首页 > 最新文献

International Journal of Advances in Soft Computing and its Applications最新文献

英文 中文
Insider Threat Prevention in the US Banking System 美国银行体系内部威胁防范
Q3 Computer Science Pub Date : 2023-08-27 DOI: 10.5121/ijsc.2023.14302
Oghenekome Efijemue, Ifunanya Ejimofor, Omoshola Simon Owolabi
Insider threats have been a major problem for the US banking sector in recent years, costing billions of dollars in damages. To combat this, the implementation of effective cybersecurity measures is essential. This paper investigates the current state of insider threats to banks in the U.S., the associated costs, and the potential measures that can be taken to mitigate this risk. The development of a framework for the adoption of cybersecurity measures within the banking industry is the primary emphasis in order to stop fraud and lessen financial losses. Through a detailed examination of the literature, in-depth interviews with experts in the banking sector, and case studies of existing cybersecurity measures, this paper provides a comprehensive overview of the problem and potential remedies. Analysis of the research reveals that identity and access management, data encryption, and secure authentication are key components of any cybersecurity strategy. Furthermore, it is recommended that banks increase their technical capabilities and improve their employee awareness and training. The study concludes with a series of suggestions for enhancing banking industry cybersecurity and eventually reducing the danger of insider attacks. This paper explores the topic of insider threats in the US banking industry and presents cybersecurity measures to prevent fraud. Insider threats from people with access to sensitive data and systems present serious hazards to the banking industry, resulting in monetary losses, reputational harm, and compromised data integrity.
近年来,内部威胁一直是美国银行业的一个主要问题,造成了数十亿美元的损失。为解决这一问题,实施有效的网络安全措施至关重要。本文调查了美国银行内部威胁的现状,相关成本,以及可以采取的潜在措施来减轻这种风险。为在银行业内采用网络安全措施制定框架是防止欺诈和减少经济损失的主要重点。通过对文献的详细研究,对银行业专家的深入访谈,以及对现有网络安全措施的案例研究,本文提供了对问题和潜在补救措施的全面概述。研究分析表明,身份和访问管理、数据加密和安全认证是任何网络安全战略的关键组成部分。此外,建议银行提高技术能力,提高员工意识和培训。该研究最后提出了一系列建议,以加强银行业的网络安全,最终减少内部攻击的危险。本文探讨了美国银行业内部威胁的主题,并提出了防止欺诈的网络安全措施。来自访问敏感数据和系统的人的内部威胁给银行业带来了严重的危害,导致金钱损失、声誉损害和数据完整性受损。
{"title":"Insider Threat Prevention in the US Banking System","authors":"Oghenekome Efijemue, Ifunanya Ejimofor, Omoshola Simon Owolabi","doi":"10.5121/ijsc.2023.14302","DOIUrl":"https://doi.org/10.5121/ijsc.2023.14302","url":null,"abstract":"Insider threats have been a major problem for the US banking sector in recent years, costing billions of dollars in damages. To combat this, the implementation of effective cybersecurity measures is essential. This paper investigates the current state of insider threats to banks in the U.S., the associated costs, and the potential measures that can be taken to mitigate this risk. The development of a framework for the adoption of cybersecurity measures within the banking industry is the primary emphasis in order to stop fraud and lessen financial losses. Through a detailed examination of the literature, in-depth interviews with experts in the banking sector, and case studies of existing cybersecurity measures, this paper provides a comprehensive overview of the problem and potential remedies. Analysis of the research reveals that identity and access management, data encryption, and secure authentication are key components of any cybersecurity strategy. Furthermore, it is recommended that banks increase their technical capabilities and improve their employee awareness and training. The study concludes with a series of suggestions for enhancing banking industry cybersecurity and eventually reducing the danger of insider attacks. This paper explores the topic of insider threats in the US banking industry and presents cybersecurity measures to prevent fraud. Insider threats from people with access to sensitive data and systems present serious hazards to the banking industry, resulting in monetary losses, reputational harm, and compromised data integrity.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135181400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Financial Fraud in the United States Financial Sectors 美国金融部门保护客户数据和防止金融欺诈的网络安全策略
Q3 Computer Science Pub Date : 2023-08-27 DOI: 10.5121/ijsc.2023.14301
Efijemue Oghenekome Paul, Obunadike Callistus, Olisah Somtobe, Taiwo Esther, Kizor-Akaraiwe Somto, Odooh Clement, Ifunanya Ejimofor
