首页 > 最新文献

Journal of Advances in Information Technology最新文献

英文 中文
Recommendation System of Food Package Using Apriori and FP-Growth Data Mining Methods 基于Apriori和FP-Growth数据挖掘的食品包装推荐系统
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.454-462
Christofer Satria, Anthony Anggrawan, Mayadi
— Currently, the famous restaurant visited by many people is a roadside stall. Generally, the roadside stall sells multiple kinds of food, drink, and snacks. The problem is that roadside stalls have difficulty determining what food items are best-selling to be used as menu packages of choice from almost hundreds of menu items. That is why it needs data mining of roadside stall sales data to explore correlation information and sales transaction patterns for food items that most often become food pairs sold. Therefore, this study aims to analyze the frequency of the most item sets from data sales in food stalls using the Frequent Pattern Growth (FP-Growth) and Apriori data mining methods to recommend which foods/beverages are the best-selling menu packages. The research and development results show that with 980 transaction data with a minimum support value of 20% and a trust value of at least 50% for FP-Growth, it produces eight valid rules. For Apriori, it has five valid rules as a menu package recommendation. The results of the sales trial of the recommended menu package for two months showed that the total sales increased significantly up to 2.37 times greater than the previous sales .
-目前,很多人光顾的著名餐厅是路边摊。一般来说,路边摊出售多种食品、饮料和小吃。问题在于,路边摊很难从近数百种菜单中挑选出最畅销的食品作为菜单套餐。这就是为什么它需要对路边摊销售数据进行数据挖掘,以探索最常成为食品配对销售的食品的相关信息和销售交易模式。因此,本研究的目的是利用频繁模式增长(FP-Growth)和Apriori数据挖掘方法,从食品摊位的数据销售中分析最多项目集的频率,以推荐哪些食品/饮料是最畅销的菜单包装。研究和开发结果表明,使用980个交易数据,对FP-Growth的最小支持值为20%,信任值至少为50%,它产生了8条有效规则。对于Apriori,它有五条有效的规则作为菜单包推荐。推荐菜单套餐进行了两个月的销售试验,结果显示,总销售额比之前的销售额增加了2.37倍。
{"title":"Recommendation System of Food Package Using Apriori and FP-Growth Data Mining Methods","authors":"Christofer Satria, Anthony Anggrawan, Mayadi","doi":"10.12720/jait.14.3.454-462","DOIUrl":"https://doi.org/10.12720/jait.14.3.454-462","url":null,"abstract":"— Currently, the famous restaurant visited by many people is a roadside stall. Generally, the roadside stall sells multiple kinds of food, drink, and snacks. The problem is that roadside stalls have difficulty determining what food items are best-selling to be used as menu packages of choice from almost hundreds of menu items. That is why it needs data mining of roadside stall sales data to explore correlation information and sales transaction patterns for food items that most often become food pairs sold. Therefore, this study aims to analyze the frequency of the most item sets from data sales in food stalls using the Frequent Pattern Growth (FP-Growth) and Apriori data mining methods to recommend which foods/beverages are the best-selling menu packages. The research and development results show that with 980 transaction data with a minimum support value of 20% and a trust value of at least 50% for FP-Growth, it produces eight valid rules. For Apriori, it has five valid rules as a menu package recommendation. The results of the sales trial of the recommended menu package for two months showed that the total sales increased significantly up to 2.37 times greater than the previous sales .","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Resource Management System Based upon Container Orchestration Tools Comparison 基于容器编排工具比较的自动化资源管理系统
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.3.501-509
B. Purahong, J. Sithiyopasakul, P. Sithiyopasakul, A. Lasakul, C. Benjangkaprasert
—The goal of this article is to study and analyze the container orchestration technology Kubernetes, Docker Swarm, and Apache Mesos by performing performance evaluations and inspecting how many requests and responses the server can handle. Due to the fact that managing information system resources is a challenge in terms of performance, usability, reliability, and the cost of information resources. Some orchestration tools cannot automatically allocate resources depending on the scope of the information system resource management. This leads to allocating resources more than the needs of system requirements, resulting in excessive costs. Therefore, this article proposed testing the system by measuring its effectiveness using a structured process by examining measurement variables such as the number of requests per second, number of responses to requests, and resource extension period using all three-orchestration technology. From the testing and analysis of all three variables as mentioned, it is possible to know the efficiency of the Kubernetes technology in such a similar environment and compared it with other orchestration tools like Docker Swarm and Apache Mesos orchestrator. For Kubernetes, Docker Swarm, and Apache Mesos, the mean value of its handling average request per minute is 30,677.25/min, 33,688.67/min, and 29,682.6/min, respectively. Swarm performed better in aspects of handling requests per minute by 9.35% of the difference when compared to Kubernetes and by 12.64% when compared to Apache Mesos. However, there are several things which should be taken into consideration because each orchestration tool has its own strong and weak points. The testing experiment could display a piece of information on the dashboard for visualization and analytic purposes and there is an elaboration at the end of when to use which container orchestration tool to suit the business proposes the most .
