首页 > 最新文献

International journal of applied information systems最新文献

英文 中文
A Procedure for the Analysis of Multivariate Factors Affecting Electricity Consumption 影响用电量的多因素分析程序
Pub Date : 2017-12-08 DOI: 10.5120/ijais2017451726
P. Ozoh, S. Abd-rahman
This research explores the dynamic relationship between temperature and level of building occupancy; and their effect on electricity consumption of electric appliances. It develops a model for electricity consumption based on these variables. It is important that reliable electricity consumption models are employed in finding solution to energy needs, otherwise inappropriate models may result in poor estimates for decision making. In this research, models for the daily electricity consumption for a local university in Malaysia was developed based on extraneous factors, such as temperature and level of building occupancy . As a result of developing such models, social and economic welfare will be improved.
本研究探讨温度与建筑占用水平之间的动态关系;以及它们对电器耗电量的影响。它根据这些变量开发了一个电力消耗模型。在寻找解决能源需求的方法时,采用可靠的电力消耗模型是很重要的,否则,不适当的模型可能会导致对决策的估计不准确。在这项研究中,马来西亚当地一所大学的日常用电量模型是基于外部因素开发的,如温度和建筑占用水平。发展这种模式的结果是,社会和经济福利将得到改善。
{"title":"A Procedure for the Analysis of Multivariate Factors Affecting Electricity Consumption","authors":"P. Ozoh, S. Abd-rahman","doi":"10.5120/ijais2017451726","DOIUrl":"https://doi.org/10.5120/ijais2017451726","url":null,"abstract":"This research explores the dynamic relationship between temperature and level of building occupancy; and their effect on electricity consumption of electric appliances. It develops a model for electricity consumption based on these variables. It is important that reliable electricity consumption models are employed in finding solution to energy needs, otherwise inappropriate models may result in poor estimates for decision making. In this research, models for the daily electricity consumption for a local university in Malaysia was developed based on extraneous factors, such as temperature and level of building occupancy . As a result of developing such models, social and economic welfare will be improved.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":"8-12"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85601739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
BMC based Data Logger for Performance Analysis 基于BMC的性能分析数据记录器
Pub Date : 2017-12-08 DOI: 10.5120/IJAIS2017451732
N. Nayak, D. S. Tomar, M. Shanmugasundaram
In the present scenario, a server rack has multiple platforms attached to it, each designed to perform a different set of actions, thus, having different hardware requirements. To increase the throughput of such a platform either the hardware requirements are multiplied or the platform is replaced completely. This unoptimized method is rather expensive and inefficient. [1] This paper focuses on improving the performance of a system by providing accurate analysis and predict hardware requirements to improve overall throughput. For this, data logs are collected over a period of time which take performance data dumps of sensors connected to the platform via BMC. These sensors monitor the platform and measure its internal physical parameters. This data is then used to create a database and a training set. This set is used to train a machine learning algorithm which gives an efficient algorithm to analyze the present performance and give accurate prediction. This gives an optimal solution to increase throughput of a platform. [2] General Terms Machine learning, data logs, BMC, performance analysis and IPMI.
