首页 > 最新文献

Informatica最新文献

英文 中文
Improved Model for Identifying the Cyberbullying based on Tweets of Twitter 基于推特推文识别网络欺凌的改进模型
IF 2.9 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-09 DOI: 10.31449/inf.v47i6.4534
Darwin Samalo, Rizky Martin, D. N. Utama
The surge of cyberbullying on social media platforms is a major concern in today's digital age, with its prevalence escalating alongside advancements in technology. Thus, devising methods to detect and eliminate cyberbullying has become a crucial task. This research meticulously presents a refined model for identifying instances of cyberbullying, building on previous methodologies. The process of devising the model involved a thorough literature review, object-oriented design
社交媒体平台上网络欺凌的激增是当今数字时代的一个主要问题,随着技术的进步,网络欺凌的普遍性也在升级。因此,设计检测和消除网络欺凌的方法已成为一项至关重要的任务。这项研究在先前方法的基础上,精心提出了一个用于识别网络欺凌实例的精细模型。设计模型的过程包括全面的文献综述、面向对象的设计
{"title":"Improved Model for Identifying the Cyberbullying based on Tweets of Twitter","authors":"Darwin Samalo, Rizky Martin, D. N. Utama","doi":"10.31449/inf.v47i6.4534","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4534","url":null,"abstract":"The surge of cyberbullying on social media platforms is a major concern in today's digital age, with its prevalence escalating alongside advancements in technology. Thus, devising methods to detect and eliminate cyberbullying has become a crucial task. This research meticulously presents a refined model for identifying instances of cyberbullying, building on previous methodologies. The process of devising the model involved a thorough literature review, object-oriented design","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45112721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities 主题建模对软件漏洞严重程度预测的影响
IF 2.9 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-08 DOI: 10.31449/inf.v47i6.3712
Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon
identify a critical
识别关键
{"title":"The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities","authors":"Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon","doi":"10.31449/inf.v47i6.3712","DOIUrl":"https://doi.org/10.31449/inf.v47i6.3712","url":null,"abstract":"identify a critical","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45171018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Processing of Municipal Wastewater Recycling Based on Genetic Algorithm 基于遗传算法的城市污水回用数据处理
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4038
Zijun Zhao, Jianchao Zhu, Kaiming Yang, Song Wang, Mingxiao Zeng
In order to accurately process the data of urban sewage recycling, this paper designs an adaptive genetic algorithm, which integrates genetic algorithm, adaptive genetic algorithm and traditional PID respectively, and designs simulation experiments to compare their performance. The simulation results show that the self-adaptive PID control algorithm is superior to the genetic PID control algorithm in both control accuracy and dynamic characteristics. The PID controller with good optimization performance is applied to the control object of sewage treatment system. Through simulation analysis, the adaptive genetic algorithm only needs 52s when adjusting the step response simulation. The overshoot of the system is 8%. The interference in the simulation is restored to a stable state within the interference 18S, and the adjustment time in the robustness simulation is reduced by about 15s compared with the genetic algorithm. In conclusion, the adjustment time of the system is shortened, the overshoot of the system is reduced, and the anti-interference and robustness are enhanced. For the dissolved oxygen concentration of the key object in the control system, the above controller with good performance is applied to the sewage treatment control system, which not only reduces the overshoot and regulation time, but also improves the control accuracy, and can well meet the control requirements of sewage treatment.
