首页 > 最新文献

Journal of Advances in Information Technology最新文献

英文 中文
Corpus-Based Vocabulary List for Thai Language 基于语料库的泰语词汇表
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.319-327
H. Ketmaneechairat, Maleerat Maliyaem
—For natural language processing, a corpus is important for training models as also for the algorithms to create the machine learning models. This paper aimed to describe the design and process in creating a corpus-based vocabulary in the Thai language that can be used as a main corpus for natural language processing research. A corpus is created under the regulation of language. By using the actual Word Usage Frequency (WUF) analyzed from a text corpus cover several types of contents. The results presented the frequency of use of several characteristics, namely the frequency of word use character usage frequency and the frequency of using bigram characters. To be used in this research and used as important information for further NLP research. Based on the findings, it was concluded that the average word length increases when the number of words in the corpus increases. It means that the correlation between word length and frequency of words is in the same direction.
-对于自然语言处理,语料库对于训练模型和创建机器学习模型的算法都很重要。本文旨在描述一个基于语料库的泰语词汇库的设计和创建过程,该语料库可作为自然语言处理研究的主要语料库。语料库是在语言的调节下产生的。通过使用实际的词使用频率(WUF)分析从文本语料库中涵盖的几种类型的内容。结果显示了几个特征的使用频率,即词语使用频率、字符使用频率和双字使用频率。用于本研究,并作为进一步NLP研究的重要信息。基于这些发现,我们得出结论,当语料库中的单词数量增加时,平均单词长度也会增加。这意味着单词长度和单词频率之间的相关性是相同的方向。
{"title":"Corpus-Based Vocabulary List for Thai Language","authors":"H. Ketmaneechairat, Maleerat Maliyaem","doi":"10.12720/jait.14.2.319-327","DOIUrl":"https://doi.org/10.12720/jait.14.2.319-327","url":null,"abstract":"—For natural language processing, a corpus is important for training models as also for the algorithms to create the machine learning models. This paper aimed to describe the design and process in creating a corpus-based vocabulary in the Thai language that can be used as a main corpus for natural language processing research. A corpus is created under the regulation of language. By using the actual Word Usage Frequency (WUF) analyzed from a text corpus cover several types of contents. The results presented the frequency of use of several characteristics, namely the frequency of word use character usage frequency and the frequency of using bigram characters. To be used in this research and used as important information for further NLP research. Based on the findings, it was concluded that the average word length increases when the number of words in the corpus increases. It means that the correlation between word length and frequency of words is in the same direction.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM 基于SIEM的云计算环境下Cookie炸弹攻击检测
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.193-203
Ryuga Kaneko, Taiichi Saito
—This paper proposes a new method to detect Cookie Bomb attacks. A Cookie Bomb attack is a denial-of-service attack such that a user cannot receive a legitimate Hypertext Transfer Protocol (HTTP) response from an HTTP server because the total amount of cookies in an HTTP request exceeds the size limit accepted by the HTTP server. The new method includes our cloud architecture and detection algorithms. The cloud architecture distributes and executes a detection script, which is an implementation of the detection algorithms. This architecture uses Azure Virtual Machines, Azure Storage, Azure Automation, Azure Monitor, and Microsoft Sentinel. The virtual machines are the core components of the architecture, to which end users can connect via RDP to use their browsers. The detection script performs three tasks: obtaining paths to cookies databases generated by browsers, retrieving cookies data from a database, and comparing a threshold with the total size of all cookies a browser sends to a server. Results indicate that our proposed method 1) enables scheduled automation, 2) provides better visibility across regions, and 3) expands detection coverage for different Windows users, browsers, and browser profiles.
