Статьи журнала - International Journal of Information Engineering and Electronic Business

Все статьи: 658

Software Quality Appraisal Using Multi-Criteria Decision Approach

Software Quality Appraisal Using Multi-Criteria Decision Approach

Sanjay Kumar Dubey, Disha Sharma

Статья научная

Software quality measurement is the key factor in the development of any software system. Various software quality models are devised to measure the performance of a software system, which consists of numerous quality parameters on the basis of which software are quantified. Different types of software quality models are already present like an ISO/IEC9126 Quality model, Boehm's model, McCall's model, etc. In this paper, an attempt has been made to increase the quality of a software system by introducing some new quality parameters in ISO/IEC9126 model. Since the quality parameters are very unpredictable in nature, so as to evaluate the performance of quality parameters, the fuzzy multi criteria approach has been used.

Бесплатно

Solving the Problem of Pre-Selection of Personnel Based on Fuzzy Sets

Solving the Problem of Pre-Selection of Personnel Based on Fuzzy Sets

Nataliya Mutovkina, Zhongfeng Pan

Статья научная

The article proposes a method for clarifying the degree of correspondence between the request of a company looking for a specialist for a vacant position and the request of an applicant. As practice shows, the requirements in the requests of companies and the requests of applicants are linguistic, using vague boundaries of compliance parameters. Based on the results of a survey of graduate students and representatives of potential employer companies conducted by the author of the work, the company’s image, its experience in the market, and a decent salary are significant for graduates. For potential employers, applicants with some experience in the branch and low financial expectations are substantial first of all. Thus, from the statements of both sides, the author managed to identify two linguistic variables: “Time” and “Salary level.” These variables are applied to identify correlations between requests at the preliminary stage of staff selection. Indirect methods, namely methods of statistical data and expert assessments, were used in the variable membership functions. The algorithm for detecting matches is noticeably simple and can be in almost any table processor, which expands the field of the proposed approach. The recruitment agency acts as an intermediary in recruitment. The algorithm for identifying compliance in its activities will significantly reduce recruiters’ time and labor costs.

Бесплатно

Some Results on Optimal Dividend Problem in Two Risk Models

Some Results on Optimal Dividend Problem in Two Risk Models

Shuaiqi Zhang

Статья научная

The compound Poisson risk model and the compound Poisson risk model perturbed by diffusion are considered in the presence of a dividend barrier with solvency constraints. Moreover, it extends the known result due to [1]. Ref. [1] finds the optimal dividend policy is of a barrier type for a jump-diffusion model with exponentially distributed jumps. In this paper, it turns out that there can be two different solutions depending on the model’s parameters. Furthermore, an interesting result is given: the proportional transaction cost has no effect on the dividend barrier. The objective of the corporation is to maximize the cumulative expected discounted dividends payout with solvency constraints before the time of ruin. It is well known that under some reasonable assumptions, optimal dividend strategy is a barrier strategy, i.e., there is a level b_{1}(b_{2}) so that whenever surplus goes above the level b_{1}(b_{2}), the excess is paid out as dividends. However, the optimal level b_{1}(b_{2}) may be unacceptably low from a solvency point of view. Therefore, some constraints should imposed on an insurance company such as to pay out dividends unless the surplus has reached a level b^{1}_{c}>b_{1}(b^2_{c}>b_{2}) . We show that in this case a barrier strategy at b^{1}_{c}(b^2_{c}) is optimal.

Бесплатно

SourceViz: A Tool for Supporting Software Metrics Visualization

SourceViz: A Tool for Supporting Software Metrics Visualization

Muhammad Ilyas, Hafiz Anas Bilal, Qandeel Tariq, Saba Ameer Awan

Статья научная

Maintaining and understanding large software systems is a complex and time consuming process. Understanding the internal structure of such systems is not an easy task due to the invisible nature of software. Source Code Visualization, i.e. measuring the code metrics and then visualizing them, provides an efficient solution to this problem. There are many tools available which gives an insight to the internal structure of the software. But all of them don't provide visualizations of hierarchical relationships and code complexity of the source code. In this paper, we present a tool named "SourceViz". This application computes different software metrics, code complexity, class-relations and then visualizes the calculated metrics in different metaphors. This visual analysis assists the project managers and software developers in understanding the static structure of the software by presenting project-level as well as class-level view.

