首页 > 最新文献

Journal of Information and Telecommunication最新文献

英文 中文
Can EEG-devices differentiate attention values between incorrect and correct solutions for problem-solving tasks? 脑电图设备能否区分解决问题的正确解决方案和错误解决方案之间的注意力值?
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-08-04 DOI: 10.1080/24751839.2021.1950319
R. Bitner, N. Le
ABSTRACT The affective state of an individual can be determined using physiological parameters; an important metric that can then be extracted is attention. Looking more closely at compact EEGs, algorithms have been implemented in such devices that can measure the attention and other affective states of the user. No information about these algorithms is available; are these feature classification algorithms accurate? An experiment was conducted with 23 subjects who utilized a pedagogical agent to learn the syntax of the programming language Java while having their attention measured by the NeuroSky MindWave Mobile 2. Using a concurrent validity approach, the attention values measured were compared to band powers, as well as measures of task performance. The results of the experiment were in part successful and supportive of the claim that the EEG device’s attention algorithm does in fact represent a user’s attention accurately. The results of the analysis based on raw data captured from the device were consistent with previous literature. Inconclusive results were obtained relating to task performance and attention.
摘要个体的情感状态可以通过生理参数来确定;然后可以提取的一个重要度量是注意力。仔细观察紧凑型脑电图,算法已经在这种设备中实现,可以测量用户的注意力和其他情感状态。没有关于这些算法的信息;这些特征分类算法准确吗?对23名受试者进行了一项实验,他们使用教学代理学习编程语言Java的语法,同时通过NeuroSky MindWave Mobile 2测量他们的注意力。使用并发有效性方法,将测量的注意力值与带功率以及任务表现的测量值进行比较。实验结果在一定程度上是成功的,并支持了脑电图设备的注意力算法实际上准确地代表了用户的注意力的说法。基于从该设备获取的原始数据的分析结果与以前的文献一致。在任务表现和注意力方面获得了不明确的结果。
{"title":"Can EEG-devices differentiate attention values between incorrect and correct solutions for problem-solving tasks?","authors":"R. Bitner, N. Le","doi":"10.1080/24751839.2021.1950319","DOIUrl":"https://doi.org/10.1080/24751839.2021.1950319","url":null,"abstract":"ABSTRACT The affective state of an individual can be determined using physiological parameters; an important metric that can then be extracted is attention. Looking more closely at compact EEGs, algorithms have been implemented in such devices that can measure the attention and other affective states of the user. No information about these algorithms is available; are these feature classification algorithms accurate? An experiment was conducted with 23 subjects who utilized a pedagogical agent to learn the syntax of the programming language Java while having their attention measured by the NeuroSky MindWave Mobile 2. Using a concurrent validity approach, the attention values measured were compared to band powers, as well as measures of task performance. The results of the experiment were in part successful and supportive of the claim that the EEG device’s attention algorithm does in fact represent a user’s attention accurately. The results of the analysis based on raw data captured from the device were consistent with previous literature. Inconclusive results were obtained relating to task performance and attention.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"121 - 140"},"PeriodicalIF":2.7,"publicationDate":"2021-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1950319","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44879824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Overview of the challenges and solutions for 5G channel coding schemes 5G信道编码方案的挑战和解决方案概述
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-07-21 DOI: 10.1080/24751839.2021.1954752
M. Indoonundon, T. P. Fowdur
ABSTRACT 5G is the next generation of mobile communications networks which will use cutting-edge network technologies to deliver enhanced mobile connectivity. 5G has introduced new requirements for channel coding in its three different service classes which are enhanced mobile broadband (eMBB), ultra-reliable low latency communications (URLLC) and massive machine-type communications (mMTC). eMBB is expected to keep up with consumer’s insatiable demand for high mobile data rates to support data-extensive applications. mMTC will provide connectivity to a massive number of connected devices sending short data packets simultaneously to support applications such as Internet of Things (IoT). Finally, URLLC will ensure reliable low latency connectivity to support mission-critical latency-sensitive applications such as telesurgery. To address these new requirements, several new channel coding schemes are being developed. This review article provides a detailed analysis of the new channel coding challenges set out by 5G. A detailed review of existing and emerging solutions is provided. Moreover, simulation are performed to assess the performances of Low-Density Parity-Check (LDPC) codes and Polar codes used in 5G’s eMBB. Directions for future works and new solutions for 5G channel coding are also discussed.