为了准确处理城市污水回用数据,本文设计了一种自适应遗传算法,将遗传算法、自适应遗传算法和传统PID分别集成在一起,并设计了仿真实验来比较它们的性能。仿真结果表明,自适应PID控制算法在控制精度和动态特性方面都优于遗传PID控制算法。将具有良好优化性能的PID控制器应用于污水处理系统的控制对象。通过仿真分析,自适应遗传算法在调整阶跃响应仿真时只需要52s。系统超调量为8%。仿真中的干扰在干扰18S内恢复到稳定状态,鲁棒性仿真中的调整时间比遗传算法减少了约15s。综上所述,缩短了系统的调整时间,减小了系统的超调量,增强了系统的抗干扰性和鲁棒性。对于控制系统中关键对象的溶解氧浓度,将上述性能良好的控制器应用到污水处理控制系统中,不仅减少了超调时间和调节时间,而且提高了控制精度,能够很好地满足污水处理的控制要求。
{"title":"Data Processing of Municipal Wastewater Recycling Based on Genetic Algorithm","authors":"Zijun Zhao, Jianchao Zhu, Kaiming Yang, Song Wang, Mingxiao Zeng","doi":"10.31449/inf.v47i3.4038","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4038","url":null,"abstract":"In order to accurately process the data of urban sewage recycling, this paper designs an adaptive genetic algorithm, which integrates genetic algorithm, adaptive genetic algorithm and traditional PID respectively, and designs simulation experiments to compare their performance. The simulation results show that the self-adaptive PID control algorithm is superior to the genetic PID control algorithm in both control accuracy and dynamic characteristics. The PID controller with good optimization performance is applied to the control object of sewage treatment system. Through simulation analysis, the adaptive genetic algorithm only needs 52s when adjusting the step response simulation. The overshoot of the system is 8%. The interference in the simulation is restored to a stable state within the interference 18S, and the adjustment time in the robustness simulation is reduced by about 15s compared with the genetic algorithm. In conclusion, the adjustment time of the system is shortened, the overshoot of the system is reduced, and the anti-interference and robustness are enhanced. For the dissolved oxygen concentration of the key object in the control system, the above controller with good performance is applied to the sewage treatment control system, which not only reduces the overshoot and regulation time, but also improves the control accuracy, and can well meet the control requirements of sewage treatment.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-based Cnn Multi-modal Camera Model Identification for Video Source Identification 基于深度学习的Cnn多模态摄像机模型识别用于视频源识别
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4392
Surjeet Singh, Vivek Kumar Sehgal
There is a high demand for multimedia forensics analysts to locate the original camera of photographs and videos that are being taken nowadays. There has been considerable progress in the technology of identifying the source of data, which has enabled conflict resolutions involving copyright infringements and identifying those responsible for serious offences to be resolved. This study focuses on the issue of identifying the camera model used to acquire video sequences used in this research that is, identifying the type of camera used to capture the video sequence under investigation. For this purpose, we created two distinct CNN-based camera model recognition techniques to be used in an innovative multi-modal setting. The proposed multi-modal methods combine audio and visual information in order to address the identification issue, which is superior to mono-modal methods which use only the visual or audio information from the investigated video to provide the identification information.According to legal standards of admissible evidence and criminal procedure, Forensic Science involves the application of science to the legal aspects of criminal and civil law, primarily during criminal investigations, in line with the standards of admissible evidence and criminal procedure in the law. It is responsible for collecting, preserving, and analyzing scientific evidence in the course of an investigation. It has become a critical part of criminology as a result of the rapid rise in crime rates over the last few decades. Our proposed methods were tested on a well-known dataset known as the Vision dataset, which contains about 2000 video sequences gathered from various devices of varying types. It is conducted experiments on social media platforms such as YouTube and WhatsApp as well as native videos directly obtained from their acquisition devices by the means of their acquisition devices. According to the results of the study, the multimodal approaches suggest that they greatly outperform their mono-modal equivalents in addressing the challenge at hand, constituting an effective approach to address the challenge and offering the possibility of even more difficult circumstances in the future
