首页 > 最新文献

Computer Science and Information Systems最新文献

英文 中文
Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3 《计算机与信息科学》第16卷第3期
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-30 DOI: 10.5539/cis.v16n3p36
Chris Lee
Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3, 2023
《计算机与信息科学》,Vol. 16, No. 3, 2023
{"title":"Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3","authors":"Chris Lee","doi":"10.5539/cis.v16n3p36","DOIUrl":"https://doi.org/10.5539/cis.v16n3p36","url":null,"abstract":"Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3, 2023","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72643293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drawbacks of Traditional Environmental Monitoring Systems 传统环境监测系统的弊端
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-30 DOI: 10.5539/cis.v16n3p30
Sadiku Aminu Sani, Amina Ibrahim, Abuhuraira Ado Musa, M. Dahiru, Muhammad Ahmad Baballe
Traditional methods for evaluating water quality have a number of drawbacks. They need expensive, specialized equipment as well as knowledgeable employees first. Second, data loss may result from human error. Thirdly, because people rather than algorithms will be analyzing the obtained data, these schemes cannot foresee future patterns. Additionally, changes in the characteristics of water may result from the sample transit process. Therefore, it is challenging to consistently check water quality using outdated monitoring techniques. The disadvantages of traditional environmental monitoring techniques have been covered in this study.
评价水质的传统方法有许多缺点。他们首先需要昂贵的专业设备和知识渊博的员工。第二,数据丢失可能是人为错误造成的。第三,由于将由人而不是算法来分析获得的数据,这些方案无法预测未来的模式。此外,水的特性的变化可能是由样品传输过程引起的。因此,使用过时的监测技术持续检查水质是具有挑战性的。本研究涵盖了传统环境监测技术的缺点。
{"title":"Drawbacks of Traditional Environmental Monitoring Systems","authors":"Sadiku Aminu Sani, Amina Ibrahim, Abuhuraira Ado Musa, M. Dahiru, Muhammad Ahmad Baballe","doi":"10.5539/cis.v16n3p30","DOIUrl":"https://doi.org/10.5539/cis.v16n3p30","url":null,"abstract":"Traditional methods for evaluating water quality have a number of drawbacks. They need expensive, specialized equipment as well as knowledgeable employees first. Second, data loss may result from human error. Thirdly, because people rather than algorithms will be analyzing the obtained data, these schemes cannot foresee future patterns. Additionally, changes in the characteristics of water may result from the sample transit process. Therefore, it is challenging to consistently check water quality using outdated monitoring techniques. The disadvantages of traditional environmental monitoring techniques have been covered in this study.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"71 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83337061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Classification Ability of Delegating Classifiers Using Different Supervised Machine Learning Algorithms 利用不同的监督机器学习算法提高委托分类器的分类能力
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-23 DOI: 10.5539/cis.v16n3p22
Basra Farooq Dar, M. Nadeem, S. Khalid, Farzana Riaz, Yasir Mahmood, Ghias Hameed
Cancer Classification & Prediction Is Vitally Important for Cancer Diagnosis. DNA Microarray Technology Has Provided Genetic Data That Has Facilitated Scientists Perform Cancer Research. Traditional Methods of Classification Have Certain Limitations E.G. Traditionally A Proposed DSS Uses A Single Classifier at A Time for Classification or Prediction Purposes. To Increase Classification Accuracy, Reject Option Classifiers Has Been Proposed in Machine Learning Literature. In A Reject Option Classifier, A Rejection Region Is Defined and The Samples Fall in That Region Are Not Classified by The Classifier. The Unclassifiable Samples Are Rejected by Classifier in Order to Improve Classifier’s Accuracy. However, These Rejections Affect the Prediction Rate of The Classifier as Well. To Overcome the Problem of Low Prediction Rates by Increased Rejection of Samples by A Single Classifier, the “Delegating Classifiers” Provide Better Accuracy at Less Rejection Rate. Different Classifiers Such as Support Vector Machine (SVM), Linear Discriminant Analysis (LDA), K Nearest Neighbor (KNN) Etc. Have Been Proposed. Moreover, Traditionally, Same Learner Is Used As “Delegated” And “Delegating” Classifier. This Research Has Investigated the Effects of Using Different Machine Learning Classifiers in Both of The Delegated and Delegating Classifiers, And the Results Obtained Showed That Proposed Method Gives High Accuracy and Increases the Prediction Rate.
