首页 > 最新文献

Journal of Computer Science最新文献

英文 中文
Leveraging COBIT 2019 to Measure the Accounting Software Implementation in High Schools for Better Transparency 利用 COBIT 2019 衡量高中会计软件实施情况以提高透明度
Pub Date : 2024-02-01 DOI: 10.3844/jcssp.2024.218.228
Jennifer Felicia, J. Andry, Fransiskus Adikara, D. Y. Bernanda, Kevin Christianto
: Technology is a tool that is always used in every human life today. Technology cannot just be used; technology must also be studied to find out whether it has played a good role or not. The research was conducted on business processes in secondary schools where the importance of technology is often underestimated, even though technology in schools also has an important role. In particular, technology analysis in the world of education will usually analyze applications or facilities related to the learning process. The aim of this research is to analyze accounting applications that help business processes in running school continuity, which is ultimately important for business continuity. implementation of accounting applications will help schools determine the increased level of capability and transparency. The analysis was carried out using the COBIT 2019 framework, where this framework has been updated with additional design factor analysis so that the audit will be carried out based on school priorities, focus, and strategy. In this research, data collection was carried out by means of observation and interviews with foundation administrators and school directors who had power in the school and had previously given research permission to the school concerned. The results obtained are a low level of ability with a high expected level of ability, namely at level 5, based on the design factors that have been carried out. Several recommendations are provided to help secondary schools achieve expected levels in each domain.
:技术是当今人类生活中经常使用的工具。技术不能只是被使用,还必须对技术进行研究,以了解它是否发挥了良好的作用。研究对象是中学的业务流程,尽管技术在学校中也发挥着重要作用,但技术的重要性往往被低估。特别是,教育界的技术分析通常会分析与学习过程有关的应用或设施。本研究的目的是分析有助于学校持续运行业务流程的会计应用程序,这最终对业务的持续运行非常重要。会计应用程序的实施将帮助学校确定能力和透明度的提高水平。分析采用 COBIT 2019 框架进行,该框架在更新时增加了设计因素分析,以便根据学校的优先事项、重点和战略进行审计。在这项研究中,数据收集是通过观察和与基金会管理人员和学校领导访谈的方式进行的,他们在学校中拥有权力,并事先获得了相关学校的研究许可。得出的结果是,根据已开展的设计因素,能力水平较低,但预期能力水平较高,即达到 5 级。为帮助中学在每个领域达到预期水平,提出了若干建议。
{"title":"Leveraging COBIT 2019 to Measure the Accounting Software Implementation in High Schools for Better Transparency","authors":"Jennifer Felicia, J. Andry, Fransiskus Adikara, D. Y. Bernanda, Kevin Christianto","doi":"10.3844/jcssp.2024.218.228","DOIUrl":"https://doi.org/10.3844/jcssp.2024.218.228","url":null,"abstract":": Technology is a tool that is always used in every human life today. Technology cannot just be used; technology must also be studied to find out whether it has played a good role or not. The research was conducted on business processes in secondary schools where the importance of technology is often underestimated, even though technology in schools also has an important role. In particular, technology analysis in the world of education will usually analyze applications or facilities related to the learning process. The aim of this research is to analyze accounting applications that help business processes in running school continuity, which is ultimately important for business continuity. implementation of accounting applications will help schools determine the increased level of capability and transparency. The analysis was carried out using the COBIT 2019 framework, where this framework has been updated with additional design factor analysis so that the audit will be carried out based on school priorities, focus, and strategy. In this research, data collection was carried out by means of observation and interviews with foundation administrators and school directors who had power in the school and had previously given research permission to the school concerned. The results obtained are a low level of ability with a high expected level of ability, namely at level 5, based on the design factors that have been carried out. Several recommendations are provided to help secondary schools achieve expected levels in each domain.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139830464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging COBIT 2019 to Measure the Accounting Software Implementation in High Schools for Better Transparency 利用 COBIT 2019 衡量高中会计软件实施情况以提高透明度
Pub Date : 2024-02-01 DOI: 10.3844/jcssp.2024.218.228
Jennifer Felicia, J. Andry, Fransiskus Adikara, D. Y. Bernanda, Kevin Christianto
: Technology is a tool that is always used in every human life today. Technology cannot just be used; technology must also be studied to find out whether it has played a good role or not. The research was conducted on business processes in secondary schools where the importance of technology is often underestimated, even though technology in schools also has an important role. In particular, technology analysis in the world of education will usually analyze applications or facilities related to the learning process. The aim of this research is to analyze accounting applications that help business processes in running school continuity, which is ultimately important for business continuity. implementation of accounting applications will help schools determine the increased level of capability and transparency. The analysis was carried out using the COBIT 2019 framework, where this framework has been updated with additional design factor analysis so that the audit will be carried out based on school priorities, focus, and strategy. In this research, data collection was carried out by means of observation and interviews with foundation administrators and school directors who had power in the school and had previously given research permission to the school concerned. The results obtained are a low level of ability with a high expected level of ability, namely at level 5, based on the design factors that have been carried out. Several recommendations are provided to help secondary schools achieve expected levels in each domain.