As the financial sectors in the United States deal with expanding cyberthreats and a rising danger of financial crime, cybersecurity has become a top priority. This paper examines the crucial cybersecurity techniques used by financial institutions to protect client information and counter the growing risk of financial fraud. It proves that understanding common fraud tactics used to defraud financial institutions and customers, putting fraud detection and prevention techniques like anomaly detection and machine learning into practice, and using transaction monitoring and anti-money laundering tactics to spot and stop fraudulent activity are all necessary for preventing financial fraud. The paper begins by reviewing the common cyber dangers affecting the financial industry and the strategies used by cybercriminals to circumvent security precautions and take advantage of weaknesses. After looking at potential risks, the paper highlights the importance of proactive cybersecurity measures and risk mitigation techniques. It highlights crucial components of cybersecurity frameworks, including strong data encryption, multifactor authentication, intrusion detection systems, and ongoing security monitoring. This paper also emphasizes the value of educating and training financial institution staff members to increase cybersecurity resilience. It underlines the significance of building a strong security culture, educating personnel about potential dangers, and encouraging responsible management of client data. The study also explores the advantages of financial organizations working together and exchanging threat knowledge. It examines industry alliances, information-sharing platforms, and public-private partnerships as crucial methods for group protection against cyber threats. This paper highlighted the significance of artificial intelligence and machine learning in cybersecurity domain. It demonstrates how these technologies improve cybersecurity systems' capabilities by spotting irregularities and potential attacks. It emphasizes the significance of taking a proactive and dynamic strategy to securing client information and maintaining faith in the United States’ financial sectors. Overall, this paper provides a thorough overview of cybersecurity tactics crucial for protecting consumer data and avoiding financial fraud in the financial sectors across the United States. By taking a vigilant, team-based, and technology-driven strategy, financial institutions may strengthen their cyber defenses, protect the data of their clients, and defend the integrity of the financial system.
随着美国金融部门应对不断扩大的网络威胁和不断上升的金融犯罪危险,网络安全已成为重中之重。本文探讨了金融机构用于保护客户信息和应对日益增长的金融欺诈风险的关键网络安全技术。这证明,了解用于欺骗金融机构和客户的常见欺诈策略,将异常检测和机器学习等欺诈检测和预防技术应用于实践,以及使用交易监控和反洗钱策略来发现和阻止欺诈活动都是防止金融欺诈的必要条件。本文首先回顾了影响金融行业的常见网络危险,以及网络罪犯用来规避安全预防措施和利用弱点的策略。在研究了潜在风险之后,本文强调了主动网络安全措施和风险缓解技术的重要性。它强调了网络安全框架的关键组成部分,包括强大的数据加密、多因素认证、入侵检测系统和持续的安全监控。本文还强调了教育和培训金融机构工作人员以提高网络安全弹性的价值。它强调了建立强大的安全文化、教育人员了解潜在危险以及鼓励对客户数据进行负责任管理的重要性。该研究还探讨了金融机构合作和交换威胁知识的优势。它考察了行业联盟、信息共享平台和公私合作伙伴关系作为群体防御网络威胁的关键方法。本文强调了人工智能和机器学习在网络安全领域的重要意义。它展示了这些技术如何通过发现违规行为和潜在攻击来提高网络安全系统的能力。它强调了采取积极主动和动态的策略来保护客户信息和维护对美国金融部门的信心的重要性。总体而言,本文提供了对保护消费者数据和避免美国金融部门金融欺诈至关重要的网络安全策略的全面概述。通过采取警惕、以团队为基础和技术驱动的战略,金融机构可以加强其网络防御,保护客户数据,并捍卫金融系统的完整性。
{"title":"Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Financial Fraud in the United States Financial Sectors","authors":"Efijemue Oghenekome Paul, Obunadike Callistus, Olisah Somtobe, Taiwo Esther, Kizor-Akaraiwe Somto, Odooh Clement, Ifunanya Ejimofor","doi":"10.5121/ijsc.2023.14301","DOIUrl":"https://doi.org/10.5121/ijsc.2023.14301","url":null,"abstract":"As the financial sectors in the United States deal with expanding cyberthreats and a rising danger of financial crime, cybersecurity has become a top priority. This paper examines the crucial cybersecurity techniques used by financial institutions to protect client information and counter the growing risk of financial fraud. It proves that understanding common fraud tactics used to defraud financial institutions and customers, putting fraud detection and prevention techniques like anomaly detection and machine learning into practice, and using transaction monitoring and anti-money laundering tactics to spot and stop fraudulent activity are all necessary for preventing financial fraud. The paper begins by reviewing the common cyber dangers affecting the financial industry and the strategies used by cybercriminals to circumvent security precautions and take advantage of weaknesses. After looking at potential risks, the paper highlights the importance of proactive cybersecurity measures and risk mitigation techniques. It highlights crucial components of cybersecurity frameworks, including strong data encryption, multifactor authentication, intrusion detection systems, and ongoing security monitoring. This paper also emphasizes the value of educating and training financial institution staff members to increase cybersecurity resilience. It underlines the significance of building a strong security culture, educating personnel about potential dangers, and encouraging responsible management of client data. The study also explores the advantages of financial organizations working together and exchanging threat knowledge. It examines industry alliances, information-sharing platforms, and public-private partnerships as crucial methods for group protection against cyber threats. This paper highlighted the significance of artificial intelligence and machine learning in cybersecurity domain. It demonstrates how these technologies improve cybersecurity systems' capabilities by spotting irregularities and potential attacks. It emphasizes the significance of taking a proactive and dynamic strategy to securing client information and maintaining faith in the United States’ financial sectors. Overall, this paper provides a thorough overview of cybersecurity tactics crucial for protecting consumer data and avoiding financial fraud in the financial sectors across the United States. By taking a vigilant, team-based, and technology-driven strategy, financial institutions may strengthen their cyber defenses, protect the data of their clients, and defend the integrity of the financial system.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135181594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Supervised Learning Algorithms for Predicting Customer Churn with Hyperparameter Optimization 基于超参数优化的客户流失预测的监督学习算法
