首页 > 最新文献

Journal of Advances in Information Technology最新文献

英文 中文
Research on Substation Engineering Estimates Based on BIM-DE-RF 基于BIM-DE-RF的变电站工程评估研究
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.892-896
Songsong Wang, Wenxuan Qiao, Lei Wang, Zhewei Shen, Pengju Yang, Li Bian
—Aiming at the problems of heavy workload and large errors in traditional substation engineering estimation methods, an intelligent estimation method for substation engineering based on Building Information Modeling (BIM) combined with a Differential Evolution (DE) algorithm to optimize Random Forest (RF) is proposed. This proposed method uses DE to optimize the RF model’s splitting features and decision trees to enhance the model’s estimation accuracy. The BIM of the substation project is used to determine engineering quantity information, which serves as the input of the DE-RF model, enabling intelligent cost estimation of the substation project. The results of the example analysis show that the relative error of the proposed cost estimation method for substation engineering based on BIM and DE-RF is below 10%. This accuracy level meets various substation engineering cost estimation scenarios, validating the feasibility and correctness of the proposed model.
{"title":"Research on Substation Engineering Estimates Based on BIM-DE-RF","authors":"Songsong Wang, Wenxuan Qiao, Lei Wang, Zhewei Shen, Pengju Yang, Li Bian","doi":"10.12720/jait.14.5.892-896","DOIUrl":"https://doi.org/10.12720/jait.14.5.892-896","url":null,"abstract":"—Aiming at the problems of heavy workload and large errors in traditional substation engineering estimation methods, an intelligent estimation method for substation engineering based on Building Information Modeling (BIM) combined with a Differential Evolution (DE) algorithm to optimize Random Forest (RF) is proposed. This proposed method uses DE to optimize the RF model’s splitting features and decision trees to enhance the model’s estimation accuracy. The BIM of the substation project is used to determine engineering quantity information, which serves as the input of the DE-RF model, enabling intelligent cost estimation of the substation project. The results of the example analysis show that the relative error of the proposed cost estimation method for substation engineering based on BIM and DE-RF is below 10%. This accuracy level meets various substation engineering cost estimation scenarios, validating the feasibility and correctness of the proposed model.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Live Memory Forensics Investigations: A Comparative Analysis 现场记忆取证调查:比较分析
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.950-959
Irfan Syamsuddin, Dedy Syamsuar
—The escalating dependence on information technology for daily activities ensures that cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators is becoming increasingly crucial in addressing the surge of cybercrime incidents. Live forensics investigation, a challenging facet of digital evidence investigation, confronts several limitations. This study focuses on the complexities associated with retrieving digital evidence from volatile memory during live forensics investigations, explicitly comparing the efficacy of extracting digital evidence from DDR2 and DDR3 Random Access Memory (RAM). This study aims to analyze and compare potential variations in evidence acquisition outcomes between the two RAM types by applying three distinct scenarios: identifying registry and network activities, catching malicious codes, and obtaining login passwords on Social Media. The results demonstrate that DDR2 RAM exhibits a lower propensity for concealing digital evidence during live forensics investigations compared to DDR3 RAM. The implications of these findings are discussed, along with suggestions for potential ramifications and avenues for future research.
