首页 > 最新文献

International Journal of Innovative Computing Information and Control最新文献

英文 中文
An Enhanced Underwater Linear Wireless Sensor Network Deployment Strategy for Data Collection 一种增强型水下线性无线传感器网络数据采集部署策略
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.195
Z. Ahmed, K. A. Bakar
The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.
线性无线传感器网络(LWSN)在水下环境中的部署已成为水下数据采集研究领域的热点。水下数据采集的主要问题之一是传感器节点部署缺乏鲁棒结构。当考虑覆盖数百公里的线性管道时,挑战更加明显。在以前的大多数工作中,节点的部署没有考虑到各个传感器节点的异构性和容量。这就导致了水下管道上的传感器节点向水面上的汇聚节点传输数据效率低下的问题。因此,本研究提出了一种增强型水下线性无线传感器网络部署(EULWSND),以提高线性传感器水下数据采集的鲁棒性。为此,本文对水下线性无线传感器网络的相关文献进行了综述。在此基础上,结合水下管道的线性特性和传感器节点的非均质性,讨论了水下管道的部署策略。指出了今后研究的挑战和方向。此外,利用AQUASIM实现了所提出的部署策略,并与现有的数据收集方案进行了比较。结果表明,所提出的EULWSND在开销和分组传输率指标方面优于现有的管道监控动态地址路由协议(DARP-PM)。该方案具有较低的开销(17.4%)和较高的数据包传输(20.5%)。
{"title":"An Enhanced Underwater Linear Wireless Sensor Network Deployment Strategy for Data Collection","authors":"Z. Ahmed, K. A. Bakar","doi":"10.11113/IJIC.V8N3.195","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.195","url":null,"abstract":"The deployment of Linear Wireless Sensor Network (LWSN) in underwater environment has attracted several research studies in the underwater data collection research domain. One of the major issues in underwater data collection is the lack of robust structure in the deployment of sensor nodes. The challenge is more obvious when considering a linear pipeline that covers hundreds of kilometers. In most of the previous work, nodes are deployed not considering heterogeneity and capacity of the various sensor nodes. This lead to the problem of inefficient data delivery from the sensor nodes on the underwater pipeline to the sink node at the water surface. Therefore, in this study, an Enhanced Underwater Linear Wireless Sensor Network Deployment (EULWSND) has been proposed in order to improve the robustness in linear sensor underwater data collection. To this end, this paper presents a review of related literature in an underwater linear wireless sensor network. Further, a deployment strategy is discussed considering linearity of the underwater pipeline and heterogeneity of sensor nodes. Some research challenges and directions are identified for future research work. Furthermore, the proposed deployment strategy is implemented using AQUASIM and compared with an existing data collection scheme. The result demonstrates that the proposed EULWSND outperforms the existing Dynamic Address Routing Protocol for Pipeline Monitoring (DARP-PM) in terms of overhead and packet delivery ratio metrics. The scheme performs better in terms of lower overhead with 17.4% and higher packet delivery with 20.5%.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87484627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The Cyberpsychology Factors of Internet Addiction among School Teenagers 青少年网络成瘾的网络心理因素
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.193
Siti Nubailah Mohd Yusof, S. H. Othman
School period for teenagers can be considered as a challenging and critical stage for them. This is because, at this stage, many teenagers facing a challenge of identity crisis and intend to explore and addicted to the internet easily. Overuse the internet may lead to an individual psychology include mental and emotional. The field of cyberpsychology is the fastest growing technology and closely related to the study of cyber behavior. The goal of the study to examine the relevant cyberpsychology factors which is Impulsivity, Passions, Social Provision that leads into Internet Addiction behavior among school teenagers. Study and understanding the cyberpsychology factors associated with Internet Addiction is important to predict and diagnose the condition of an individual.
