首页 > 最新文献

International journal of applied information systems最新文献

英文 中文
Developing Virtual Class Room Models with Bio Inspired Algorithms for E-Learning: A Survey for Higher Technical Education for Saudi Arabia Vision 2030 利用生物启发算法开发电子学习的虚拟教室模型:沙特阿拉伯2030年远景高等技术教育调查
Pub Date : 2017-11-09 DOI: 10.5120/IJAIS2017451709
Khalid A. Fakeeh
In recent times there has been a growing trend for more information and knowledge to enhance learning based on cognitive load theory with increased use of Educational Technology based on Web ICT with online education resources. There are also various instructional and expert models being developed for the adaptive e-learning mechanisms as required for effective learning based on Genetic, Neural Networks, Swarm Intelligence and other Bio inspired algorithms or Evolutionary algorithms. Computational Intelligence or Artificial Intelligence has also established new paradigms for Learning Systems in creating virtual class rooms in the physical absence of tutors. It is also possible to create virtual labs on which students that are registered can carry out their experiments from remote with Interactive Intelligent Tutoring Systems. The current paper will develop a problem model using Markov Chain and greedy algorithms for Tutor or Instructor –Student interactive model for virtual labs and virtual class rooms which will be built on the Deep Belief Network architecture as a novel approach for state-of-art courses related to Energy and Wireless Communication for Higher Education proposed as part of Inter University Research Groups. Further, a Bio inspired Differential Evolution algorithm will be deployed for the virtual labs and virtual class rooms to meet the specific learning requirements for the Instructor-Student interactions specific to this E-learning platform. The proposed study will help improve the learning environment to stimulate creativity and innovation as envisaged by the Ministry of Education under the Saudi Arabia Vision 2030 and will help in moving towards creating an international benchmark for deploying innovative E-learning mechanisms for Higher Education.
近年来,随着基于Web ICT的教育技术与在线教育资源的越来越多的使用,基于认知负荷理论的更多信息和知识来增强学习的趋势越来越明显。此外,基于遗传、神经网络、群体智能和其他生物启发算法或进化算法,为有效学习所需的自适应电子学习机制开发了各种教学和专家模型。计算智能或人工智能也为学习系统建立了新的范例,在没有导师的情况下创建虚拟教室。还可以创建虚拟实验室,注册的学生可以通过交互式智能辅导系统远程进行实验。本文将利用马尔可夫链和贪心算法开发一个问题模型,用于虚拟实验室和虚拟教室的导师或教师-学生互动模型,该模型将建立在深度信念网络架构上,作为一种新颖的方法,用于高等教育中与能源和无线通信相关的最新课程,该课程是大学间研究小组提出的一部分。此外,将为虚拟实验室和虚拟教室部署生物启发的差分进化算法,以满足该电子学习平台特定的师生互动的特定学习要求。拟议的研究将有助于改善学习环境,以激发沙特阿拉伯2030年愿景中教育部设想的创造力和创新,并将有助于为部署创新的高等教育电子学习机制创造一个国际基准。
{"title":"Developing Virtual Class Room Models with Bio Inspired Algorithms for E-Learning: A Survey for Higher Technical Education for Saudi Arabia Vision 2030","authors":"Khalid A. Fakeeh","doi":"10.5120/IJAIS2017451709","DOIUrl":"https://doi.org/10.5120/IJAIS2017451709","url":null,"abstract":"In recent times there has been a growing trend for more information and knowledge to enhance learning based on cognitive load theory with increased use of Educational Technology based on Web ICT with online education resources. There are also various instructional and expert models being developed for the adaptive e-learning mechanisms as required for effective learning based on Genetic, Neural Networks, Swarm Intelligence and other Bio inspired algorithms or Evolutionary algorithms. Computational Intelligence or Artificial Intelligence has also established new paradigms for Learning Systems in creating virtual class rooms in the physical absence of tutors. It is also possible to create virtual labs on which students that are registered can carry out their experiments from remote with Interactive Intelligent Tutoring Systems. The current paper will develop a problem model using Markov Chain and greedy algorithms for Tutor or Instructor –Student interactive model for virtual labs and virtual class rooms which will be built on the Deep Belief Network architecture as a novel approach for state-of-art courses related to Energy and Wireless