Pub Date : 2023-01-01DOI: 10.1504/ijict.2023.134250
Hui Sun, Li Fang
{"title":"A deep mining method of enterprise financial risk data based on improved support vector machine","authors":"Hui Sun, Li Fang","doi":"10.1504/ijict.2023.134250","DOIUrl":"https://doi.org/10.1504/ijict.2023.134250","url":null,"abstract":"","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136367017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijict.2023.134249
Hongqin Zhu
{"title":"An efficient retrieval of relational database information based on knowledge graph","authors":"Hongqin Zhu","doi":"10.1504/ijict.2023.134249","DOIUrl":"https://doi.org/10.1504/ijict.2023.134249","url":null,"abstract":"","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"68 1","pages":"201-214"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136371715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijict.2023.127675
Wanshu Luo
In order to overcome the low response speed and security problems of traditional music teaching platform, a new online distance music teaching platform based on Internet Plus is proposed. Based on Internet Plus, online distance music teaching server and online distance music teaching client is designed to complete the hardware design of the platform. Through the construction of students' personalised learning evaluation model and online distance music teaching program, the software design of the platform is completed. Combined with the platform's hardware and software, the design of online distance music teaching platform is realised. The experimental results show that online music teaching platform based on Internet Plus can shorten response time, and the response time is only 290 ms, which greatly improves the security of the platform.
{"title":"Online distance music teaching platform based on Internet Plus","authors":"Wanshu Luo","doi":"10.1504/ijict.2023.127675","DOIUrl":"https://doi.org/10.1504/ijict.2023.127675","url":null,"abstract":"In order to overcome the low response speed and security problems of traditional music teaching platform, a new online distance music teaching platform based on Internet Plus is proposed. Based on Internet Plus, online distance music teaching server and online distance music teaching client is designed to complete the hardware design of the platform. Through the construction of students' personalised learning evaluation model and online distance music teaching program, the software design of the platform is completed. Combined with the platform's hardware and software, the design of online distance music teaching platform is realised. The experimental results show that online music teaching platform based on Internet Plus can shorten response time, and the response time is only 290 ms, which greatly improves the security of the platform.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135007637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-06DOI: 10.51548/joctec-2022-012
Preeti Srinivasan, Anne Oeldrof-Hirsch, G. H. Joergensen
Individuals get much of their news and information through social media. Thus, it has become crucial to evaluate how they are paying attention to and processing news content in this saturated space. The present study investigates users’ visual engagement with news posts on Facebook using cognitive load theory of attention. An eye-tracking device was used to track visual attention of N = 152 participants. Following a 3 x 2 between-subjects factorial design, we manipulated intrinsic cognitive load by varying the story topic (either health or science) and the extraneous load by varying the presentation type (text only, video only, or video with text). Cognitive load does impact attention, such that those who viewed the video with text story (high cognitive load) exhibited higher visual attention to the content. We conclude that content higher in complexity elicits more attention compared to less complex content on Facebook.
{"title":"\"Attention! It’s the News.” Cognitive Load and News Posts on Facebook: An Eye-tracking Study","authors":"Preeti Srinivasan, Anne Oeldrof-Hirsch, G. H. Joergensen","doi":"10.51548/joctec-2022-012","DOIUrl":"https://doi.org/10.51548/joctec-2022-012","url":null,"abstract":"Individuals get much of their news and information through social media. Thus, it has become crucial to evaluate how they are paying attention to and processing news content in this saturated space. The present study investigates users’ visual engagement with news posts on Facebook using cognitive load theory of attention. An eye-tracking device was used to track visual attention of N = 152 participants. Following a 3 x 2 between-subjects factorial design, we manipulated intrinsic cognitive load by varying the story topic (either health or science) and the extraneous load by varying the presentation type (text only, video only, or video with text). Cognitive load does impact attention, such that those who viewed the video with text story (high cognitive load) exhibited higher visual attention to the content. We conclude that content higher in complexity elicits more attention compared to less complex content on Facebook.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"326 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79719283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-06DOI: 10.51548/joctec-2022-011
Mu Wu, Steve Bien-Aimé
This study surveyed college students to gauge whether coolness influences intention to consume news on four social networking platforms: Facebook, Twitter, Instagram, and Snapchat. Results indicate that news consumption on Twitter and on Facebook are generally rated as more useful and easier to use than on Instagram and Snapchat. However, consuming news on Twitter and Snapchat is perceived as the coolest overall, whereas news use on Facebook is rated as the least cool across all three coolness sub-dimensions. Because coolness, with attractiveness and subculture being two appeals that had unique contribution, explains a significant amount of variance in individuals’ behavioural intentions to consume news on each of the platforms, this study suggests that, in addition to utilitarian aspects, coolness motivates news consumption on social networking sites and should be incorporated into future studies on technology adoption.