{"title":"Live Memory Forensics Investigations: A Comparative Analysis","authors":"Irfan Syamsuddin, Dedy Syamsuar","doi":"10.12720/jait.14.5.950-959","DOIUrl":"https://doi.org/10.12720/jait.14.5.950-959","url":null,"abstract":"—The escalating dependence on information technology for daily activities ensures that cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators is becoming increasingly crucial in addressing the surge of cybercrime incidents. Live forensics investigation, a challenging facet of digital evidence investigation, confronts several limitations. This study focuses on the complexities associated with retrieving digital evidence from volatile memory during live forensics investigations, explicitly comparing the efficacy of extracting digital evidence from DDR2 and DDR3 Random Access Memory (RAM). This study aims to analyze and compare potential variations in evidence acquisition outcomes between the two RAM types by applying three distinct scenarios: identifying registry and network activities, catching malicious codes, and obtaining login passwords on Social Media. The results demonstrate that DDR2 RAM exhibits a lower propensity for concealing digital evidence during live forensics investigations compared to DDR3 RAM. The implications of these findings are discussed, along with suggestions for potential ramifications and avenues for future research.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136203530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System 利用机器学习算法识别叶片病害以改进农业系统
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.122-129
Keerthi Kethineni, G. Pradeepini
Diagnosing plant disease is the foundation for effective and accurate plant disease prevention in a complicated environment. Smart farming is one of the fast-growing processes in the agricultural system, with the identification of disease in plants being a major one to help farmers. The processed data is saved in a database and used in making decisions in advance support, analysis of plants, and helps in crop planning. Plants are one of the essential resources for avoiding global warming. However, diseases such as blast, canker, black spot, brown spot, and bacterial leaf damage the plants. In this paper, image processing integration is developed to identify the type of disease and help automatically inspect all the leaf batches by storing the processed data. In some places, farmers are unaware of the experts and do not have proper facilities. In such conditions, one technique can be beneficial in keeping track and monitoring more crops. This technique makes it much easier and cheaper to detect disease. Machine learning can provide a method and algorithm to detect the disease. There should be training in images of all types of leaves, including healthy and disease leaf images. Five-stage detection processes are done in this paper. The stages are preprocessing, segmentation using k-Mean, feature extraction, features optimization using Firefly optimization Algorithm (FA), and classification using Support Vector Machine (SVM). The accuracy rate achieved using the proposed technique, i.e., GA-SVM is 91.3%, sensitivity is 90.72%, specificity 91.88, and precision is 92%. The results are evaluated using the matlab software tool.
植物病害诊断是在复杂环境下有效、准确防治植物病害的基础。智能农业是农业系统中快速发展的过程之一,植物病害识别是帮助农民的主要方法之一。处理后的数据保存在数据库中,用于提前支持、分析植物并帮助制定作物计划。植物是避免全球变暖的重要资源之一。然而,诸如稻瘟病、溃疡病、黑斑病、褐斑病和细菌性叶片等疾病会损害植物。本文开发了图像处理集成技术,通过存储处理后的数据,识别病害类型,实现对所有叶片批次的自动检测。在一些地方,农民不认识专家,也没有适当的设施。在这种条件下,有一种技术可以帮助跟踪和监测更多的作物。这项技术使检测疾病变得更加容易和便宜。机器学习可以提供一种检测疾病的方法和算法。应该对所有类型的叶子图像进行训练,包括健康和疾病叶子图像。本文采用五阶段检测方法。这些阶段包括预处理、使用k-Mean进行分割、特征提取、使用Firefly优化算法(FA)进行特征优化以及使用支持向量机(SVM)进行分类。该方法的准确率为91.3%,灵敏度为90.72%,特异度为91.88,精密度为92%。利用matlab软件工具对结果进行了评价。
{"title":"Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System","authors":"Keerthi Kethineni, G. Pradeepini","doi":"10.12720/jait.14.1.122-129","DOIUrl":"https://doi.org/10.12720/jait.14.1.122-129","url":null,"abstract":"Diagnosing plant disease is the foundation for effective and accurate plant disease prevention in a complicated environment. Smart farming is one of the fast-growing processes in the agricultural system, with the identification of disease in plants being a major one to help farmers. The processed data is saved in a database and used in making decisions in advance support, analysis of plants, and helps in crop planning. Plants are one of the essential resources for avoiding global warming. However, diseases such as blast, canker, black spot, brown spot, and bacterial leaf damage the plants. In this paper, image processing integration is developed to identify the type of disease and help automatically inspect all the leaf batches by storing the processed data. In some places, farmers are unaware of the experts and do not have proper facilities. In such conditions, one technique can be beneficial in keeping track and monitoring more crops. This technique makes it much easier and cheaper to detect disease. Machine learning can provide a method and algorithm to detect the disease. There should be training in images of all types of leaves, including healthy and disease leaf images. Five-stage detection processes are done in this paper. The stages are preprocessing, segmentation using k-Mean, feature extraction, features optimization using Firefly optimization Algorithm (FA), and classification using Support Vector Machine (SVM). The accuracy rate achieved using the proposed technique, i.e., GA-SVM is 91.3%, sensitivity is 90.72%, specificity 91.88, and precision is 92%. The results are evaluated using the matlab software tool.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Vehicle Sensor Network for Real-Time Air Pollution Analysis 用于实时空气污染分析的车辆传感器网络
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.39-45
Bleron Zherka, Zhilbert Tafa
Air Pollution (AP) is one of the main threats to global health. Real-time dynamic mapping of pollution distribution is of a crucial importance to the AP reduction and management. Conventional air quality monitoring relies on expensive and cumbersome monitoring stations. Such stations are sparsely deployed over a region – typically one to a few per city. The extrapolation of the dynamic spatiotemporal data away from these stations might be inaccurate. In this paper, we present a participatory Vehicle Sensor Network (VSN) based on low-cost mobile nodes deployed on public (taxi) vehicles. The system enables continuous real-time data acquisition, transmission, and utilization. As compared to the conventional approaches, our system greatly improves sensing coverage. The proposed platform enables the acquisition of a large amount of georeferenced and time-stamped data. It provides real time pollution mapping and historical data view. The system’s operational stability and continuity are examined and confirmed through the analysis of background data collected during 15 days of experimental implementation.