摘要5G是下一代移动通信网络,它将使用尖端的网络技术来增强移动连接。5G在其三种不同的服务类别中引入了对信道编码的新要求,即增强型移动宽带(eMBB)、超可靠低延迟通信(URLLC)和大规模机器类型通信(mMTC)。eMBB有望满足消费者对高移动数据速率的永不满足的需求,以支持数据广泛的应用。mMTC将为大量同时发送短数据包的连接设备提供连接,以支持物联网(IoT)等应用。最后,URLLC将确保可靠的低延迟连接,以支持远程手术等任务关键延迟敏感应用。为了满足这些新的要求,正在开发几种新的信道编码方案。这篇综述文章详细分析了5G带来的新信道编码挑战。对现有和新出现的解决方案进行了详细审查。此外,还进行了仿真,以评估5G eMBB中使用的低密度奇偶校验(LDPC)码和极性码的性能。还讨论了5G信道编码的未来工作方向和新的解决方案。
{"title":"Overview of the challenges and solutions for 5G channel coding schemes","authors":"M. Indoonundon, T. P. Fowdur","doi":"10.1080/24751839.2021.1954752","DOIUrl":"https://doi.org/10.1080/24751839.2021.1954752","url":null,"abstract":"ABSTRACT 5G is the next generation of mobile communications networks which will use cutting-edge network technologies to deliver enhanced mobile connectivity. 5G has introduced new requirements for channel coding in its three different service classes which are enhanced mobile broadband (eMBB), ultra-reliable low latency communications (URLLC) and massive machine-type communications (mMTC). eMBB is expected to keep up with consumer’s insatiable demand for high mobile data rates to support data-extensive applications. mMTC will provide connectivity to a massive number of connected devices sending short data packets simultaneously to support applications such as Internet of Things (IoT). Finally, URLLC will ensure reliable low latency connectivity to support mission-critical latency-sensitive applications such as telesurgery. To address these new requirements, several new channel coding schemes are being developed. This review article provides a detailed analysis of the new channel coding challenges set out by 5G. A detailed review of existing and emerging solutions is provided. Moreover, simulation are performed to assess the performances of Low-Density Parity-Check (LDPC) codes and Polar codes used in 5G’s eMBB. Directions for future works and new solutions for 5G channel coding are also discussed.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"460 - 483"},"PeriodicalIF":2.7,"publicationDate":"2021-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1954752","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42899842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Basis exchange and learning algorithms for extracting collinear patterns 用于提取共线模式的基交换和学习算法
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-07-03 DOI: 10.1080/24751839.2020.1866335
L. Bobrowski, Paweł Zabielski
ABSTRACT Understanding large data sets is one of the most important and challenging problems in the modern days. Exploration of genetic data sets composed of high dimensional feature vectors can be treated as a leading example in this context. A better understanding of large, multivariate data sets can be achieved through exploration and extraction of their structure. Collinear patterns can be an important part of a given data set structure. Collinear (flat) pattern exists in a given set of feature vectors when many of these vectors are located on (or near) some plane in the feature space. Discovered flat patterns can reflect various types of interaction in an explored data set. The presented paper compares basis exchange algorithms with learning algorithms in the task of flat patterns extraction.
