提出的CAD系统在计算Ki67标记指数方面也显示出令人满意的结果,绝对误差为1.85%。
{"title":"A Computer-Aided Diagnosis (CAD) System for Automatic Counting of Ki67 Cells in Meningioma","authors":"Fahmi Akmal Dzulkifli, M. Y. Mashor, H. Jaafar","doi":"10.15282/ijsecs.8.2.2022.2.0099","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.2.0099","url":null,"abstract":"Meningioma is a type of primary brain tumour where this tumour arises in the three thin layers of tissues, called meninges. Tumour grading is usually used to describe tumour cells' characteristics and behaviours and how they look under a microscope. There were many techniques used for determining the grade of the tumour. Ki67 was the most common proliferation marker used to measure cell proliferation activity. Currently, pathologists used the manual counting technique to count the Ki67 cells before determining tumour grading. However, this technique was time-consuming, tiring and the counting results are often not accurate. Besides that, manual counting has poor reproducibility and discordant between counting values’ among the pathologist. Therefore, this study aimed to develop a Computer-Aided Design (CAD) software that automatically counts the Ki67 cells for determining tumour grading. The purpose of developing this software is to alleviate pathologists’ workload associated with counting Ki67 cells and scoring the Ki67 index. The CAD software was developed through seven stages. Based on Pearson Correlation Coefficient results, there was a good positive correlation between the proposed technique with the manual counting technique in counting positive and negative Ki67 cells with a correlation of 0.99 and 0.72 respectively. The proposed CAD system also showed promising results in computing the Ki67 labeling index with a low percentage absolute error of 1.85%.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85432595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the Design and Implementation of a Programming Language (Beex) 编程语言(Beex)的设计与实现
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.6.0103
F. Chete, O. Ikeh
Software Engineers, Computer Scientists, and Software Experts alike are faced to decide which programming language is best suited for a certain purpose as the use of programming languages grows. When we consider the various types of programming languages available today, such as Domain Specific Languages (DSL), General Purpose Languages (GPL), Functional Programming Languages (FPL), Imperative Programming Languages (IPL), amongst others, this becomes complicated. In this study, we introduce BeeX, an interpreted language, with the aim of showing the process and principles involved in language design and consider various choices faced by language designers of various programming languages. BeeX was created with simplicity in mind, thus the study focused on architectural design options. We look at the implementation standpoint and try to figure out what the basic building parts of most programming languages are, such as lexical analysis, syntax analysis, and evaluation phase. To achieve this, we created an interactive command interface that evaluated various BeeX language constructs(conditional logic statements, arithmetic expressions, loop constructs etc.) which allowed students to easily experiment with the proposed language. The results of the tests showed that students and programmers alike can use the BeeX programming language to create a variety of code structures that are simple to use.
随着编程语言使用的增长,软件工程师、计算机科学家和软件专家都面临着决定哪种编程语言最适合特定目的的问题。当我们考虑到今天可用的各种类型的编程语言,如领域特定语言(DSL),通用语言(GPL),函数式编程语言(FPL),命令式编程语言(IPL)等,这就变得复杂了。在本研究中,我们介绍了BeeX这一解释性语言,旨在展示语言设计的过程和原则,并考虑各种编程语言的语言设计者面临的各种选择。BeeX的设计理念是简洁,因此研究的重点是建筑设计方案。我们从实现的角度出发,试图找出大多数编程语言的基本构建部分是什么,比如词法分析、语法分析和求值阶段。为了实现这一目标,我们创建了一个交互式命令界面来评估各种BeeX语言结构(条件逻辑语句、算术表达式、循环结构等),使学生能够轻松地实验所提出的语言。测试结果表明,学生和程序员都可以使用BeeX编程语言创建各种易于使用的代码结构。
{"title":"Towards the Design and Implementation of a Programming Language (Beex)","authors":"F. Chete, O. Ikeh","doi":"10.15282/ijsecs.8.2.2022.6.0103","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.6.0103","url":null,"abstract":"Software Engineers, Computer Scientists, and Software Experts alike are faced to decide which programming language is best suited for a certain purpose as the use of programming languages grows. When we consider the various types of programming languages available today, such as Domain Specific Languages (DSL), General Purpose Languages (GPL), Functional Programming Languages (FPL), Imperative Programming Languages (IPL), amongst others, this becomes complicated. In this study, we introduce BeeX, an interpreted language, with the aim of showing the process and principles involved in language design and consider various choices faced by language designers