首页 > 最新文献

International journal of applied information systems最新文献

英文 中文
Introduction to Software Defined Networks (SDN) 软件定义网络简介
Pub Date : 2016-12-06 DOI: 10.5120/IJAIS2016451623
A. O. Akpovi, Ebiesuwa Seun, A. O. Adebayo, F. Osisanwo
{"title":"Introduction to Software Defined Networks (SDN)","authors":"A. O. Akpovi, Ebiesuwa Seun, A. O. Adebayo, F. Osisanwo","doi":"10.5120/IJAIS2016451623","DOIUrl":"https://doi.org/10.5120/IJAIS2016451623","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"10 1","pages":"10-14"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75508418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Modelling and Congestion Detection of Wireless Sensor Networks: A Concurrent-based Approach using Coloured Petri Nets 无线传感器网络的建模和拥塞检测:一种基于并发的彩色Petri网方法
Pub Date : 2016-12-06 DOI: 10.5120/IJAIS2016451629
Giang V. Trinh, K. Le, Tam Bang, Q. Trâm, T. Bui, T. Quan
Congestion in Wireless Sensor Networks (WSNs for short) causes not only packet loss and but also leads to excessive energy consumption. Therefore, congestion needs to be detected as well as controlled in order to prolong system lifetime. There are two streams to concern congestion detection including simulation-based and model-based. Following the second stream, formal modelling techniques are used for analysis of WSNs. Coloured Petri nets (CPNs for short) that combines Petri nets with programming languages is a powerful modelling technique. This paper presents a CPN-based approach for formal modelling and congestion detection of WSNs. The proposed model describes parameters and behaviours of a WSN. Then the congestion detection problem is reduced to a reachability problem on the state space of the CPN-based model. Moreover, the CPN-based model uses the hierarchical modelling capability of CPNs, including different levels of abstraction (sub-modules). This helps easily handling and extending the model. In reality, WSN components (sensors and channels) can execute a number of concurrent operations. This is called concurrency of WSNs. The CPN-based model is extended to express the concurrency, thus improving the congestion detection results.
无线传感器网络(Wireless Sensor network,简称WSNs)中的拥塞不仅会导致丢包,还会导致网络能耗过高。因此,为了延长系统生命周期,拥塞需要被检测和控制。有两种流涉及到拥塞检测,包括基于模拟和基于模型的。在第二流之后,正式建模技术被用于分析wsn。彩色Petri网(简称CPNs)结合了Petri网和编程语言,是一种强大的建模技术。本文提出了一种基于cpn的wsn形式化建模和拥塞检测方法。该模型描述了WSN的参数和行为。然后将拥塞检测问题简化为基于cpn模型状态空间上的可达性问题。此外,基于cpn的模型利用了cpn的分层建模能力,包括不同层次的抽象(子模块)。这有助于轻松地处理和扩展模型。实际上,WSN组件(传感器和通道)可以执行许多并发操作。这被称为wsn的并发性。对基于cpn的模型进行了扩展,以表达并发性,从而提高了拥塞检测结果。
{"title":"Modelling and Congestion Detection of Wireless Sensor Networks: A Concurrent-based Approach using Coloured Petri Nets","authors":"Giang V. Trinh, K. Le, Tam Bang, Q. Trâm, T. Bui, T. Quan","doi":"10.5120/IJAIS2016451629","DOIUrl":"https://doi.org/10.5120/IJAIS2016451629","url":null,"abstract":"Congestion in Wireless Sensor Networks (WSNs for short) causes not only packet loss and but also leads to excessive energy consumption. Therefore, congestion needs to be detected as well as controlled in order to prolong system lifetime. There are two streams to concern congestion detection including simulation-based and model-based. Following the second stream, formal modelling techniques are used for analysis of WSNs. Coloured Petri nets (CPNs for short) that combines Petri nets with programming languages is a powerful modelling technique. This paper presents a CPN-based approach for formal modelling and congestion detection of WSNs. The proposed model describes parameters and behaviours of a WSN. Then the congestion detection problem is reduced to a reachability problem on the state space of the CPN-based model. Moreover, the CPN-based model uses the hierarchical modelling capability of CPNs, including different levels of abstraction (sub-modules). This helps easily handling and extending the model. In reality, WSN components (sensors and channels) can execute a number of concurrent operations. This is called concurrency of WSNs. The CPN-based model is extended to express the concurrency, thus improving the congestion detection results.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"14 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89356521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Risk based Test Case Prioritization using UML State Machine Diagram 使用UML状态机图进行基于风险的测试用例优先级排序
Pub Date : 2016-12-06 DOI: 10.5120/IJAIS2016451624
Gufran Ahmad Ansari, Wasiur Rhmann, Vipin Saxena
Time and budget constraints are two main factors which affect the quality of software products. Testing is the last activity that performed in the software development life cycle which suffers more. Test cases are designed to find the bugs in the software. Prioritization of test cases is used to execute test cases earlier which are of high probability of finding bugs. Testing with all possible test cases is not possible even for trivial software. Testing of safety critical systems require more effort to identify the critical components. In the present work, authors proposed, a novel technique of test cases prioritization from UML state diagram by taking account risk. State machine diagram is transformed into WEFSM (Weighted Extended Finite State Machine) and a case study of ATM system is used to evaluate the proposed approach. A new metric based on risk called APRC (Average Percentage of Risk Covered) is proposed and used to demonstrate the effectiveness of proposed approach.