本文的目标是通过执行性能评估和检查服务器可以处理多少请求和响应来研究和分析容器编排技术Kubernetes, Docker Swarm和Apache Mesos。由于管理信息系统资源在性能、可用性、可靠性和信息资源成本方面是一个挑战。某些编排工具不能根据信息系统资源管理的范围自动分配资源。这将导致分配的资源超过系统需求的需要,从而导致成本过高。因此,本文建议使用结构化流程来测试系统的有效性,方法是检查度量变量,例如每秒请求数、请求响应数和使用所有三种编排技术的资源扩展周期。通过对上述三个变量的测试和分析,我们可以了解Kubernetes技术在类似环境中的效率,并将其与其他编排工具(如Docker Swarm和Apache Mesos orchestrator)进行比较。对于Kubernetes, Docker Swarm和Apache Mesos,其平均每分钟处理请求的平均值分别为30,677.25/min, 33,688.67/min和29,682.6/min。与Kubernetes相比,Swarm在每分钟处理请求方面表现更好,差异为9.35%,与Apache Mesos相比,差异为12.64%。然而,由于每个编排工具都有自己的优缺点,因此有几件事情需要考虑。测试实验可以在仪表板上显示一条信息,用于可视化和分析目的,并且在最后详细说明何时使用哪个容器编排工具最适合业务建议。
{"title":"Automated Resource Management System Based upon Container Orchestration Tools Comparison","authors":"B. Purahong, J. Sithiyopasakul, P. Sithiyopasakul, A. Lasakul, C. Benjangkaprasert","doi":"10.12720/jait.14.3.501-509","DOIUrl":"https://doi.org/10.12720/jait.14.3.501-509","url":null,"abstract":"—The goal of this article is to study and analyze the container orchestration technology Kubernetes, Docker Swarm, and Apache Mesos by performing performance evaluations and inspecting how many requests and responses the server can handle. Due to the fact that managing information system resources is a challenge in terms of performance, usability, reliability, and the cost of information resources. Some orchestration tools cannot automatically allocate resources depending on the scope of the information system resource management. This leads to allocating resources more than the needs of system requirements, resulting in excessive costs. Therefore, this article proposed testing the system by measuring its effectiveness using a structured process by examining measurement variables such as the number of requests per second, number of responses to requests, and resource extension period using all three-orchestration technology. From the testing and analysis of all three variables as mentioned, it is possible to know the efficiency of the Kubernetes technology in such a similar environment and compared it with other orchestration tools like Docker Swarm and Apache Mesos orchestrator. For Kubernetes, Docker Swarm, and Apache Mesos, the mean value of its handling average request per minute is 30,677.25/min, 33,688.67/min, and 29,682.6/min, respectively. Swarm performed better in aspects of handling requests per minute by 9.35% of the difference when compared to Kubernetes and by 12.64% when compared to Apache Mesos. However, there are several things which should be taken into consideration because each orchestration tool has its own strong and weak points. The testing experiment could display a piece of information on the dashboard for visualization and analytic purposes and there is an elaboration at the end of when to use which container orchestration tool to suit the business proposes the most .","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Literature Review on the Pervasiveness of Ransomware Threats and Attacks in the Philippines 菲律宾勒索软件威胁和攻击的普遍性的文献综述
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.630-638
E. Blancaflor, Joselito Lizer C. Daluz, Roduel Adrian G. Garcia, Nathan Gadiel S. Monton, Jhoana Marie S. Vergara
N.G.S.M
N.G.S.M
{"title":"A Literature Review on the Pervasiveness of Ransomware Threats and Attacks in the Philippines","authors":"E. Blancaflor, Joselito Lizer C. Daluz, Roduel Adrian G. Garcia, Nathan Gadiel S. Monton, Jhoana Marie S. Vergara","doi":"10.12720/jait.14.4.630-638","DOIUrl":"https://doi.org/10.12720/jait.14.4.630-638","url":null,"abstract":"N.G.S.M","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66332597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HASumRuNNer: An Extractive Text Summarization Optimization Model Based on a Gradient-Based Algorithm 基于梯度算法的提取文本摘要优化模型HASumRuNNer
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.656-667
