首页 > 最新文献

2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

英文 中文
Exploring the Influence of Organizational Context on Cross-boundary Information-Sharing Initiatives: The Case of the Saudi’s Government Secure Bus 探讨组织情境对跨界信息共享举措的影响:以沙特政府安全巴士为例
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00036
Mohammed A. Gharawi, Hashim H. Alneami
This study addresses the organizational factors influencing cross-boundary information sharing (CBIS) initiatives within the context of Saudi Arabia (SA). The study starts by synthesizing the pertinent literature toward implementing an integrated model for the organizational factors influencing CBIS. A qualitative research approach was used to guide the research and the data was collected using interviews and documentation. The study shows that the adoption of the Government Secure Bus (GSB), implemented to facilitate information sharing between government agencies in SA, is influenced by nine factors identified by previous research. These factors include goals and interests of participating organizations, trust, executive support, risks, costs, benefits, authority and hierarchical structures, organizational culture, and leadership. Additionally, the study pointed to three additional factors that influence GSB adoption. The additional factors include mimetic pressures, e-government transformation measurement, and organizations’ perception of data quality.
本研究探讨了影响沙特阿拉伯(SA)背景下跨境信息共享(CBIS)举措的组织因素。本研究首先综合相关文献,以建立影响主观认知行为的组织因素整合模型。采用定性研究方法指导研究,并通过访谈和文献收集数据。研究表明,政府安全总线(GSB)的采用是为了促进SA政府机构之间的信息共享,受先前研究确定的九个因素的影响。这些因素包括参与组织的目标和利益、信任、执行支持、风险、成本、收益、权力和等级结构、组织文化和领导力。此外,该研究还指出了影响GSB采用的另外三个因素。其他因素包括模仿压力、电子政务转换度量和组织对数据质量的感知。
{"title":"Exploring the Influence of Organizational Context on Cross-boundary Information-Sharing Initiatives: The Case of the Saudi’s Government Secure Bus","authors":"Mohammed A. Gharawi, Hashim H. Alneami","doi":"10.1109/ICICT50521.2020.00036","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00036","url":null,"abstract":"This study addresses the organizational factors influencing cross-boundary information sharing (CBIS) initiatives within the context of Saudi Arabia (SA). The study starts by synthesizing the pertinent literature toward implementing an integrated model for the organizational factors influencing CBIS. A qualitative research approach was used to guide the research and the data was collected using interviews and documentation. The study shows that the adoption of the Government Secure Bus (GSB), implemented to facilitate information sharing between government agencies in SA, is influenced by nine factors identified by previous research. These factors include goals and interests of participating organizations, trust, executive support, risks, costs, benefits, authority and hierarchical structures, organizational culture, and leadership. Additionally, the study pointed to three additional factors that influence GSB adoption. The additional factors include mimetic pressures, e-government transformation measurement, and organizations’ perception of data quality.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection: Issues, Problems and Solutions 入侵检测:问题、问题和解决方案
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00070
O. A. Adeleke
Computers have become ubiquitous. They now control some of our most complicated industrial systems and they are also used in virtually every field of human endeavor today, to store, process and transfer sensitive data. However, this increased popularity of computers and internet, has also increased the severity and consequences of possible intrusion by malicious actors. Furthermore, the level of sophistication of intrusive attacks seen, continues to increase at a very high rate, making it more difficult for organizations to stay ahead of attackers. These factors make the study of intrusion detection very important. Therefore, in this paper, we carry out a detail study of intrusion detection, discussing popular attacks, examining problems associated with their detection and exploring possible solutions.
