首页 > 最新文献

Journal of Computer Science最新文献

英文 中文
A Conceptual UX Model for Designing and Developing the Business Intelligence Dashboards 设计和开发商业智能仪表盘的用户体验概念模型
Pub Date : 2023-12-01 DOI: 10.3844/jcssp.2023.1505.1519
Apoorva Muppidi, Ahmad Sobri Hashim, Mohd Hilmi Hasan, Aminu Aminu Muazu
: Interactive dashboards are becoming increasingly popular for aiding users with data discovery and BI analysis. As UX is an important factor in developing Business Intelligence (BI) dashboards, the majority of current research centers around the evaluation of the User Experience (UX) in Business Intelligence (BI) dashboards, but there are only a few studies that focus on the UX aspect of designing and developing such dashboards and most of the dashboards were developed without considering the human aspects. Therefore, the absence of UX in dashboard development can make it difficult for users to understand and fully utilize the dashboard, which leads to a lack of effectiveness. Therefore, there is a need to consider UX factors while designing and developing BI dashboards. The main aim of this study is to develop a UX Model by including both user experience and business intelligence dashboard elements for designing and developing the BI dashboards. In this research, we proposed a user experience by considering the elements of UX and BI dashboards from the existing literature, validated the model by conducting FGD, and analyzed FGD comments by applying the thematic analysis method. Based on the result after conducting analysis we updated the proposed model. The developed model can guide the developer while designing and developing the BI dashboard.
交互式仪表板在帮助用户进行数据发现和BI分析方面变得越来越流行。由于用户体验是开发商业智能(BI)仪表板的一个重要因素,目前大多数研究都围绕着商业智能(BI)仪表板中的用户体验(UX)的评估,但只有少数研究关注设计和开发这种仪表板的用户体验方面,而且大多数仪表板的开发都没有考虑到人的方面。因此,在仪表板开发中缺乏UX,用户很难理解和充分利用仪表板,从而导致效率低下。因此,在设计和开发BI仪表板时需要考虑用户体验因素。本研究的主要目的是通过包括用户体验和商业智能仪表板元素来开发一个用户体验模型,用于设计和开发BI仪表板。在本研究中,我们从现有文献中考虑UX和BI仪表板的元素,提出了一个用户体验,通过FGD验证模型,并使用主题分析法分析FGD评论。根据分析结果,对提出的模型进行了更新。开发的模型可以指导开发人员设计和开发BI仪表板。
{"title":"A Conceptual UX Model for Designing and Developing the Business Intelligence Dashboards","authors":"Apoorva Muppidi, Ahmad Sobri Hashim, Mohd Hilmi Hasan, Aminu Aminu Muazu","doi":"10.3844/jcssp.2023.1505.1519","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1505.1519","url":null,"abstract":": Interactive dashboards are becoming increasingly popular for aiding users with data discovery and BI analysis. As UX is an important factor in developing Business Intelligence (BI) dashboards, the majority of current research centers around the evaluation of the User Experience (UX) in Business Intelligence (BI) dashboards, but there are only a few studies that focus on the UX aspect of designing and developing such dashboards and most of the dashboards were developed without considering the human aspects. Therefore, the absence of UX in dashboard development can make it difficult for users to understand and fully utilize the dashboard, which leads to a lack of effectiveness. Therefore, there is a need to consider UX factors while designing and developing BI dashboards. The main aim of this study is to develop a UX Model by including both user experience and business intelligence dashboard elements for designing and developing the BI dashboards. In this research, we proposed a user experience by considering the elements of UX and BI dashboards from the existing literature, validated the model by conducting FGD, and analyzed FGD comments by applying the thematic analysis method. Based on the result after conducting analysis we updated the proposed model. The developed model can guide the developer while designing and developing the BI dashboard.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138612589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Design of Protocol for the Reconstruction of Computer Field Model Using Dron and Photogrammetry 利用无人机和摄影测量重建计算机现场模型的协议分析与设计
Pub Date : 2023-12-01 DOI: 10.3844/jcssp.2023.1580.1593
Boris Tunjić, A. Bernik, Andrej Cep
: One of the main challenges in aerial photogrammetry is the lack of standardization in the process of data integration, which is the first step in 3D reconstruction. This study analyses the influence of the distance from the camera to the subject of the recording, the influence of different overlap percentages in photography as well as the difference between the three methods of re-cording in programming flight plans. DJI Phantom 3 unmanned aerial vehicle and PIX4Dmapper software for 3D reconstruction were used in this research. The old town of Medvedgrad near Zagreb, Croatia was the subject of recording. The purpose of this study is to design a standardized image recording protocol that would contribute to a faster and more optimal workflow while maintaining a quantitatively measured quality according to the total number of 2D key points per image and the total number of 3D key points in a point cloud. Based on research and the obtained results, the possibility of data recording at a distance of up to 30 m without a significant loss (3.6%) of the number of 2D key points per photograph was proven. A larger horizontal distance allows recording from one viewing altitude if the height of the subject does not exceed 30 m. This study determines that 85% image overlap results in an almost identical number of 3D key points (0.7% difference) as well as 90% image overlap. The authors proposed a new flight plan, which would implement optimized parameters obtained in this research.