Бесплатно

Spatio-temporal Dynamic Evolution and Inhibiting Factor Analysis of TFEE in the CCTC Economic Circle

Spatio-temporal Dynamic Evolution and Inhibiting Factor Analysis of TFEE in the CCTC Economic Circle

Shiyi Zeng, Liyun Su, Tong Zhang, Junjie Peng, Xiangjing Li, Feng Zhao, Dongyang Qiu

Статья научная

Accounting for 30.8% of the total economic volume of the western region by 2021, the "fourth pole" of China's economic development is progressively being established as the Chengdu-Chongqing twin-city(CCTC) Zone. Therefore, increasing Total Factor Energy Efficiency (TFEE) and reducing the disparities in energy efficiency amongst cities in the area are important for the economic development of the CCTC Economic Zone. Accordingly, this study employs an output-oriented, super-efficient DEA model with constant returns to scale to measure the total factor energy efficiency of 16 prefecture-level cities in the CCTC economic circle from 2006 to 2020. It also examines the spatial distribution and variation patterns of each city's prefecture-level total factor energy efficiency. Then, spatial autocorrelation and random forest were used to explore the interrelationship among the indicators of the drivers, and the variables were screened according to Gini importance, finally, PCA-GWR models and spatial panel regression models were constructed to dissect the key drivers. The empirical findings indicate that: (1) the average energy efficiency of Chongqing and Chengdu is only 0.708 and 0.788, and the overall efficiency shows a steady increase from 2009 to 2018. (2) The spatial distribution is mainly as follows: H-H agglomerations are distributed in the northeastern cities of the CCTC Economic Zone, L-L agglomerations are distributed in the south, H-L agglomerations and L-H agglomerations are distributed in the north-central part of Chengdu-Chongqing Economic Zone. (3) Industrial structure, population structure, and governmental behavior have significant effects on energy efficiency, with a population mortality rate as the inhibiting factor and the proportion of tertiary industry and policy behavior as the contributing factors. Based on the empirical findings, it is recommended to accelerate the industrial structure adjustment, implement the CCTC economic circle's core cities' target of energy-saving, and build a "community" bridge to improve energy efficiency and promote economic development.

Бесплатно

Spectrum Sensing for Cognitive Radio Using Hybrid Matched Filter Single Cycle Cyclostationary Feature Detector

Spectrum Sensing for Cognitive Radio Using Hybrid Matched Filter Single Cycle Cyclostationary Feature Detector

Divya Joshi, Neeru Sharma, Jaskirat Singh

Статья научная

Spectrum sensing is an important task in cognitive radio (CR). Matched filter technique one of the techniques employed for spectrum sensing in cognitive radio which faces the challenge of low frequency offset tolerance in very low SNR environments. Hybrid matched filter architecture is used to improve this frequency offset tolerance. But, overall even such kind of architecture results in coarse detection. In very low SNR environments, where primary user is highly mobile, the multipath profile results in unknown phase of signal. Such kind of signal cannot even be detected by Hybrid Matched Filter. In this paper we propose combination of Hybrid Matched Filter and Single Cycle Cyclostationary Feature Detector to enhance the detection of such architecture. This results in both high frequency offset tolerance as well as fine detection of signal with unknown phase in very low SNR environments. Simulation results show significant improvement in the probability of detection and false alarm of the proposed scheme over Hybrid Matched Filter.

Бесплатно

Speech Compression Based on Discrete Walsh Hadamard Transform

Speech Compression Based on Discrete Walsh Hadamard Transform

Noureddine Aloui, Souha Bousselmi, Adnane Cherif

Статья научная

This paper presents a new lossy compression algorithm for stationary signal based on Discrete Walsh Hadamard Transform (DWHT). The principle of compression algorithm consists in framing the original speech signal into stationary frames and applying the DWHT. Then, the obtained coefficients are thresholded in order to truncate all coefficients below a given thresholds values. Compression is achieved by efficient encoding of the string values of zeros. A comparative study of performance between the algorithms based on DWHT and Discrete Wavelet Transform (DWT) is performed in terms of some objective criteria: compression ratio (CR), signal to noise ratio, peak signal to noise ratio (SNR), normalized root mean square error (NRMSE) and CPU time. The simulation results show that the algorithm based on DWHT is characterized by a very low complexity implementation and improved CR, SNR, PSNR and NRMSE compared to the DWT algorithm and this for stationary frame.