电脑已经无处不在。它们现在控制着我们一些最复杂的工业系统,它们也被用于当今人类活动的几乎每个领域,以存储、处理和传输敏感数据。然而,计算机和互联网的日益普及,也增加了恶意行为者可能入侵的严重性和后果。此外,所看到的侵入性攻击的复杂程度继续以非常高的速度增长,这使得组织更难以领先于攻击者。这些因素使得入侵检测的研究变得非常重要。因此,在本文中,我们对入侵检测进行了详细的研究,讨论了流行的攻击,研究了与入侵检测相关的问题,并探索了可能的解决方案。
{"title":"Intrusion Detection: Issues, Problems and Solutions","authors":"O. A. Adeleke","doi":"10.1109/ICICT50521.2020.00070","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00070","url":null,"abstract":"Computers have become ubiquitous. They now control some of our most complicated industrial systems and they are also used in virtually every field of human endeavor today, to store, process and transfer sensitive data. However, this increased popularity of computers and internet, has also increased the severity and consequences of possible intrusion by malicious actors. Furthermore, the level of sophistication of intrusive attacks seen, continues to increase at a very high rate, making it more difficult for organizations to stay ahead of attackers. These factors make the study of intrusion detection very important. Therefore, in this paper, we carry out a detail study of intrusion detection, discussing popular attacks, examining problems associated with their detection and exploring possible solutions.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Short-Term Prediction Model for Multi-currency Exchange Using Artificial Neural Network 基于人工神经网络的多币种汇兑短期预测模型
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00024
Isha Zameer Memon, Shahnawaz Talpur, Sanam Narejo, Aisha Zahid Junejo, Engr. Fawwad Hassan
Forecasting the exchange rates is a serious issue that is getting expanding consideration particularly as a result of its trouble and pragmatic applications. Artificial neural networks (ANNs) have been generally utilized as a promising elective methodology for an anticipating task as a result of a few recognized highlights. Research endeavors on ANNs for gauging exchange rates are extensive. In this paper, we endeavor to give a review of research around there. A few structure factors fundamentally sway the exactness of neural network gauges. These elements incorporate the determination of information factors, getting ready information, and network design. There is no accord about the components. In various cases, different choices have their own adequacy. We additionally depict the combination of ANNs with different strategies and report the correlation between exhibitions of ANNs also, those of other anticipating techniques, and finding blended outcomes. At long last, what's to come inquire about headings around there are examined. This paper presents the forecast of top exchanged monetary utilizing diverse Machine learning models which incorporate top foreign exchange (Forex) monetary standards utilizing a hybrid comparison of Support Vector Regressor (SVR) and Artificial Neural Network (ANN), Short-Term Memory (STM), and Neural Network with Hidden Layers. They anticipate the exchange rate between world's top exchanged monetary forms, for example, USD/PKR, from information by day, 30-39 years till December 2018.
汇率预测是一个严肃的问题,特别是由于其麻烦和实际应用而受到越来越广泛的关注。由于一些公认的亮点,人工神经网络(ann)已被普遍用作预测任务的有前途的选修方法。对人工神经网络用于衡量汇率的研究是广泛的。本文试图对这方面的研究进行综述。一些结构因素从根本上影响神经网络测量的精度。这些要素包括信息因素的确定、准备信息和网络设计。组件没有达成一致。在各种情况下,不同的选择都有其充分性。此外,我们还描述了具有不同策略的人工神经网络的组合,并报告了人工神经网络的展示与其他预测技术的展示之间的相关性,并发现混合结果。最后,什么是来询问周围的标题检查。本文利用不同的机器学习模型提出了顶级交换货币的预测,这些模型结合了顶级外汇(Forex)货币标准,利用支持向量回归器(SVR)和人工神经网络(ANN)、短期记忆(STM)和隐层神经网络的混合比较。他们预测到2018年12月,从30-39年的每日信息来看,世界主要货币形式(例如美元/巴基斯坦卢比)之间的汇率。
{"title":"Short-Term Prediction Model for Multi-currency Exchange Using Artificial Neural Network","authors":"Isha Zameer Memon, Shahnawaz Talpur, Sanam Narejo, Aisha Zahid Junejo, Engr. Fawwad Hassan","doi":"10.1109/ICICT50521.2020.00024","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00024","url":null,"abstract":"Forecasting the exchange rates is a serious issue that is getting expanding consideration particularly as a result of its trouble and pragmatic applications. Artificial neural networks (ANNs) have been generally utilized as a promising elective methodology for an anticipating task as a result of a few recognized highlights. Research endeavors on ANNs for gauging exchange rates are extensive. In this paper, we endeavor to give a review of research around there. A few structure factors fundamentally sway the exactness of neural network gauges. These elements incorporate the determination of information factors, getting ready information, and network design. There is no accord about the components. In various cases, different choices have their own adequacy. We additionally depict the combination of ANNs with different strategies and report the correlation between exhibitions of ANNs also, those of other anticipating techniques, and finding blended outcomes. At long last, what's to come inquire about headings around there are examined. This paper presents the forecast of top exchanged monetary utilizing diverse Machine learning models which incorporate top foreign exchange (Forex) monetary standards utilizing a hybrid comparison of Support Vector Regressor (SVR) and Artificial Neural Network (ANN), Short-Term Memory (STM), and Neural Network with Hidden Layers. They anticipate the exchange rate between world's top exchanged monetary forms, for example, USD/PKR, from information by day, 30-39 years till December 2018.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