Muljono, M. Nababan, R. A. Nugroho, Kevin Djajadinata
—This article is based on text summarization research model, also referred to as “text summarization”, which is the act of summarizing materials in a way that directly communicates the intent or message of a document. Hierarchical Attention SumRuNNer (HASumRuNNer), an extractive text summary model based on the Indonesian language is the text summary model suggested in this study. This is a novelty for the extractive text summary model based on the Indonesian language, as there is currently very few related research, both in terms of the approach and dataset. Three primary methods—BiGRU, CharCNN, and hierarchical attention mechanisms—were used to create the model for this study. The optimization in this suggested model is likewise carried out using a variety of gradient-based methods, and the ROUGE-N approach is used to assess the outcomes of text synthesis. The test results demonstrate that Adam’s gradient-based approach is the most effective for extracting text summarization using the HASumRuNNer model. As can be seen, the values of RED-1 (70.7), RED-2 (64.33), and RED-L (68.14) are greater than those of other methods employed as references. The approach used in the suggested HASumRuNNer Model, which combines BiGRU with CharCNN, can result in more accurate word and sentence representations at word and sentence levels. Additionally, the word and sentence-level hierarchical attention mechanisms aid in preventing the loss of information on each word in documents that are typically brought on by the length of the input model word or sentence.
-本文基于文本摘要研究模型,也称为“文本摘要”,是一种以直接传达文档意图或信息的方式对材料进行总结的行为。本文提出了基于印尼语的文本摘要抽取模型——层次注意SumRuNNer (HASumRuNNer)。这是基于印尼语的提取文本摘要模型的新颖之处,因为目前相关的研究很少,无论是在方法还是数据集方面。本研究采用了bigru、CharCNN和分层注意机制三种主要方法来创建模型。该模型的优化同样使用各种基于梯度的方法进行,并使用ROUGE-N方法来评估文本合成的结果。测试结果表明,Adam的基于梯度的方法对于使用HASumRuNNer模型提取文本摘要是最有效的。可以看出,RED-1(70.7)、RED-2(64.33)和RED-L(68.14)的值均大于其他参考方法。在建议的HASumRuNNer模型中使用的方法将BiGRU与CharCNN结合起来,可以在单词和句子级别上产生更准确的单词和句子表示。此外,单词和句子级别的分层注意机制有助于防止文档中每个单词的信息丢失,这种丢失通常是由输入模型单词或句子的长度引起的。
{"title":"HASumRuNNer: An Extractive Text Summarization Optimization Model Based on a Gradient-Based Algorithm","authors":"Muljono, M. Nababan, R. A. Nugroho, Kevin Djajadinata","doi":"10.12720/jait.14.4.656-667","DOIUrl":"https://doi.org/10.12720/jait.14.4.656-667","url":null,"abstract":"—This article is based on text summarization research model, also referred to as “text summarization”, which is the act of summarizing materials in a way that directly communicates the intent or message of a document. Hierarchical Attention SumRuNNer (HASumRuNNer), an extractive text summary model based on the Indonesian language is the text summary model suggested in this study. This is a novelty for the extractive text summary model based on the Indonesian language, as there is currently very few related research, both in terms of the approach and dataset. Three primary methods—BiGRU, CharCNN, and hierarchical attention mechanisms—were used to create the model for this study. The optimization in this suggested model is likewise carried out using a variety of gradient-based methods, and the ROUGE-N approach is used to assess the outcomes of text synthesis. The test results demonstrate that Adam’s gradient-based approach is the most effective for extracting text summarization using the HASumRuNNer model. As can be seen, the values of RED-1 (70.7), RED-2 (64.33), and RED-L (68.14) are greater than those of other methods employed as references. The approach used in the suggested HASumRuNNer Model, which combines BiGRU with CharCNN, can result in more accurate word and sentence representations at word and sentence levels. Additionally, the word and sentence-level hierarchical attention mechanisms aid in preventing the loss of information on each word in documents that are typically brought on by the length of the input model word or sentence.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66332757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Shoulder Range of Motion Evaluation by Traditional and Semi-Automatic Methods 传统方法与半自动方法肩关节活动度评估的比较
