Mariam A. Alterkait, A. Almutarie, Manal Y. Alduaij
This paper aims to explore Kuwaiti users' perspectives and experiences with Shlonik, the mandatory contact tracing application that was used during the COVID-19 pandemic. A sample of 2,450 tweets about users' experiences was collected and thematically analyzed. The analysis used DeLone and McLean's information system success model to explore aspects of the degree to which this app can be judged a “success,” using parameters of system quality and service quality. A novel finding identified by this qualitative study was the significance of themes identified in the analysis such as social privacy (timing, privacy, and female privacy, which are related to the cultural and religious norms of Kuwait) and technical privacy (related to data protection). The research identified significant conflict with cultural and social norms in users' experience of the Shlonik app – factors not normally identified or discussed in existing literature. This research supports a need for improved strategies and designs in future m-government applications in developing countries.
{"title":"Thematic Analysis of User Experience of Contact Tracing Applications for COVID-19 Using Twitter Data","authors":"Mariam A. Alterkait, A. Almutarie, Manal Y. Alduaij","doi":"10.4018/jcit.335946","DOIUrl":"https://doi.org/10.4018/jcit.335946","url":null,"abstract":"This paper aims to explore Kuwaiti users' perspectives and experiences with Shlonik, the mandatory contact tracing application that was used during the COVID-19 pandemic. A sample of 2,450 tweets about users' experiences was collected and thematically analyzed. The analysis used DeLone and McLean's information system success model to explore aspects of the degree to which this app can be judged a “success,” using parameters of system quality and service quality. A novel finding identified by this qualitative study was the significance of themes identified in the analysis such as social privacy (timing, privacy, and female privacy, which are related to the cultural and religious norms of Kuwait) and technical privacy (related to data protection). The research identified significant conflict with cultural and social norms in users' experience of the Shlonik app – factors not normally identified or discussed in existing literature. This research supports a need for improved strategies and designs in future m-government applications in developing countries.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"62 5","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Alrashidi, Ali Selamat, R. Ibrahim, Hamido Fujita
The Internet's rapid growth has led to information overload, necessitating recommender systems for personalized suggestions. While content-based and collaborative filtering have been successful, data sparsity remains a challenge. To address this, this article presents a novel social recommender system based on convolutional neural networks (SRSCNN). This approach integrates deep learning and contextual information to overcome data sparsity. The SRSCNN model incorporates user and item factors obtained from a neural network architecture, utilizing features from item titles and tags through a CNN. The authors conducted extensive experiments with the MovieLens 10M dataset, demonstrating that the SRSCNN approach outperforms state-of-the-art baselines. This improvement is evident in both rating prediction and ranking accuracy across recommendation lists of varying lengths.
{"title":"Social Recommender System Based on CNN Incorporating Tagging and Contextual Features","authors":"Muhammad Alrashidi, Ali Selamat, R. Ibrahim, Hamido Fujita","doi":"10.4018/jcit.335524","DOIUrl":"https://doi.org/10.4018/jcit.335524","url":null,"abstract":"The Internet's rapid growth has led to information overload, necessitating recommender systems for personalized suggestions. While content-based and collaborative filtering have been successful, data sparsity remains a challenge. To address this, this article presents a novel social recommender system based on convolutional neural networks (SRSCNN). This approach integrates deep learning and contextual information to overcome data sparsity. The SRSCNN model incorporates user and item factors obtained from a neural network architecture, utilizing features from item titles and tags through a CNN. The authors conducted extensive experiments with the MovieLens 10M dataset, demonstrating that the SRSCNN approach outperforms state-of-the-art baselines. This improvement is evident in both rating prediction and ranking accuracy across recommendation lists of varying lengths.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"68 44","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139449018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lai Xin, Liang Chang Sheng, Jiayu Feng, Hengyan Zhang
ICAO has emphasized that aeronautical information agencies should provide digitized aeronautical data and information, and realize that aeronautical data exchanging internationally in AIM. The AIXM structured aeronautical information dataset will be the main source of aeronautical basic data in the aeronautical information exchange network. In this article, the authors first analyze the spatio-temporal attributes of AIXM dataset and design the query method of AIXM structured obstacle data based on the research of AIXM coding specification. Secondly, the helicopter path planning is taken as the research scenario. Using the AIXM obstacle dataset and route dataset, combining the helicopter performance constraints to construct the envelope frame for collision judgment, and a new path planning method with improving the classical A* algorithm based on the AIXM dataset is proposed. The proposed method is validated and visualized. The validation results show that the proposed method reduces the frequency of helicopter turning, and ensures the safe distance between the flight path and the obstacles.
