首页 > 最新文献

Journal of Advances in Information Technology最新文献

英文 中文
A Novel Web Recommendation Model Based on the Web Usage Mining Technique 基于Web使用挖掘技术的Web推荐模型
Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1019-1028
Dalia L. Elsheweikh
—Most models of automated web recommender systems depend on data mining algorithms to discover useful navigational patterns from the user’s previous browsing history. This paper presents a new model for developing a collaborative web recommendation system using a new technique for knowledge extraction. The proposed model introduces two techniques: cluster similarity-based technique and rule extraction technique to provide proper recommendations that meet the user’s needs. A cluster similarity-based technique groups the sessions that share common interests and behaviors according to a new similarity measure between the web users’ sessions. The rule extraction technique, which is based on a trained Artificial Neural Network (ANN) using a Genetic Algorithm (GA), is performed to discover groups of accurate and comprehensible rules from the clustering sessions. For extracting rules that belong to a specific cluster, GA can be applied to get the perfect values of the pages that maximize the output function of this cluster. A set of pruning schemes is proposed to decrease the size of the rule set and remove non-interesting rules. The resulting set of web pages recommended for a specific cluster is the dominant page in all rules that belong to this cluster. The experimental results indicate the proposed model’s efficiency in improving the classification’s precision and recall.
{"title":"A Novel Web Recommendation Model Based on the Web Usage Mining Technique","authors":"Dalia L. Elsheweikh","doi":"10.12720/jait.14.5.1019-1028","DOIUrl":"https://doi.org/10.12720/jait.14.5.1019-1028","url":null,"abstract":"—Most models of automated web recommender systems depend on data mining algorithms to discover useful navigational patterns from the user’s previous browsing history. This paper presents a new model for developing a collaborative web recommendation system using a new technique for knowledge extraction. The proposed model introduces two techniques: cluster similarity-based technique and rule extraction technique to provide proper recommendations that meet the user’s needs. A cluster similarity-based technique groups the sessions that share common interests and behaviors according to a new similarity measure between the web users’ sessions. The rule extraction technique, which is based on a trained Artificial Neural Network (ANN) using a Genetic Algorithm (GA), is performed to discover groups of accurate and comprehensible rules from the clustering sessions. For extracting rules that belong to a specific cluster, GA can be applied to get the perfect values of the pages that maximize the output function of this cluster. A set of pruning schemes is proposed to decrease the size of the rule set and remove non-interesting rules. The resulting set of web pages recommended for a specific cluster is the dominant page in all rules that belong to this cluster. The experimental results indicate the proposed model’s efficiency in improving the classification’s precision and recall.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying Blockchain: A Critical Analysis of Application Characteristics in Different Domains 揭开区块链的神秘面纱:不同领域应用特征的批判性分析
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.718-728
Vedika Jorika, Nagaratna Medishetty
—Different vertical domains have gained popularity in integrating Blockchain technology with their existing applications, because of its numerous benefits like immutable, transparency, privacy, persistence, and security. Blockchain technology is used in various circumstances, allows the applications to achieve higher security, improved traceability, and transparency. This paper reviewed most of the applications related to the different domains and the number of criteria met by each application in each domain requirement. This paper examines the advantages, disadvantages, and limitations of implementing the Blockchain in various applications in different domains. Furthermore, this paper describes the prerequisites for deploying Blockchain across multiple application fields.
