首页 > 最新文献

Journal of ICT Research and Applications最新文献

英文 中文
Optimization of Spaced K-mer Frequency Feature Extraction using Genetic Algorithms for Metagenome Fragment Classification 基于遗传算法的元基因组片段分类空间K-mer频率特征提取优化
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-09-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.2.2
A. Pekuwali, W. Kusuma, A. Buono
K -mer frequencies are commonly used in extracting features from metagenome fragments. In spite of this, researchers have found that their use is still inefficient. In this research, a genetic algorithm was employed to find optimally spaced k -mers. These were obtained by generating the possible combinations of match positions and don’t care positions (written as *). This approach was adopted from the concept of spaced seeds in PatternHunter. The use of spaced k -mers could reduce the size of the k -mer frequency feature’s dimension. To measure the accuracy of the proposed method we used the naive Bayesian classifier (NBC). The result showed that the chromosome 111111110001, representing spaced k -mer model [111 1111 10001], was the best chromosome, with a higher fitness (85.42) than that of the k -mer frequency feature. Moreover, the proposed approach also reduced the feature extraction time.
K-mer频率通常用于从宏基因组片段中提取特征。尽管如此,研究人员发现它们的使用仍然效率低下。在这项研究中,采用遗传算法来寻找最佳间隔的k-mers。这些是通过生成匹配位置和不在乎位置的可能组合(写为*)获得的。这种方法是从PatternHunter中间隔种子的概念中采用的。使用间隔的k-mer可以减小k-mer频率特征的尺寸。为了测量所提出方法的准确性,我们使用了朴素贝叶斯分类器(NBC)。结果表明,代表间隔k-mer模型[111 1111 10001]的染色体1111 1111 0001是最好的染色体,其适应度(85.42)高于k-mer频率特征。此外,该方法还减少了特征提取时间。
{"title":"Optimization of Spaced K-mer Frequency Feature Extraction using Genetic Algorithms for Metagenome Fragment Classification","authors":"A. Pekuwali, W. Kusuma, A. Buono","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.2.2","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.2.2","url":null,"abstract":"K -mer frequencies are commonly used in extracting features from metagenome fragments. In spite of this, researchers have found that their use is still inefficient. In this research, a genetic algorithm was employed to find optimally spaced k -mers. These were obtained by generating the possible combinations of match positions and don’t care positions (written as *). This approach was adopted from the concept of spaced seeds in PatternHunter. The use of spaced k -mers could reduce the size of the k -mer frequency feature’s dimension. To measure the accuracy of the proposed method we used the naive Bayesian classifier (NBC). The result showed that the chromosome 111111110001, representing spaced k -mer model [111 1111 10001], was the best chromosome, with a higher fitness (85.42) than that of the k -mer frequency feature. Moreover, the proposed approach also reduced the feature extraction time.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"6 5-6","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41301880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Analysis of Graph Properties for Detecting Sybil Nodes in Social Networks 检测社交网络Sybil节点的图性质分析
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-09-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.2.6
Korkiat Kaewking, Sirapat Boonkrong
This research concerns the analysis of social networks using graph theory to find properties that can be used to determine Sybil nodes. This research also investigated the mixing time, which is one of the properties that many existing methods use for detecting Sybil attacks. The results showed that the mixing time does not reflect the difference between honest graphs and Sybil graphs. In addition, the properties of social graphs were studied and it was found that the average node distance is different in graphs containing Sybil nodes than in graphs with only honest nodes. Furthermore, the eigenvector centrality and the degree of Sybil nodes are correlated, while in honest nodes they are not.