本文提出了一种检测Cookie Bomb攻击的新方法。Cookie Bomb攻击是一种拒绝服务攻击,使用户无法从HTTP服务器接收到合法的HTTP (Hypertext Transfer Protocol)响应,因为HTTP请求中的Cookie总数超过了HTTP服务器可接受的大小限制。新方法包括我们的云架构和检测算法。云架构分发并执行检测脚本,该脚本是检测算法的实现。该架构使用Azure虚拟机、Azure存储、Azure自动化、Azure监视器和Microsoft Sentinel。虚拟机是架构的核心组件,最终用户可以通过RDP连接到虚拟机以使用他们的浏览器。检测脚本执行三个任务:获取浏览器生成的cookie数据库的路径,从数据库中检索cookie数据,并将阈值与浏览器发送给服务器的所有cookie的总大小进行比较。结果表明,我们提出的方法1)实现了预定的自动化,2)提供了更好的跨区域可见性,以及3)扩展了针对不同Windows用户、浏览器和浏览器配置文件的检测范围。
{"title":"Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM","authors":"Ryuga Kaneko, Taiichi Saito","doi":"10.12720/jait.14.2.193-203","DOIUrl":"https://doi.org/10.12720/jait.14.2.193-203","url":null,"abstract":"—This paper proposes a new method to detect Cookie Bomb attacks. A Cookie Bomb attack is a denial-of-service attack such that a user cannot receive a legitimate Hypertext Transfer Protocol (HTTP) response from an HTTP server because the total amount of cookies in an HTTP request exceeds the size limit accepted by the HTTP server. The new method includes our cloud architecture and detection algorithms. The cloud architecture distributes and executes a detection script, which is an implementation of the detection algorithms. This architecture uses Azure Virtual Machines, Azure Storage, Azure Automation, Azure Monitor, and Microsoft Sentinel. The virtual machines are the core components of the architecture, to which end users can connect via RDP to use their browsers. The detection script performs three tasks: obtaining paths to cookies databases generated by browsers, retrieving cookies data from a database, and comparing a threshold with the total size of all cookies a browser sends to a server. Results indicate that our proposed method 1) enables scheduled automation, 2) provides better visibility across regions, and 3) expands detection coverage for different Windows users, browsers, and browser profiles.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Masked Face Detection and Recognition System Based on Deep Learning Algorithms 基于深度学习算法的蒙面人脸检测与识别系统
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.224-232
Hayat Al-Dmour, Afaf Tareef, A. Alkalbani, A. Hammouri, B. Alrahmani
Coronavirus (COVID-19) pandemic and its several variants have developed new habits in our daily lives. For instance, people have begun covering their faces in public areas and tight quarters to restrict the spread of the disease. However, the usage of face masks has hampered the ability of facial recognition systems to determine people's identities for registration authentication and dependability purpose. This study proposes a new deep-learning-based system for detecting and recognizing masked faces and determining the identity and whether the face is properly masked or not using several face image datasets. The proposed system was trained using a Convolutional Neural Network (CNN) with cross-validation and early stopping. First, a binary classification model was trained to discriminate between masked and unmasked faces, with the top model achieving a 99.77% accuracy. Then, a multi-class model was trained to classify the masked face images into three labels, i.e., correctly, incorrectly, and non-masked faces. The proposed model has achieved a high accuracy of 99.5%. Finally, the system recognizes the person's identity with an average accuracy of 97.98%. The visual assessment has proved that the proposed system succeeds in locating and matching faces. © 2023 by the authors.
冠状病毒(COVID-19)大流行及其几种变体已经在我们的日常生活中形成了新的习惯。例如,人们开始在公共场所和狭小的地方遮住脸,以限制疾病的传播。然而,口罩的使用阻碍了面部识别系统确定人们身份的能力,以进行注册认证和可靠性目的。本研究提出了一种新的基于深度学习的系统,用于检测和识别被遮挡的人脸,并使用多个人脸图像数据集确定身份以及人脸是否被正确遮挡。该系统使用交叉验证和早期停止的卷积神经网络(CNN)进行训练。首先,训练一个二元分类模型来区分蒙面和未蒙面的人脸,其中最优模型的准确率达到99.77%。然后,训练一个多类模型,将被屏蔽的人脸图像分为正确、不正确和非被屏蔽的三个标签。该模型的准确率达到了99.5%。最后,系统对人的身份进行识别,平均准确率为97.98%。视觉评价结果表明,该系统在人脸定位和匹配上是成功的。©2023作者所有。
{"title":"Masked Face Detection and Recognition System Based on Deep Learning Algorithms","authors":"Hayat Al-Dmour, Afaf Tareef, A. Alkalbani, A. Hammouri, B. Alrahmani","doi":"10.12720/jait.14.2.224-232","DOIUrl":"https://doi.org/10.12720/jait.14.2.224-232","url":null,"abstract":"Coronavirus (COVID-19) pandemic and its several variants have developed new habits in our daily lives. For instance, people have begun covering their faces in public areas and tight quarters to restrict the spread of the disease. However, the usage of face masks has hampered the ability of facial recognition systems to determine people's identities for registration authentication and dependability purpose. This study proposes a new deep-learning-based system for detecting and recognizing masked faces and determining the identity and whether the