:技术是当今人类生活中经常使用的工具。技术不能只是被使用,还必须对技术进行研究,以了解它是否发挥了良好的作用。研究对象是中学的业务流程,尽管技术在学校中也发挥着重要作用,但技术的重要性往往被低估。特别是,教育界的技术分析通常会分析与学习过程有关的应用或设施。本研究的目的是分析有助于学校持续运行业务流程的会计应用程序,这最终对业务的持续运行非常重要。会计应用程序的实施将帮助学校确定能力和透明度的提高水平。分析采用 COBIT 2019 框架进行,该框架在更新时增加了设计因素分析,以便根据学校的优先事项、重点和战略进行审计。在这项研究中,数据收集是通过观察和与基金会管理人员和学校领导访谈的方式进行的,他们在学校中拥有权力,并事先获得了相关学校的研究许可。得出的结果是,根据已开展的设计因素,能力水平较低,但预期能力水平较高,即达到 5 级。为帮助中学在每个领域达到预期水平,提出了若干建议。
{"title":"Leveraging COBIT 2019 to Measure the Accounting Software Implementation in High Schools for Better Transparency","authors":"Jennifer Felicia, J. Andry, Fransiskus Adikara, D. Y. Bernanda, Kevin Christianto","doi":"10.3844/jcssp.2024.218.228","DOIUrl":"https://doi.org/10.3844/jcssp.2024.218.228","url":null,"abstract":": Technology is a tool that is always used in every human life today. Technology cannot just be used; technology must also be studied to find out whether it has played a good role or not. The research was conducted on business processes in secondary schools where the importance of technology is often underestimated, even though technology in schools also has an important role. In particular, technology analysis in the world of education will usually analyze applications or facilities related to the learning process. The aim of this research is to analyze accounting applications that help business processes in running school continuity, which is ultimately important for business continuity. implementation of accounting applications will help schools determine the increased level of capability and transparency. The analysis was carried out using the COBIT 2019 framework, where this framework has been updated with additional design factor analysis so that the audit will be carried out based on school priorities, focus, and strategy. In this research, data collection was carried out by means of observation and interviews with foundation administrators and school directors who had power in the school and had previously given research permission to the school concerned. The results obtained are a low level of ability with a high expected level of ability, namely at level 5, based on the design factors that have been carried out. Several recommendations are provided to help secondary schools achieve expected levels in each domain.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139890071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Slime Mould Reproduction: A New Optimization Algorithm for Constrained Engineering Problems 粘液模繁殖:针对受限工程问题的新优化算法
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.96.105
Rajalakshmi Sakthivel, Kanmani Selvadurai
: In recent explorations of biologically inspired optimization strategies, the Slime Mould Reproduction (SMR) algorithm emerges as an innovative meta-heuristic optimization technique. This algorithm is deeply rooted in the reproductive dynamics observed in slime molds, particularly the intricate balance these organisms strike between local and global spore dispersal. By replicating this balance, the SMR algorithm deftly navigates between exploration and exploitation phases, aiming to pinpoint optimal solutions across diverse problem domains. For the purpose of evaluation, the SMR algorithm was diligently tested on three engineering problems with inherent constraints: Gear train design, three-bar truss design, and welded beam design. A comprehensive comparative study indicated that the SMR algorithm outperformed esteemed optimization techniques such as Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), Differential Evolution (DE), Grasshopper Optimization Algorithm (GOA), and Whale Optimization Algorithm (WOA) in these domains. While the exemplary performance of the SMR algorithm is worth noting, it is essential, in line with the No Free Lunch (NFL) theorem, to underscore that the performance of any optimization algorithm invariably depends on the particular problem it addresses. Nevertheless, the SMR algorithm's consistent triumph in benchmark tests underscores its potential as a formidable contender in the vast realm of optimization algorithms. The current exploration not only emphasizes the ever-expanding horizon of bio-inspired algorithms but also positions the SMR algorithm as a pivotal addition to the arsenal of optimization tools. Future implications and the potential scope of the SMR algorithm extend to various domains, from computational biology to intricate industrial designs. Envisioning its broader applicability, upcoming research avenues may delve into refining SMR's core procedures, borrowing insights from a broader range of biological behaviors for algorithmic ideation, and contemplating a binary version of the SMR algorithm, thereby amplifying its versatility in diverse optimization landscapes.