本研究涉及使用图论分析社交网络,以找到可用于确定Sybil节点的属性。本研究还研究了混合时间,这是许多现有方法用于检测Sybil攻击的特性之一。结果表明,混合时间并不能反映诚实图和西比尔图之间的差异。此外,研究了社会图的性质,发现含有Sybil节点的图的平均节点距离与只有诚实节点的图不同。此外,特征向量中心性和Sybil节点的度是相关的,而在诚实节点中,它们不是。
{"title":"An Analysis of Graph Properties for Detecting Sybil Nodes in Social Networks","authors":"Korkiat Kaewking, Sirapat Boonkrong","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.2.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.2.6","url":null,"abstract":"This research concerns the analysis of social networks using graph theory to find properties that can be used to determine Sybil nodes. This research also investigated the mixing time, which is one of the properties that many existing methods use for detecting Sybil attacks. The results showed that the mixing time does not reflect the difference between honest graphs and Sybil graphs. In addition, the properties of social graphs were studied and it was found that the average node distance is different in graphs containing Sybil nodes than in graphs with only honest nodes. Furthermore, the eigenvector centrality and the degree of Sybil nodes are correlated, while in honest nodes they are not.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45504173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Word Embedding for Rhetorical Sentence Categorization on Scientific Articles 科技文章修辞句分类的词嵌入
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-09-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.2.5
G. H. Rachman, M. L. Khodra, D. H. Widyantoro
A common task in summarizing scientific articles is employing the rhetorical structure of sentences. Determining rhetorical sentences itself passes through the process of text categorization. In order to get good performance, some works in text categorization have been done by employing word embedding. This paper presents rhetorical sentence categorization of scientific articles by using word embedding to capture semantically similar words. A comparison of employing Word2Vec and GloVe is shown. First, two experiments are evaluated using five classifiers, namely Naive Bayes, Linear SVM, IBK, J48, and Maximum Entropy. Then, the best classifier from the first two experiments was employed. This research showed that Word2Vec CBOW performed better than Skip-Gram and GloVe. The best experimental result was from Word2Vec CBOW for 20,155 resource papers from ACL-ARC, features from Teufel and the previous label feature. In this experiment, Linear SVM produced the highest F-measure performance at 43.44%.
总结科学文章的一项常见任务是使用句子的修辞结构。修辞句的确定本身是经过文本分类的过程。为了获得良好的性能,在文本分类方面已经采用了单词嵌入的方法。本文提出了一种利用词嵌入来捕获语义相似词的科技文章修辞句子分类方法。显示了使用Word2Vec和GloVe的比较。首先,使用五个分类器,即朴素贝叶斯、线性SVM、IBK、J48和最大熵,对两个实验进行了评估。然后,采用前两个实验中的最佳分类器。这项研究表明,Word2Vec CBOW的表现优于Skip Gram和GloVe。最佳实验结果来自Word2Vec CBOW,用于ACL-ARC的20155篇资源论文、Teufel的功能和之前的标签功能。在这个实验中,线性SVM产生了最高的F-measure性能,为43.44%。
{"title":"Word Embedding for Rhetorical Sentence Categorization on Scientific Articles","authors":"G. H. Rachman, M. L. Khodra, D. H. Widyantoro","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.2.5","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.2.5","url":null,"abstract":"A common task in summarizing scientific articles is employing the rhetorical structure of sentences. Determining rhetorical sentences itself passes through the process of text categorization. In order to get good performance, some works in text categorization have been done by employing word embedding. This paper presents rhetorical sentence categorization of scientific articles by using word embedding to capture semantically similar words. A comparison of employing Word2Vec and GloVe is shown. First, two experiments are evaluated using five classifiers, namely Naive Bayes, Linear SVM, IBK, J48, and Maximum Entropy. Then, the best classifier from the first two experiments was employed. This research showed that Word2Vec CBOW performed better than Skip-Gram and GloVe. The best experimental result was from Word2Vec CBOW for 20,155 resource papers from ACL-ARC, features from Teufel and the previous label feature. In this experiment, Linear SVM produced the highest F-measure performance at 43.44%.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48728184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Safe Driving using Vision-based Hand Gesture Recognition System in Non-uniform Illumination Conditions 基于视觉的手势识别系统在非均匀光照条件下的安全驾驶
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-09-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.2.4
S. Anant, S. Veni
Nowadays, there is tremendous growth in in-car interfaces for driver safety and comfort, but controlling these devices while driving requires the driver’s attention. One of the solutions to reduce the number of glances at these interfaces is to design an advanced driver assistance system (ADAS). A vision-based touch-less hand gesture recognition system is proposed here for in-car human-machine interfaces (HMI). The performance of such systems is unreliable under ambient illumination conditions, which change during the course of the day. Thus, the main focus of this work was to design a system that is robust towards changing lighting conditions. For this purpose, a homomorphic filter with adaptive thresholding binarization is used. Also, gray-level edge-based segmentation ensures that it is generalized for users of different skin tones and background colors. This work was validated on selected gestures from the Cambridge Hand Gesture Database captured in five sets of non-uniform illumination conditions that closely resemble in-car illumination conditions, yielding an overall system accuracy of 91%, an average frame-by-frame accuracy of 81.38%, and a latency of 3.78 milliseconds. A prototype of the proposed system was implemented on a Raspberry Pi 3 interface together with an Android application, which demonstrated its suitability for non-critical in-car interfaces like infotainment systems.
