- Все статьи 669
-
Подпишитесь, чтобы получать уведомления о публикации новых выпусков
International Journal of Information Engineering and Electronic Business @ijieeb
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 669
Ensembles of Classification Methods for Data Mining Applications
M.Govindarajan
Статья научная
One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed using classifiers in both homogeneous ensemble classifiers using bagging and heterogeneous ensemble classifiers using arcing classifier and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of real and benchmark data sets of data mining applications like intrusion detection, direct marketing and signature verification. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase and combining phase. A wide range of comparative experiments are conducted for real and benchmark data sets of direct marketing. The accuracy of base classifiers is compared with homogeneous and heterogeneous models for data mining problem. The proposed ensemble methods provide significant improvement of accuracy compared to individual Classifiers and also heterogeneous models exhibit better results than homogeneous models for real and benchmark data sets of data mining applications.
Бесплатно
Enterprise Architecture for E-Government Development Using TOGAF ADM 9.2 in Simpang Pasir Village
Reza Andrea, Hasbi Sjamsir, Fajar Ramadhani, Ita Arfyanti
Статья научная
Effective information technology governance is essential for improving public service delivery and administrative efficiency at the village government level. This research focuses on Simpang Pasir Village in Palaran District, Samarinda City, East Kalimantan Province, aiming to establish a foundation for an electronic-based government system (e-government). By employing the TOGAF Architecture Development Method (ADM) version 9.2, this study systematically designs an enterprise architecture encompassing business, data, application, and technology domains. The process spans from the preliminary phase to migration planning, with gap analysis conducted to align baseline and target architectures. Key outputs include the development of integrated systems for administrative tasks and digital public services, supported by cloud server technology to ensure scalability and efficiency. Validation of the design using the Enterprise Architecture Scorecard yielded a score of 82.27%, indicating strong alignment with Simpang Pasir Village's objectives and readiness for implementation. This initiative addresses critical challenges, including data integration, transparent governance, and improved public services. The research outcomes provide a comprehensive roadmap for transitioning to e-government, supporting the village's mission to advance IT-based governance while fostering self-reliance and community empowerment. The findings contribute valuable insights for digitally transforming rural governments, positioning Simpang Pasir Village as a model for innovation and modernization.
Бесплатно
Entity Based Distinctive Secure Storage and Control Enhancement in Cloud
Divesh Kumar, Amit Sharma, Surjan Singh
Статья научная
Cloud computing acts as rising evolution in Information Technology (IT), boosting the delivery of services and eye-catching returns to its tenants enrolled at low costs of per usage basis. Cloud computing means "everywhere" and provides enormous available resources via internet with ensured quality. With the numerous profits involved, it clears the viewpoint of various businesses to invest in cloud services for accomplishment of their needs in the cloud habitat. Cloud enables computing resources in a service oriented flair instead of burden with lags in traditional setup of unified architecture. With delivery of cloud services occur many obstacles in the cloud to work securely without downfall in its performance. Security has always emerged as a long handed concern with its progression which affects its virtuous implementation. We commence with aspect of security based on parameters named Confidentiality (C), Integrity (I) and Granular Access (GA) and then sent over a secure channel via Secure File Transfer Protocol (SFTP) for secure storage with Elliptic Curve Cryptography (ECC) encryption laid on data. Secure Hash Algorithm (SHA) is used for hash value generation maintaining integrity. The authentication mechanism of secure Graphical One Time Password (GOTPass) provides high end to end security for retrieval process and boost security appliance for data. Data is divided into three security levels as per Secure Quality Index (SQI) generated and storage is isolated to have different security aspects. It provides supplemental controlled security and data protection as associated with the file. User is responsive to pass all security mechanisms to gain access.