航空摄影测量面临的主要挑战之一是数据整合过程缺乏标准化,而数据整合是三维重建的第一步。本研究分析了相机到记录对象距离的影响,不同重叠百分比在摄影中的影响,以及三种记录方式在飞行计划编程中的差异。本研究使用大疆幻影3无人机和PIX4Dmapper软件进行三维重建。克罗地亚萨格勒布附近的梅德维德格勒老城是录音的主题。本研究的目的是设计一种标准化的图像记录协议,该协议将有助于更快,更优化的工作流程,同时根据每个图像的2D关键点总数和点云中的3D关键点总数保持定量测量的质量。基于研究和获得的结果,证明了在长达30米的距离上记录数据而不会显著损失(3.6%)每张照片的2D关键点数量的可能性。如果拍摄对象的高度不超过30米,更大的水平距离允许从一个观看高度进行记录。本研究确定85%的图像重叠产生的3D关键点数量几乎相同(相差0.7%),90%的图像重叠。作者提出了一种新的飞行计划,该计划将实现本研究得到的优化参数。
{"title":"Analysis and Design of Protocol for the Reconstruction of Computer Field Model Using Dron and Photogrammetry","authors":"Boris Tunjić, A. Bernik, Andrej Cep","doi":"10.3844/jcssp.2023.1580.1593","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1580.1593","url":null,"abstract":": One of the main challenges in aerial photogrammetry is the lack of standardization in the process of data integration, which is the first step in 3D reconstruction. This study analyses the influence of the distance from the camera to the subject of the recording, the influence of different overlap percentages in photography as well as the difference between the three methods of re-cording in programming flight plans. DJI Phantom 3 unmanned aerial vehicle and PIX4Dmapper software for 3D reconstruction were used in this research. The old town of Medvedgrad near Zagreb, Croatia was the subject of recording. The purpose of this study is to design a standardized image recording protocol that would contribute to a faster and more optimal workflow while maintaining a quantitatively measured quality according to the total number of 2D key points per image and the total number of 3D key points in a point cloud. Based on research and the obtained results, the possibility of data recording at a distance of up to 30 m without a significant loss (3.6%) of the number of 2D key points per photograph was proven. A larger horizontal distance allows recording from one viewing altitude if the height of the subject does not exceed 30 m. This study determines that 85% image overlap results in an almost identical number of 3D key points (0.7% difference) as well as 90% image overlap. The authors proposed a new flight plan, which would implement optimized parameters obtained in this research.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138621380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dataset of Selected Medicinal Plant Species of the Genus Brachylaena: A Comparative Application of Deep Learning Models for Plant Leaf Recognition 短叶草属药用植物选种数据集:深度学习模型在植物叶片识别中的比较应用
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1387.1397
Avuya Deyi, Arnaud Nguembang Fadja, Eleonora Deborah Goosen, Xavier Siwe Noundou
Since several active pharmaceutical ingredients are sourced from medicinal plants, identifying and classifying these plants are generally a valuable and essential task during the drug manufacturing process. For many years, identifying and classifying those plants have been exclusively done by experts in the domain, such as botanists and herbarium curators. Recently, powerful computer vision technologies, using deep learning or deep artificial neural networks, have been developed for classifying or identifying objects using images. A convolutional neural network is a deep learning architecture that outperforms previous state-of-the-art approaches in image classification and object detection based on its efficient feature extraction of images. This study investigated several pre-trained convolutional neural networks for identifying and classifying leaves of three species of the genus Brachylaena. The three species considered were Brachylaena discolor, Brachylaena ilicifolia, and Brachylaena elliptica. All three species are used medicinally by people in South Africa. We trained and evaluated different deep convolutional neural networks from 1259 labeled images of those plant species (at least 400 for each species) split into training, evaluation, and test sets. The best model provided a 98.26% accuracy using cross-validation with a confidence interval of ±2.16%.