理解大数据集是当今最重要和最具挑战性的问题之一。探索由高维特征向量组成的遗传数据集可以作为这方面的一个主要例子。通过探索和提取其结构,可以更好地理解大型多元数据集。共线模式可以是给定数据集结构的重要组成部分。当给定的一组特征向量中的许多向量位于(或接近)特征空间中的某个平面时,就存在共线(平坦)模式。已发现的平面模式可以反映已探索数据集中的各种交互类型。本文对平面模式提取任务中的基交换算法和学习算法进行了比较。
{"title":"Basis exchange and learning algorithms for extracting collinear patterns","authors":"L. Bobrowski, Paweł Zabielski","doi":"10.1080/24751839.2020.1866335","DOIUrl":"https://doi.org/10.1080/24751839.2020.1866335","url":null,"abstract":"ABSTRACT Understanding large data sets is one of the most important and challenging problems in the modern days. Exploration of genetic data sets composed of high dimensional feature vectors can be treated as a leading example in this context. A better understanding of large, multivariate data sets can be achieved through exploration and extraction of their structure. Collinear patterns can be an important part of a given data set structure. Collinear (flat) pattern exists in a given set of feature vectors when many of these vectors are located on (or near) some plane in the feature space. Discovered flat patterns can reflect various types of interaction in an explored data set. The presented paper compares basis exchange algorithms with learning algorithms in the task of flat patterns extraction.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"334 - 349"},"PeriodicalIF":2.7,"publicationDate":"2021-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2020.1866335","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42452620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speeding up Composite Differential Evolution for structural optimization using neural networks 用神经网络加速结构优化的复合微分进化
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-06-30 DOI: 10.1080/24751839.2021.1946740
Tran-Hieu Nguyen, Anh-Tuan Vu
ABSTRACT Composite Differential Evolution (CoDE) is categorized as a (µ + λ)-Evolutionary Algorithm where each parent produces three trials. Thanks to that, the CoDE algorithm has a strong search capacity. However, the production of many offspring increases the computation cost of fitness evaluation. To overcome this problem, neural networks, a powerful machine learning algorithm, are used as surrogate models for rapidly evaluating the fitness of candidates, thereby speeding up the CoDE algorithm. More specifically, in the first phase, the CoDE algorithm is implemented as usual, but the fitnesses of produced candidates are saved to the database. Once a sufficient amount of data has been collected, a neural network is developed to predict the constraint violation degree of candidates. Offspring produced later will be evaluated using the trained neural network and only the best among them is compared with its parent by exact fitness evaluation. In this way, the number of exact fitness evaluations is significantly reduced. The proposed method is applied for three benchmark problems of 10-bar truss, 25-bar truss, and 72-bar truss. The results show that the proposed method reduces the computation cost by approximately 60%.
复合差分进化(CoDE)被归类为(µ+ λ)-进化算法,其中每个亲本产生三次试验。因此,CoDE算法具有很强的搜索能力。然而,大量子代的产生增加了适应度评估的计算成本。为了克服这个问题,神经网络作为一种强大的机器学习算法,被用作替代模型来快速评估候选对象的适应度,从而加快了CoDE算法的速度。更具体地说,在第一阶段,像往常一样实现CoDE算法,但是生成的候选对象的适应度被保存到数据库中。一旦收集到足够的数据量,就利用神经网络来预测候选者的约束违反程度。以后产生的后代将使用训练好的神经网络进行评估,并通过精确的适应度评估将其中最优的后代与其亲代进行比较。通过这种方式,精确适应度评估的数量显著减少。将该方法应用于10杆桁架、25杆桁架和72杆桁架三个基准问题。结果表明,该方法可将计算量减少约60%。
{"title":"Speeding up Composite Differential Evolution for structural optimization using neural networks","authors":"Tran-Hieu Nguyen, Anh-Tuan Vu","doi":"10.1080/24751839.2021.1946740","DOIUrl":"https://doi.org/10.1080/24751839.2021.1946740","url":null,"abstract":"ABSTRACT Composite Differential Evolution (CoDE) is categorized as a (µ + λ)-Evolutionary Algorithm where each parent produces three trials. Thanks to that, the CoDE algorithm has a strong search capacity. However, the production of many offspring increases the computation cost of fitness evaluation. To overcome this problem, neural networks, a powerful machine learning algorithm, are used as surrogate models for rapidly evaluating the fitness of candidates, thereby speeding up the CoDE algorithm. More specifically, in the first phase, the CoDE algorithm is implemented as usual, but the fitnesses of produced candidates are saved to the database. Once a sufficient amount of data has been collected, a neural network is developed to predict the constraint violation degree of candidates. Offspring produced later will be evaluated using the trained neural network and only the best among them is compared with its parent by exact fitness evaluation. In this way, the number of exact fitness evaluations is significantly reduced. The proposed method is applied for three benchmark problems of 10-bar truss, 25-bar truss, and 72-bar truss. The results show that the proposed method reduces the computation cost by approximately 60%.