Communication for Higher Education proposed as part of Inter University Research Groups. Further, a Bio inspired Differential Evolution algorithm will be deployed for the virtual labs and virtual class rooms to meet the specific learning requirements for the Instructor-Student interactions specific to this E-learning platform. The proposed study will help improve the learning environment to stimulate creativity and innovation as envisaged by the Ministry of Education under the Saudi Arabia Vision 2030 and will help in moving towards creating an international benchmark for deploying innovative E-learning mechanisms for Higher Education.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"22 1","pages":"8-21"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90918991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Validation of Antecedents of ERP Success in Indian Higher Educational Institutes 印度高等教育机构ERP成功前因的验证
Pub Date : 2017-10-06 DOI: 10.5120/IJAIS2017451712
Pratima N. Dabholkar, Hema Date
Educational institutes are started adopting Enterprise Resource Planning (ERP) systems to manage their resources. Despite such huge amounts being spent on ERPs, recent industry reports and academic studies have indicated that many adopting Higher Educational Institutes (HEI) have come to realize that the deployments of such systems were not as effective as expected. In spite of implementation of ERP in HEI, ERP usage is very limited. The main objective of the study was to identify the factors influencing ERP usage in Indian higher educational institutes. The conceptual framework of this study is based on DeLone & McLean ERP success model. Organizational factors are integrated with the technological factors of the DeLone and McLean ERP Success model for the study and was tested empirically using questionnaire as a survey instrument. Primary data was collected from 205 Indian higher educational institutes of pan India. Total 346 respondents participated in the study. Technological factor “ease of use” and organizational factor “top management support” are found to be most reliable measures for measuring ERP success in higher educational institutes. Other technological and organizational factors are also found to be suitable for measuring ERP success in higher educational institutes. Identification of factors for measuring ERP success in Indian higher educational institutes is the unique contribution of this study.
教育机构开始采用企业资源规划(ERP)系统来管理资源。尽管在erp上花费了如此巨大的资金,但最近的行业报告和学术研究表明,许多采用erp的高等教育机构(HEI)已经意识到,这些系统的部署并不像预期的那样有效。尽管在高等学校实施了ERP,但ERP的使用非常有限。本研究的主要目的是找出影响印度高等教育机构ERP使用的因素。本研究的概念框架基于DeLone & McLean ERP成功模型。本研究将DeLone和McLean的ERP成功模型中的组织因素与技术因素相结合,并采用问卷作为调查工具进行实证检验。主要数据收集自泛印度的205所印度高等教育机构。共有346名受访者参与了这项研究。技术因素“易用性”和组织因素“高层管理支持”是衡量高等教育机构ERP成功的最可靠的指标。其他技术和组织因素也适合衡量高等教育机构ERP的成功。本研究的独特贡献在于确定衡量印度高等教育机构ERP成功的因素。
{"title":"Validation of Antecedents of ERP Success in Indian Higher Educational Institutes","authors":"Pratima N. Dabholkar, Hema Date","doi":"10.5120/IJAIS2017451712","DOIUrl":"https://doi.org/10.5120/IJAIS2017451712","url":null,"abstract":"Educational institutes are started adopting Enterprise Resource Planning (ERP) systems to manage their resources. Despite such huge amounts being spent on ERPs, recent industry reports and academic studies have indicated that many adopting Higher Educational Institutes (HEI) have come to realize that the deployments of such systems were not as effective as expected. In spite of implementation of ERP in HEI, ERP usage is very limited. The main objective of the study was to identify the factors influencing ERP usage in Indian higher educational institutes. The conceptual framework of this study is based on DeLone & McLean ERP success model. Organizational factors are integrated with the technological factors of the DeLone and McLean ERP Success model for the study and was tested empirically using questionnaire as a survey instrument. Primary data was collected from 205 Indian higher educational institutes of pan India. Total 346 respondents participated in the study. Technological factor “ease of use” and organizational factor “top management support” are found to be most reliable measures for measuring ERP success in higher educational institutes. Other technological and organizational factors are also found to be suitable for measuring ERP success in higher educational institutes. Identification of factors for measuring ERP success in Indian higher educational institutes is the unique contribution of this study.