face is properly masked or not using several face image datasets. The proposed system was trained using a Convolutional Neural Network (CNN) with cross-validation and early stopping. First, a binary classification model was trained to discriminate between masked and unmasked faces, with the top model achieving a 99.77% accuracy. Then, a multi-class model was trained to classify the masked face images into three labels, i.e., correctly, incorrectly, and non-masked faces. The proposed model has achieved a high accuracy of 99.5%. Finally, the system recognizes the person's identity with an average accuracy of 97.98%. The visual assessment has proved that the proposed system succeeds in locating and matching faces. © 2023 by the authors.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-class Classification Approach for Retinal Diseases 视网膜疾病的多分类方法
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.392-398
Mario G. Gualsaqui, Stefany M. Cuenca, Ibeth L. Rosero, D. A. Almeida, C. Cadena, Fernando Villalba, Jonathan D. Cruz
—Early detection of the diagnosis of some diseases in the retina of the eye can improve the chances of cure and also prevent blindness. In this study, a Convolutional Neural Network (CNN) with different architectures (Scratch Model, GoogleNet, VGG, ResNet, MobileNet and DenseNet) was created to make a comparison between them and find the one with the best percentage of accuracy and less loss to generate the model for a better automatic classification of images using a MURED database containing retinal images already labeled previously with their respective disease. The results show that the model with the ResNet architecture variant InceptionResNetV2 has an accuracy of 49.85%.
-对某些视网膜疾病的早期发现诊断可以提高治愈的机会,也可以预防失明。在本研究中,我们创建了一个具有不同架构(Scratch Model、GoogleNet、VGG、ResNet、MobileNet和DenseNet)的卷积神经网络(CNN),对它们进行比较,找到准确率最高、损失最小的一个,并生成模型,以便使用包含先前已标记为各自疾病的视网膜图像的MURED数据库对图像进行更好的自动分类。结果表明,采用ResNet架构变体InceptionResNetV2的模型准确率为49.85%。
{"title":"Multi-class Classification Approach for Retinal Diseases","authors":"Mario G. Gualsaqui, Stefany M. Cuenca, Ibeth L. Rosero, D. A. Almeida, C. Cadena, Fernando Villalba, Jonathan D. Cruz","doi":"10.12720/jait.14.3.392-398","DOIUrl":"https://doi.org/10.12720/jait.14.3.392-398","url":null,"abstract":"—Early detection of the diagnosis of some diseases in the retina of the eye can improve the chances of cure and also prevent blindness. In this study, a Convolutional Neural Network (CNN) with different architectures (Scratch Model, GoogleNet, VGG, ResNet, MobileNet and DenseNet) was created to make a comparison between them and find the one with the best percentage of accuracy and less loss to generate the model for a better automatic classification of images using a MURED database containing retinal images already labeled previously with their respective disease. The results show that the model with the ResNet architecture variant InceptionResNetV2 has an accuracy of 49.85%.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Utilizing Word Index Approach with LSTM Architecture for Extracting Adverse Drug Reaction from Medical Reviews 基于LSTM结构的词索引方法在医学评论中药物不良反应提取中的应用
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.543-549
Asmaa J. M. Alshaikhdeeb, Y. Cheah
— Adverse Drug Reaction (ADR) detection from social reviews refers to the task of exploring medical online stores and social reviews for extracting any mention of abnormal reactions that occur after consuming a particular medical product by the consumers themselves. A variety of approaches have been used for extracting ADR from social/medical reviews. These approaches include machine learning, dictionary-based and statistical approaches. Yet, these approaches showed either a high dependency on using an external knowledge source for ADR detection or relying on domain-dependent mechanisms that might lose contextual information. This study aims to propose word sequencing with Long Short-Term Memory (LSTM) architecture. A benchmark dataset of MedSyn has been used in the experiments. Then, a word indexing, mapping, and padding method have been used to represent the words within the reviews as fixed sequences. Such sequences have been fed into the LSTM consequentially. Experimental results showed that the proposed LSTM could achieve an F1 score of up to 92%. Comparing such a finding to the baseline studies reveals the superiority of LSTM. The demonstration of the efficacy of the proposed method has taken different forms including the examination of word indexing with different classifiers, the examination of different features with LSTM, and through the comparison against the baseline studies.