现在对多媒体取证分析人员的需求很大,他们需要找到拍摄的照片和视频的原始相机。在查明数据来源的技术方面已经取得了相当大的进展,这使得能够解决涉及侵犯版权的冲突,并查明对严重罪行负有责任的人。本研究的重点是确定用于获取本研究中使用的视频序列的摄像机模型的问题,即确定用于捕获所调查的视频序列的摄像机类型。为此,我们创建了两种不同的基于cnn的相机模型识别技术,用于创新的多模态设置。本文提出的多模态方法结合了音频和视觉信息来解决识别问题,优于单模态方法仅使用调查视频中的视觉或音频信息来提供识别信息。根据可采证据和刑事诉讼程序的法律标准,法医学涉及将科学应用于刑法和民法的法律方面,主要是在刑事调查期间,符合法律中可采证据和刑事诉讼程序的标准。它负责在调查过程中收集、保存和分析科学证据。由于过去几十年来犯罪率的迅速上升,它已成为犯罪学的一个重要组成部分。我们提出的方法在一个众所周知的数据集视觉数据集上进行了测试,该数据集包含从不同类型的各种设备收集的大约2000个视频序列。在YouTube、WhatsApp等社交媒体平台上进行实验,并通过其采集设备直接从其采集设备上获取原生视频。根据研究结果,多式联运方法表明,它们在应对手头的挑战方面大大优于单式联运方法,构成了应对挑战的有效方法,并为未来更困难的情况提供了可能性
{"title":"Deep Learning-based Cnn Multi-modal Camera Model Identification for Video Source Identification","authors":"Surjeet Singh, Vivek Kumar Sehgal","doi":"10.31449/inf.v47i3.4392","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4392","url":null,"abstract":"There is a high demand for multimedia forensics analysts to locate the original camera of photographs and videos that are being taken nowadays. There has been considerable progress in the technology of identifying the source of data, which has enabled conflict resolutions involving copyright infringements and identifying those responsible for serious offences to be resolved. This study focuses on the issue of identifying the camera model used to acquire video sequences used in this research that is, identifying the type of camera used to capture the video sequence under investigation. For this purpose, we created two distinct CNN-based camera model recognition techniques to be used in an innovative multi-modal setting. The proposed multi-modal methods combine audio and visual information in order to address the identification issue, which is superior to mono-modal methods which use only the visual or audio information from the investigated video to provide the identification information.According to legal standards of admissible evidence and criminal procedure, Forensic Science involves the application of science to the legal aspects of criminal and civil law, primarily during criminal investigations, in line with the standards of admissible evidence and criminal procedure in the law. It is responsible for collecting, preserving, and analyzing scientific evidence in the course of an investigation. It has become a critical part of criminology as a result of the rapid rise in crime rates over the last few decades. Our proposed methods were tested on a well-known dataset known as the Vision dataset, which contains about 2000 video sequences gathered from various devices of varying types. It is conducted experiments on social media platforms such as YouTube and WhatsApp as well as native videos directly obtained from their acquisition devices by the means of their acquisition devices. According to the results of the study, the multimodal approaches suggest that they greatly outperform their mono-modal equivalents in addressing the challenge at hand, constituting an effective approach to address the challenge and offering the possibility of even more difficult circumstances in the future","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing A Permissioned Blockchain Network For The Insurance Claim Process Using Hyperledger Fabric And Composer 使用Hyperledger Fabric和Composer为保险索赔过程设计一个许可的区块链网络
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4158
Archana Hombalimath, Neha Mangla, Arun Balodi
This research aims to examine the benefits of blockchain technology (BCT) in the vehicle insurance process. The article addresses a number of benefits offered by BCT, including automating the identity verification and doing away with the need for numerous parties to manually certify the legitimacy of transactions. India's financial and business networks can be anticipated to change the accounting process to a different extreme with the introduction of BCT. Unfortunately, they are having some difficulties implementing and acclimating to this modern technology. Here is the solution, blockchain technology may help us solve the existing problem. Insurance firms and car owners can benefit from blockchain technology since it can effectively open up communication channels, encourage industry integration, and improve insurance provider’s ability to access record. Using BCT, banking operations will be more efficient, quicker, and less expensive because to the removal of middlemen. Decentralization, transparency, and secure transactions will be the main advantages.