of various programming languages. BeeX was created with simplicity in mind, thus the study focused on architectural design options. We look at the implementation standpoint and try to figure out what the basic building parts of most programming languages are, such as lexical analysis, syntax analysis, and evaluation phase. To achieve this, we created an interactive command interface that evaluated various BeeX language constructs(conditional logic statements, arithmetic expressions, loop constructs etc.) which allowed students to easily experiment with the proposed language. The results of the tests showed that students and programmers alike can use the BeeX programming language to create a variety of code structures that are simple to use.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84557121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feasibility Study on using MCDM for E-Voting 使用MCDM进行电子投票的可行性研究
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.1.0098
Suit Yan Ng, R. Mohamed
An online voting system is an election system that manages the election process. This is a medium for the voters to cast their votes. It is also being used to calculate the votes collected from the voters to choose the representative for their own faculty. A typical voting system is based on a single attempt for each candidate being voted. The voting does not reflect the criteria implies to the characteristic of the candidate that going to be the student leader. To be a student leader, the student should fulfil the requirement such as good academic results, interpersonal skills with society, involving in activities of university and etc. Although the current voting system is able to maximize the participation of the voters, the voters may blindly vote the ballots casually due to they do not know the details of the candidates and the result is low quality and low public’s trust in the selected candidate. In this study, the aim is to develop an interactive online voting system that have ranking feature with MCDM method which allow online voting system to collect high-quality results from the voters. The Multiple Criteria Decision Making (MCDM) method is used in the voting system while choosing the candidate. MCDM can let the voters make decision making or selecting the candidate based on the criteria that suit the position. The study starts with the literature study on implementing MCDM for a voting system. Then, a survey will be made to get the users’ views on the with and without implementation of the MCDM method in an online voting system. The expected result of the study is to investigate the current implementation of MCDM as a tool for decision making, then identify the possibility of adopting MCDM for the online voting system while choosing the representative for faculty students’ society. As a conclusion from the survey from the users’ views, it shown that most of the users thinks that the system with the implementation with MCDM method is less time consuming and able to produce high quality result compare to the current online voting system. Most of the respondents also stated that they are more preferring to use the online voting system with MCDM method in the future.
网上投票系统是一种管理选举过程的选举系统。这是选民投票的一个媒介。它还被用来计算从选民那里收集到的选票,以选出他们自己学院的代表。典型的投票系统是基于对每个候选人进行一次投票。投票结果并没有反映出候选人即将成为学生领袖的特点。要成为一名学生干部,学生必须具备良好的学习成绩、与社会交往的能力、参与大学活动等条件。现行的投票制度虽然能够最大限度地提高选民的参与度,但由于不了解候选人的详细情况,选民可能会盲目地随意投票,结果质量不高,公众对所选候选人的信任度不高。本研究的目的是利用MCDM方法开发一个具有排名特征的交互式在线投票系统,使在线投票系统能够从选民中收集高质量的结果。在选择候选人的投票系统中使用了多标准决策(MCDM)方法。MCDM可以让选民根据适合该职位的标准做出决策或选择候选人。本研究首先对投票系统中MCDM的实现进行了文献研究。然后,通过在线投票系统调查用户对是否实施MCDM方法的看法。本研究的预期结果是调查目前MCDM作为决策工具的实施情况,然后确定在选择教师学生协会代表时采用MCDM进行在线投票系统的可能性。从用户观点的调查中得出的结论是,大多数用户认为采用MCDM方法实现的系统与目前的在线投票系统相比,耗时更少,产生的结果质量更高。大多数受访者还表示,他们更倾向于在未来使用MCDM方法的在线投票系统。
{"title":"Feasibility Study on using MCDM for E-Voting","authors":"Suit Yan Ng, R. Mohamed","doi":"10.15282/ijsecs.8.2.2022.1.0098","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.1.0098","url":null,"abstract":"An online voting system is an election system that manages the election process. This is a medium for the voters to cast their votes. It is also being used to calculate the votes collected from the voters to choose the representative for their own faculty. A typical voting system is based on a single attempt for each candidate being voted. The voting does not reflect the criteria implies to the characteristic of the candidate that going to be the student leader. To be a student leader, the student should fulfil the requirement such as good academic results, interpersonal skills with society, involving in activities of university and etc. Although the current voting system is able to maximize the participation of the voters, the voters may blindly vote the ballots