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"101 - 120"},"PeriodicalIF":2.7,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1946740","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45362587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sharing secured data on peer-to-peer applications using attribute-based encryption 使用基于属性的加密在对等应用程序上共享安全数据
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-06-25 DOI: 10.1080/24751839.2021.1941574
Nhan Tam Dang, V. Nguyen, Hai-Duong Le, Marcin Maleszka, Manh Ha Tran
ABSTRACT The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to access other parties' data. Data is the bedrock of today's technologies and researchers, especially in machine learning and deep learning. The business value of organizations is also massively data-dependent. Recent studies and industry applications can apply analytic techniques for exploiting data, or Internet users can exchange data on social networks or peer-to-peer (P2P) networks. However, sharing secured data is a challenging problem that attracts much attention from researchers. Sharing secure data with a group of users using P2P applications faces the unavailability problem of peer nodes. Thus users cannot certify and download the protected data. This affects a P2P-based application class of sharing and storing online services or customer-to-customer e-commerce applications. This article proposes a solution for sharing secured data on P2P-based applications using blockchain and attribute-based encryption. The attribute-based encryption guarantees sharing keys among a group of users, while blockchain guarantees keys distribution. We have simulated the proposed solution on the mobile peer-to-peer network that provides services for sharing and storing data securely.
摘要通信和存储的强劲增长导致对在网络上收集、存储和共享大量数据的需求显著增加。数据驱动的市场进一步增强了这一点,在这个市场上,每个人都想访问其他方的数据。数据是当今技术和研究人员的基石,尤其是在机器学习和深度学习方面。组织的业务价值也在很大程度上依赖于数据。最近的研究和行业应用可以应用分析技术来利用数据,或者互联网用户可以在社交网络或对等(P2P)网络上交换数据。然而,共享安全数据是一个备受研究人员关注的具有挑战性的问题。使用P2P应用程序与一组用户共享安全数据面临对等节点不可用的问题。因此,用户无法认证和下载受保护的数据。这影响了共享和存储在线服务或客户对客户电子商务应用程序的基于P2P的应用程序类。本文提出了一种使用区块链和基于属性的加密在基于P2P的应用程序上共享安全数据的解决方案。基于属性的加密保证在一组用户之间共享密钥,而区块链保证密钥分发。我们在移动对等网络上模拟了所提出的解决方案,该网络提供安全共享和存储数据的服务。
{"title":"Sharing secured data on peer-to-peer applications using attribute-based encryption","authors":"Nhan Tam Dang, V. Nguyen, Hai-Duong Le, Marcin Maleszka, Manh Ha Tran","doi":"10.1080/24751839.2021.1941574","DOIUrl":"https://doi.org/10.1080/24751839.2021.1941574","url":null,"abstract":"ABSTRACT The strong growth of communication and storage gives rise to the significantly increasing demand for collecting, storing, and sharing a large amount of data on networks. This is further enhanced by the data-driven market, where everyone wants to access other parties' data. Data is the bedrock of today's technologies and researchers, especially in machine learning and deep learning. The business value of organizations is also massively data-dependent. Recent studies and industry applications can apply analytic techniques for exploiting data, or Internet users can exchange data on social networks or peer-to-peer (P2P) networks. However, sharing secured data is a challenging problem that attracts much attention from researchers. Sharing secure data with a group of users using P2P applications faces the unavailability problem of peer nodes. Thus users cannot certify and download the protected data. This affects a P2P-based application class of sharing and storing online services or customer-to-customer e-commerce applications. This article proposes a solution for sharing secured data on P2P-based applications using blockchain and attribute-based encryption. The attribute-based encryption guarantees sharing keys among a group of users, while blockchain guarantees keys distribution. We have simulated the proposed solution on the mobile peer-to-peer network that provides services for sharing and storing data securely.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"440 - 459"},"PeriodicalIF":2.7,"publicationDate":"2021-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1941574","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41688527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A General Method for mining high-Utility itemsets with correlated measures 挖掘具有相关测度的高效用项集的一种通用方法