如今,为了驾驶员的安全和舒适,车内接口有了巨大的增长,但在驾驶时控制这些设备需要驾驶员的注意力。减少对这些界面的浏览次数的解决方案之一是设计先进的驾驶员辅助系统(ADAS)。提出了一种基于视觉的车载人机界面非触摸手势识别系统。这种系统的性能在环境光照条件下是不可靠的,环境光照条件在一天中不断变化。因此,这项工作的主要重点是设计一个能够适应不断变化的照明条件的系统。为此,采用自适应阈值二值化的同态滤波器。此外,基于灰度边缘的分割确保了它对不同肤色和背景颜色的用户的泛化。这项工作在剑桥手势数据库中选择的手势进行了验证,这些手势在五组非均匀照明条件下捕获,与车内照明条件非常相似,总体系统准确率为91%,平均每帧准确率为81.38%,延迟为3.78毫秒。所提出的系统的原型在树莓派3接口上实现,并与Android应用程序一起实现,证明了它适用于信息娱乐系统等非关键车载接口。
{"title":"Safe Driving using Vision-based Hand Gesture Recognition System in Non-uniform Illumination Conditions","authors":"S. Anant, S. Veni","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.2.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.2.4","url":null,"abstract":"Nowadays, there is tremendous growth in in-car interfaces for driver safety and comfort, but controlling these devices while driving requires the driver’s attention. One of the solutions to reduce the number of glances at these interfaces is to design an advanced driver assistance system (ADAS). A vision-based touch-less hand gesture recognition system is proposed here for in-car human-machine interfaces (HMI). The performance of such systems is unreliable under ambient illumination conditions, which change during the course of the day. Thus, the main focus of this work was to design a system that is robust towards changing lighting conditions. For this purpose, a homomorphic filter with adaptive thresholding binarization is used. Also, gray-level edge-based segmentation ensures that it is generalized for users of different skin tones and background colors. This work was validated on selected gestures from the Cambridge Hand Gesture Database captured in five sets of non-uniform illumination conditions that closely resemble in-car illumination conditions, yielding an overall system accuracy of 91%, an average frame-by-frame accuracy of 81.38%, and a latency of 3.78 milliseconds. A prototype of the proposed system was implemented on a Raspberry Pi 3 interface together with an Android application, which demonstrated its suitability for non-critical in-car interfaces like infotainment systems.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44957639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography 结合逆变换LSB、RSA和Arnold变换获得安全和不可察觉的图像隐写术
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-09-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.2.1
Edi Jaya Kusuma, C. A. Sari, E. H. Rachmawanto, D. Setiadi
Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold’s transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.