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.04
Manal Loukili
Abstract Churn risk is one of the most worrying issues in the telecommunications industry. The methods for predicting churn have been improved to a great extent by the remarkable developments in the word of artificial intelligence and machine learning. In this context, a comparative study of four machine learning models was conducted. The first phase consists of data preprocessing, followed by feature analysis. In the third phase, feature selection. Then, the data is split into the training set and the test set. During the prediction phase, some of the commonly used predictive models were adopted, namely k-nearest neighbor, logistic regression, random forest, and support vector machine. Furthermore, we used cross-validation on the training set for hyperparameter adjustment and for avoiding model overfitting. Next, the hyperparameters were adjusted to increase the models' performance. The results obtained on the test set were evaluated using the feature weights, confusion matrix, accuracy score, precision, recall, error rate, and f1 score. Finally, it was found that the support vector machine model outperformed the other prediction models with an accuracy equal to 96.92%. Keywords: Churn Prediction, Classification Algorithms, Hyperparameter Optimization, Machine Learning, Telecommunications.
客户流失风险是电信行业最令人担忧的问题之一。由于人工智能和机器学习的显著发展,预测流失的方法在很大程度上得到了改进。在此背景下,对四种机器学习模型进行了比较研究。第一阶段包括数据预处理,然后是特征分析。在第三阶段,特征选择。然后,将数据分成训练集和测试集。在预测阶段,采用了一些常用的预测模型,即k近邻、逻辑回归、随机森林和支持向量机。此外,我们对训练集进行了交叉验证,以进行超参数调整和避免模型过拟合。然后,调整超参数以提高模型的性能。使用特征权重、混淆矩阵、准确率评分、准确率、召回率、错误率和f1评分对测试集上获得的结果进行评估。最后发现,支持向量机模型的预测准确率达到96.92%,优于其他预测模型。关键词:流失预测,分类算法,超参数优化,机器学习,电信。
{"title":"Supervised Learning Algorithms for Predicting Customer Churn with Hyperparameter Optimization","authors":"Manal Loukili","doi":"10.15849/ijasca.221128.04","DOIUrl":"https://doi.org/10.15849/ijasca.221128.04","url":null,"abstract":"Abstract Churn risk is one of the most worrying issues in the telecommunications industry. The methods for predicting churn have been improved to a great extent by the remarkable developments in the word of artificial intelligence and machine learning. In this context, a comparative study of four machine learning models was conducted. The first phase consists of data preprocessing, followed by feature analysis. In the third phase, feature selection. Then, the data is split into the training set and the test set. During the prediction phase, some of the commonly used predictive models were adopted, namely k-nearest neighbor, logistic regression, random forest, and support vector machine. Furthermore, we used cross-validation on the training set for hyperparameter adjustment and for avoiding model overfitting. Next, the hyperparameters were adjusted to increase the models' performance. The results obtained on the test set were evaluated using the feature weights, confusion matrix, accuracy score, precision, recall, error rate, and f1 score. Finally, it was found that the support vector machine model outperformed the other prediction models with an accuracy equal to 96.92%. Keywords: Churn Prediction, Classification Algorithms, Hyperparameter Optimization, Machine Learning, Telecommunications.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44251141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
LoRa-Based Smart Waste Bins Placement using Clustering Method in Rural Areas of Indonesia 基于LoRa的智能垃圾箱在印度尼西亚农村地区的聚类放置
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.08
Aa Zezen Abidin1
Abstract ATP Tennis stands for the “The Association of Tennis Professionals” which is the primary governing body for male tennis players. ATP was formed in Sep 1972 for professional tennis players. A study has been done on tennis players’ datasets to implement supervised machine learning techniques to illustrate match data and make predictions. An appropriate dataset has been chosen, data cleaning has been implemented to extract anomalies, data is visualized via plotting methods in R language and supervised machine learning models applied. The main models applied are linear regression and decision tree. Results and predictions have been extracted from the applied models. In the linear regression model, the correlation is calculated to find the relation between dependent and independent variables, furthermore the results and prediction are extracted from the linear regression model. Also, three hypotheses are applied for multiple linear regression model. The decision tree modeled the best of 3 or best of 5 sets of matches and predicted which set of matches would be considered best. Keywords: Machine Learning, supervised learning, linear regression, decision tree, R language, Tennis, ATP.