-不同的垂直领域在将区块链技术与其现有应用程序集成方面已经获得了普及,因为它具有不可变、透明、隐私、持久性和安全性等众多优点。区块链技术用于各种情况,允许应用程序实现更高的安全性、改进的可跟踪性和透明度。本文回顾了与不同领域相关的大多数应用程序,以及每个应用程序在每个领域需求中满足的标准数量。本文研究了在不同领域的各种应用程序中实现区块链的优点、缺点和限制。此外,本文还描述了跨多个应用领域部署区块链的先决条件。
{"title":"Demystifying Blockchain: A Critical Analysis of Application Characteristics in Different Domains","authors":"Vedika Jorika, Nagaratna Medishetty","doi":"10.12720/jait.14.4.718-728","DOIUrl":"https://doi.org/10.12720/jait.14.4.718-728","url":null,"abstract":"—Different vertical domains have gained popularity in integrating Blockchain technology with their existing applications, because of its numerous benefits like immutable, transparency, privacy, persistence, and security. Blockchain technology is used in various circumstances, allows the applications to achieve higher security, improved traceability, and transparency. This paper reviewed most of the applications related to the different domains and the number of criteria met by each application in each domain requirement. This paper examines the advantages, disadvantages, and limitations of implementing the Blockchain in various applications in different domains. Furthermore, this paper describes the prerequisites for deploying Blockchain across multiple application fields.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage 基于VAR和LSTM的云资源使用多元预测的加权集合
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.264-270
Jyoti Shetty, Karthik Cottur, G. Shobha, Y. Prajwal
—Forecasting resource usage values of a cloud service has ample applications such as service performance management, auto-scaling, capacity planning, and so on. While univariate forecasting techniques are the focus of current research, multivariate forecasting is rarely explored. This research work focuses on multivariate forecasting of resource usage values believing that there exists interdependency among the features of the underlying system that must be considered while forecasting. At first, the interdependency among the attributes is verified using Granger causality tests. Then the research explores various forecasting approaches — univariate Multi-Layer Perceptron (MLP), univariate Long Short Term Memory (LSTM), multivariate Vector Autoregression (VAR), and multivariate stacked LSTM. Further based on the observations of performances of these models the research proposes an implementation of a weighted ensemble of VAR and LSTM models to forecast key cloud resource usage metrics. The models thus proposed are implemented and validated using the publicly available GWA-T-12 Bitbrains time series dataset. The results show that the multivariate models outperform univariate models with lesser Normalised Root Mean Square Error (NRMSE) values. Also, the multivariate stacked LSTM outperforms VAR and the proposed ensemble forecasting model with lesser NRMSE values within a range of 1–5% for various resources across different lag values.
-预测云服务的资源使用值有很多应用,如服务性能管理、自动扩展、容量规划等。虽然单变量预测技术是当前研究的重点,但多元预测很少被探索。本研究的重点是资源利用值的多元预测,认为在预测时必须考虑底层系统的特征之间存在相互依赖关系。首先,使用格兰杰因果检验验证属性之间的相互依赖关系。然后研究了多种预测方法——单变量多层感知器(MLP)、单变量长短期记忆(LSTM)、多变量向量自回归(VAR)和多变量堆叠LSTM。进一步基于这些模型的性能观察,研究提出了VAR和LSTM模型加权集成的实现,以预测关键的云资源使用指标。利用公开可用的GWA-T-12 Bitbrains时间序列数据集实现并验证了所提出的模型。结果表明,多元模型优于单变量模型,具有较小的归一化均方根误差(NRMSE)值。此外,对于不同滞后值的各种资源,多元堆叠LSTM在1-5%范围内的NRMSE值较小,优于VAR和所提出的集合预测模型。