可以使用密码学和隐写术来实现图像的安全。将这两种技术结合起来可以提高图像的安全性。通常,Arnold变换(ACM)用于通过随机化图像像素来加密图像。然而,仅应用变换算法不足以保护图像。在这项研究中,ACM与另一种加密技术RSA相结合,RSA具有使用大量数字的指数过程。当攻击者试图解密密码图像时,这可能会使他们感到困惑。此外,本文还提出将ACM与RSA相结合,然后将结果嵌入到具有反向两位LSB隐写术的封面图像中,该隐写术将封面图像的位平面中的两位替换为消息位。这种改进的隐写术技术可以提供先前方法的两倍容量。使用PSNR和熵作为参数来评估实验结果,以获得隐写图像和密码图像的质量。所提出的方法产生了57.8493dB的最高PSNR和7.9948的熵。
{"title":"A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography","authors":"Edi Jaya Kusuma, C. A. Sari, E. H. Rachmawanto, D. Setiadi","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.2.1","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.2.1","url":null,"abstract":"Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold’s transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46536914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Which Tech Will I Use? Trends in Students’ Use and Ownership of Technology in a Thai University, an Ongoing Study 我将使用哪种技术?泰国大学学生使用和拥有技术的趋势,一项正在进行的研究
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-09-28 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.2.3
Yuwanuch Gulateee, J. Pagram, Barbara Combes
Students’ ownership of technology devices, their access to software and Web-based utilities, and their related preferences are the subject of this ongoing research. The devices that instructors use in the classroom, how students use online learning systems as provided by the university, and students’ skill levels when using technology for learning are also included. The major objective of this research is to provide a long-term comparative analysis across one university to determine if students’ and lecturers’ use of technology for teaching-learning has changed. Such ongoing data collection and analysis will inform individual institutions about online learning and how to improve facilities for both staff and students for maximum educational success. An initial study was conducted in 2015. This paper reports on the second data collection to determine if there have been any changes over a two-year period. The findings indicate that students have intermediate skill levels when using basic software programs for their study, whereas their social media skills are advanced. Students use mobile devices (phones and tablets) to access online learning materials. Overall, most students and staff lack basic knowledge in using information technology for study purposes. It was concluded that the university should continue to conduct ongoing monitoring and evaluation of students’ and staff’s information technology competencies.
学生对技术设备的所有权、他们对软件和基于网络的实用程序的访问以及他们的相关偏好是这项正在进行的研究的主题。教师在课堂上使用的设备,学生如何使用大学提供的在线学习系统,以及学生在使用技术进行学习时的技能水平也包括在内。这项研究的主要目的是对一所大学进行长期的比较分析,以确定学生和讲师对技术教学的使用是否发生了变化。这种持续的数据收集和分析将为各个机构提供有关在线学习的信息,以及如何改善员工和学生的设施,以获得最大的教育成功。2015年进行了初步研究。本文报告了第二次数据收集,以确定两年内是否有任何变化。研究结果表明,学生在使用基本软件程序进行学习时具有中等技能水平,而他们的社交媒体技能是高级的。学生使用移动设备(手机和平板电脑)访问在线学习材料。总体而言,大多数学生和教职员工缺乏使用信息技术进行学习的基本知识。结论是,该大学应继续对学生和教职员工的信息技术能力进行持续监测和评估。
{"title":"Which Tech Will I Use? Trends in Students’ Use and Ownership of Technology in a Thai University, an Ongoing Study","authors":"Yuwanuch Gulateee, J. Pagram, Barbara Combes","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.2.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.2.3","url":null,"abstract":"Students’ ownership of technology devices, their access to software and Web-based utilities, and their related preferences are the subject of this ongoing research. The devices that instructors use in the classroom, how students use online learning systems as provided by the university, and students’ skill levels when using technology for learning are also included. The major objective of this research is to provide a long-term comparative analysis across one university to determine if students’ and lecturers’ use of technology for teaching-learning has changed. Such ongoing data collection and analysis will inform individual institutions about online learning and how to improve facilities for both staff and students for maximum educational success. An initial study was conducted in 2015. This paper reports on the second data collection to determine if there have been any changes over a two-year period. The findings indicate that students have intermediate skill levels when using basic software programs for their study, whereas their social media skills are advanced. Students use mobile devices (phones and tablets) to access online learning materials. Overall, most students and staff lack basic knowledge in using information technology for study purposes. It was concluded that the university should continue to conduct ongoing monitoring and evaluation of students’ and staff’s information technology competencies.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":" ","pages":""},"PeriodicalIF":0.6,"publicationDate":"2018-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46442421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research Methodology for Analysis of E-Commerce User Activity Based on User Interest using Web Usage Mining 基于用户兴趣的基于Web使用挖掘的电子商务用户活动分析研究方法
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.1.4
S. Diwandari, A. E. Permanasari, I. Hidayah
Visitor interaction with e-commerce websites generates large amounts of clickstream data stored in web access logs. From a business standpoint, clickstream data can be used as a means of finding information on user interest. In this paper, the authors propose a method to find user interest in products offered on e-commerce websites based on web usage mining of clickstream data. In this study, user interest was investigated using the PIE approach coupled with clustering and classification techniques. The experimental results showed that the method is able to assist in analyzing visitor behavior and user interest in e-commerce products by identifying those products that prompt visitor interest.