:在最近对受生物启发的优化策略的探索中,粘菌繁殖(SMR)算法成为一种创新的元启发式优化技术。该算法深深植根于在粘菌中观察到的繁殖动态,特别是这些生物在局部和全球孢子传播之间取得的复杂平衡。通过复制这种平衡,SMR 算法能巧妙地在探索和利用阶段之间游刃有余,从而在不同的问题领域找到最佳解决方案。为了进行评估,SMR 算法在三个具有内在约束条件的工程问题上进行了认真测试:齿轮系设计、三杆桁架设计和焊接梁设计。综合比较研究表明,SMR 算法在这些领域的表现优于粒子群优化(PSO)、人工蜂群(ABC)、差分进化(DE)、蚱蜢优化算法(GOA)和鲸鱼优化算法(WOA)等著名优化技术。虽然 SMR 算法的典范性能值得注意,但根据 "天下没有免费的午餐"(NFL)定理,必须强调任何优化算法的性能始终取决于它所解决的特定问题。尽管如此,SMR 算法在基准测试中不断取得胜利,凸显了它作为广大优化算法领域的有力竞争者的潜力。目前的探索不仅强调了生物启发算法不断扩大的范围,还将 SMR 算法定位为优化工具库中的一个重要补充。SMR 算法的未来影响和潜在范围扩展到各个领域,从计算生物学到复杂的工业设计。考虑到 SMR 算法更广泛的适用性,未来的研究方向可能会深入到完善 SMR 的核心程序、从更广泛的生物行为中汲取灵感进行算法构思,以及考虑 SMR 算法的二进制版本,从而扩大其在不同优化环境中的通用性。
{"title":"Slime Mould Reproduction: A New Optimization Algorithm for Constrained Engineering Problems","authors":"Rajalakshmi Sakthivel, Kanmani Selvadurai","doi":"10.3844/jcssp.2024.96.105","DOIUrl":"https://doi.org/10.3844/jcssp.2024.96.105","url":null,"abstract":": In recent explorations of biologically inspired optimization strategies, the Slime Mould Reproduction (SMR) algorithm emerges as an innovative meta-heuristic optimization technique. This algorithm is deeply rooted in the reproductive dynamics observed in slime molds, particularly the intricate balance these organisms strike between local and global spore dispersal. By replicating this balance, the SMR algorithm deftly navigates between exploration and exploitation phases, aiming to pinpoint optimal solutions across diverse problem domains. For the purpose of evaluation, the SMR algorithm was diligently tested on three engineering problems with inherent constraints: Gear train design, three-bar truss design, and welded beam design. A comprehensive comparative study indicated that the SMR algorithm outperformed esteemed optimization techniques such as Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), Differential Evolution (DE), Grasshopper Optimization Algorithm (GOA), and Whale Optimization Algorithm (WOA) in these domains. While the exemplary performance of the SMR algorithm is worth noting, it is essential, in line with the No Free Lunch (NFL) theorem, to underscore that the performance of any optimization algorithm invariably depends on the particular problem it addresses. Nevertheless, the SMR algorithm's consistent triumph in benchmark tests underscores its potential as a formidable contender in the vast realm of optimization algorithms. The current exploration not only emphasizes the ever-expanding horizon of bio-inspired algorithms but also positions the SMR algorithm as a pivotal addition to the arsenal of optimization tools. Future implications and the potential scope of the SMR algorithm extend to various domains, from computational biology to intricate industrial designs. Envisioning its broader applicability, upcoming research avenues may delve into refining SMR's core procedures, borrowing insights from a broader range of biological behaviors for algorithmic ideation, and contemplating a binary version of the SMR algorithm, thereby amplifying its versatility in diverse optimization landscapes.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LT-LBP-Based Spatial Texture Feature Extraction with Deep Learning for X-Ray Images 基于深度学习的 LT-LBP X 射线图像空间纹理特征提取
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.106.120
Pankaja Lakshmi P., Sivagami M.
