- Все статьи 626
-
Подпишитесь, чтобы получать уведомления о публикации новых выпусков
International Journal of Information Engineering and Electronic Business @ijieeb
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 626

Danylo Holubinka, Victoria Vysotska, Serhii Vladov, Yuriy Ushenko, Mariia Talakh, Yurii Tomka
Статья научная
During the implementation of the work on the creation of the system of tonality recognition and text categorization in the news, a study of the subject area was conducted, which allowed the understanding of the processes of text analysis in the mass media to be enriched. The necessary data for further processing was found. The work resulted from a program that consists of an information parser, a data analyser and cleaner, a Large Language Models model, a neural network, and a database with vectorized data. These components were integrated into the user interface and implemented as a program window. The program can analyse news texts, determining their tone and categories. At the same time, it provides the user with a convenient interface for entering text and receiving analysis results. Therefore, the created system is a powerful tool for automated analysis of textual data in mass media, which can be used for various purposes, including monitoring the news space, analysis of public opinion, and others. Also, the developed information technology successfully meets the set tasks aimed at tonality analysis and categorization of news. It effectively solves the task of collecting, analysing and classifying news materials, which allows users to receive operational and objective information. Its architecture and functionality allow for easy changes and additions in the future, making it a flexible and adaptable tool for news analytics and decision-making in various business sectors.
Бесплатно

Intergovernmental Allocation of Public Resources, Fiscal Decentralization and Economic Growth
Yue Lai, Tianzhu Cheng
Статья научная
Incorporating a two-level government structure into an endogenous growth model, we discussed the growth impacts of different intergovernmental allocation of public resources, i.e. intergovernmental transfer payments and the power of revenue autonomy of the lower-level government, along with fiscal decentralization. we showed that (1) there was an “Inverted U-shaped” relationship between fiscal decentralization and economic growth; (2) Different intergovernmental allocation of public resources does not affect the “Inverted U-shape” relationship between fiscal decentralization and economic growth.
Бесплатно

Internal Control Improvement for Creating Good Governance
I Wayan Prasada Bharaditya, I Made Sukarsa, Putu Wira Buana
Статья научная
Cooperative, which support the national economy of Indonesia, still has many problems. In 2015 the report by the Ministry of Cooperatives and SMEs shows many cooperatives are inactive because of having incompetence. Some issues such as the value of savings that do not fit between the cooperative and its customers, embezzlement of customer funds by parties who are not responsible, refunds troubled loans so that the cooperative suffered losses. These problems will be used as a critical point to do mapping with COBIT 5 framework. Based on the result of this mapping, it will be prepared internal control based on the framework of possible internal controls such as COBIT(Control Objective for Information & Related Technology), COSO(Committee of Sponsoring Organizations), ITIL(IT Infrastructure Library) and national regulations that are prevailing in Indonesia. Control is expected to discuss the internal problems that occurred in each business process that used in the cooperative.
Бесплатно

Interoperability in Nigeria Healthcare System: The Ways Forward
Iroju Olaronke, Gambo Ishaya, Ikono Rhoda, Olaleke Janet
Статья научная
Interoperability of health related information is one of the agendas of many counties in the world, with no exception to Nigeria and other developing countries. This is because healthcare costs are rising exponentially. However, interoperability of health related information seem largely unattainable in Nigeria due to reluctance to change from the traditional paper based healthcare system to the use of e-health systems, inadequate ICT infrastructure, poor utilization of the available ICT resources, erratic power supply, increased burden of underdevelopment, poverty, political instability, shortage of educational capacity in Nigeria rural and urban healthcare centers, low level of ICT awareness, poor maintenance culture as well as corruption. Consequently, the healthcare system in Nigeria is saddled with high cost, high rate of disease outbreak driven by HIV/AIDs, malaria and other infectious diseases which results in a high rate of mortality. Nevertheless, the urgent need to meaningfully exchange safe and reliable health information is a key priority to the healthcare system in Nigeria as the qualities of patients’ care depend majorly on the timely acquisition, processing and retrieval of data related to the patient. Thus, this paper attempts to unravel the factors hindering interoperability in the Nigeria healthcare system and suggests ways of making total interoperability a reality in Nigeria healthcare system as well as other developing countries.
Бесплатно