访问者与电子商务网站的交互产生大量的点击流数据,存储在web访问日志中。从商业的角度来看,点击流数据可以用作查找用户兴趣信息的手段。在本文中,作者提出了一种基于点击流数据的web使用挖掘的方法来发现用户对电子商务网站上提供的产品的兴趣。在本研究中,使用PIE方法结合聚类和分类技术来调查用户兴趣。实验结果表明,该方法能够通过识别引起访问者兴趣的产品,帮助分析访问者对电子商务产品的行为和用户兴趣。
{"title":"Research Methodology for Analysis of E-Commerce User Activity Based on User Interest using Web Usage Mining","authors":"S. Diwandari, A. E. Permanasari, I. Hidayah","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.1.4","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.1.4","url":null,"abstract":"Visitor interaction with e-commerce websites generates large amounts of clickstream data stored in web access logs. From a business standpoint, clickstream data can be used as a means of finding information on user interest. In this paper, the authors propose a method to find user interest in products offered on e-commerce websites based on web usage mining of clickstream data. In this study, user interest was investigated using the PIE approach coupled with clustering and classification techniques. The experimental results showed that the method is able to assist in analyzing visitor behavior and user interest in e-commerce products by identifying those products that prompt visitor interest.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"12 1","pages":"54-69"},"PeriodicalIF":0.6,"publicationDate":"2018-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48680298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Sparse Signal Reconstruction using Weight Point Algorithm 基于权重点算法的稀疏信号重构
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.1.3
Koredianto Usman, H. Gunawan, A. B. Suksmono
In this paper we propose a new approach of the compressive sensing (CS) reconstruction problem based on a geometrical interpretation of l 1 -norm minimization. By taking a large l 1 -norm value at the initial step, the intersection of l 1 -norm and the constraint curves forms a convex polytope and by exploiting the fact that any convex combination of the polytope’s vertexes gives a new point that has a smaller l 1 -norm, we are able to derive a new algorithm to solve the CS reconstruction problem. Compared to the greedy algorithm, this algorithm has better performance, especially in highly coherent environments. Compared to the convex optimization, the proposed algorithm has simpler computation requirements. We tested the capability of this algorithm in reconstructing a randomly down-sampled version of the Dow Jones Industrial Average (DJIA) index. The proposed algorithm achieved a good result but only works on real-valued signals.