{"title":"LT-LBP-Based Spatial Texture Feature Extraction with Deep Learning for X-Ray Images","authors":"Pankaja Lakshmi P., Sivagami M.","doi":"10.3844/jcssp.2024.106.120","DOIUrl":"https://doi.org/10.3844/jcssp.2024.106.120","url":null,"abstract":"","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Medical Image Captioning with Soft Attention-Based LSTM Model Utilizing YOLOv4 Algorithm 利用 YOLOv4 算法的基于软注意力的 LSTM 模型为医学图像自动添加字幕
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.52.68
Paspula Ravinder, Saravanan Srinivasan
: The medical image captioning field is one of the prominent fields nowadays. The interpretation and captioning of medical images can be a time-consuming and costly process, often requiring expert support. The growing volume of medical images makes it challenging for radiologists to handle their workload alone. However, addressing the issues of high cost and time can be achieved by automating the process of medical image captioning while assisting radiologists in improving the reliability and accuracy of the generated captions. It also provides an opportunity for new radiologists with less experience to benefit from automated support. Despite previous efforts in automating medical image captioning, there are still some unresolved issues, including generating overly detailed captions, difficulty in identifying abnormal regions in complex images, and low accuracy and reliability of some generated captions. To tackle these challenges, we suggest the new deep learning model specifically tailored for captioning medical images. Our model aims to extract features from images and generate meaningful sentences related to the identified defects with high accuracy. The approach we present utilizes a multi-model neural network that closely mimics the human visual system and automatically learns to describe the content of images. Our proposed method consists of two stages. In the first stage, known as the information extraction phase, we employ the YOLOv4
:医学影像字幕领域是当今最重要的领域之一。医学影像的解释和说明是一个耗时耗钱的过程,通常需要专家的支持。医学影像的数量不断增加,使得放射科医生单独处理其工作量具有挑战性。然而,要解决成本高和时间长的问题,可以实现医学影像字幕处理过程的自动化,同时协助放射科医生提高生成字幕的可靠性和准确性。这也为经验不足的新放射科医生提供了从自动化支持中获益的机会。尽管之前在医学影像字幕自动化方面做出了努力,但仍有一些问题尚未解决,包括生成过于详细的字幕、难以识别复杂图像中的异常区域,以及某些生成字幕的准确性和可靠性较低。为了应对这些挑战,我们提出了专为医学图像字幕定制的新型深度学习模型。我们的模型旨在从图像中提取特征,并高精度地生成与识别出的缺陷相关的有意义的句子。我们提出的方法利用了一个多模型神经网络,该网络可近似模拟人类视觉系统,并自动学习描述图像内容。我们提出的方法包括两个阶段。在第一阶段,即信息提取阶段,我们采用 YOLOv4
{"title":"Automated Medical Image Captioning with Soft Attention-Based LSTM Model Utilizing YOLOv4 Algorithm","authors":"Paspula Ravinder, Saravanan Srinivasan","doi":"10.3844/jcssp.2024.52.68","DOIUrl":"https://doi.org/10.3844/jcssp.2024.52.68","url":null,"abstract":": The medical image captioning field is one of the prominent fields nowadays. The interpretation and captioning of medical images can be a time-consuming and costly process, often requiring expert support. The growing volume of medical images makes it challenging for radiologists to handle their workload alone. However, addressing the issues of high cost and time can be achieved by automating the process of medical image captioning while assisting radiologists in improving the reliability and accuracy of the generated captions. It also provides an opportunity for new radiologists with less experience to benefit from automated support. Despite previous efforts in automating medical image captioning, there are still some unresolved issues, including generating overly detailed captions, difficulty in identifying abnormal regions in complex images, and low accuracy and reliability of some generated captions. To tackle these challenges, we suggest the new deep learning model specifically tailored for captioning medical images. Our model aims to extract features from images and generate meaningful sentences related to the identified defects with high accuracy. The approach we present utilizes a multi-model neural network that closely mimics the human visual system and automatically learns to describe the content of images. Our proposed method consists of two stages. In the first stage, known as the information extraction phase, we employ the YOLOv4","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Logic-Based Quantification of Usability Expectation for M-Commerce Mobile Application by Using GQM and ISO 9241-11 使用 GQM 和 ISO 9241-11 对基于模糊逻辑的移动电子商务移动应用程序可用性预期进行量化
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.1.9
Manish Mishra, Reena Dadhich