本研究旨在研究区块链技术(BCT)在车辆保险过程中的好处。本文讨论了BCT提供的许多好处,包括自动化身份验证,以及不需要许多各方手动证明交易的合法性。随着BCT的引入,印度的金融和商业网络可以预期将会计流程改变到一个不同的极端。不幸的是,他们在实施和适应这种现代技术方面遇到了一些困难。这里是解决方案,区块链技术可能会帮助我们解决现有的问题。保险公司和车主可以从区块链技术中受益,因为它可以有效地打开沟通渠道,鼓励行业整合,并提高保险提供商访问记录的能力。使用BCT,银行业务将更高效、更快、更便宜,因为它消除了中间商。去中心化、透明度和安全交易将是主要优势。
{"title":"Designing A Permissioned Blockchain Network For The Insurance Claim Process Using Hyperledger Fabric And Composer","authors":"Archana Hombalimath, Neha Mangla, Arun Balodi","doi":"10.31449/inf.v47i3.4158","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4158","url":null,"abstract":"This research aims to examine the benefits of blockchain technology (BCT) in the vehicle insurance process. The article addresses a number of benefits offered by BCT, including automating the identity verification and doing away with the need for numerous parties to manually certify the legitimacy of transactions. India's financial and business networks can be anticipated to change the accounting process to a different extreme with the introduction of BCT. Unfortunately, they are having some difficulties implementing and acclimating to this modern technology. Here is the solution, blockchain technology may help us solve the existing problem. Insurance firms and car owners can benefit from blockchain technology since it can effectively open up communication channels, encourage industry integration, and improve insurance provider’s ability to access record. Using BCT, banking operations will be more efficient, quicker, and less expensive because to the removal of middlemen. Decentralization, transparency, and secure transactions will be the main advantages.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Missing Value Imputation Techniques on E-Commerce Product Ratings 电子商务产品评级缺失价值归算技术的比较研究
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4156
Dimple Chehal, Parul Gupta, Payal Gulati, Tanisha Gupta
Missing data is a common occurrence in practically all studies, and it adds a layer of ambiguity to data interpretation. Missing values in a dataset mean loss of important information. It is one of the most common data quality issues. Missing values are values that are not present in the data set. These are usually written as NAN’s, blanks, or any other placeholders. Missing values create imbalanced observations, biased estimates and sometimes lead to misleading results. The majority of real-world datasets have missing values. As a result, to deliver an efficient and valid analysis and the solutions should be taken into account appropriately. By filling in the missing values a complete dataset can be created and the challenge of dealing with complex patterns of missingness can be avoided. Missing values can be of both continuous and categorical types. To get more precise results, a variety of techniques to fill out missing values can be used. In the present study, nine different imputation methods: Simple Imputer, Last Observation Carried forward (LOCF), KNN Imputation (KNN), Hot Deck, Linear Regression, MissForest, Random Forest Regression, DataWig, and Multivariate Imputation by Chained Equation (MICE) were compared. The comparison was performed on Amazon real-time dataset based on three evaluation criteria: R- Squared (R 2 ), Mean squared error (MSE), and Mean absolute error (MAE). As a result of the findings KNN had the best outcomes, while DataWig had the worst results for R- Squared (R 2 ). The R-squared value ranges from 0-1. In terms of mean squared error (MSE) and mean absolute error (MAE), the Hot deck imputation approach fared best, whereas MissForest performed worst (MAE). The hot deck imputation method appears to be of interest and merits further investigation in practice.