本文提出了一种基于11范数最小化的几何解释的压缩感知重构问题的新方法。通过在初始步骤中取较大的1.1范数与约束曲线的交点形成凸多面体,并利用多面体顶点的任何凸组合都会得到一个具有较小1.1范数的新点的事实,我们能够推导出一种解决CS重建问题的新算法。与贪婪算法相比,该算法具有更好的性能,特别是在高相干环境下。与凸优化算法相比,该算法具有更简单的计算需求。我们在重建道琼斯工业平均指数(DJIA)的随机下采样版本中测试了该算法的能力。该算法取得了较好的效果,但仅适用于实值信号。
{"title":"Sparse Signal Reconstruction using Weight Point Algorithm","authors":"Koredianto Usman, H. Gunawan, A. B. Suksmono","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.1.3","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.1.3","url":null,"abstract":"In this paper we propose a new approach of the compressive sensing (CS) reconstruction problem based on a geometrical interpretation of l 1 -norm minimization. By taking a large l 1 -norm value at the initial step, the intersection of l 1 -norm and the constraint curves forms a convex polytope and by exploiting the fact that any convex combination of the polytope’s vertexes gives a new point that has a smaller l 1 -norm, we are able to derive a new algorithm to solve the CS reconstruction problem. Compared to the greedy algorithm, this algorithm has better performance, especially in highly coherent environments. Compared to the convex optimization, the proposed algorithm has simpler computation requirements. We tested the capability of this algorithm in reconstructing a randomly down-sampled version of the Dow Jones Industrial Average (DJIA) index. The proposed algorithm achieved a good result but only works on real-valued signals.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"12 1","pages":"35-53"},"PeriodicalIF":0.6,"publicationDate":"2018-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44184722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Overcoming Alignment Problem in Non-Identical Mathematical Support Visual Cryptography Schemes 克服非完全相同数学支持可视化密码方案中的对齐问题
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.1.6
A. Barmawi, Widhian Bramantya
An important problem in visual cryptography is the alignment problem. Although Liu, et al. have proposed a method for aligning the shares, there is still a problem with the non-identical mathematical support visual cryptography schemes. For overcoming this problem, the Three-Orthogonal-Point (3OP) method is proposed in this paper. Based on the experimental result it was proven that it can overcome the alignment problem, while the time complexity for aligning the shares is decreased significantly from O((m×A) 2 ) to O(m×AI) , for AI < A. The security is maintained, since an attacker cannot obtain any information related to the secret image.
视觉密码学中的一个重要问题是对齐问题。虽然Liu等人已经提出了一种对齐共享的方法,但是在不相同的数学支持视觉加密方案中仍然存在一个问题。为了克服这一问题,本文提出了三正交点(3OP)方法。实验结果证明,该方法可以克服对齐问题,同时对于AI < a,对齐共享的时间复杂度从O((m×A) 2)显著降低到O(m×AI),因为攻击者无法获得与秘密图像相关的任何信息,因此保持了安全性。
{"title":"Overcoming Alignment Problem in Non-Identical Mathematical Support Visual Cryptography Schemes","authors":"A. Barmawi, Widhian Bramantya","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.1.6","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.1.6","url":null,"abstract":"An important problem in visual cryptography is the alignment problem. Although Liu, et al. have proposed a method for aligning the shares, there is still a problem with the non-identical mathematical support visual cryptography schemes. For overcoming this problem, the Three-Orthogonal-Point (3OP) method is proposed in this paper. Based on the experimental result it was proven that it can overcome the alignment problem, while the time complexity for aligning the shares is decreased significantly from O((m×A) 2 ) to O(m×AI) , for AI < A. The security is maintained, since an attacker cannot obtain any information related to the secret image.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"12 1","pages":"87-102"},"PeriodicalIF":0.6,"publicationDate":"2018-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43075019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing the Stability of the Improved-LEACH Routing Protocol for WSNs 提高改进的LEACH路由协议在无线传感器网络中的稳定性
IF 0.6 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2018-04-30 DOI: 10.5614/ITBJ.ICT.RES.APPL.2018.12.1.1
Ammar S. Al-Zubaidi, Ahmad Ariffin, Abdulrahman K. Al-Qadhi
Recently, increasing battery lifetime in wireless sensor networks has turned out to be one of the major challenges faced by researchers. The sensor nodes in wireless sensor networks use a battery as their power source, which is hard to replace during deployment. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the most prominent wireless sensor network routing protocols that have been proposed to improve network lifetime by utilizing energy-efficient clustering. However, LEACH has some issues related to cluster-head selection, where the selection is done randomly. This leads to rapid loss of energy in the network. Improved LEACH is a LEACH alternative that has the ability to increase network lifetime by using the nodes’ residual energy and their distance to the base station to select cluster-head nodes. However, Improved LEACH causes reduced stability, where the stability period is the duration before the death of the first node. The network stability period is important for applications that require reliable feedback from the network. Thus, we were motivated to investigate the Improved LEACH algorithm and to try to solve the stability problem. A new protocol is proposed in this paper: Stable Improved Low Energy Adaptive Clustering Hierarchy (SILEACH), which was developed to overcome the flaws of the Improved LEACH protocol. SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. The simulation results revealed that SILEACH is significantly more efficient than Improved LEACH in terms of stability period and network lifetime.