由于一些有效的药物成分来源于药用植物,因此在药物制造过程中,对这些植物进行识别和分类通常是一项有价值和必要的任务。多年来,这些植物的鉴定和分类都是由该领域的专家,如植物学家和植物标本馆馆长来完成的。最近,使用深度学习或深度人工神经网络的强大计算机视觉技术已经被开发出来,用于使用图像对物体进行分类或识别。卷积神经网络是一种深度学习架构,它基于对图像的有效特征提取,在图像分类和目标检测方面优于以前最先进的方法。研究了几种预训练的卷积神经网络对三种短叶草属植物叶片的识别和分类。被考虑的三个物种是变色短叶藻(Brachylaena discolor)、短叶藻(Brachylaena ilicifolia)和椭圆短叶藻(Brachylaena elliptica)。这三种植物都被南非人用作药用。我们从1259张这些植物物种的标记图像(每个物种至少400张)中训练和评估不同的深度卷积神经网络,这些图像被分为训练集、评估集和测试集。交叉验证的最佳模型准确率为98.26%,置信区间为±2.16%。
{"title":"Dataset of Selected Medicinal Plant Species of the Genus Brachylaena: A Comparative Application of Deep Learning Models for Plant Leaf Recognition","authors":"Avuya Deyi, Arnaud Nguembang Fadja, Eleonora Deborah Goosen, Xavier Siwe Noundou","doi":"10.3844/jcssp.2023.1387.1397","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1387.1397","url":null,"abstract":"Since several active pharmaceutical ingredients are sourced from medicinal plants, identifying and classifying these plants are generally a valuable and essential task during the drug manufacturing process. For many years, identifying and classifying those plants have been exclusively done by experts in the domain, such as botanists and herbarium curators. Recently, powerful computer vision technologies, using deep learning or deep artificial neural networks, have been developed for classifying or identifying objects using images. A convolutional neural network is a deep learning architecture that outperforms previous state-of-the-art approaches in image classification and object detection based on its efficient feature extraction of images. This study investigated several pre-trained convolutional neural networks for identifying and classifying leaves of three species of the genus Brachylaena. The three species considered were Brachylaena discolor, Brachylaena ilicifolia, and Brachylaena elliptica. All three species are used medicinally by people in South Africa. We trained and evaluated different deep convolutional neural networks from 1259 labeled images of those plant species (at least 400 for each species) split into training, evaluation, and test sets. The best model provided a 98.26% accuracy using cross-validation with a confidence interval of ±2.16%.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Uncertainty to Extract Fuzzy Membership Functions in Recommender Systems 度量不确定性提取推荐系统中的模糊隶属函数
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1359.1368
Heersh Azeez Khorsheed, Sadegh Aminifar
Nowadays, due to the high volume of choices for customers which causes confusion, the use of recommender systems is strongly growing. Of course, existing systems have two problems, one is complexity and the other is failure to consider uncertainty. In this article, we have reduced the complexity of the system by using a fuzzy innovative system and solved the problem of the uncertainty of users' ratings regarding goods. For that purpose, this research attempts to extract fuzzy membership functions from the Yahoo movie dataset for recommendation applications. In the proposed method, a type I fuzzy system with low numbers of membership functions is designed. The uncertainty in users' ratings is handled by clustering users and movies. Moreover, repeated user evaluations of the same movies are used to determine the uncertainty in improved type 1 membership functions. To evaluate the proposed strategy, MAE, confusion matrix, and Classification-report are used. The result demonstrates the superiority of the introduced strategy.
