Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 611

Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System

Enable Better and Timelier Decision-Making Using Real-Time Business Intelligence System

Darshan M. Tank

Статья научная

Today's businesses need support when making decisions. Business intelligence (BI) helps businesses to make decisions based on good pre-analysis and documented data, and enables information to be presented when and where the decisions need to be made. Real time business intelligence (RTBI) presents numbers in real time, providing the decision makers at the operational and tactical layers with data as fresh as it can be. By having accurate, fresher and a bigger amount of data, businesses will be able to make decisions in a faster pace, and eliminate tedious complexity of the decision-making process. The objective of this research is to show that a real time business intelligence solution would be beneficial for supporting the operational and tactical layers of decision-making within an organization. By implementing an RTBI solution, it would provide the decision-maker with fresh and reliant data to base the decisions on. Visualization of the current decision processes showed that by adding a real time business intelligence solution it would help eliminate the use of intuition, as there would be more data available and the decisions can be made where the work is performed. The aim of this research is to contribute by visualizing how a real time business intelligence solution can shorten a complex decision process by giving the correct information to the right people. Organizations need to address potential challenges as part of a pre-project of a real time business intelligence implementation.

Бесплатно

Enhanced Password Based Security System Based on User Behavior using Neural Networks

Enhanced Password Based Security System Based on User Behavior using Neural Networks

Preet Inder Singh, Gour Sundar Mitra Thakur

Статья научная

There are multiple numbers of security systems are available to protect your computer/resources. Among them, password based systems are the most commonly used system due to its simplicity, applicability and cost effectiveness But these types of systems have higher sensitivity to cyber-attack. Most of the advanced methods for authentication based on password security encrypt the contents of password before storing or transmitting in the physical domain. But all conventional encryption methods are having its own limitations, generally either in terms of complexity or in terms of efficiency. In this paper an enhanced password based security system has been proposed based on user typing behavior, which will attempt to identify authenticity of any user failing to login in first few attempts by analyzing the basic user behaviors/activities and finally training them through neural network and classifying them as genuine or intruder.

Бесплатно

Enhanced Word Sense Disambiguation Algorithm for Afaan Oromoo

Enhanced Word Sense Disambiguation Algorithm for Afaan Oromoo

Abdo Ababor Abafogi

Статья научная

In various circumstances, the same word can mean differently based on the usage of the word in a particular sentence. The aim of word sense disambiguation (WSD) is to precisely understand the meaning of a word in particular usage. WSD utilized in several applications of natural language to interpret an ambiguous word contextually. This paper enhances a statistical algorithm proposed by Abdo [36] that performs a task of WSD for Afaan Oromoo (one of under-resourced language spoken in East Africa by nearly 50% of Ethiopians). The paper evaluates appropriate methods that used to increase the performance of disambiguation for the language with and without morphology consideration. The algorithm evaluated by 249 sentences with four evaluation metrics: recall, precision, F1 and accuracy. The evaluation result has achieved state of the art for Afaan Oromoo. Finally, future direction is highlighted for further research of the task on the language.

Бесплатно

Enhancing Mobile Software Developer Selection through Integrated F-AHP and F-TOPSIS Methods

Enhancing Mobile Software Developer Selection through Integrated F-AHP and F-TOPSIS Methods