在本场景中,服务器机架有多个附加平台,每个平台设计用于执行一组不同的操作,因此具有不同的硬件需求。要提高这种平台的吞吐量,要么增加硬件需求,要么完全替换平台。这种未经优化的方法是相当昂贵和低效的。[1]本文的重点是通过提供准确的分析和预测硬件需求来提高系统的性能,从而提高整体吞吐量。为此,在一段时间内收集数据日志,通过BMC收集连接到平台的传感器的性能数据转储。这些传感器监测平台并测量其内部物理参数。然后使用这些数据创建数据库和训练集。该集合用于训练机器学习算法,该算法提供了一种有效的算法来分析当前性能并给出准确的预测。这提供了一个提高平台吞吐量的最佳解决方案。机器学习,数据日志,BMC,性能分析和IPMI。
{"title":"BMC based Data Logger for Performance Analysis","authors":"N. Nayak, D. S. Tomar, M. Shanmugasundaram","doi":"10.5120/IJAIS2017451732","DOIUrl":"https://doi.org/10.5120/IJAIS2017451732","url":null,"abstract":"In the present scenario, a server rack has multiple platforms attached to it, each designed to perform a different set of actions, thus, having different hardware requirements. To increase the throughput of such a platform either the hardware requirements are multiplied or the platform is replaced completely. This unoptimized method is rather expensive and inefficient. [1] This paper focuses on improving the performance of a system by providing accurate analysis and predict hardware requirements to improve overall throughput. For this, data logs are collected over a period of time which take performance data dumps of sensors connected to the platform via BMC. These sensors monitor the platform and measure its internal physical parameters. This data is then used to create a database and a training set. This set is used to train a machine learning algorithm which gives an efficient algorithm to analyze the present performance and give accurate prediction. This gives an optimal solution to increase throughput of a platform. [2] General Terms Machine learning, data logs, BMC, performance analysis and IPMI.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"76 1","pages":"38-45"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81138325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Empirical Exploration of the Yarn in Big Data 大数据中纱线的实证探索
Pub Date : 2017-12-08 DOI: 10.5120/ijais2017451730
Dr. Yusuf Perwej, B. Kerim, M. S. Adrees, O. Sheta
The growth in population and progression of internet services, data size is getting increased day by day where 105000s of Trillion of data files are there in cloud available in unstructured nature. The coming times of Big Data are rapidly arriving for just about all industries. The Big Data can help in metamorphose major business processes by advisable and correct analysis of accessible data. Big data have also played an essential role in crime discover. Hadoop is opensource software in the form of an extremely scalable and fault tolerant distributed system which plays a very remarkable role in data storage and its processing. The Apache Hadoop Yarn is an open source framework developed by Apache Software Foundation. It is used for nursing Big Data. It endows storage as well as processing functionality. In this paper, we aimed to demonstrate a close look to about Yarn. The Yarn as a usual computing fabric to support MapReduce and another application instance within of the same kind Hadoop cluster. Yarn allow multiple applications to run simultaneously on the coequal shared cluster and assent applications to negotiate resources based on necessity. In the end, we are in a nutshell discuss about the design, development, and current state of deployment of the next generation of Hadoop's computes platform Yarn.
随着人口的增长和互联网服务的发展,数据规模日益增加,在云中有105000万亿的数据文件以非结构化的形式存在。几乎所有行业都将迎来大数据时代。大数据可以通过对可访问数据进行明智和正确的分析,帮助改变主要业务流程。大数据在发现犯罪方面也发挥了重要作用。Hadoop是一种开源软件,它是一种可扩展性强、容错能力强的分布式系统,在数据存储和处理方面起着非常重要的作用。Apache Hadoop Yarn是由Apache软件基金会开发的开源框架。用于护理大数据。它赋予存储和处理功能。在本文中,我们的目标是详细介绍Yarn。Yarn作为一种常用的计算结构来支持MapReduce和同类Hadoop集群中的另一个应用实例。Yarn允许多个应用程序在同等的共享集群上同时运行,并允许应用程序根据需要协商资源。最后,我们将简要地讨论下一代Hadoop计算平台Yarn的设计、开发和部署现状。