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"40 1","pages":"9-20"},"PeriodicalIF":0.0,"publicationDate":"2017-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89871874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Detection in E-mails using Machine Learning 利用机器学习检测电子邮件中的网络钓鱼
Pub Date : 2017-10-06 DOI: 10.5120/IJAIS2017451713
Srishti Rawal, Bhuvan Rawal, A. Shaheen, Shubham Malik
Emails are widely used as a means of communication for personal and professional use. The information exchanged over mails is often sensitive and confidential such as banking information, credit reports, login details etc. This makes them valuable to cyber criminals who can use the information for malicious purposes. Phishing is a strategy used by fraudsters to obtain sensitive information from people by pretending to be from recognized sources. In a phished email, the sender can convince you to provide personal information under false pretenses. This experimentation considers the detection of a phished email as a classification problem and this paper describes the use of machine learning algorithms to classify emails as phished or ham. Maximum accuracy of 99. 87% is achieved in classification of emails using SVM and Random Forest classifier. General Terms Phishing, security, classification
电子邮件被广泛用作个人和专业的沟通手段。通过邮件交换的信息通常是敏感和机密的,如银行信息、信用报告、登录详细信息等。这对网络罪犯来说很有价值,他们可以利用这些信息进行恶意攻击。网络钓鱼是欺诈者假装来自公认的来源,从人们那里获取敏感信息的一种策略。在网络钓鱼邮件中,发件人会以虚假的借口说服你提供个人信息。该实验将检测钓鱼电子邮件视为一个分类问题,本文描述了使用机器学习算法将电子邮件分类为钓鱼电子邮件或火腿。最高精度99。使用SVM和随机森林分类器对电子邮件进行分类,准确率达到87%。网络钓鱼,安全,分类
{"title":"Phishing Detection in E-mails using Machine Learning","authors":"Srishti Rawal, Bhuvan Rawal, A. Shaheen, Shubham Malik","doi":"10.5120/IJAIS2017451713","DOIUrl":"https://doi.org/10.5120/IJAIS2017451713","url":null,"abstract":"Emails are widely used as a means of communication for personal and professional use. The information exchanged over mails is often sensitive and confidential such as banking information, credit reports, login details etc. This makes them valuable to cyber criminals who can use the information for malicious purposes. Phishing is a strategy used by fraudsters to obtain sensitive information from people by pretending to be from recognized sources. In a phished email, the sender can convince you to provide personal information under false pretenses. This experimentation considers the detection of a phished email as a classification problem and this paper describes the use of machine learning algorithms to classify emails as phished or ham. Maximum accuracy of 99. 87% is achieved in classification of emails using SVM and Random Forest classifier. General Terms Phishing, security, classification","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"150 1","pages":"21-24"},"PeriodicalIF":0.0,"publicationDate":"2017-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80994030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and Implementation of a Comprehensive Information Security Risk Management Tool based on Multi-agents Systems 基于多agent系统的综合信息安全风险管理工具的设计与实现
Pub Date : 2017-10-06 DOI: 10.5120/IJAIS2017451711
M. Ghazouani, H. Medromi, L. Moussaid