{"title":"A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage","authors":"Jyoti Shetty, Karthik Cottur, G. Shobha, Y. Prajwal","doi":"10.12720/jait.14.2.264-270","DOIUrl":"https://doi.org/10.12720/jait.14.2.264-270","url":null,"abstract":"—Forecasting resource usage values of a cloud service has ample applications such as service performance management, auto-scaling, capacity planning, and so on. While univariate forecasting techniques are the focus of current research, multivariate forecasting is rarely explored. This research work focuses on multivariate forecasting of resource usage values believing that there exists interdependency among the features of the underlying system that must be considered while forecasting. At first, the interdependency among the attributes is verified using Granger causality tests. Then the research explores various forecasting approaches — univariate Multi-Layer Perceptron (MLP), univariate Long Short Term Memory (LSTM), multivariate Vector Autoregression (VAR), and multivariate stacked LSTM. Further based on the observations of performances of these models the research proposes an implementation of a weighted ensemble of VAR and LSTM models to forecast key cloud resource usage metrics. The models thus proposed are implemented and validated using the publicly available GWA-T-12 Bitbrains time series dataset. The results show that the multivariate models outperform univariate models with lesser Normalised Root Mean Square Error (NRMSE) values. Also, the multivariate stacked LSTM outperforms VAR and the proposed ensemble forecasting model with lesser NRMSE values within a range of 1–5% for various resources across different lag values.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks 一种防止移动Ad-Hoc网络灰洞攻击的模型
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.532-542
Thabiso N. Khosa, Topside E. Mathonsi, D. D. Plessis
—Over the past few years, Mobile Ad-hoc Networks (MANET) has been playing an important role in ubiquitous networks based on its ability to support mobility without depending on infrastructure-based design, dynamic topology, and thus, are known as decentralized environment. One of the advantages of MANET is that its nodes can act both as routers and hosts. This, therefore, implies that its nodes can transmit packets between source to destination nodes. As a result of such and many more advantages, these networks are more vulnerable to different types of network attacks. In the recent past, several secured routing protocols were proposed and implemented for MANET. However, those protocols cannot fully guarantee security within these networks in terms of Denial of Services (DoS) attacks such as black hole and gray hole attacks. The review of the literature showed that existing solutions cannot always ensure true node classification. This is because MANET’s cooperative existence sometimes leads to the false exclusion of innocent nodes and/or proper classification of malicious nodes. A new Gray Hole Prevention (GRAY-HP) algorithm for the detection of malicious nodes with the actual high accuracy ratio of node classification is proposed in this paper. The proposed algorithm employs and modifies the gray-attack prevention technique known as Secure Detection Prevention and Elimination Gray Hole (SDPEGH), and the proactive scheme. It has been confirmed by Network Simulator 2 (NS2) computer simulation that the proposed algorithm outperforms the Genetic Algorithm to Bacterial Foraging Optimization (GA-BFO) and Rough Set Theory (RSetTheory) algorithms in terms of throughput, routing overhead and delivery ratio. The proposed GRAY-HP algorithm guarantees the successful elimination of Gray hole nodes, while it also ensures that no legitimate nodes are excluded
在过去的几年中,移动自组织网络(MANET)在无处不在的网络中发挥着重要作用,基于其支持移动性的能力,而不依赖于基于基础设施的设计,动态拓扑,因此被称为分散环境。MANET的优点之一是它的节点既可以充当路由器又可以充当主机。因此,这意味着它的节点可以在源节点到目的节点之间传输数据包。由于这些以及更多的优点,这些网络更容易受到不同类型的网络攻击。近年来,针对MANET提出并实现了几种安全路由协议。然而,这些协议不能完全保证这些网络内部的安全,以应对诸如黑洞和灰洞攻击等拒绝服务攻击。对文献的回顾表明,现有的解决方案并不能总是保证真实的节点分类。这是因为MANET的协作存在有时会导致对无害节点的错误排除和/或对恶意节点的正确分类。本文提出了一种新的灰洞预防(grey - hp)算法,用于检测具有较高准确率的恶意节点。该算法采用并改进了安全检测预防和消除灰洞(SDPEGH)灰色攻击防范技术和主动方案。网络模拟器2 (Network Simulator 2, NS2)计算机仿真证实,该算法在吞吐量、路由开销和投递率方面优于遗传算法to Bacterial Foraging Optimization (GA-BFO)和Rough SetTheory (RSetTheory)算法。提出的Gray - hp算法保证了灰洞节点的成功消除,同时也保证了合法节点不被排除在外
