首页 > 最新文献

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications最新文献

英文 中文
Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable Development 区块链技术增强卫生保健生态系统,促进可持续发展
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.018
Sofiene Mansouri, Souhir Chabchoub, Yousef Alharbi, Abdulrahman Alqahtani
The analysis and interpretation portion of the study concentrated on managing blockchain technology and on comprehending the rate of technological advancement in actions that support the development of the sustainability and healthcare ecosystems. The study reports results of a survey from 50 respondents who were directly handling activities in the healthcare industry. The study's discussion and findings section also included information on the analysis of the survey data that was acquired. This information is crucial for raising the healthcare ecosystem's to sustainability level. Blockchain technology is one of the most significant breakthroughs of recent times. By consistently changing the healthcare industry, it advances the entire field. It is seen as a series of building blocks that preserves interpersonal trust and covers vital information. The rapid development of blockchain technology is enabling a wide variety of uses across many industries. The potential of blockchain technology will be revolutionised by the systematic production of literature evaluations. One illustration of how swiftly the world has gone digital is the emergence of countless electronic records in the healthcare industry. Blockchain technology has made it possible to eliminate third-party administration's risks in the medical industry.
该研究的分析和解释部分侧重于管理区块链技术,并了解支持可持续性和医疗保健生态系统发展的行动中的技术进步速度。该研究报告了对50名直接处理医疗保健行业活动的受访者的调查结果。该研究的讨论和结果部分还包括对所获得的调查数据进行分析的信息。这些信息对于将医疗保健生态系统提高到可持续性水平至关重要。区块链技术是近年来最重要的突破之一。通过不断改变医疗保健行业,它推动了整个领域的发展。它被看作是维护人际信任和涵盖重要信息的一系列构件。区块链技术的快速发展使许多行业的各种用途成为可能。系统的文献评估将彻底改变区块链技术的潜力。医疗保健行业出现了无数电子记录,这是世界数字化速度之快的一个例证。区块链技术使医疗行业消除第三方管理风险成为可能。
{"title":"Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable Development","authors":"Sofiene Mansouri, Souhir Chabchoub, Yousef Alharbi, Abdulrahman Alqahtani","doi":"10.58346/jowua.2023.i3.018","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.018","url":null,"abstract":"The analysis and interpretation portion of the study concentrated on managing blockchain technology and on comprehending the rate of technological advancement in actions that support the development of the sustainability and healthcare ecosystems. The study reports results of a survey from 50 respondents who were directly handling activities in the healthcare industry. The study's discussion and findings section also included information on the analysis of the survey data that was acquired. This information is crucial for raising the healthcare ecosystem's to sustainability level. Blockchain technology is one of the most significant breakthroughs of recent times. By consistently changing the healthcare industry, it advances the entire field. It is seen as a series of building blocks that preserves interpersonal trust and covers vital information. The rapid development of blockchain technology is enabling a wide variety of uses across many industries. The potential of blockchain technology will be revolutionised by the systematic production of literature evaluations. One illustration of how swiftly the world has gone digital is the emergence of countless electronic records in the healthcare industry. Blockchain technology has made it possible to eliminate third-party administration's risks in the medical industry.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135081321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Support Vector Machine and Convolutional Neural Network for Malaria Parasite Classification and Feature Extraction 支持向量机与卷积神经网络在疟疾寄生虫分类与特征提取中的比较分析
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.015
Rika Rosnelly, Bob Subhan Riza, Suparni S.