时间和预算约束是影响软件产品质量的两个主要因素。测试是软件开发生命周期中执行的最后一个活动,受到的影响更大。设计测试用例是为了发现软件中的错误。测试用例的优先级用于更早地执行测试用例,这是发现错误的高概率。使用所有可能的测试用例进行测试是不可能的,即使是对于琐碎的软件。安全关键系统的测试需要更多的努力来识别关键部件。在目前的工作中,作者提出了一种通过考虑风险从UML状态图中对测试用例进行优先级排序的新技术。将状态机图转化为WEFSM(加权扩展有限状态机),并以ATM系统为例对该方法进行了验证。提出了一种基于风险的新度量,称为APRC(覆盖风险的平均百分比),并用于证明所建议方法的有效性。
{"title":"Risk based Test Case Prioritization using UML State Machine Diagram","authors":"Gufran Ahmad Ansari, Wasiur Rhmann, Vipin Saxena","doi":"10.5120/IJAIS2016451624","DOIUrl":"https://doi.org/10.5120/IJAIS2016451624","url":null,"abstract":"Time and budget constraints are two main factors which affect the quality of software products. Testing is the last activity that performed in the software development life cycle which suffers more. Test cases are designed to find the bugs in the software. Prioritization of test cases is used to execute test cases earlier which are of high probability of finding bugs. Testing with all possible test cases is not possible even for trivial software. Testing of safety critical systems require more effort to identify the critical components. In the present work, authors proposed, a novel technique of test cases prioritization from UML state diagram by taking account risk. State machine diagram is transformed into WEFSM (Weighted Extended Finite State Machine) and a case study of ATM system is used to evaluate the proposed approach. A new metric based on risk called APRC (Average Percentage of Risk Covered) is proposed and used to demonstrate the effectiveness of proposed approach.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"12 1","pages":"15-21"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83652740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of the Simulation of the Monty Hall Problem Monty Hall问题的仿真研究
Pub Date : 2016-12-06 DOI: 10.5120/IJAIS2016451626
Mazen Alrahili
The Monty Hall problem is a contingent likelihood case in which one of three doors has a profitable prize and other two doors imagine useless "goats." The amusement elements are a reasonable choice between stay or switch given the requirements of the diversion. This paper presents simulation results about for the original Monty Hall and a variation of two-player Monty Hall problem. The simulation results about, in view of the investigation of effective frequencies of either alternative, are helpful in illuminating the outlandish way of the issue. General Terms Monty Hall Problem
蒙蒂·霍尔问题是一种偶然可能性的情况,在这种情况下,三扇门中的一扇门有一个有利可图的奖品,而另外两扇门想象的是无用的“山羊”。娱乐元素是根据导流的要求在停留或切换之间进行合理的选择。本文给出了原Monty Hall问题和二人Monty Hall问题的一种变体的仿真结果。通过对任意一种方案的有效频率的研究,仿真结果有助于阐明该问题的古怪方式。一般术语Monty Hall问题
{"title":"Study of the Simulation of the Monty Hall Problem","authors":"Mazen Alrahili","doi":"10.5120/IJAIS2016451626","DOIUrl":"https://doi.org/10.5120/IJAIS2016451626","url":null,"abstract":"The Monty Hall problem is a contingent likelihood case in which one of three doors has a profitable prize and other two doors imagine useless \"goats.\" The amusement elements are a reasonable choice between stay or switch given the requirements of the diversion. This paper presents simulation results about for the original Monty Hall and a variation of two-player Monty Hall problem. The simulation results about, in view of the investigation of effective frequencies of either alternative, are helpful in illuminating the outlandish way of the issue. General Terms Monty Hall Problem","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"41-45"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84097526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Patterns from 9-1-1 Calls Dataset 从9-1-1呼叫数据集挖掘模式
Pub Date : 2016-12-06 DOI: 10.5120/IJAIS2016451632
Athithyaa Selvam, Balasubramanian Thiagarajan, T. Thivakaran