癌症分类与预测对癌症诊断至关重要。DNA微阵列技术提供了基因数据,促进了科学家进行癌症研究。传统的分类方法有一定的局限性,例如,传统的DSS建议一次使用一个分类器进行分类或预测。为了提高分类精度,机器学习文献中提出了拒绝选项分类器。在拒绝选项分类器中,定义一个拒绝区域,落在该区域的样本不被分类器分类。为了提高分类器的准确率,分类器对无法分类的样本进行剔除。然而,这些拒绝也会影响分类器的预测率。为了克服单个分类器增加样本拒绝率而导致预测率低的问题,“委托分类器”在更低的拒绝率下提供了更好的准确性。不同的分类器,如支持向量机(SVM)、线性判别分析(LDA)、K近邻(KNN)等。已经求婚了。此外,传统上,同一学习器被用作“委托”和“委托”分类器。研究了在委托分类器和委托分类器中使用不同机器学习分类器的效果,结果表明提出的方法具有较高的准确率,提高了预测率。
{"title":"Improving the Classification Ability of Delegating Classifiers Using Different Supervised Machine Learning Algorithms","authors":"Basra Farooq Dar, M. Nadeem, S. Khalid, Farzana Riaz, Yasir Mahmood, Ghias Hameed","doi":"10.5539/cis.v16n3p22","DOIUrl":"https://doi.org/10.5539/cis.v16n3p22","url":null,"abstract":"Cancer Classification & Prediction Is Vitally Important for Cancer Diagnosis. DNA Microarray Technology Has Provided Genetic Data That Has Facilitated Scientists Perform Cancer Research. Traditional Methods of Classification Have Certain Limitations E.G. Traditionally A Proposed DSS Uses A Single Classifier at A Time for Classification or Prediction Purposes. To Increase Classification Accuracy, Reject Option Classifiers Has Been Proposed in Machine Learning Literature. In A Reject Option Classifier, A Rejection Region Is Defined and The Samples Fall in That Region Are Not Classified by The Classifier. The Unclassifiable Samples Are Rejected by Classifier in Order to Improve Classifier’s Accuracy. However, These Rejections Affect the Prediction Rate of The Classifier as Well. To Overcome the Problem of Low Prediction Rates by Increased Rejection of Samples by A Single Classifier, the “Delegating Classifiers” Provide Better Accuracy at Less Rejection Rate. Different Classifiers Such as Support Vector Machine (SVM), Linear Discriminant Analysis (LDA), K Nearest Neighbor (KNN) Etc. Have Been Proposed. Moreover, Traditionally, Same Learner Is Used As “Delegated” And “Delegating” Classifier. This Research Has Investigated the Effects of Using Different Machine Learning Classifiers in Both of The Delegated and Delegating Classifiers, And the Results Obtained Showed That Proposed Method Gives High Accuracy and Increases the Prediction Rate.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"43 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83301390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning - based adaptation and scheduling methods for multi-source DASH 基于强化学习的多源DASH自适应调度方法
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-25 DOI: 10.2298/csis220927055n
Nghia T. Nguyen, Long Luu, Phuong Vo, Sang Nguyen, Cuong T. Do, Ngoc-Thanh Nguyen
Dynamic adaptive streaming over HTTP (DASH) has been widely used in video streaming recently. In DASH, the client downloads video chunks in order from a server. The rate adaptation function at the video client enhances the user?s quality-of-experience (QoE) by choosing a suitable quality level for each video chunk to download based on the network condition. Today networks such as content delivery networks, edge caching networks, content centric networks, etc. usually replicate video contents on multiple cache nodes. We study video streaming from multiple sources in this work. In multi-source streaming, video chunks may arrive out of order due to different conditions of the network paths. Hence, to guarantee a high QoE, the video client needs not only rate adaptation, but also chunk scheduling. Reinforcement learning (RL) has emerged as the state-of-the-art control method in various fields in recent years. This paper proposes two algorithms for streaming from multiple sources: RL-based adaptation with greedy scheduling (RLAGS) and RL-based adaptation and scheduling (RLAS). We also build a simulation environment for training and evaluation. The efficiency of the proposed algorithms is proved via extensive simulations with real-trace data.