{"title":"Drab to Fab: Examining the Effects of Perceived Coolness on News Consumption on Social Media","authors":"Mu Wu, Steve Bien-Aimé","doi":"10.51548/joctec-2022-011","DOIUrl":"https://doi.org/10.51548/joctec-2022-011","url":null,"abstract":"This study surveyed college students to gauge whether coolness influences intention to consume news on four social networking platforms: Facebook, Twitter, Instagram, and Snapchat. Results indicate that news consumption on Twitter and on Facebook are generally rated as more useful and easier to use than on Instagram and Snapchat. However, consuming news on Twitter and Snapchat is perceived as the coolest overall, whereas news use on Facebook is rated as the least cool across all three coolness sub-dimensions. Because coolness, with attractiveness and subculture being two appeals that had unique contribution, explains a significant amount of variance in individuals’ behavioural intentions to consume news on each of the platforms, this study suggests that, in addition to utilitarian aspects, coolness motivates news consumption on social networking sites and should be incorporated into future studies on technology adoption.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72892722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-06DOI: 10.51548/joctec-2022-013
Yoon‐Joo Lee, Mina Park, David E Silva, J. Joo
Virtual reality advertising campaigns allow consumers to interact with companies in a novel way. This study examined how individual differences in power usage (confidence using technology in innovative and functional ways) and the trust-schema (trustworthiness perception of a company) interact to affect consumers’ experience of control, attitudinal outcomes, and behavioral intentions (sharing their VR experience). The findings revealed that power users are more likely to recommend VR experiences, have a positive attitude toward VR experiences, and share their experiences, than non-power users. However, these effects were moderated by consumers’ trust-schema levels. Power users were less sensitive to the effect of trust-schema than non-power users. The implications of the findings and future studies on the emerging metaverse were further discussed.
{"title":"Power Users’ Branded Virtual Reality Experience: A Preliminary Study","authors":"Yoon‐Joo Lee, Mina Park, David E Silva, J. Joo","doi":"10.51548/joctec-2022-013","DOIUrl":"https://doi.org/10.51548/joctec-2022-013","url":null,"abstract":"Virtual reality advertising campaigns allow consumers to interact with companies in a novel way. This study examined how individual differences in power usage (confidence using technology in innovative and functional ways) and the trust-schema (trustworthiness perception of a company) interact to affect consumers’ experience of control, attitudinal outcomes, and behavioral intentions (sharing their VR experience). The findings revealed that power users are more likely to recommend VR experiences, have a positive attitude toward VR experiences, and share their experiences, than non-power users. However, these effects were moderated by consumers’ trust-schema levels. Power users were less sensitive to the effect of trust-schema than non-power users. The implications of the findings and future studies on the emerging metaverse were further discussed.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90517274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-06DOI: 10.51548/joctec-2022-014
Juan Liu
Studies on China’s social credit system (SCS) remain mostly theoretical and there is limited empirical research examining the surveillance effect under China’s SCS. This study investigates whether exposure to news framing of SCS affects individuals’ attitude, political online behavior, and opinion expression. Findings suggest exposure to negative framing of SCS chills participants’ intentions to engage in online political activities. Individuals who possess low levels of willingness to self-censor and are exposed to negative framing are more susceptible to the chilling effects of SCS, and thereby become cautious to share opinions, which in turn restricts their freedom of expression. Qualitative evidence reveals while most participants were supportive of SCS, yet still concerned about its privacy invasion and speech restriction issues. Implications for SCS as a means of surveillance are discussed.