缺失数据在几乎所有的研究中都很常见,这给数据解释增加了一层模糊性。数据集中缺失的值意味着重要信息的丢失。这是最常见的数据质量问题之一。缺失值是数据集中不存在的值。这些通常写成NAN、空格或任何其他占位符。缺失的值会造成不平衡的观察、有偏差的估计,有时还会导致误导性的结果。大多数真实世界的数据集都有缺失值。因此,要提供有效和有效的分析和解决方案,应适当考虑。通过填充缺失值,可以创建一个完整的数据集,并且可以避免处理缺失的复杂模式的挑战。缺失值可以是连续型的,也可以是分类型的。为了获得更精确的结果,可以使用各种技术来填充缺失值。本文比较了9种不同的归算方法:Simple Imputer、Last Observation Carried forward (LOCF)、KNN imputation (KNN)、Hot Deck、Linear Regression、MissForest、Random Forest Regression、DataWig和Multivariate imputation by Chained Equation (MICE)。基于R- Squared (r2)、Mean Squared error (MSE)和Mean absolute error (MAE)三个评价标准对Amazon实时数据集进行比较。结果发现,KNN的结果最好,而DataWig的R- Squared (r2)结果最差。r平方的取值范围为0-1。在均方误差(MSE)和平均绝对误差(MAE)方面,Hot deck imputation方法表现最好,而MissForest方法表现最差(MAE)。热甲板归算方法是一种有趣的方法,值得在实践中进一步研究。
{"title":"Comparative Study of Missing Value Imputation Techniques on E-Commerce Product Ratings","authors":"Dimple Chehal, Parul Gupta, Payal Gulati, Tanisha Gupta","doi":"10.31449/inf.v47i3.4156","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4156","url":null,"abstract":"Missing data is a common occurrence in practically all studies, and it adds a layer of ambiguity to data interpretation. Missing values in a dataset mean loss of important information. It is one of the most common data quality issues. Missing values are values that are not present in the data set. These are usually written as NAN’s, blanks, or any other placeholders. Missing values create imbalanced observations, biased estimates and sometimes lead to misleading results. The majority of real-world datasets have missing values. As a result, to deliver an efficient and valid analysis and the solutions should be taken into account appropriately. By filling in the missing values a complete dataset can be created and the challenge of dealing with complex patterns of missingness can be avoided. Missing values can be of both continuous and categorical types. To get more precise results, a variety of techniques to fill out missing values can be used. In the present study, nine different imputation methods: Simple Imputer, Last Observation Carried forward (LOCF), KNN Imputation (KNN), Hot Deck, Linear Regression, MissForest, Random Forest Regression, DataWig, and Multivariate Imputation by Chained Equation (MICE) were compared. The comparison was performed on Amazon real-time dataset based on three evaluation criteria: R- Squared (R 2 ), Mean squared error (MSE), and Mean absolute error (MAE). As a result of the findings KNN had the best outcomes, while DataWig had the worst results for R- Squared (R 2 ). The R-squared value ranges from 0-1. In terms of mean squared error (MSE) and mean absolute error (MAE), the Hot deck imputation approach fared best, whereas MissForest performed worst (MAE). The hot deck imputation method appears to be of interest and merits further investigation in practice.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Analysis of Uplink NOMA and OMA for 5G Applications: An Optimized Network 面向5G应用的上行NOMA和OMA计算分析:一个优化的网络
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4145
Shelesh Krishna Saraswat, Vinay Kumar Deolia, Aasheesh Shukla
In This paper, the non-orthogonal multiple access (NOMA) schemes are compared with the multiple orthogonal access (OMA) schemes on the basis of the resource allocation validity of uplinks. By reflecting the involvement of a measure of each user’s data on the system’s total amount, we analyze the main reasons why NOMA provides justice service distribution over OMA on unequal channels. Moreover, the Jain index is observed and proposed to quantify the irregularity of numerous user channels, according to the metric for the Jain index based on the Jain index. More importantly, the proposed metric establishes the criteria for choosing between NOMA and OMA to share resources correctly. Based on this debate, we offer a program that combines NOMA and OMA to increase user integrity. Imitation effects substantiate the exactness of the proposed matrix and display improvement of the accuracy of the showcased NOMA-OMA mixture system as compared to standard OMA as well as NOMA systems.