对于青少年来说,学校时期是一个充满挑战和关键的阶段。这是因为,在这个阶段,许多青少年面临着身份危机的挑战,容易探索和沉迷于网络。过度使用网络可能会导致个人心理包括心理和情绪。网络心理学是发展最快的技术领域,与网络行为研究密切相关。摘要本研究旨在探讨导致青少年网瘾行为的相关网络心理因素:冲动、激情、社会供给。研究和理解与网络成瘾相关的网络心理因素对于预测和诊断个体的状况非常重要。
{"title":"The Cyberpsychology Factors of Internet Addiction among School Teenagers","authors":"Siti Nubailah Mohd Yusof, S. H. Othman","doi":"10.11113/IJIC.V8N3.193","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.193","url":null,"abstract":"School period for teenagers can be considered as a challenging and critical stage for them. This is because, at this stage, many teenagers facing a challenge of identity crisis and intend to explore and addicted to the internet easily. Overuse the internet may lead to an individual psychology include mental and emotional. The field of cyberpsychology is the fastest growing technology and closely related to the study of cyber behavior. The goal of the study to examine the relevant cyberpsychology factors which is Impulsivity, Passions, Social Provision that leads into Internet Addiction behavior among school teenagers. Study and understanding the cyberpsychology factors associated with Internet Addiction is important to predict and diagnose the condition of an individual.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89199424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Algorithm Based on Flower Pollination Algorithm and Electro Search for Global Optimization 基于传粉算法和电搜索的混合全局优化算法
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/ijic.v8n3.216
Fadil Md Esa, N. Mustaffa, N. Radzi
In this paper, we have presented a new hybrid optimization method called hybrid Electro-Search algorithm (Eo) and Flower Pollination Optimization Algorithm (FPA) which introduces Eo to FPA. EO-FPA combines the merits of both Eo and FPA by designing on the local-search strategy from Eo and global-search strategy from FPA. The results of the experiments performed with twenty-two well-known benchmark functions show that the proposed algorithm possesses outstanding performance in statistical merit as compared to the original and variant FPA. It is proven that the EO-FPA algorithm requires better formulation to achieve efficiency and high performance to work out with global optimization problems.
本文提出了一种新的混合优化方法——混合电搜索算法(Eo)和混合传粉优化算法(FPA),将Eo引入到FPA中。Eo -FPA结合了Eo和FPA的优点,设计了基于Eo的局部搜索策略和基于FPA的全局搜索策略。用22个知名的基准函数进行了实验,结果表明,与原始和改进的FPA相比,该算法在统计性能上具有突出的性能。实践证明,EO-FPA算法在求解全局优化问题时,需要更好的表述来实现效率和高性能。
{"title":"A Hybrid Algorithm Based on Flower Pollination Algorithm and Electro Search for Global Optimization","authors":"Fadil Md Esa, N. Mustaffa, N. Radzi","doi":"10.11113/ijic.v8n3.216","DOIUrl":"https://doi.org/10.11113/ijic.v8n3.216","url":null,"abstract":"In this paper, we have presented a new hybrid optimization method called hybrid Electro-Search algorithm (Eo) and Flower Pollination Optimization Algorithm (FPA) which introduces Eo to FPA. EO-FPA combines the merits of both Eo and FPA by designing on the local-search strategy from Eo and global-search strategy from FPA. The results of the experiments performed with twenty-two well-known benchmark functions show that the proposed algorithm possesses outstanding performance in statistical merit as compared to the original and variant FPA. It is proven that the EO-FPA algorithm requires better formulation to achieve efficiency and high performance to work out with global optimization problems.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90684278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Electromyography (EMG) based Classification of Finger Movements using SVM 基于肌电图的支持向量机手指运动分类
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.181
Nurazrin Mohd Esa, A. Zain, M. Bahari
Myoelectric control prostheses hand are currently popular developing clinical option that offers amputee person to control their artificial hand by analyzing the contacting muscle residual. Myoelectric control system contains three main phase which are data segmentation, feature extraction and classification. The main factor that affect the performance of myoelectric control system is the choice of feature extraction methods. There are two types of feature extraction technique used to extract the signal which are the Hudgins feature consist of Zero Crossing, Waveform Length (WL), Sign Scope Change (SSC) and Mean Absolute Value (MAV), the single Root Mean Square (RMS). Then, the combination of both is proposed in this study. An analysis of these different techniques result were examine to achieve a favorable classification accuracy (CA). Our outcomes demonstrate that the combination of RMS and Hudgins feature set demonstrate the best average classification accuracy for all ten fingers developments. The classification process implemented in this studies is using Support Vector Machine (SVM) technique.