Murnawan, Vaya Viora Novitasari

Статья научная

This study delves into the impact of employee recruiting within the dynamic and fiercely competitive realm of information technology (IT), focusing on the role of mobile software developers in a software development company situated in Bandung, Indonesia. Given that the quality of employees and their alignment with organizational needs are pivotal drivers of productivity and overall performance, the recruitment process assumes paramount importance. However, this process is riddled with complexity and challenges, stemming from the need to define precise criteria and navigate decision-making amidst uncertainty and ambiguity. To confront these challenges, this research advocates for the utilization of the Fuzzy Analytic Hierarchy Process (F-AHP) and Fuzzy Technique for Order of Preference by Similarity to Ideal Solution (F-TOPSIS). The F-AHP method, employing Chang's extent analysis approach, assists in establishing weights for uncertain criteria. Meanwhile, F-TOPSIS is leveraged to evaluate alternatives based on predefined criteria. The focal point of this study is the selection of mobile software developers within a software development company in Bandung, Indonesia. Decision-makers, drawing insights from policy documents and assessment forms, identified pertinent criteria and sub-criteria. Utilizing F-AHP, they determined the weights for criteria and sub-criteria through paired comparisons using fuzzy numbers. Subsequently, F-TOPSIS was applied to rank 10 mobile software developer candidates, culminating in the identification of alternative-7 (CK-7) as the top mobile software developer candidate. In essence, the application of F-AHP and F-TOPSIS methods presents an effective approach to navigate the complexity of Multi-Criteria Decision Making (MCDM) in employee selection, particularly within the competitive landscape of the information technology industry. This study's findings underscore the significance of employing advanced decision-making techniques to enhance the efficiency and effectiveness of employee recruitment processes, thereby bolstering organizational performance and competitiveness.

Бесплатно

Enhancing Nigerian Telecommunication Customer Service Channels Using Self-Service Software Model

Enhancing Nigerian Telecommunication Customer Service Channels Using Self-Service Software Model

Adamu Abubakar, Hyacinth C. Inyiama, Olayemi Mikail Olaniyi, Muhammad Bashir Abdullahi

Статья научная

Until recently, the most common methods used by Nigerian Telecommunication Operators for providing services to their customers include: customer service centers and online channels. With the rapid increase in the number of customers, the existing channels of responding to customers queries through walk in centers and online customer agent cannot be adequate due to the time required to respond to each customer's queries. Hence the need to provide an alternative channel that will often provide faster, reliable, convenient, less expensive and most affordable customer service. In this paper, a self-service model was developed for Nigerian Telecommunications Operators to improve customer service delivery. Self-Service Software Model (SSSM) allows customers to request for specific services without interacting with customer care representative at their own convenient time and have these services delivered to them within a short period of time. SSSM was designed using Model-View-Controller design pattern and implemented using Hypertext Markup Language, Cascading Style Sheet and MySQL relational database management. The prototype of the SSSM was tested with data collected and analysed from three Telecommunication subscribers in Nigeria. The results of the study showed that the model allows customers to request for specific services at their own convenience in a timely manner and it is faster, reliable, less expensive, and reduces cost of maintaining hardware, software and overhead cost of existing customer service delivery.

Бесплатно

Enhancing Traceability in Agricultural Supply Chain Using Blockchain Technology

Enhancing Traceability in Agricultural Supply Chain Using Blockchain Technology

Vedant Sharma, Anitha Palakshappa, Syed Adil Naqvi

Статья научная

The work highlights exploring the usage of blockchain technology for enhancing traceability in agricultural supply chain management. The aim is to develop a secure and transparent system, which improves the easy tracking and tracing of agricultural products from the point of origin until it reaches the end consumer. Currently, Blockchain is a technology, which provides security in various fields of transactions. The work utilizes to improve supply chain efficiency, increase transparency and accountability, and enhance consumer trust in the agricultural products. The system will utilize smart contracts to automate processes and ensure compliance with regulations and standards, which improves supply chain efficiency. Smart contracts enable agreement between two parties present in the supply chain. Further, the financial transactions can be improved with the help of block chain. Additional, the work will also provide recommendations for companies and organizations looking to implement blockchain-based results in their supply chain management. The work implements an application using ganache, solidity and truffle. Ethereum block chain is used as primary infrastructure for the application. Smart contracts generated using solidity is deployed into Ethereum network using truffle. The deployment of the application in agricultural sectors improves the accountability in the field of the supply chain. The deployment in a wider range will avoid manipulation of the data. Agricultural supply chain tracing website involves the use of several tools and technologies, including Ganache, Solidity, and Truffle. The system uses the Ethereum blockchain as the underlying infrastructure to store and manage supply chain data securely and transparently. The smart contracts in the supply chain tracing system are generated using Solidity and deployed to the Ethereum network using Truffle.