{"title":"An Empirical Exploration of the Yarn in Big Data","authors":"Dr. Yusuf Perwej, B. Kerim, M. S. Adrees, O. Sheta","doi":"10.5120/ijais2017451730","DOIUrl":"https://doi.org/10.5120/ijais2017451730","url":null,"abstract":"The growth in population and progression of internet services, data size is getting increased day by day where 105000s of Trillion of data files are there in cloud available in unstructured nature. The coming times of Big Data are rapidly arriving for just about all industries. The Big Data can help in metamorphose major business processes by advisable and correct analysis of accessible data. Big data have also played an essential role in crime discover. Hadoop is opensource software in the form of an extremely scalable and fault tolerant distributed system which plays a very remarkable role in data storage and its processing. The Apache Hadoop Yarn is an open source framework developed by Apache Software Foundation. It is used for nursing Big Data. It endows storage as well as processing functionality. In this paper, we aimed to demonstrate a close look to about Yarn. The Yarn as a usual computing fabric to support MapReduce and another application instance within of the same kind Hadoop cluster. Yarn allow multiple applications to run simultaneously on the coequal shared cluster and assent applications to negotiate resources based on necessity. In the end, we are in a nutshell discuss about the design, development, and current state of deployment of the next generation of Hadoop's computes platform Yarn.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"40 1","pages":"19-29"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84634487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Spam Detection Approaches and Strategies: A Phenomenons 垃圾邮件检测方法和策略:一个现象
Pub Date : 2017-12-08 DOI: 10.5120/ijais2017451728
Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad, E. O. Ernest, M. Jabar
{"title":"Spam Detection Approaches and Strategies: A Phenomenons","authors":"Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad, E. O. Ernest, M. Jabar","doi":"10.5120/ijais2017451728","DOIUrl":"https://doi.org/10.5120/ijais2017451728","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"207 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76464993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of N-gram Text Representation on Igbo Text Document Similarity N-gram文本表示对伊博语文本文档相似度的比较分析
Pub Date : 2017-12-08 DOI: 10.5120/IJAIS2017451724
U. Chidiebere
The improvement in Information Technology has encouraged the use of Igbo in the creation of text such as resources and news articles online. Text similarity is of great importance in any text-based applications. This paper presents a comparative analysis of n-gram text representation on Igbo text document similarity. It adopted Euclidean similarity measure to determine the similarities between Igbo text documents represented with two word-based n-gram text representation (unigram and bigram) models. The evaluation of the similarity measure is based on the adopted text representation models. The model is designed with Object-Oriented Methodology and implemented with Python programming language with tools from Natural Language Toolkits (NLTK). The result shows that unigram represented text has highest distance values whereas bigram has the lowest corresponding distance values. The lower the distance value, the more similar the two documents and better the quality of the model when used for a task that requires similarity measure. The similarity of two documents increases as the distance value moves down to zero (0). Ideally, the result analyzed revealed that Igbo text document similarity measured on bigram represented text gives accurate similarity result. This will give better, effective and accurate result when used for tasks such as text classification, clustering and ranking on Igbo text.
信息技术的进步鼓励人们使用伊博语创建文本,如在线资源和新闻文章。文本相似度在任何基于文本的应用程序中都是非常重要的。本文对伊博语文本文档相似度的n-gram文本表示进行了比较分析。采用欧几里得相似度度量来确定两种基于单词的n-gram文本表示(unigram和bigram)模型表示的Igbo文本文档之间的相似度。相似性度量的评价基于所采用的文本表示模型。该模型采用面向对象的方法设计,使用Python编程语言和自然语言工具包(NLTK)中的工具实现。结果表明,单格图表示的文本具有最高的距离值,而双格图表示的文本具有最低的相应距离值。距离值越低,两个文档越相似,用于需要相似性度量的任务时,模型质量越好。两个文档的相似度随着距离值的减小而增加(0)。理想情况下,分析结果表明,在双元文本表示的文本上测量Igbo文本文档的相似度可以得到准确的相似度结果。这将在对Igbo文本进行分类、聚类和排序等任务时提供更好、有效和准确的结果。