肌电控制假肢是目前临床发展中比较流行的一种选择,它通过分析残肢接触肌来控制截肢者的假肢。肌电控制系统主要包括数据分割、特征提取和分类三个阶段。影响肌电控制系统性能的主要因素是特征提取方法的选择。用于提取信号的特征提取技术有两种,分别是由过零点、波形长度(WL)、符号范围变化(SSC)和平均绝对值(MAV)组成的哈金斯特征,即单均方根(RMS)。因此,本研究提出将两者结合起来。对这些不同的技术结果进行了分析,以达到良好的分类精度(CA)。我们的研究结果表明,RMS和Hudgins特征集的结合对所有十个手指的发育表现出最好的平均分类精度。在本研究中实现的分类过程是使用支持向量机(SVM)技术。
{"title":"Electromyography (EMG) based Classification of Finger Movements using SVM","authors":"Nurazrin Mohd Esa, A. Zain, M. Bahari","doi":"10.11113/IJIC.V8N3.181","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.181","url":null,"abstract":"Myoelectric control prostheses hand are currently popular developing clinical option that offers amputee person to control their artificial hand by analyzing the contacting muscle residual. Myoelectric control system contains three main phase which are data segmentation, feature extraction and classification. The main factor that affect the performance of myoelectric control system is the choice of feature extraction methods. There are two types of feature extraction technique used to extract the signal which are the Hudgins feature consist of Zero Crossing, Waveform Length (WL), Sign Scope Change (SSC) and Mean Absolute Value (MAV), the single Root Mean Square (RMS). Then, the combination of both is proposed in this study. An analysis of these different techniques result were examine to achieve a favorable classification accuracy (CA). Our outcomes demonstrate that the combination of RMS and Hudgins feature set demonstrate the best average classification accuracy for all ten fingers developments. The classification process implemented in this studies is using Support Vector Machine (SVM) technique.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75506758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques 利用预处理技术解决Copy-Move伪造检测中的时间复杂度问题
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.213
Siti Fadzlun Md Salleh, M. F. Rohani, M. A. Maarof
Copy-move forgery detection (CMFD) has become a popular an important research focus in digital image forensic. Copy-move forgery happens when a region in an image is copied and paste into the same image. Apart from the main problem of detection robustness and accuracy, CMFD is struggle with time complexity issue. One of the options to resolve this problem was by including pre-processing step in CMFD pipeline. This paper reviews on the importance of pre-processing step, and available techniques in reducing time complexity of copy-move forgery detection. An experiment using discrete wavelet transform (DWT) as a pre-processing technique was carried out to evaluate the performance of adopting pre-processing technique in CMFD pipeline. The experimental result has shown a significant reduction in processing time with some trade off to detection accuracy.