-从社会评论中检测药品不良反应(ADR)是指通过搜索医疗在线商店和社会评论,提取消费者在使用特定医疗产品后出现的任何异常反应。从社会/医学评论中提取不良反应的方法多种多样。这些方法包括机器学习、基于字典和统计方法。然而,这些方法要么高度依赖于使用外部知识来源进行ADR检测,要么依赖于可能丢失上下文信息的领域相关机制。本研究旨在提出具有长短期记忆(LSTM)架构的词排序。实验中使用了MedSyn的基准数据集。然后,使用单词索引、映射和填充方法将评论中的单词表示为固定序列。这样的序列被送入LSTM。实验结果表明,所提出的LSTM可以达到高达92%的F1分数。将这一发现与基线研究进行比较,揭示了LSTM的优越性。所提出方法的有效性论证采取了不同的形式,包括使用不同的分类器检查词的标引,使用LSTM检查不同的特征,以及通过与基线研究的比较。
{"title":"Utilizing Word Index Approach with LSTM Architecture for Extracting Adverse Drug Reaction from Medical Reviews","authors":"Asmaa J. M. Alshaikhdeeb, Y. Cheah","doi":"10.12720/jait.14.3.543-549","DOIUrl":"https://doi.org/10.12720/jait.14.3.543-549","url":null,"abstract":"— Adverse Drug Reaction (ADR) detection from social reviews refers to the task of exploring medical online stores and social reviews for extracting any mention of abnormal reactions that occur after consuming a particular medical product by the consumers themselves. A variety of approaches have been used for extracting ADR from social/medical reviews. These approaches include machine learning, dictionary-based and statistical approaches. Yet, these approaches showed either a high dependency on using an external knowledge source for ADR detection or relying on domain-dependent mechanisms that might lose contextual information. This study aims to propose word sequencing with Long Short-Term Memory (LSTM) architecture. A benchmark dataset of MedSyn has been used in the experiments. Then, a word indexing, mapping, and padding method have been used to represent the words within the reviews as fixed sequences. Such sequences have been fed into the LSTM consequentially. Experimental results showed that the proposed LSTM could achieve an F1 score of up to 92%. Comparing such a finding to the baseline studies reveals the superiority of LSTM. The demonstration of the efficacy of the proposed method has taken different forms including the examination of word indexing with different classifiers, the examination of different features with LSTM, and through the comparison against the baseline studies.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Artificial Neural Network to Test Image Covert Communication Effect 利用人工神经网络测试图像隐蔽通信效果
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.741-748
Caswell Nkuna, Ebenezer Esenogho, R. Heymann, E. Matlotse
—Hacking social or personal information is rising, and data security is given serious attention in any organization. There are several data security strategies depending on what areas it is applied to, for instance, voice, image, or video. Image is the main focus of this paper; hence, this paper proposed and implemented an image steganography (covert communication) technique that does not break existing image recognition neural network systems. This technique enables data to be hidden in a cover image while the image recognition Artificial Neural Network (ANN) checks the presence of any visible alterations on the stego-image. Two different image steganography methods were tested: Least Significant Bit (LSB) and proposed Discrete Cosine Transform (DCT) LSB-2. The resulting stego-images were analyzed using a neural network implemented in the Keras TensorFlow soft tool. The results showed that the proposed DCT LSB-2 encoding method allows a high data payload and minimizes visible alterations, keeping the neural network’s efficiency at a maximum. An optimum ratio for encoding data in an image was determined to maintain the high robustness of the steganography system. This proposed method has shown improved stego-system performance compared to the previous techniques.