如今,由于大量的选择给客户带来了困惑,推荐系统的使用正在强劲增长。当然,现有的系统存在两个问题,一个是复杂性,另一个是没有考虑不确定性。在本文中,我们利用模糊创新系统降低了系统的复杂性,解决了用户对商品打分的不确定性问题。为此,本研究尝试从雅虎电影数据集中提取模糊隶属函数,用于推荐应用程序。在该方法中,设计了一个具有少量隶属函数的I型模糊系统。用户评分的不确定性通过用户和电影的聚类来处理。此外,使用用户对同一部电影的重复评价来确定改进的第一类隶属函数的不确定性。为了评估所提出的策略,使用了MAE、混淆矩阵和分类报告。结果表明了所引入策略的优越性。
{"title":"Measuring Uncertainty to Extract Fuzzy Membership Functions in Recommender Systems","authors":"Heersh Azeez Khorsheed, Sadegh Aminifar","doi":"10.3844/jcssp.2023.1359.1368","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1359.1368","url":null,"abstract":"Nowadays, due to the high volume of choices for customers which causes confusion, the use of recommender systems is strongly growing. Of course, existing systems have two problems, one is complexity and the other is failure to consider uncertainty. In this article, we have reduced the complexity of the system by using a fuzzy innovative system and solved the problem of the uncertainty of users' ratings regarding goods. For that purpose, this research attempts to extract fuzzy membership functions from the Yahoo movie dataset for recommendation applications. In the proposed method, a type I fuzzy system with low numbers of membership functions is designed. The uncertainty in users' ratings is handled by clustering users and movies. Moreover, repeated user evaluations of the same movies are used to determine the uncertainty in improved type 1 membership functions. To evaluate the proposed strategy, MAE, confusion matrix, and Classification-report are used. The result demonstrates the superiority of the introduced strategy.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing the Concept of Methodological Support for Designing and Assessing the Efficiency of Information Protection Systems of Standard Information Systems Considering Their Vulnerabilities 基于脆弱性的标准信息系统信息保护系统效率设计与评估的方法学支持
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1305.1317
Islam Alexandrovich Alexandrov, Andrey Victorovich Kirichek, Vladimir Zhanovich Kuklin, Alexander Nikolaevich Muranov, Leonid Mikhajlovich Chervyakov
The Information Protection System (IPS) is an integral part of any Information System (IS). To develop an optimal IPS model at the earliest stages of the IS lifecycle, it is necessary to develop IS resource and threat models. This study is devoted to developing a specific model of IS resources, allowing a detailed description of the relationship between resources and business processes and developing an IS threat model to describe in detail the relationships between threat implementations, various IS vulnerabilities, and the relationships between them. To solve these problems, this study used the methods of set theory, graph theory, probability theory, game theory, random processes theory, mathematical logic, and object-oriented approach. This study simulated different variants of the IPS and found that only a balanced IPS project met the Pareto demands. The projects where the emphasis is on countering only external or internal threats do not meet these demands.
信息保护系统(IPS)是任何信息系统(is)的一个组成部分。为了在IS生命周期的早期建立最优的IPS模型,需要建立IS资源模型和威胁模型。本研究致力于开发一个特定的is资源模型,详细描述资源与业务流程之间的关系,并开发一个is威胁模型,详细描述威胁实现与各种is漏洞之间的关系以及它们之间的关系。为了解决这些问题,本研究运用了集合论、图论、概率论、博弈论、随机过程理论、数理逻辑和面向对象的方法。本研究模拟了IPS的不同变体,发现只有平衡的IPS项目才能满足帕累托需求。那些只强调对抗外部或内部威胁的项目不能满足这些要求。
{"title":"Developing the Concept of Methodological Support for Designing and Assessing the Efficiency of Information Protection Systems of Standard Information Systems Considering Their Vulnerabilities","authors":"Islam Alexandrovich Alexandrov, Andrey Victorovich Kirichek, Vladimir Zhanovich Kuklin, Alexander Nikolaevich Muranov, Leonid Mikhajlovich Chervyakov","doi":"10.3844/jcssp.2023.1305.1317","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1305.1317","url":null,"abstract":"The Information Protection System (IPS) is an integral part of any Information System (IS). To develop an optimal IPS model at the earliest stages of the IS lifecycle, it is necessary to develop IS resource and threat models. This study is devoted to developing a specific model of IS resources, allowing a detailed description of the relationship between resources and business processes and developing an IS threat model to describe in detail the relationships between threat implementations, various IS vulnerabilities, and the relationships between them. To solve these problems, this study used the methods of set theory, graph theory, probability theory, game theory, random processes theory, mathematical logic, and object-oriented approach. This study simulated different variants of the IPS and found that only a balanced IPS project met the Pareto demands. The projects where the emphasis is on countering only external or internal threats do not meet these demands.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Strategic Initiatives on the Adaptation of Enterprise Architecture 战略计划对企业架构适应的影响
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1318.1332
Wissal Daoudi, Kawtar Imgharene, Karim Doumi, Laila Kjiri
Nowadays, companies are immersed in disruptive environments. To thrive in the ‘new normal’, they drive strategic initiatives resulting in changes with unpredictable frequencies and extents. These changes impact different elements of the company, which makes them a crucial matter for enterprise architecture. However, the traditional management operating models have become overstrained, which leads to existential threats. Therefore, the adaptation of enterprise architecture has emerged. It is an agile approach that continuously senses and responds to change without compromising the alignment in the enterprise. The management of the impact of strategic initiatives is pivotal to the success of companies. Overall, in the context of adaptation, contributions to the proactive assessment and monitoring of the impact of strategic initiatives on enterprise architecture are lacking. Therefore, this study aims to model this impact and evaluate it while focusing on the enterprise architecture structural components and their relationships. It proposes tools to support the analysis. Thereafter, it indicates the applicability of the suggested approach via a case study in a state urban planning agency.