复制-移动伪造检测已成为数字图像取证领域的一个重要研究热点。复制-移动伪造是指将图像中的某个区域复制并粘贴到同一图像中。除了检测的鲁棒性和准确性问题外,CMFD还面临着时间复杂度问题。解决这个问题的方法之一是在CMFD管道中加入预处理步骤。本文综述了预处理步骤的重要性,以及降低复制-移动伪造检测时间复杂度的现有技术。采用离散小波变换(DWT)作为预处理技术进行了实验,以评估采用预处理技术在CMFD管道中的性能。实验结果表明,处理时间显著减少,但检测精度有所降低。
{"title":"Solving Time Complexity Issue in Copy-Move Forgery Detection Thru Pre-processing Techniques","authors":"Siti Fadzlun Md Salleh, M. F. Rohani, M. A. Maarof","doi":"10.11113/IJIC.V8N3.213","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.213","url":null,"abstract":"Copy-move forgery detection (CMFD) has become a popular an important research focus in digital image forensic. Copy-move forgery happens when a region in an image is copied and paste into the same image. Apart from the main problem of detection robustness and accuracy, CMFD is struggle with time complexity issue. One of the options to resolve this problem was by including pre-processing step in CMFD pipeline. This paper reviews on the importance of pre-processing step, and available techniques in reducing time complexity of copy-move forgery detection. An experiment using discrete wavelet transform (DWT) as a pre-processing technique was carried out to evaluate the performance of adopting pre-processing technique in CMFD pipeline. The experimental result has shown a significant reduction in processing time with some trade off to detection accuracy.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81815496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-Home Surveillance Systems and Privacy Considerations for Malaysians: A Survey 马来西亚人的家庭监控系统和隐私考虑:一项调查
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.198
Mohammad Ali Nassiri Abrishamchi, A. Cheok, A. Abdullah, K. Bielawski
Always-on cameras, microphones, and devices are increasingly intruding on private environments due to their promising applications in regard with the better quality of life. But they can also be exploit by adversaries as surveillance systems, introducing a matter of concern for privacy. Intruders can observe and record in-home activities for further malicious aims. Due to this vulnerability, it is important that privacy issue in this case, being addressed properly. Since perception of privacy varies among different cultures, privacy priorities of each culture should be investigated separately. In order to provide a better insight into Malaysians opinions about their highly private in-home activities for designers of visual smart household systems, we conducted an anonymous survey with 217 respondents. In this paper, we discuss the outcomes of our survey in order to provide a reference for engineers working for the Malaysian market.
永远在线的摄像头、麦克风和设备正越来越多地侵入私人环境,因为它们在提高生活质量方面有着广阔的应用前景。但它们也可能被对手利用作为监视系统,引发对隐私的担忧。入侵者可以观察并记录家庭活动,以达到进一步的恶意目的。由于这个漏洞,在这种情况下,正确解决隐私问题是很重要的。由于不同文化对隐私的看法不同,因此应分别调查每种文化的隐私优先级。为了更好地了解马来西亚人对视觉智能家居系统设计师高度私密的家庭活动的看法,我们对217名受访者进行了匿名调查。在本文中,我们讨论了我们的调查结果,以提供给工程师工作在马来西亚市场的参考。
{"title":"In-Home Surveillance Systems and Privacy Considerations for Malaysians: A Survey","authors":"Mohammad Ali Nassiri Abrishamchi, A. Cheok, A. Abdullah, K. Bielawski","doi":"10.11113/IJIC.V8N3.198","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.198","url":null,"abstract":"Always-on cameras, microphones, and devices are increasingly intruding on private environments due to their promising applications in regard with the better quality of life. But they can also be exploit by adversaries as surveillance systems, introducing a matter of concern for privacy. Intruders can observe and record in-home activities for further malicious aims. Due to this vulnerability, it is important that privacy issue in this case, being addressed properly. Since perception of privacy varies among different cultures, privacy priorities of each culture should be investigated separately. In order to provide a better insight into Malaysians opinions about their highly private in-home activities for designers of visual smart household systems, we conducted an anonymous survey with 217 respondents. In this paper, we discuss the outcomes of our survey in order to provide a reference for engineers working for the Malaysian market.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88778926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automating Penetration Testing Within Ambiguous Testing Environment 在模糊测试环境中自动化渗透测试
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.180
Lim Kah Seng, N. Ithnin, Syed Zainudeen Mohd Shaid
Automated web application penetration testing has emerged as a trend. The computer was assigned the task of penetrating web application security with penetration testing technique. Relevant computer program reduces time, cost, and resources required for assessing a web application security. At the same time, scaling down tester reliance on human knowledge. Web application security scanner is such kind of program that is designed to assess web application security automatically with penetration testing technique. The downside is that computer is not well-formed as human. Consequently, web application security scanner often found generating the false alarms, especially in a testing environment, which web application source codes are unreachable. Thus, in this paper, the state-of-the-art of black box web application security scanner is systematically reviewed, to investigate the approaches for detecting web application vulnerability in an ambiguous testing environment.  This survey is critical in providing insights on how to design efficient algorithms for assessing web application security with penetration testing technique in the ambiguous environment.