空气污染是全球健康的主要威胁之一。污染分布的实时动态映射对于减少和管理AP至关重要。传统的空气质量监测依赖于昂贵而笨重的监测站。这样的监测站在一个地区很少部署——通常每个城市一到几个。从这些台站外推动态时空数据可能是不准确的。在本文中,我们提出了一个基于部署在公共(出租车)车辆上的低成本移动节点的参与式车辆传感器网络(VSN)。该系统可实现连续的实时数据采集、传输和利用。与传统方法相比,我们的系统大大提高了传感覆盖率。所提出的平台能够获取大量的地理参考和时间戳数据。提供实时污染地图和历史数据视图。通过对15天实验实施期间收集的背景数据的分析,对系统的运行稳定性和连续性进行了检查和确认。
{"title":"A Vehicle Sensor Network for Real-Time Air Pollution Analysis","authors":"Bleron Zherka, Zhilbert Tafa","doi":"10.12720/jait.14.1.39-45","DOIUrl":"https://doi.org/10.12720/jait.14.1.39-45","url":null,"abstract":"Air Pollution (AP) is one of the main threats to global health. Real-time dynamic mapping of pollution distribution is of a crucial importance to the AP reduction and management. Conventional air quality monitoring relies on expensive and cumbersome monitoring stations. Such stations are sparsely deployed over a region – typically one to a few per city. The extrapolation of the dynamic spatiotemporal data away from these stations might be inaccurate. In this paper, we present a participatory Vehicle Sensor Network (VSN) based on low-cost mobile nodes deployed on public (taxi) vehicles. The system enables continuous real-time data acquisition, transmission, and utilization. As compared to the conventional approaches, our system greatly improves sensing coverage. The proposed platform enables the acquisition of a large amount of georeferenced and time-stamped data. It provides real time pollution mapping and historical data view. The system’s operational stability and continuity are examined and confirmed through the analysis of background data collected during 15 days of experimental implementation.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage 基于VAR和LSTM的云资源使用多元预测的加权集合
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.264-270
Jyoti Shetty, Karthik Cottur, G. Shobha, Y. Prajwal
—Forecasting resource usage values of a cloud service has ample applications such as service performance management, auto-scaling, capacity planning, and so on. While univariate forecasting techniques are the focus of current research, multivariate forecasting is rarely explored. This research work focuses on multivariate forecasting of resource usage values believing that there exists interdependency among the features of the underlying system that must be considered while forecasting. At first, the interdependency among the attributes is verified using Granger causality tests. Then the research explores various forecasting approaches — univariate Multi-Layer Perceptron (MLP), univariate Long Short Term Memory (LSTM), multivariate Vector Autoregression (VAR), and multivariate stacked LSTM. Further based on the observations of performances of these models the research proposes an implementation of a weighted ensemble of VAR and LSTM models to forecast key cloud resource usage metrics. The models thus proposed are implemented and validated using the publicly available GWA-T-12 Bitbrains time series dataset. The results show that the multivariate models outperform univariate models with lesser Normalised Root Mean Square Error (NRMSE) values. Also, the multivariate stacked LSTM outperforms VAR and the proposed ensemble forecasting model with lesser NRMSE values within a range of 1–5% for various resources across different lag values.