如今,企业沉浸在颠覆性的环境中。为了在“新常态”中茁壮成长,他们推动战略举措,导致不可预测的频率和程度的变化。这些变化影响公司的不同元素,这使得它们成为企业架构的关键问题。然而,传统的管理运作模式已经变得过度紧张,从而导致生存威胁。因此,出现了企业架构的适配问题。它是一种敏捷方法,可以在不损害企业一致性的情况下持续感知和响应变化。管理战略举措的影响对公司的成功至关重要。总的来说,在适应的上下文中,缺乏对战略计划对企业架构的影响的主动评估和监视的贡献。因此,本研究旨在对这种影响进行建模,并在关注企业架构结构组件及其关系的同时对其进行评估。它提出了支持分析的工具。然后,通过一个州城市规划机构的案例研究表明了所建议方法的适用性。
{"title":"Impact of Strategic Initiatives on the Adaptation of Enterprise Architecture","authors":"Wissal Daoudi, Kawtar Imgharene, Karim Doumi, Laila Kjiri","doi":"10.3844/jcssp.2023.1318.1332","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1318.1332","url":null,"abstract":"Nowadays, companies are immersed in disruptive environments. To thrive in the ‘new normal’, they drive strategic initiatives resulting in changes with unpredictable frequencies and extents. These changes impact different elements of the company, which makes them a crucial matter for enterprise architecture. However, the traditional management operating models have become overstrained, which leads to existential threats. Therefore, the adaptation of enterprise architecture has emerged. It is an agile approach that continuously senses and responds to change without compromising the alignment in the enterprise. The management of the impact of strategic initiatives is pivotal to the success of companies. Overall, in the context of adaptation, contributions to the proactive assessment and monitoring of the impact of strategic initiatives on enterprise architecture are lacking. Therefore, this study aims to model this impact and evaluate it while focusing on the enterprise architecture structural components and their relationships. It proposes tools to support the analysis. Thereafter, it indicates the applicability of the suggested approach via a case study in a state urban planning agency.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Panoramic Video Surveillance: An Analysis of Burglary Detection Based on YOLO Framework in Residential Areas 全景视频监控:基于YOLO框架的住宅小区入室盗窃检测分析
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1345.1358
Pavithra S, B. Muruganantham
Artificial Intelligence (AI) is a technique that incorporates human intelligence into mundane activities. And there is no question that AI is significantly affecting security and surveillance. Although relying on numerous resources, finding answers, and implementing technology for decades, our security and surveillance systems still have flaws. In every country around the globe, the use of video security and surveillance is becoming more widespread. Nonetheless, a wide range of businesses has made use of it, including hospitals, universities, and warehouses. Yet, as people are limited in their ability to vigilantly monitor live video streams, deep learning was developed to better fill the position. Unfortunately, there are other problems with images in the real world, including jitter or blurring caused by rotating objects, noise, and sharpness concerns. As a result, deep learning technology for surveillance has considerably improved in recent years. The main objective of this study is to detect burglars using deep learning technology. This system aims to take video surveillance of the residential environment as input and pass it into the Yolo model to increase the speed and accuracy of the system to detect burglars in the residential. This system mainly concentrates on object detection.