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.749-757
Sonia C Mantilla, C. Peña, G. G. Moreno
—This article compares the results obtained from applying two methods of measuring the range of motion in the upper extremity. From a descriptive, cross-sectional study, measurements were made using the most widely used and traditional method in the health area known as goniometry as well as a semi-automatic method developed using new technological tools. The results demonstrated that the technique has a high sensitivity and can analyze static body positions and movement evolutions, expanding its applicability range
本文比较了两种测量上肢活动范围的方法所得到的结果。根据一项描述性横断面研究,测量使用了卫生领域最广泛使用的传统方法,即所谓的角度测量法,以及使用新技术工具开发的半自动方法。结果表明,该技术具有较高的灵敏度,可以分析静态身体位置和运动演变,扩大了其适用范围
{"title":"Comparison of Shoulder Range of Motion Evaluation by Traditional and Semi-Automatic Methods","authors":"Sonia C Mantilla, C. Peña, G. G. Moreno","doi":"10.12720/jait.14.4.749-757","DOIUrl":"https://doi.org/10.12720/jait.14.4.749-757","url":null,"abstract":"—This article compares the results obtained from applying two methods of measuring the range of motion in the upper extremity. From a descriptive, cross-sectional study, measurements were made using the most widely used and traditional method in the health area known as goniometry as well as a semi-automatic method developed using new technological tools. The results demonstrated that the technique has a high sensitivity and can analyze static body positions and movement evolutions, expanding its applicability range","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication and Role-Based Authorization in Microservice Architecture: A Generic Performance-Centric Design 微服务架构中的身份验证和基于角色的授权:通用的以性能为中心的设计
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.758-768
Randa Ahmad Al-Wadi, Adi Maaita
—In a microservice-based system, each microservice is a stand-alone application that may be targeted individually to obtain unauthorized access. Consequently, it is necessary to include authentication and authorization features. However, a set of related design decisions needs to be taken in a way that accommodates the scale of a developed system. To illustrate, a user may be authenticated depending on a password and authorized based on roles. In such a case, one integrated authentication and role-based authorization microservice can be added. Besides, the Application Programming Interfaces (APIs) that are associated with roles may be hard-coded as static API-level role authorization checks. Nevertheless, static relation between roles and APIs hinders the ease of modification of their associations when a massive number of APIs exist in a microservice system. To transform the relation into dynamic relation, this paper presents a generic microservice-based architectural design with a separate role-based authorization microservice that contains role/API database records. Moreover, it shows experimentation for performance optimization that was carried out on authentication and role-based authorization databases to utilize the suggested architectural design. The obtained results of password-based authentication encouraged employing not only Structured Query Language (NoSQL) databases with small microservice-based systems, which deal with 1500 users or less while employing Structured Query Language (SQL) databases with medium to large systems. Furthermore, the results indicated that there is no difference between the two database types in the role-based authorization process for all API-based system scale levels.