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-06-14 DOI: 10.1080/24751839.2021.1937465
N. M. Hung, Tung Nt, Bay Vo
ABSTRACT Discovering high-utility itemsets from a transaction database is one of the important tasks in High-Utility Itemset Mining (HUIM). The discovered high-utility itemsets (HUIs) must meet a user-defined given minimum utility threshold. Several methods have been proposed to solve the problem efficiently. However, they focused on exploring and discovering the set of HUIs. This research proposes a more generalized approach to mine HUIs using any user-specified correlated measure, named the General Method for Correlated High-utility itemset Mining (GMCHM). This proposed approach has the ability to discover HUIs that are highly correlated, based on the all_confidence and bond measures (and 38 other correlated measures). Evaluations were carried out on the standard datasets for HUIM, such as Accidents, BMS_utility and Connect. The results proved the high effectiveness of GMCHM in terms of running time, memory usage and the number of scanned candidates.
摘要从事务数据库中发现高实用性项目集是高实用性项集挖掘的重要任务之一。发现的高效用项目集(HUI)必须满足用户定义的给定最小效用阈值。已经提出了几种有效地解决该问题的方法。然而,他们专注于探索和发现回族。本研究提出了一种使用任何用户指定的相关测度来挖掘HUI的更通用的方法,称为相关高效用项集挖掘的通用方法(GMCHM)。所提出的方法能够基于所有置信度和债券度量(以及其他38个相关度量)来发现高度相关的HUI。在HUIM的标准数据集上进行了评估,如Accidents、BMS_utility和Connect。结果证明了GMCHM在运行时间、内存使用和扫描候选数量方面的高效性。
{"title":"A General Method for mining high-Utility itemsets with correlated measures","authors":"N. M. Hung, Tung Nt, Bay Vo","doi":"10.1080/24751839.2021.1937465","DOIUrl":"https://doi.org/10.1080/24751839.2021.1937465","url":null,"abstract":"ABSTRACT Discovering high-utility itemsets from a transaction database is one of the important tasks in High-Utility Itemset Mining (HUIM). The discovered high-utility itemsets (HUIs) must meet a user-defined given minimum utility threshold. Several methods have been proposed to solve the problem efficiently. However, they focused on exploring and discovering the set of HUIs. This research proposes a more generalized approach to mine HUIs using any user-specified correlated measure, named the General Method for Correlated High-utility itemset Mining (GMCHM). This proposed approach has the ability to discover HUIs that are highly correlated, based on the all_confidence and bond measures (and 38 other correlated measures). Evaluations were carried out on the standard datasets for HUIM, such as Accidents, BMS_utility and Connect. The results proved the high effectiveness of GMCHM in terms of running time, memory usage and the number of scanned candidates.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"536 - 549"},"PeriodicalIF":2.7,"publicationDate":"2021-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1937465","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46775201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An SHO-based approach to timetable scheduling: a case study 一种基于SHO的时间表调度方法:案例研究
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-06-08 DOI: 10.1080/24751839.2021.1935644
Van Du Nguyen, Tram Nguyen
ABSTRACT University timetable scheduling, which is a typical problem that all universities around the world have to face every semester, is an NP-hard problem. It is the task of allocating the right timeslots and classrooms for various courses by taking into account predefined constraints. In the current literature, many approaches have been proposed to find feasible timetables. Among others, swarm-based algorithms are promising candidates because of their effectiveness and flexibility. This paper investigates proposing an approach to university timetable scheduling using a recent novel swarm-based algorithm named Spotted Hyena Optimizer (SHO) which is inspired by the hunting behaviour of spotted hyenas. Then, a combination of SA and SHO algorithms also investigated to improve the overall performance of the proposed method. We also illustrate the proposed method on a real-world university timetabling problem in Vietnam. Experimental results have indicated the efficiency of the proposed method in comparison to other competitive metaheuristic algorithm such as PSO algorithm in finding feasible timetables.