本文在上行链路资源分配有效性的基础上,对非正交多址(NOMA)方案与多正交多址(OMA)方案进行了比较。通过反映每个用户数据对系统总量的影响,我们分析了NOMA在不平等渠道上提供司法服务分配的主要原因。此外,根据基于Jain指数的Jain指数度量,观察并提出了Jain指数来量化众多用户通道的不规则性。更重要的是,所建议的度量建立了在NOMA和OMA之间进行选择以正确共享资源的标准。基于这一争论,我们提供了一个将NOMA和OMA结合起来的程序,以提高用户的完整性。与标准的OMA和NOMA系统相比,仿真效果证实了所提出矩阵的准确性,并显示了所展示的NOMA-OMA混合系统的准确性的提高。
{"title":"Computational Analysis of Uplink NOMA and OMA for 5G Applications: An Optimized Network","authors":"Shelesh Krishna Saraswat, Vinay Kumar Deolia, Aasheesh Shukla","doi":"10.31449/inf.v47i3.4145","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4145","url":null,"abstract":"In This paper, the non-orthogonal multiple access (NOMA) schemes are compared with the multiple orthogonal access (OMA) schemes on the basis of the resource allocation validity of uplinks. By reflecting the involvement of a measure of each user’s data on the system’s total amount, we analyze the main reasons why NOMA provides justice service distribution over OMA on unequal channels. Moreover, the Jain index is observed and proposed to quantify the irregularity of numerous user channels, according to the metric for the Jain index based on the Jain index. More importantly, the proposed metric establishes the criteria for choosing between NOMA and OMA to share resources correctly. Based on this debate, we offer a program that combines NOMA and OMA to increase user integrity. Imitation effects substantiate the exactness of the proposed matrix and display improvement of the accuracy of the showcased NOMA-OMA mixture system as compared to standard OMA as well as NOMA systems.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Decision Support Model for Tech-Based Startup Funding using Multistage Fuzzy Logic 基于多阶段模糊逻辑的科技创业融资群体决策支持模型
IF 2.9 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-01 DOI: 10.31449/inf.v47i6.4569
M. Devanda, D. N. Utama
{"title":"Group Decision Support Model for Tech-Based Startup Funding using Multistage Fuzzy Logic","authors":"M. Devanda, D. N. Utama","doi":"10.31449/inf.v47i6.4569","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4569","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46360174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Recommendation System of E-learning Resources Based on Bayesian Classification Algorithm 基于贝叶斯分类算法的网络学习资源个性化推荐系统
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-30 DOI: 10.31449/inf.v47i3.3979
Xiuhui Wang
In order to meet learners' personalized learning needs, realize learners' personalized development, and solve the problem of learners' information Trek and overload, a development scheme of e-learning resources personalized recommendation system based on Bayesian algorithm is proposed. This paper studies the personalized Association recommendation model integrating association rule mining and Bayesian network, and improves the association rule mining algorithm by combining historical record pruning and Bayesian network verification. In the process of association rule mining, combined with user history, the frequent itemsets in association rules are filtered, and the itemsets below the given threshold are pruned. The pruned item set is input into the Bayesian verification network for personalized verification, and the verification results are sorted and recommended according to the ranking, so as to give priority to the readers who really like the books. The recommendation model solves the problem of weak personalization in the existing recommendation system to a certain extent. Experiments show that Bayesian network can improve the personalization of association recommendation.