摘要ATP Tennis代表“网球职业协会”,它是男子网球运动员的主要管理机构。ATP成立于1972年9月,面向职业网球运动员。对网球运动员的数据集进行了一项研究,以实现监督机器学习技术来说明比赛数据并进行预测。选择了合适的数据集,实现了数据清理以提取异常,通过R语言中的绘图方法对数据进行可视化,并应用了监督机器学习模型。应用的主要模型是线性回归和决策树。已经从应用的模型中提取了结果和预测。在线性回归模型中,计算相关性以找到因变量和自变量之间的关系,并从线性回归模型提取结果和预测。同时,对多元线性回归模型提出了三个假设。决策树对3个最佳或5个最佳的匹配集进行建模,并预测哪个匹配集将被认为是最佳的。关键词:机器学习,监督学习,线性回归,决策树,R语言,网球,ATP。
{"title":"LoRa-Based Smart Waste Bins Placement using Clustering Method in Rural Areas of Indonesia","authors":"Aa Zezen Abidin1","doi":"10.15849/ijasca.221128.08","DOIUrl":"https://doi.org/10.15849/ijasca.221128.08","url":null,"abstract":"Abstract ATP Tennis stands for the “The Association of Tennis Professionals” which is the primary governing body for male tennis players. ATP was formed in Sep 1972 for professional tennis players. A study has been done on tennis players’ datasets to implement supervised machine learning techniques to illustrate match data and make predictions. An appropriate dataset has been chosen, data cleaning has been implemented to extract anomalies, data is visualized via plotting methods in R language and supervised machine learning models applied. The main models applied are linear regression and decision tree. Results and predictions have been extracted from the applied models. In the linear regression model, the correlation is calculated to find the relation between dependent and independent variables, furthermore the results and prediction are extracted from the linear regression model. Also, three hypotheses are applied for multiple linear regression model. The decision tree modeled the best of 3 or best of 5 sets of matches and predicted which set of matches would be considered best. Keywords: Machine Learning, supervised learning, linear regression, decision tree, R language, Tennis, ATP.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44616421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Cloud Computing on the Governmental Units Performance and EParticipation (Empirical Study) 云计算对政府部门绩效和参与度的影响(实证研究)
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.06
Radwan n Al-Dwairi, Wafa’a Jditawi
Abstract Cloud computing is an effective technology for businesses and government sections to enhance their performance. In many modern countries adoption of cloud computing improves its success in reducing the costs with high level of eservices offered to citizens. However, many developing countries are still reluctant to adopt cloud computing and received very little empirical support. This study reviews the literature of this domain and builds a model to examine the main drivers that help decision makers in adoption of cloud technology with e-government sectors. Based on a sample of 326 respondents data analyzed using the Structural Equation Modelling though Smart Partial Least Squares technique. The study revealed that mobility, cost, backup & disaster recovery, scalability & flexibility are the key drivers that significantly affect employees’ intention to adopt cloud computing for governmental units which in turn positively influence the effectiveness of e-participation Keywords: Cloud computing, E-government, E-participation, Scalability, Mobility, Backup & Disaster recovery.