casually due to they do not know the details of the candidates and the result is low quality and low public’s trust in the selected candidate. In this study, the aim is to develop an interactive online voting system that have ranking feature with MCDM method which allow online voting system to collect high-quality results from the voters. The Multiple Criteria Decision Making (MCDM) method is used in the voting system while choosing the candidate. MCDM can let the voters make decision making or selecting the candidate based on the criteria that suit the position. The study starts with the literature study on implementing MCDM for a voting system. Then, a survey will be made to get the users’ views on the with and without implementation of the MCDM method in an online voting system. The expected result of the study is to investigate the current implementation of MCDM as a tool for decision making, then identify the possibility of adopting MCDM for the online voting system while choosing the representative for faculty students’ society. As a conclusion from the survey from the users’ views, it shown that most of the users thinks that the system with the implementation with MCDM method is less time consuming and able to produce high quality result compare to the current online voting system. Most of the respondents also stated that they are more preferring to use the online voting system with MCDM method in the future.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72587934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble Learning for the Prediction of Marketing Campaign Acceptance 营销活动接受度预测的集成学习
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.7.0104
Fakihotun Titiani, D. Riana
Artificial intelligence, commonly known as AI, has greatly influenced marketing strategies, including business models, sales processes, customer service options, and customer behaviour in receiving marketing campaigns. In a marketing campaign, all customers are targeted by advertising, including those who will not respond positively to the marketing campaign and reject the offer. This means that the company is inefficient; the marketing campaign is ineffective because customers are not segmented and targeted. As a result, costs increase and the company's profit decreases. Thence, this leads to the failure of the company's marketing campaigns. The purpose of this study is to experiment with using Ensemble Learning and tuning on the Marketing Campaign dataset by providing the classification methods. That classification method is called the Light Gradient Boosting Machine (LightGBM), Gradient Boosting Classifier (GBC), and AdaBoost Classifier (ADA), which have never been used in the classification of the Marketing Campaign dataset. The study results in the highest model with an accuracy value of 98.64%, AUC 0.9994, recall 95.77%, precision 95.77%, F1-score 95.77%, and kappa 94.98% when using the LightGBM for marketing campaign predictions
人工智能,通常被称为AI,极大地影响了营销策略,包括商业模式、销售流程、客户服务选择和客户在接受营销活动中的行为。在营销活动中,所有的客户都是广告的目标客户,包括那些不会积极响应营销活动和拒绝报价的客户。这意味着公司效率低下;营销活动是无效的,因为客户没有细分和目标。因此,成本增加,公司利润减少。因此,这导致了公司营销活动的失败。本研究的目的是通过提供分类方法,在Marketing Campaign数据集上实验使用集成学习和调优。这种分类方法被称为光梯度增强机(LightGBM)、梯度增强分类器(GBC)和AdaBoost分类器(ADA),它们从未被用于Marketing Campaign数据集的分类。研究结果表明,使用LightGBM进行营销活动预测时,模型的准确率为98.64%,AUC为0.9994,召回率为95.77%,准确率为95.77%,f1得分为95.77%,kappa为94.98%
{"title":"Ensemble Learning for the Prediction of Marketing Campaign Acceptance","authors":"Fakihotun Titiani, D. Riana","doi":"10.15282/ijsecs.8.2.2022.7.0104","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.7.0104","url":null,"abstract":"Artificial intelligence, commonly known as AI, has greatly influenced marketing strategies, including business models, sales processes, customer service options, and customer behaviour in receiving marketing campaigns. In a marketing campaign, all customers are targeted by advertising, including those who will not respond positively to the marketing campaign and reject the offer. This means that the company is inefficient; the marketing campaign is ineffective because customers are not segmented and targeted. As a result, costs increase and the company's profit decreases. Thence, this leads to the failure of the company's marketing campaigns. The purpose of this study is to experiment with using Ensemble Learning and tuning on the Marketing Campaign dataset by providing the classification methods. That classification method is called the Light Gradient Boosting Machine (LightGBM), Gradient Boosting Classifier (GBC), and AdaBoost Classifier (ADA), which have never been used in the classification of the Marketing Campaign dataset. The study results in the highest model with an accuracy value of 98.64%, AUC 0.9994, recall 95.77%, precision 95.77%, F1-score 95.77%, and kappa 94.98% when using the LightGBM for marketing campaign predictions","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82311543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Neural Network for Click-Through Rate Prediction 用于点击率预测的深度神经网络