Бесплатно
Entrepreneurial Development of "Ojek Sampah" (OJAH) through Android Applications
Yosua Damas Sadewo, Pebria Dheni Purnasari
Статья научная
The purpose of this research is to develop application-based "Ojah" entrepreneurship. This research will be conducted using the type of Research and Development. The entrepreneurship of the "Ojah" has been developed in an application that will become a medium for collecting waste. Data collection that will be used in this research is to use (1) Observation, which will be carried out for the maintenance of the development process and product testing (2) validation sheets, used as instruments in testing, and validation of the developed product (3) The questionnaire given to the public or users of the "Ojah" application to see the characteristics from the application used, a satisfaction questionnaire will also be used to measure the effectiveness of the resulting product (4) Field notes that are carried out simultaneously with the implementation of product trials that contain things that happened during the trial product; (5) Documentation that includes images or photographs during the research development being carried out. The results of the research show evidence that the development of the "Ojah" application. The results showed that the development of the android application-based garbage motorcycle taxi business showed measurable success through assessments conducted by several parties, including media experts, entrepreneurship experts, and users of android app-based "Ojah" services. Validation results by media experts and entrepreneurial experts showed that both businesses and applications developed to support The "Ojah" business are in a decent category. The validity score given by expert validators is 86.6 from entrepreneurial experts. In contrast, media experts provide an assessment of 84.24. Based on limited scale trials, the android-based "Ojah" application has characteristics that deserve to use in terms of practicality, use, service, and completeness, with a feasibility score of 77.35.
Бесплатно
Epidemic Dynamics for the Two-stage Model on Scale-free Networks
Maoxing Liu, Yunli Zhang, Wei Han
Статья научная
In this paper, we will study a two-stage model on complex networks. The dynamic behaviors of the model on a heterogeneous scale-free (SF) network are considered, where the absence of the threshold on the SF network is demonstrated, and the stability of the disease-free equilibrium is obtained. Four immunization strategies, proportional immunization, targeted immunization, acquaintance immunization and active immunization are applied in this model. We show that both targeted and acquaintance immunization strategies compare favorably to a proportional scheme in terms of effectiveness. For active immunization, the threshold is easier to apply practically.
Бесплатно
Ergodic Capacity of MIMO Channel in Multipath Fading Environment
Rafik Ahmad, Devesh Pratap Singh, Mitali Singh
Статья научная
The demand for the higher bandwidth is continuously increasing, and to cater to wireless communication can be used. The bandwidth has a close relationship with data-rates in turn has a dependency with channel capacity. In this paper, the channel capacity is estimated when CSI is known/not known at the transmitter and it has been shown that the knowledge of the CSI at the transmitter may not be very useful. The channel capacity for the random MIMO channels is also estimated through simulation and outage capacity is discussed. Finally, MIMO channel capacity in the presence of antenna correlation effect is estimated and obtained results are discussed.
Бесплатно
Sahana Das, Kaushik Roy, Chanchal K. Saha
Статья научная
The most widely accepted method of monitoring the fetal heart rate and uterine activity of the mother is using Cardiotocograph (CTG). It simultaneously captures these two signals and correlate them to find the status of the fetus. This method is preferred by obstetricians since it is non-invasive as well as cost-effective. Though used widely, the specificity and predictive precision has not been undisputable. The main reason behind this is due to the contradiction in clinicians opinions. The two main components of CTG are Baseline and Variability which provide a thorough idea about the state of the fetal-health when CTG signals are inspected visually. These parameters are indicative of the oxygen saturation level in the fetal blood. Automated detection and analysis of these parameters is necessary for early and accurate detection of hypoxia, thus avoiding further compromise. Results of the proposed algorithm were compared with the visual assessment performed by three clinicians in this field using various statistical techniques like Confidence Interval (CI), paired sample t-test and Bland-Altman plot. The agreement between the proposed method and the clinicians’ evaluation is strong.
Бесплатно
Estimation of Possible Profit/ Loss of a New Movie Using “Natural Grouping” of Movie Genres
Debaditya Barman, Nirmalya Chowdhury
Статья научная
Film industry is the most important component of entertainment industry. A large amount of money is invested in this high risk industry. Both profit and loss are very high for this business. Thus if the production houses have an option to know the probable profit/loss of a completed movie to be released then it will be very helpful for them to reduce the said risk. We know that artificial neural networks have been successfully used to solve various problems in numerous fields of application. For instance backpropagation neural networks have successfully been applied for Stock Market Prediction, Weather Prediction etc. In this work we have used a backpropagation network that is being trained using a subset of data points. These subsets are nothing but the “natural grouping” of data points, being extracted by an MST based clustering methods. The proposed method presented in this paper is experimentally found to produce good result for the real life data sets considered for experimentation.