: Fuzzy logic-based quantification of usability expectation for an m-commerce mobile application is a process of measuring the usability of a mobile application by using fuzzy logic principles. The usability of any mobile application is used to find out the user experience of the mobile application by analyzing the user's expectations and preferences. Fuzzy logic always be the optimal choice for quantification. Fuzzy logic-based quantification of usability expectation assesses the user experience of an m-commerce mobile application by taking into account the user's needs, preferences, and expectations. Usability expectation also takes into account the ability of the user to understand and interact with the application, the degree to which the application meets the user's expectations, and the overall satisfaction with the application. This process helps to identify areas of improvement, enabling the developers to make necessary changes for a better user experience. This study presents to design of a usability metric framework and then quantifies the overall usability quality of an m-commerce mobile application with the help of fuzzy logic. The proposed usability metric framework is based on the Goal-Question-Metric (GQM) approach and is intended to provide a comprehensive and systematic approach to design metrics to assess the qualitative aspect of mobile phone applications. The framework has been developed and tested in an m-commerce context and provides a set of measurable criteria to quantify m-commerce mobile applications as per standard. The results of the evaluation can then be used to improve m-commerce mobile applications and to ensure that the user experience is optimized
:基于模糊逻辑的移动电子商务移动应用可用性预期量化是一个利用模糊逻辑原理测量移动应用可用性的过程。任何移动应用程序的可用性都是通过分析用户的期望和偏好来了解移动应用程序的用户体验。模糊逻辑总是量化的最佳选择。基于模糊逻辑的可用性预期量化法通过考虑用户的需求、偏好和预期来评估移动电子商务移动应用程序的用户体验。可用性预期还考虑了用户理解应用程序并与之互动的能力、应用程序满足用户预期的程度以及对应用程序的总体满意度。这一过程有助于确定需要改进的地方,使开发人员能够进行必要的修改,以获得更好的用户体验。本研究介绍了可用性度量框架的设计,然后在模糊逻辑的帮助下量化了移动电子商务移动应用程序的整体可用性质量。所提出的可用性度量框架以目标-问题-度量(GQM)方法为基础,旨在提供一种全面、系统的度量设计方法,以评估手机应用程序的质量方面。该框架是在移动电子商务背景下开发和测试的,提供了一套可衡量的标准,用于按照标准量化移动电子商务移动应用程序。评估结果可用于改进移动电子商务手机应用,确保优化用户体验。
{"title":"Fuzzy Logic-Based Quantification of Usability Expectation for M-Commerce Mobile Application by Using GQM and ISO 9241-11","authors":"Manish Mishra, Reena Dadhich","doi":"10.3844/jcssp.2024.1.9","DOIUrl":"https://doi.org/10.3844/jcssp.2024.1.9","url":null,"abstract":": Fuzzy logic-based quantification of usability expectation for an m-commerce mobile application is a process of measuring the usability of a mobile application by using fuzzy logic principles. The usability of any mobile application is used to find out the user experience of the mobile application by analyzing the user's expectations and preferences. Fuzzy logic always be the optimal choice for quantification. Fuzzy logic-based quantification of usability expectation assesses the user experience of an m-commerce mobile application by taking into account the user's needs, preferences, and expectations. Usability expectation also takes into account the ability of the user to understand and interact with the application, the degree to which the application meets the user's expectations, and the overall satisfaction with the application. This process helps to identify areas of improvement, enabling the developers to make necessary changes for a better user experience. This study presents to design of a usability metric framework and then quantifies the overall usability quality of an m-commerce mobile application with the help of fuzzy logic. The proposed usability metric framework is based on the Goal-Question-Metric (GQM) approach and is intended to provide a comprehensive and systematic approach to design metrics to assess the qualitative aspect of mobile phone applications. The framework has been developed and tested in an m-commerce context and provides a set of measurable criteria to quantify m-commerce mobile applications as per standard. The results of the evaluation can then be used to improve m-commerce mobile applications and to ensure that the user experience is optimized","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstruction Investigation Model for Database Management Systems 数据库管理系统的重建调查模型
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.33.43
A. Alraddadi
: There have been increased levels of cybercrime in the database industry, which has hurt the confidentiality, integrity, and availability of these systems. Most organizations apply several security layers to detect and prevent database crimes. For this reason, Database Forensics (DBF) plays a very important role in capturing and discovering, who the criminal is, when the crime was committed, and which part of the database the crime occurred. Several forensic models have been proposed for the DBF field, which can be used to identify, collect, preserve, examine, analyze, and document database crimes. However, most of these models focused on specific database systems due to the variety of the database infrastructure and the multidimensional nature of the database systems. The most important part of the DBF field is the analysis process used to investigate the captured data and discover the attack. Thus, this study proposes an Integrated Reconstruction Investigation Model (IRIM) for database forensics using a metamodeling method. It consists of two main processes: The examining process and the discovering and reporting process. A real scenario has been used to validate the effectiveness of the proposed model. According to the results, the proposed model could detect database cybercrimes and allow domain forensic practitioners to capture and analyze database crimes efficiently.