Everybody encounters different kinds of emergency circumstances in their day-to-day life. A 9-1-1 call may be a consequence of a natural disaster, emergency medical need, fire attack, crime or an individual or group of persons needing some form of immediate assistance. Strategy makers are faced with difficult decisions of providing resources to handle these emergencies, and due to lack of data, they face many problems. In this paper, a model is developed using data mining techniques for identifying patterns based on an analysis of the characteristics of 9-1-1 call activity from Montgomery County 9-1-1 calls dataset. This analysis is useful for allocating emergency responders and helps them take proactive steps in their response efforts. The model will also help strategy makers anticipate the occurrences of emergencies and enable them to effectively handle the emergency by appropriate allocation of resources. General Terms Data Mining, Pattern Mining
每个人在日常生活中都会遇到各种各样的紧急情况。9-1-1电话可能是由于自然灾害、紧急医疗需求、火灾、犯罪或需要某种形式的紧急援助的个人或群体。战略制定者面临着提供资源来处理这些突发事件的困难决策,由于缺乏数据,他们面临着许多问题。本文在分析蒙哥马利县911呼叫数据集的911呼叫活动特征的基础上,利用数据挖掘技术开发了一个模型,用于识别模式。这一分析有助于分配应急响应人员,并帮助他们在响应工作中采取积极主动的步骤。该模型还将帮助战略制定者预测紧急情况的发生,并使他们能够通过适当分配资源有效地处理紧急情况。通用术语数据挖掘,模式挖掘
{"title":"Mining Patterns from 9-1-1 Calls Dataset","authors":"Athithyaa Selvam, Balasubramanian Thiagarajan, T. Thivakaran","doi":"10.5120/IJAIS2016451632","DOIUrl":"https://doi.org/10.5120/IJAIS2016451632","url":null,"abstract":"Everybody encounters different kinds of emergency circumstances in their day-to-day life. A 9-1-1 call may be a consequence of a natural disaster, emergency medical need, fire attack, crime or an individual or group of persons needing some form of immediate assistance. Strategy makers are faced with difficult decisions of providing resources to handle these emergencies, and due to lack of data, they face many problems. In this paper, a model is developed using data mining techniques for identifying patterns based on an analysis of the characteristics of 9-1-1 call activity from Montgomery County 9-1-1 calls dataset. This analysis is useful for allocating emergency responders and helps them take proactive steps in their response efforts. The model will also help strategy makers anticipate the occurrences of emergencies and enable them to effectively handle the emergency by appropriate allocation of resources. General Terms Data Mining, Pattern Mining","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"71 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86307132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform 基于强可信完整性保护的云平台关键信息存储安全框架
Pub Date : 2016-11-05 DOI: 10.5120/IJAIS2016451612
Shweta Sharma
During last few years, the demand of cloud computing has immensely arisen among the Corporate/Business organizations. The cloud computing concept brings exclusive monetary benefits to the corporate houses through its pay-as per use facility. The incurred cost only lies in the consumption of hardware and software resources for any particular available business applications[1].For any particular project, all the web applications are deployed on available physical servers ,dispersed throughout the countries ,connected through cloud service providers. This mega scale growth in the adoption of cloud platform leads to extreme revenue benefits to the involved parties. But at the same time, information security also requires to be well enveloped in the cloud environment [2].In this research work, we have incorporated various cryptographic algorithms to improve the authentication module such as Challenge response Authentication protocol and file data storage using suitable and efficient Digital Signature Standard scheme along with effective encryption schemes such as AES as well. The proposed framework represents proper client –server authentication and secured & trusted architecture for stored information on cloud server. We have done research work to alleviate the security of stored information with in the cloud and also to protect it from any outside attack during information exchange between client and server. General Terms Information Security, Cloud Platform, File Integrity.