{"title":"Comparative Analysis of N-gram Text Representation on Igbo Text Document Similarity","authors":"U. Chidiebere","doi":"10.5120/IJAIS2017451724","DOIUrl":"https://doi.org/10.5120/IJAIS2017451724","url":null,"abstract":"The improvement in Information Technology has encouraged the use of Igbo in the creation of text such as resources and news articles online. Text similarity is of great importance in any text-based applications. This paper presents a comparative analysis of n-gram text representation on Igbo text document similarity. It adopted Euclidean similarity measure to determine the similarities between Igbo text documents represented with two word-based n-gram text representation (unigram and bigram) models. The evaluation of the similarity measure is based on the adopted text representation models. The model is designed with Object-Oriented Methodology and implemented with Python programming language with tools from Natural Language Toolkits (NLTK). The result shows that unigram represented text has highest distance values whereas bigram has the lowest corresponding distance values. The lower the distance value, the more similar the two documents and better the quality of the model when used for a task that requires similarity measure. The similarity of two documents increases as the distance value moves down to zero (0). Ideally, the result analyzed revealed that Igbo text document similarity measured on bigram represented text gives accurate similarity result. This will give better, effective and accurate result when used for tasks such as text classification, clustering and ranking on Igbo text.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"66 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90887587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Investigation of Most Ideal GNSS Framework (GPS, GLONASS and GALILEO) for Asia Pacific Region (Bangladesh) 亚太地区最理想GNSS框架(GPS、GLONASS和GALILEO)研究(孟加拉国)
Pub Date : 2017-11-09 DOI: 10.5120/IJAIS2017451719
M. Hasan, Redhawan Raziur Rouf, Md. Shajaratul B. Islam
Our paper considers the distinctive route frameworks and tries to recognize the best reasonable route system for Bangladesh. It is required as additional satellites will enhance execution for all applications, and particularly where satellite signs can be clouded, for example, in urban gullies, under tree shelters, or in open-cut mines. The advantages of the normal additional satellites and their signs are expanded accessibility, exactness, congruity, and dependability. General Terms Analysis of the DOP Values and Availability of combined GPS/GLONASS/GALILEO Navigation system in Bangladesh and some specific city of the country
本文考虑了不同的路线框架,并试图找出最适合孟加拉国的合理路线体系。这是必要的,因为额外的卫星将加强所有应用的执行,特别是在卫星标志可能被遮蔽的地方,例如在城市沟壑、树棚下或露天矿山。普通附加卫星及其标志的优点是可及性、准确性、一致性和可靠性。孟加拉国和该国某些特定城市GPS/GLONASS/GALILEO联合导航系统的DOP值和可用性的一般术语分析
{"title":"Investigation of Most Ideal GNSS Framework (GPS, GLONASS and GALILEO) for Asia Pacific Region (Bangladesh)","authors":"M. Hasan, Redhawan Raziur Rouf, Md. Shajaratul B. Islam","doi":"10.5120/IJAIS2017451719","DOIUrl":"https://doi.org/10.5120/IJAIS2017451719","url":null,"abstract":"Our paper considers the distinctive route frameworks and tries to recognize the best reasonable route system for Bangladesh. It is required as additional satellites will enhance execution for all applications, and particularly where satellite signs can be clouded, for example, in urban gullies, under tree shelters, or in open-cut mines. The advantages of the normal additional satellites and their signs are expanded accessibility, exactness, congruity, and dependability. General Terms Analysis of the DOP Values and Availability of combined GPS/GLONASS/GALILEO Navigation system in Bangladesh and some specific city of the country","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"84 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90275264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm 利用RC6加密算法增强云计算的安全性
Pub Date : 2017-11-09 DOI: 10.5120/IJAIS2017451715
Salim Ali Abbas, Malik Mohammed
Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms
云计算给人的印象是一种非常知名和著名的计算技术。每个人都直接或间接地使用云计算,例如通常用作云计算应用程序的电子邮件。每个人都可以随时随地拿到邮件。电子邮件帐户在个人电脑上并不明显,而是一个人需要在网络的帮助下进入他的帐户。像电子邮件一样,云计算提供许多不同的服务,例如访问各种应用程序,保存任何类型的信息等等。客户端通常可以访问和存储信息,而不必担心这些服务是如何提供给客户端的。由于这种适应性,每个人都在向云交换信息,为了在云客户端上存储信息,需要将他们的信息发送给将监督和存储信息的第三方,因此对组织来说,保护这些信息是至关重要的。最困难的部分是如何保护这些数据,因为这些信息可以存储在云中的任何地方。本文提出了一种用于解决这一问题的加密算法。通用术语云计算,安全,密码学,算法