摘要大学时间表是一个NP难题,是世界各国大学每学期都要面对的一个典型问题。它的任务是通过考虑预定义的限制,为各种课程分配合适的时间段和教室。在目前的文献中,已经提出了许多方法来寻找可行的时间表。除此之外,基于群的算法由于其有效性和灵活性而成为有前途的候选算法。本文研究了一种利用最近一种名为斑点鬣狗优化器(SHO)的新的基于群体的算法进行大学时间表调度的方法,该算法的灵感来自于斑点鬣狗的狩猎行为。然后,还研究了SA和SHO算法的组合,以提高所提出方法的整体性能。我们还举例说明了在越南真实世界的大学时间表问题上提出的方法。实验结果表明,与其他竞争性的元启发式算法(如PSO算法)相比,该方法在寻找可行时间表方面是有效的。
{"title":"An SHO-based approach to timetable scheduling: a case study","authors":"Van Du Nguyen, Tram Nguyen","doi":"10.1080/24751839.2021.1935644","DOIUrl":"https://doi.org/10.1080/24751839.2021.1935644","url":null,"abstract":"ABSTRACT University timetable scheduling, which is a typical problem that all universities around the world have to face every semester, is an NP-hard problem. It is the task of allocating the right timeslots and classrooms for various courses by taking into account predefined constraints. In the current literature, many approaches have been proposed to find feasible timetables. Among others, swarm-based algorithms are promising candidates because of their effectiveness and flexibility. This paper investigates proposing an approach to university timetable scheduling using a recent novel swarm-based algorithm named Spotted Hyena Optimizer (SHO) which is inspired by the hunting behaviour of spotted hyenas. Then, a combination of SA and SHO algorithms also investigated to improve the overall performance of the proposed method. We also illustrate the proposed method on a real-world university timetabling problem in Vietnam. Experimental results have indicated the efficiency of the proposed method in comparison to other competitive metaheuristic algorithm such as PSO algorithm in finding feasible timetables.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"421 - 439"},"PeriodicalIF":2.7,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1935644","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46772205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document similarity for error prediction 用于错误预测的文档相似性
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-03-10 DOI: 10.1080/24751839.2021.1893496
Péter Marjai, P. Lehotay-Kéry, A. Kiss
ABSTRACT In today's rushing world, there's an ever-increasing usage of networking equipment. These devices log their operations; however, there could be errors that result in the restart of the given device. There could be different patterns before different errors. Our main goal is to predict the upcoming error based on the log lines of the actual file. To achieve this, we use document similarity. One of the key concepts of information retrieval is document similarity which is an indicator of how analogous (or different) documents are. In this paper, we are studying the effectiveness of prediction based on cosine similarity, Jaccard similarity, and Euclidean distance of rows before restarts. We use different features like TFIDF, Doc2Vec, LSH, and others in conjunction with these distance measures. Since networking devices produce lots of log files, we use Spark for Big data computing.