{"title":"A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks","authors":"Thabiso N. Khosa, Topside E. Mathonsi, D. D. Plessis","doi":"10.12720/jait.14.3.532-542","DOIUrl":"https://doi.org/10.12720/jait.14.3.532-542","url":null,"abstract":"—Over the past few years, Mobile Ad-hoc Networks (MANET) has been playing an important role in ubiquitous networks based on its ability to support mobility without depending on infrastructure-based design, dynamic topology, and thus, are known as decentralized environment. One of the advantages of MANET is that its nodes can act both as routers and hosts. This, therefore, implies that its nodes can transmit packets between source to destination nodes. As a result of such and many more advantages, these networks are more vulnerable to different types of network attacks. In the recent past, several secured routing protocols were proposed and implemented for MANET. However, those protocols cannot fully guarantee security within these networks in terms of Denial of Services (DoS) attacks such as black hole and gray hole attacks. The review of the literature showed that existing solutions cannot always ensure true node classification. This is because MANET’s cooperative existence sometimes leads to the false exclusion of innocent nodes and/or proper classification of malicious nodes. A new Gray Hole Prevention (GRAY-HP) algorithm for the detection of malicious nodes with the actual high accuracy ratio of node classification is proposed in this paper. The proposed algorithm employs and modifies the gray-attack prevention technique known as Secure Detection Prevention and Elimination Gray Hole (SDPEGH), and the proactive scheme. It has been confirmed by Network Simulator 2 (NS2) computer simulation that the proposed algorithm outperforms the Genetic Algorithm to Bacterial Foraging Optimization (GA-BFO) and Rough Set Theory (RSetTheory) algorithms in terms of throughput, routing overhead and delivery ratio. The proposed GRAY-HP algorithm guarantees the successful elimination of Gray hole nodes, while it also ensures that no legitimate nodes are excluded","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System 利用机器学习算法识别叶片病害以改进农业系统
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.122-129
Keerthi Kethineni, G. Pradeepini
Diagnosing plant disease is the foundation for effective and accurate plant disease prevention in a complicated environment. Smart farming is one of the fast-growing processes in the agricultural system, with the identification of disease in plants being a major one to help farmers. The processed data is saved in a database and used in making decisions in advance support, analysis of plants, and helps in crop planning. Plants are one of the essential resources for avoiding global warming. However, diseases such as blast, canker, black spot, brown spot, and bacterial leaf damage the plants. In this paper, image processing integration is developed to identify the type of disease and help automatically inspect all the leaf batches by storing the processed data. In some places, farmers are unaware of the experts and do not have proper facilities. In such conditions, one technique can be beneficial in keeping track and monitoring more crops. This technique makes it much easier and cheaper to detect disease. Machine learning can provide a method and algorithm to detect the disease. There should be training in images of all types of leaves, including healthy and disease leaf images. Five-stage detection processes are done in this paper. The stages are preprocessing, segmentation using k-Mean, feature extraction, features optimization using Firefly optimization Algorithm (FA), and classification using Support Vector Machine (SVM). The accuracy rate achieved using the proposed technique, i.e., GA-SVM is 91.3%, sensitivity is 90.72%, specificity 91.88, and precision is 92%. The results are evaluated using the matlab software tool.