{"title":"Enhancing Security of Cloud Computing by using RC6 Encryption Algorithm","authors":"Salim Ali Abbas, Malik Mohammed","doi":"10.5120/IJAIS2017451715","DOIUrl":"https://doi.org/10.5120/IJAIS2017451715","url":null,"abstract":"Cloud computing give an impression of being an extremely well known and famous computing technology. Each person is utilizing cloud computing straightforwardly or indirectly such as email that usually utilized as an application of cloud computing. Everyone can get to the mail anyplace whenever. The email account is not obvious on personal PC but rather a person need to get to his account with the assistance of web. Like an email cloud computing give numerous different services, for example accessing to various applications, saving of any sort of information and so on. Clients can normally access and store information without fearing over how these services are given to client. Because of this adaptability everybody is exchanging information to the cloud, to store information on cloud client needs to send their information to the third party who will oversee and store information, so it is crucial for an organization to secure that information. Most difficult part is how to protect these data in light of the fact that these information can store anyplace in the cloud. This paper presents the proposed cryptographic algorithm used to address this issue. General Terms Cloud Computing, Security, Cryptography, Algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"43 1","pages":"27-32"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76293740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Users’ Perception and Satisfaction with Information Services Provision by Mobile Communication Networks in Zaria, Nigeria 尼日利亚扎里亚地区移动通信网络提供信息服务的用户感知与满意度
Pub Date : 2017-11-09 DOI: 10.5120/ijais2017451721
Hadizatu Hassan, I. Umar
The study was undertaken to determine the users’ perception and satisfaction with information services provision by mobile communication networks in Zaria, Nigeria. The study raised three research questions and answers were sought to them, among which are the types of information services provided by mobile communication network to GSM users, as well as the perception of users and their satisfaction with those mobile networks information services. Survey research method was adopted for the study and data was collected from the sample of 1,269 out of the total population of the study of 1534. The data were analyzed descriptively using frequency tables, percentage, mean, mode, pie chart and histogram. The study revealed that GSM users in Zaria metropolis are provided with awide range of information services The study revealed that users’ experience high quality with information services in Etisalat and Airtel network as they rate half (50%)of their services as good than MTN and GLO. It was also revealed that GSM users are partially satisfied with the overall services of call, S.M.S, Internet, and SIM card service in the entire networks. The study recommends that urgent step should be taken by network providers to reduce the gap by considering users perception in this study rather than from their perception with services quality which will help them to reduce the gap on lower service quality and improve the services quality. Attention should be directed to services with lower satisfaction by setting a target using a set of bench mark of ACSI and N.C.C standard of communication services to serve as a guide for mobile network industries and telecommunication industries to raise the satisfaction level so as to maintain the market share, maintain and generate their users.
该研究旨在确定尼日利亚扎里亚移动通信网络用户对信息服务提供的感知和满意度。本研究提出了三个研究问题并寻求答案,其中移动通信网络为GSM用户提供的信息服务类型,以及用户对这些移动网络信息服务的感知和满意度。本研究采用调查研究方法,在1534名研究人口中抽取1269名样本进行数据收集。使用频率表、百分比、平均值、模式、饼图和直方图对数据进行描述性分析。该研究显示,Zaria大都市的GSM用户获得了广泛的信息服务。该研究显示,用户在Etisalat和Airtel网络中体验到高质量的信息服务,因为他们认为一半(50%)的服务比MTN和GLO好。此外,GSM用户对整个网络的通话、短信、互联网、SIM卡服务的整体服务表示部分满意。研究建议,网络供应商应尽快采取措施,在本研究中考虑用户的感知,而不是从他们对服务质量的感知来缩小差距,这将有助于他们缩小在较低服务质量上的差距,提高服务质量。关注满意度较低的服务,利用ACSI和ncc通信服务标准的一套基准设定目标,指导移动网络行业和电信行业提高满意度水平,从而保持市场份额,维护和产生用户。