{"title":"Framing Social Credit System: An Experimental Investigation of Social Credit System’s Chilling Effect on Freedom of Expression","authors":"Juan Liu","doi":"10.51548/joctec-2022-014","DOIUrl":"https://doi.org/10.51548/joctec-2022-014","url":null,"abstract":"Studies on China’s social credit system (SCS) remain mostly theoretical and there is limited empirical research examining the surveillance effect under China’s SCS. This study investigates whether exposure to news framing of SCS affects individuals’ attitude, political online behavior, and opinion expression. Findings suggest exposure to negative framing of SCS chills participants’ intentions to engage in online political activities. Individuals who possess low levels of willingness to self-censor and are exposed to negative framing are more susceptible to the chilling effects of SCS, and thereby become cautious to share opinions, which in turn restricts their freedom of expression. Qualitative evidence reveals while most participants were supportive of SCS, yet still concerned about its privacy invasion and speech restriction issues. Implications for SCS as a means of surveillance are discussed.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80306560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.32890/jict2022.21.4.3
A. Abu-Shareha
This paper developed a multi-criteria decision-making approach using the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to benchmark the regression alternatives. Regression is used in diverse fields to predict consumer behavior, analyze business profitability, assess risk, analyze automobile engine performance, predict biological system behavior, and analyze weather data. Each of these applications has its own set of concerns, resulting in various metrics utilizations or those of similar measures but with diverse preferences. Multi-criteria decision-making analyzes, compares, and ranks a set of alternatives utilizing mathematical and logical processes with a complicated and contradictory set of criteria. The developed approach established the weights, which were the core of the evaluation process, to various values to mimic and address the regression’s utilization in multiple applications with different concerns and using distinct datasets. The alternative judgment identified positive and negative ideal alternatives in the alternative space. The compared regression alternatives were scored and ranked based on their distance from these alternatives. The results showed that different preferences led to varying algorithm rankings, but top-ranked algorithms were distinguished using a specific dataset. Following that, using three datasets, namely Combined Cycle Power Plant, Real Estate, and Concrete, Voting using multiple classifiers (k-means-based classifiers) was the top-ranked in the Combined Cycle Power Plant and Real Estate datasets. In contrast, Decision Stump was the top-ranked in the Concrete dataset.
{"title":"TOPSIS-based Regression Algorithms Evaluation","authors":"A. Abu-Shareha","doi":"10.32890/jict2022.21.4.3","DOIUrl":"https://doi.org/10.32890/jict2022.21.4.3","url":null,"abstract":"This paper developed a multi-criteria decision-making approach using the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) to benchmark the regression alternatives. Regression is used in diverse fields to predict consumer behavior, analyze business profitability, assess risk, analyze automobile engine performance, predict biological system behavior, and analyze weather data. Each of these applications has its own set of concerns, resulting in various metrics utilizations or those of similar measures but with diverse preferences. Multi-criteria decision-making analyzes, compares, and ranks a set of alternatives utilizing mathematical and logical processes with a complicated and contradictory set of criteria. The developed approach established the weights, which were the core of the evaluation process, to various values to mimic and address the regression’s utilization in multiple applications with different concerns and using distinct datasets. The alternative judgment identified positive and negative ideal alternatives in the alternative space. The compared regression alternatives were scored and ranked based on their distance from these alternatives. The results showed that different preferences led to varying algorithm rankings, but top-ranked algorithms were distinguished using a specific dataset. Following that, using three datasets, namely Combined Cycle Power Plant, Real Estate, and Concrete, Voting using multiple classifiers (k-means-based classifiers) was the top-ranked in the Combined Cycle Power Plant and Real Estate datasets. In contrast, Decision Stump was the top-ranked in the Concrete dataset.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78818417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.32890/jict2022.21.4.6
Festus O Oliha
Performance is a critical attribute in evaluating the quality and dependability of service-oriented systems dependent on fault-tolerantarchitectures. Fault-tolerant architectures have been implemented with redundant techniques to ensure fault-tolerant services. However, replica-related overhead burdens fault-tolerant techniques with associated performance degradation in service delivery, and this consequentially discourages service consumers with discredits for service providers. In this paper, a fault-tolerant approach thatadopts replication and diversity was employed on agent-oriented coordination toward guaranteeing the performance of the proposedfault-tolerant architecture solution under a large-scale service request load. In addition, the resultant architecture solution was simulated with Apache JMeter for performance evaluation considering the performability in the absence and presence of a fault load. The simulation experiments and results revealed the architecture’s efficiency in fault tolerance via the timely coordination of logicaland replica-related activities by software agents. Noteworthily, the continued service availability and performance were guaranteed for the architecture solution with a significant rate of regularity in the absence and presence of a replica-related fault. Therefore, this study’s performance evaluation methods and results could serve as a veritable milestone for building fault-tolerant service systems with appreciable performability and contribute to the service-oriented fields where performance is inevitable.