mpiPython: A Robust Python MPI Binding mpiPython:一个健壮的Python MPI绑定
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00023
Hee-Cheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee
For the last two decades, Python has become one of the most popular programming languages and been used to develop and analyze data-intensive scientific and engineering applications and in the areas such as Bigdata Analytics, Social Media, Data Science, Physics, Psychology, Healthcare, Political Science, etc. Moreover, demand of supporting Python data-parallel applications for those areas is rapidly growing. There have been international efforts to produce a message passing interface for Python bindings to support parallel computing, but specific challenges still remain to improve Python bindings. The main purpose of this paper is to introduce our MPI Python binding, called mpiPython, with the MPI standard communication API. In this paper, we first will discuss the design issues of the mpiPython API, associated with its development. In the second part of the paper, we will discuss node/parallel performance to compare mpiPython to other MPI bindings on a Linux cluster and can expect mpiPython achieves quite acceptable performance.
在过去的二十年里,Python已经成为最流行的编程语言之一,并被用于开发和分析数据密集型科学和工程应用程序,以及大数据分析、社交媒体、数据科学、物理学、心理学、医疗保健、政治学等领域。此外,这些领域对支持Python数据并行应用程序的需求正在迅速增长。国际上一直在努力为Python绑定生成一个消息传递接口来支持并行计算,但是在改进Python绑定方面仍然存在一些具体的挑战。本文的主要目的是介绍我们的MPI Python绑定(称为mpiPython)与MPI标准通信API。在本文中,我们将首先讨论与开发相关的mpiPython API的设计问题。在本文的第二部分,我们将讨论节点/并行性能,将mpiPython与Linux集群上的其他MPI绑定进行比较,并期望mpiPython获得相当可接受的性能。
{"title":"mpiPython: A Robust Python MPI Binding","authors":"Hee-Cheon Park, Joshus DeNio, Jeongyun Choi, Hanku Lee","doi":"10.1109/ICICT50521.2020.00023","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00023","url":null,"abstract":"For the last two decades, Python has become one of the most popular programming languages and been used to develop and analyze data-intensive scientific and engineering applications and in the areas such as Bigdata Analytics, Social Media, Data Science, Physics, Psychology, Healthcare, Political Science, etc. Moreover, demand of supporting Python data-parallel applications for those areas is rapidly growing. There have been international efforts to produce a message passing interface for Python bindings to support parallel computing, but specific challenges still remain to improve Python bindings. The main purpose of this paper is to introduce our MPI Python binding, called mpiPython, with the MPI standard communication API. In this paper, we first will discuss the design issues of the mpiPython API, associated with its development. In the second part of the paper, we will discuss node/parallel performance to compare mpiPython to other MPI bindings on a Linux cluster and can expect mpiPython achieves quite acceptable performance.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134435268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Analysis of Keystroke Dynamics Using Classification Algorithms 基于分类算法的击键动力学性能分析
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00027
Alaa Darabseh, Doyel Pal
Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It can be used to authenticate legitimate users based on their unique typing style on the keyboard. From a pattern recognition point of view, user authentication using keystroke dynamics is a challenging task. It can be accomplished by using classification algorithms - two-class and one-class classification algorithms. In this paper, we study and evaluate the effectiveness of using the one-class classification algorithms over the two-class classification algorithms for keystroke dynamics authentication system. We implemented and evaluated 18 classification algorithms (both two-class and one-class) from the literature of keystroke dynamics and pattern recognition. The result of our experiments is evaluated using 28 subjects with the total of 378 unique comparisons for each classifier. Our results show that the top-performing classifiers of one-class are not very different from two-class classifiers and can be considered to use in the real-world authentication systems.