Бесплатно

Ensembles of Classification Methods for Data Mining Applications

Ensembles of Classification Methods for Data Mining Applications

M.Govindarajan

Статья научная

One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed using classifiers in both homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of real and benchmark data sets of data mining applications like intrusion detection, direct marketing and signature verification. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase and combining phase. A wide range of comparative experiments are conducted for real and benchmark data sets of direct marketing. The accuracy of base classifiers is compared with homogeneous and heterogeneous models for data mining problem. The proposed ensemble methods provide significant improvement of accuracy compared to individual Classifiers and also heterogeneous models exhibit better results than homogeneous models for real and benchmark data sets of data mining applications.

Бесплатно

Entity Based Distinctive Secure Storage and Control Enhancement in Cloud

Entity Based Distinctive Secure Storage and Control Enhancement in Cloud

Divesh Kumar, Amit Sharma, Surjan Singh

Статья научная

Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means "everywhere" and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.

Бесплатно

Entrepreneurial Development of "Ojek Sampah" (OJAH) through Android Applications

Entrepreneurial Development of "Ojek Sampah" (OJAH) through Android Applications

Yosua Damas Sadewo, Pebria Dheni Purnasari

Статья научная

The purpose of this research is to develop application-based "Ojah" entrepreneurship. This research will be conducted using the type of Research and Development. The entrepreneurship of the "Ojah" has been developed in an application that will become a medium for collecting waste. Data collection that will be used in this research is to use (1) Observation, which will be carried out for the maintenance of the development process and product testing (2) validation sheets, used as instruments in testing, and validation of the developed product (3) The questionnaire given to the public or users of the "Ojah" application to see the characteristics from the application used, a satisfaction questionnaire will also be used to measure the effectiveness of the resulting product (4) Field notes that are carried out simultaneously with the implementation of product trials that contain things that happened during the trial product; (5) Documentation that includes images or photographs during the research development being carried out. The results of the research show evidence that the development of the "Ojah" application. The results showed that the development of the android application-based garbage motorcycle taxi business showed measurable success through assessments conducted by several parties, including media experts, entrepreneurship experts, and users of android app-based "Ojah" services. Validation results by media experts and entrepreneurial experts showed that both businesses and applications developed to support The "Ojah" business are in a decent category. The validity score given by expert validators is 86.6 from entrepreneurial experts. In contrast, media experts provide an assessment of 84.24. Based on limited scale trials, the android-based "Ojah" application has characteristics that deserve to use in terms of practicality, use, service, and completeness, with a feasibility score of 77.35.

Бесплатно

Epidemic Dynamics for the Two-stage Model on Scale-free Networks

Epidemic Dynamics for the Two-stage Model on Scale-free Networks

Maoxing Liu, Yunli Zhang, Wei Han

Статья научная

In this paper, we will study a two-stage model on complex networks. The dynamic behaviors of the model on a heterogeneous scale-free (SF) network are considered, where the absence of the threshold on the SF network is demonstrated, and the stability of the disease-free equilibrium is obtained. Four immunization strategies, proportional immunization, targeted immunization, acquaintance immunization and active immunization are applied in this model. We show that both targeted and acquaintance immunization strategies compare favorably to a proportional scheme in terms of effectiveness. For active immunization, the threshold is easier to apply practically.

Бесплатно

Ergodic Capacity of MIMO Channel in Multipath Fading Environment

Ergodic Capacity of MIMO Channel in Multipath Fading Environment

Rafik Ahmad, Devesh Pratap Singh, Mitali Singh

Статья научная

The demand for the higher bandwidth is continuously increasing, and to cater to wireless communication can be used. The bandwidth has a close relationship with data-rates in turn has a dependency with channel capacity. In this paper, the channel capacity is estimated when CSI is known/not known at the transmitter and it has been shown that the knowledge of the CSI at the transmitter may not be very useful. The channel capacity for the random MIMO channels is also estimated through simulation and outage capacity is discussed. Finally, MIMO channel capacity in the presence of antenna correlation effect is estimated and obtained results are discussed.