Бесплатно
N. Usha Deepa Sundari, Lakshmi Narayanamma Poli
Статья научная
The service sector, particularly banks, has undergone a significant shift in recent years. This has resulted in increased pressure and stress for bank employees who strive to provide timely and efficient services while meeting management objectives and ensuring customer satisfaction. This research employs a comprehensive methodological approach to examine the Quality of Work Life (QWL) and Job Satisfaction (JS) within the banking sector in Andhra Pradesh. The research focuses on confirming the construct validity of QWL and JS through Confirmatory Factor Analysis (CFA) and assessing the reliability of the measurement model using Cronbach's Alpha. Discriminant validity is examined to ensure that these constructs represent distinct concepts. The research employs Structural Equation Modeling (SEM) to explore the correlation between QWL and JS, as well as their interactions with factors such as Motivation and Compensation, Work Factors, Safety and Welfare, Relationship and Support, Nature of Job, and Career Growth and Development. The outcomes of this research offer valuable insights into the banking industry in Andhra Pradesh. By validating the QWL and JS constructs and understanding their relationships, the research serves as a foundation for organizations to enhance employee well-being and job satisfaction. The study provides practical recommendations, tailored to the specific needs of bank employees in Andhra Pradesh, to improve work-life balance, career development, compensation, safety, relationships at work, and overall employee well-being.
Бесплатно
Nguyen Xuan Thao
Статья научная
Evaluation of water reuse options is also one of the applications of multi-criteria decision-making (MCDM) problems. In this paper, we refer to a new method for selecting the best water reuse option in the available options by using picture fuzzy MCDM.
Бесплатно
Evaluation of Load Balancing Performance of Parallel Processing Linear Time-Delay Systems
Sohag Kabir, A S M Ashraful Alam, Tanzima Azad
Статья научная
Time delays in system states or control may result into unacceptable system operation or uncertainty in specialised technical systems like aircraft control, plant control, robotics etc. The issue of robustness, controllability, traceability, flexible management, reliability, and safety of such systems with time-delays, has been one of the primary research focuses of the last few decades. In parallel computing, different computing subunits share their tasks to balance loads to increase performance and throughput. In order to do so, subsystems have to communicate among themselves, adding further delay on top of existing system delay. It is possible to maintain performance and stability of the whole system, by designing observer for every subsystem in the system, overseeing the system state and compensating for existing time-delay. This paper reviews present literature to identify a linear time-delay system for load balancing and evaluates the stability and load balancing performance of the system with and without an observer. Stability is analysed in terms of oscillation in the system responses and performance is evaluated as the speed of load-balancing operation.
Бесплатно
Evaluation of different machine learning methods for caesarean data classification
O.S.S. Alsharif, K.M. Elbayoudi, A.A.S. Aldrawi, K. Akyol
Статья научная
Recently, a new dataset has been introduced about the caesarean data. In this paper, the caesarean data was classified with five different algorithms; Support Vector Machine, K Nearest Neighbours, Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. The dataset is retrieved from California University website. The main objective of this study is to compare selected algorithms’ performances. This study has shown that the best accuracy that was for Naïve Bayes while the highest sensitivity which was for Support Vector Machine.
Бесплатно
Evolution of NFT Marketplace for Influencing Buying Behaviour in Sportswear Industry
Medha Prabhakar, Suman De.