基于HTTP的动态自适应流媒体技术(DASH)近年来在视频流媒体中得到了广泛的应用。在DASH中,客户端按顺序从服务器下载视频块。视频客户端的速率自适应功能增强了用户体验。通过根据网络条件为下载的每个视频块选择合适的质量级别来提高视频的体验质量。今天的网络,如内容交付网络、边缘缓存网络、内容中心网络等,通常在多个缓存节点上复制视频内容。在这项工作中,我们研究了来自多个来源的视频流。在多源流媒体中,由于网络路径条件的不同,视频块可能会无序到达。因此,为了保证高QoE,视频客户端不仅需要速率适应,还需要块调度。近年来,强化学习(RL)已成为各个领域最先进的控制方法。本文提出了两种多源流处理算法:基于正则化的贪婪调度自适应算法(rlag)和基于正则化的自适应调度算法(RLAS)。我们还建立了一个模拟环境进行培训和评估。通过对实时跟踪数据的大量仿真,证明了所提算法的有效性。
{"title":"Reinforcement learning - based adaptation and scheduling methods for multi-source DASH","authors":"Nghia T. Nguyen, Long Luu, Phuong Vo, Sang Nguyen, Cuong T. Do, Ngoc-Thanh Nguyen","doi":"10.2298/csis220927055n","DOIUrl":"https://doi.org/10.2298/csis220927055n","url":null,"abstract":"Dynamic adaptive streaming over HTTP (DASH) has been widely used in video\u0000 streaming recently. In DASH, the client downloads video chunks in order from\u0000 a server. The rate adaptation function at the video client enhances the\u0000 user?s quality-of-experience (QoE) by choosing a suitable quality level for\u0000 each video chunk to download based on the network condition. Today networks\u0000 such as content delivery networks, edge caching networks, content centric\u0000 networks, etc. usually replicate video contents on multiple cache nodes. We\u0000 study video streaming from multiple sources in this work. In multi-source\u0000 streaming, video chunks may arrive out of order due to different conditions\u0000 of the network paths. Hence, to guarantee a high QoE, the video client needs\u0000 not only rate adaptation, but also chunk scheduling. Reinforcement learning\u0000 (RL) has emerged as the state-of-the-art control method in various fields\u0000 in recent years. This paper proposes two algorithms for streaming from\u0000 multiple sources: RL-based adaptation with greedy scheduling (RLAGS) and\u0000 RL-based adaptation and scheduling (RLAS). We also build a simulation\u0000 environment for training and evaluation. The efficiency of the proposed\u0000 algorithms is proved via extensive simulations with real-trace data.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"95 1","pages":"157-173"},"PeriodicalIF":1.4,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80450473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying and Navigating the Current Trends in Business Librarianship and Data Librarianship 识别和引导商业图书馆和数据图书馆的当前趋势
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-24 DOI: 10.5539/cis.v16n3p1
R. Pistone
These trends in business librarianship and data librarianship matter for the management of today’s academic libraries and this topic is important to discuss because librarians must respond to the developments in data science and big data. Industry leaders such as Yuanqing Yango, CEO of Lenovo refer to “new IT” and the coming revolution stemming from the usage of smart devices, edge and cloud computing, 5G networks, and (AI) Artificial Intelligence (Lenovo, 2022). Lenovo (2022) researchers undertook a study of 500 Chief Technology Officers (CTOs)from diverse industries to ascertain their perceptions about the future of technology. Both scholars and industry leaders alike agree that the technologies that will dominate will be forged so that humanity can meet the challenges of the future and the control of information will be at the forefront of these changes. Information professionals must learn about and master the technologies that industry leaders are reimagining as innovations that will try to improve our lives because librarianship is becoming increasingly data-driven. Faculty, staff, and students rely on information professionals to help them to understand the role of “new IT” and the opportunities that it creates. We also need more informed professionals because research is data-driven. More decision makers are using big data to make effective organizational decisions. Librarians must be cognizant of the trends that are governing innovations in technology to effectively provide information services to key stakeholders.