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.4.0101
D. Riana
Predicted click-through rate is one of the most frequently used criteria to determine the effectiveness of an ads. In advertising production, click-through predictions are very influential for the company that places the ads. Click-through rates need to be predicted accurately because accurate prediction results determine whether the click-through rate is exactly clicked or not by the viewing consumer. Predicted click-through can be done on advertising and social network datasets. The use of these two datasets is intended to make the comparison results more convincing from the proposed method. The purpose of this study is to compare two advertising and social network datasets, by proposing the application of the Deep Neural Network (DNN) model by testing hyperparameter variations to find a better architecture in predicting whether or not users click on an advertisement. The hyperparameter variations include 3 variations of the hidden layer, 2 variations of the activation function, namely ReLuand Sigmoid, 3 variations of the optimization (RMSprop, Adam, and Adagrad),and 3 variations of the learning rate (0.1, 0.01, and 0.001). The results of experiments conducted with the advertising parameter dataset with hidden layer of 3, learning rate of 0.01,and Adam optimization with an accuracy value of 99.90%, AUC of 99.90% and Precision-Recallof99.89% while the data for social network ads parameters with hidden layer of 5, learning rate of 0.1 and Adam optimization with accuracy of 92.25%, AUC of 92.72%,andPrecision-Recallof 89.70%.
预测点击率是确定广告有效性的最常用标准之一。在广告制作中,点击率预测对投放广告的公司非常有影响力。点击率需要准确预测,因为准确的预测结果决定了观看消费者是否准确点击了点击率。预测点击率可以在广告和社交网络数据集上完成。使用这两个数据集的目的是使所提出的方法的比较结果更具说服力。本研究的目的是比较两个广告和社交网络数据集,通过提出深度神经网络(DNN)模型的应用,通过测试超参数变化来找到一个更好的架构来预测用户是否点击广告。超参数变化包括隐藏层的3个变化,激活函数的2个变化,即relland和Sigmoid,优化的3个变化(RMSprop、Adam和Adagrad),学习率的3个变化(0.1、0.01和0.001)。使用隐藏层为3、学习率为0.01、Adam优化准确率为99.90%、AUC为99.90%、precision - recallf99.89%的广告参数数据集进行实验,使用隐藏层为5、学习率为0.1、Adam优化准确率为92.25%、AUC为92.72%、precision - recallf89.70%的社交网络广告参数数据集进行实验。
{"title":"Deep Neural Network for Click-Through Rate Prediction","authors":"D. Riana","doi":"10.15282/ijsecs.8.2.2022.4.0101","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.4.0101","url":null,"abstract":"Predicted click-through rate is one of the most frequently used criteria to determine the effectiveness of an ads. In advertising production, click-through predictions are very influential for the company that places the ads. Click-through rates need to be predicted accurately because accurate prediction results determine whether the click-through rate is exactly clicked or not by the viewing consumer. Predicted click-through can be done on advertising and social network datasets. The use of these two datasets is intended to make the comparison results more convincing from the proposed method. The purpose of this study is to compare two advertising and social network datasets, by proposing the application of the Deep Neural Network (DNN) model by testing hyperparameter variations to find a better architecture in predicting whether or not users click on an advertisement. The hyperparameter variations include 3 variations of the hidden layer, 2 variations of the activation function, namely ReLuand Sigmoid, 3 variations of the optimization (RMSprop, Adam, and Adagrad),and 3 variations of the learning rate (0.1, 0.01, and 0.001). The results of experiments conducted with the advertising parameter dataset with hidden layer of 3, learning rate of 0.01,and Adam optimization with an accuracy value of 99.90%, AUC of 99.90% and Precision-Recallof99.89% while the data for social network ads parameters with hidden layer of 5, learning rate of 0.1 and Adam optimization with accuracy of 92.25%, AUC of 92.72%,andPrecision-Recallof 89.70%.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75519348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fraudulent Account Detection in the Ethereum’s Network Using Various Machine Learning Techniques 使用各种机器学习技术检测以太坊网络中的欺诈账户
Pub Date : 2022-07-01 DOI: 10.15282/ijsecs.8.2.2022.5.0102
A. Sallam, Taha H. Rassem, Hanadi Abdu, Haneen S. Abdulkareem, Nada Saif, Samia Abdullah