A. A. Salama, Said Broumi, S. A. Alblowi
Статья научная
Neutrosophic set is a power general formal framework, which generalizes the concept of the classic set, fuzzy set, interval valued fuzzy set, intuitionistic fuzzy set, and interval intuitionistic fuzzy set from philosophical point of view. In Geographical Information Systems (GIS) there is a need to model spatial regions with indeterminate boundary and under indeterminacy. In this paper, we first gives fundamental concepts and properties of a neutrosophic spatial region.
Бесплатно

Investigation of Machine Learning Algorithms for Network Intrusion Detection
Shadman Latif, Faria Farzana Dola, MD. Mahir Afsar, Ishrat Jahan Esha, Dip Nandi
Статья научная
Network intrusion is an increasing major concern as we are rapidly advancing in technology. To detect network intrusion, Intrusion Detection Systems are required. Among the wide range of intrusion detection technologies, machine learning methods are the most appropriate. In this paper we investigated different machine learning techniques using NSL-KDD dataset, with steps of building a model. We used Decision Tree, Support Vector Machine, Random Forest, Naïve Bayes, Neural network, adaBoost machine leaning algorithms. At step one, one-hot-encoding is applied to convert categorical to numeric features. At step two, different feature scaling techniques, including normalization and standardization, are applied on these six selected machine learning algorithms with the encoded dataset. Further in this step, for each of the six machine learning algorithms, the better scaling technique application outcome is selected for the comparison in the next step. We considered six pairs of better scaling technique with each machine learning algorithm. Among these six scaling-machine learning pairs, one pair (Naïve Bayes) is dropped for having inferior performance. Hence, the outcome of this step is five scaling-machine learning pairs. At step three, different feature reduction techniques, including low variance filter, high correlation filter, Random Forest, Incremental PCA, are applied to the five scaling-machine learning pairs from step two. Further in this step, for each of the five scaling-machine learning pairs, the better feature reduction technique application outcome is selected for the comparison in the next step. The outcome of this step is five feature reduced scaling-machine learning pairs. At step four, different sampling techniques, including SMOTE, Borderline-SMOTE, ADASYN are applied to the five feature reduced scaling-machine learning pairs. The outcome of this step is five over sampled, feature reduced scaling-machine learning pairs. This outcome is then finally compared to find the best pairs to be used for intrusion detection system.
Бесплатно

Investigations of Cellular Automata Game of Life Rules for Noise Filtering and Edge Detection
Peer M. A., Fasel Qadir, Khan K. A.
Статья научная
In digital image processing, edge detection of images is an important and difficult task. Also, if the images are corrupted by noise, it smears some details and thus resulting in inaccurate edge detection. Hence, a pre-processing step must be taken before the edge detection. In this paper a new approach for edge detection with noise filtering of digital images using Cellular Automata Game of Life is presented. This procedure can easily be generalized and used for any type of digital media. To illustrate the proposed method, some experiments have been performed on standard test images and compared with popular methods. The results reveal that the proposed method has relatively desirable performance.
Бесплатно