-预测云服务的资源使用值有很多应用,如服务性能管理、自动扩展、容量规划等。虽然单变量预测技术是当前研究的重点,但多元预测很少被探索。本研究的重点是资源利用值的多元预测,认为在预测时必须考虑底层系统的特征之间存在相互依赖关系。首先,使用格兰杰因果检验验证属性之间的相互依赖关系。然后研究了多种预测方法——单变量多层感知器(MLP)、单变量长短期记忆(LSTM)、多变量向量自回归(VAR)和多变量堆叠LSTM。进一步基于这些模型的性能观察,研究提出了VAR和LSTM模型加权集成的实现,以预测关键的云资源使用指标。利用公开可用的GWA-T-12 Bitbrains时间序列数据集实现并验证了所提出的模型。结果表明,多元模型优于单变量模型,具有较小的归一化均方根误差(NRMSE)值。此外,对于不同滞后值的各种资源,多元堆叠LSTM在1-5%范围内的NRMSE值较小,优于VAR和所提出的集合预测模型。
{"title":"A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage","authors":"Jyoti Shetty, Karthik Cottur, G. Shobha, Y. Prajwal","doi":"10.12720/jait.14.2.264-270","DOIUrl":"https://doi.org/10.12720/jait.14.2.264-270","url":null,"abstract":"—Forecasting resource usage values of a cloud service has ample applications such as service performance management, auto-scaling, capacity planning, and so on. While univariate forecasting techniques are the focus of current research, multivariate forecasting is rarely explored. This research work focuses on multivariate forecasting of resource usage values believing that there exists interdependency among the features of the underlying system that must be considered while forecasting. At first, the interdependency among the attributes is verified using Granger causality tests. Then the research explores various forecasting approaches — univariate Multi-Layer Perceptron (MLP), univariate Long Short Term Memory (LSTM), multivariate Vector Autoregression (VAR), and multivariate stacked LSTM. Further based on the observations of performances of these models the research proposes an implementation of a weighted ensemble of VAR and LSTM models to forecast key cloud resource usage metrics. The models thus proposed are implemented and validated using the publicly available GWA-T-12 Bitbrains time series dataset. The results show that the multivariate models outperform univariate models with lesser Normalised Root Mean Square Error (NRMSE) values. Also, the multivariate stacked LSTM outperforms VAR and the proposed ensemble forecasting model with lesser NRMSE values within a range of 1–5% for various resources across different lag values.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Client-Based Distributed Video Conferencing via WebRTC 基于WebRTC的客户端分布式视频会议
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.204-211
Dominic Kern, Matthias Tessmann
—The most common video conferencing topologies are mesh and star topologies. The star topology requires a powerful server which leads to high costs. In the mesh topology, this is not the case, as each participant is directly connected to every other participant. However, due to the load caused by the numerous connections, the mesh topology is not suitable for larger video conferences. In this paper, we propose a video conferencing service that combines the advantages of the mesh and star topologies to enable larger video conferences without the need for powerful servers. This is achieved by distributing the video streams over the most powerful participants instead of a server. The resulting system achieves an improvement in video quality compared to a reference test in the mesh topology, which was determined based on the transmission rate and frame rate.