Бесплатно

Spelling Error Patterns in Typed Yorùbá Text Documents

Spelling Error Patterns in Typed Yorùbá Text Documents

Asahiah Franklin Oladiipo, Onifade Mary Taiwo, Adegunlehin Abayomi Emmanuel

Статья научная

While writing in most of the world’s major languages have a long history, Yorùbá is a relatively young language as far as writing it down is concerned. It is therefore an under-resourced language as far as tools for processing it in digital format is concerned. Spell checking is one of these tools. An analysis of the spelling error pattern is fundamental to the task of producing a good spell checker. We addressed this challenge in this article and our findings showed that spelling error pattern in Yorùbá followed that of other languages in general. There were, however, obvious departure from the norms in the specific. Diacritic-related misspelling accounted for more than 80% of all errors and words with single edit error were less than the generally expected minimum threshold of 80%. In addition, most of the errors were vowel-related with consonants accounting for less than 15% of all errors. Word-length does not seem to have any direct bearing on number of errors in a word. The research showed that the impact of diacritics on spelling error is more in Yorùbá where diacritics are majorly used for tone marking where it accounts for more than 80% of spelling errors than in languages like Brazilian Portuguese and Spanish where diacritics are used for differentiating characters where spelling error due to diacritics covered less than 60% of all errors. We thus conclude that while, to a significant extent, the character set used in a language determines distribution of spelling error, the purpose to which diacritics is employed in language also affect the distribution of spelling error in a language.

Бесплатно

State Of The Art: A Study of Human-Robot Interaction in Healthcare

State Of The Art: A Study of Human-Robot Interaction in Healthcare

Iroju Olaronke, Ojerinde Oluwaseun, Ikono Rhoda

Статья научная

In general, the applications of robots have shifted rapidly from industrial uses to social uses. This provides robots with the ability to naturally interact with human beings and socially fit into the human environment. The deployment of social robots in the healthcare system is becoming extensive as a result of the shortage of healthcare professionals, rising costs of healthcare and the exponential growth in the number of vulnerable populations such as the sick, the aged and children with developmental disabilities. Consequently, social robots are used in healthcare for providing health education and entertainment for patients in the hospital and for providing aids for the sick and aged. They are also used for dispensing drugs and providing rehabilitation as well as emotional and aging care. Hence, social robots improve the efficiency and quality of healthcare services. The interaction between social robots and human beings is known as human-robot interaction. Human-robot interaction in healthcare is faced with numerous challenges such as the fear of displacement of caregivers by robots, safety, usefulness, acceptability as well as appropriateness. These challenges ultimately lead to a low rate of acceptance of the robotic technology. Consequently, this paper extensively appraises human-robot interaction in healthcare, their applications and challenges. Design, ethical and usability issues such as privacy, trust, safety, users' attitude, culture, robot morphology as well as emotions and deception arising from the interaction between humans and robots in healthcare are also reviewed in this paper.

Бесплатно

Statistical Analysis of Resulting Palm vein Image through Enhancement Operations

Statistical Analysis of Resulting Palm vein Image through Enhancement Operations

Shriram D. Raut, Vikas T. Humbe

Статья научная

Nowadays biometric is playing a key role in the field of forensic and commercial applications. The vein biometrics is a robust biometric in recent trends.The vein pattern is very difficult to forge or fake. The traits are not going to be changed from birth to death. This paper discusses image enhancement operations and its result when applied on multispectral palm vein image. The image enhancement operations are much helpful to extract the vein patternas features.The experiments can be used to highlight or trace a vein pattern lies at palm region of hand. The proposed work gains vein pattern and considered as the stepping stone towards feature extraction. The paperalso discusses the comparison of statistical properties such as mean, standard deviation and coefficient of original image and images resulting out through enhancement operations. The enhancement operation is a key to gain the vein pattern. The image analysis can be framed well usingstatistical image measurements.

Бесплатно

Statistical analysis on result prediction in chess

Statistical analysis on result prediction in chess

Paras Lehana, Sudhanshu Kulshrestha, Nitin Thakur, Pradeep Asthana

Статья научная

In this paper, authors have proposed a technique which uses the existing database of chess games and machine learning algorithms to predict the game results. Authors have also developed various relationships among different combinations of attributes like half-moves, move sequence, chess engine evaluated score, opening sequence and the game result. The database of 10,000 actual chess games, imported and processed using Shane’s Chess Information Database (SCID), is annotated with evaluation score for each half-move using Stockfish chess engine running constantly on depth 17. This provided us with a total of 8,40,289 board evaluations. The idea is to make the Multi-Variate Linear Regression algorithm learn from these evaluation scores for same sequence of opening moves and game outcome, then using it to calculate the winning score of a side for each possible move and thus suggesting the move with highest score. The output is also tested with including move details. Game attributes are also classified into classes. Using Naïve Bayes classification, the data result is classified into three classes namely move preferable to white, black or a tie and then the data is validated on 20% of the dataset to determine accuracies for different combinations of considered attributes.