Статья научная
The advent of metaverses, NFTs, blockchain, and similar growth topics influence the future of businesses, and the industry is looking at a transformation. SAP has been a pioneer in innovation and enables some of the best businesses around the World. With its own Cloud infrastructure in place and expertise in areas of Blockchain etc., it’s time to take a leap and give the existing and new customers an edge over the others. The solution proposed here is to address how the future could look for retail, for example, in sportswear. It is possible to provide an NFT Marketplace for sportswear manufacturers like Nike, where the subscribers can sell their NFTs (digital shoes, wearables, etc.) or buy the ones available in the marketplace with the help of Crypto Wallets/Payments, etc. The idea proposed in this paper helps sellers’ who design products to have a review process, where the company can evaluate if they want to introduce those products in their physical form. Or, if a digital product sells well in the NFT marketplace, the company can decide to make a physical launch of the product as well, sharing some royalty.
Бесплатно
Balakumaran P.J, Vignesh Ramamoorthy. H
Статья научная
73rd Panchayati Raj Act came into existence in 1993 and it paved the way for a strong and effective decentralized administrative system in India. The Indian Constitution added 11th schedule to it detailing 29 subjects which are devolved to the local self-government institutions [LSGIs]. It is nearly two decades passed and still LSGIs are hesitant to adapt with their roles to develop them as self-sufficient administrating regions. The devolved function is not fully exercised by the LSGIs. The transferred the departments connected with the 29 subjects are still working in a bureaucratic manner. This study reveals the real reasons behind the poor performance of LSGIs and coming up with a technological solution to overcome the problem through an interactive E-Governance system. Even though 29 subjects are given to the LSGIs, 4 departments are considered in this research due to time constrains.
Бесплатно
Experimental Analysis of Xie and Kuek's Traffic Model with Handoff Scheme in Wireless Networks
BISWAJIT BHOWMIK, POOJA, NUPUR THAKUR, PIYALI SARKAR
Статья научная
Mobility becomes a distinct feature for a wireless mobile cellular system. For the traffic which is non stationary and is away from the base station, the chances of a call to be handed off are increased. In urban mobile cellular systems, especially when the cell size becomes relatively small, the procedure has a significant impact on system performance. Blocking probability of originating calls and the forced termination probability of ongoing calls are the primary criteria for indicating this performance. In this paper, we report our recent work on closed form solutions to the blocking probability followed by dropping probability in wireless cellular networks with . First, we develop a performance model of a cell in a wireless network where the effect of arrivals and the use of guard channels are included. Then we simulate the Traffic Model with exploiting our model.
Бесплатно
Exploration on Quick Response (QR) Code Behaviour in Commerce based Platforms Using Machine Learning
Archana Uriti, Surya Prakash Yalla
Статья научная
The "rapid response" code, or QR code, is made to quickly decode vast amounts of data. Any managed device, such as a smartphone, is able to capture it, and it is simple to access simply scanning the 2D matrix code. The dataset is analyzed utilizing machine learning techniques, such as the confusion matrix score utilized for the multinomial naive Bayes algorithm's performance analysis. The QR code generation is limited to single product and is extended now to include all products. Due to its ability to provide clients with benefits including speedy, error-free access and the ability to store a lot of data. Generally, many people are using the online payment for any transaction for flexibility and one can do at any place at any time. For bulk or huge payment, cash is not a good option. Hence many retailers join in the e-wallet companies and make their payment so flexible and faster transaction. Because of these benefits, QR code has becoming widespread.
Бесплатно
Exploring Semantic Relatedness in Arabic Corpora using Paradigmatic and Syntagmatic Models
Adil Toumouh, Dominic Widdows, Ahmed Lehireche
Статья научная
In this paper we explore two paradigms: firstly, paradigmatic representation via the native HAL model including a model enriched by adding word order information using the permutation technique of Sahlgren and al [21], and secondly the syntagmatic representation via a words-by-documents model constructed using the Random Indexing method. We demonstrate that these kinds of word space models which were initially dedicated to extract similarity can also been efficient for extracting relatedness from Arabic corpora. For a given word the proposed models search the related words to it. A result is qualified as a failure when the number of related words given by a model is less than or equal to 4, otherwise it is considered as a success. To decide if a word is related to other one, we get help from an expert of the economic domain and use a glossary1 of the domain. First we begin by a comparison between a native HAL model and term- document model. The simple HAL model records a better result with a success rate of 72.92%. In a second stage, we want to boost the HAL model results by adding word order information via the permutation technique of sahlgren and al [21]. The success rate of the enriched HAL model attempt 79.2 %.