:数据库行业中的网络犯罪日益猖獗,损害了这些系统的保密性、完整性和可用性。大多数组织都采用多个安全层来检测和预防数据库犯罪。因此,数据库取证(DBF)在捕获和发现罪犯身份、犯罪时间以及犯罪发生在数据库的哪个部分等方面发挥着非常重要的作用。在 DBF 领域已经提出了几种取证模型,可用于识别、收集、保存、检查、分析和记录数据库犯罪。然而,由于数据库基础设施的多样性和数据库系统的多维性,这些模型大多侧重于特定的数据库系统。DBF 领域最重要的部分是用于调查捕获的数据和发现攻击的分析过程。因此,本研究采用元建模方法为数据库取证提出了一个集成重建调查模型(IRIM)。它由两个主要过程组成:检查过程以及发现和报告过程。研究使用了一个真实场景来验证所提模型的有效性。结果表明,所提出的模型可以检测数据库网络犯罪,并允许领域取证从业人员有效地捕获和分析数据库犯罪。
{"title":"Reconstruction Investigation Model for Database Management Systems","authors":"A. Alraddadi","doi":"10.3844/jcssp.2024.33.43","DOIUrl":"https://doi.org/10.3844/jcssp.2024.33.43","url":null,"abstract":": There have been increased levels of cybercrime in the database industry, which has hurt the confidentiality, integrity, and availability of these systems. Most organizations apply several security layers to detect and prevent database crimes. For this reason, Database Forensics (DBF) plays a very important role in capturing and discovering, who the criminal is, when the crime was committed, and which part of the database the crime occurred. Several forensic models have been proposed for the DBF field, which can be used to identify, collect, preserve, examine, analyze, and document database crimes. However, most of these models focused on specific database systems due to the variety of the database infrastructure and the multidimensional nature of the database systems. The most important part of the DBF field is the analysis process used to investigate the captured data and discover the attack. Thus, this study proposes an Integrated Reconstruction Investigation Model (IRIM) for database forensics using a metamodeling method. It consists of two main processes: The examining process and the discovering and reporting process. A real scenario has been used to validate the effectiveness of the proposed model. According to the results, the proposed model could detect database cybercrimes and allow domain forensic practitioners to capture and analyze database crimes efficiently.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139391774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Mechanism for Automatic Detection of IoT Intrusions Using Machine Learning 利用机器学习自动检测物联网入侵的网络安全机制
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.44.51
Cheikhane Seyed, Mbaye Kebe, Mohamed El Moustapha El Arby, El Benany Mohamed Mahmoud, Cheikhne Mohamed Mahmoud Seyidi
: This article proposes an ML-based cyber security mechanism to optimize intrusion detection that attacks internet objects (IoT). Our approach consists of bringing together several learning methods namely supervised learning, unsupervised learning and reinforcement learning within the same Canvas. The objective is to choose among them the most optimal for classifying and predicting attacks while minimizing the impact linked to the learning costs of these attacks. In our proposed model, we have used a modular design to facilitate the implementation of the intrusion detection engine. The first Meta-learning module is used to collect metadata related to existing algorithmic parameters and learning methods in ML. As for the second module, it allows the use of a cost-sensitive learning technique so that the model is informed of the cost of intrusion detection scenarios. Therefore, among the ML classification algorithms, we choose the one whose automatic learning of intrusions is the least expensive in terms of its speed and its quality in predicting reality. This will make it possible to control the level of acceptable risk in relation to the typology of cyber-attacks. We then simulated our solution using the Weka tool. This led to questionable results, which can be subject to the evaluation of model performance. These results show that the classification quality rate is 93.66% and the classification consistency rate is 0.882 (close to unit 1). This proves the accuracy and performance of the model.