摘要云计算是企业和政府部门提高绩效的有效技术。在许多现代国家,云计算的采用通过向公民提供高水平的电子服务来提高其在降低成本方面的成功率。然而,许多发展中国家仍然不愿采用云计算,也很少得到实证支持。本研究回顾了该领域的文献,并建立了一个模型来研究帮助决策者在电子政务部门采用云技术的主要驱动因素。基于326名受访者的样本,通过智能偏最小二乘技术使用结构方程建模分析数据。研究表明,移动性、成本、备份和灾难恢复、可扩展性和灵活性是显著影响员工在政府部门采用云计算意愿的关键驱动因素,而这反过来又对电子参与的有效性产生了积极影响关键词:云计算、电子政务、电子参与、可扩展、移动性、备份和灾后恢复。
{"title":"The Role of Cloud Computing on the Governmental Units Performance and EParticipation (Empirical Study)","authors":"Radwan n Al-Dwairi, Wafa’a Jditawi","doi":"10.15849/ijasca.221128.06","DOIUrl":"https://doi.org/10.15849/ijasca.221128.06","url":null,"abstract":"Abstract Cloud computing is an effective technology for businesses and government sections to enhance their performance. In many modern countries adoption of cloud computing improves its success in reducing the costs with high level of eservices offered to citizens. However, many developing countries are still reluctant to adopt cloud computing and received very little empirical support. This study reviews the literature of this domain and builds a model to examine the main drivers that help decision makers in adoption of cloud technology with e-government sectors. Based on a sample of 326 respondents data analyzed using the Structural Equation Modelling though Smart Partial Least Squares technique. The study revealed that mobility, cost, backup & disaster recovery, scalability & flexibility are the key drivers that significantly affect employees’ intention to adopt cloud computing for governmental units which in turn positively influence the effectiveness of e-participation Keywords: Cloud computing, E-government, E-participation, Scalability, Mobility, Backup & Disaster recovery.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49630477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable Development: A Semantics-aware Trends for Movies Recommendation System using Modern NLP 可持续发展:现代NLP电影推荐系统的语义化趋势
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.11
Shadi AlZu’b, A. Zraiqat, Samar Hendawi
Abstract Recommendation systems are an important feature in the proposed virtual life, where users are often stuck with choices most of the time and need help to be able to find what they are looking for. In this work, contentbased techniques have been employed in the proposed recommender system in two ways, a deep review for content and features contents such as (cast, crew, keywords, and genres) has been conducted. A preprocessing stage using TF-IDF and CountVectorizer methods have been employed efficiently to prepare the dataset for any similarity measurements. Cosine similarity algorithm has been employed as well with and without sigmoid and linear kernals. The achieved result proves that similarities between movies using TF-IDF with - Cosine similarity (sigmoid kernel) overcomes the TF-IDF with - Cosine similarity (linear_kernel) and Cosine similarity with CountVectorizer in collaborative filtering. The accuracy values of different machine learning models are validated with K-fold Cross Validator techniques. The performance evaluation has been measured using ROOT Mean Square Error and Mean Absolute Error. Five Machine learning algorithms (NormalPredictor, SVD, KNNBasic (with k=20 and K=10), KNNBasic (with sim_options), and NMF (in several rating scales)). Accuracies are finally been validated with 3 folds from each validator. The best achieved RMSE and MAE scores are using SVD (RMSE = 90%) and (MAE = 69%), followed by KNNBasic (with sim_options, K= 20), NMF, KNNBasic (K=20), KNNBasic (K=10), ending with KNNBasic(sim_options, K= 10). Keywords: Recommendation System, Sustainable Development, Artificial Intelligence, Collaborative Filtering, Content-Based, Cosine Similarity, Movies Recommendation, NLP, Machine Learning Application.
摘要推荐系统是所提出的虚拟生活中的一个重要功能,在虚拟生活中,用户通常在大多数时间都被选择所困扰,需要帮助才能找到他们想要的东西。在这项工作中,基于内容的技术以两种方式被应用于所提出的推荐系统中,对内容和特色内容(如演员、剧组、关键词和流派)进行了深入的审查。使用TF-IDF和CountVectorizer方法的预处理阶段已被有效地用于为任何相似性测量准备数据集。余弦相似算法也被用于有和没有S形核和线性核的情况。结果证明,在协同滤波中,使用具有余弦相似性的TF-IDF(sigmoid核)的电影之间的相似性克服了具有余弦相似度的TF-IDF(linear_kernel)和使用CountVectorizer的余弦相似性。使用K-fold交叉验证器技术验证了不同机器学习模型的准确性值。使用ROOT均方误差和平均绝对误差对性能评估进行了测量。五种机器学习算法(NormalPredictor、SVD、KNNBasic(k=20和k=10)、KNNBBasic(带sim_options)和NMF(在几个评级量表中))。准确度最终通过每个验证器的3次折叠进行验证。RMSE和MAE得分最好的是使用SVD(RMSE=90%)和(MAE=69%),其次是KNNBasic(具有sim_options,K=20)、NMF、KNNBasic(K=20。关键词:推荐系统,可持续发展,人工智能,协同过滤,基于内容,余弦相似度,电影推荐,NLP,机器学习应用。
{"title":"Sustainable Development: A Semantics-aware Trends for Movies Recommendation System using Modern NLP","authors":"Shadi AlZu’b, A. Zraiqat, Samar Hendawi","doi":"10.15849/ijasca.221128.11","DOIUrl":"https://doi.org/10.15849/ijasca.221128.11","url":null,"abstract":"Abstract Recommendation systems are an important feature in the proposed virtual life, where users are often stuck with choices most of the time and need help to be able to find what they are looking for. In this work, contentbased techniques have been employed in the proposed recommender system in two ways, a deep review for content and features contents such as (cast, crew, keywords, and genres) has been conducted. A preprocessing stage using TF-IDF and CountVectorizer methods have been employed efficiently to prepare the dataset for any similarity measurements. Cosine similarity algorithm has been employed as well with and without sigmoid and linear kernals. The achieved result proves that similarities between movies using TF-IDF with - Cosine similarity (sigmoid