在过去的几年里,云计算的需求在公司/商业组织中急剧上升。云计算概念通过其按使用付费的设施为企业带来了独有的金钱利益。所产生的成本仅在于对任何特定可用业务应用程序的硬件和软件资源的消耗[1]。对于任何特定的项目,所有的web应用程序都部署在可用的物理服务器上,分散在各个国家,通过云服务提供商进行连接。云平台采用的这种大规模增长为相关各方带来了极大的收入收益。但与此同时,信息安全也需要很好地包裹在云环境中[2]。在本研究工作中,我们结合了各种加密算法,使用合适和高效的数字签名标准方案以及有效的加密方案(如AES)来改进认证模块,如挑战响应认证协议和文件数据存储。该框架为存储在云服务器上的信息提供了合适的客户端-服务器认证和安全可信的体系结构。我们已经做了研究工作,以减轻存储在云中信息的安全性,并在客户端和服务器之间的信息交换过程中保护它免受任何外部攻击。一般术语信息安全,云平台,文件完整性。
{"title":"A Strongly Trusted Integrity Preservance based Security Framework for Critical Information Storage over Cloud Platform","authors":"Shweta Sharma","doi":"10.5120/IJAIS2016451612","DOIUrl":"https://doi.org/10.5120/IJAIS2016451612","url":null,"abstract":"During last few years, the demand of cloud computing has immensely arisen among the Corporate/Business organizations. The cloud computing concept brings exclusive monetary benefits to the corporate houses through its pay-as per use facility. The incurred cost only lies in the consumption of hardware and software resources for any particular available business applications[1].For any particular project, all the web applications are deployed on available physical servers ,dispersed throughout the countries ,connected through cloud service providers. This mega scale growth in the adoption of cloud platform leads to extreme revenue benefits to the involved parties. But at the same time, information security also requires to be well enveloped in the cloud environment [2].In this research work, we have incorporated various cryptographic algorithms to improve the authentication module such as Challenge response Authentication protocol and file data storage using suitable and efficient Digital Signature Standard scheme along with effective encryption schemes such as AES as well. The proposed framework represents proper client –server authentication and secured & trusted architecture for stored information on cloud server. We have done research work to alleviate the security of stored information with in the cloud and also to protect it from any outside attack during information exchange between client and server. General Terms Information Security, Cloud Platform, File Integrity.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"11 1","pages":"3-7"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79386951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Challenges Faced by Organizations in Implementing Telemedicine in Developing Countries: A Literature Review 组织在发展中国家实施远程医疗所面临的挑战:文献综述
Pub Date : 2016-11-05 DOI: 10.5120/IJAIS2016451616
Oroko Dismas Ombuya, N. A. Ishmael
Telemedicine is the use of information and communication technology (ICT) to provide and support health care. It is not only limited to communication between physicians, but it can also be used in consultation, diagnosis, monitoring and even surgery. It provides a way for the masses that live in remote areas to access medical services without having to travel all the way to urban areas to seek medical attention. Most developed countries have ventured fully into telemedicine and the outcomes of the implementation of telemedicine can be felt. In developing countries, implementation has taken place as well, albeit with challenges. For instance, countries like Bangladesh are working hard towards the use of telemedicine to improve the provision of healthcare to its people. This study is as a result of the evaluation of literature to establish the challenges faced in the implementation process by developing countries. The study has pointed out challenges in telemedicine implementation that will assist developing countries to find the best ways implementing of implementing telemedicine systems.
远程医疗是利用信息和通信技术(ICT)提供和支持卫生保健。它不仅局限于医生之间的交流,还可以用于会诊、诊断、监测甚至手术。它为生活在偏远地区的群众提供了一种获得医疗服务的途径,而不必长途跋涉到城市地区求医。大多数发达国家已经充分冒险进入远程医疗领域,并且可以感受到实施远程医疗的成果。在发展中国家,尽管面临挑战,但也已开始实施。例如,孟加拉国等国正在努力利用远程医疗改善向其人民提供的保健服务。本研究是对文献进行评价的结果,以确定发展中国家在执行过程中面临的挑战。该研究指出了远程医疗实施方面的挑战,这将有助于发展中国家找到实施远程医疗系统的最佳方式。
{"title":"Challenges Faced by Organizations in Implementing Telemedicine in Developing Countries: A Literature Review","authors":"Oroko Dismas Ombuya, N. A. Ishmael","doi":"10.5120/IJAIS2016451616","DOIUrl":"https://doi.org/10.5120/IJAIS2016451616","url":null,"abstract":"Telemedicine is the use of information and communication technology (ICT) to provide and support health care. It is not only limited to communication between physicians, but it can also be used in consultation, diagnosis, monitoring and even surgery. It provides a way for the masses that live in remote areas to access medical services without having to travel all the way to urban areas to seek medical attention. Most developed countries have ventured fully into telemedicine and the outcomes of the implementation of telemedicine can be felt. In developing countries, implementation has taken place as well, albeit with challenges. For instance, countries like Bangladesh are working hard towards the use of telemedicine to improve the provision of healthcare to its people. This study is as a result of the evaluation of literature to establish the challenges faced in the implementation process by developing countries. The study has pointed out challenges in telemedicine implementation that will assist developing countries to find the best ways implementing of implementing telemedicine systems.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"6 1","pages":"8-11"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86961594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Separation of Fuzzy Topological Space 模糊拓扑空间的分离
Pub Date : 2016-11-05 DOI: 10.5120/IJAIS2016451610
Md. Arshaduzzaman
In this paper I discussed about some separation properties of fuzzy topological space. The definition of fuzzy compactness does not hold good on the definition of fuzzy Hausdorff space, we introduce a new definition of proper compactness and prove some interesting results related with it.