身份验证是验证用户身份的过程。生物识别认证通过识别用户的生理或行为特征来确保用户身份。击键动力学是一种基于用户输入模式的行为生物识别技术。它可用于根据合法用户在键盘上的独特打字风格对其进行身份验证。从模式识别的角度来看,使用击键动力学进行用户身份验证是一项具有挑战性的任务。它可以通过使用分类算法——两类分类算法和一类分类算法来完成。在本文中,我们研究并评估了在击键动力学认证系统中使用一类分类算法优于两类分类算法的有效性。我们从击键动力学和模式识别的文献中实现并评估了18种分类算法(两类和一类)。我们的实验结果使用28个主题进行评估,每个分类器总共有378个独特的比较。我们的结果表明,单类分类器与两类分类器的性能差别不大,可以考虑在现实世界的身份验证系统中使用。
{"title":"Performance Analysis of Keystroke Dynamics Using Classification Algorithms","authors":"Alaa Darabseh, Doyel Pal","doi":"10.1109/ICICT50521.2020.00027","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00027","url":null,"abstract":"Authentication is the process of verifying the identity of a user. Biometric authentication assures user identity by identifying users physiological or behavioral traits. Keystroke dynamics is a behavioral biometric based on users typing pattern. It can be used to authenticate legitimate users based on their unique typing style on the keyboard. From a pattern recognition point of view, user authentication using keystroke dynamics is a challenging task. It can be accomplished by using classification algorithms - two-class and one-class classification algorithms. In this paper, we study and evaluate the effectiveness of using the one-class classification algorithms over the two-class classification algorithms for keystroke dynamics authentication system. We implemented and evaluated 18 classification algorithms (both two-class and one-class) from the literature of keystroke dynamics and pattern recognition. The result of our experiments is evaluated using 28 subjects with the total of 378 unique comparisons for each classifier. Our results show that the top-performing classifiers of one-class are not very different from two-class classifiers and can be considered to use in the real-world authentication systems.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coronary Artery Disease Diagnosis Using Feature Selection Based Hybrid Extreme Learning Machine 基于特征选择的混合极限学习机诊断冠状动脉疾病
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00060
Afzal Hussain Shahid, M. Singh, Bishwajit Roy, Aashish Aadarsh
Coronary artery disease (CAD) is the most common cardiovascular disease (CVD) that cause millions of deaths worldwide due to heart failure, heart attack, and angina. The symptoms of the CAD do not appear in the early stage of the disease and it causes deadly conditions; therefore, accurate and early diagnosis of CAD is necessary to take appropriate and timely action for preventing or minimizing such conditions. Angiography, being the most accurate method for diagnosis of CAD, is often used by the clinicians to diagnose the CAD but this is an invasive procedure, costly, and may cause side effects. Therefore, researchers are trying to develop alternative diagnostic modalities for the efficient diagnosis of CAD. To that end, machine learning and data mining techniques have been widely employed. This paper proposes and develops hybrid Particle swarm optimization based Extreme learning machine (PSO-ELM) for diagnosis of CAD using the publicly available Z-Alizadeh sani dataset. To enhance the performance of the proposed model, a feature selection algorithm, namely Fisher, is used to find more discriminative feature subset. In the training period, the PSO algorithm is used to calibrate the ELM input weights and hidden biases. Further, the performance of the proposed model is compared with the basic ELM in terms of accuracy, Pearson correlation coefficient (R2) and Root mean square error (RMSE) goodness-of-fit functions. The results show that the performance of the proposed model is better than the basic ELM. The obtained CAD classification performance in terms of sensitivity, accuracy, specificity, and F1-measure is competitive to the known approaches in the literature.