Бесплатно

Study of Response Time in Cloud Computing

Study of Response Time in Cloud Computing

Jitendra Singh

Статья научная

Performance of a cloud is a critical issue and dependent on various factors that include load balancing used to distribute the load at data center. Proliferation of the cloud paradigm is profoundly dependent on the performance of the cloud. Therefore, to examine the cloud performance, it is significant to identify the factors that govern cloud performance. This work is focused to identify the factors that may have significant impact on the cloud performance. To identify the performance factors, we have reviewed the major publications of the last five years as well as the major real time cloud performance tools offered. Study revealed that response time is the major factor that has the significant impact on cloud computing performance. Finally, we have conducted an experiment to establish the dependency of response time on various load balancing techniques and number of data center. Experiment revealed that the round robin is directly proportional to the number of data center

Бесплатно

Study of Some Properties of Intuitionistic Fuzzy Soft Matrix

Study of Some Properties of Intuitionistic Fuzzy Soft Matrix

Mamoni Dhar

Статья научная

The purpose of this article is to consider the notions of intuitionistic fuzzy soft matrices(IFSM) and to study some basic results associated with such matrices. This work deals particularly with the definition and some properties of transpose of intuitionistic fuzzy soft matrices. In the process, symmetric intuitionistic fuzzy matrix is also defined and some properties are discussed. Numerical examples are provided to make the concept clear.

Бесплатно

Supplier Selection in Dynamic Environment using Analytic Hierarchy Process

Supplier Selection in Dynamic Environment using Analytic Hierarchy Process

Prince Agarwal, Manjari Sahai, Vaibhav Mishra, Monark Bag, Vrijendra Singh

Статья научная

In today’s highly competitive business environment, the rapidly changing customer demands and with the advent of enterprise wide information systems, the managers are bound to think beyond the conventional business processes and devise new ways to squeeze out costs and improve the performance without compromising on the quality at the same time. Supplier evaluation and selection is one such area which determines the success of any manufacturing firm. Supplier selection is the problem wherein the company decides which vendor to select to have that strategic and operational advantage of meeting the customers’ varying demands and fight the fierce competition. This paper presents a simple model based on Analytic Hierarchy Process (AHP) to help decision makers in supplier evaluation and selection, taking into account the firm’s requirements. The article is intended to help new scholars and researchers understand the AHP model and see different facets in first sight.

Бесплатно

Survey of cellular signal booster

Survey of cellular signal booster

Elizabeth N. Onwuka, Michael Okwori, Salihu O. Aliyu, Stephen S. Oyewobi, Caroline O. Alenoghena, Habeeb Bello-Salau, Sani S. Makusidi, Victor Asuquo

Статья научная

The development of wireless technology has facilitated the wide deployment of mobile communication systems. The beauty of wireless communication is that all nooks and corners can be reached at a cheaper and faster rate when compared with wireline. Wireless is now dominating the telecommunications market. Initially, the dawn of wireless was seen as the dawn of communications to poor countries and rural areas which were poorly covered by wireline devices due to high cost. Currently, the story has changed. Both the wired and unwired environments are clamoring for wireless connectivity. Considering the hype of R&D in broadband technologies and easy acceptance in the market place, wireline communications may soon die a natural death. However, wireless communications faces a few challenges. One of them is that the radio frequency (RF) carrier signals used in these communication systems degrades as it travels through the air interface due to attenuation and interference. As a result, the range of coverage may not be as planned leading to very weak reception or even dead zones where no communication can be done. This problem has resulted in the development of cellular signal boosters that help in receiving the weak signal, amplifying and then re-transmitting it to reach the uncovered areas. Boosters are now giving hope to the frustrated wireless users such as indoor users and those at the fringes of a cell site. These boosters are diverse in make, range, method of operation, deployment and cost. In this paper, a survey of various signal booster designs, deployment and performance is presented. It is hoped that this will serve as a one-stop shop for researchers and developers in the important field of wireless signal boosters and extenders, who wish to know what is available and existing challenges.

Бесплатно

Survey on personalized web recommender system

Survey on personalized web recommender system

Santosh Kumar, Varsha

Статья научная

Recommendation system plays an essential role in searching any information from World Wide Web. Recommender system handles Information straining problem and improve customer correlation by providing best services. It suggests items or services to users according to their interest, navigation behavior or demographic information. This paper performs a survey on different approaches available for recommender system and performs a comparative analysis of different algorithms. Further, a discussion about various application areas has been done. At the end, issues and challenges in recommender systems have been discussed.