Malaria is a dangerous infectious disease because, if it is slow to handle, it can even cause death. Malaria is caused by a parasite called plasmodium, which is transmitted through the bite of a malaria mosquito called Anopheles. Parasites transmitted by mosquitoes attack human blood cells. The inspection method used to identify the type of malaria parasite is microscopic examination, whose accuracy and efficiency depend on human expertise. Examination methods using the Rapid Diagnostic Test (RDT) and Polymerase Chain Reaction (PCR) are not affordable, especially in underprivileged areas. This study compares the performance of classification methods, namely Support Vector Machine (SVM) and Convolutional Neural Network (CNN), to identify the type of malaria parasite and its stage and develop a feature extraction algorithm. The method of feature extraction is a decisive step to identifying the type of malaria parasite. The feature extraction process by developing a feature extraction algorithm is called the PEMA and KEHE feature tracking algorithm, or feature tracking with perimeter, eccentricity, metric, area, contrast, energy, homogeneity, and entropy. The classifier uses a convolutional neural network (CNN) to divide the samples into 16 classes. The experiment used 446 images of malaria parasites. The outcome of identification showed that by tracking the PEMA and KEHE features with the SVM classifier, the best accuracy value was 85.08%, compared to CNN with an accuracy value of 61.40%.
疟疾是一种危险的传染病,因为如果治疗缓慢,它甚至会导致死亡。疟疾是由一种叫做疟原虫的寄生虫引起的,它通过一种叫做按蚊的疟疾蚊子的叮咬传播。蚊子传播的寄生虫攻击人的血细胞。用于确定疟疾寄生虫类型的检查方法是显微镜检查,其准确性和效率取决于人类的专业知识。使用快速诊断试验(RDT)和聚合酶链反应(PCR)的检查方法负担不起,特别是在贫困地区。本研究比较了支持向量机(SVM)和卷积神经网络(CNN)两种分类方法在疟疾寄生虫类型和阶段识别方面的性能,并开发了一种特征提取算法。特征提取方法是确定疟原虫类型的决定性步骤。通过开发特征提取算法的特征提取过程称为PEMA和KEHE特征跟踪算法,或具有周长、偏心、度量、面积、对比度、能量、均匀性和熵的特征跟踪。分类器使用卷积神经网络(CNN)将样本分为16类。该实验使用了446张疟疾寄生虫的图像。识别结果表明,SVM分类器对PEMA和KEHE特征进行跟踪,准确率最高的是85.08%,而CNN的准确率只有61.40%。
{"title":"Comparative Analysis of Support Vector Machine and Convolutional Neural Network for Malaria Parasite Classification and Feature Extraction","authors":"Rika Rosnelly, Bob Subhan Riza, Suparni S.","doi":"10.58346/jowua.2023.i3.015","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.015","url":null,"abstract":"Malaria is a dangerous infectious disease because, if it is slow to handle, it can even cause death. Malaria is caused by a parasite called plasmodium, which is transmitted through the bite of a malaria mosquito called Anopheles. Parasites transmitted by mosquitoes attack human blood cells. The inspection method used to identify the type of malaria parasite is microscopic examination, whose accuracy and efficiency depend on human expertise. Examination methods using the Rapid Diagnostic Test (RDT) and Polymerase Chain Reaction (PCR) are not affordable, especially in underprivileged areas. This study compares the performance of classification methods, namely Support Vector Machine (SVM) and Convolutional Neural Network (CNN), to identify the type of malaria parasite and its stage and develop a feature extraction algorithm. The method of feature extraction is a decisive step to identifying the type of malaria parasite. The feature extraction process by developing a feature extraction algorithm is called the PEMA and KEHE feature tracking algorithm, or feature tracking with perimeter, eccentricity, metric, area, contrast, energy, homogeneity, and entropy. The classifier uses a convolutional neural network (CNN) to divide the samples into 16 classes. The experiment used 446 images of malaria parasites. The outcome of identification showed that by tracking the PEMA and KEHE features with the SVM classifier, the best accuracy value was 85.08%, compared to CNN with an accuracy value of 61.40%.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware and Context-aware Fault Detection Framework for Wireless Sensor Networks 无线传感器网络能量感知和环境感知故障检测框架