植物病害诊断是在复杂环境下有效、准确防治植物病害的基础。智能农业是农业系统中快速发展的过程之一,植物病害识别是帮助农民的主要方法之一。处理后的数据保存在数据库中,用于提前支持、分析植物并帮助制定作物计划。植物是避免全球变暖的重要资源之一。然而,诸如稻瘟病、溃疡病、黑斑病、褐斑病和细菌性叶片等疾病会损害植物。本文开发了图像处理集成技术,通过存储处理后的数据,识别病害类型,实现对所有叶片批次的自动检测。在一些地方,农民不认识专家,也没有适当的设施。在这种条件下,有一种技术可以帮助跟踪和监测更多的作物。这项技术使检测疾病变得更加容易和便宜。机器学习可以提供一种检测疾病的方法和算法。应该对所有类型的叶子图像进行训练,包括健康和疾病叶子图像。本文采用五阶段检测方法。这些阶段包括预处理、使用k-Mean进行分割、特征提取、使用Firefly优化算法(FA)进行特征优化以及使用支持向量机(SVM)进行分类。该方法的准确率为91.3%,灵敏度为90.72%,特异度为91.88,精密度为92%。利用matlab软件工具对结果进行了评价。
{"title":"Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System","authors":"Keerthi Kethineni, G. Pradeepini","doi":"10.12720/jait.14.1.122-129","DOIUrl":"https://doi.org/10.12720/jait.14.1.122-129","url":null,"abstract":"Diagnosing plant disease is the foundation for effective and accurate plant disease prevention in a complicated environment. Smart farming is one of the fast-growing processes in the agricultural system, with the identification of disease in plants being a major one to help farmers. The processed data is saved in a database and used in making decisions in advance support, analysis of plants, and helps in crop planning. Plants are one of the essential resources for avoiding global warming. However, diseases such as blast, canker, black spot, brown spot, and bacterial leaf damage the plants. In this paper, image processing integration is developed to identify the type of disease and help automatically inspect all the leaf batches by storing the processed data. In some places, farmers are unaware of the experts and do not have proper facilities. In such conditions, one technique can be beneficial in keeping track and monitoring more crops. This technique makes it much easier and cheaper to detect disease. Machine learning can provide a method and algorithm to detect the disease. There should be training in images of all types of leaves, including healthy and disease leaf images. Five-stage detection processes are done in this paper. The stages are preprocessing, segmentation using k-Mean, feature extraction, features optimization using Firefly optimization Algorithm (FA), and classification using Support Vector Machine (SVM). The accuracy rate achieved using the proposed technique, i.e., GA-SVM is 91.3%, sensitivity is 90.72%, specificity 91.88, and precision is 92%. The results are evaluated using the matlab software tool.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"31 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Vehicle Sensor Network for Real-Time Air Pollution Analysis 用于实时空气污染分析的车辆传感器网络
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.39-45
Bleron Zherka, Zhilbert Tafa
Air Pollution (AP) is one of the main threats to global health. Real-time dynamic mapping of pollution distribution is of a crucial importance to the AP reduction and management. Conventional air quality monitoring relies on expensive and cumbersome monitoring stations. Such stations are sparsely deployed over a region – typically one to a few per city. The extrapolation of the dynamic spatiotemporal data away from these stations might be inaccurate. In this paper, we present a participatory Vehicle Sensor Network (VSN) based on low-cost mobile nodes deployed on public (taxi) vehicles. The system enables continuous real-time data acquisition, transmission, and utilization. As compared to the conventional approaches, our system greatly improves sensing coverage. The proposed platform enables the acquisition of a large amount of georeferenced and time-stamped data. It provides real time pollution mapping and historical data view. The system’s operational stability and continuity are examined and confirmed through the analysis of background data collected during 15 days of experimental implementation.