{"title":"A Helicopter Path Planning Method Based on AIXM Dataset","authors":"Lai Xin, Liang Chang Sheng, Jiayu Feng, Hengyan Zhang","doi":"10.4018/jcit.333469","DOIUrl":"https://doi.org/10.4018/jcit.333469","url":null,"abstract":"ICAO has emphasized that aeronautical information agencies should provide digitized aeronautical data and information, and realize that aeronautical data exchanging internationally in AIM. The AIXM structured aeronautical information dataset will be the main source of aeronautical basic data in the aeronautical information exchange network. In this article, the authors first analyze the spatio-temporal attributes of AIXM dataset and design the query method of AIXM structured obstacle data based on the research of AIXM coding specification. Secondly, the helicopter path planning is taken as the research scenario. Using the AIXM obstacle dataset and route dataset, combining the helicopter performance constraints to construct the envelope frame for collision judgment, and a new path planning method with improving the classical A* algorithm based on the AIXM dataset is proposed. The proposed method is validated and visualized. The validation results show that the proposed method reduces the frequency of helicopter turning, and ensures the safe distance between the flight path and the obstacles.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"120 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ping Zhang, Changrong Lv, Qingying Li, Bori Cong, Jian Liu
With the advent of the information age, the traditional pavement management technology of operating expressways can no longer meet the higher requirements for the improvement of engineering quality in the information age. This paper proposes a method of integrated analysis based on BIM (building information modeling) and GIS (geographic information system), builds an intelligent platform for highway operation and maintenance, and solves the problem of data islands in highway maintenance and management.
{"title":"Research on Intelligent Platform Construction and Pavement Management of Expressway Operation and Maintenance Based on BIM+GIS Technology","authors":"Ping Zhang, Changrong Lv, Qingying Li, Bori Cong, Jian Liu","doi":"10.4018/jcit.332879","DOIUrl":"https://doi.org/10.4018/jcit.332879","url":null,"abstract":"With the advent of the information age, the traditional pavement management technology of operating expressways can no longer meet the higher requirements for the improvement of engineering quality in the information age. This paper proposes a method of integrated analysis based on BIM (building information modeling) and GIS (geographic information system), builds an intelligent platform for highway operation and maintenance, and solves the problem of data islands in highway maintenance and management.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135326092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A dynamic mutation probability formula is utilized to optimize the model. In order to solve the logistics warehouse path problem, the ant colony optimization algorithm, optimized by a genetic algorithm, is employed to construct a logistics warehouse path optimization model. This model effectively optimizes the logistics warehouse paths. Test results comparing the convergence and distribution of non-inferior solutions demonstrated that the proposed model outperforms others in terms of convergence and non-inferior solution distribution. In practical logistics warehouse optimization, applying the proposed model to optimize cargo locations can significantly enhance the effectiveness of the objective function. The optimization resulted in improvements for all four objective functions related to cargo location, with reduction rates of 10.38%, 30.88%, 51.78%, and 88.49%, respectively. For the optimization of logistics warehouse paths, the original distance was 47.6m, which was reduced to 27.8m after optimization. Consequently, the picking distance decreased by 41.60%.
{"title":"Big Data Swarm Intelligence Optimization Algorithm Application in the Intelligent Management of an E-Commerce Logistics Warehouse","authors":"Zhi Chen, Jie Liu, Ying Wang","doi":"10.4018/jcit.332809","DOIUrl":"https://doi.org/10.4018/jcit.332809","url":null,"abstract":"A dynamic mutation probability formula is utilized to optimize the model. In order to solve the logistics warehouse path problem, the ant colony optimization algorithm, optimized by a genetic algorithm, is employed to construct a logistics warehouse path optimization model. This model effectively optimizes the logistics warehouse paths. Test results comparing the convergence and distribution of non-inferior solutions demonstrated that the proposed model outperforms others in terms of convergence and non-inferior solution distribution. In practical logistics warehouse optimization, applying the proposed model to optimize cargo locations can significantly enhance the effectiveness of the objective function. The optimization resulted in improvements for all four objective functions related to cargo location, with reduction rates of 10.38%, 30.88%, 51.78%, and 88.49%, respectively. For the optimization of logistics warehouse paths, the original distance was 47.6m, which was reduced to 27.8m after optimization. Consequently, the picking distance decreased by 41.60%.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"454 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134906959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The technological advancements have enormously changed the way humans live today. According to literature studies, countries that have placed a strong emphasis on the IT revolution could benefit from the rewards of the industrialization era. The study's conclusions have drawn attention to Kosovo's lack of computer applications and IT integration in its educational system. The facts highlighted that Kosovo faces a lack of incorporations of computer application and IT in their educational system. There exists a significant disparity between the public and private educational institutes in this nation in terms of emphasis on IT in their educational system. It has been observed that more emphasis is being given in private sector educational institutes on IT incorporation in these schools and associated curriculums. The survey research has been conducted in person in schools and universities of Kosovo.