在基于微服务的系统中,每个微服务都是一个独立的应用程序,可以单独针对其进行未经授权的访问。因此,有必要包含身份验证和授权特性。然而,需要采取一组相关的设计决策,以适应已开发系统的规模。举例来说,可以根据密码对用户进行身份验证,并根据角色对用户进行授权。在这种情况下,可以添加一个集成身份验证和基于角色的授权微服务。此外,与角色关联的应用程序编程接口(api)可能被硬编码为静态api级角色授权检查。然而,当微服务系统中存在大量api时,角色和api之间的静态关系阻碍了修改它们之间关联的便利性。为了将关系转换为动态关系,本文提出了一个通用的基于微服务的体系结构设计,其中包含一个独立的基于角色的授权微服务,该微服务包含角色/API数据库记录。此外,本文还展示了在身份验证和基于角色的授权数据库上进行的性能优化实验,以利用建议的体系结构设计。基于密码的认证所获得的结果不仅鼓励在处理1500用户以下的小型微服务系统中使用结构化查询语言(NoSQL)数据库,也鼓励在大中型系统中使用结构化查询语言(SQL)数据库。此外,结果表明,对于所有基于api的系统规模级别,在基于角色的授权过程中,两种数据库类型之间没有差异。
{"title":"Authentication and Role-Based Authorization in Microservice Architecture: A Generic Performance-Centric Design","authors":"Randa Ahmad Al-Wadi, Adi Maaita","doi":"10.12720/jait.14.4.758-768","DOIUrl":"https://doi.org/10.12720/jait.14.4.758-768","url":null,"abstract":"—In a microservice-based system, each microservice is a stand-alone application that may be targeted individually to obtain unauthorized access. Consequently, it is necessary to include authentication and authorization features. However, a set of related design decisions needs to be taken in a way that accommodates the scale of a developed system. To illustrate, a user may be authenticated depending on a password and authorized based on roles. In such a case, one integrated authentication and role-based authorization microservice can be added. Besides, the Application Programming Interfaces (APIs) that are associated with roles may be hard-coded as static API-level role authorization checks. Nevertheless, static relation between roles and APIs hinders the ease of modification of their associations when a massive number of APIs exist in a microservice system. To transform the relation into dynamic relation, this paper presents a generic microservice-based architectural design with a separate role-based authorization microservice that contains role/API database records. Moreover, it shows experimentation for performance optimization that was carried out on authentication and role-based authorization databases to utilize the suggested architectural design. The obtained results of password-based authentication encouraged employing not only Structured Query Language (NoSQL) databases with small microservice-based systems, which deal with 1500 users or less while employing Structured Query Language (SQL) databases with medium to large systems. Furthermore, the results indicated that there is no difference between the two database types in the role-based authorization process for all API-based system scale levels.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linguistic Driven Feature Selection for Text Classification as Stop Word Replacement 基于语言驱动特征选择的停止词替换文本分类
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.796-802
Daniela M. Schönle, Christoph Reich, D. Abdeslam
.
{"title":"Linguistic Driven Feature Selection for Text Classification as Stop Word Replacement","authors":"Daniela M. Schönle, Christoph Reich, D. Abdeslam","doi":"10.12720/jait.14.4.796-802","DOIUrl":"https://doi.org/10.12720/jait.14.4.796-802","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in the Development of an Algorithm for Parametric Identification of Egyptian Hieroglyphs Using Artificial Vision 埃及象形文字人工视觉参数识别算法研究进展
IF 1 Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.788-795
Rafael Bolívar León, C. Peña, G. G. Moreno
—This article presents the development of an algorithm for identifying Egyptian hieroglyphs written on papyri. For the development of the algorithm, the implementation of parametric artificial vision techniques allowed the reduction of computational power required. A study of the main morphological characteristics used in artificial vision was carried out, some relevant ones were selected, and others were adapted to be normalized and quantified quickly. It was shown that the established characteristics allow the differentiation and identification of the hieroglyphs of the ancient Egyptian alphabet. The developed algorithm has the advantage that it allows to differentiate characters, regardless of their initial size.