空气污染是全球健康的主要威胁之一。污染分布的实时动态映射对于减少和管理AP至关重要。传统的空气质量监测依赖于昂贵而笨重的监测站。这样的监测站在一个地区很少部署——通常每个城市一到几个。从这些台站外推动态时空数据可能是不准确的。在本文中,我们提出了一个基于部署在公共(出租车)车辆上的低成本移动节点的参与式车辆传感器网络(VSN)。该系统可实现连续的实时数据采集、传输和利用。与传统方法相比,我们的系统大大提高了传感覆盖率。所提出的平台能够获取大量的地理参考和时间戳数据。提供实时污染地图和历史数据视图。通过对15天实验实施期间收集的背景数据的分析,对系统的运行稳定性和连续性进行了检查和确认。
{"title":"A Vehicle Sensor Network for Real-Time Air Pollution Analysis","authors":"Bleron Zherka, Zhilbert Tafa","doi":"10.12720/jait.14.1.39-45","DOIUrl":"https://doi.org/10.12720/jait.14.1.39-45","url":null,"abstract":"Air Pollution (AP) is one of the main threats to global health. Real-time dynamic mapping of pollution distribution is of a crucial importance to the AP reduction and management. Conventional air quality monitoring relies on expensive and cumbersome monitoring stations. Such stations are sparsely deployed over a region – typically one to a few per city. The extrapolation of the dynamic spatiotemporal data away from these stations might be inaccurate. In this paper, we present a participatory Vehicle Sensor Network (VSN) based on low-cost mobile nodes deployed on public (taxi) vehicles. The system enables continuous real-time data acquisition, transmission, and utilization. As compared to the conventional approaches, our system greatly improves sensing coverage. The proposed platform enables the acquisition of a large amount of georeferenced and time-stamped data. It provides real time pollution mapping and historical data view. The system’s operational stability and continuity are examined and confirmed through the analysis of background data collected during 15 days of experimental implementation.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Software Project Management Framework 分布式软件项目管理框架
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.685-693
Kamal Uddin Sarker, R. Hasan, A. Deraman, Salman Mahmmod
—The software industry is enjoying the permeable and trans-border flow of software markets and can access resources from all corners of the world. Software engineers gain international work experience through a distributed working environment. It involves participation from individuals with different cultures, languages, and geographic time zones to work on a single project. In addition to providing global opportunities for software experts and businessmen, it also introduces new project management challenges. Barriers exist in trust, communication, monitoring, languages, cultures, and time zones. Distance mode management faces more technical challenges due to stakeholders’ ambiguous understanding and various documentation. This study addresses an in-depth analysis of challenges and currently practicing methods. Moreover, a new virtual project management framework is proposed to minimize issues and maximize the virtual project management team’s throughput. The framework is compared with commonly used methodologies by experts who have experience in global software project management, and the analysis is performed using the analytical hierarchy process. The evaluation matrix has shown that the proposed model is adequate for distance project management with better score in virtual scope and virtual management). Its excellency is in standard documentation practice, change management, and improving re-usability practice that will enhance business goals and stakeholder’s satisfaction.
——软件产业享有软件市场的渗透性和跨国界流动,可以从世界各个角落获取资源。软件工程师通过分布式工作环境获得国际工作经验。它涉及来自不同文化、语言和地理时区的个人参与一个项目。除了为软件专家和商人提供全球机会之外,它还引入了新的项目管理挑战。障碍存在于信任、沟通、监督、语言、文化和时区。由于利益相关者的模糊理解和各种文档,远程模式管理面临更多的技术挑战。本研究对挑战和目前的实践方法进行了深入的分析。在此基础上,提出了一种新的虚拟项目管理框架,以最大限度地减少问题,提高虚拟项目管理团队的吞吐量。该框架由具有全球软件项目管理经验的专家与常用的方法进行比较,并使用层次分析法进行分析。评价矩阵表明,该模型适合远程项目管理,在虚拟范围和虚拟管理方面得分较高。它的卓越之处在于标准文档实践、变更管理和改进可重用性实践,这些实践将增强业务目标和涉众的满意度。
{"title":"A Distributed Software Project Management Framework","authors":"Kamal Uddin Sarker, R. Hasan, A. Deraman, Salman Mahmmod","doi":"10.12720/jait.14.4.685-693","DOIUrl":"https://doi.org/10.12720/jait.14.4.685-693","url":null,"abstract":"—The software industry is enjoying the permeable and trans-border flow of software markets and can access resources from all corners of the world. Software engineers gain international work experience through a distributed working environment. It involves participation from individuals with different cultures, languages, and geographic time zones to work on a single project. In addition to providing global opportunities for software experts and businessmen, it also introduces new project management challenges. Barriers exist in trust, communication, monitoring, languages, cultures, and time zones. Distance mode management faces more technical challenges due to stakeholders’ ambiguous understanding and various documentation. This study addresses an in-depth analysis of challenges and currently practicing methods. Moreover, a new virtual project management framework is proposed to minimize issues and maximize the virtual project management team’s throughput. The framework is compared with commonly used methodologies by experts who have experience in global software project management, and the analysis is performed using the analytical hierarchy process. The evaluation matrix has shown that the proposed model is adequate for distance project management with better score in virtual scope and virtual management). Its excellency is in standard documentation practice, change management, and improving re-usability practice that will enhance business goals and stakeholder’s satisfaction.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity 基于促进意外发现的五个评价概念的理想高效推荐系统
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.701-717
O. Stitini, I. García-Magariño, S. Kaloun, O. Bencharef
.