Бесплатно

Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure

Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure

Girish Wali, Chetan Bulla

Статья научная

The financial sector is grappling with significant challenges in detecting cyber attacks, leading to potential short- and long-term financial losses for banks and other institutions. The statistical and machine learning methods have been effective in identifying suspicious activities, they have struggled to achieve a balance between recall and precision. To improve accuracy, this paper introduces a novel approach that employs deep learning and bio-inspired algorithms to detect suspicious activities. The proposed model analyzes transactional patterns, quantities, and temporal aspects using a carefully curated dataset of labeled transactions. The model shows promising results in distinguishing between legitimate and fraudulent operations, achieving a balance between recall and precision. Further, many in the industry are transitioning to cloud computing infrastructures to enhance application performance. However, these infrastructures are not ideal for delay-sensitive applications, such as those in the medical and finance sectors. To address communication delays, fog computing has emerged as a new paradigm. The proposed model was simulated using Python and the Google Colab framework, and experimental results shows that improved accuracy and a balanced recall and precision.

Бесплатно

Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses

Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses

Mukesh Kumar, Vivek Bhardwaj, Karan Bajaj, Nandini Modi, Ahmed Qtaishat

Статья научная

This paper presents the implementation and evaluation of a Multi-key Multi-modalities Biometric Encryption System designed for business enterprises, leveraging cloud storage for secure and scalable data management. The system integrates multiple biometric modalities fingerprint, iris scan, and face recognition to enhance data security through advanced multi-key encryption techniques, utilizing algorithms such as Advanced Encryption Standard (AES) and Rivest-Shamir-Adleman (RSA). The encrypted biometric data is securely stored in the cloud, providing enterprises with efficient storage solutions. The system's performance was evaluated across several parameters including encryption/decryption time, biometric match accuracy, data transfer speeds, energy consumption, cost, and user satisfaction. The results demonstrate that multi-modal systems offer superior accuracy and security compared to single-modality systems, reducing error rates and enhancing reliability. However, multi-modal authentication incurs higher costs, energy consumption, and slightly longer processing times. Despite these trade-offs, the system achieved high user satisfaction, particularly in high-security environments where data protection is a priority. The findings indicate that the proposed system is a viable solution for businesses seeking a secure, scalable, and efficient method of protecting sensitive data.

Бесплатно

Sustainable E-waste Management at Higher Education Institutions’ Data Centres in Zimbabwe

Sustainable E-waste Management at Higher Education Institutions’ Data Centres in Zimbabwe

Vusumuzi Maphosa

Статья научная

The study’s objective was to examine the management of data centre electronic waste (e-waste) by Zimbabwean universities to ensure environmental sustainability and reduce the epidemiological effect of indiscriminate disposal of e-waste. The 21st century has seen universities adopting Information and Communication Technology (ICT) to automate processes and support technology-based learning, raising demands for data centre infrastructure to run applications and store data. In developing countries, obsolete ICT equipment is indiscriminately discarded with municipal waste into landfills and often scavenged to extract valuable metals using rudimentary methods such as heating, burning, and leaching, causing environmental and epidemiological crises. E-waste is the fastest growing stream of solid waste that contains scarce rare earth minerals and toxic elements, presenting an opportunity and a crisis during disposal. The study utilised the descriptive study design through a quantitative questionnaire to collect data from ICT Directors and Managers from Zimbabwean universities. Results show that a fifth of the participants had operational procedures for handling e-waste. A tenth of the participants knew of the existence of national policies. Obsolete equipment was kept in storerooms, while some were discarded with municipal trash. Most respondents were aware of the effect of e-waste, which is attributed to responsible management. Most participants redeployed decommissioned data centre equipment to less intense processing environments; 28% had labelled bins and designated e-waste collection points. In reducing their carbon footprint, three-quarters of the participants virtualised servers and stored data on the cloud, and 10% of the institutions practised take-back schemes and located data centres onsite. Universities should legislate the management of data centres to control carbon emissions, energy and e-waste and contribute to green initiatives. Partnerships with developed countries for data centre design and high-end recycling should be encouraged, thus creating employment, generating income for institutions and reducing the epidemiological effects.

Бесплатно

Systematic Analysis of Virtual Reality & Augmented Reality

Systematic Analysis of Virtual Reality & Augmented Reality

Asif A. Laghari, Awais K. Jumani, Kamlesh Kumar, M. Ameen Chhajro

Статья научная

Nowadays, users are moving from old 2D screens to modern devices such as 3D screens and virtual reality devices to enjoy videos and games like real-world experience, and this demand increased further development. Virtual Reality (VR) is based on the creation of a simulated environment of real-world with computer creation, and Augmented Reality (AR) is based on the addition of simulation components (environment) in the real-world scene. In this paper, systematic analysis of relationships and features both VR and AR varies by outline, arrangement, administrations, and devices for associations and clients. This paper provides a difference between AR and VR, advantages, future, and open research issues.

Бесплатно

Журнал