首页 > 最新文献

International journal of applied information systems最新文献

英文 中文
Enriched Integrations of ERP and PLM in the IoT World 物联网世界中ERP和PLM的丰富集成
Pub Date : 2017-05-05 DOI: 10.5120/IJAIS2017451684
Ritesh Jain
While the software systems like Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) have been solving critical problems of the industries, there are various integrations implemented to use them under overlapping conditions depending on the category of sector the solutions are implemented into. With the new buzzword called Internet of Things, in the Information Technology fraternity the scope and face of various traditional software systems is changing fast. Internet of Things is growing big day-by-day and finding its applications in domestic as well as industrial areas and even to some very unconventional areas as well. This paper discusses the overlapping roles of PLM and ERP systems in the IoT arena. The applications of both the systems can be enhanced and put to better use with the usage of IoT along with. With some of the enhancements, especially in the integration systems implemented for them, helps increasing the productivity and efficiency of the products and also save the cost with early indications of any failure. General Terms Internet of things, Product Lifecycle Management, Enterprise Resource Planning
虽然像产品生命周期管理(PLM)和企业资源规划(ERP)这样的软件系统已经解决了行业的关键问题,但根据实施解决方案的部门类别,在重叠的条件下实施了各种集成来使用它们。随着新的流行词“物联网”的出现,在信息技术领域,各种传统软件系统的范围和面貌正在迅速变化。物联网日益发展壮大,在家庭和工业领域,甚至在一些非常非常规的领域都有应用。本文讨论了PLM和ERP系统在物联网领域的重叠作用。随着物联网的使用,这两个系统的应用都可以得到增强,并更好地利用。通过一些增强功能,特别是在为它们实现的集成系统中,可以帮助提高产品的生产率和效率,并通过任何故障的早期指示节省成本。物联网,产品生命周期管理,企业资源规划
{"title":"Enriched Integrations of ERP and PLM in the IoT World","authors":"Ritesh Jain","doi":"10.5120/IJAIS2017451684","DOIUrl":"https://doi.org/10.5120/IJAIS2017451684","url":null,"abstract":"While the software systems like Product Lifecycle Management (PLM) and Enterprise Resource Planning (ERP) have been solving critical problems of the industries, there are various integrations implemented to use them under overlapping conditions depending on the category of sector the solutions are implemented into. With the new buzzword called Internet of Things, in the Information Technology fraternity the scope and face of various traditional software systems is changing fast. Internet of Things is growing big day-by-day and finding its applications in domestic as well as industrial areas and even to some very unconventional areas as well. This paper discusses the overlapping roles of PLM and ERP systems in the IoT arena. The applications of both the systems can be enhanced and put to better use with the usage of IoT along with. With some of the enhancements, especially in the integration systems implemented for them, helps increasing the productivity and efficiency of the products and also save the cost with early indications of any failure. General Terms Internet of things, Product Lifecycle Management, Enterprise Resource Planning","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"58 1","pages":"12-16"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88238770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Online Analytical Processing on Hadoop using Apache Kylin 基于Apache Kylin的Hadoop在线分析处理
Pub Date : 2017-05-05 DOI: 10.5120/IJAIS2017451682
Supriya Vitthal Ranawade, Shivani Navale, Akshay Dhamal, K. Deshpande, C. Ghuge
{"title":"Online Analytical Processing on Hadoop using Apache Kylin","authors":"Supriya Vitthal Ranawade, Shivani Navale, Akshay Dhamal, K. Deshpande, C. Ghuge","doi":"10.5120/IJAIS2017451682","DOIUrl":"https://doi.org/10.5120/IJAIS2017451682","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"24 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80775429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Computer Simulation of Chaotic Systems 混沌系统的计算机仿真
Pub Date : 2017-04-08 DOI: 10.5120/IJAIS2017451605
T. K. Genger, T. J. Anande, S. Al-Shehri
This paper is about the implementation of a software tool to aid the study of chaos theory in the the context of the financial or commodities markets. The main focus of this paper is simulating the movement of oil prices in an attempt to identity chaos when it exists. Models implemented represent certain economically realistic aspects of the oil market. Tests for chaos (Lyapunov exponent test) will be conducted on these models, an attempt will be made to test for chaos in the movement of the price of oil dated from 2006 to 2016. The models implemented here are nonlinear models with the potential of exhibiting chaos for certain parameter values. Shocks will be introduced into the models and their effect on the models will be noted and visualized through the use of a time series or graphs. An Object oriented programming language (Java) was used in building this application, MYSQL database was used to save the data generated by the models and the spiral software development life-cycle was used in structuring, planning and controlling the process of building this application.