Md. Shahriar Hossain Apu, Md. Moshiur Rahman, Md. Toukir Ahmed
Статья научная
Precision agriculture is revolutionizing the agricultural sector by integrating advanced technologies to enhance productivity and sustainability. In aquaculture, precision agriculture can significantly improve fish farming practices through precise monitoring and data-driven decision-making, addressing challenges such as optimizing resource usage and improving fish health. This paper presents the development and implementation of an IoT-based Fish Recommendation System designed to optimize aquaculture practices through a mobile application. This system uses different sensors for extracting data continuously regarding temperature, PH and Turbidity etc. These parameters can be analysed in real-time to help fish farmers make decisions on when or how much the system should feed and aerate, and what approach of water treatment is best for their fishes. This information is stored to create individual datasets, offering researchers valuable insights into optimal conditions for each fish species. This can enhance their survival rates and promote growth. In this study, we evaluate a series of machine learning algorithms for their ability to predict the optimal fish species based on water quality parameters. Among these algorithms, Random Forest demonstrated superior performance, achieving an accuracy of 92.5%, precision of 93%, recall of 93%, and F1-score of 92%. These findings highlight the effectiveness of our approach in integrating machine learning with IoT for precise aquaculture management. Implemented through a user-friendly mobile application, our system enhances accessibility and usability for fish farmers.
Бесплатно

Irregular Function Estimation with LR-MKR
Weiwei Han
Статья научная
Estimating the irregular function with multi-scale structure is a hard problem. The results achieved by the traditional kernel learning are often unsatisfactory, since underfitting and overfitting cannot be simultaneously avoided, and the performance relative to boundary is often unsatisfactory. In this paper, we investigate the data-based local reweighted regression model under kernel trick and propose an iterative method to solve the kernel regression problem, local reweighted multiple kernel regression (LR-MKR). The new framework of kernel learning approach includes two parts. First, an improved Nadaraya-Watson estimator based on blockwised approach is constructed to organize a data-driven localized reweighted criteria; Second, an iterative kernel learning method is introduced in a series decreased active set. Experiments on simulated and real data sets demonstrate the proposed method can avoid under fitting and over fitting simultaneously and improve the performance relative to the boundary effetely.
Бесплатно

Isochronous and Anisochronous Modulation Schemes in Wireless Optical Communication Systems
Mehdi Rouissat, A. Riad Borsai, Mohammed Chikh-Bled
Статья научная
The choice of the modulation format is one of the principle factors in realizing a high performance wireless optical communication system at a reasonable cost and acceptable complexity. The purpose of this paper is to make a comparison between isochronous and anisochronous modulation scheme categories from Discrete (digital) pulse time modulations (PTM) through the simplest scheme in each family; PPM and DPIM respectively, in term of bandwidth requirement, power efficiency and transmission capacity. This is done to give a wider view on the performance of such schemas under wide range of design parameters. In this paper, the properties of PPM and DPIM have been analyzed, from this analysis it has been shown that DPIM or anisochronous modulation schemes in general are strong candidates when synchronization and transmission capacity are taken into account, and when it comes to power performance PPM or isochronous modulations are better.
Бесплатно

Iterative Shrinkage Operator for Direction of Arrival Estimation
Yousaf M. Rind
Статья научная
In this correspondence we present the application of iterative shrinkage (IS) operator to the DOA estimation task. In particular we focus our attention to Stage wise Orthogonal Matching Pursuit (StOMP) algorithm. We compare StOMP against MUSIC, which is state of the art in DOA estimation. StOMP belongs to compressive sensing regime where as MUSIC is parametric technique based upon sub-space processing. To best of our knowledge IS operators have not been analyzed for DOA estimation. The comparison is performed using extensive numerical simulations.
Бесплатно

Ishaq O. Oyefolahan, Aishat A. Sule, Solomon A. Adepoju, Faiza Babakano
Статья научная
The growing need for accessible websites cannot be overemphasized as it has posed a major challenge in the world of Information and Communication Technology (ICT). Most businesses have gone online in order to improve their market value; the banking sector is not an exception. In an attempt to satisfying customers, websites developers have violated most of the websites standards. The banking sector is one area that carries out most of its activities online. Therefore, it is important that their websites be accessible to all especially people with visually impaired disability and more so, regardless of the browsing technology being used. This study evaluates the accessibility and usability of Nigeria banking websites using some automated tools and manual inspection method. This is done in order to know the conformance of the banking websites with standard as specified by Web Accessibility Initiate (WAI). Results from the study indicate that some of the websites do not conform to the expected standard. Hence, there is need for substantial improvements on most bank websites in Nigeria
Бесплатно