商业图书馆和数据图书馆的这些趋势对当今学术图书馆的管理很重要,讨论这个话题很重要,因为图书馆员必须对数据科学和大数据的发展做出反应。联想首席执行官杨元庆等行业领袖提到了“新IT”,以及智能设备、边缘和云计算、5G网络和人工智能(AI)的使用带来的即将到来的革命(联想,2022年)。联想(2022)的研究人员对来自不同行业的500名首席技术官(cto)进行了一项研究,以确定他们对未来技术的看法。学者和行业领袖都一致认为,将占据主导地位的技术将被锻造,以便人类能够应对未来的挑战,而信息的控制将处于这些变化的最前沿。信息专业人员必须学习并掌握行业领导者重新构想的技术,这些技术将试图改善我们的生活,因为图书馆业正变得越来越受数据驱动。教职员工和学生依靠信息专业人员来帮助他们理解“新IT”的角色和它所创造的机会。我们还需要更多见多识广的专业人士,因为研究是数据驱动的。越来越多的决策者正在使用大数据来做出有效的组织决策。图书馆员必须认识到控制技术创新的趋势,以便有效地为关键利益相关者提供信息服务。
{"title":"Identifying and Navigating the Current Trends in Business Librarianship and Data Librarianship","authors":"R. Pistone","doi":"10.5539/cis.v16n3p1","DOIUrl":"https://doi.org/10.5539/cis.v16n3p1","url":null,"abstract":"These trends in business librarianship and data librarianship matter for the management of today’s academic libraries and this topic is important to discuss because librarians must respond to the developments in data science and big data. Industry leaders such as Yuanqing Yango, CEO of Lenovo refer to “new IT” and the coming revolution stemming from the usage of smart devices, edge and cloud computing, 5G networks, and (AI) Artificial Intelligence (Lenovo, 2022). Lenovo (2022) researchers undertook a study of 500 Chief Technology Officers (CTOs)from diverse industries to ascertain their perceptions about the future of technology. Both scholars and industry leaders alike agree that the technologies that will dominate will be forged so that humanity can meet the challenges of the future and the control of information will be at the forefront of these changes. Information professionals must learn about and master the technologies that industry leaders are reimagining as innovations that will try to improve our lives because librarianship is becoming increasingly data-driven. Faculty, staff, and students rely on information professionals to help them to understand the role of “new IT” and the opportunities that it creates. We also need more informed professionals because research is data-driven. More decision makers are using big data to make effective organizational decisions. Librarians must be cognizant of the trends that are governing innovations in technology to effectively provide information services to key stakeholders.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"22 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83058175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Convergence of Hypergeometric to Binomial Distributions 关于超几何到二项分布的收敛性
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-24 DOI: 10.5539/cis.v16n3p15
Upul Rupassara, B. Sedai
This study presents a measure-theoretic approach to estimate the upper bound on the total variation of the di erence between hypergeometric and binomial distributions using the Kullback-Leibler information divergence. The binomial distribution can be used to find the probabilities associated with the binomial experiments. But if the sample size is large relative to the population size, the experiment may not be binomial, and a binomial distribution is not a good choice to find the probabilities associated with the experiment. The hypergeometric probability distribution is the appropriate probability model to be used when the sample size is large compared to the population size. An upper bound for the total variation in the distance between the hypergeometric and binomial distributions is derived using only the sample and population sizes. This upper bound is used to demonstrate how the hypergeometric distribution uniformly converges to the binomial distribution when the population size increases relative to the sample size.