-最常见的视频会议拓扑是网状拓扑和星形拓扑。星形拓扑需要一个功能强大的服务器,这导致了高昂的成本。在网格拓扑中,情况并非如此,因为每个参与者都直接连接到其他参与者。但是,由于连接数多造成的负载,网状拓扑不适合大型视频会议。在本文中,我们提出了一种视频会议服务,它结合了网状和星形拓扑的优点,使大型视频会议无需强大的服务器。这是通过将视频流分发给最强大的参与者而不是服务器来实现的。与基于传输速率和帧速率确定的网格拓扑中的参考测试相比,所得到的系统实现了视频质量的改进。
{"title":"Client-Based Distributed Video Conferencing via WebRTC","authors":"Dominic Kern, Matthias Tessmann","doi":"10.12720/jait.14.2.204-211","DOIUrl":"https://doi.org/10.12720/jait.14.2.204-211","url":null,"abstract":"—The most common video conferencing topologies are mesh and star topologies. The star topology requires a powerful server which leads to high costs. In the mesh topology, this is not the case, as each participant is directly connected to every other participant. However, due to the load caused by the numerous connections, the mesh topology is not suitable for larger video conferences. In this paper, we propose a video conferencing service that combines the advantages of the mesh and star topologies to enable larger video conferences without the need for powerful servers. This is achieved by distributing the video streams over the most powerful participants instead of a server. The resulting system achieves an improvement in video quality compared to a reference test in the mesh topology, which was determined based on the transmission rate and frame rate.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Causal Inference and Conditional Independence Testing with RCoT 基于RCoT的因果推理与条件独立性检验
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.495-500
Mayank Agarwal, Abhay H. Kashyap, G. Shobha, Jyothi Shetty, R. Dev
—Conditional Independence (CI) testing is a crucial operation in causal model discovery and validation. Effectively performing this requires a linearly scalable and robust algorithm and its implementation. Previous techniques, such as cross-correlation, a linear method; Kernel Conditional Independence Test (KCIT,) and a kernel-based algorithm, do not scale well with dataset size and pose a bottleneck for CI algorithms. An improved version of kernel-based algorithms which use linear mapping to decrease computational time is the Randomized conditional Correlation Test (RCoT) and Randomized Conditional Independence Test (RCIT). This paper describes their use and implementation in Python. This paper then compares the time complexity of the RCoT algorithm with a previously implemented Discretization-based algorithm Probspace. The results show that the accuracy of the previous and current models is similar, but the time taken to get these results has been reduced by 50%. The implemented algorithm takes about 3s to run the testcases (the data used and testcases generated are described in Section IV-C).
条件独立性(CI)测试是因果模型发现和验证的关键操作。有效地执行此操作需要线性可扩展和健壮的算法及其实现。以前的技术,如互相关法、线性法;核条件独立性测试(KCIT)和基于核的算法不能很好地随数据集大小进行扩展,成为CI算法的瓶颈。随机条件相关检验(RCoT)和随机条件独立检验(RCIT)是利用线性映射减少计算时间的核算法的改进版本。本文描述了它们在Python中的使用和实现。然后,本文将RCoT算法的时间复杂度与先前实现的基于离散化的算法Probspace进行了比较。结果表明,以前的模型与目前的模型精度相近,但得到这些结果的时间缩短了50%。实现的算法大约需要3秒来运行测试用例(使用的数据和生成的测试用例在章节IV-C中描述)。
{"title":"Causal Inference and Conditional Independence Testing with RCoT","authors":"Mayank Agarwal, Abhay H. Kashyap, G. Shobha, Jyothi Shetty, R. Dev","doi":"10.12720/jait.14.3.495-500","DOIUrl":"https://doi.org/10.12720/jait.14.3.495-500","url":null,"abstract":"—Conditional Independence (CI) testing is a crucial operation in causal model discovery and validation. Effectively performing this requires a linearly scalable and robust algorithm and its implementation. Previous techniques, such as cross-correlation, a linear method; Kernel Conditional Independence Test (KCIT,) and a kernel-based algorithm, do not scale well with dataset size and pose a bottleneck for CI algorithms. An improved version of kernel-based algorithms which use linear mapping to decrease computational time is the Randomized conditional Correlation Test (RCoT) and Randomized Conditional Independence Test (RCIT). This paper describes their use and implementation in Python. This paper then compares the time complexity of the RCoT algorithm with a previously implemented Discretization-based algorithm Probspace. The results show that the accuracy of the previous and current models is similar, but the time taken to get these results has been reduced by 50%. The implemented algorithm takes about 3s to run the testcases (the data used and testcases generated are described in Section IV-C).","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks 一种防止移动Ad-Hoc网络灰洞攻击的模型
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.532-542
Thabiso N. Khosa, Topside E. Mathonsi, D. D. Plessis