本文讨论了模糊拓扑空间的一些分离性质。模糊紧性的定义不适用于模糊Hausdorff空间的定义,我们引入了适当紧性的新定义,并证明了与之相关的一些有趣的结果。
{"title":"Separation of Fuzzy Topological Space","authors":"Md. Arshaduzzaman","doi":"10.5120/IJAIS2016451610","DOIUrl":"https://doi.org/10.5120/IJAIS2016451610","url":null,"abstract":"In this paper I discussed about some separation properties of fuzzy topological space. The definition of fuzzy compactness does not hold good on the definition of fuzzy Hausdorff space, we introduce a new definition of proper compactness and prove some interesting results related with it.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"61 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84026345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Cluster Web Pages Dynamically based on Domain Knowledge 一种基于领域知识的网页动态聚类方法
Pub Date : 2016-11-05 DOI: 10.5120/IJAIS2016451617
T. D’abreo, A. Khandare, P. Janrao
Web Pages which are recommended by the normal web page recommendation system are listed and are not clustered. The web search is based on keyword. The search engine does not understand the meaning of the searched query as it does not have a background domain knowledge of the searched query. The earlier search engine designed clustered the web pages according to static clusters formed [2]. As static clustering, faced some drawbacks of mapping the Web pages, there was a need to find the solution for the same. This paper presents a solution to form the clusters dynamically considering the domains for efficient clustering. General Terms Data mining, Semantic-based Mining, Recommendation Systems, Clustering techniques.
普通网页推荐系统推荐的网页被列出,而不是聚类。网络搜索是基于关键词的。搜索引擎不理解搜索查询的含义,因为它没有搜索查询的背景领域知识。早期的搜索引擎根据形成的静态聚类对网页进行聚类[2]。由于静态集群在映射Web页面时面临一些缺点,因此需要找到解决方案。为了高效聚类,本文提出了一种考虑域的动态聚类方案。数据挖掘,基于语义的挖掘,推荐系统,聚类技术。
{"title":"A Novel Approach to Cluster Web Pages Dynamically based on Domain Knowledge","authors":"T. D’abreo, A. Khandare, P. Janrao","doi":"10.5120/IJAIS2016451617","DOIUrl":"https://doi.org/10.5120/IJAIS2016451617","url":null,"abstract":"Web Pages which are recommended by the normal web page recommendation system are listed and are not clustered. The web search is based on keyword. The search engine does not understand the meaning of the searched query as it does not have a background domain knowledge of the searched query. The earlier search engine designed clustered the web pages according to static clusters formed [2]. As static clustering, faced some drawbacks of mapping the Web pages, there was a need to find the solution for the same. This paper presents a solution to form the clusters dynamically considering the domains for efficient clustering. General Terms Data mining, Semantic-based Mining, Recommendation Systems, Clustering techniques.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"53 1","pages":"12-15"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83099222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Method for Soil Analysis using FARM-IT Approach 一种利用FARM-IT方法进行土壤分析的有效方法
Pub Date : 2016-11-05 DOI: 10.5120/IJAIS2016451618
M. Martiš, P. Lobo, S. Chavan
{"title":"An Efficient Method for Soil Analysis using FARM-IT Approach","authors":"M. Martiš, P. Lobo, S. Chavan","doi":"10.5120/IJAIS2016451618","DOIUrl":"https://doi.org/10.5120/IJAIS2016451618","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"313 1","pages":"16-19"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76350546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International journal of applied information systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1