摘要在当今飞速发展的世界里,网络设备的使用越来越多。这些设备记录其操作;但是,可能存在导致给定设备重新启动的错误。在出现不同的错误之前可能会有不同的模式。我们的主要目标是根据实际文件的日志行来预测即将发生的错误。为了实现这一点,我们使用文档相似性。信息检索的关键概念之一是文档相似性,它是文档相似程度(或不同程度)的指标。在本文中,我们正在研究基于余弦相似性、Jaccard相似性和重新启动前行的欧几里得距离的预测的有效性。我们将TFIDF、Doc2Verc、LSH等不同功能与这些距离测量结合使用。由于网络设备会产生大量的日志文件,我们使用Spark进行大数据计算。
{"title":"Document similarity for error prediction","authors":"Péter Marjai, P. Lehotay-Kéry, A. Kiss","doi":"10.1080/24751839.2021.1893496","DOIUrl":"https://doi.org/10.1080/24751839.2021.1893496","url":null,"abstract":"ABSTRACT In today's rushing world, there's an ever-increasing usage of networking equipment. These devices log their operations; however, there could be errors that result in the restart of the given device. There could be different patterns before different errors. Our main goal is to predict the upcoming error based on the log lines of the actual file. To achieve this, we use document similarity. One of the key concepts of information retrieval is document similarity which is an indicator of how analogous (or different) documents are. In this paper, we are studying the effectiveness of prediction based on cosine similarity, Jaccard similarity, and Euclidean distance of rows before restarts. We use different features like TFIDF, Doc2Vec, LSH, and others in conjunction with these distance measures. Since networking devices produce lots of log files, we use Spark for Big data computing.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"407 - 420"},"PeriodicalIF":2.7,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1893496","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49431722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A modified version of GoogLeNet for melanoma diagnosis 用于黑色素瘤诊断的GoogLeNet改进版
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-03-10 DOI: 10.1080/24751839.2021.1893495
E. Yılmaz, M. Trocan
ABSTRACT Differential diagnosis of malignant melanoma, which is the cause of more than 75% of deaths amongst skin lesions, is vital for patients. Artificial intelligence-based decision support systems developed for the analysis of medical images are in the solution of such problems. In recent years, various deep learning algorithms have been developed to be used for this purpose. In our previous study, we compared the performances of AlexNet, GoogLeNet and ResNet-50 for the differential diagnosis of benign and malignant melanoma on International Skin Imaging Collaboration: Melanoma Project (ISIC) dataset. In this study, we proposed a CNN model by modifying the GoogLeNet algorithm and we compared the performance of this model with the previous results. For the experiments, we used 19,373 benign and 2197 malignant diagnosed dermoscopy images obtained from this public archive. We compared the performance results according to the eight different performance metrics including polygon area metric (PAM), classification accuracy (CA), sensitivity (SE), specificity (SP), area under curve (AUC), kappa (K), F measure metric (FM) and time complexity (TC) measures. According to the results, our proposed CNN achieved the best classification accuracy with 0.9309 and decreased the time complexity of GoogLeNet from 283 min 50 to 256 min 26 s.
摘要恶性黑色素瘤是导致75%以上皮肤病变死亡的原因,对患者进行鉴别诊断至关重要。为分析医学图像而开发的基于人工智能的决策支持系统正是解决这些问题的方法。近年来,各种深度学习算法已被开发用于此目的。在我们之前的研究中,我们在国际皮肤成像合作组织:黑色素瘤项目(ISIC)数据集上比较了AlexNet、GoogLeNet和ResNet-50在良恶性黑色素瘤鉴别诊断方面的性能。在这项研究中,我们通过修改GoogLeNet算法提出了一个CNN模型,并将该模型的性能与之前的结果进行了比较。在实验中,我们使用了从这个公共档案中获得的19373张良性和2197张恶性诊断的皮肤镜图像。我们根据八种不同的性能指标比较了性能结果,包括多边形面积指标(PAM)、分类准确度指标(CA)、敏感性指标(SE)、特异性指标(SP)、曲线下面积指标(AUC)、kappa指标(K)、F度量指标(FM)和时间复杂性指标(TC)。根据结果,我们提出的CNN获得了最佳的分类精度,为0.9309,并将GoogLeNet的时间复杂度从283降低 最小50至256 最小26 s
{"title":"A modified version of GoogLeNet for melanoma diagnosis","authors":"E. Yılmaz, M. Trocan","doi":"10.1080/24751839.2021.1893495","DOIUrl":"https://doi.org/10.1080/24751839.2021.1893495","url":null,"abstract":"ABSTRACT Differential diagnosis of malignant melanoma, which is the cause of more than 75% of deaths amongst skin lesions, is vital for patients. Artificial intelligence-based decision support systems developed for the analysis of medical images are in the solution of such problems. In recent years, various deep learning algorithms have been developed to be used for this purpose. In our previous study, we compared the performances of AlexNet, GoogLeNet and ResNet-50 for the differential diagnosis of benign and malignant melanoma on International Skin Imaging Collaboration: Melanoma Project (ISIC) dataset. In this study, we proposed a CNN model by modifying the GoogLeNet algorithm and we compared the performance of this model with the previous results. For the experiments, we used 19,373 benign and 2197 malignant diagnosed dermoscopy images obtained from this public archive. We compared the performance results according to the eight different performance metrics including polygon area metric (PAM), classification accuracy (CA), sensitivity (SE), specificity (SP), area under curve (AUC), kappa (K), F measure metric (FM) and time complexity (TC) measures. According to the results, our proposed CNN achieved the best classification accuracy with 0.9309 and decreased the time complexity of GoogLeNet from 283 min 50 to 256 min 26 s.