本文是关于一个软件工具的实现,以帮助混沌理论在金融或商品市场的背景下的研究。本文的主要重点是模拟石油价格的运动,试图识别混乱时,它的存在。所实施的模型代表了石油市场的某些经济现实方面。将对这些模型进行混沌测试(Lyapunov指数测试),将尝试测试2006年至2016年石油价格运动中的混沌。这里实现的模型是非线性模型,在某些参数值下可能出现混沌。冲击将被引入到模型中,它们对模型的影响将被记录下来,并通过使用时间序列或图表来可视化。本应用程序的构建采用面向对象编程语言(Java),采用MYSQL数据库保存模型生成的数据,并采用螺旋软件开发生命周期来组织、规划和控制本应用程序的构建过程。
{"title":"Computer Simulation of Chaotic Systems","authors":"T. K. Genger, T. J. Anande, S. Al-Shehri","doi":"10.5120/IJAIS2017451605","DOIUrl":"https://doi.org/10.5120/IJAIS2017451605","url":null,"abstract":"This paper is about the implementation of a software tool to aid the study of chaos theory in the the context of the financial or commodities markets. The main focus of this paper is simulating the movement of oil prices in an attempt to identity chaos when it exists. Models implemented represent certain economically realistic aspects of the oil market. Tests for chaos (Lyapunov exponent test) will be conducted on these models, an attempt will be made to test for chaos in the movement of the price of oil dated from 2006 to 2016. The models implemented here are nonlinear models with the potential of exhibiting chaos for certain parameter values. Shocks will be introduced into the models and their effect on the models will be noted and visualized through the use of a time series or graphs. An Object oriented programming language (Java) was used in building this application, MYSQL database was used to save the data generated by the models and the spiral software development life-cycle was used in structuring, planning and controlling the process of building this application.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75630463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brillouin Fiber Laser Utilizing Nonlinear Birefringent Photonic Crystal Fiber (PCF) 利用非线性双折射光子晶体光纤(PCF)的布里渊光纤激光器
Pub Date : 2017-04-08 DOI: 10.5120/IJAIS2017451674
M. Algarni
A Brillouin fiber laser utilizing an exceedingly nonlinear birefringent photonic precious stone fiber is accounted for. The center of the fiber was curved fit as a fiddle. A solitary longitudinal-mode high power fiber laser was utilized as a Brillouin pump, and the laser created multi-wave length yield with a 0.04 nm partition. Modifying the polarization controller plates made it conceivable to get a single wavelength laser. The impact of the little center birefringent photonic gem fiber on the yield of the laser was investigated. The laser was steady and demonstrated a power change of under 0.2 dB. The yield of the laser was checked utilizing an optical range analyzer of determination 0.01 nm.
介绍了一种利用极非线性双折射光子宝石光纤的布里渊光纤激光器。纤维的中心弯曲得像小提琴。利用单纵模高功率光纤激光器作为布里渊泵浦,产生了0.04 nm分割的多波长产率。对偏振控制板进行改进,使单波长激光器成为可能。研究了小中心双折射光子宝石光纤对激光器产率的影响。激光器稳定,功率变化小于0.2 dB。利用测定0.01 nm的光学范围分析仪检查激光器的产率。
{"title":"Brillouin Fiber Laser Utilizing Nonlinear Birefringent Photonic Crystal Fiber (PCF)","authors":"M. Algarni","doi":"10.5120/IJAIS2017451674","DOIUrl":"https://doi.org/10.5120/IJAIS2017451674","url":null,"abstract":"A Brillouin fiber laser utilizing an exceedingly nonlinear birefringent photonic precious stone fiber is accounted for. The center of the fiber was curved fit as a fiddle. A solitary longitudinal-mode high power fiber laser was utilized as a Brillouin pump, and the laser created multi-wave length yield with a 0.04 nm partition. Modifying the polarization controller plates made it conceivable to get a single wavelength laser. The impact of the little center birefringent photonic gem fiber on the yield of the laser was investigated. The laser was steady and demonstrated a power change of under 0.2 dB. The yield of the laser was checked utilizing an optical range analyzer of determination 0.01 nm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"9 1","pages":"38-40"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85540389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Recognition Techniques for Authentication in Smart Devices - Comparative Study 智能设备中人脸识别认证技术-比较研究
Pub Date : 2017-04-08 DOI: 10.5120/IJAIS2017451671
J. George, Tulasi B.
With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.