为了满足学习者的个性化学习需求,实现学习者的个性化发展,解决学习者信息跋涉和过载的问题,提出了一种基于贝叶斯算法的电子学习资源个性化推荐系统的开发方案。本文研究了将关联规则挖掘和贝叶斯网络相结合的个性化关联推荐模型,并结合历史记录修剪和贝叶斯网络验证对关联规则挖掘算法进行了改进。在关联规则挖掘过程中,结合用户历史对关联规则中频繁出现的项集进行过滤,对低于给定阈值的项集进行剪枝。将修剪后的项目集输入到贝叶斯验证网络中进行个性化验证,并将验证结果按照排序进行排序和推荐,优先给真正喜欢这些书的读者。该推荐模型在一定程度上解决了现有推荐系统的弱个性化问题。实验表明,贝叶斯网络可以提高关联推荐的个性化。
{"title":"Personalized Recommendation System of E-learning Resources Based on Bayesian Classification Algorithm","authors":"Xiuhui Wang","doi":"10.31449/inf.v47i3.3979","DOIUrl":"https://doi.org/10.31449/inf.v47i3.3979","url":null,"abstract":"In order to meet learners' personalized learning needs, realize learners' personalized development, and solve the problem of learners' information Trek and overload, a development scheme of e-learning resources personalized recommendation system based on Bayesian algorithm is proposed. This paper studies the personalized Association recommendation model integrating association rule mining and Bayesian network, and improves the association rule mining algorithm by combining historical record pruning and Bayesian network verification. In the process of association rule mining, combined with user history, the frequent itemsets in association rules are filtered, and the itemsets below the given threshold are pruned. The pruned item set is input into the Bayesian verification network for personalized verification, and the verification results are sorted and recommended according to the ranking, so as to give priority to the readers who really like the books. The recommendation model solves the problem of weak personalization in the existing recommendation system to a certain extent. Experiments show that Bayesian network can improve the personalization of association recommendation.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135691747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHP Algorithm for Indoor Air Pollution Detection and Evaluation System Design 室内空气污染检测评价系统的AHP算法设计
4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-30 DOI: 10.31449/inf.v47i3.3932
Wen Fan, Chengyang Chang, Ning Yao, Linxue Xu, Hongyan Ju
In order to extract a description of indoor air quality, the concentration of indoor pollutants needs to be obtained and then evaluated. Aiming at the existing indoor air quality monitoring and evaluation system, an AHP algorithm for the design of indoor air pollution detection and evaluation system is proposed, which combines the principles and methods of fuzzy mathematics to evaluate air quality in a confined environment. An experiment was carried out, using the analytic hierarchy process to assign weights. According to the principle of maximum subordination, comprehensive evaluation of air quality in a confined environment was carried out through fuzzy mathematical model. The experimental results show that the humidity value reached 54% RH when the temperature was 25°C, and the humidity value reached 60% RH when the temperature was 19°C. The evaluation results more scientifically reflect the true state of air quality.
为了提取对室内空气质量的描述,需要获取室内污染物的浓度并进行评价。针对现有的室内空气质量监测与评价系统,提出了一种用于室内空气污染检测与评价系统设计的AHP算法,该算法结合模糊数学的原理和方法对密闭环境下的空气质量进行评价。利用层次分析法进行了权重分配实验。根据最大隶属原则,通过模糊数学模型对密闭环境空气质量进行了综合评价。实验结果表明,温度为25℃时湿度值可达54% RH,温度为19℃时湿度值可达60% RH。评价结果更科学地反映了空气质量的真实状况。
{"title":"AHP Algorithm for Indoor Air Pollution Detection and Evaluation System Design","authors":"Wen Fan, Chengyang Chang, Ning Yao, Linxue Xu, Hongyan Ju","doi":"10.31449/inf.v47i3.3932","DOIUrl":"https://doi.org/10.31449/inf.v47i3.3932","url":null,"abstract":"In order to extract a description of indoor air quality, the concentration of indoor pollutants needs to be obtained and then evaluated. Aiming at the existing indoor air quality monitoring and evaluation system, an AHP algorithm for the design of indoor air pollution detection and evaluation system is proposed, which combines the principles and methods of fuzzy mathematics to evaluate air quality in a confined environment. An experiment was carried out, using the analytic hierarchy process to assign weights. According to the principle of maximum subordination, comprehensive evaluation of air quality in a confined environment was carried out through fuzzy mathematical model. The experimental results show that the humidity value reached 54% RH when the temperature was 25°C, and the humidity value reached 60% RH when the temperature was 19°C. The evaluation results more scientifically reflect the true state of air quality.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135691746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1