While there are many framework that help users in Governance, Risk, and Compliance (GRC), we know of none which actually try to automate the process by using multi agent systems. The Team of Systems’ Architecture proposes an integrated IT GRC architecture for a high level IT GRC management. This article focuses on IT Risk topic and presents a new approach for a multi-agent expert system, where managers of IT GRC can in an intelligent manner specify the IT needs following the strategic directives through a questionnaire about specific business goals. The key element that differentiates this research from the previous ones is that none of them are based on multi-agents system. The system was verified on concrete example. Future works consists on realizing a practical example of the proposed subsystem on real company systems that are involved in the research in order to overcomes obstacles and achieve IT organization objectives. General Terms Security risk assessment, risk management system, information system
虽然有许多框架可以帮助用户进行治理、风险和遵从(GRC),但据我们所知,没有一个框架真正尝试通过使用多代理系统来自动化流程。系统架构团队提出了一个集成的IT GRC架构,用于高层次的IT GRC管理。本文主要关注IT风险主题,并提出了一种多代理专家系统的新方法,其中IT GRC的管理人员可以通过关于特定业务目标的问卷调查,以智能的方式根据战略指示指定IT需求。本研究与以往研究的关键区别在于它们都不是基于多智能体系统。通过实例验证了该系统的有效性。未来的工作包括在研究中涉及的真实公司系统上实现所提出的子系统的实际示例,以克服障碍并实现IT组织目标。安全风险评估,风险管理系统,信息系统
{"title":"Design and Implementation of a Comprehensive Information Security Risk Management Tool based on Multi-agents Systems","authors":"M. Ghazouani, H. Medromi, L. Moussaid","doi":"10.5120/IJAIS2017451711","DOIUrl":"https://doi.org/10.5120/IJAIS2017451711","url":null,"abstract":"While there are many framework that help users in Governance, Risk, and Compliance (GRC), we know of none which actually try to automate the process by using multi agent systems. The Team of Systems’ Architecture proposes an integrated IT GRC architecture for a high level IT GRC management. This article focuses on IT Risk topic and presents a new approach for a multi-agent expert system, where managers of IT GRC can in an intelligent manner specify the IT needs following the strategic directives through a questionnaire about specific business goals. The key element that differentiates this research from the previous ones is that none of them are based on multi-agents system. The system was verified on concrete example. Future works consists on realizing a practical example of the proposed subsystem on real company systems that are involved in the research in order to overcomes obstacles and achieve IT organization objectives. General Terms Security risk assessment, risk management system, information system","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"18 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Significance of Security Metrics in Secure Software Development 安全度量在安全软件开发中的意义
Pub Date : 2017-09-09 DOI: 10.5120/IJAIS2017451710
Shams Tabrez Siddiqui
With increasing advancement of technology in the past years rise various security issues and problems. In this connected world, security is a paramount and challenging issue in software development and is the demand of time. However usually engineers/developers think about it after the development of the entire software and at that it’s too late. Though, the software developers are aware of the importance of security and its priority throughout software development life cycle. Considering the security challenging issues right from the early stages of software development and incorporating it during software development indicates good research and development. When the metrics considered during software development process from the initial stage then it assess the security risks more efficiently. One of the best known approaches to develop security metrics is Goal/Question/Metric (GQM) approach that assesses the security risks in various stages of software development process. Software security can be measured with the help of metrics derived from the source available. The main aim of this paper is to focus on numerous security metrics of software development phases and some standardized criteria is used for validation. Each and every phase have different metrics as compared to other. Those metrics are defined on the bases of their results and products. The final product derived from the proposed security metrics of the software will be secure and qualified. General Terms Security, software development phases, validation.