kernel) overcomes the TF-IDF with - Cosine similarity (linear_kernel) and Cosine similarity with CountVectorizer in collaborative filtering. The accuracy values of different machine learning models are validated with K-fold Cross Validator techniques. The performance evaluation has been measured using ROOT Mean Square Error and Mean Absolute Error. Five Machine learning algorithms (NormalPredictor, SVD, KNNBasic (with k=20 and K=10), KNNBasic (with sim_options), and NMF (in several rating scales)). Accuracies are finally been validated with 3 folds from each validator. The best achieved RMSE and MAE scores are using SVD (RMSE = 90%) and (MAE = 69%), followed by KNNBasic (with sim_options, K= 20), NMF, KNNBasic (K=20), KNNBasic (K=10), ending with KNNBasic(sim_options, K= 10). Keywords: Recommendation System, Sustainable Development, Artificial Intelligence, Collaborative Filtering, Content-Based, Cosine Similarity, Movies Recommendation, NLP, Machine Learning Application.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44348276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Framework to Mine XML Format Event Logs 挖掘XML格式事件日志的框架
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.07
A. Sheng, J. Jamil, I. Shaharanee
Abstract A lot of applications including event logs and web pages uses XML format for utilizing, keeping, transferring and displaying data. Thus, volume of data expressed in XML has increase rapidly. Numerous research has been done to extract and mine information from XML documents. Mining XML documents allows an understanding to the architecture and composition of XML documents. Generally, frequent subtree mining is one of the methods to mine XML documents. Frequent subtree mining searches the relation between data in a tree structured database. Due to the architecture and the composition of XML format, normal data mining and statistical analysis difficult to be performed. This paper suggests a framework that flattens and converts tree structured data into structured data, while maintaining the information of architecture and the composition of XML format. To gain more information from event logs, converting into structured data from semistructured format grants more ability to perform variety data mining techniques and statistical test. Keywords: Flatten Sequential Structure Model, XML Format Event Logs, Data Mining, Statistical Analysis.
摘要包括事件日志和网页在内的许多应用程序都使用XML格式来利用、保存、传输和显示数据。因此,用XML表示的数据量迅速增加。已经进行了大量的研究来从XML文档中提取和挖掘信息。挖掘XML文档可以理解XML文档的体系结构和组成。通常,频繁子树挖掘是挖掘XML文档的方法之一。频繁的子树挖掘在树结构数据库中搜索数据之间的关系。由于XML格式的体系结构和组成,很难进行正常的数据挖掘和统计分析。本文提出了一种将树结构数据扁平化并转换为结构化数据的框架,同时保留了体系结构信息和XML格式的组成。为了从事件日志中获得更多信息,将半结构化格式转换为结构化数据可以增强执行各种数据挖掘技术和统计测试的能力。关键词:展平序列结构模型,XML格式事件日志,数据挖掘,统计分析。
{"title":"Framework to Mine XML Format Event Logs","authors":"A. Sheng, J. Jamil, I. Shaharanee","doi":"10.15849/ijasca.221128.07","DOIUrl":"https://doi.org/10.15849/ijasca.221128.07","url":null,"abstract":"Abstract A lot of applications including event logs and web pages uses XML format for utilizing, keeping, transferring and displaying data. Thus, volume of data expressed in XML has increase rapidly. Numerous research has been done to extract and mine information from XML documents. Mining XML documents allows an understanding to the architecture and composition of XML documents. Generally, frequent subtree mining is one of the methods to mine XML documents. Frequent subtree mining searches the relation between data in a tree structured database. Due to the architecture and the composition of XML format, normal data mining and statistical analysis difficult to be performed. This paper suggests a framework that flattens and converts tree structured data into structured data, while maintaining the information of architecture and the composition of XML format. To gain more information from event logs, converting into structured data from semistructured format grants more ability to perform variety data mining techniques and statistical test. Keywords: Flatten Sequential Structure Model, XML Format Event Logs, Data Mining, Statistical Analysis.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46043148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Readiness of Higher Education Institutions for E-learning Case of Jordanian Universities 高等教育机构对电子学习的准备情况——以约旦大学为例
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.12
M. AlTarawneh, M. Hassan
Abstract This study aimed to assess Readiness of Jordanian Universities for E-learning. For the purpose of the study a questionnaire consisting of (42) items was developed and divided into five domains, namely: organizational readiness, ICT tools, technical resources, faculty members, and students. The statistical analyses have been done using descriptive and interferential analytical approaches by the Statistical Package for Social Sciences. The results indicated that Readiness of Jordanian Universities for e-learning was medium. On one hand, the findings indicate that there were statistically significant differences at the significance level (α≤0.05) in individual responses to the study sample attributed to the type of faculty variable in favor of sciences faculties. On other hand there were no statistically significant differences at the significance level (α≤0.05) in individual responses to the study sample attributed to variable of faculty members by the academic rank. Keywords: E-learning, Jordanian Universities.