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.001
Rosa Clavijo-López, Jesús Merino Velásquez, Wayky Alfredo Luy Navarrete, Cesar Augusto Flores Tananta, Dorothy Luisa Meléndez Morote, Maria Aurora Gonzales Vigo, Doris Fuster- Guillén
Wireless sensor networks (WSNs) consist of many sensor nodes that are densely deployed throughout a randomized geographical area to monitor, detect, and analyze various physical phenomena. The primary obstacle encountered in WSNs pertains to the significant reliance of sensor nodes on finite battery power for wireless data transfer. Sensors as a crucial element inside Cyber-Physical Systems (CPS) renders them vulnerable to failures arising from intricate surroundings, substandard manufacturing, and the passage of time. Various anomalies can appear within WSNs, mostly attributed to defects such as hardware and software malfunctions and anomalies and assaults initiated by unauthorized individuals. These anomalies significantly impact the overall integrity and completeness of the data gathered by the networks. Therefore, it is imperative to provide a critical mechanism for the early detection of faults, even in the presence of constraints imposed by the sensor nodes. Machine Learning (ML) techniques encompass a range of approaches that may be employed to identify and diagnose sensor node faults inside a network. This paper presents a novel Energy-aware and Context-aware fault detection framework (ECFDF) that utilizes the Extra-Trees algorithm (ETA) for fault detection in WSNs. To assess the effectiveness of the suggested methodology for identifying context-aware faults (CAF), a simulated WSN scenario is created. This scenario consists of data from humidity and temperature sensors and is designed to emulate severe low-intensity problems. This study examines six often-seen categories of sensor fault, including drift, hard-over/bias, spike, erratic/precision, stuck, and data loss. The ECFDF approach utilizes an Energy-Efficient Fuzzy Logic Adaptive Clustering Hierarchy (EE-FLACH) algorithm to select a Super Cluster Head (SCH) within WSNs. The SCH is responsible for achieving optimal energy consumption within the network, and this selection process facilitates the early detection of faults. The results of the simulation indicate that the ECFDF technique has superior performance in terms of Fault Detection Accuracy (FDA), False-Positive Rate (FPR), and Mean Residual Energy (MRE) when compared to other detection and classification methods.
无线传感器网络(wsn)由许多传感器节点组成,这些节点密集地部署在随机的地理区域中,以监测、检测和分析各种物理现象。在无线传感器网络中遇到的主要障碍是传感器节点在无线数据传输中严重依赖有限的电池电量。传感器作为网络物理系统(CPS)中的关键元素,使它们容易受到复杂环境、不合格制造和时间流逝引起的故障的影响。wsn中可能出现各种异常,主要归因于硬件和软件故障以及由未经授权的个人发起的异常和攻击等缺陷。这些异常严重影响了网络收集数据的整体完整性和完整性。因此,即使存在传感器节点施加的约束,也必须提供早期检测故障的关键机制。机器学习(ML)技术包含一系列可用于识别和诊断网络内传感器节点故障的方法。本文提出了一种新的能量感知和上下文感知故障检测框架(ECFDF),该框架利用额外树算法(ETA)在wsn中进行故障检测。为了评估所建议的方法在识别上下文感知故障(CAF)方面的有效性,创建了一个模拟WSN场景。该场景由来自湿度和温度传感器的数据组成,旨在模拟严重的低强度问题。本研究考察了六种常见的传感器故障,包括漂移、硬转换/偏置、尖峰、不稳定/精确、卡住和数据丢失。ECFDF方法利用一种节能的模糊逻辑自适应聚类层次(EE-FLACH)算法来选择wsn内的超级簇头(SCH)。SCH负责实现网络内的最优能耗,这种选择过程有利于及早发现故障。仿真结果表明,与其他检测和分类方法相比,ECFDF技术在故障检测准确率(FDA)、假阳性率(FPR)和平均剩余能量(MRE)方面具有优越的性能。