Бесплатно

Establishment of automated technique of FHR baseline and variability detection using CTG: statistical comparison with expert’s analysis

Establishment of automated technique of FHR baseline and variability detection using CTG: statistical comparison with expert’s analysis

Sahana Das, Kaushik Roy, Chanchal K. Saha

Статья научная

The most widely accepted method of monitoring the fetal heart rate and uterine activity of the mother is using Cardiotocograph (CTG). It simultaneously captures these two signals and correlate them to find the status of the fetus. This method is preferred by obstetricians since it is non-invasive as well as cost-effective. Though used widely, the specificity and predictive precision has not been undisputable. The main reason behind this is due to the contradiction in clinicians opinions. The two main components of CTG are Baseline and Variability which provide a thorough idea about the state of the fetal-health when CTG signals are inspected visually. These parameters are indicative of the oxygen saturation level in the fetal blood. Automated detection and analysis of these parameters is necessary for early and accurate detection of hypoxia, thus avoiding further compromise. Results of the proposed algorithm were compared with the visual assessment performed by three clinicians in this field using various statistical techniques like Confidence Interval (CI), paired sample t-test and Bland-Altman plot. The agreement between the proposed method and the clinicians’ evaluation is strong.

Бесплатно

Estimation of Possible Profit/ Loss of a New Movie Using “Natural Grouping” of Movie Genres

Estimation of Possible Profit/ Loss of a New Movie Using “Natural Grouping” of Movie Genres

Debaditya Barman, Nirmalya Chowdhury

Статья научная

Film industry is the most important component of entertainment industry. A large amount of money is invested in this high risk industry. Both profit and loss are very high for this business. Thus if the production houses have an option to know the probable profit/loss of a completed movie to be released then it will be very helpful for them to reduce the said risk. We know that artificial neural networks have been successfully used to solve various problems in numerous fields of application. For instance backpropagation neural networks have successfully been applied for Stock Market Prediction, Weather Prediction etc. In this work we have used a backpropagation network that is being trained using a subset of data points. These subsets are nothing but the “natural grouping” of data points, being extracted by an MST based clustering methods. The proposed method presented in this paper is experimentally found to produce good result for the real life data sets considered for experimentation.

Бесплатно

Evaluating water reuse applications under uncertainty: a novel picture fuzzy multi criteria decision making medthod

Evaluating water reuse applications under uncertainty: a novel picture fuzzy multi criteria decision making medthod

Nguyen Xuan Thao

Статья научная

Evaluation of water reuse options is also one of the applications of multi-criteria decision-making (MCDM) problems. In this paper, we refer to a new method for selecting the best water reuse option in the available options by using picture fuzzy MCDM.

Бесплатно

Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems

Sohag Kabir, A S M Ashraful Alam, Tanzima Azad

Статья научная

Time delays in system states or control may result into unacceptable system operation or uncertainty in specialised technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability, and safety of such systems with time-delays, has been one of the primary research focuses of the last few decades. In parallel computing, different computing subunits share their tasks to balance loads to increase performance and throughput. In order to do so, subsystems have to communicate among themselves, adding further delay on top of existing system delay. It is possible to maintain performance and stability of the whole system, by designing observer for every subsystem in the system, overseeing the system state and compensating for existing time-delay. This paper reviews present literature to identify a linear time-delay system for load balancing and evaluates the stability and load balancing performance of the system with and without an observer. Stability is analysed in terms of oscillation in the system responses and performance is evaluated as the speed of load-balancing operation.

Бесплатно

Evaluation of different machine learning methods for caesarean data classification

Evaluation of different machine learning methods for caesarean data classification

O.S.S. Alsharif, K.M. Elbayoudi, A.A.S. Aldrawi, K. Akyol

Статья научная

Recently, a new dataset has been introduced about the caesarean data. In this paper, the caesarean data was classified with five different algorithms; Support Vector Machine, K Nearest Neighbours, Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. The dataset is retrieved from California University website. The main objective of this study is to compare selected algorithms’ performances. This study has shown that the best accuracy that was for Naïve Bayes while the highest sensitivity which was for Support Vector Machine.