冠状动脉疾病(CAD)是最常见的心血管疾病(CVD),全世界有数百万人因心力衰竭、心脏病发作和心绞痛而死亡。CAD的症状不会出现在疾病的早期阶段,它会导致致命的情况;因此,准确和早期诊断CAD是必要的,以采取适当和及时的行动,以防止或尽量减少这种情况。血管造影是诊断冠心病最准确的方法,常被临床医生用于诊断冠心病,但这是一种侵入性手术,费用昂贵,并可能导致副作用。因此,研究人员正试图开发替代的诊断模式,以有效地诊断CAD。为此,机器学习和数据挖掘技术被广泛应用。本文利用公开的Z-Alizadeh sani数据集,提出并开发了基于混合粒子群优化的极限学习机(PSO-ELM)用于CAD诊断。为了提高模型的性能,使用Fisher特征选择算法来寻找更具判别性的特征子集。在训练阶段,利用粒子群算法对ELM的输入权值和隐藏偏差进行校正。进一步,将该模型的性能与基本ELM在精度、Pearson相关系数(R2)和均方根误差(RMSE)拟合优度函数方面进行了比较。结果表明,该模型的性能优于基本ELM。所获得的CAD分类性能在灵敏度、准确性、特异性和f1测量方面与文献中已知的方法具有竞争力。
{"title":"Coronary Artery Disease Diagnosis Using Feature Selection Based Hybrid Extreme Learning Machine","authors":"Afzal Hussain Shahid, M. Singh, Bishwajit Roy, Aashish Aadarsh","doi":"10.1109/ICICT50521.2020.00060","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00060","url":null,"abstract":"Coronary artery disease (CAD) is the most common cardiovascular disease (CVD) that cause millions of deaths worldwide due to heart failure, heart attack, and angina. The symptoms of the CAD do not appear in the early stage of the disease and it causes deadly conditions; therefore, accurate and early diagnosis of CAD is necessary to take appropriate and timely action for preventing or minimizing such conditions. Angiography, being the most accurate method for diagnosis of CAD, is often used by the clinicians to diagnose the CAD but this is an invasive procedure, costly, and may cause side effects. Therefore, researchers are trying to develop alternative diagnostic modalities for the efficient diagnosis of CAD. To that end, machine learning and data mining techniques have been widely employed. This paper proposes and develops hybrid Particle swarm optimization based Extreme learning machine (PSO-ELM) for diagnosis of CAD using the publicly available Z-Alizadeh sani dataset. To enhance the performance of the proposed model, a feature selection algorithm, namely Fisher, is used to find more discriminative feature subset. In the training period, the PSO algorithm is used to calibrate the ELM input weights and hidden biases. Further, the performance of the proposed model is compared with the basic ELM in terms of accuracy, Pearson correlation coefficient (R2) and Root mean square error (RMSE) goodness-of-fit functions. The results show that the performance of the proposed model is better than the basic ELM. The obtained CAD classification performance in terms of sensitivity, accuracy, specificity, and F1-measure is competitive to the known approaches in the literature.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An IT Service Management Methodology for an Electoral Public Institution 一个选举公共机构的IT服务管理方法
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00041
Mario Barcelo-Valenzuela, Carlos Maximiliano Leal-Pompa, Gerardo Sanchez-Schmitz
The document presents an adaptation of the Information Technology Infrastructure Library (ITIL) standards and best practices provided from its service life cycle in the IT department (ITD) of a Local Electoral Public Institution (LEPI) in Mexico. These type of autonomous and public organizations are in charge of organizing elections in each state. The ITD is in charge of IT problem solving and improvement projects related to elections and other needs of the organization. Most of the work is generated from user needs as they arise, but there's a lack of Standard Operating Procedures (SOPs) which prevents continuous monitoring, improvement and follow through. The main challenge to providing quality IT services in Electoral Institutions of this nature, is their adaptability to unexpected changes that occur in regulations. Service requests are caused by untimely changes arising from agreements and resolutions of Institutes and Court; this creates a work environment in which sudden decision-making is encouraged in terms of IT solutions management, which is why having an IT strategy that aligns with the strategic objectives of LEPI is crucial to guarantee a continuous improvement in the local democratic functioning. There is limited research on the application of standards and best practices in IT services for the public sector in Mexico, this methodology can be implemented in each of the 32 IT departments within the country.