{"title":"Energy-aware and Context-aware Fault Detection Framework for Wireless Sensor Networks","authors":"Rosa Clavijo-López, Jesús Merino Velásquez, Wayky Alfredo Luy Navarrete, Cesar Augusto Flores Tananta, Dorothy Luisa Meléndez Morote, Maria Aurora Gonzales Vigo, Doris Fuster- Guillén","doi":"10.58346/jowua.2023.i3.001","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.001","url":null,"abstract":"Wireless sensor networks (WSNs) consist of many sensor nodes that are densely deployed throughout a randomized geographical area to monitor, detect, and analyze various physical phenomena. The primary obstacle encountered in WSNs pertains to the significant reliance of sensor nodes on finite battery power for wireless data transfer. Sensors as a crucial element inside Cyber-Physical Systems (CPS) renders them vulnerable to failures arising from intricate surroundings, substandard manufacturing, and the passage of time. Various anomalies can appear within WSNs, mostly attributed to defects such as hardware and software malfunctions and anomalies and assaults initiated by unauthorized individuals. These anomalies significantly impact the overall integrity and completeness of the data gathered by the networks. Therefore, it is imperative to provide a critical mechanism for the early detection of faults, even in the presence of constraints imposed by the sensor nodes. Machine Learning (ML) techniques encompass a range of approaches that may be employed to identify and diagnose sensor node faults inside a network. This paper presents a novel Energy-aware and Context-aware fault detection framework (ECFDF) that utilizes the Extra-Trees algorithm (ETA) for fault detection in WSNs. To assess the effectiveness of the suggested methodology for identifying context-aware faults (CAF), a simulated WSN scenario is created. This scenario consists of data from humidity and temperature sensors and is designed to emulate severe low-intensity problems. This study examines six often-seen categories of sensor fault, including drift, hard-over/bias, spike, erratic/precision, stuck, and data loss. The ECFDF approach utilizes an Energy-Efficient Fuzzy Logic Adaptive Clustering Hierarchy (EE-FLACH) algorithm to select a Super Cluster Head (SCH) within WSNs. The SCH is responsible for achieving optimal energy consumption within the network, and this selection process facilitates the early detection of faults. The results of the simulation indicate that the ECFDF technique has superior performance in terms of Fault Detection Accuracy (FDA), False-Positive Rate (FPR), and Mean Residual Energy (MRE) when compared to other detection and classification methods.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm 增强移动自组织网络的安全性:增强粒子群优化驱动的入侵检测和安全路由算法
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.006
Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza
Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.
无线技术越来越受欢迎,并在许多应用中使用。瞬态移动自组织网络(manet)在没有基础设施的情况下服务于特定目标。这些网络的动态性使它们对普适计算很有用。然而,高移动性、缺乏中央权威和开放媒体使得manet容易受到各种安全风险的影响。因此,应该使用入侵检测系统(IDS)来监视和检测系统安全问题。为了防止和提高对未经授权访问的安全性,入侵筛选至关重要。移动节点的电源耗尽会影响其传输数据包的能力,因为该功能取决于系统的整体寿命。计算优化驱动的解决方案在IDS和manet内部的安全路由环境中非常流行。本研究采用增强粒子群优化驱动的入侵检测与安全路由算法(EPSO-IDSRA)。增强粒子群优化技术(Enhanced Particle Swarm Optimization technology, EPSO)提供了基于信任、安全、节能的多网路由。采用EPSO技术来识别最优跳数,以提高路由过程。初始步骤包括激活模糊聚类算法,然后根据评估其间接、直接和最近的置信度值选择簇头(CHs)。此外,价值节点的识别取决于评估置信水平。此外,CHs还涉及到多跳路由,确定最优路由取决于预期的协议,该协议考虑到指定区域内的延迟、吞吐量和连通性等因素,选择最有利的路径。EPSO方法用于安全路由(时间为50ms),产生的最佳能耗为0.15毫焦耳,最小延迟为0.008毫秒,最大吞吐量为每秒0.8位,检测率为89%。