自动化的web应用渗透测试已经成为一种趋势。利用渗透测试技术,给计算机分配了渗透web应用安全的任务。相关的计算机程序减少了评估web应用程序安全性所需的时间、成本和资源。同时,减少测试人员对人类知识的依赖。Web应用程序安全扫描程序是利用渗透测试技术自动评估Web应用程序安全性的一类程序。缺点是计算机不像人类那样构造良好。因此,web应用程序安全扫描器经常发现生成假警报,特别是在web应用程序源代码不可达的测试环境中。因此,本文系统回顾了黑盒web应用安全扫描器的发展现状,探讨了在模糊测试环境下检测web应用漏洞的方法。这项调查对于如何设计有效的算法来评估在模糊环境中使用渗透测试技术的web应用程序安全性提供了重要的见解。
{"title":"Automating Penetration Testing Within Ambiguous Testing Environment","authors":"Lim Kah Seng, N. Ithnin, Syed Zainudeen Mohd Shaid","doi":"10.11113/IJIC.V8N3.180","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.180","url":null,"abstract":"Automated web application penetration testing has emerged as a trend. The computer was assigned the task of penetrating web application security with penetration testing technique. Relevant computer program reduces time, cost, and resources required for assessing a web application security. At the same time, scaling down tester reliance on human knowledge. Web application security scanner is such kind of program that is designed to assess web application security automatically with penetration testing technique. The downside is that computer is not well-formed as human. Consequently, web application security scanner often found generating the false alarms, especially in a testing environment, which web application source codes are unreachable. Thus, in this paper, the state-of-the-art of black box web application security scanner is systematically reviewed, to investigate the approaches for detecting web application vulnerability in an ambiguous testing environment.  This survey is critical in providing insights on how to design efficient algorithms for assessing web application security with penetration testing technique in the ambiguous environment.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78200636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Overview for Implementing Work from Home (WFH) in Malaysia Higher Education Institution (HEI) Context 马来西亚高等教育机构(HEI)背景下实施在家工作(WFH)的概述
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/ijic.v8n3.182
Noor Irliana Mohd Rahim, A. Abdul Rahman, Noorminshah A. Iahad
In recent decades, working from home (WFH) method has spread their wings beyond of normal boundaries for many sectors in working organization. Work nowadays can be categorized as “unbounded activity” environment and freely conducted at anywhere and anytime. In Malaysia as a developing country, WFH approach is not being implemented widely but there are limited group who has implement WFH unofficially after having an agreement from organization. This research study will cover the important elements for implementing WFH in HEI context. The elements are not limited on HEI context but it able to be use in other field. The university itself will be an organization who involving the employees as well as the employers. To understand more about WFH requirement, current issues and required WFH approach from organization will be consider. The overview of elements consideration will be discussed and a conceptual model is derived to support WFH for HEI. At the end of the study, a framework will be developed in order to support above elements for both employees and employers in the organization itself. The aim of this study is to increase productivity, efficiency and quality of work while the organization allows a flexible working style such as WFH to the lecturers in HEI. The result of this paper is to derive a conceptual model, which are the main elements in conducting WFH for the whole research study.
