- Все статьи 611
Статьи журнала - International Journal of Information Engineering and Electronic Business
Все статьи: 611
Fredrick R. Ishengoma
Статья научная
With the rapid advancement in technology, smart homes have become applicable and so the need arise to solve the security challenges that are accompanied with its operation. Passwords and identity cards have been used as traditional authentication mechanisms in home environments, however, the rise of misuse of these mechanisms are proving them to be less reliable. For instance, ID cards can be misplaced, copied or counterfeited and being misused. Conversely, studies have shown that biometrics authentication systems particularly Iris Recognition Technology (IRT) and Fingerprint Recognition Technology (FRT) have the most reliable mechanisms to date providing tremendous accuracy and speed. As the technology becomes less expensive, application of IRT& FRT in smart-homes becomes more reliable and appropriate solution for security challenges. In this paper, we present our approach to design an authentication system for smart homes based on IRT, FRT and ARM7TDMI-S.The system employs two biometrics mechanisms for high reliability whereby initially, system users must enroll their fingerprints and eyes into the camera. Iris and fingerprint biometrics are scanned and the images are stored in the database. In the stage of authentication, FRT and IRT fingerprint scan and analyze points of the user's current input iris and fingerprint and match with the database contents. If one or more captured images do not match with the one in the database, then the system will not give authorization.
Бесплатно
Automated agricultural field analysis and monitoring system using IOT
Kajol R., Akshay Kashyap K., Keerthan Kumar T. G.
Статья научная
Smarter world is the resultant of the smarter technology. Agriculture was implemented in the nine of sedentary human civilization and it is the backbone of our Indian Economy. But the same traditional techniques like manual field monitoring, water feeding, pest detection, soil testing, etc., we are using for monitoring the field and frequently applying pesticides with or without having the knowledge of quantity to be used to control pests that affect the crops. So it is very important to enhance the agricultural production by making use of technology to overcome the damages being done. Our aim is to provide smart monitoring system using the current technologies like IoT, cloud computing and image processing. To address the above problems the authors of this paper are coming up with a model named “AAFAMS”( Automated Agricultural Field Analysis and Monitoring System Using IOT) which is used not only for monitoring the field but also to suggest the farmers about the moisture content in soil, detecting pest and the type of crop suited for the soil. In AAFAMS, a line follower robot is developed by using a hardware kit called Raspberry pi, which monitors the soil moisture level at every 100m distance using a soil moisture sensor and the information obtained from the sensor will be sent to cloud for storage. A camera will be connected to the AAFAMS which will detect the pests. After complete survey of field AAFAMS retrieves all stored data from cloud and SQLite database to provide a detailed report of Moisture content and Pests information and suggests farmer with the required pesticide. AAFAMS runs either on batteries or solar panel by utilizing the solar energy available and thereby helping farmers to monitor their fields effectively.
Бесплатно
Jaya Dagur, Savita Sindhu
Статья научная
In this paper the results are evaluated on a conventional modulation system. Here the system of communication is presented by modeling and analysis and the results so calculated are presented. The approach made in this paper is solely based on initial description which includes a combinational approach of spatial diversity well represented by OSTBC (Orthogonal Space Time Block Codes) encoder and combiner. Next the system of OSTBC encoder and combiner are put together in a MIMO(Multiple Input Multiple Output) channel using Rayleigh and Rician channel coupled with white Gaussian channel. In modeling of such systems interleavers and encoders are also used that helps to identify the performance with simple model without these techniques. In overall system the methodical approach using Multiple Input Multiple Output antenna with the modulator, encoder and interleaver is analyzed and the resultant bit error rate has been identified. The simulation platform is MATLAB and SIMULINK in which communication block sets are used. Alamouti's and 4x4 MIMO antennas are used and hence performance so evaluated is delivered. Best results are found when number of antennas increases using Interleaver and modulation or only with modulation techniques.
Бесплатно
Barriers to E-Commerce Adoption in Egyptian SMEs
Abdel Nasser H. Zaied
Статья научная
E-commerce has been predicted to be a new driver of economic growth for developing countries. The SME sector plays a significant role in its contribution to the national economy in terms of the wealth created and the number of people employed. Small and Medium Enterprises (SMEs) in Egypt represent the greatest share of the productive units of the Egyptian economy and the current national policy directions address ways and means of developing the capacities of SMEs. Many factors could be responsible for the low usage of e-commerce among the SMEs in Egypt. In order to determine the factors that promote the adoption of e-commerce, SMEs adopters and non-adopters of e-commerce were asked to indicate the factors inhibiting the adoption of e-commerce. The results show that technical barriers are the most important barriers followed by legal and regulatory barriers, whereas lack of Internet security is the highest barrier that inhibit the implementation of e-commerce in SMEs in Egypt followed by limited use of Internet banking and web portals by SMEs. Also, findings implied that more efforts are needed to help and encourage SMEs in Egypt to speed up e-commerce adoption, particularly the more advanced applications.