随着科技的快速发展,手持设备的数量激增。这些设备被视为个人电脑和笔记本电脑等传统设备的替代品。随着这些设备的存储和处理能力的提高,它们被称为智能设备。存储在这些设备中的个人数据量增加了许多倍。为了确保存储在这些设备中的关键数据是安全的,必须实施身份验证过程。身份验证可以在多个层面进行,从密码到人脸识别。像Eigenfaces、Fisherfaces这样的算法正被用作身份验证应用程序的一部分。本文试图对最常用的人脸识别算法进行比较研究。一般术语人脸识别,智能设备,特征脸算法,渔民脸算法。
{"title":"Face Recognition Techniques for Authentication in Smart Devices - Comparative Study","authors":"J. George, Tulasi B.","doi":"10.5120/IJAIS2017451671","DOIUrl":"https://doi.org/10.5120/IJAIS2017451671","url":null,"abstract":"With rapid development of technology there has been a surge in hand-held devices. These devices are looked upon as an alternative to the traditional devices like personal computer and laptop. As the storage and the processing capabilities of these devices are increasing they are been termed as smart devices. The amount of personal data stored in these devices has increased many folds. In order to ensure that the critical data that is stored in these devices is secured, it is essential to put in place authentication processes. Authentication can be done at multiple levels, ranging from a password to face recognition. Algorithms like Eigenfaces, Fisherfaces are being used as a part of authentication applications. This paper tries to provide a comparative study on most commonly used face recognition algorithms. General Terms Face Recognition, Smart Devices, Eigenfaces Algorithm, Fisherfaces Algorithm.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"16 1","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77737430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Fuzzy Decision Support System (FDSS) Procedures to Best Select e-Learning Solution 开发模糊决策支持系统(FDSS)程序以最佳选择电子学习方案
Pub Date : 2017-04-08 DOI: 10.5120/IJAIS2017451665
Mohammad A. A. Alhawamdeh
{"title":"Development of Fuzzy Decision Support System (FDSS) Procedures to Best Select e-Learning Solution","authors":"Mohammad A. A. Alhawamdeh","doi":"10.5120/IJAIS2017451665","DOIUrl":"https://doi.org/10.5120/IJAIS2017451665","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"149 1","pages":"9-23"},"PeriodicalIF":0.0,"publicationDate":"2017-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76254004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Consumption and Conservation Family Lifestyle: Survey 能源消耗与节约家庭生活方式:调查
Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451662
M. Algarni
Vitality utilization is inspected in the particular setting of home warming consumptions. Examination of home warmth costs crosswise over phases of the family life cycle uncovers an unmistakably unique example than already found when adding up to family vitality expenses were inspected. As opposed to the curvilinear example where uses top amid center phases of the life cycle, this information demonstrates a positive direct relationship where higher expenses are related with elderly buyers. The exploration center is extended to incorporate warmth related protection conduct and additionally uses with an end goal to better comprehend suggestions for arrangement creators and-advertisers.
生命力利用是在家庭取暖消费的特定设置检查。在家庭生命周期的各个阶段对家庭温暖成本进行横向检查,发现了一个明显独特的例子,而不是在检查家庭活力费用时发现的。与在生命周期的中心阶段使用顶部的曲线示例相反,该信息显示了一个正的直接关系,即较高的费用与老年买家相关。探索中心被扩展到包含与温暖相关的保护行为和额外的用途,最终目的是更好地理解对安排创建者和广告商的建议。
{"title":"Energy Consumption and Conservation Family Lifestyle: Survey","authors":"M. Algarni","doi":"10.5120/IJAIS2017451662","DOIUrl":"https://doi.org/10.5120/IJAIS2017451662","url":null,"abstract":"Vitality utilization is inspected in the particular setting of home warming consumptions. Examination of home warmth costs crosswise over phases of the family life cycle uncovers an unmistakably unique example than already found when adding up to family vitality expenses were inspected. As opposed to the curvilinear example where uses top amid center phases of the life cycle, this information demonstrates a positive direct relationship where higher expenses are related with elderly buyers. The exploration center is extended to incorporate warmth related protection conduct and additionally uses with an end goal to better comprehend suggestions for arrangement creators and-advertisers.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"78 1","pages":"59-62"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80860855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization 基于改进粒子群优化的非线性流密码系统密码分析
Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451658
Salim A. Abbas Al-Ageelee, Riyam N. J. Kadhum
Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. In this paper the proposed cryptanalysis system based on a Particle Swarm Optimization (PSO) with suggestions for improving the achievement of PSO, by using Simulated Annealing (SA) that is the first part of this paper. The second part represented by a comparison study for the cryptanalysis results obtained by the Improved PSO (IPSO) with classical PSO and Genetic Algorithm (GA).The cryptanalysis process include finding the initial state of the attacked stream cipher cryptosystem using ciphertext only attack.