近年来随着科技的不断进步,各种安全问题层出不穷。在这个互联的世界中,安全性是软件开发中最重要的和具有挑战性的问题,也是时间的要求。然而,工程师/开发人员通常是在整个软件开发完成后才考虑这个问题,这时已经太晚了。尽管如此,软件开发人员还是意识到安全性的重要性及其在整个软件开发生命周期中的优先级。从软件开发的早期阶段就考虑到具有挑战性的安全问题,并在软件开发期间将其纳入其中,这表明了良好的研究和开发。当在软件开发过程中从初始阶段开始考虑度量时,它可以更有效地评估安全风险。开发安全度量的最著名的方法之一是目标/问题/度量(GQM)方法,它评估软件开发过程各个阶段的安全风险。软件安全性可以借助来自可用源的度量来度量。本文的主要目的是关注软件开发阶段的众多安全度量,以及用于验证的一些标准化标准。与其他阶段相比,每个阶段都有不同的度量标准。这些指标是根据他们的结果和产品来定义的。从建议的软件安全度量派生的最终产品将是安全和合格的。一般条款安全,软件开发阶段,验证。
{"title":"Significance of Security Metrics in Secure Software Development","authors":"Shams Tabrez Siddiqui","doi":"10.5120/IJAIS2017451710","DOIUrl":"https://doi.org/10.5120/IJAIS2017451710","url":null,"abstract":"With increasing advancement of technology in the past years rise various security issues and problems. In this connected world, security is a paramount and challenging issue in software development and is the demand of time. However usually engineers/developers think about it after the development of the entire software and at that it’s too late. Though, the software developers are aware of the importance of security and its priority throughout software development life cycle. Considering the security challenging issues right from the early stages of software development and incorporating it during software development indicates good research and development. When the metrics considered during software development process from the initial stage then it assess the security risks more efficiently. One of the best known approaches to develop security metrics is Goal/Question/Metric (GQM) approach that assesses the security risks in various stages of software development process. Software security can be measured with the help of metrics derived from the source available. The main aim of this paper is to focus on numerous security metrics of software development phases and some standardized criteria is used for validation. Each and every phase have different metrics as compared to other. Those metrics are defined on the bases of their results and products. The final product derived from the proposed security metrics of the software will be secure and qualified. General Terms Security, software development phases, validation.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"9 1","pages":"10-15"},"PeriodicalIF":0.0,"publicationDate":"2017-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75181742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Minimum Connected Dominating Set based Virtual Backbone Construction in OLSR Protocol 基于最小连接支配集的OLSR协议虚拟主干构建
Pub Date : 2017-09-09 DOI: 10.5120/IJAIS2017451707
P. Vinayagam
In ad hoc wireless networks, nodes have limited energy and short transmission range. There are no pre-designated routers in these networks and hence routing cannot be done in the conventional way as done in wired networks. To facilitate routing in ad hoc wireless networks, some sort of backbone like structure needs to be built. One of the widely used routing protocols in ad hoc wireless networks is Optimized Link State Routing Protocol (OLSR), which makes use of Multipoint Relay sets (MPRs) to construct the virtual backbone. Various improvements have been proposed in the literature for the MPR selection scheme used in OLSR to improve its efficiency. In this paper, with the aim of enhancing the performance of OLSR, we propose an Improved OLSR (IOLSR) protocol, wherein Minimum Connected Dominating Set (MCDS) is used, instead of multipoint relay sets, to construct the virtual backbone. The performance of IOLSR is compared with that of OLSR in terms of the performance metrics – throughput, packet delivery ratio, end-to-end delay and size of the backbone. From the results, it is found that IOLSR protocol performs better than OLSR with respect to all these metrics.