Бесплатно
Herison Surbakti, Prashaya Fusiripong
Статья научная
Businesses nowadays may save a significant amount of money by using technological solutions. It is impossible to deny this when considering the expenses of acquiring and training new personnel. When faced with such difficulties, technology is virtually always able to assist. Business Intelligence/Machine Learning (BI/ML) is an essential tool in today's decision-making process because of the many issues it has created for contemporary business decision-making. A comparative study of regression models, including linear regression, random forests, and gradient boosting, could unravel their effectiveness in predictive analytics within BI. Machine learning contribution in businesses is vital as it has a strong link with business intelligence, and it helps business decision-making in businesses. Without machine learning, business intelligence is not practical while making decisions, as business owners can't make decisions effectively. This paper will comprehensively review the noteworthy contributions of Machine Learning and its Impact on Business Intelligence. Further, it will discuss the challenges and opportunities of machine learning in business intelligence. Finally, the paper will discuss future correspondence about machine learning in businesses.
Бесплатно
Blaise O. Yenke, Diane C. M. Tala, Jean Louis E. K. Fendji
Статья научная
This paper tackles a critical issue emerging when planning the deployment of a wireless network in rural regions: the cost estimation. Wireless Networks have usually been presented as a cost-effective solution to bridge the digital divide between rural and urban regions. But this assertion is too general and does not give an insight about the real estimation of the deployment cost of such an infrastructure. Providing such a cost estimation framework may help to avoid underestimation or overestimation of required resources since the budget is almost always limited in rural regions. This work extends the Probabilistic Cost Model (PCM) that has been proposed. This model does not take into account the difference in the costs of unexpected events. To extend the PCMfirst, a list of unexpected events that can occur when deploying Wireless Networks has been established. This list is based on data from past projects and a set of unexpected events that can occur. Afterwards, the standard deviation and the average have been computed for each unexpected event. The Poisson process has been therefore used to predict the number of unexpected events that may occur during the network deployment. This approach led to the proposal of a model that gives an estimation of the total cost of contingencies, which takes into account the probability that the total cost of unexpected events does not exceed a given contingency. The evaluation of the proposed model on a given dataset provided a good accuracy in the prediction of the cost induced by unexpected events.
Бесплатно
Extended Proxy Mobile IPv6 Scheme Using Global Local Mobility Anchor
Eshraga Hussien Elfadil, TajElsir Hassan Suliman, Ahmed Hamza Osman
Статья научная
The internet was basically designed for the static nodes, but with the development of mobile nodes such as smart phones, that have wireless capabilities, the first design was insufficient. MNs change their point of attachment while they are roaming (traveling) in the internet, to maintain the survival of ongoing sessions for these mobile nodes, the internet requires techniques for managing mobility.. Currently, there are two types of mobility management protocols, host-based protocols and network-based protocols, the involvement of MN in the mobility process is must in the first type, while is unnecessary in the second type. The IETF standardized the Proxy Mobile IPv6 (PMIPv6) protocol in 2004, to overcome the limitations experienced by the host-based protocol, Mobile IPv6 (MIPv6) such as sub-optimal routing, handover latency, packet loss and single point of failure, however, the biggest drawback of PMIPv6 is the lack of inter-domain handover. This paper provides an efficient scheme based on standard PMIPv6 called (E-PMIPv6) to support inter-domain handover by introducing a new entity called (GLMA) which enables MN to traverse different domains while keeping the ongoing sessions, additionally; we use buffering techniques to pre-emptively lighten packet losses. The ultimate goal for the suggested scheme is to solve the scalability problem for the PMIPv6 and it is extensions to encourage network operators to deploy E-PMIPv6 for large networks. Results of preliminary analysis of handover latencies and related packet losses favored (E-PMIPv6) over two of the leading contenders.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2025 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.