—Over the past few years, Mobile Ad-hoc Networks (MANET) has been playing an important role in ubiquitous networks based on its ability to support mobility without depending on infrastructure-based design, dynamic topology, and thus, are known as decentralized environment. One of the advantages of MANET is that its nodes can act both as routers and hosts. This, therefore, implies that its nodes can transmit packets between source to destination nodes. As a result of such and many more advantages, these networks are more vulnerable to different types of network attacks. In the recent past, several secured routing protocols were proposed and implemented for MANET. However, those protocols cannot fully guarantee security within these networks in terms of Denial of Services (DoS) attacks such as black hole and gray hole attacks. The review of the literature showed that existing solutions cannot always ensure true node classification. This is because MANET’s cooperative existence sometimes leads to the false exclusion of innocent nodes and/or proper classification of malicious nodes. A new Gray Hole Prevention (GRAY-HP) algorithm for the detection of malicious nodes with the actual high accuracy ratio of node classification is proposed in this paper. The proposed algorithm employs and modifies the gray-attack prevention technique known as Secure Detection Prevention and Elimination Gray Hole (SDPEGH), and the proactive scheme. It has been confirmed by Network Simulator 2 (NS2) computer simulation that the proposed algorithm outperforms the Genetic Algorithm to Bacterial Foraging Optimization (GA-BFO) and Rough Set Theory (RSetTheory) algorithms in terms of throughput, routing overhead and delivery ratio. The proposed GRAY-HP algorithm guarantees the successful elimination of Gray hole nodes, while it also ensures that no legitimate nodes are excluded
在过去的几年中,移动自组织网络(MANET)在无处不在的网络中发挥着重要作用,基于其支持移动性的能力,而不依赖于基于基础设施的设计,动态拓扑,因此被称为分散环境。MANET的优点之一是它的节点既可以充当路由器又可以充当主机。因此,这意味着它的节点可以在源节点到目的节点之间传输数据包。由于这些以及更多的优点,这些网络更容易受到不同类型的网络攻击。近年来,针对MANET提出并实现了几种安全路由协议。然而,这些协议不能完全保证这些网络内部的安全,以应对诸如黑洞和灰洞攻击等拒绝服务攻击。对文献的回顾表明,现有的解决方案并不能总是保证真实的节点分类。这是因为MANET的协作存在有时会导致对无害节点的错误排除和/或对恶意节点的正确分类。本文提出了一种新的灰洞预防(grey - hp)算法,用于检测具有较高准确率的恶意节点。该算法采用并改进了安全检测预防和消除灰洞(SDPEGH)灰色攻击防范技术和主动方案。网络模拟器2 (Network Simulator 2, NS2)计算机仿真证实,该算法在吞吐量、路由开销和投递率方面优于遗传算法to Bacterial Foraging Optimization (GA-BFO)和Rough SetTheory (RSetTheory)算法。提出的Gray - hp算法保证了灰洞节点的成功消除,同时也保证了合法节点不被排除在外
{"title":"A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks","authors":"Thabiso N. Khosa, Topside E. Mathonsi, D. D. Plessis","doi":"10.12720/jait.14.3.532-542","DOIUrl":"https://doi.org/10.12720/jait.14.3.532-542","url":null,"abstract":"—Over the past few years, Mobile Ad-hoc Networks (MANET) has been playing an important role in ubiquitous networks based on its ability to support mobility without depending on infrastructure-based design, dynamic topology, and thus, are known as decentralized environment. One of the advantages of MANET is that its nodes can act both as routers and hosts. This, therefore, implies that its nodes can transmit packets between source to destination nodes. As a result of such and many more advantages, these networks are more vulnerable to different types of network attacks. In the recent past, several secured routing protocols were proposed and implemented for MANET. However, those protocols cannot fully guarantee security within these networks in terms of Denial of Services (DoS) attacks such as black hole and gray hole attacks. The review of the literature showed that existing solutions cannot always ensure true node classification. This is because MANET’s cooperative existence sometimes leads to the false exclusion of innocent nodes and/or proper classification of malicious nodes. A new Gray Hole Prevention (GRAY-HP) algorithm for the detection of malicious nodes with the actual high accuracy ratio of node classification is proposed in this paper. The proposed algorithm employs and modifies the gray-attack prevention technique known as Secure Detection Prevention and Elimination Gray Hole (SDPEGH), and the proactive scheme. It has been confirmed by Network Simulator 2 (NS2) computer simulation that the proposed algorithm outperforms the Genetic Algorithm to Bacterial Foraging Optimization (GA-BFO) and Rough Set Theory (RSetTheory) algorithms in terms of throughput, routing overhead and delivery ratio. The proposed GRAY-HP algorithm guarantees the successful elimination of Gray hole nodes, while it also ensures that no legitimate nodes are excluded","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DASS-21 Based Psychometric Prediction Using Advanced Machine Learning Techniques 基于DASS-21的先进机器学习技术的心理测量预测
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.571-580
Jayshree Ghorpade-aher, Ahbaz Memon, S. Chugh, Abhishek Chebolu, Prajakta Chaudhari, Janhavi Chavan
.