本文提出了一种利用Kullback-Leibler信息散度估计超几何分布和二项分布之差的总变异上界的测度理论方法。二项分布可以用来找到与二项实验相关的概率。但是,如果样本量相对于总体规模较大,则实验可能不是二项分布,并且二项分布不是寻找与实验相关的概率的好选择。当样本量大于总体时,超几何概率分布是合适的概率模型。超几何分布和二项分布之间距离总变化的上界仅使用样本和总体大小推导。这个上界用于演示当总体大小相对于样本量增加时,超几何分布如何均匀收敛于二项分布。
{"title":"On the Convergence of Hypergeometric to Binomial Distributions","authors":"Upul Rupassara, B. Sedai","doi":"10.5539/cis.v16n3p15","DOIUrl":"https://doi.org/10.5539/cis.v16n3p15","url":null,"abstract":"This study presents a measure-theoretic approach to estimate the upper bound on the total variation of the di erence between hypergeometric and binomial distributions using the Kullback-Leibler information divergence. The binomial distribution can be used to find the probabilities associated with the binomial experiments. But if the sample size is large relative to the population size, the experiment may not be binomial, and a binomial distribution is not a good choice to find the probabilities associated with the experiment. The hypergeometric probability distribution is the appropriate probability model to be used when the sample size is large compared to the population size. An upper bound for the total variation in the distance between the hypergeometric and binomial distributions is derived using only the sample and population sizes. This upper bound is used to demonstrate how the hypergeometric distribution uniformly converges to the binomial distribution when the population size increases relative to the sample size.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"257 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76190653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of the Educational Robot on the Motor Reaction on Some Karate Skills 教育机器人对空手道部分技能运动反应的影响
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-24 DOI: 10.5539/cis.v16n3p7
Mohammed Ghazi
The effect of the educational robot on the motor reaction on some karate skills> have revolutionized various aspects of life, including education and training. Which integrate artificial intelligence with the emotional aspect of the learner. And the overall learning process. By incorporating artificial intelligence, these programs can provide personalized learning experiences and meet individual needs. To calculate the improvement ratio and the difference between the means, as well as the effect size ratio, we can use the following formulas: Average motor reaction time Difference between means= Average motor reaction time Average skill performance time Effect Size Ratio= Difference between means= Standard Deviation Let's calculate these values for each skill: -85.55 Difference between means= -46.42 Difference between means= -88.9 Difference between means= -83.7 Difference between means= 88 Difference between means= -49.762 Effect Size Ratio= Difference between means= Standard Deviation Using the provided standard deviation of 0.078, let's calculate the effect size ratio for each skill: Difference between means= -33.815 Effect Size Ratio= Difference between means= -41.438 Effect Size Ratio= Difference between means= -41.894 Effect Size Ratio= Difference between means= -39.737 Effect Size Ratio= Difference between means= -49.762 Effect Size Ratio= Negative values indicate a decrease in performance. Noting that the results are negative is not evidence of poor results, but to measure the reaction rate and response speed, I need a little time through the treatments, The difference between means is -33.815, The effect size ratio is -433. Indicating a large effect size. The difference between means is -41.438, The effect size ratio is -530. Indicating a large effect size. The difference between means is -41.894, The effect size ratio is -536. Indicating a large effect size. The difference between means is -39.737, The effect size ratio is -509. Indicating a large effect size. The difference between means is -49.762, The effect size ratio is -63.79, indicating a large effect size by incorporating these recommendations.