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"395 - 405"},"PeriodicalIF":2.7,"publicationDate":"2021-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1893495","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43177130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Prediction of stock values changes using sentiment analysis of stock news headlines 基于股票新闻标题情绪分析的股票价值变动预测
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-02-01 DOI: 10.1080/24751839.2021.1874252
L. Nemes, A. Kiss
ABSTRACT The prediction and speculation about the values of the stock market especially the values of the worldwide companies are a really interesting and attractive topic. In this article, we cover the topic of the stock value changes and predictions of the stock values using fresh scraped economic news about the companies. We are focussing on the headlines of economic news. We use numerous different tools to the sentiment analysis of the headlines. We consider BERT as the baseline and compare the results with three other tools, VADER, TextBlob, and a Recurrent Neural Network, and compare the sentiment results to the stock changes of the same period. The BERT and RNN were much more accurate, these tools were able to determine the emotional values without neutral sections, in contrast to the other two tools. Comparing these results with the movement of stock market values in the same time periods, we can establish the moment of the change occurred in the stock values with sentiment analysis of economic news headlines. Also we discovered a significant difference between the different models in terms of the effect of emotional values on the change in the value of the stock market by the correlation matrices.
对股票市场价值的预测和猜测,特别是对跨国公司价值的预测和猜测,是一个非常有趣和有吸引力的话题。在这篇文章中,我们将讨论股票价值的变化,并使用有关这些公司的最新经济新闻来预测股票价值。我们关注的是经济新闻的头条。我们使用许多不同的工具来分析头条新闻的情绪。我们将BERT作为基准,并将结果与其他三种工具(VADER, TextBlob和递归神经网络)进行比较,并将情绪结果与同期的股票变化进行比较。BERT和RNN更加准确,与其他两种工具相比,这些工具能够在没有中性部分的情况下确定情绪值。将这些结果与同一时间段内股票市场价值的运动进行比较,我们可以通过对经济新闻标题的情绪分析来确定股票价值发生变化的时刻。通过相关矩阵分析,我们还发现不同模型在情绪价值观对股票市场价值变化的影响方面存在显著差异。
{"title":"Prediction of stock values changes using sentiment analysis of stock news headlines","authors":"L. Nemes, A. Kiss","doi":"10.1080/24751839.2021.1874252","DOIUrl":"https://doi.org/10.1080/24751839.2021.1874252","url":null,"abstract":"ABSTRACT The prediction and speculation about the values of the stock market especially the values of the worldwide companies are a really interesting and attractive topic. In this article, we cover the topic of the stock value changes and predictions of the stock values using fresh scraped economic news about the companies. We are focussing on the headlines of economic news. We use numerous different tools to the sentiment analysis of the headlines. We consider BERT as the baseline and compare the results with three other tools, VADER, TextBlob, and a Recurrent Neural Network, and compare the sentiment results to the stock changes of the same period. The BERT and RNN were much more accurate, these tools were able to determine the emotional values without neutral sections, in contrast to the other two tools. Comparing these results with the movement of stock market values in the same time periods, we can establish the moment of the change occurred in the stock values with sentiment analysis of economic news headlines. Also we discovered a significant difference between the different models in terms of the effect of emotional values on the change in the value of the stock market by the correlation matrices.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"5 1","pages":"375 - 394"},"PeriodicalIF":2.7,"publicationDate":"2021-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/24751839.2021.1874252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41788841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
期刊
Journal of Information and Telecommunication
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1