Бесплатно

Evolution of NFT Marketplace for Influencing Buying Behaviour in Sportswear Industry

Evolution of NFT Marketplace for Influencing Buying Behaviour in Sportswear Industry

Medha Prabhakar, Suman De.

Статья научная

The advent of metaverses, NFTs, blockchain, and similar growth topics influence the future of businesses, and the industry is looking at a transformation. SAP has been a pioneer in innovation and enables some of the best businesses around the World. With its own Cloud infrastructure in place and expertise in areas of Blockchain etc., it’s time to take a leap and give the existing and new customers an edge over the others. The solution proposed here is to address how the future could look for retail, for example, in sportswear. It is possible to provide an NFT Marketplace for sportswear manufacturers like Nike, where the subscribers can sell their NFTs (digital shoes, wearables, etc.) or buy the ones available in the marketplace with the help of Crypto Wallets/Payments, etc. The idea proposed in this paper helps sellers’ who design products to have a review process, where the company can evaluate if they want to introduce those products in their physical form. Or, if a digital product sells well in the NFT marketplace, the company can decide to make a physical launch of the product as well, sharing some royalty.

Бесплатно

Evolving An E-Governance System for Local Self-Government Institutions for Transparency and Accountability

Evolving An E-Governance System for Local Self-Government Institutions for Transparency and Accountability

Balakumaran P.J, Vignesh Ramamoorthy. H

Статья научная

73rd Panchayati Raj Act came into existence in 1993 and it paved the way for a strong and effective decentralized administrative system in India. The Indian Constitution added 11th schedule to it detailing 29 subjects which are devolved to the local self-government institutions [LSGIs]. It is nearly two decades passed and still LSGIs are hesitant to adapt with their roles to develop them as self-sufficient administrating regions. The devolved function is not fully exercised by the LSGIs. The transferred the departments connected with the 29 subjects are still working in a bureaucratic manner. This study reveals the real reasons behind the poor performance of LSGIs and coming up with a technological solution to overcome the problem through an interactive E-Governance system. Even though 29 subjects are given to the LSGIs, 4 departments are considered in this research due to time constrains.

Бесплатно

Experimental Analysis of Xie and Kuek's Traffic Model with Handoff Scheme in Wireless Networks

Experimental Analysis of Xie and Kuek's Traffic Model with Handoff Scheme in Wireless Networks

BISWAJIT BHOWMIK, POOJA, NUPUR THAKUR, PIYALI SARKAR

Статья научная

Mobility becomes a distinct feature for a wireless mobile cellular system. For the traffic which is non stationary and is away from the base station, the chances of a call to be handed off are increased. In urban mobile cellular systems, especially when the cell size becomes relatively small, the procedure has a significant impact on system performance. Blocking probability of originating calls and the forced termination probability of ongoing calls are the primary criteria for indicating this performance. In this paper, we report our recent work on closed form solutions to the blocking probability followed by dropping probability in wireless cellular networks with . First, we develop a performance model of a cell in a wireless network where the effect of arrivals and the use of guard channels are included. Then we simulate the Traffic Model with exploiting our model.

Бесплатно

Exploration on Quick Response (QR) Code Behaviour in Commerce based Platforms Using Machine Learning

Exploration on Quick Response (QR) Code Behaviour in Commerce based Platforms Using Machine Learning

Archana Uriti, Surya Prakash Yalla

Статья научная

The "rapid response" code, or QR code, is made to quickly decode vast amounts of data. Any managed device, such as a smartphone, is able to capture it, and it is simple to access simply scanning the 2D matrix code. The dataset is analyzed utilizing machine learning techniques, such as the confusion matrix score utilized for the multinomial naive Bayes algorithm's performance analysis. The QR code generation is limited to single product and is extended now to include all products. Due to its ability to provide clients with benefits including speedy, error-free access and the ability to store a lot of data. Generally, many people are using the online payment for any transaction for flexibility and one can do at any place at any time. For bulk or huge payment, cash is not a good option. Hence many retailers join in the e-wallet companies and make their payment so flexible and faster transaction. Because of these benefits, QR code has becoming widespread.

Бесплатно

Журнал