教育机器人对一些空手道技能的运动反应的影响已经彻底改变了生活的各个方面,包括教育和训练。它将人工智能与学习者的情感结合在一起。以及整个学习过程。通过结合人工智能,这些程序可以提供个性化的学习体验,满足个人需求。为了计算改进比和均值之差,以及效应大小比,我们可以使用以下公式:平均运动反应时间均值之差=平均运动反应时间平均技能表现时间效应大小比=均值之差=标准差让我们计算每个技能的这些值:-85.55均值差= -46.42均值差= -88.9均值差= -83.7均值差= 88均值差= -49.762效应大小比=均值差=标准差利用提供的0.078标准差,我们计算每种技能的效应大小比:均值之差= -33.815效应大小比=均值之差= -41.438效应大小比=均值之差= -41.894效应大小比=均值之差= -39.737效应大小比=均值之差= -49.762效应大小比=负值表示表现下降。值得注意的是,结果为阴性并不是不良结果的证据,但要测量反应速率和反应速度,我需要一点时间通过处理,均值之差为-33.815,效应大小比为-433。表明有很大的效应量。均值之差为-41.438,效应大小比为-530。表明有很大的效应量。均值之差为-41.894,效应大小比为-536。表明有很大的效应量。均值之差为-39.737,效应大小比为-509。表明有很大的效应量。均值之差为-49.762,效应量比为-63.79,表明纳入这些建议后的效应量较大。
{"title":"The Effect of the Educational Robot on the Motor Reaction on Some Karate Skills","authors":"Mohammed Ghazi","doi":"10.5539/cis.v16n3p7","DOIUrl":"https://doi.org/10.5539/cis.v16n3p7","url":null,"abstract":"The effect of the educational robot on the motor reaction on some karate skills> have revolutionized various aspects of life, including education and training. Which integrate artificial intelligence with the emotional aspect of the learner. And the overall learning process. By incorporating artificial intelligence, these programs can provide personalized learning experiences and meet individual needs. To calculate the improvement ratio and the difference between the means, as well as the effect size ratio, we can use the following formulas: Average motor reaction time Difference between means= Average motor reaction time Average skill performance time Effect Size Ratio= Difference between means= Standard Deviation Let's calculate these values for each skill: -85.55 Difference between means= -46.42 Difference between means= -88.9 Difference between means= -83.7 Difference between means= 88 Difference between means= -49.762 Effect Size Ratio= Difference between means= Standard Deviation Using the provided standard deviation of 0.078, let's calculate the effect size ratio for each skill: Difference between means= -33.815 Effect Size Ratio= Difference between means= -41.438 Effect Size Ratio= Difference between means= -41.894 Effect Size Ratio= Difference between means= -39.737 Effect Size Ratio= Difference between means= -49.762 Effect Size Ratio= Negative values indicate a decrease in performance. Noting that the results are negative is not evidence of poor results, but to measure the reaction rate and response speed, I need a little time through the treatments, The difference between means is -33.815, The effect size ratio is -433. Indicating a large effect size. The difference between means is -41.438, The effect size ratio is -530. Indicating a large effect size. The difference between means is -41.894, The effect size ratio is -536. Indicating a large effect size. The difference between means is -39.737, The effect size ratio is -509. Indicating a large effect size. The difference between means is -49.762, The effect size ratio is -63.79, indicating a large effect size by incorporating these recommendations.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"15 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82510743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automation-Based User Input Sql Injection Detection and Prevention Framework 基于自动化的用户输入Sql注入检测与预防框架
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-02 DOI: 10.5539/cis.v16n2p51
Fredrick Ochieng Okello, D. Kaburu, Ndia G. John
Autodect framework protects management information systems (MIS) and databases from user input SQL injection attacks. This framework overcomes intrusion or penetration into the system by automatically detecting and preventing attacks from the user input end. The attack intentions is also known since                 it is linked to a proxy database, which has a normal and abnormal code vector profiles that      helps to gather information about the intent as well as knowing the areas of interest while conducting the attack. The information about the attack is forwarded to Autodect knowledge base (database), meaning that any successive attacks from the proxy database will be compared to the existing attack pattern logs in the knowledge base, in future this knowledge base-driven database will help organizations to analyze trends of attackers, profile them and deter them. The research evaluated the existing security frameworks used to prevent user input SQL injection; analysis was also done on the factors that lead to the detection of SQL injection. This knowledge-based framework     is able to predict the end goal of any injected attack vector. (Known and unknown signatures). Experiments were conducted on true and simulation websites and open-source datasets to analyze the performance and a comparison drawn between the Autodect framework and other existing tools. The research showed that Autodect framework has an accuracy level of 0.98. The research found a gap that all existing tools and frameworks never came up with a standard datasets for sql injection, neither do we have a universally accepted standard data set.