{"title":"A Scholar Case Study of IT Education Knowledge Through Practice for Development in a Post-Conflict Region Kosovo","authors":"Halime Cocaj","doi":"10.4018/jcit.330127","DOIUrl":"https://doi.org/10.4018/jcit.330127","url":null,"abstract":"The technological advancements have enormously changed the way humans live today. According to literature studies, countries that have placed a strong emphasis on the IT revolution could benefit from the rewards of the industrialization era. The study's conclusions have drawn attention to Kosovo's lack of computer applications and IT integration in its educational system. The facts highlighted that Kosovo faces a lack of incorporations of computer application and IT in their educational system. There exists a significant disparity between the public and private educational institutes in this nation in terms of emphasis on IT in their educational system. It has been observed that more emphasis is being given in private sector educational institutes on IT incorporation in these schools and associated curriculums. The survey research has been conducted in person in schools and universities of Kosovo.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135826184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Log anomaly detection holds great significance in computer systems and network security. A large amount of log data is generated in the background of various information systems and equipment, so automated methods are required to identify abnormal behavior that may indicate security threats or system malfunctions. The traditional anomaly detection methods usually rely on manual statistical discovery, or match by regular expression which are complex and time-consuming. To prevent system failures, minimize troubleshooting time, and reduce service interruptions, a log template-based anomaly detection method has been proposed in this context. This approach leverages log template extraction, log clustering, and classification technology to timely detect abnormal events within the information system. The effectiveness of this method has been thoroughly tested and compared against traditional log anomaly detection systems. The results demonstrate improvements in log analysis depth, event recognition accuracy, and overall efficiency.
{"title":"An Intelligent Framework for Log Anomaly Detection Based on Log Template Extraction","authors":"Lei Pan, Huichang Zhu","doi":"10.4018/jcit.330145","DOIUrl":"https://doi.org/10.4018/jcit.330145","url":null,"abstract":"Log anomaly detection holds great significance in computer systems and network security. A large amount of log data is generated in the background of various information systems and equipment, so automated methods are required to identify abnormal behavior that may indicate security threats or system malfunctions. The traditional anomaly detection methods usually rely on manual statistical discovery, or match by regular expression which are complex and time-consuming. To prevent system failures, minimize troubleshooting time, and reduce service interruptions, a log template-based anomaly detection method has been proposed in this context. This approach leverages log template extraction, log clustering, and classification technology to timely detect abnormal events within the information system. The effectiveness of this method has been thoroughly tested and compared against traditional log anomaly detection systems. The results demonstrate improvements in log analysis depth, event recognition accuracy, and overall efficiency.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135826205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the operation of petrochemical plants, safety operation is the top priority, especially for the control of fire operation. In this paper, based on the real hot work in petrochemical plants, based on the extraction methods of different edge operators, the compound analysis of different edge operators can be carried out to visually detect the hot work of petrochemical workers in petrochemical plants, and based on the neural network algorithm, the convolution operation of edge data is carried out, and the data is input into the hot work database to build the hot work database and identify the flame. Remind the hot operation, according to the size of the flame to make a preliminary judgment on whether the danger, combined with the characteristics of the petrochemical device itself to add smoke identification. This method is of great significance to improve the thermal safety monitoring level of petrochemical plant.