{"title":"Users’ Perception and Satisfaction with Information Services Provision by Mobile Communication Networks in Zaria, Nigeria","authors":"Hadizatu Hassan, I. Umar","doi":"10.5120/ijais2017451721","DOIUrl":"https://doi.org/10.5120/ijais2017451721","url":null,"abstract":"The study was undertaken to determine the users’ perception and satisfaction with information services provision by mobile communication networks in Zaria, Nigeria. The study raised three research questions and answers were sought to them, among which are the types of information services provided by mobile communication network to GSM users, as well as the perception of users and their satisfaction with those mobile networks information services. Survey research method was adopted for the study and data was collected from the sample of 1,269 out of the total population of the study of 1534. The data were analyzed descriptively using frequency tables, percentage, mean, mode, pie chart and histogram. The study revealed that GSM users in Zaria metropolis are provided with awide range of information services The study revealed that users’ experience high quality with information services in Etisalat and Airtel network as they rate half (50%)of their services as good than MTN and GLO. It was also revealed that GSM users are partially satisfied with the overall services of call, S.M.S, Internet, and SIM card service in the entire networks. The study recommends that urgent step should be taken by network providers to reduce the gap by considering users perception in this study rather than from their perception with services quality which will help them to reduce the gap on lower service quality and improve the services quality. Attention should be directed to services with lower satisfaction by setting a target using a set of bench mark of ACSI and N.C.C standard of communication services to serve as a guide for mobile network industries and telecommunication industries to raise the satisfaction level so as to maintain the market share, maintain and generate their users.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"11 1","pages":"38-45"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75335698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Extended Dijkstra’s Algorithm for Software Defined Networks 软件定义网络的改进扩展Dijkstra算法
Pub Date : 2017-11-09 DOI: 10.5120/ijais2017451714
A. Abdulaziz, E. A. Adedokun, S. Man-Yahya
The existing Extended Dijkstra's algorithm for Software Defined Networks was developed to handle shortcomings associated with the traditional shortest path routing used in SDN. Today's SDN controllers route allocation mechanism is mainly based on Dijkstra algorithm. However, both approaches do not consider bandwidth utilization and do not take knowledge of the topology into consideration. This may result in network congestion and sub-optimal performance of applications. This paper presents a modified Extended Dijkstra's algorithm for Software Defined Networks using REST APIs and introduces a congestion control component responsible for handling traffic overhead in an SDN topology. The Abilene network topology was used to evaluate the performance of both approaches using throughput and latency as performance metrics.
现有的软件定义网络扩展Dijkstra算法是为了解决SDN中使用的传统最短路径路由相关的缺点而开发的。目前的SDN控制器路由分配机制主要基于Dijkstra算法。但是,这两种方法都不考虑带宽利用率,也不考虑拓扑知识。这可能导致网络拥塞和应用程序的次优性能。本文提出了一种使用REST api的软件定义网络的改进扩展Dijkstra算法,并介绍了一个负责处理SDN拓扑中的流量开销的拥塞控制组件。使用Abilene网络拓扑以吞吐量和延迟作为性能指标来评估这两种方法的性能。
{"title":"Improved Extended Dijkstra’s Algorithm for Software Defined Networks","authors":"A. Abdulaziz, E. A. Adedokun, S. Man-Yahya","doi":"10.5120/ijais2017451714","DOIUrl":"https://doi.org/10.5120/ijais2017451714","url":null,"abstract":"The existing Extended Dijkstra's algorithm for Software Defined Networks was developed to handle shortcomings associated with the traditional shortest path routing used in SDN. Today's SDN controllers route allocation mechanism is mainly based on Dijkstra algorithm. However, both approaches do not consider bandwidth utilization and do not take knowledge of the topology into consideration. This may result in network congestion and sub-optimal performance of applications. This paper presents a modified Extended Dijkstra's algorithm for Software Defined Networks using REST APIs and introduces a congestion control component responsible for handling traffic overhead in an SDN topology. The Abilene network topology was used to evaluate the performance of both approaches using throughput and latency as performance metrics.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"22-26"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75292225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Privacy Preserving Informative Association Rule Mining 隐私保护信息关联规则挖掘