流密码是一种安全性高、难以破解的硬电子密码系统。本文提出了一种基于粒子群算法的密码分析系统,并提出了改进粒子群算法的建议,这是本文的第一部分。第二部分是将改进粒子群算法(IPSO)与经典粒子群算法和遗传算法(GA)的密码分析结果进行比较研究。密码分析过程包括使用纯密文攻击找到被攻击流密码系统的初始状态。
{"title":"Cryptanalysis of Nonlinear Stream Cipher Cryptosystem based on Improved Particle Swarm Optimization","authors":"Salim A. Abbas Al-Ageelee, Riyam N. J. Kadhum","doi":"10.5120/IJAIS2017451658","DOIUrl":"https://doi.org/10.5120/IJAIS2017451658","url":null,"abstract":"Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. In this paper the proposed cryptanalysis system based on a Particle Swarm Optimization (PSO) with suggestions for improving the achievement of PSO, by using Simulated Annealing (SA) that is the first part of this paper. The second part represented by a comparison study for the cryptanalysis results obtained by the Improved PSO (IPSO) with classical PSO and Genetic Algorithm (GA).The cryptanalysis process include finding the initial state of the attacked stream cipher cryptosystem using ciphertext only attack.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"46 1","pages":"43-52"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88322323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Artificial Neural Network Modeling of Job Satisfaction: A Case Study of ICT, Federal University of Agriculture, Makurdi 工作满意度的人工神经网络建模:以信息通信技术为例,国立农业大学,马库尔迪
Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451651
K. K. Ikpambese, T. Ipilakyaa, V. Achirgbenda
Artificial neural network assessment and modeling of job satisfaction of the Information and Communications Technology (ICT) Directorate workers of Federal University of Agriculture, Makurdi was investigated in this study. Modified Nordic Musculoskeletal Disorder (NMDQ) questionnaires which incorporated health, safety and environment factors were used. The questionnaire consisted of a series of objective questions with ‘yes’, ‘no’ and ‘I don’t know’ responses and some were multiple choice questions. Parameters such as health, safety, environment and ergonomic factors were obtained from questionnaires for the modelling of workers efficiency and job satisfaction. The efficiency of workers was determined and normal probability curve for the 40 workers was plotted to identify the outliers. The artificial neural network (ANN) modeling method was employed to predict job satisfaction using health, safety, environment and ergonomic factors as input parameters while job satisfaction was the output. Series of network architectures were considered using different training algorithms. The scale conjugate gradient SCG 4 [3-3]2 1 was adopted as the suitable network architecture for predicting job satisfaction. Result indicated that the predicted values of job satisfaction were in the range of 1.42 – 2.00 as compared with the actual values of 1.50 – 2.00 obtained from the questionnaires. Statistical indicators of normal error (E), used for validation of the model gave minimal errors and varied in the range of -0.48 – 0.08. The plot of the normal probability curve also indicated the presence of outliers or inefficient workers. Whereas most of the workers were satisfied with the existing health, safety, environment (HSE) and ergonomics (E) programs at the work place, some (outliers) were not. The presence of outliers calls for improvement of ergonomic conditions at the ICT directorate. General Terms Information and communication technology (ICT), Outliers, Training algorithms
本研究以马库尔迪联邦农业大学信息与通信技术局工作人员工作满意度的人工神经网络评估与建模为研究对象。采用改良北欧肌肉骨骼疾病(NMDQ)问卷,纳入健康、安全和环境因素。问卷由一系列客观问题组成,回答为“是”、“否”和“我不知道”,其中一些是多项选择题。健康、安全、环境和人体工程学因素等参数是从工人效率和工作满意度建模的问卷中获得的。确定工人的工作效率,并绘制40名工人的正态概率曲线以识别异常值。采用人工神经网络(ANN)建模方法,以健康、安全、环境和工效学因素为输入参数,以工作满意度为输出参数,对工作满意度进行预测。使用不同的训练算法考虑了一系列的网络架构。采用尺度共轭梯度SCG 4[3-3] 21作为预测工作满意度的合适网络架构。结果表明,工作满意度的预测值在1.42 ~ 2.00之间,而问卷调查的实际值为1.50 ~ 2.00。用于验证模型的正态误差统计指标(E)误差最小,在-0.48 - 0.08的范围内变化。正态概率曲线也显示了异常值或低效率工人的存在。尽管大多数工人对工作场所现有的健康、安全、环境(HSE)和人体工程学(E)计划感到满意,但也有一些(异常值)并不满意。异常值的存在要求改善信通技术理事会的人体工程学条件。一般术语信息与通信技术,异常值,训练算法