:本文提出了一种基于 ML 的网络安全机制,以优化攻击互联网对象 (IoT) 的入侵检测。我们的方法包括在同一 Canvas 中汇集几种学习方法,即监督学习、无监督学习和强化学习。我们的目标是在这些方法中选择最适合对攻击进行分类和预测的方法,同时将与这些攻击的学习成本相关的影响降至最低。在我们提出的模型中,我们采用了模块化设计,以方便入侵检测引擎的实施。第一个元学习模块用于收集与现有算法参数和 ML 学习方法相关的元数据。至于第二个模块,它允许使用对成本敏感的学习技术,以便让模型了解入侵检测场景的成本。因此,在 ML 分类算法中,我们选择其自动学习入侵的速度和预测现实的质量成本最低的算法。这样就可以根据网络攻击的类型来控制可接受的风险水平。然后,我们使用 Weka 工具模拟了我们的解决方案。这导致了一些值得商榷的结果,这些结果可以用于模型性能的评估。这些结果表明,分类质量率为 93.66%,分类一致性率为 0.882(接近单位 1)。这证明了模型的准确性和性能。
{"title":"Cybersecurity Mechanism for Automatic Detection of IoT Intrusions Using Machine Learning","authors":"Cheikhane Seyed, Mbaye Kebe, Mohamed El Moustapha El Arby, El Benany Mohamed Mahmoud, Cheikhne Mohamed Mahmoud Seyidi","doi":"10.3844/jcssp.2024.44.51","DOIUrl":"https://doi.org/10.3844/jcssp.2024.44.51","url":null,"abstract":": This article proposes an ML-based cyber security mechanism to optimize intrusion detection that attacks internet objects (IoT). Our approach consists of bringing together several learning methods namely supervised learning, unsupervised learning and reinforcement learning within the same Canvas. The objective is to choose among them the most optimal for classifying and predicting attacks while minimizing the impact linked to the learning costs of these attacks. In our proposed model, we have used a modular design to facilitate the implementation of the intrusion detection engine. The first Meta-learning module is used to collect metadata related to existing algorithmic parameters and learning methods in ML. As for the second module, it allows the use of a cost-sensitive learning technique so that the model is informed of the cost of intrusion detection scenarios. Therefore, among the ML classification algorithms, we choose the one whose automatic learning of intrusions is the least expensive in terms of its speed and its quality in predicting reality. This will make it possible to control the level of acceptable risk in relation to the typology of cyber-attacks. We then simulated our solution using the Weka tool. This led to questionable results, which can be subject to the evaluation of model performance. These results show that the classification quality rate is 93.66% and the classification consistency rate is 0.882 (close to unit 1). This proves the accuracy and performance of the model.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139128715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Student Mental Health Dataset Using Mining Techniques 利用挖掘技术分析学生心理健康数据集
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.121.128
Yemima Monica Geasela, D. Y. Bernanda, Johanes Fernandes, J. Andry, Christian Kurniadi Jusuf, Samuel Winata, Shierly Everlin
: This study utilizes a decision tree model in RapidMiner to analyze a dataset from Kaggle, comprising 200 student records. Among these, 70 students reported mental health issues, while 130 did not. Strikingly, a significant majority of 58 out of the 70 students with mental health concerns do not seek assistance from professionals. This study underscores the pressing issue of underutilization of mental health services among students and offers practical solutions, such as enhancing awareness and education, improving access to mental health services, providing peer support, and addressing underlying issues. The research design includes data collection methods that maintained ethical standards and the decision tree model's application for analysis. This study's contribution lies in its identification of the prevalence of students with mental health issues who do not seek help and the proposed solutions to address this critical issue.