Pub Date : 2017-11-09 DOI: 10.5120/IJAIS2017451717
K. Pathak, S. Silakari, N. Chaudhari
Privacy preserving data mining has two major directions: one is the protection of private data, i.e., data hiding in the database whereas another one is the protection of sensitive rule (Knowledge) contained in data known as knowledge hiding in the database. This research work focuses on protection of sensitive association rule. Corporation individual & other may get mutual benefit by sharing their data, but at the same time, they would like to be sure that their sensitive data remains private or not disclosed, i.e., hiding sensitive association rules. Approaches need to be given sensitive association rule in advance to hide them, i.e., mining is repaired. However, for some application pre-process of these sensitive association rules is combined with hiding process when predictive items are given, i.e., hiding informative association rule set. In this work, we propose two algorithms ISLFASTPREDICTIVE, DSRFASTPREDICTIVE to hide informative association rule with n-items. Earlier work hided 2-item association rules. Algorithms proposed in the paper execute faster than ISL & DSR algorithms prepared earlier as well as a side effect have been reduced. ISLFASTPREDICTIVE and DSRFASTPREDICTIVE algorithms work better as database scans are reduced since transaction list of elements is used in algorithms, i.e., a list of the transaction which supports itemsets and selection of transactions are done on the basis of presence of frequent itemsets.
保持隐私的数据挖掘有两大方向:一是保护隐私数据,即隐藏在数据库中的数据;二是保护数据中包含的敏感规则(知识),即隐藏在数据库中的知识。本文主要研究敏感关联规则的保护问题。企业个人和其他可以通过共享数据获得互利,但同时,他们希望确保自己的敏感数据保持私密性或不被披露,即隐藏敏感的关联规则。方法需要预先给出敏感的关联规则来隐藏它们,即修复挖掘。然而,在某些应用中,这些敏感关联规则的预处理与预测项给定时的隐藏过程相结合,即隐藏信息关联规则集。在这项工作中,我们提出了两种算法ISLFASTPREDICTIVE, DSRFASTPREDICTIVE来隐藏n项的信息关联规则。早期的工作隐藏了2项关联规则。本文提出的算法执行速度比前人提出的ISL和DSR算法快,并且减少了副作用。ISLFASTPREDICTIVE和DSRFASTPREDICTIVE算法工作得更好,因为数据库扫描减少了,因为算法中使用了元素的事务列表,也就是说,支持项目集的事务列表和事务选择是基于频繁项目集的存在来完成的。
{"title":"Privacy Preserving Informative Association Rule Mining","authors":"K. Pathak, S. Silakari, N. Chaudhari","doi":"10.5120/IJAIS2017451717","DOIUrl":"https://doi.org/10.5120/IJAIS2017451717","url":null,"abstract":"Privacy preserving data mining has two major directions: one is the protection of private data, i.e., data hiding in the database whereas another one is the protection of sensitive rule (Knowledge) contained in data known as knowledge hiding in the database. This research work focuses on protection of sensitive association rule. Corporation individual & other may get mutual benefit by sharing their data, but at the same time, they would like to be sure that their sensitive data remains private or not disclosed, i.e., hiding sensitive association rules. Approaches need to be given sensitive association rule in advance to hide them, i.e., mining is repaired. However, for some application pre-process of these sensitive association rules is combined with hiding process when predictive items are given, i.e., hiding informative association rule set. In this work, we propose two algorithms ISLFASTPREDICTIVE, DSRFASTPREDICTIVE to hide informative association rule with n-items. Earlier work hided 2-item association rules. Algorithms proposed in the paper execute faster than ISL & DSR algorithms prepared earlier as well as a side effect have been reduced. ISLFASTPREDICTIVE and DSRFASTPREDICTIVE algorithms work better as database scans are reduced since transaction list of elements is used in algorithms, i.e., a list of the transaction which supports itemsets and selection of transactions are done on the basis of presence of frequent itemsets.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"605 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81803471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International journal of applied information systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1