本文介绍了一种识别写在纸莎草纸上的埃及象形文字的算法的发展。对于算法的发展,参数化人工视觉技术的实现允许减少所需的计算能力。对人工视觉中使用的主要形态学特征进行了研究,选取了一些相关的形态学特征,并对其他形态学特征进行了快速归一化和量化。研究表明,已建立的特征允许区分和识别古埃及字母的象形文字。开发的算法的优点是它允许区分字符,而不管它们的初始大小。
{"title":"Advances in the Development of an Algorithm for Parametric Identification of Egyptian Hieroglyphs Using Artificial Vision","authors":"Rafael Bolívar León, C. Peña, G. G. Moreno","doi":"10.12720/jait.14.4.788-795","DOIUrl":"https://doi.org/10.12720/jait.14.4.788-795","url":null,"abstract":"—This article presents the development of an algorithm for identifying Egyptian hieroglyphs written on papyri. For the development of the algorithm, the implementation of parametric artificial vision techniques allowed the reduction of computational power required. A study of the main morphological characteristics used in artificial vision was carried out, some relevant ones were selected, and others were adapted to be normalized and quantified quickly. It was shown that the established characteristics allow the differentiation and identification of the hieroglyphs of the ancient Egyptian alphabet. The developed algorithm has the advantage that it allows to differentiate characters, regardless of their initial size.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Smart Teleradiology Framework Integrated with Technology-Based Fault Detection (CVT-FD) 集成基于技术的故障检测(CVT-FD)的安全智能远程放射学框架
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.941-949
Mustafa Sabah Mustafa, Mohammed Hasan Ali, Mustafa Musa Jaber, Amjad Rehman Khan, Narmine ElHakim, Tanzila Saba
—The healthcare sector has used cyber-physical systems to provide high-quality patient treatment. Many attack surfaces need sophisticated security solutions because of the wide range of medical devices, mobile devices, and body sensor nodes. Cyber-physical systems have various processing technologies, which means these technical methods are as varied. To reduce fraud and medical mistakes, restricted access to these data and fault authentication must be implemented. Because these procedures require information management about problem identification and diagnosis at a complex level distinct from technology, existing technologies must be better suited. This paper suggests a Computer Vision Technology-based Fault Detection (CVT-FD) framework for securely sharing healthcare data. When utilizing a trusted device like a mobile phone, end-users can rest assured that their data is secure. Cyber-attack behaviour can be predicted using an Artificial Neural Network (ANN), and analyzing this data can assist healthcare professionals in making decisions. The experimental findings show that the model outperforms current detection accuracy (98.3%), energy consumption (97.2%), attack prediction (96.6%), efficiency (97.9%), and delay ratios (35.6%) over existing approaches.
{"title":"Secure and Smart Teleradiology Framework Integrated with Technology-Based Fault Detection (CVT-FD)","authors":"Mustafa Sabah Mustafa, Mohammed Hasan Ali, Mustafa Musa Jaber, Amjad Rehman Khan, Narmine ElHakim, Tanzila Saba","doi":"10.12720/jait.14.5.941-949","DOIUrl":"https://doi.org/10.12720/jait.14.5.941-949","url":null,"abstract":"—The healthcare sector has used cyber-physical systems to provide high-quality patient treatment. Many attack surfaces need sophisticated security solutions because of the wide range of medical devices, mobile devices, and body sensor nodes. Cyber-physical systems have various processing technologies, which means these technical methods are as varied. To reduce fraud and medical mistakes, restricted access to these data and fault authentication must be implemented. Because these procedures require information management about problem identification and diagnosis at a complex level distinct from technology, existing technologies must be better suited. This paper suggests a Computer Vision Technology-based Fault Detection (CVT-FD) framework for securely sharing healthcare data. When utilizing a trusted device like a mobile phone, end-users can rest assured that their data is secure. Cyber-attack behaviour can be predicted using an Artificial Neural Network (ANN), and analyzing this data can assist healthcare professionals in making decisions. The experimental findings show that the model outperforms current detection accuracy (98.3%), energy consumption (97.2%), attack prediction (96.6%), efficiency (97.9%), and delay ratios (35.6%) over existing approaches.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handling Class Imbalance in Google Cluster Dataset Using a New Hybrid Sampling Approach 用一种新的混合采样方法处理Google聚类数据集中的类不平衡
Q3 Computer Science Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.934-940
Jyoti Shetty, G. Shobha
—Class imbalance is a classical problem in data mining, where the classes in a dataset have a disproportionate number of instances. Most machine learning tasks fail to work properly with an imbalanced dataset. There exist various approaches to balance a dataset, but suffer from issues such as overfitting and information loss. This manuscript proposes a novel and improved cluster-based undersampling method for handling two and multi-class imbalanced dataset. Ensemble learning algorithm integrated with the pre-processing technique is used to address the class imbalance problem. The proposed approach is tested using a publicly available imbalanced Google cluster dataset, in case of imbalanced dataset the F1-score value for each class has to be checked, it is observed that the existing approaches F1-score for class 0 was not good, whereas the proposed algorithm had a balanced F1-score of 0.97 for class 0 and 0.96 for class 1. There is an improvement in F1-score of about 2% compared to the existing technique. Similarly for multi-class problem the proposed novel algorithm gave balanced AUC values of 0.87, 0.83 and 0.97 for class 0, class 1 and class 2 respectively.