人工智能(AI)是一种将人类智能融入日常活动的技术。毫无疑问,人工智能正在对安全和监控产生重大影响。尽管几十年来依靠大量资源,寻找答案,实施技术,我们的安全和监控系统仍然存在缺陷。在全球每个国家,视频安全和监控的使用正变得越来越普遍。尽管如此,包括医院、大学和仓库在内的许多企业都在使用它。然而,由于人们警惕地监控实时视频流的能力有限,因此开发了深度学习来更好地填补这一空缺。不幸的是,现实世界中的图像还存在其他问题,包括由旋转物体、噪声和清晰度问题引起的抖动或模糊。因此,近年来用于监控的深度学习技术有了很大的改进。本研究的主要目的是使用深度学习技术检测窃贼。本系统旨在将住宅环境的视频监控作为输入,传递到Yolo模型中,以提高系统对住宅中窃贼的检测速度和准确性。该系统主要致力于目标检测。
{"title":"Panoramic Video Surveillance: An Analysis of Burglary Detection Based on YOLO Framework in Residential Areas","authors":"Pavithra S, B. Muruganantham","doi":"10.3844/jcssp.2023.1345.1358","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1345.1358","url":null,"abstract":"Artificial Intelligence (AI) is a technique that incorporates human intelligence into mundane activities. And there is no question that AI is significantly affecting security and surveillance. Although relying on numerous resources, finding answers, and implementing technology for decades, our security and surveillance systems still have flaws. In every country around the globe, the use of video security and surveillance is becoming more widespread. Nonetheless, a wide range of businesses has made use of it, including hospitals, universities, and warehouses. Yet, as people are limited in their ability to vigilantly monitor live video streams, deep learning was developed to better fill the position. Unfortunately, there are other problems with images in the real world, including jitter or blurring caused by rotating objects, noise, and sharpness concerns. As a result, deep learning technology for surveillance has considerably improved in recent years. The main objective of this study is to detect burglars using deep learning technology. This system aims to take video surveillance of the residential environment as input and pass it into the Yolo model to increase the speed and accuracy of the system to detect burglars in the residential. This system mainly concentrates on object detection.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IOT-Based Smart Helmet for COVID-19 Detection and Management 基于物联网的智能头盔用于 COVID-19 检测和管理
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1380.1386
Foziah Gazzawe
: Covid-19 is one of the pandemics that has shocked the world. Having originated from China, the virus rapidly spread across many countries of the world. There was a need to come up with mechanisms to manage the spread of the virus. The traditional methods of temperature capture through thermal handheld gun thermometers were tedious and exposed the officers to the same virus. Therefore, due to technological advancement, the Internet of Things has been widely used with smart devices being developed. This study proposes an IoT-enabled smart helmet that scans individuals for high temperatures using a thermal camera, identifies individuals by capturing their images using an optical camera, and sends alerts and information to authorized officers’ decision-making and further action. For instance, they would notify the identified individual and give guidelines on how to self-manage based on the COVID-19 management guidelines such as quarantine, exercise, self-distance, handwashing, sanitizing, and dietary needs. The integration of technologies in the smart helmet application is beneficial in addressing safety measures and enhanced healthcare and monitoring of patients. For instance, in crowded areas, manual testing can be challenging hence the need for a contactless screening. The implications in real-time data analysis, concurrency, Human-Computer Interaction, remote monitoring, data security, and interdisciplinary collaboration have enhanced operation and decision-making. The knowledge, once tested, will form the basis for advanced research and implementations in various domains such as manufacturing industries. The methodology involved data capture (input), processing, and output. Materials used include thermal and optical cameras for data input, GSM and Google location applications, Arduino IDE, and mobile phone applications. The study used simulation at a mall's entry point and captured the temperature of 8 individuals. Out of the 8 individuals, 3 had high temperatures whereas the rest registered normal temperatures. Temperature measurements were verified by healthcare personnel through a second measure of temperature.