{"title":"Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm","authors":"Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos- Ugaz, Anibal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza","doi":"10.58346/jowua.2023.i3.006","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.006","url":null,"abstract":"Wireless technologies have grown in popularity and are used in many applications. Transient Mobile Ad hoc Networks (MANETs) serve specific goals without infrastructure. The dynamism of these networks makes them useful for ubiquitous computing. However, high mobility, the lack of a centralized authority, and open media make MANETs vulnerable to various security risks. Thus, an Intrusion Detection System (IDS) should be used to monitor and detect system security issues. To prevent and improve security against unauthorized access, intrusion screening is crucial. The depletion of a mobile node's power supply can impact its capacity to transmit packets, as this functionality is contingent upon the system's overall lifespan. Computational Optimization-driven solutions have been prevalent in the context of IDS and secure routing inside MANETs. This research employs the Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm (EPSO-IDSRA). Enhanced Particle Swarm Optimization technique (EPSO) has provided confidence-based, secure, and energy-efficient routing in MANETs. The EPSO technique is applied to identify optimal hops for enhancing the routing process. The initial step involves the activation of the fuzzy clustering algorithm, followed by selecting Cluster Heads (CHs) based on assessing their indirect, direct, and recent confidence values. Furthermore, the identification of value nodes was contingent upon assessing confidence levels. Also, the CHs are involved in multi-hop routing, and determining the optimal route depends on the anticipated protocol, which chooses the most favorable paths considering factors such as latency, throughput, and connectivity within the designated area. The EPSO method, presented for secure routing (at time 50ms), yielded an optimal energy consumption of 0.15 millijoules, a minimal delay of 0.008 milliseconds, a maximum throughput of 0.8 bits per second, and an 89% detection rate.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export 用距离度量对药用植物、香料和香料出口进行k - mediids方法的最优映射
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.008
Dessy Adriani, Ratna Dewi, Leni Saleh, D. Yadi Heryadi, Fatma Sarie, I Gede Iwan Sudipa, Robbi Rahim
About 80% of the world's medicinal plants grow in Indonesia. The Negeri Rempah Foundation also said that Indonesia has more kinds of spices than any other country in Southeast Asia. To figure out the best way to export plants, you need to do a study that groups them by their main destination country. This is called "clustering," and it can be done by doing regional mapping. In the clustering process, measuring deviation/distance or distance space is a key part of figuring out how similar or regular data and items are. K-Medoids is one way to group things together. K-Medoids is an algorithm that groups data based on how far apart they are. Distance Measure is a way to measure the distance between two points. It can help an algorithm sort object into groups based on how similar their variables are. The dataset used comes from the Customs Documents of the Directorate General of Customs and Excise on the official website of the Central Bureau of Statistics for the period of 2012-2021 about the Export of Medicinal, Aromatic, and Spices Plants. This study uses mixed measures (mixed euclideandistance), numerical measures (camberradistance), and bregmandivergences (generalizeddivergence). The mapping results are compared with the validation of the Davies Bouldin Index (DBI). With the help of the rapidminer software, a number of tests were done. The results showed that using mixed measures (mixed euclideandistance) with a value of k=4 gave a DBI value of 0.021. Because it gives a DBI value close to 0, the K-Medoids algorithm with mixed measures (mixedeuclideandistance) is thought to work better than other distance measures.