{"title":"Handling Class Imbalance in Google Cluster Dataset Using a New Hybrid Sampling Approach","authors":"Jyoti Shetty, G. Shobha","doi":"10.12720/jait.14.5.934-940","DOIUrl":"https://doi.org/10.12720/jait.14.5.934-940","url":null,"abstract":"—Class imbalance is a classical problem in data mining, where the classes in a dataset have a disproportionate number of instances. Most machine learning tasks fail to work properly with an imbalanced dataset. There exist various approaches to balance a dataset, but suffer from issues such as overfitting and information loss. This manuscript proposes a novel and improved cluster-based undersampling method for handling two and multi-class imbalanced dataset. Ensemble learning algorithm integrated with the pre-processing technique is used to address the class imbalance problem. The proposed approach is tested using a publicly available imbalanced Google cluster dataset, in case of imbalanced dataset the F1-score value for each class has to be checked, it is observed that the existing approaches F1-score for class 0 was not good, whereas the proposed algorithm had a balanced F1-score of 0.97 for class 0 and 0.96 for class 1. There is an improvement in F1-score of about 2% compared to the existing technique. Similarly for multi-class problem the proposed novel algorithm gave balanced AUC values of 0.87, 0.83 and 0.97 for class 0, class 1 and class 2 respectively.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Advances in Information Technology
全部 IZV-PHYS SOLID EART+ COMP BIOCHEM PHYS C ACTA GEOL POL ENG SANIT AMBIENT Ann. Glaciol. Atmos. Meas. Tech. Aquat. Geochem. Geol. J. ERN: Other Macroeconomics: Aggregative Models (Topic) European Journal of Biological Research Environ. Mol. Mutagen. ENVIRONMENT J APPL METEOROL CLIM J. Adv. Model. Earth Syst. ERN: Other IO: Empirical Studies of Firms & Markets (Topic) Org. Geochem. Enzyme Research Adv. Meteorol. ECOL RESTOR Environ. Educ. Res, CRIT REV ENV SCI TEC Int. J. Biometeorol. Geol. Ore Deposits Stud. Geophys. Geod. Int. Geol. Rev. Energy Ecol Environ ERN: Regulation (IO) (Topic) EUR UROL BIOGEOSCIENCES GROUNDWATER Energy Systems Curr. Appl Phys. Geochem. Int. Chem. Ecol. Miner. Deposita Essentials of Polymer Flooding Technique EUREKA: Physics and Engineering Palaeobiodivers. Palaeoenviron. Asia-Pac. J. Atmos. Sci. Appl. Geochem. Ore Geol. Rev. FOLIA PHONIATR LOGO Environmental Claims Journal EUR UROL FOCUS Annu. Rev. Earth Planet. Sci. AAPG Bull. Eurasian Journal of Emergency Medicine J. Earth Sci. 2011 International Conference on Electrical and Control Engineering ARCH ACOUST Environ. Eng. Sci. PERIOD MINERAL Space Weather ECOSYSTEMS Environ. Pollut. Bioavailability ACTA GEOL SIN-ENGL Conserv. Biol. ARCHAEOMETRY Clim. Change Geobiology Am. J. Phys. Anthropol. Carbon Balance Manage. ACTA PETROL SIN Communications Earth & Environment Geochim. Cosmochim. Acta Acta Geochimica Archaeol. Anthropol. Sci. Contrib. Mineral. Petrol. Appl. Clay Sci. Clean-Soil Air Water Ecol. Processes Conserv. Genet. Resour. Acta Oceanolog. Sin. J. Hydrol. Clean Technol. Environ. Policy Am. Mineral. ARCT ANTARCT ALP RES Acta Geophys. ENVIRON HEALTH-GLOB Environ. Eng. Manage. J. Ecol. Monogr. ECOLOGY Ecol. Res. EQEC'96. 1996 European Quantum Electronic Conference Anthropologie Rev. Geophys. "Radiation and Risk" Bulletin of the National Radiation and Epidemiological Registry Aust. J. Earth Sci. J. Atmos. Oceanic Technol. J. Atmos. Chem. Entomologisk tidskrift Atmos. Chem. Phys. Exp. Hematol. Basin Res. Environ. Toxicol. Pharmacol. Nat. Clim. Change Engineering Science and Technology, an International Journal ECOTOXICOLOGY Gondwana Res. Environmental Progress
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1