摘要本研究旨在评估约旦大学对电子学习的准备情况。为了研究的目的,我们编制了一份由42个项目组成的问卷,并将其分为五个领域,即:组织准备程度、ICT工具、技术资源、教师和学生。统计分析是通过社会科学统计包使用描述性和干涉性分析方法进行的。结果表明,约旦大学对网络学习的准备程度为中等。一方面,研究结果表明,由于院系变量的类型倾向于理科院系,个体对研究样本的反应在显著性水平上存在统计学差异(α≤0.05)。另一方面,教师学术等级对研究样本的个体反应在显著性水平上差异无统计学意义(α≤0.05)。关键词:电子学习;约旦大学;
{"title":"Readiness of Higher Education Institutions for E-learning Case of Jordanian Universities","authors":"M. AlTarawneh, M. Hassan","doi":"10.15849/ijasca.221128.12","DOIUrl":"https://doi.org/10.15849/ijasca.221128.12","url":null,"abstract":"Abstract This study aimed to assess Readiness of Jordanian Universities for E-learning. For the purpose of the study a questionnaire consisting of (42) items was developed and divided into five domains, namely: organizational readiness, ICT tools, technical resources, faculty members, and students. The statistical analyses have been done using descriptive and interferential analytical approaches by the Statistical Package for Social Sciences. The results indicated that Readiness of Jordanian Universities for e-learning was medium. On one hand, the findings indicate that there were statistically significant differences at the significance level (α≤0.05) in individual responses to the study sample attributed to the type of faculty variable in favor of sciences faculties. On other hand there were no statistically significant differences at the significance level (α≤0.05) in individual responses to the study sample attributed to variable of faculty members by the academic rank. Keywords: E-learning, Jordanian Universities.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47630394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improvement on I-Devices Using L-GCNN Classifier for Smart Mosque Simulation 基于L-GCNN分类器的I-Devices智能清真寺仿真改进
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.10
J. Fadila, M. Hariyadi, Ajib Hanani, Johan Ericka W.P., Okta Aziz
Abstract I-Device (Intelligent Devices) is one of the fastest growing devices since the beginning of this decade. Some of its major problems are accuracy and performance. This study aims to present an improvement in the performance of those devices. We used a simulation application for I-Devices to conduct the experiment. The simulation was built based on classifying results using Logarithmic learning for Generalized Classifier Neural Networks (L-GCNN). The output was a simulation that will be implemented on a smart mosque system. L-GCNN itself was a modification method of GCNN to improve the processing speed and have high accuracy as a classifier method. This method will take a role when the given parameters meet the conditions of the devices to take an action. To simplify the understanding of the simulation models, we used a game application to make an interactive simulation for our project in an environment that represents the real-world condition of the mosque. The result of this study shows that the devices could make a decision by themselves accurately. Additionally, using LGCNN models, we could reduce the processing iteration compared to other models. The experiment results show that LGCNN has an average value of 90% in accuracy, precision, recall, and f1. Keywords: Automation, Classifier, L-GCNN, Neural Network, Decision.