该文件介绍了墨西哥地方选举公共机构(LEPI) IT部门(ITD)在其服务生命周期中提供的信息技术基础设施图书馆(ITIL)标准和最佳实践的改编。这些类型的自治和公共组织负责在每个州组织选举。资讯科技署负责解决与选举及组织其他需要有关的资讯科技问题及改善项目。大多数工作都是根据用户需求产生的,但缺乏标准操作程序(sop),这妨碍了持续的监控、改进和跟进。为这种性质的选举机构提供高质量的信息技术服务的主要挑战是它们对条例中发生的意外变化的适应能力。服务请求是由于研究所和法院的协议和决议引起的不合时宜的变化引起的;这创造了一个工作环境,鼓励在IT解决方案管理方面突然做出决策,这就是为什么拥有与LEPI战略目标一致的IT战略对于保证当地民主功能的持续改进至关重要。关于墨西哥公共部门IT服务中标准和最佳实践的应用研究有限,这种方法可以在该国32个IT部门中的每个部门中实施。
{"title":"An IT Service Management Methodology for an Electoral Public Institution","authors":"Mario Barcelo-Valenzuela, Carlos Maximiliano Leal-Pompa, Gerardo Sanchez-Schmitz","doi":"10.1109/ICICT50521.2020.00041","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00041","url":null,"abstract":"The document presents an adaptation of the Information Technology Infrastructure Library (ITIL) standards and best practices provided from its service life cycle in the IT department (ITD) of a Local Electoral Public Institution (LEPI) in Mexico. These type of autonomous and public organizations are in charge of organizing elections in each state. The ITD is in charge of IT problem solving and improvement projects related to elections and other needs of the organization. Most of the work is generated from user needs as they arise, but there's a lack of Standard Operating Procedures (SOPs) which prevents continuous monitoring, improvement and follow through. The main challenge to providing quality IT services in Electoral Institutions of this nature, is their adaptability to unexpected changes that occur in regulations. Service requests are caused by untimely changes arising from agreements and resolutions of Institutes and Court; this creates a work environment in which sudden decision-making is encouraged in terms of IT solutions management, which is why having an IT strategy that aligns with the strategic objectives of LEPI is crucial to guarantee a continuous improvement in the local democratic functioning. There is limited research on the application of standards and best practices in IT services for the public sector in Mexico, this methodology can be implemented in each of the 32 IT departments within the country.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123991953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Big Data Pipeline with ML-Based and Crowd Sourced Dynamically Created and Maintained Columnar Data Warehouse for Structured and Unstructured Big Data 基于ml和众包的大数据管道,动态创建和维护结构化和非结构化大数据的列式数据仓库
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00018
K. Ghane
The existing big data platforms take data through distributed processing platforms and store them in a data lake. The architectures such as Lambda and Kappa address the real-time and batch processing of data. Such systems provide real time analytics on the raw data and delayed analytics on the curated data. The data denormalization, creation and maintenance of a columnar dimensional data warehouse is usually time consuming with no or limited support for unstructured data. The system introduced in this paper automatically creates and dynamically maintains its data warehouse as a part of its big data pipeline in addition to its data lake. It creates its data warehouse on structured, semi-structured and unstructured data. It uses Machine Learning to identify and create dimensions. It also establishes relations among data from different data sources and creates the corresponding dimensions. It dynamically optimizes the dimensions based on the crowd sourced data provided by end users and also based on query analysis.