世界上大约80%的药用植物生长在印度尼西亚。Negeri Rempah基金会还表示,印度尼西亚的香料种类比东南亚其他任何国家都多。为了找出出口植物的最佳方式,你需要做一项研究,根据它们的主要目的地国家对它们进行分组。这被称为“聚类”,它可以通过进行区域映射来完成。在聚类过程中,测量偏差/距离或距离空间是确定数据和项目相似或规则程度的关键部分。K-Medoids是将事物组合在一起的一种方法。k - mediids是一种算法,它根据数据之间的距离对数据进行分组。距离测量是测量两点之间距离的一种方法。它可以帮助算法根据变量的相似程度对对象进行分组。使用的数据集来自中央统计局官方网站2012-2021年期间关于药用,芳香和香料植物出口的海关总署海关文件。本研究使用混合度量(混合欧几里得距离)、数值度量(坎伯拉距离)和布雷格曼散度(广义散度)。将映射结果与Davies Bouldin指数(DBI)的验证结果进行了比较。在rapidminer软件的帮助下,进行了大量的测试。结果表明,采用k=4的混合度量(混合欧几里得距离),DBI值为0.021。因为它给出的DBI值接近于0,所以使用混合度量(mixedeuclideandistance)的K-Medoids算法被认为比其他距离度量更好。
{"title":"Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export","authors":"Dessy Adriani, Ratna Dewi, Leni Saleh, D. Yadi Heryadi, Fatma Sarie, I Gede Iwan Sudipa, Robbi Rahim","doi":"10.58346/jowua.2023.i3.008","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.008","url":null,"abstract":"About 80% of the world's medicinal plants grow in Indonesia. The Negeri Rempah Foundation also said that Indonesia has more kinds of spices than any other country in Southeast Asia. To figure out the best way to export plants, you need to do a study that groups them by their main destination country. This is called \"clustering,\" and it can be done by doing regional mapping. In the clustering process, measuring deviation/distance or distance space is a key part of figuring out how similar or regular data and items are. K-Medoids is one way to group things together. K-Medoids is an algorithm that groups data based on how far apart they are. Distance Measure is a way to measure the distance between two points. It can help an algorithm sort object into groups based on how similar their variables are. The dataset used comes from the Customs Documents of the Directorate General of Customs and Excise on the official website of the Central Bureau of Statistics for the period of 2012-2021 about the Export of Medicinal, Aromatic, and Spices Plants. This study uses mixed measures (mixed euclideandistance), numerical measures (camberradistance), and bregmandivergences (generalizeddivergence). The mapping results are compared with the validation of the Davies Bouldin Index (DBI). With the help of the rapidminer software, a number of tests were done. The results showed that using mixed measures (mixed euclideandistance) with a value of k=4 gave a DBI value of 0.021. Because it gives a DBI value close to 0, the K-Medoids algorithm with mixed measures (mixedeuclideandistance) is thought to work better than other distance measures.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the Impact of Communicative Artificial Intelligence Based Accounting Information Systems on Small and Medium Enterprises 评估基于通信人工智能的会计信息系统对中小企业的影响
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.017
Yus Hermansyah
Recent breakthroughs in deep learning have led to the development of cutting-edge industrial applications of Communicative Artificial Intelligence (AI), making it indispensable for businesses aiming to maintain a competitive edge. Consequently, artificial intelligence is no longer exclusive to large corporations; it now impacts businesses of all sizes, including small and medium-sized enterprises (SMEs), serving as a tool for command in the production and communication of crucial business aspects. This article delves into the extent of Communicative AI adoption by SMEs in Indonesia, shedding light on issues related to implementing industrial AI applications. To achieve this, a sample of SMEs participated in a structured online survey. Currently, AI adoption among SMEs in Indonesia is minimal. The reluctance is primarily attributed to high costs, extended duration, and inherent risks of developing proprietary applications. Instead, SMEs are heavily relying on AI-as-a-service and other cloud-based solutions. Various factors contribute to businesses' hesitancy. The slow progress in SME implementation indicates misunderstandings related to data and a lack of knowledge, influencing how these enterprises perceive the obstacles they encounter.