{"title":"DASS-21 Based Psychometric Prediction Using Advanced Machine Learning Techniques","authors":"Jayshree Ghorpade-aher, Ahbaz Memon, S. Chugh, Abhishek Chebolu, Prajakta Chaudhari, Janhavi Chavan","doi":"10.12720/jait.14.3.571-580","DOIUrl":"https://doi.org/10.12720/jait.14.3.571-580","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66332287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Software Project Management Framework 分布式软件项目管理框架
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.685-693
Kamal Uddin Sarker, R. Hasan, A. Deraman, Salman Mahmmod
—The software industry is enjoying the permeable and trans-border flow of software markets and can access resources from all corners of the world. Software engineers gain international work experience through a distributed working environment. It involves participation from individuals with different cultures, languages, and geographic time zones to work on a single project. In addition to providing global opportunities for software experts and businessmen, it also introduces new project management challenges. Barriers exist in trust, communication, monitoring, languages, cultures, and time zones. Distance mode management faces more technical challenges due to stakeholders’ ambiguous understanding and various documentation. This study addresses an in-depth analysis of challenges and currently practicing methods. Moreover, a new virtual project management framework is proposed to minimize issues and maximize the virtual project management team’s throughput. The framework is compared with commonly used methodologies by experts who have experience in global software project management, and the analysis is performed using the analytical hierarchy process. The evaluation matrix has shown that the proposed model is adequate for distance project management with better score in virtual scope and virtual management). Its excellency is in standard documentation practice, change management, and improving re-usability practice that will enhance business goals and stakeholder’s satisfaction.
——软件产业享有软件市场的渗透性和跨国界流动,可以从世界各个角落获取资源。软件工程师通过分布式工作环境获得国际工作经验。它涉及来自不同文化、语言和地理时区的个人参与一个项目。除了为软件专家和商人提供全球机会之外,它还引入了新的项目管理挑战。障碍存在于信任、沟通、监督、语言、文化和时区。由于利益相关者的模糊理解和各种文档,远程模式管理面临更多的技术挑战。本研究对挑战和目前的实践方法进行了深入的分析。在此基础上,提出了一种新的虚拟项目管理框架,以最大限度地减少问题,提高虚拟项目管理团队的吞吐量。该框架由具有全球软件项目管理经验的专家与常用的方法进行比较,并使用层次分析法进行分析。评价矩阵表明,该模型适合远程项目管理,在虚拟范围和虚拟管理方面得分较高。它的卓越之处在于标准文档实践、变更管理和改进可重用性实践,这些实践将增强业务目标和涉众的满意度。
{"title":"A Distributed Software Project Management Framework","authors":"Kamal Uddin Sarker, R. Hasan, A. Deraman, Salman Mahmmod","doi":"10.12720/jait.14.4.685-693","DOIUrl":"https://doi.org/10.12720/jait.14.4.685-693","url":null,"abstract":"—The software industry is enjoying the permeable and trans-border flow of software markets and can access resources from all corners of the world. Software engineers gain international work experience through a distributed working environment. It involves participation from individuals with different cultures, languages, and geographic time zones to work on a single project. In addition to providing global opportunities for software experts and businessmen, it also introduces new project management challenges. Barriers exist in trust, communication, monitoring, languages, cultures, and time zones. Distance mode management faces more technical challenges due to stakeholders’ ambiguous understanding and various documentation. This study addresses an in-depth analysis of challenges and currently practicing methods. Moreover, a new virtual project management framework is proposed to minimize issues and maximize the virtual project management team’s throughput. The framework is compared with commonly used methodologies by experts who have experience in global software project management, and the analysis is performed using the analytical hierarchy process. The evaluation matrix has shown that the proposed model is adequate for distance project management with better score in virtual scope and virtual management). Its excellency is in standard documentation practice, change management, and improving re-usability practice that will enhance business goals and stakeholder’s satisfaction.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of Advances in Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1