:Covid-19 是震惊世界的流行病之一。该病毒源于中国,迅速蔓延到世界许多国家。因此,需要建立一种机制来控制病毒的传播。通过热敏手持式枪式温度计采集体温的传统方法十分繁琐,而且会使工作人员感染同样的病毒。因此,随着技术的进步,物联网得到了广泛应用,智能设备也在不断发展。本研究提出了一种支持物联网的智能头盔,该头盔可使用热像仪扫描个人是否体温过高,通过使用光学相机捕捉个人图像来识别个人,并发送警报和信息供授权人员决策和采取进一步行动。例如,他们会通知被识别的个人,并根据 COVID-19 管理指南提供如何自我管理的指导,如隔离、运动、自我远离、洗手、消毒和饮食需求等。智能头盔应用中的技术集成有利于采取安全措施,加强对患者的医疗保健和监测。例如,在人群拥挤的地区,人工检测可能具有挑战性,因此需要非接触式筛查。实时数据分析、并发性、人机交互、远程监控、数据安全和跨学科合作等方面的影响都加强了操作和决策。这些知识一旦经过测试,将成为在制造业等各个领域开展高级研究和实施的基础。该方法涉及数据采集(输入)、处理和输出。使用的材料包括用于数据输入的热像仪和光学相机、GSM 和谷歌定位应用程序、Arduino 集成开发环境和手机应用程序。研究在商场入口处进行了模拟,采集了 8 个人的体温。8 人中有 3 人体温偏高,其他人体温正常。体温测量结果由医护人员通过第二次体温测量进行验证。
{"title":"IOT-Based Smart Helmet for COVID-19 Detection and Management","authors":"Foziah Gazzawe","doi":"10.3844/jcssp.2023.1380.1386","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1380.1386","url":null,"abstract":": Covid-19 is one of the pandemics that has shocked the world. Having originated from China, the virus rapidly spread across many countries of the world. There was a need to come up with mechanisms to manage the spread of the virus. The traditional methods of temperature capture through thermal handheld gun thermometers were tedious and exposed the officers to the same virus. Therefore, due to technological advancement, the Internet of Things has been widely used with smart devices being developed. This study proposes an IoT-enabled smart helmet that scans individuals for high temperatures using a thermal camera, identifies individuals by capturing their images using an optical camera, and sends alerts and information to authorized officers’ decision-making and further action. For instance, they would notify the identified individual and give guidelines on how to self-manage based on the COVID-19 management guidelines such as quarantine, exercise, self-distance, handwashing, sanitizing, and dietary needs. The integration of technologies in the smart helmet application is beneficial in addressing safety measures and enhanced healthcare and monitoring of patients. For instance, in crowded areas, manual testing can be challenging hence the need for a contactless screening. The implications in real-time data analysis, concurrency, Human-Computer Interaction, remote monitoring, data security, and interdisciplinary collaboration have enhanced operation and decision-making. The knowledge, once tested, will form the basis for advanced research and implementations in various domains such as manufacturing industries. The methodology involved data capture (input), processing, and output. Materials used include thermal and optical cameras for data input, GSM and Google location applications, Arduino IDE, and mobile phone applications. The study used simulation at a mall's entry point and captured the temperature of 8 individuals. Out of the 8 individuals, 3 had high temperatures whereas the rest registered normal temperatures. Temperature measurements were verified by healthcare personnel through a second measure of temperature.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139293115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering Privacy: Harnessing Hyperledger Fabric to Safeguard EHR Systems 授权隐私:利用超级账本结构保护电子病历系统
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1292.1304
Vidhi Thakkar, Vrushank Manharlal Shah
The Blockchain boom began with the debut of Bitcoin. The application of blockchain technology is expanding rapidly. Various sectors such as supply chain, logistics, research, healthcare, government, banking, media, and entertainment have already embraced this ground-breaking, decentralized technology. The healthcare industry is at the top of the list with significant blockchain potential. This article discusses the permissioned blockchain powered by Hyperledger Fabric and its privacy-preserving features like identity mixer, multichannel, private data collections, and transient field. This study considers the EHR systems scenario and proves how these privacy protection techniques of Fabric could protect the privacy of healthcare organizations' sensitive data. We evaluate existing studies on the use of the Hyperledger Fabric framework for EHR systems. We discovered that their implementation has data privacy and user privacy concerns that can be addressed in our future studies.