Knowledge Template Based Multi-perspective Car Recognition Algorithm
Bo Cai, Feng Tan, Yi Lu, Dengyi Zhang
Статья научная
In order to solve the problem due to the vehicle-oriented society such as traffic jam or traffic accident, intelligent transportation system(ITS) is raised and become scientist’s research focus, with the purpose of giving people better and safer driving condition and assistance. The core of intelligent transport system is the vehicle recognition and detection, and it’s the prerequisites for other related problems. Many existing vehicle recognition algorithms are aiming at one specific direction perspective, mostly front/back and side view. To make the algorithm more robust, our paper raised a vehicle recognition algorithm for oblique vehicles while also do research on front/back and side ones. The algorithm is designed based on the common knowledge of the car, such as shape, structure and so on. The experimental results of many car images show that our method has fine accuracy in car recognition.
Бесплатно

LDASpike for Recognizing Epileptic Spikes in EEG
Anup Kumar Keshri, Aishwarya Singh, Barda Nand Das, Rakesh Kumar Sinha
Статья научная
Manual processing of recorded EEG data for characteristics like epileptic spikes is very time consuming since the recording of EEG for a longer duration producing enormous amount of data. Therefore, automated systems are required to speed up the processing. In the current work, a classification method has been proposed for detecting the epileptic spikes in the recorded EEG data by using Linear Discriminant Analysis (LDA) and has been named LDASpike. The prerecorded EEG data files were used as input to LDASpike and the output produced was the total number of spikes present in each EEG file. The proposed method results on an average sensitivity 100% and selectivity 95.38%, when the training and testing data were same. However, with four fold cross-validation applied in this work, the sensitivity and selectivity were achieved as 98.45% and 96.06%, respectively, on an average. Though a little time initially is spent to train the system but the result produced by the system is very promising and can be compared with the existing standard methods. This system can also works with the real time recording and processing for a clinical setup.
Бесплатно

Lessons Towards Developing An Integrated Tool-support for Small Team Meetings
Virallikattur S Dhenesh, Elena Sitnikova, Jill Slay
Статья научная
Teams within organisations meet regularly to review their progress and engage in collaborative activities within a team setting. However, the uptake of tools to support their activities within team meetings is limited. Research efforts on understanding the reasons for low rates of tool adoption and learning lessons in developing tools that could be readily adopted by team members within team meetings are largely unexplored. This qualitative study focuses on learning lessons towards developing an integrated tool-support for small team meetings within organisations using focus groups. Discussions were based on a tool-kit framework generated by observing their team meetings in an earlier study. The discussions were recorded and the transcripts were analysed using grounded theory approach to generate stories on team processes and potential tools that could assist team members during each process. The lessons derived from the study were based on three aspects of tool-support namely the potential users of the proposed tool-kit, processes within the team meetings that would be influenced by the introduction of the tool-kit and the technological aspects of the tool-kit.
Бесплатно

Linear antenna array pattern synthesis using elephant swarm water search algorithm
Sudip Mandal
Статья научная
Linear antenna array pattern synthesis using computational method is an important task for the electronics engineers and researchers. Suitable optimization techniques are required for solving this kind of problem. In this work, Elephant Swarm Water Search Algorithm (ESWSA) has been used for efficient and accurate designing of linear antenna arrays that generate desired far field radiation pattern by optimizing amplitude, phase and distance of the antenna elements. ESWSA is inspired by water resource search procedure of elephants during drought. Two different fitness functions for two different benchmark problem of linear antenna array have been tested for validation of the proposed methodology. During optimization, three types of synthesis have been used namely: amplitude only, phase only and position only control for all cases antenna array. The results show that ESWSA is very efficient process for achieving desired radiation pattern while amplitude only control performed better compare to the others two controlling process for all benchmark problems.
Бесплатно