{"title":"Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity","authors":"O. Stitini, I. García-Magariño, S. Kaloun, O. Bencharef","doi":"10.12720/jait.14.4.701-717","DOIUrl":"https://doi.org/10.12720/jait.14.4.701-717","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach 标准文莱马来语词性标注:基于概率和神经的方法
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.830-837
Izzati Mohaimin, R. Apong, A. R. Damit
—As online information increases over the years, text mining researchers developed Natural Language Processing tools to extract relevant and useful information from textual data such as online news articles. The Malay language is widely spoken, especially in the Southeast Asian region, but there is a lack of Natural Language Processing (NLP) tools such as Malay corpora and Part-of-Speech (POS) taggers. Existing NLP tools are mainly based on Standard Malay of Malaysia and Indonesian language, but there is none for the Bruneian Malay. We addressed this issue by designing a Standard Brunei Malay corpus consisting of over 114,000 lexical tokens, annotated using 17 Malay POS tagsets. Furthermore, we implemented two commonly used POS tagging techniques, Conditional Random Field (CRF) and Bi-directional Long Short-Term Memory (BLSTM), to develop Bruneian POS taggers and compared their performances. The results showed that both CRF and BLSTM models performed well in predicting POS tags on Bruneian texts. However, CRF models outperform BLSTM, where CRF using all features achieved an F-Measure of 92.06% on news articles and 90.71% of F-Measure on crime articles. Adding a batch normalization layer to the BLSTM model architecture increased the performance by 7.13%. To further improve the BLSTM models, we suggested increasing the training data and experimenting with different hyperparameter settings. The findings also indicated that modelling BLSTM with fastText has improved the POS prediction of Bruneian words.
随着近年来在线信息的增加,文本挖掘研究人员开发了自然语言处理工具,从文本数据(如在线新闻文章)中提取相关和有用的信息。马来语被广泛使用,特别是在东南亚地区,但缺乏自然语言处理(NLP)工具,如马来语料库和词性标注器(POS)。现有的NLP工具主要基于马来西亚的标准马来语和印尼语,但没有针对文莱马来语的工具。我们通过设计一个标准文莱马来语语料库来解决这个问题,该语料库包含超过114,000个词汇令牌,使用17个马来语POS标记集进行注释。此外,我们实施了两种常用的词性标注技术,条件随机场(CRF)和双向长短期记忆(BLSTM),以开发文莱词性标注器并比较其性能。结果表明,CRF和BLSTM模型都能很好地预测文莱语文本的词性标注。然而,CRF模型优于BLSTM,在BLSTM中,使用所有特征的CRF在新闻文章上的F-Measure达到了92.06%,在犯罪文章上的F-Measure达到了90.71%。在BLSTM模型架构中加入批处理规范化层,性能提高了7.13%。为了进一步改进BLSTM模型,我们建议增加训练数据并尝试不同的超参数设置。研究结果还表明,使用fastText建模BLSTM可以改善文莱语单词的词性预测。
{"title":"Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach","authors":"Izzati Mohaimin, R. Apong, A. R. Damit","doi":"10.12720/jait.14.4.830-837","DOIUrl":"https://doi.org/10.12720/jait.14.4.830-837","url":null,"abstract":"—As online information increases over the years, text mining researchers developed Natural Language Processing tools to extract relevant and useful information from textual data such as online news articles. The Malay language is widely spoken, especially in the Southeast Asian region, but there is a lack of Natural Language Processing (NLP) tools such as Malay corpora and Part-of-Speech (POS) taggers. Existing NLP tools are mainly based on Standard Malay of Malaysia and Indonesian language, but there is none for the Bruneian Malay. We addressed this issue by designing a Standard Brunei Malay corpus consisting of over 114,000 lexical tokens, annotated using 17 Malay POS