I-Device(智能设备)是本世纪初以来发展最快的设备之一。它的一些主要问题是准确性和性能。本研究旨在改善这些设备的性能。我们使用I-Devices的模拟应用程序进行实验。基于对数学习的广义分类器神经网络(L-GCNN)分类结果建立仿真模型。输出是将在智能清真寺系统上实施的模拟。作为一种分类器方法,L-GCNN本身是对GCNN的一种改进方法,提高了处理速度,具有较高的准确率。此方法将在给定参数满足设备条件时采取作用采取行动。为了简化对仿真模型的理解,我们使用一个游戏应用程序在一个代表清真寺真实情况的环境中为我们的项目制作了一个交互式仿真。研究结果表明,该装置能够准确地自行做出决策。此外,与其他模型相比,使用LGCNN模型可以减少处理迭代。实验结果表明,LGCNN在准确率、精密度、召回率和f1上的平均值为90%。关键词:自动化,分类器,L-GCNN,神经网络,决策。
{"title":"Improvement on I-Devices Using L-GCNN Classifier for Smart Mosque Simulation","authors":"J. Fadila, M. Hariyadi, Ajib Hanani, Johan Ericka W.P., Okta Aziz","doi":"10.15849/ijasca.221128.10","DOIUrl":"https://doi.org/10.15849/ijasca.221128.10","url":null,"abstract":"Abstract I-Device (Intelligent Devices) is one of the fastest growing devices since the beginning of this decade. Some of its major problems are accuracy and performance. This study aims to present an improvement in the performance of those devices. We used a simulation application for I-Devices to conduct the experiment. The simulation was built based on classifying results using Logarithmic learning for Generalized Classifier Neural Networks (L-GCNN). The output was a simulation that will be implemented on a smart mosque system. L-GCNN itself was a modification method of GCNN to improve the processing speed and have high accuracy as a classifier method. This method will take a role when the given parameters meet the conditions of the devices to take an action. To simplify the understanding of the simulation models, we used a game application to make an interactive simulation for our project in an environment that represents the real-world condition of the mosque. The result of this study shows that the devices could make a decision by themselves accurately. Additionally, using LGCNN models, we could reduce the processing iteration compared to other models. The experiment results show that LGCNN has an average value of 90% in accuracy, precision, recall, and f1. Keywords: Automation, Classifier, L-GCNN, Neural Network, Decision.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43581682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilevel Thresholding Image Segmentation Based-Logarithm Decreasing Inertia Weight Particle Swarm Optimization 基于对数递减惯性权重粒子群优化的多级阈值图像分割
Q3 Computer Science Pub Date : 2022-11-28 DOI: 10.15849/ijasca.221128.05
Murinto Prahara, E.I.H. Ujianto
Abstract The image segmentatation technique that is often used is thresholding. Image segmentation is a process of dividing the image into different regions according to their similar characteristics. This research proposes a multilevel thresholding algorithm using modified particle swarm optimization to solve a segmentation problem. The threshold optimal values are determined by maximizing Otsu’s objective function using optimization technique namely particle swarm optimization based on the logarithmic decreasing inertia weight (LogDIWPSO). The proposed method reduces the computational time to find the optimum thresholds of multilevel thresholding which evaluated on several grayscale images. A detailed comparison analysis with other multilevel thresholding based techniques namely particle swarm optimization (PSO), iterative particle swarm optimization (IPSO), and genetic algorithms (GA), From the experiments, Modified particle swarm optimization (MoPSO) produces better performance compared to the other methods in terms of fitness value, robustness and convergence. Therefore, it can be concluded that MoPSO is a good approach in finding the optimal threshold value. Keywords: grayscale image, inertia weight, image segmentation, particle swarm optimization.
摘要阈值分割是常用的图像分割技术。图像分割是根据图像的相似特征将图像划分为不同区域的过程。提出了一种基于改进粒子群算法的多级阈值分割算法。采用基于对数递减惯性权值(LogDIWPSO)的粒子群优化技术,通过最大化Otsu目标函数来确定阈值最优值。通过对多幅灰度图像进行评估,减少了寻找最佳阈值的计算时间。通过与粒子群优化(PSO)、迭代粒子群优化(IPSO)和遗传算法(GA)等基于多水平阈值的方法进行比较分析,实验结果表明,改进粒子群优化(MoPSO)在适应度值、鲁棒性和收敛性方面均优于其他方法。因此,MoPSO是一种寻找最优阈值的好方法。关键词:灰度图像,惯性权重,图像分割,粒子群优化。
{"title":"Multilevel Thresholding Image Segmentation Based-Logarithm Decreasing Inertia Weight Particle Swarm Optimization","authors":"Murinto Prahara, E.I.H. Ujianto","doi":"10.15849/ijasca.221128.05","DOIUrl":"https://doi.org/10.15849/ijasca.221128.05","url":null,"abstract":"Abstract The image segmentatation technique that is often used is thresholding. Image segmentation is a process of dividing the image into different regions according to their similar characteristics. This research proposes a multilevel thresholding algorithm using modified particle swarm optimization to solve a segmentation problem. The threshold optimal values are determined by maximizing Otsu’s objective function using optimization technique namely particle swarm optimization based on the logarithmic decreasing inertia weight (LogDIWPSO). The proposed method reduces the computational time to find the optimum thresholds of multilevel thresholding which evaluated on several grayscale images. A detailed comparison analysis with other multilevel thresholding based techniques namely particle swarm optimization (PSO), iterative particle swarm optimization (IPSO), and genetic algorithms (GA), From the experiments, Modified particle swarm optimization (MoPSO) produces better performance compared to the other methods in terms of fitness value, robustness and convergence. Therefore, it can be concluded that MoPSO is a good approach in finding the optimal threshold value. Keywords: grayscale image, inertia weight, image segmentation, particle swarm optimization.","PeriodicalId":38638,"journal":{"name":"International Journal of Advances in Soft Computing and its Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43154004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Advances in Soft Computing and its Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1