{"title":"Artificial Neural Network Modeling of Job Satisfaction: A Case Study of ICT, Federal University of Agriculture, Makurdi","authors":"K. K. Ikpambese, T. Ipilakyaa, V. Achirgbenda","doi":"10.5120/IJAIS2017451651","DOIUrl":"https://doi.org/10.5120/IJAIS2017451651","url":null,"abstract":"Artificial neural network assessment and modeling of job satisfaction of the Information and Communications Technology (ICT) Directorate workers of Federal University of Agriculture, Makurdi was investigated in this study. Modified Nordic Musculoskeletal Disorder (NMDQ) questionnaires which incorporated health, safety and environment factors were used. The questionnaire consisted of a series of objective questions with ‘yes’, ‘no’ and ‘I don’t know’ responses and some were multiple choice questions. Parameters such as health, safety, environment and ergonomic factors were obtained from questionnaires for the modelling of workers efficiency and job satisfaction. The efficiency of workers was determined and normal probability curve for the 40 workers was plotted to identify the outliers. The artificial neural network (ANN) modeling method was employed to predict job satisfaction using health, safety, environment and ergonomic factors as input parameters while job satisfaction was the output. Series of network architectures were considered using different training algorithms. The scale conjugate gradient SCG 4 [3-3]2 1 was adopted as the suitable network architecture for predicting job satisfaction. Result indicated that the predicted values of job satisfaction were in the range of 1.42 – 2.00 as compared with the actual values of 1.50 – 2.00 obtained from the questionnaires. Statistical indicators of normal error (E), used for validation of the model gave minimal errors and varied in the range of -0.48 – 0.08. The plot of the normal probability curve also indicated the presence of outliers or inefficient workers. Whereas most of the workers were satisfied with the existing health, safety, environment (HSE) and ergonomics (E) programs at the work place, some (outliers) were not. The presence of outliers calls for improvement of ergonomic conditions at the ICT directorate. General Terms Information and communication technology (ICT), Outliers, Training algorithms","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"183 1","pages":"10-15"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80432561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mapping Study to Investigate Spam Detection on Social Networks 基于映射的社交网络垃圾邮件检测研究
Pub Date : 2017-03-08 DOI: 10.5120/IJAIS2017451652
Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad
Social networks such as Facebook, Twitter and SinaWeibo have become increasingly important for reaching millions of user globally. Consequently, spammers are increasing using such networks for propagating spam. Existing research on filtering techniques such as collaborative filters and behavioral analysis filters are able to significantly reduce spam. In recent years, online social networks have become the most important medium of communication among individual and organization to interact. Unfortunately, driven by the desire to communicate, fraudster or spammers have produced deceptive spam or unsolicited commercial email(UCE). The fraudsters’ or spammer activities mislead potential users and victims reshaping their individual life and general communication on social network platform. The aim of this study is to understand, classify and analyze existing research in spam detection on social networks, focusing on approaches and elements that are used to evaluate the general framework of spam detection and its architectural framework from the users perspective, service provider and security analyst ‘s point of view. This paper presents a systematic mapping study of several spam detection techniques and approaches on social networks that were proposed to measure to evaluate the general framework of spam detection on social networks. We found 17 proposals that could be applied to evaluate spam detection on social networks, while 14 proposals could be applied to evaluate the users, service providers and practitioners. Various elements of spam detection on social networks that were measured are reviewed and discussed. Only a few of the proposed spam detection on social networks are soundly defined. The quality assessment of the primary studies detected many limitations and suggested guidelines for possibilities for improving and increasing the acceptance of spam detection on social networks. However, it remains a challenge to characterize and evaluate a spam detection and framework on social networks quantitatively. For this fact, much effort must be made to achieve a better spam detection approach in the future that will be devoid of problem anomaly detection, fault detection, malware detection and intrusion detection General Terms Spam detection, Security, Mapping study,Spam detection metrics.