近几十年来,在家办公(WFH)方法已经在工作组织的许多部门中扩展到正常范围之外。现在的工作可以归类为“无界活动”环境,可以随时随地自由进行。在马来西亚作为一个发展中国家,WFH方法并没有得到广泛的实施,但有有限的群体在获得组织同意后非正式地实施WFH。本研究将涵盖在高等教育背景下实施WFH的重要因素。这些元素并不局限于高等教育环境,而是可以在其他领域使用。大学本身将是一个包括雇员和雇主在内的组织。为了了解更多关于WFH的要求,将考虑当前的问题和组织要求的WFH方法。将讨论考虑的要素概述,并推导出一个概念模型,以支持HEI的WFH。在研究结束时,将制定一个框架,以便为组织本身的雇员和雇主支持上述要素。本研究的目的是提高生产力,效率和工作质量,同时组织允许灵活的工作方式,如WFH在HEI的讲师。本文的结果是推导出一个概念模型,这是整个研究中进行WFH的主要要素。
{"title":"The Overview for Implementing Work from Home (WFH) in Malaysia Higher Education Institution (HEI) Context","authors":"Noor Irliana Mohd Rahim, A. Abdul Rahman, Noorminshah A. Iahad","doi":"10.11113/ijic.v8n3.182","DOIUrl":"https://doi.org/10.11113/ijic.v8n3.182","url":null,"abstract":"In recent decades, working from home (WFH) method has spread their wings beyond of normal boundaries for many sectors in working organization. Work nowadays can be categorized as “unbounded activity” environment and freely conducted at anywhere and anytime. In Malaysia as a developing country, WFH approach is not being implemented widely but there are limited group who has implement WFH unofficially after having an agreement from organization. This research study will cover the important elements for implementing WFH in HEI context. The elements are not limited on HEI context but it able to be use in other field. The university itself will be an organization who involving the employees as well as the employers. To understand more about WFH requirement, current issues and required WFH approach from organization will be consider. The overview of elements consideration will be discussed and a conceptual model is derived to support WFH for HEI. At the end of the study, a framework will be developed in order to support above elements for both employees and employers in the organization itself. The aim of this study is to increase productivity, efficiency and quality of work while the organization allows a flexible working style such as WFH to the lecturers in HEI. The result of this paper is to derive a conceptual model, which are the main elements in conducting WFH for the whole research study.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83548522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparison of Prediction Methods for Air Pollution Data in Malaysia and Singapore 马来西亚和新加坡空气污染数据预测方法的比较
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.202
Merlinda Wibowo, Sarina Sulaiman, S. Shamsuddin
The process for analyzing and extracting useful information from a large database that employs one or more machine learning techniques is Data Mining. There are many data mining methods that can be used in a variety of data patterns. One of them is prediction modeling. This study compares several data mining performance methods for prediction such as Naïve Bayes, Random Tree, J48, and Rough Set to get the most powerful classifier to extract the knowledge of air pollution data. The parameters being used for observation in the performance of the prediction methods are correctly and incorrectly classified instances, the time taken, and kappa statistic. The experimental result reveals that Rough Set is extremely good for classifying the Air Pollutant Index (API) data from Malaysia and Singapore. Rough Set has the lowest error and the highest performance compared to other methods with the accuracy more than 97%.