——黑客攻击社会或个人信息的现象正在增加,任何组织都非常重视数据安全。根据应用领域的不同,有几种数据安全策略,例如语音、图像或视频。图像是本文研究的重点;因此,本文提出并实现了一种不会破坏现有图像识别神经网络系统的图像隐写(隐蔽通信)技术。这种技术可以将数据隐藏在封面图像中,同时图像识别人工神经网络(ANN)检查隐藏图像上是否存在任何可见的变化。测试了两种不同的图像隐写方法:最低有效位(LSB)和提出的离散余弦变换(DCT) LSB-2。生成的隐写图像使用Keras TensorFlow软工具中实现的神经网络进行分析。结果表明,所提出的DCT LSB-2编码方法具有较高的数据负载和最小的可见变化,使神经网络的效率保持在最高水平。确定了图像中编码数据的最佳比例,以保持隐写系统的高鲁棒性。与以前的方法相比,该方法已显示出改进的隐写系统性能。
{"title":"Using Artificial Neural Network to Test Image Covert Communication Effect","authors":"Caswell Nkuna, Ebenezer Esenogho, R. Heymann, E. Matlotse","doi":"10.12720/jait.14.4.741-748","DOIUrl":"https://doi.org/10.12720/jait.14.4.741-748","url":null,"abstract":"—Hacking social or personal information is rising, and data security is given serious attention in any organization. There are several data security strategies depending on what areas it is applied to, for instance, voice, image, or video. Image is the main focus of this paper; hence, this paper proposed and implemented an image steganography (covert communication) technique that does not break existing image recognition neural network systems. This technique enables data to be hidden in a cover image while the image recognition Artificial Neural Network (ANN) checks the presence of any visible alterations on the stego-image. Two different image steganography methods were tested: Least Significant Bit (LSB) and proposed Discrete Cosine Transform (DCT) LSB-2. The resulting stego-images were analyzed using a neural network implemented in the Keras TensorFlow soft tool. The results showed that the proposed DCT LSB-2 encoding method allows a high data payload and minimizes visible alterations, keeping the neural network’s efficiency at a maximum. An optimum ratio for encoding data in an image was determined to maintain the high robustness of the steganography system. This proposed method has shown improved stego-system performance compared to the previous techniques.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying Blockchain: A Critical Analysis of Application Characteristics in Different Domains 揭开区块链的神秘面纱:不同领域应用特征的批判性分析
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.718-728
Vedika Jorika, Nagaratna Medishetty
—Different vertical domains have gained popularity in integrating Blockchain technology with their existing applications, because of its numerous benefits like immutable, transparency, privacy, persistence, and security. Blockchain technology is used in various circumstances, allows the applications to achieve higher security, improved traceability, and transparency. This paper reviewed most of the applications related to the different domains and the number of criteria met by each application in each domain requirement. This paper examines the advantages, disadvantages, and limitations of implementing the Blockchain in various applications in different domains. Furthermore, this paper describes the prerequisites for deploying Blockchain across multiple application fields.
-不同的垂直领域在将区块链技术与其现有应用程序集成方面已经获得了普及,因为它具有不可变、透明、隐私、持久性和安全性等众多优点。区块链技术用于各种情况,允许应用程序实现更高的安全性、改进的可跟踪性和透明度。本文回顾了与不同领域相关的大多数应用程序,以及每个应用程序在每个领域需求中满足的标准数量。本文研究了在不同领域的各种应用程序中实现区块链的优点、缺点和限制。此外,本文还描述了跨多个应用领域部署区块链的先决条件。
{"title":"Demystifying Blockchain: A Critical Analysis of Application Characteristics in Different Domains","authors":"Vedika Jorika, Nagaratna Medishetty","doi":"10.12720/jait.14.4.718-728","DOIUrl":"https://doi.org/10.12720/jait.14.4.718-728","url":null,"abstract":"—Different vertical domains have gained popularity in integrating Blockchain technology with their existing applications, because of its numerous benefits like immutable, transparency, privacy, persistence, and security. Blockchain technology is used in various circumstances, allows the applications to achieve higher security, improved traceability, and transparency. This paper reviewed most of the applications related to the different domains and the number of criteria met by each application in each domain requirement. This paper examines the advantages, disadvantages, and limitations of implementing the Blockchain in various applications in different domains. Furthermore, this paper describes the prerequisites for deploying Blockchain across multiple application fields.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Model to Detect Cancer from Cervical Histopathology Images by Optimizing Feature Selection and Ensemble Classifier 基于优化特征选择和集成分类器的宫颈癌组织病理学图像癌症检测改进模型
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.777-787
R. Laxmi, B. Kirubagari, Lakshmana Pandian
.
{"title":"Improved Model to Detect Cancer from Cervical Histopathology Images by Optimizing Feature Selection and Ensemble Classifier","authors":"R. Laxmi, B. Kirubagari, Lakshmana Pandian","doi":"10.12720/jait.14.4.777-787","DOIUrl":"https://doi.org/10.12720/jait.14.4.777-787","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Autonomous Vehicle Performance through Integration of an Image Deraining and a Deep Learning-Based Network for Lane Following 通过集成图像训练和基于深度学习的车道跟踪网络来提高自动驾驶汽车的性能
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.6.1159-1168
Hoang Tran Ngoc, Phuc Phan Hong, Anh Nguyen Quoc, Luyl-Da Quach
—Lane-keeping is a vital component of autonomous driving that requires multiple artificial intelligence technologies and vision systems. However, maintaining a vehicle’s position within the lane is challenging when there is low visibility due to rain. In this research, a combination of image deraining and a deep learning-based network is proposed to improve the performance of the autonomous vehicle. First, a robust progressive Residual Network (ResNet) is used for rain removal. Second, a deep learning-based network architecture of the Convolutional Neural Networks (CNNs) is applied for lane-following on roads. To assess its accuracy and rain-removal capabilities, the network was evaluated on both synthetic and natural Rainy Datasets (RainSP), and its performance was compared to that of earlier research networks. Furthermore, the effectiveness of using both deraining and non-deraining networks in CNNs is evaluated by analyzing the predicted steering angle output. The experimental results show that the proposed model generates safe and accurate motion planning for lane-keeping in autonomous vehicles.