Facebook、Twitter和新浪微博等社交网络对于接触全球数百万用户已经变得越来越重要。因此,垃圾邮件发送者越来越多地使用这种网络来传播垃圾邮件。现有的过滤技术研究,如协同过滤和行为分析过滤,能够显著减少垃圾邮件。近年来,在线社交网络已成为个人和组织之间最重要的交流媒介。不幸的是,在交流欲望的驱使下,欺诈者或垃圾邮件发送者制造了欺骗性的垃圾邮件或未经请求的商业电子邮件(UCE)。诈骗者或垃圾邮件发送者的活动误导了潜在用户和受害者,重塑了他们在社交网络平台上的个人生活和一般交流。本研究的目的是了解、分类和分析社交网络垃圾邮件检测的现有研究,重点从用户、服务提供商和安全分析师的角度评估垃圾邮件检测的总体框架及其架构框架的方法和要素。本文对几种基于社交网络的垃圾邮件检测技术和方法进行了系统的映射研究,以衡量和评估社交网络垃圾邮件检测的总体框架。我们发现有17个建议可用于评估社交网络上的垃圾邮件检测,14个建议可用于评估用户、服务提供商和从业者。对社会网络上的垃圾邮件检测的各种要素进行了评估和讨论。在社交网络上的垃圾邮件检测方案中,只有少数得到了完善的定义。初步研究的质量评估发现了许多局限性,并提出了在社交网络上改进和增加对垃圾邮件检测的接受度的可能性的指导方针。然而,对社交网络上的垃圾邮件检测和框架进行定量表征和评估仍然是一个挑战。鉴于此,我们必须努力在未来实现一种更好的垃圾邮件检测方法,这种方法将不需要问题异常检测、故障检测、恶意软件检测和入侵检测。
{"title":"A Mapping Study to Investigate Spam Detection on Social Networks","authors":"Balogun Abiodun Kamoru, Azmi Jaafar, Masrah Azrifah Azmi Murad","doi":"10.5120/IJAIS2017451652","DOIUrl":"https://doi.org/10.5120/IJAIS2017451652","url":null,"abstract":"Social networks such as Facebook, Twitter and SinaWeibo have become increasingly important for reaching millions of user globally. Consequently, spammers are increasing using such networks for propagating spam. Existing research on filtering techniques such as collaborative filters and behavioral analysis filters are able to significantly reduce spam. In recent years, online social networks have become the most important medium of communication among individual and organization to interact. Unfortunately, driven by the desire to communicate, fraudster or spammers have produced deceptive spam or unsolicited commercial email(UCE). The fraudsters’ or spammer activities mislead potential users and victims reshaping their individual life and general communication on social network platform. The aim of this study is to understand, classify and analyze existing research in spam detection on social networks, focusing on approaches and elements that are used to evaluate the general framework of spam detection and its architectural framework from the users perspective, service provider and security analyst ‘s point of view. This paper presents a systematic mapping study of several spam detection techniques and approaches on social networks that were proposed to measure to evaluate the general framework of spam detection on social networks. We found 17 proposals that could be applied to evaluate spam detection on social networks, while 14 proposals could be applied to evaluate the users, service providers and practitioners. Various elements of spam detection on social networks that were measured are reviewed and discussed. Only a few of the proposed spam detection on social networks are soundly defined. The quality assessment of the primary studies detected many limitations and suggested guidelines for possibilities for improving and increasing the acceptance of spam detection on social networks. However, it remains a challenge to characterize and evaluate a spam detection and framework on social networks quantitatively. For this fact, much effort must be made to achieve a better spam detection approach in the future that will be devoid of problem anomaly detection, fault detection, malware detection and intrusion detection General Terms Spam detection, Security, Mapping study,Spam detection metrics.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":"16-34"},"PeriodicalIF":0.0,"publicationDate":"2017-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89082521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International journal of applied information systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1