On the Ethereum network, users communicate with one another through a variety of different accounts. Pseudo-anonymity was enforced over the network to provide the highest level of privacy. By using accounts that engage in fraudulent activity across the network, such privacy may be exploited. Like other cryptocurrencies, Ethereum blockchain may exploited with several fraudulent activities such as Ponzi schemes, phishing, or Initial Coin Offering (ICO) exits, etc. However, the identification of parameters with abnormal account characteristics is not an easy task and requires an intelligent approach to distinguish between normal and fraudulent activities. Therefore, this paper has attempted to solve this a problem by using machine learning techniques to introduce a robust approach that can detect fraudulent accounts on Ethereum. We have used a K-Nearest Neighbor, Random Forest and XGBoost over a collected dataset of 4,681 instances along with 2,179 fraudulent accounts associated and 2,502 regular accounts. The XGBoost, RF, and KNN techniques achieved average accuracies of 96.80 %, 94.8 8%, and 87.85% and an average AUC of 0.995, 0.99 and 0.93, respectively.
在以太坊网络上,用户通过各种不同的帐户相互通信。伪匿名在网络上被强制执行,以提供最高级别的隐私。通过使用在网络上从事欺诈活动的帐户,这种隐私可能会被利用。与其他加密货币一样,以太坊区块链可能会被一些欺诈活动所利用,如庞氏骗局、网络钓鱼或首次代币发行(ICO)退出等。然而,识别具有异常账户特征的参数并不是一件容易的事情,需要一种智能的方法来区分正常和欺诈活动。因此,本文试图通过使用机器学习技术来引入一种可以检测以太坊欺诈账户的强大方法来解决这个问题。我们对收集的4,681个实例的数据集以及2179个欺诈账户和2,502个正常账户使用了k -最近邻、随机森林和XGBoost。XGBoost、RF和KNN技术的平均准确率分别为96.80%、94.8%和87.85%,平均AUC分别为0.995、0.99和0.93。
{"title":"Fraudulent Account Detection in the Ethereum’s Network Using Various Machine Learning Techniques","authors":"A. Sallam, Taha H. Rassem, Hanadi Abdu, Haneen S. Abdulkareem, Nada Saif, Samia Abdullah","doi":"10.15282/ijsecs.8.2.2022.5.0102","DOIUrl":"https://doi.org/10.15282/ijsecs.8.2.2022.5.0102","url":null,"abstract":"On the Ethereum network, users communicate with one another through a variety of different accounts. Pseudo-anonymity was enforced over the network to provide the highest level of privacy. By using accounts that engage in fraudulent activity across the network, such privacy may be exploited. Like other cryptocurrencies, Ethereum blockchain may exploited with several fraudulent activities such as Ponzi schemes, phishing, or Initial Coin Offering (ICO) exits, etc. However, the identification of parameters with abnormal account characteristics is not an easy task and requires an intelligent approach to distinguish between normal and fraudulent activities. Therefore, this paper has attempted to solve this a problem by using machine learning techniques to introduce a robust approach that can detect fraudulent accounts on Ethereum. We have used a K-Nearest Neighbor, Random Forest and XGBoost over a collected dataset of 4,681 instances along with 2,179 fraudulent accounts associated and 2,502 regular accounts. The XGBoost, RF, and KNN techniques achieved average accuracies of 96.80 %, 94.8 8%, and 87.85% and an average AUC of 0.995, 0.99 and 0.93, respectively.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90266920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OPTIMIZED GENETIC ALGORITHM AND EXTENDED DIFFIE HELLMAN AS AN EFFECTUAL APPROACH FOR DOS-ATTACK DETECTION IN CLOUD 优化遗传算法和扩展diffie hellman算法是云环境下dos攻击检测的有效方法
Pub Date : 2022-05-10 DOI: 10.15282/ijsecs.8.1.2022.7.0097
Himanshi Chaudhary, Himanshu Chaudhary, A. Sharma
 Cloud computing is a mode to increase competence and capabilities devoid of investing in any infrastructure. It seems that in cloud computing environment the major problem that ensure the secure communication and protect responsive data in open networks from unauthorised access. These days it seems the headlines are jam-packed with stories about security breaches to these services; that result in the leak of a large amount of private data of the users. As cloud computing can offer new computing benefits, but it faces soaring risks, specifically on the security side where DOS attacks can make cloud services unavailable. This paper aims to turn up an effective method of detecting DOS attacks with an optimized Genetic algorithm and extended version of Diffie-hellman algorithm. To prevent data loss or corruption caused by the insiders in the cloud, Optimized Genetic Algorithm (OGA) is utilized, which effectively recovers the data and retrieve it if the missed data without loss. It is then followed with the decryption process as if requested by the user. An optimized path assortment for information broadcast proves to be an effective method in the cloud computing atmosphere. The proposed framework ensures certification and paves way for secure data access in an unauthorized network, with improved performance. It successfully assure the high level of protection of the transmission and data transmitted. And concurrently reduce the communication complexities.To reduce time complexity and detect the attackers by mutual secret key that is brought on using extended version of Diffie-hellman to endorse available key generation.