现有的大数据平台通过分布式处理平台获取数据,存储在数据湖中。Lambda和Kappa等架构解决了数据的实时和批处理问题。这样的系统提供对原始数据的实时分析和对策划数据的延迟分析。数据非规范化、创建和维护列维数据仓库通常非常耗时,而且不支持或只支持有限的非结构化数据。本文介绍的系统除了数据湖之外,还可以自动创建和动态维护数据仓库,作为其大数据管道的一部分。它在结构化、半结构化和非结构化数据上创建数据仓库。它使用机器学习来识别和创建维度。它还建立来自不同数据源的数据之间的关系,并创建相应的维度。它根据最终用户提供的众包数据和查询分析动态优化维度。
{"title":"Big Data Pipeline with ML-Based and Crowd Sourced Dynamically Created and Maintained Columnar Data Warehouse for Structured and Unstructured Big Data","authors":"K. Ghane","doi":"10.1109/ICICT50521.2020.00018","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00018","url":null,"abstract":"The existing big data platforms take data through distributed processing platforms and store them in a data lake. The architectures such as Lambda and Kappa address the real-time and batch processing of data. Such systems provide real time analytics on the raw data and delayed analytics on the curated data. The data denormalization, creation and maintenance of a columnar dimensional data warehouse is usually time consuming with no or limited support for unstructured data. The system introduced in this paper automatically creates and dynamically maintains its data warehouse as a part of its big data pipeline in addition to its data lake. It creates its data warehouse on structured, semi-structured and unstructured data. It uses Machine Learning to identify and create dimensions. It also establishes relations among data from different data sources and creates the corresponding dimensions. It dynamically optimizes the dimensions based on the crowd sourced data provided by end users and also based on query analysis.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124751769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic Segmentation and Contextual Information Based Image Scene Interpretation: A Review 基于语义分割和上下文信息的图像场景解释研究进展
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00031
Ajay Koul, Apeksha Koul
The images in the scene consist of several objects that depict different relationships among themselves. Interpretation understands those relationships. Thus, scene interpretation is a scene description in which the scene models are consistent with the evidence, context information, and world knowledge. On one side, images in scene interpretation are useful in extracting the information that is related to the physical world and is meant for human operators. On the other side, it has always constituted a great challenge because of the varieties of complex objects due to which computer vision is not much capable to comprehend the information regarding the images in the scene. It also requires many efforts to extract the deeper meaning of the scene. So in review paper, we are going to summarize the methodology proposed by various researchers in terms of semantic segmentation and contextual information to interpret the images and highlight their contributions and challenges which still persist. Our analysis of the different methods proposed is also provided to draw some conclusions.