近年来,提高无线传感器网络的电池寿命已成为研究人员面临的主要挑战之一。无线传感器网络中的传感器节点使用电池作为其电源,电池在部署过程中难以更换。低能量自适应聚类层次(LEACH)是无线传感器网络路由协议中最重要的一种,它通过利用节能聚类来提高网络的生存时间。然而,LEACH有一些与簇头选择相关的问题,其中选择是随机进行的。这将导致网络中能量的快速损失。改进的LEACH是一种LEACH替代方案,它能够通过使用节点的剩余能量和它们到基站的距离来选择簇头节点来增加网络寿命。然而,改进的LEACH导致稳定性降低,其中稳定周期是第一个节点死亡之前的持续时间。对于需要从网络获得可靠反馈的应用来说,网络稳定周期非常重要。因此,我们有动机研究改进的LEACH算法,并尝试解决稳定性问题。本文提出了一种新的协议:稳定改进的低能量自适应聚类层次(SILEACH)协议,该协议是为了克服改进LEACH协议的缺陷而开发的。SILEACH通过考虑节点到基站的距离及其剩余能量来选择簇头节点,并考虑节点到簇头和基站的距离来组成簇的优化方法来平衡节点之间的负载。仿真结果表明,SILEACH在稳定周期和网络寿命方面都明显优于Improved LEACH。
{"title":"Enhancing the Stability of the Improved-LEACH Routing Protocol for WSNs","authors":"Ammar S. Al-Zubaidi, Ahmad Ariffin, Abdulrahman K. Al-Qadhi","doi":"10.5614/ITBJ.ICT.RES.APPL.2018.12.1.1","DOIUrl":"https://doi.org/10.5614/ITBJ.ICT.RES.APPL.2018.12.1.1","url":null,"abstract":"Recently, increasing battery lifetime in wireless sensor networks has turned out to be one of the major challenges faced by researchers. The sensor nodes in wireless sensor networks use a battery as their power source, which is hard to replace during deployment. Low Energy Adaptive Clustering Hierarchy (LEACH) is one of the most prominent wireless sensor network routing protocols that have been proposed to improve network lifetime by utilizing energy-efficient clustering. However, LEACH has some issues related to cluster-head selection, where the selection is done randomly. This leads to rapid loss of energy in the network. Improved LEACH is a LEACH alternative that has the ability to increase network lifetime by using the nodes’ residual energy and their distance to the base station to select cluster-head nodes. However, Improved LEACH causes reduced stability, where the stability period is the duration before the death of the first node. The network stability period is important for applications that require reliable feedback from the network. Thus, we were motivated to investigate the Improved LEACH algorithm and to try to solve the stability problem. A new protocol is proposed in this paper: Stable Improved Low Energy Adaptive Clustering Hierarchy (SILEACH), which was developed to overcome the flaws of the Improved LEACH protocol. SILEACH balances the load between the nodes by utilizing an optimized method that considers the nodes’ distance to the base station and their residual energy to select the cluster-head nodes and considers the nodes’ distance to the cluster head and the base station to form clusters. The simulation results revealed that SILEACH is significantly more efficient than Improved LEACH in terms of stability period and network lifetime.","PeriodicalId":42785,"journal":{"name":"Journal of ICT Research and Applications","volume":"12 1","pages":"1-13"},"PeriodicalIF":0.6,"publicationDate":"2018-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45291468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
Journal of ICT Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1