Autodect框架保护管理信息系统(MIS)和数据库免受用户输入SQL注入攻击。该框架通过自动检测和防止来自用户输入端的攻击来克服对系统的入侵或渗透。攻击意图也是已知的,因为它链接到一个代理数据库,该数据库具有正常和异常的代码矢量配置文件,有助于收集有关意图的信息,并在进行攻击时了解感兴趣的领域。有关攻击的信息被转发到Autodect知识库(数据库),这意味着来自代理数据库的任何连续攻击都将与知识库中现有的攻击模式日志进行比较,将来这个知识库驱动的数据库将帮助组织分析攻击者的趋势,对他们进行分析并阻止他们。该研究评估了用于防止用户输入SQL注入的现有安全框架;分析了导致检测到SQL注入的因素。这种基于知识的框架能够预测任何注入攻击向量的最终目标。(已知和未知签名)。在真实和仿真网站以及开源数据集上进行了实验,分析了Autodect框架的性能,并与其他现有工具进行了比较。研究表明,Autodect框架的准确率水平为0.98。研究发现,所有现有的工具和框架都没有提供sql注入的标准数据集,我们也没有一个普遍接受的标准数据集。
{"title":"Automation-Based User Input Sql Injection Detection and Prevention Framework","authors":"Fredrick Ochieng Okello, D. Kaburu, Ndia G. John","doi":"10.5539/cis.v16n2p51","DOIUrl":"https://doi.org/10.5539/cis.v16n2p51","url":null,"abstract":"Autodect framework protects management information systems (MIS) and databases from user input SQL injection attacks. This framework overcomes intrusion or penetration into the system by automatically detecting and preventing attacks from the user input end. The attack intentions is also known since                 it is linked to a proxy database, which has a normal and abnormal code vector profiles that      helps to gather information about the intent as well as knowing the areas of interest while conducting the attack. The information about the attack is forwarded to Autodect knowledge base (database), meaning that any successive attacks from the proxy database will be compared to the existing attack pattern logs in the knowledge base, in future this knowledge base-driven database will help organizations to analyze trends of attackers, profile them and deter them. The research evaluated the existing security frameworks used to prevent user input SQL injection; analysis was also done on the factors that lead to the detection of SQL injection. This knowledge-based framework     is able to predict the end goal of any injected attack vector. (Known and unknown signatures). Experiments were conducted on true and simulation websites and open-source datasets to analyze the performance and a comparison drawn between the Autodect framework and other existing tools. The research showed that Autodect framework has an accuracy level of 0.98. The research found a gap that all existing tools and frameworks never came up with a standard datasets for sql injection, neither do we have a universally accepted standard data set.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"77 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89659890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2 《计算机与信息科学》第16卷第2期
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-02 DOI: 10.5539/cis.v16n2p63
Chris Lee
Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2, 2023
《计算机与信息科学》,Vol. 16, No. 2, 2023
{"title":"Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2","authors":"Chris Lee","doi":"10.5539/cis.v16n2p63","DOIUrl":"https://doi.org/10.5539/cis.v16n2p63","url":null,"abstract":"Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2, 2023","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"168 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74865019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suhail: A Deep Learning-Based System for Identifying Missing People Suhail:一个基于深度学习的识别失踪人口的系统
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-07 DOI: 10.5539/cis.v16n2p36
Wareef K. Aljohani, Reem Alshehri, Abrar A. Alghamdi, Mashael M. Aljuhani, Dareen A. Alrefaei, R. Aljohani, Abdulqader M. Almars
Many people become missing in Saudi Arabia every day, including children, young people, and the mentally ill as well as the elderly with Alzheimer’s. There are many missing people cases that are still unsolved. In Saudi Arabia, people use social media platforms such as Twitter to report missing people cases. The application of deep learning has been successful in a wide range of fields including computer vision and machine vision. In particular, face recognition techniques are effective in saving time and effort, especially when searching for missing individuals. Hence, the goal of this research is to solve this issue by developing a deep learning-based system for identifying missing individuals. This paper introduces a new system called Suhail. The system has been implemented and developed using Android Studio and open-source libraries such as TensorFlow. First, users or governments can report missing persons by uploading photos. Updates and information will then be shared with the rest of the system’s users (volunteers). Once a volunteer discovers a suspect, they scan their face using camera. Then, our application uses face recognition techniques to compare the suspect's photo with photos from the repository. Finally, once a comparison is found, our application contacts the suspect’s family, informs them of his location and then notifies the police that a missing person has been located. By using our application and face recognition systems, we help families and police locate and reach a missing person which saves time and effort. In this study, 759 participants were enrolled to evaluate the performance of the Suhail system. Engagement, aesthetics, and functionality are used to evaluate the user experience. The results of the experiment show that users enjoy the new features of the application and that the system is simple to use. Moreover, the system would help governments and individuals identify missing people faster.