:本研究利用 RapidMiner 中的决策树模型来分析来自 Kaggle 的数据集,该数据集由 200 条学生记录组成。其中,70 名学生报告了心理健康问题,130 名学生没有报告。令人吃惊的是,在 70 名有心理健康问题的学生中,有 58 名学生没有向专业人士寻求帮助。这项研究强调了学生对心理健康服务利用不足这一紧迫问题,并提出了切实可行的解决方案,如加强宣传和教育、改善心理健康服务的获取途径、提供同伴支持以及解决潜在问题。研究设计包括符合道德标准的数据收集方法和决策树模型的分析应用。本研究的贡献在于,它发现了有心理健康问题的学生不寻求帮助的普遍现象,并提出了解决这一关键问题的方案。
{"title":"Analysis of Student Mental Health Dataset Using Mining Techniques","authors":"Yemima Monica Geasela, D. Y. Bernanda, Johanes Fernandes, J. Andry, Christian Kurniadi Jusuf, Samuel Winata, Shierly Everlin","doi":"10.3844/jcssp.2024.121.128","DOIUrl":"https://doi.org/10.3844/jcssp.2024.121.128","url":null,"abstract":": This study utilizes a decision tree model in RapidMiner to analyze a dataset from Kaggle, comprising 200 student records. Among these, 70 students reported mental health issues, while 130 did not. Strikingly, a significant majority of 58 out of the 70 students with mental health concerns do not seek assistance from professionals. This study underscores the pressing issue of underutilization of mental health services among students and offers practical solutions, such as enhancing awareness and education, improving access to mental health services, providing peer support, and addressing underlying issues. The research design includes data collection methods that maintained ethical standards and the decision tree model's application for analysis. This study's contribution lies in its identification of the prevalence of students with mental health issues who do not seek help and the proposed solutions to address this critical issue.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139126848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Phishing Websites Hosted in Name Server Flux Networks Using Machine Learning 利用机器学习检测名称服务器流量网络中托管的钓鱼网站
Pub Date : 2024-01-01 DOI: 10.3844/jcssp.2024.10.32
Thomas Nagunwa
: Attackers are increasingly using Name Server IP Flux Networks (NSIFNs) to run the domain name services of their phishing websites in order to extend the duration of their phishing operations. These networks host a name server that manages the Domain Name System (DNS) records of the websites on a network of compromised machines with frequently changing IP addresses. As a result, blacklisting the machines has less impact on stopping the services, lengthening their lifespan and that of the websites they support. High detection delays and the use of fewer, lesser varied detection features limit the proposed solutions for identifying the websites hosted in these networks, making them more susceptible to detection evasions. This study suggests a novel set of highly diverse features based on DNS, network, and host behaviors for fast and highly accurate detection of phishing websites hosted in NSIFNs using a Machine Learning (ML) approach. Using a variety of traditional and deep learning ML algorithms, the prediction performance of our features was assessed in the context of binary and multi-class classification tasks. Our approach achieved optimal accuracy rates of 98.59% and 90.41% for the binary and multi-class classification tasks, respectively. Our approach is a crucial step toward monitoring NSIFN components to mitigate phishing attacks efficiently.
:攻击者越来越多地使用名称服务器 IP 流量网络(NSIFN)来运行其钓鱼网站的域名服务,以延长其钓鱼行动的持续时间。这些网络托管一个名称服务器,该服务器在IP地址经常变化的受攻击机器网络上管理网站的域名系统(DNS)记录。因此,将这些机器列入黑名单对停止服务的影响较小,从而延长了它们及其所支持网站的寿命。高检测延迟和使用较少、变化较少的检测功能限制了所提出的识别这些网络中托管的网站的解决方案,使其更容易受到检测规避的影响。本研究提出了一套基于 DNS、网络和主机行为的高度多样化的新特征,可使用机器学习 (ML) 方法快速、高度准确地检测 NSIFN 中托管的钓鱼网站。利用各种传统和深度学习 ML 算法,我们在二元和多类分类任务中评估了特征的预测性能。在二元分类和多类分类任务中,我们的方法分别实现了 98.59% 和 90.41% 的最佳准确率。我们的方法为监控 NSIFN 组件以有效缓解网络钓鱼攻击迈出了关键一步。
{"title":"Detection of Phishing Websites Hosted in Name Server Flux Networks Using Machine Learning","authors":"Thomas Nagunwa","doi":"10.3844/jcssp.2024.10.32","DOIUrl":"https://doi.org/10.3844/jcssp.2024.10.32","url":null,"abstract":": Attackers are increasingly using Name Server IP Flux Networks (NSIFNs) to run the domain name services of their phishing websites in order to extend the duration of their phishing operations. These networks host a name server that manages the Domain Name System (DNS) records of the websites on a network of compromised machines with frequently changing IP addresses. As a result, blacklisting the machines has less impact on stopping the services, lengthening their lifespan and that of the websites they support. High detection delays and the use of fewer, lesser varied detection features limit the proposed solutions for identifying the websites hosted in these networks, making them more susceptible to detection evasions. This study suggests a novel set of highly diverse features based on DNS, network, and host behaviors for fast and highly accurate detection of phishing websites hosted in NSIFNs using a Machine Learning (ML) approach. Using a variety of traditional and deep learning ML algorithms, the prediction performance of our features was assessed in the context of binary and multi-class classification tasks. Our approach achieved optimal accuracy rates of 98.59% and 90.41% for the binary and multi-class classification tasks, respectively. Our approach is a crucial step toward monitoring NSIFN components to mitigate phishing attacks efficiently.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139125134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1