M-Commerce in Bangladesh –Status, Potential and Constraints
Biman Barua
Статья научная
Mobile Commerce often referred to as "M-Commerce" or "mCommerce" is a new dimension or extension of e-Commerce that is performed by mobile devices and Personal Digital Assistants (PDA) using mobile phone networks. As the number of mobile users is increasing dramatically the prospect of m-commerce is also increasing day by day in developing countries like Bangladesh. Though there are a lot of researchers has written about the prospect and adoption of M-commerce but in my research, I tried to find out the statistical analysis of mobile users, mobile internet users; M-commerce current status in Bangladesh. Research also has been done for a number of visitors of stakeholder's site, using the ranking tools, uses of mobile apps by customers and limitation of mobile commerce adoption in Bangladesh those were not discussed earlier. Here, I collected data through web and phone call from various stakeholders, in the top line m-commerce business, studied and identified the problem, shown the current status and major barriers of M-commerce and suggested a methodological framework.
Бесплатно

Machine Learning and Software Quality Prediction: As an Expert System
Ekbal A. Rashid, Srikanta B. Patnaik, Vandana C. Bhattacherjee
Статья научная
To improve the software quality the number of errors from the software must be removed. The research paper presents a study towards machine learning and software quality prediction as an expert system. The purpose of this paper is to apply the machine learning approaches, such as case-based reasoning, to predict software quality. The main objective of this research is to minimize software costs. Predict the error in software module correctly and use the results in future estimation. The novel idea behind this system is that Knowledge base (KBS) building is an important task in CBR and the knowledge base can be built based on world new problems along with world new solutions. Second, reducing the maintenance cost by removing the duplicate record set from the KBS. Third, error prediction with the help of similarity functions. In this research four similarity functions have been used and these are Euclidean, Manhattan, Canberra, and Exponential. We feel that case-based models are particularly useful when it is difficult to define actual rules about a problem domain. For this purpose we have developed a case-based reasoning model and have validated it upon student data. It was observed that, Euclidean and Exponential both are good for error calculation in comparison to Manhattan and Canberra after performing five experiments. In order to obtain a result we have used indigenous tool. For finding the mean and standard deviation, SPSS version 16 and for generating graphs MATLAB 7.10.0 version have been used as an analyzing tool.
Бесплатно

Machine learning based business forecasting
D. Asir Antony Gnana Singh, E. Jebamalar Leavline, S. Muthukrishnan, R. Yuvaraj
Статья научная
The business sectors directly contribute to the growth of any nation. Moreover, the business is an activity of producing, buying, and selling the goods and services to generate the money. The business directly involves in the gross domestic product (GDP). The business forecasting is the activity of predicting or estimating the feature position of the sales, expenditures, and profits of any business. However, the business forecasting helps to the business sectors for planning, decision making, resource utilization, business success, etc. Therefore, business forecasting is a pressing need for the growth of any business. In recent past, many researches attempt to carry out the business forecasting using different tools. However, this paper presents the business forecasting for sales data using machine learning technique and the obtained results are presented and discussed..
Бесплатно

Balram Yadav, Sanjiv Tokekar
Статья научная
Malware classification has already been a prominent concern for decades, and malware attacks have proliferated at an astounding rate, constituting a significant threat to cyberspace. Deep learning (DL) and malware image approaches are becoming more prevalent in the field of malware analysis, with spectacular results. This work focuses on the challenge of classifying malware variants that are represented as images. This study employs visualization and proposes a convolutional neural network (CNN) based DL model to effectively and accurately classify malware. The proposed model is trained and tested on a very challenging and heterogeneous dataset, and it achieves accuracy of 98.179%, precision of 97.39%, a F1-score of 97.70%, and a fast classification speed (3 seconds needed to test 934 unseen malware). This demonstrates the proposed model's incredibly quick, effective and accurate performance. The proposed model outperformed existing traditional DL models in terms of various performance measures and demonstrated its usefulness in classifying malware families through visualization. This study and experimental results reveal that small-scale malware images and a simple CNN architecture alone are capable of accurately classifying malware families with high classification accuracy.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2024 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.