{"title":"Guaranteeing Performance in a Fault Tolerant Architecture Solution using Software Agent’s Coordination","authors":"Festus O Oliha","doi":"10.32890/jict2022.21.4.6","DOIUrl":"https://doi.org/10.32890/jict2022.21.4.6","url":null,"abstract":"Performance is a critical attribute in evaluating the quality and dependability of service-oriented systems dependent on fault-tolerantarchitectures. Fault-tolerant architectures have been implemented with redundant techniques to ensure fault-tolerant services. However, replica-related overhead burdens fault-tolerant techniques with associated performance degradation in service delivery, and this consequentially discourages service consumers with discredits for service providers. In this paper, a fault-tolerant approach thatadopts replication and diversity was employed on agent-oriented coordination toward guaranteeing the performance of the proposedfault-tolerant architecture solution under a large-scale service request load. In addition, the resultant architecture solution was simulated with Apache JMeter for performance evaluation considering the performability in the absence and presence of a fault load. The simulation experiments and results revealed the architecture’s efficiency in fault tolerance via the timely coordination of logicaland replica-related activities by software agents. Noteworthily, the continued service availability and performance were guaranteed for the architecture solution with a significant rate of regularity in the absence and presence of a replica-related fault. Therefore, this study’s performance evaluation methods and results could serve as a veritable milestone for building fault-tolerant service systems with appreciable performability and contribute to the service-oriented fields where performance is inevitable.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87698547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-19DOI: 10.32890/jict2022.21.4.7
Vasudha Bahl, Anoop Kumar
Wireless sensor networks (WSN) have a wide range of applications. Therefore, developing an energy-efficient methodology forestimating cluster heads (CHs) to ensure efficient data transmission has become highly relevant. Meta-heuristic strategies for optimal CHs are the current investigation inclination. As the network grows, the conventional optimization strategies emerge unsuccessful, and the outcomes of hybridizing bring performance enhancement in WSN. A Probabilistic Multi-Tiered Grey Wolf Optimizer (GWO) wasimplemented in this study on an upgraded Grey Wolf Optimizer for optimum CH selection. It used fitness value to strengthen GWO’ssearch for the best solution, resulting in even dispersal of CHs. Communication routes were updated based on routes to the CHs andbase station to lessen energy consumption by a layered-based routing scheme. GWO’s governance enhanced the network’s ability. The distributed nodes’ geographical territory was categorized into four tiers. CH was chosen grounded on the objective value that required fewer difficult control factors than existing techniques. Simulations showed that the suggested technique could extend the network’s stability time by (31.5 %) compared to hetDEEC-3, L-DDRI, Novel-LEACH-POS, DBSCDS-GWO, and P-SEP.
{"title":"Probabilistic Multi-Tiered Grey Wolf Optimizer-Based Routing for Sustainable Sensor Networks","authors":"Vasudha Bahl, Anoop Kumar","doi":"10.32890/jict2022.21.4.7","DOIUrl":"https://doi.org/10.32890/jict2022.21.4.7","url":null,"abstract":"Wireless sensor networks (WSN) have a wide range of applications. Therefore, developing an energy-efficient methodology forestimating cluster heads (CHs) to ensure efficient data transmission has become highly relevant. Meta-heuristic strategies for optimal CHs are the current investigation inclination. As the network grows, the conventional optimization strategies emerge unsuccessful, and the outcomes of hybridizing bring performance enhancement in WSN. A Probabilistic Multi-Tiered Grey Wolf Optimizer (GWO) wasimplemented in this study on an upgraded Grey Wolf Optimizer for optimum CH selection. It used fitness value to strengthen GWO’ssearch for the best solution, resulting in even dispersal of CHs. Communication routes were updated based on routes to the CHs andbase station to lessen energy consumption by a layered-based routing scheme. GWO’s governance enhanced the network’s ability. The distributed nodes’ geographical territory was categorized into four tiers. CH was chosen grounded on the objective value that required fewer difficult control factors than existing techniques. Simulations showed that the suggested technique could extend the network’s stability time by (31.5 %) compared to hetDEEC-3, L-DDRI, Novel-LEACH-POS, DBSCDS-GWO, and P-SEP.","PeriodicalId":39396,"journal":{"name":"International Journal of Information and Communication Technology","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79603282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}