{"title":"Improving Autonomous Vehicle Performance through Integration of an Image Deraining and a Deep Learning-Based Network for Lane Following","authors":"Hoang Tran Ngoc, Phuc Phan Hong, Anh Nguyen Quoc, Luyl-Da Quach","doi":"10.12720/jait.14.6.1159-1168","DOIUrl":"https://doi.org/10.12720/jait.14.6.1159-1168","url":null,"abstract":"—Lane-keeping is a vital component of autonomous driving that requires multiple artificial intelligence technologies and vision systems. However, maintaining a vehicle’s position within the lane is challenging when there is low visibility due to rain. In this research, a combination of image deraining and a deep learning-based network is proposed to improve the performance of the autonomous vehicle. First, a robust progressive Residual Network (ResNet) is used for rain removal. Second, a deep learning-based network architecture of the Convolutional Neural Networks (CNNs) is applied for lane-following on roads. To assess its accuracy and rain-removal capabilities, the network was evaluated on both synthetic and natural Rainy Datasets (RainSP), and its performance was compared to that of earlier research networks. Furthermore, the effectiveness of using both deraining and non-deraining networks in CNNs is evaluated by analyzing the predicted steering angle output. The experimental results show that the proposed model generates safe and accurate motion planning for lane-keeping in autonomous vehicles.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135610446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Web Recommendation Model Based on the Web Usage Mining Technique 基于Web使用挖掘技术的Web推荐模型
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1019-1028
Dalia L. Elsheweikh
—Most models of automated web recommender systems depend on data mining algorithms to discover useful navigational patterns from the user’s previous browsing history. This paper presents a new model for developing a collaborative web recommendation system using a new technique for knowledge extraction. The proposed model introduces two techniques: cluster similarity-based technique and rule extraction technique to provide proper recommendations that meet the user’s needs. A cluster similarity-based technique groups the sessions that share common interests and behaviors according to a new similarity measure between the web users’ sessions. The rule extraction technique, which is based on a trained Artificial Neural Network (ANN) using a Genetic Algorithm (GA), is performed to discover groups of accurate and comprehensible rules from the clustering sessions. For extracting rules that belong to a specific cluster, GA can be applied to get the perfect values of the pages that maximize the output function of this cluster. A set of pruning schemes is proposed to decrease the size of the rule set and remove non-interesting rules. The resulting set of web pages recommended for a specific cluster is the dominant page in all rules that belong to this cluster. The experimental results indicate the proposed model’s efficiency in improving the classification’s precision and recall.
{"title":"A Novel Web Recommendation Model Based on the Web Usage Mining Technique","authors":"Dalia L. Elsheweikh","doi":"10.12720/jait.14.5.1019-1028","DOIUrl":"https://doi.org/10.12720/jait.14.5.1019-1028","url":null,"abstract":"—Most models of automated web recommender systems depend on data mining algorithms to discover useful navigational patterns from the user’s previous browsing history. This paper presents a new model for developing a collaborative web recommendation system using a new technique for knowledge extraction. The proposed model introduces two techniques: cluster similarity-based technique and rule extraction technique to provide proper recommendations that meet the user’s needs. A cluster similarity-based technique groups the sessions that share common interests and behaviors according to a new similarity measure between the web users’ sessions. The rule extraction technique, which is based on a trained Artificial Neural Network (ANN) using a Genetic Algorithm (GA), is performed to discover groups of accurate and comprehensible rules from the clustering sessions. For extracting rules that belong to a specific cluster, GA can be applied to get the perfect values of the pages that maximize the output function of this cluster. A set of pruning schemes is proposed to decrease the size of the rule set and remove non-interesting rules. The resulting set of web pages recommended for a specific cluster is the dominant page in all rules that belong to this cluster. The experimental results indicate the proposed model’s efficiency in improving the classification’s precision and recall.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Advances in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1