区块链的繁荣始于比特币的首次亮相。区块链技术的应用正在迅速扩大。供应链、物流、研究、医疗保健、政府、银行、媒体和娱乐等各个部门已经采用了这种开创性的分散式技术。医疗保健行业是区块链潜力巨大的行业。本文讨论了由Hyperledger Fabric提供支持的许可区块链及其隐私保护功能,如身份混合器、多通道、私有数据收集和瞬态字段。本研究考虑了EHR系统场景,并证明了Fabric的这些隐私保护技术如何保护医疗保健组织敏感数据的隐私。我们评估了现有的关于在EHR系统中使用超级账本结构框架的研究。我们发现它们的实现有数据隐私和用户隐私问题,可以在我们未来的研究中解决。
{"title":"Empowering Privacy: Harnessing Hyperledger Fabric to Safeguard EHR Systems","authors":"Vidhi Thakkar, Vrushank Manharlal Shah","doi":"10.3844/jcssp.2023.1292.1304","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1292.1304","url":null,"abstract":"The Blockchain boom began with the debut of Bitcoin. The application of blockchain technology is expanding rapidly. Various sectors such as supply chain, logistics, research, healthcare, government, banking, media, and entertainment have already embraced this ground-breaking, decentralized technology. The healthcare industry is at the top of the list with significant blockchain potential. This article discusses the permissioned blockchain powered by Hyperledger Fabric and its privacy-preserving features like identity mixer, multichannel, private data collections, and transient field. This study considers the EHR systems scenario and proves how these privacy protection techniques of Fabric could protect the privacy of healthcare organizations' sensitive data. We evaluate existing studies on the use of the Hyperledger Fabric framework for EHR systems. We discovered that their implementation has data privacy and user privacy concerns that can be addressed in our future studies.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study: Algorithms for Short Message Service Classification 短信业务分类算法比较研究
Pub Date : 2023-11-01 DOI: 10.3844/jcssp.2023.1333.1344
Evaristus Didik Madyatmadja, None Aldi, Fiona Fheren, Helen Angelica, Hanny Juwitasary, David Jumpa Malem Sembiring
This research aims to classify Short Message Service (SMS) data by applying classification models that have studied SMS data to classify SMS data into SMS spam and SMS ham. The classification model is made from data mining algorithms: Naive Bayes and support vector machine. Before implementing the two algorithms, the SMS data will go through a text preprocessing stage, including data cleaning (whitespace removal, removal of punctuation, and removal of numbers), case folding, stemming, tokenizing, and stop word removal. In this research, a comparison of the accuracy of the two data mining methods will be carried out to see and get the best classification algorithm. Researchers also implemented several experiments by comparing the use of testing data by 20 and 30% and comparing the application of preprocessing stemming and without stemming. This study found that the support vector machine algorithm using testing data of 20% by applying the stemming stage had the highest accuracy rate, 97.5%.
本研究的目的是利用已经研究过的短信数据分类模型对短信数据进行分类,将短信数据分为垃圾短信和业余短信。分类模型由朴素贝叶斯和支持向量机两种数据挖掘算法组成。在实现这两种算法之前,SMS数据将经历一个文本预处理阶段,包括数据清理(删除空白、删除标点符号和删除数字)、折叠大小写、词干提取、标记化和删除停止词。在本研究中,将对两种数据挖掘方法的准确率进行比较,看看并得到最好的分类算法。研究人员还通过比较20%和30%的测试数据的使用,以及比较预处理词干和不词干的应用,进行了几个实验。本研究发现,应用词干提取阶段使用20%测试数据的支持向量机算法准确率最高,达到97.5%。
{"title":"Comparative Study: Algorithms for Short Message Service Classification","authors":"Evaristus Didik Madyatmadja, None Aldi, Fiona Fheren, Helen Angelica, Hanny Juwitasary, David Jumpa Malem Sembiring","doi":"10.3844/jcssp.2023.1333.1344","DOIUrl":"https://doi.org/10.3844/jcssp.2023.1333.1344","url":null,"abstract":"This research aims to classify Short Message Service (SMS) data by applying classification models that have studied SMS data to classify SMS data into SMS spam and SMS ham. The classification model is made from data mining algorithms: Naive Bayes and support vector machine. Before implementing the two algorithms, the SMS data will go through a text preprocessing stage, including data cleaning (whitespace removal, removal of punctuation, and removal of numbers), case folding, stemming, tokenizing, and stop word removal. In this research, a comparison of the accuracy of the two data mining methods will be carried out to see and get the best classification algorithm. Researchers also implemented several experiments by comparing the use of testing data by 20 and 30% and comparing the application of preprocessing stemming and without stemming. This study found that the support vector machine algorithm using testing data of 20% by applying the stemming stage had the highest accuracy rate, 97.5%.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135111397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1