tagsets. Furthermore, we implemented two commonly used POS tagging techniques, Conditional Random Field (CRF) and Bi-directional Long Short-Term Memory (BLSTM), to develop Bruneian POS taggers and compared their performances. The results showed that both CRF and BLSTM models performed well in predicting POS tags on Bruneian texts. However, CRF models outperform BLSTM, where CRF using all features achieved an F-Measure of 92.06% on news articles and 90.71% of F-Measure on crime articles. Adding a batch normalization layer to the BLSTM model architecture increased the performance by 7.13%. To further improve the BLSTM models, we suggested increasing the training data and experimenting with different hyperparameter settings. The findings also indicated that modelling BLSTM with fastText has improved the POS prediction of Bruneian words.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Client-Based Distributed Video Conferencing via WebRTC 基于WebRTC的客户端分布式视频会议
IF 1 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.204-211
Dominic Kern, Matthias Tessmann
—The most common video conferencing topologies are mesh and star topologies. The star topology requires a powerful server which leads to high costs. In the mesh topology, this is not the case, as each participant is directly connected to every other participant. However, due to the load caused by the numerous connections, the mesh topology is not suitable for larger video conferences. In this paper, we propose a video conferencing service that combines the advantages of the mesh and star topologies to enable larger video conferences without the need for powerful servers. This is achieved by distributing the video streams over the most powerful participants instead of a server. The resulting system achieves an improvement in video quality compared to a reference test in the mesh topology, which was determined based on the transmission rate and frame rate.
-最常见的视频会议拓扑是网状拓扑和星形拓扑。星形拓扑需要一个功能强大的服务器,这导致了高昂的成本。在网格拓扑中,情况并非如此,因为每个参与者都直接连接到其他参与者。但是,由于连接数多造成的负载,网状拓扑不适合大型视频会议。在本文中,我们提出了一种视频会议服务,它结合了网状和星形拓扑的优点,使大型视频会议无需强大的服务器。这是通过将视频流分发给最强大的参与者而不是服务器来实现的。与基于传输速率和帧速率确定的网格拓扑中的参考测试相比,所得到的系统实现了视频质量的改进。
{"title":"Client-Based Distributed Video Conferencing via WebRTC","authors":"Dominic Kern, Matthias Tessmann","doi":"10.12720/jait.14.2.204-211","DOIUrl":"https://doi.org/10.12720/jait.14.2.204-211","url":null,"abstract":"—The most common video conferencing topologies are mesh and star topologies. The star topology requires a powerful server which leads to high costs. In the mesh topology, this is not the case, as each participant is directly connected to every other participant. However, due to the load caused by the numerous connections, the mesh topology is not suitable for larger video conferences. In this paper, we propose a video conferencing service that combines the advantages of the mesh and star topologies to enable larger video conferences without the need for powerful servers. This is achieved by distributing the video streams over the most powerful participants instead of a server. The resulting system achieves an improvement in video quality compared to a reference test in the mesh topology, which was determined based on the transmission rate and frame rate.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Advances in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1