{"title":"Design and Application of Neural Network-based Bp Algorithm in Speech Translation Robot","authors":"Yu Jie","doi":"10.31449/inf.v47i7.4845","DOIUrl":"https://doi.org/10.31449/inf.v47i7.4845","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42713731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake Image Detection Using Deep Learning","authors":"Raidah S. Khudeyer, Noor Mohammed Almoosawi","doi":"10.31449/inf.v47i7.4741","DOIUrl":"https://doi.org/10.31449/inf.v47i7.4741","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49638258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Locality Improvement Scheme Based on QR Code Technique within Inverted Index","authors":"A. A. Alyousif, A. Yassin","doi":"10.31449/inf.v47i7.4745","DOIUrl":"https://doi.org/10.31449/inf.v47i7.4745","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47461627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Bukar, Md. Shohel Sayeed, Siti Fatimah Abdul Razak, S. Yogarayan, Oluwatosin Ahmed Amodu
{"title":"An exploratory bibliometric analysis of the literature on the age of information-aware unmanned aerial vehicles aided communication","authors":"U. Bukar, Md. Shohel Sayeed, Siti Fatimah Abdul Razak, S. Yogarayan, Oluwatosin Ahmed Amodu","doi":"10.31449/inf.v47i7.4783","DOIUrl":"https://doi.org/10.31449/inf.v47i7.4783","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42128637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Background Music Recognition and Automatic Recommendation Based on Gmm Model","authors":"Wei Zhou, Ke Ma","doi":"10.31449/inf.v47i7.4812","DOIUrl":"https://doi.org/10.31449/inf.v47i7.4812","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47798841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Oladipupo, Princewill Chima Obuzor, Babatunde J. Bamgbade, A. Adeniyi, Kazeem M. Olagunju, S. A. Ajagbe
was to obtain a financial dataset from the top database, "Kaggle". Create a machine learning (ML) approach in Python that intends to automate the financial dataset cleaning. This covers ingesting data, addressing incomplete data, addressing anomalies, one-hot wrapping and label encoding, extracting date and time values, and data normalization. Implementing an unsupervised machine learning method that attempts to automate financial dataset labeling (k-means). Using the method includes the elbow principle, k-means clustering, data modeling of "age" versus "arrival," dimensionality reductions, computer vision, and dataset categorizing using the groupings. An e mpirical assessment of the cleaned and labeled automated trading dataset utilizing a comparison of the cleaned dataset before and after PCA adoption. The results show that the developed ML technique not only improved the performance of the audit data used in this study, but also classified the data after cleaning it and removing the unpleasant section and incomplete data, as shown by the k-means segmentation result and grouping by PCA.
{"title":"An Automated Python Script for Data Cleaning and Labeling using Machine Learning Technique","authors":"M. A. Oladipupo, Princewill Chima Obuzor, Babatunde J. Bamgbade, A. Adeniyi, Kazeem M. Olagunju, S. A. Ajagbe","doi":"10.31449/inf.v47i6.4474","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4474","url":null,"abstract":"was to obtain a financial dataset from the top database, \"Kaggle\". Create a machine learning (ML) approach in Python that intends to automate the financial dataset cleaning. This covers ingesting data, addressing incomplete data, addressing anomalies, one-hot wrapping and label encoding, extracting date and time values, and data normalization. Implementing an unsupervised machine learning method that attempts to automate financial dataset labeling (k-means). Using the method includes the elbow principle, k-means clustering, data modeling of \"age\" versus \"arrival,\" dimensionality reductions, computer vision, and dataset categorizing using the groupings. An e mpirical assessment of the cleaned and labeled automated trading dataset utilizing a comparison of the cleaned dataset before and after PCA adoption. The results show that the developed ML technique not only improved the performance of the audit data used in this study, but also classified the data after cleaning it and removing the unpleasant section and incomplete data, as shown by the k-means segmentation result and grouping by PCA.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49226008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Clustering Techniques Challenged and Perspectives: Review","authors":"F. H. Awad, Murtadha M. Hamad","doi":"10.31449/inf.v47i6.4445","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4445","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45445201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Baseline Transliteration Corpus for Improved English-Amharic Machine Translation","authors":"Yohannes Biadgligne, K. Smaili","doi":"10.31449/inf.v47i6.4395","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4395","url":null,"abstract":",","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47338588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Akinyemi, Dauda Akinwuyi Olalere, M. Sanni, E. Olajubu, Ganiyu A. Aderounmu, Isa Ali Ibrahim (Pantami)
{"title":"Performance Evaluation of Machine Learning Models for Cyber Threat Detection and Prevention in Mobile Money Services","authors":"B. Akinyemi, Dauda Akinwuyi Olalere, M. Sanni, E. Olajubu, Ganiyu A. Aderounmu, Isa Ali Ibrahim (Pantami)","doi":"10.31449/inf.v47i6.4691","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4691","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47946368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}