场景中的图像由几个物体组成,这些物体描绘了它们之间不同的关系。解释理解这些关系。因此,场景解释是一种场景描述,其中场景模型与证据、语境信息和世界知识相一致。一方面,场景解释中的图像有助于提取与物理世界相关的信息,这些信息是为人类操作员准备的。另一方面,由于复杂物体的多样性,计算机视觉无法理解场景中图像的信息,这一直是一个巨大的挑战。它也需要很多努力来提取场景的深层含义。因此,在本文中,我们将从语义分割和上下文信息两方面总结各种研究者提出的图像解释方法,并强调他们的贡献和仍然存在的挑战。本文还对提出的不同方法进行了分析,得出了一些结论。
{"title":"Semantic Segmentation and Contextual Information Based Image Scene Interpretation: A Review","authors":"Ajay Koul, Apeksha Koul","doi":"10.1109/ICICT50521.2020.00031","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00031","url":null,"abstract":"The images in the scene consist of several objects that depict different relationships among themselves. Interpretation understands those relationships. Thus, scene interpretation is a scene description in which the scene models are consistent with the evidence, context information, and world knowledge. On one side, images in scene interpretation are useful in extracting the information that is related to the physical world and is meant for human operators. On the other side, it has always constituted a great challenge because of the varieties of complex objects due to which computer vision is not much capable to comprehend the information regarding the images in the scene. It also requires many efforts to extract the deeper meaning of the scene. So in review paper, we are going to summarize the methodology proposed by various researchers in terms of semantic segmentation and contextual information to interpret the images and highlight their contributions and challenges which still persist. Our analysis of the different methods proposed is also provided to draw some conclusions.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mobile Learning for Just-in-Time Knowledge Acquisition in a Workplace Environment 工作环境中即时知识获取的移动学习
Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00038
T. Alade, Ruel Welch, Andrew Robinson, Lynn Nichol
The use of mobile devices in an educational context to support learning has drawn considerable attention, however, there is relatively little systematic knowledge about how it can be used effectively as a knowledge acquisition tool in workplace environments. This paper proposes mobile learning (m-learning) as a just-in-time learning tool to support and manage ICT problem related calls in a Science Museum (SM). Employees' intention to use m-learning is investigated using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Selected UTAUT factors including performance expectancy, effort expectancy, social influence and facilitating conditions are analysed to explain the determinants of m-learning adoption at the SM. Results demonstrate that the selected UTAUT factors had a significant impact on employee's behavioral intention to use m-learning at the SM. Further examination found age and gender moderate the relationship between the UTAUT factors. These findings present several useful implications for m-learning research and practice for ICT service desks.
在教育环境中使用移动设备来支持学习已经引起了相当大的关注,然而,关于如何在工作场所环境中有效地使用移动设备作为知识获取工具的系统知识相对较少。本文提出移动学习(m-learning)作为一种即时学习工具来支持和管理科学博物馆(SM)的ICT问题相关呼叫。使用技术接受和使用统一理论(UTAUT)模型调查了员工使用移动学习的意图。选定的UTAUT因素,包括绩效预期,努力预期,社会影响和促进条件进行分析,以解释移动学习在SM采用的决定因素。结果表明,所选择的UTAUT因素对SM员工使用移动学习的行为意愿有显著影响。进一步检查发现年龄和性别调节UTAUT因素之间的关系。这些发现为ICT服务台的移动学习研究和实践提供了一些有用的启示。
{"title":"Mobile Learning for Just-in-Time Knowledge Acquisition in a Workplace Environment","authors":"T. Alade, Ruel Welch, Andrew Robinson, Lynn Nichol","doi":"10.1109/ICICT50521.2020.00038","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00038","url":null,"abstract":"The use of mobile devices in an educational context to support learning has drawn considerable attention, however, there is relatively little systematic knowledge about how it can be used effectively as a knowledge acquisition tool in workplace environments. This paper proposes mobile learning (m-learning) as a just-in-time learning tool to support and manage ICT problem related calls in a Science Museum (SM). Employees' intention to use m-learning is investigated using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Selected UTAUT factors including performance expectancy, effort expectancy, social influence and facilitating conditions are analysed to explain the determinants of m-learning adoption at the SM. Results demonstrate that the selected UTAUT factors had a significant impact on employee's behavioral intention to use m-learning at the SM. Further examination found age and gender moderate the relationship between the UTAUT factors. These findings present several useful implications for m-learning research and practice for ICT service desks.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130451469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 3rd International Conference on Information and Computer Technologies (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1