在自组织无线网络中,节点能量有限,传输距离短。在这些网络中没有预先指定的路由器,因此不能像在有线网络中那样以传统的方式进行路由。为了方便自组织无线网络中的路由,需要建立某种骨干结构。在自组织无线网络中广泛使用的路由协议之一是优化链路状态路由协议(OLSR),它利用多点中继集(MPRs)来构建虚拟骨干网。文献中对OLSR中MPR选择方案提出了各种改进,以提高其效率。为了提高OLSR的性能,本文提出了一种改进的OLSR (IOLSR)协议,该协议使用最小连接支配集(MCDS)来代替多点中继集来构建虚拟骨干网。将IOLSR的性能与OLSR的性能指标进行了比较,这些指标包括吞吐量、分组传送率、端到端延迟和骨干网络的大小。从结果中可以发现,IOLSR协议在所有这些指标方面的性能都优于OLSR协议。
{"title":"Minimum Connected Dominating Set based Virtual Backbone Construction in OLSR Protocol","authors":"P. Vinayagam","doi":"10.5120/IJAIS2017451707","DOIUrl":"https://doi.org/10.5120/IJAIS2017451707","url":null,"abstract":"In ad hoc wireless networks, nodes have limited energy and short transmission range. There are no pre-designated routers in these networks and hence routing cannot be done in the conventional way as done in wired networks. To facilitate routing in ad hoc wireless networks, some sort of backbone like structure needs to be built. One of the widely used routing protocols in ad hoc wireless networks is Optimized Link State Routing Protocol (OLSR), which makes use of Multipoint Relay sets (MPRs) to construct the virtual backbone. Various improvements have been proposed in the literature for the MPR selection scheme used in OLSR to improve its efficiency. In this paper, with the aim of enhancing the performance of OLSR, we propose an Improved OLSR (IOLSR) protocol, wherein Minimum Connected Dominating Set (MCDS) is used, instead of multipoint relay sets, to construct the virtual backbone. The performance of IOLSR is compared with that of OLSR in terms of the performance metrics – throughput, packet delivery ratio, end-to-end delay and size of the backbone. From the results, it is found that IOLSR protocol performs better than OLSR with respect to all these metrics.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"7 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80128411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Semantic Web-based Search Model for Ecommerce using OWL2 使用OWL2的改进的基于语义的电子商务搜索模型
Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451691
B. Pam, A. Obiniyi, O. N. Oyelade
{"title":"An Improved Semantic Web-based Search Model for Ecommerce using OWL2","authors":"B. Pam, A. Obiniyi, O. N. Oyelade","doi":"10.5120/IJAIS2017451691","DOIUrl":"https://doi.org/10.5120/IJAIS2017451691","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76784415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Lecture Time-tabling System for Tertiary Institutions 专上院校讲座时间表自动编排系统
Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451700
Jumoke Soyemi, J. Akinode, M. Osei, S. Oloruntoba
The need to automate the manual process of lecture time tabling system in higher institution of learning cannot be set aside. Despite the fact that several other administrative sectors of most institution have been automated, lecture time-tabling is still done manually because of its inherent problems. Planning lecture time table is an administrative responsibility that demands enormous attention and effort from any institution because of its constraint satisfaction problem. The Federal Polytechnic Ilaro, the case study in this research operates a central time tabling system implemented by a set up committee members within the institution, which makes it more difficult in getting a flawless lecture scheduling. This manual time-tabling system used in the institution is time consuming and energy sapping which leads to loss of information, general apathy, clashes and wastage of resources. This research is targeted at ameliorating the above stated challenges. The main aim of the study is to develop an automated lecture time-tabling system to provide convenience in scheduling lecture time-table, reducing time constraints in fixing the courses and venues and reducing the risk of omission of courses and clashes of halls and lecturers. The scope of work is limited to space allocation for lectures and merging of similar courses for a particular lecturer. We also administered questionnaire to sample staff, committee members and student opinion on the existing system and the new system to be developed. The data gathered was analyzed and based on the analysis; the new system (automated time tabling system) will be the best method in tackling the lapses experienced by the old system (manual time table).