{"title":"Research on Hot Operation of a Petrochemical Plant Based on Compound Edge Operator","authors":"Zhipeng Liu","doi":"10.4018/jcit.328768","DOIUrl":"https://doi.org/10.4018/jcit.328768","url":null,"abstract":"In the operation of petrochemical plants, safety operation is the top priority, especially for the control of fire operation. In this paper, based on the real hot work in petrochemical plants, based on the extraction methods of different edge operators, the compound analysis of different edge operators can be carried out to visually detect the hot work of petrochemical workers in petrochemical plants, and based on the neural network algorithm, the convolution operation of edge data is carried out, and the data is input into the hot work database to build the hot work database and identify the flame. Remind the hot operation, according to the size of the flame to make a preliminary judgment on whether the danger, combined with the characteristics of the petrochemical device itself to add smoke identification. This method is of great significance to improve the thermal safety monitoring level of petrochemical plant.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49012211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bukhary Ikhwan Ismail, Muhammad Nurmahir Mohamad Sehmi, Hishamadie Ahmad, Shahrol Hisham Baharom, Mohammad Fairus Khalid
Automation in agriculture has vast potential to enhance productivity in the industry. Incorporating agricultural robotics can significantly improve work efficiency, enhance product quality, reduce expenses, and minimize manual labor. Despite significant advancements in robotic and sensing technologies, their practical implementation in agriculture, particularly in the palm oil sector, remains limited primarily to laboratories and spin-off companies. The utilization of robots in the palm oil complex agricultural environment presents more significant challenges than conventional flat agricultural landscapes, primarily due to the unstructured nature of agricultural settings. Complex coordination is required to address the need for collaboration with human workers, establish long-distance communication networks, and enable autonomous navigation in areas far from power sources. This article explores the various environmental challenges in oil palm plantation estates and in-field operations and proposes a robot built from an all-terrain vehicle into an agricultural robot.
{"title":"Robotic Research Platform for Agricultural Environment","authors":"Bukhary Ikhwan Ismail, Muhammad Nurmahir Mohamad Sehmi, Hishamadie Ahmad, Shahrol Hisham Baharom, Mohammad Fairus Khalid","doi":"10.4018/jcit.328579","DOIUrl":"https://doi.org/10.4018/jcit.328579","url":null,"abstract":"Automation in agriculture has vast potential to enhance productivity in the industry. Incorporating agricultural robotics can significantly improve work efficiency, enhance product quality, reduce expenses, and minimize manual labor. Despite significant advancements in robotic and sensing technologies, their practical implementation in agriculture, particularly in the palm oil sector, remains limited primarily to laboratories and spin-off companies. The utilization of robots in the palm oil complex agricultural environment presents more significant challenges than conventional flat agricultural landscapes, primarily due to the unstructured nature of agricultural settings. Complex coordination is required to address the need for collaboration with human workers, establish long-distance communication networks, and enable autonomous navigation in areas far from power sources. This article explores the various environmental challenges in oil palm plantation estates and in-field operations and proposes a robot built from an all-terrain vehicle into an agricultural robot.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44501696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muktar Abdella Jiru, Ketema Adere, T. Gopi Krishna, J. R. Perumalla
The present work proposed an improved switch migration method (ISMM) for balancing the controller load to migrate the switch from overloaded to under-loaded controller. This method is used on each controller during controller load balance in order to decide the state of controllers. The implementation was conducted using the Mininet simulation tool. The performance of the proposed solution has been evaluated by using throughput, response time, and packet loss metrics. Accordingly, the simulation results indicated that this method has improved throughput by 7.6% over SSMS and 1.8% over CAMD, improved response time 8.3% over SSMS and 4% over CAMD, and improved the packet loss 8% over SSMS and 1.3% over CAMD during the incoming traffic load between 501p/s and 5000p/s. Thus, the performance of ISMM has shown efficient results over SSMS and CAMD among all assessed metrics by balancing the load between controllers.
{"title":"An Improved Switch Migration Method-Based Efficient Load Balancing for Multiple Controllers in Software-Defined Networks","authors":"Muktar Abdella Jiru, Ketema Adere, T. Gopi Krishna, J. R. Perumalla","doi":"10.4018/jcit.326136","DOIUrl":"https://doi.org/10.4018/jcit.326136","url":null,"abstract":"The present work proposed an improved switch migration method (ISMM) for balancing the controller load to migrate the switch from overloaded to under-loaded controller. This method is used on each controller during controller load balance in order to decide the state of controllers. The implementation was conducted using the Mininet simulation tool. The performance of the proposed solution has been evaluated by using throughput, response time, and packet loss metrics. Accordingly, the simulation results indicated that this method has improved throughput by 7.6% over SSMS and 1.8% over CAMD, improved response time 8.3% over SSMS and 4% over CAMD, and improved the packet loss 8% over SSMS and 1.3% over CAMD during the incoming traffic load between 501p/s and 5000p/s. Thus, the performance of ISMM has shown efficient results over SSMS and CAMD among all assessed metrics by balancing the load between controllers.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":" ","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47168106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}