云计算是一种无需投资任何基础设施即可提高能力和能力的模式。在云计算环境中,确保安全通信和保护开放网络中的响应性数据不受未经授权的访问似乎是主要问题。这些天,头条新闻似乎充斥着这些服务安全漏洞的报道;这导致了大量用户私人数据的泄露。由于云计算可以提供新的计算优势,但它面临着飙升的风险,特别是在DOS攻击可能使云服务不可用的安全方面。本文旨在利用优化的遗传算法和扩展版的Diffie-hellman算法提出一种检测DOS攻击的有效方法。为了防止云中的内部人员造成数据丢失或损坏,采用了优化遗传算法(OGA),可以有效地恢复数据,如果丢失了数据,可以检索数据,而不会丢失数据。然后,按照用户的请求,进行解密过程。在云计算环境下,优化信息传播路径分类是一种有效的方法。提出的框架确保了认证,并为未经授权的网络中的安全数据访问铺平了道路,并提高了性能。它成功地保证了传输和数据传输的高水平保护。同时减少了通信的复杂性。为了降低时间复杂度,利用扩展版的Diffie-hellman对可用密钥生成进行背书,并引入互秘钥来检测攻击者。
{"title":"OPTIMIZED GENETIC ALGORITHM AND EXTENDED DIFFIE HELLMAN AS AN EFFECTUAL APPROACH FOR DOS-ATTACK DETECTION IN CLOUD","authors":"Himanshi Chaudhary, Himanshu Chaudhary, A. Sharma","doi":"10.15282/ijsecs.8.1.2022.7.0097","DOIUrl":"https://doi.org/10.15282/ijsecs.8.1.2022.7.0097","url":null,"abstract":" Cloud computing is a mode to increase competence and capabilities devoid of investing in any infrastructure. It seems that in cloud computing environment the major problem that ensure the secure communication and protect responsive data in open networks from unauthorised access. These days it seems the headlines are jam-packed with stories about security breaches to these services; that result in the leak of a large amount of private data of the users. As cloud computing can offer new computing benefits, but it faces soaring risks, specifically on the security side where DOS attacks can make cloud services unavailable. This paper aims to turn up an effective method of detecting DOS attacks with an optimized Genetic algorithm and extended version of Diffie-hellman algorithm. To prevent data loss or corruption caused by the insiders in the cloud, Optimized Genetic Algorithm (OGA) is utilized, which effectively recovers the data and retrieve it if the missed data without loss. It is then followed with the decryption process as if requested by the user. An optimized path assortment for information broadcast proves to be an effective method in the cloud computing atmosphere. The proposed framework ensures certification and paves way for secure data access in an unauthorized network, with improved performance. It successfully assure the high level of protection of the transmission and data transmitted. And concurrently reduce the communication complexities.To reduce time complexity and detect the attackers by mutual secret key that is brought on using extended version of Diffie-hellman to endorse available key generation.","PeriodicalId":31240,"journal":{"name":"International Journal of Software Engineering and Computer Systems","volume":"103 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79262572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Software Engineering and Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1