高等院校人工排课系统自动化的需求不容忽视。尽管大多数机构的其他几个行政部门已经实现了自动化,但由于其固有的问题,上课时间表仍然是手工完成的。课程表规划是一项行政责任,由于其约束满足问题,需要任何机构极大的关注和努力。在本研究的案例研究中,联邦理工学院Ilaro运行一个由机构内设立的委员会成员实施的中央时间表系统,这使得获得完美的课程安排变得更加困难。该机构使用的这种手动时间表系统耗时耗力,导致信息丢失、普遍冷漠、冲突和资源浪费。本研究旨在改善上述挑战。本研究的主要目的是开发一个自动化的讲座时间表系统,以方便安排讲座时间表,减少确定课程和场地的时间限制,减少课程遗漏和礼堂和讲师冲突的风险。工作范围限于讲座的空间分配和合并特定讲师的类似课程。我们亦进行问卷调查,收集教职员、委员及学生对现行制度及新制度的意见。对收集到的数据进行分析,并以分析为基础;新系统(自动时间表系统)将是解决旧系统(手动时间表)所经历的失误的最佳方法。
{"title":"Automated Lecture Time-tabling System for Tertiary Institutions","authors":"Jumoke Soyemi, J. Akinode, M. Osei, S. Oloruntoba","doi":"10.5120/IJAIS2017451700","DOIUrl":"https://doi.org/10.5120/IJAIS2017451700","url":null,"abstract":"The need to automate the manual process of lecture time tabling system in higher institution of learning cannot be set aside. Despite the fact that several other administrative sectors of most institution have been automated, lecture time-tabling is still done manually because of its inherent problems. Planning lecture time table is an administrative responsibility that demands enormous attention and effort from any institution because of its constraint satisfaction problem. The Federal Polytechnic Ilaro, the case study in this research operates a central time tabling system implemented by a set up committee members within the institution, which makes it more difficult in getting a flawless lecture scheduling. This manual time-tabling system used in the institution is time consuming and energy sapping which leads to loss of information, general apathy, clashes and wastage of resources. This research is targeted at ameliorating the above stated challenges. The main aim of the study is to develop an automated lecture time-tabling system to provide convenience in scheduling lecture time-table, reducing time constraints in fixing the courses and venues and reducing the risk of omission of courses and clashes of halls and lecturers. The scope of work is limited to space allocation for lectures and merging of similar courses for a particular lecturer. We also administered questionnaire to sample staff, committee members and student opinion on the existing system and the new system to be developed. The data gathered was analyzed and based on the analysis; the new system (automated time tabling system) will be the best method in tackling the lapses experienced by the old system (manual time table).","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"8 1","pages":"20-27"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86996828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN] 基于级联链接的前馈神经网络(CLBFFNN)的三模态生物识别认证系统
Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451699
B. Mercy E., Sam-Ekeke Doris C.
The beginning of the 21st century was rich in events that turned the world’s attention to public security. Increase in technological advancement gave people possibilities of information transfer and ease of physical mobility unseen before. With those possibilities comes risk of fraud, theft of personal data, or even theft of identity. One of the ways to prevent this is through biometric authentication system. This paper considers a multi-biometric system involving a combination of three biometric traits: iris, fingerprint and face in order to make authentication cheaper and more reliable. When the images are captured using optical scanner and webcam, image pre-processing is done using Enhanced Extracted Face (EEF), Plainarized Region of Interest (PROI) and Advanced Processed Iris Code (APIC) methods for face, fingerprint and iris images respectively. These are fed into a Cascaded Link-Based Feed Forward Neural Network (CLBFFNN) which is a classifier trained with back-propagation algorithm. CLBFFNN comprises of CLBFFNN(1) used for training and CLBFFNN(2) used as the main classifier. Fusion of outputs from face, fingerprint and iris recognition systems is done at decision level using AND operation. With the use of the improved preprocessing methods, Optical Character Recognition (OCR) with intelligent barcode and CLBFFNN, the proposed intelligent multibiometric system is proved to be cheaper, more secure and efficient than the existing methods.