从使用一种或多种机器学习技术的大型数据库中分析和提取有用信息的过程称为数据挖掘。有许多数据挖掘方法可用于各种数据模式。其中之一是预测建模。本研究比较了几种用于预测的数据挖掘性能方法,如Naïve贝叶斯、随机树、J48和粗糙集,以获得最强大的分类器来提取空气污染数据的知识。在预测方法的性能中用于观察的参数是正确和错误分类的实例、所花费的时间和kappa统计量。实验结果表明,粗糙集对马来西亚和新加坡的空气污染物指数(API)数据的分类效果非常好。与其他方法相比,粗糙集具有最低的误差和最高的性能,准确率在97%以上。
{"title":"Comparison of Prediction Methods for Air Pollution Data in Malaysia and Singapore","authors":"Merlinda Wibowo, Sarina Sulaiman, S. Shamsuddin","doi":"10.11113/IJIC.V8N3.202","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.202","url":null,"abstract":"The process for analyzing and extracting useful information from a large database that employs one or more machine learning techniques is Data Mining. There are many data mining methods that can be used in a variety of data patterns. One of them is prediction modeling. This study compares several data mining performance methods for prediction such as Naïve Bayes, Random Tree, J48, and Rough Set to get the most powerful classifier to extract the knowledge of air pollution data. The parameters being used for observation in the performance of the prediction methods are correctly and incorrectly classified instances, the time taken, and kappa statistic. The experimental result reveals that Rough Set is extremely good for classifying the Air Pollutant Index (API) data from Malaysia and Singapore. Rough Set has the lowest error and the highest performance compared to other methods with the accuracy more than 97%.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78126072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Cloud-based Conceptual Framework for Multi-Objective Virtual Machine Scheduling using Whale Optimization Algorithm 基于鲸鱼优化算法的多目标虚拟机调度的云概念框架
IF 1 Q2 Computer Science Pub Date : 2018-11-21 DOI: 10.11113/IJIC.V8N3.199
Nadim Rana, Muhammad Shafie Abd Latiff, Shafi'i Muhammad Abdulhamid
Virtual machine scheduling in the cloud is considered one of the major issue to solve optimal resource allocation problem on the heterogeneous datacenters. With respect to that, the key concern is to map the virtual machines (VMs) with physical machines (PMs) in a way that maximum resource utilization can be achieved with minimum cost. Due to the fact that scheduling is an NP-hard problem, a metaheuristic approach is proven to achieve a better optimal solution to solve this problem. In a rapid changing heterogeneous environment, where millions of resources can be allocated and deallocate in a fraction of the time, modern metaheuristic algorithms perform well due to its immense power to solve the multidimensional problem with fast convergence speed. This paper presents a conceptual framework for solving multi-objective VM scheduling problem using novel metaheuristic Whale optimization algorithm (WOA). Further, we present the problem formulation for the framework to achieve multi-objective functions.
云中的虚拟机调度被认为是解决异构数据中心上资源优化分配问题的主要问题之一。与此相关,关键问题是将虚拟机(vm)与物理机(pm)进行映射,从而以最小的成本实现最大的资源利用。由于调度是一个np困难问题,证明了一种元启发式方法可以获得更好的最优解来解决该问题。在快速变化的异构环境中,可以在很短的时间内分配和释放数百万资源,现代元启发式算法由于其以快速收敛速度解决多维问题的巨大能力而表现良好。提出了一种基于元启发式鲸鱼优化算法(WOA)的多目标虚拟机调度问题的概念框架。在此基础上,提出了该框架实现多目标功能的问题表述。
{"title":"A Cloud-based Conceptual Framework for Multi-Objective Virtual Machine Scheduling using Whale Optimization Algorithm","authors":"Nadim Rana, Muhammad Shafie Abd Latiff, Shafi'i Muhammad Abdulhamid","doi":"10.11113/IJIC.V8N3.199","DOIUrl":"https://doi.org/10.11113/IJIC.V8N3.199","url":null,"abstract":"Virtual machine scheduling in the cloud is considered one of the major issue to solve optimal resource allocation problem on the heterogeneous datacenters. With respect to that, the key concern is to map the virtual machines (VMs) with physical machines (PMs) in a way that maximum resource utilization can be achieved with minimum cost. Due to the fact that scheduling is an NP-hard problem, a metaheuristic approach is proven to achieve a better optimal solution to solve this problem. In a rapid changing heterogeneous environment, where millions of resources can be allocated and deallocate in a fraction of the time, modern metaheuristic algorithms perform well due to its immense power to solve the multidimensional problem with fast convergence speed. This paper presents a conceptual framework for solving multi-objective VM scheduling problem using novel metaheuristic Whale optimization algorithm (WOA). Further, we present the problem formulation for the framework to achieve multi-objective functions.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2018-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77695368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
International Journal of Innovative Computing Information and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1