在沙特阿拉伯,每天都有许多人失踪,包括儿童、年轻人、精神病患者和老年痴呆症患者。有许多失踪人口的案件仍未解决。在沙特阿拉伯,人们使用推特等社交媒体平台报告失踪人口案件。深度学习在包括计算机视觉和机器视觉在内的广泛领域的应用取得了成功。特别是,人脸识别技术可以有效地节省时间和精力,特别是在寻找失踪人员时。因此,本研究的目标是通过开发一个基于深度学习的系统来识别失踪人员来解决这个问题。本文介绍了一个名为Suhail的新系统。该系统是使用Android Studio和开源库(如TensorFlow)实现和开发的。首先,用户或政府可以通过上传照片来报告失踪人员。然后,更新和信息将与系统的其他用户(志愿者)共享。一旦志愿者发现了嫌疑人,他们就会用摄像头扫描他们的面部。然后,我们的应用程序使用人脸识别技术将嫌疑犯的照片与存储库中的照片进行比较。最后,一旦找到比对结果,我们的应用程序就会联系嫌疑人的家人,告知他们嫌疑人的位置,然后通知警方找到了失踪人员。通过使用我们的应用程序和面部识别系统,我们帮助家属和警方找到并联系失踪人员,从而节省了时间和精力。在这项研究中,759名参与者被招募来评估Suhail系统的性能。用户粘性、美感和功能是用来评估用户体验的。实验结果表明,用户喜欢应用程序的新功能,系统使用简单。此外,该系统将帮助政府和个人更快地识别失踪人口。
{"title":"Suhail: A Deep Learning-Based System for Identifying Missing People","authors":"Wareef K. Aljohani, Reem Alshehri, Abrar A. Alghamdi, Mashael M. Aljuhani, Dareen A. Alrefaei, R. Aljohani, Abdulqader M. Almars","doi":"10.5539/cis.v16n2p36","DOIUrl":"https://doi.org/10.5539/cis.v16n2p36","url":null,"abstract":"Many people become missing in Saudi Arabia every day, including children, young people, and the mentally ill as well as the elderly with Alzheimer’s. There are many missing people cases that are still unsolved. In Saudi Arabia, people use social media platforms such as Twitter to report missing people cases. The application of deep learning has been successful in a wide range of fields including computer vision and machine vision. In particular, face recognition techniques are effective in saving time and effort, especially when searching for missing individuals. Hence, the goal of this research is to solve this issue by developing a deep learning-based system for identifying missing individuals. This paper introduces a new system called Suhail. The system has been implemented and developed using Android Studio and open-source libraries such as TensorFlow. First, users or governments can report missing persons by uploading photos. Updates and information will then be shared with the rest of the system’s users (volunteers). Once a volunteer discovers a suspect, they scan their face using camera. Then, our application uses face recognition techniques to compare the suspect's photo with photos from the repository. Finally, once a comparison is found, our application contacts the suspect’s family, informs them of his location and then notifies the police that a missing person has been located. By using our application and face recognition systems, we help families and police locate and reach a missing person which saves time and effort. In this study, 759 participants were enrolled to evaluate the performance of the Suhail system. Engagement, aesthetics, and functionality are used to evaluate the user experience. The results of the experiment show that users enjoy the new features of the application and that the system is simple to use. Moreover, the system would help governments and individuals identify missing people faster.","PeriodicalId":50636,"journal":{"name":"Computer Science and Information Systems","volume":"88 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77995757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Science and Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1