21世纪初发生了许多事件,使全世界的注意力转向公共安全。技术进步的增加给人们提供了前所未有的信息传递和身体移动的便利。这些可能性带来了欺诈、个人数据被盗,甚至身份被盗的风险。防止这种情况的方法之一是通过生物识别认证系统。本文提出了一种结合虹膜、指纹和面部三种生物特征的多生物特征识别系统,以使身份验证更便宜、更可靠。利用光学扫描仪和网络摄像头采集图像后,分别对人脸、指纹和虹膜图像采用增强提取人脸(EEF)、感兴趣平化区域(PROI)和高级处理虹膜编码(APIC)方法进行预处理。这些被馈送到一个级联的基于链接的前馈神经网络(CLBFFNN),这是一个用反向传播算法训练的分类器。CLBFFNN包括用于训练的CLBFFNN(1)和作为主分类器的CLBFFNN(2)。人脸、指纹和虹膜识别系统的输出融合在决策层使用and运算完成。采用改进的预处理方法、智能条形码光学字符识别(OCR)和CLBFFNN,证明了该智能多生物识别系统比现有方法更便宜、更安全、更高效。
{"title":"Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN]","authors":"B. Mercy E., Sam-Ekeke Doris C.","doi":"10.5120/IJAIS2017451699","DOIUrl":"https://doi.org/10.5120/IJAIS2017451699","url":null,"abstract":"The beginning of the 21st century was rich in events that turned the world’s attention to public security. Increase in technological advancement gave people possibilities of information transfer and ease of physical mobility unseen before. With those possibilities comes risk of fraud, theft of personal data, or even theft of identity. One of the ways to prevent this is through biometric authentication system. This paper considers a multi-biometric system involving a combination of three biometric traits: iris, fingerprint and face in order to make authentication cheaper and more reliable. When the images are captured using optical scanner and webcam, image pre-processing is done using Enhanced Extracted Face (EEF), Plainarized Region of Interest (PROI) and Advanced Processed Iris Code (APIC) methods for face, fingerprint and iris images respectively. These are fed into a Cascaded Link-Based Feed Forward Neural Network (CLBFFNN) which is a classifier trained with back-propagation algorithm. CLBFFNN comprises of CLBFFNN(1) used for training and CLBFFNN(2) used as the main classifier. Fusion of outputs from face, fingerprint and iris recognition systems is done at decision level using AND operation. With the use of the improved preprocessing methods, Optical Character Recognition (OCR) with intelligent barcode and CLBFFNN, the proposed intelligent multibiometric system is proved to be cheaper, more secure and efficient than the existing methods.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"21 1","pages":"7-19"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87797469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aerial Image Segmentation: A Survey 航空图像分割:综述
Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451702
G. Bhattacharjee, Saswati Pujari
Due to the advancement in recent times, aerial images have started gaining a widespread in every domain of science. The primary data for any region can be obtained through tables, maps, graphs, etc. but these are not sufficient enough to present a real time analysis. So, an aerial image fills in the missing element. The images obtained have to undergo a lot of processing steps to enhance their quality. One such processing is segmentation. The main goal of image segmentation is to cluster the pixels of the regions corresponding to individual surfaces, objects, or natural parts of objects and to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. In this paper, we have presented a study of various segmentation techniques applied on aerial images. The processes have been explained in detail followed by a comparative table.
由于近年来的进步,航空图像已经开始在科学的各个领域获得广泛的应用。任何地区的原始数据都可以通过表格、地图、图表等获得,但这些不足以进行实时分析。因此,航拍图像填补了缺失的元素。获得的图像必须经过大量的处理步骤,以提高其质量。其中一种处理就是分割。图像分割的主要目标是将与单个表面、物体或物体的自然部分相对应的区域的像素聚类,并简化和/或改变图像的表示,使其更有意义,更容易分析。在本文中,我们提出了各种分割技术应用于航空图像的研究。这些过程已详细说明,并附有比较表。
{"title":"Aerial Image Segmentation: A Survey","authors":"G. Bhattacharjee, Saswati Pujari","doi":"10.5120/IJAIS2017451702","DOIUrl":"https://doi.org/10.5120/IJAIS2017451702","url":null,"abstract":"Due to the advancement in recent times, aerial images have started gaining a widespread in every domain of science. The primary data for any region can be obtained through tables, maps, graphs, etc. but these are not sufficient enough to present a real time analysis. So, an aerial image fills in the missing element. The images obtained have to undergo a lot of processing steps to enhance their quality. One such processing is segmentation. The main goal of image segmentation is to cluster the pixels of the regions corresponding to individual surfaces, objects, or natural parts of objects and to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. In this paper, we have presented a study of various segmentation techniques applied on aerial images. The processes have been explained in detail followed by a comparative table.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"39 1","pages":"28-34"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84270980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International journal of applied information systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1