最近深度学习的突破导致了通信人工智能(AI)的尖端工业应用的发展,使其成为旨在保持竞争优势的企业不可或缺的技术。因此,人工智能不再是大公司的专利;它现在影响着各种规模的企业,包括中小型企业(sme),作为指挥关键业务方面的生产和通信的工具。本文深入研究了印度尼西亚中小企业采用通信人工智能的程度,揭示了与实施工业人工智能应用相关的问题。为了实现这一目标,中小企业样本参与了一项结构化的在线调查。目前,印尼中小企业对人工智能的采用很少。这种不情愿主要归因于开发专有应用程序的高成本、长时间和固有风险。相反,中小企业严重依赖人工智能即服务和其他基于云的解决方案。造成企业犹豫不决的因素有很多。中小企业在实施方面进展缓慢表明对数据和缺乏知识存在误解,影响了这些企业如何看待它们遇到的障碍。
{"title":"Assessing the Impact of Communicative Artificial Intelligence Based Accounting Information Systems on Small and Medium Enterprises","authors":"Yus Hermansyah","doi":"10.58346/jowua.2023.i3.017","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.017","url":null,"abstract":"Recent breakthroughs in deep learning have led to the development of cutting-edge industrial applications of Communicative Artificial Intelligence (AI), making it indispensable for businesses aiming to maintain a competitive edge. Consequently, artificial intelligence is no longer exclusive to large corporations; it now impacts businesses of all sizes, including small and medium-sized enterprises (SMEs), serving as a tool for command in the production and communication of crucial business aspects. This article delves into the extent of Communicative AI adoption by SMEs in Indonesia, shedding light on issues related to implementing industrial AI applications. To achieve this, a sample of SMEs participated in a structured online survey. Currently, AI adoption among SMEs in Indonesia is minimal. The reluctance is primarily attributed to high costs, extended duration, and inherent risks of developing proprietary applications. Instead, SMEs are heavily relying on AI-as-a-service and other cloud-based solutions. Various factors contribute to businesses' hesitancy. The slow progress in SME implementation indicates misunderstandings related to data and a lack of knowledge, influencing how these enterprises perceive the obstacles they encounter.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135040237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Document Vector Representation with Enhanced Features Based on Doc2VecC 基于Doc2VecC的增强特征文档向量表示
Q1 Computer Science Pub Date : 2023-09-06 DOI: 10.1007/s11036-023-02205-8
Li Gang, Huanbin Zhao, Tongzhou Zhao
{"title":"Document Vector Representation with Enhanced Features Based on Doc2VecC","authors":"Li Gang, Huanbin Zhao, Tongzhou Zhao","doi":"10.1007/s11036-023-02205-8","DOIUrl":"https://doi.org/10.1007/s11036-023-02205-8","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"112 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87688123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving User Experience (UX) by Applying (Interactive) Infographic in the Human Computer Interaction Context 通过在人机交互环境中应用(交互式)信息图来改善用户体验
Q1 Computer Science Pub Date : 2023-09-06 DOI: 10.1007/s11036-023-02179-7
W.V. Siricharoen
{"title":"Improving User Experience (UX) by Applying (Interactive) Infographic in the Human Computer Interaction Context","authors":"W.V. Siricharoen","doi":"10.1007/s11036-023-02179-7","DOIUrl":"https://doi.org/10.1007/s11036-023-02179-7","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82252973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps 联系人跟踪应用隐私:非gaen联系人跟踪应用共享哪些数据
Q1 Computer Science Pub Date : 2023-09-05 DOI: 10.1007/s11036-023-02136-4
D. Leith
{"title":"Contact Tracing App Privacy: What Data is Shared by Non-GAEN Contact Tracing Apps","authors":"D. Leith","doi":"10.1007/s11036-023-02136-4","DOIUrl":"https://doi.org/10.1007/s11036-023-02136-4","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82560340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video Resources Recommendation for Online Tourism Teaching in Interactive Network 交互式网络下在线旅游教学视频资源推荐
Q1 Computer Science Pub Date : 2023-09-05 DOI: 10.1007/s11036-023-02193-9
Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah
{"title":"Video Resources Recommendation for Online Tourism Teaching in Interactive Network","authors":"Yang Yang, Haitao Shang, Nasir Jamal, Farhan Ullah","doi":"10.1007/s11036-023-02193-9","DOIUrl":"https://doi.org/10.1007/s11036-023-02193-9","url":null,"abstract":"","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88416576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1