Бесплатно
Bengali News Headline Categorization Using Optimized Machine Learning Pipeline
Prashengit Dhar, Md. Zainal Abedin
Статья научная
Bengali text based news portal is now very common and increasing day by day. With easy access of internet technology, reading news through online is now a regular task. Different types of news are represented in the news portal. The system presented in this paper categorizes the news headline of news portal or sites. Prediction is made by machine learning algorithm. Large number of collected data are trained and tested. As pre-processing tasks such as tokenization, digit removal, removing punctuation marks, symbols, and deletion of stop words are processed. A set of stop words is also created manually. Strong stop words leads to better performance. Stop words deletion plays a lead role in feature selection. For optimization, genetic algorithm is used which results in reduced feature size. A comparison is also explored without optimization process. Dataset is established by collecting news headline from various Bengali news portal and sites. Resultant output shows well performance in categorization.
Бесплатно
Bi-gram based Query Expansion Technique for Amharic Information Retrieval System
Abey Bruck, Tulu Tilahun
Статья научная
Information retrieval system has been using to connect users of the information and information repository corpora. Even though the task of information retrieval systems is to retrieve relevant information, it is very difficult to find a perfect information retrieval system which is capable of retrieving relevant and only relevant documents as per user's query. The aim of this research is to increase precision of an Amharic information retrieval system while preserving the original recall. In order to achieve this bi-gram technique has been adopted for the query expansion. The main reason for performing query expansion is to provide relevant documents as per users' query that can satisfy their information need. Because users are not fully knowledgeable about the information domain area, they mostly formulate weak queries to retrieve documents. Thus, they end up frustrated with the results found from an information retrieval system. Amharic language has many meaning for a single word and also the word can be found in different form. These are some of the challenges that made the information retrieval system performing at very low level. Query expansion methods outperform in differentiating the various meanings of a polysemous term and find synonymous terms for reformulating users' query. Bi-gram technique uses the underling theory of expanding a query; using terms that appear adjacent to a query term frequently. The proposed technique was integrated to an information retrieval system. Then the retrieval system is tested with and without using bi-gram technique query expansion. The test result showed that bi-gram based method outperformed the original query based retrieval, and scored 8% improvement in total F-measure. This is an encouraging result to design an applicable search engine, for Amharic language.
Бесплатно
Big data optimization techniques: a survey
Chandrima Roy, Siddharth Swarup Rautaray, Manjusha Pandey
Статья научная
As the world is getting digitized the speed in which the amount of data is over owing from different sources in different format, it is not possible for the traditional system to compute and analysis this kind of big data for which big data tool like Hadoop is used which is an open source software. It stores and computes data in a distributed environment. In the last few years developing Big Data Applications has become increasingly important. In fact many organizations are depending upon knowledge extracted from huge amount of data. However traditional data technique shows a reduced performance, accuracy, slow responsiveness and lack of scalability. To solve the complicated Big Data problem, lots of work has been carried out. As a result various types of technologies have been developed. As the world is getting digitized the speed in which the amount of data is over owing from different sources in different format, it is not possible for the traditional system to compute and analysis this kind of big data for which big data tool like Hadoop is used which is an open source software. This research work is a survey about the survey of recent optimization technologies and their applications developed for Big Data. It aims to help to choose the right collaboration of various Big Data technologies according to requirements.
Бесплатно
Shakib Sadat Shanto, Zishan Ahmed, Nisma Hossain, Auditi Roy, Akinul Islam Jony
Статья научная
Sentiment analysis, the process of determining the emotional tone of a text, is essential for comprehending user opinions and preferences. Unfortunately, the majority of research on sentiment analysis has focused on reviews written in English, leaving a void in the study of reviews written in other languages. This research focuses on the understudied topic of sentiment analysis of Bangla-language product reviews. The objective of this study is to compare the performance of machine learning models for binary and multiclass sentiment classification in the Bangla language in order to gain a deeper understanding of user sentiments regarding e-commerce product reviews. Creating a dataset of approximately one thousand Bangla product reviews from the e-commerce website 'Daraz', we classified sentiments using a variety of machine learning algorithms and natural language processing (NLP) feature extraction techniques such as TF-IDF, Count Vectorizer with N-gram methods. The overall performance of machine learning models for multiclass sentiment classification was lower than binary class sentiment classification. In multiclass sentiment classification, Logistic Regression with bigram count vectorizer achieved the maximum accuracy of 82.64%, while Random Forest with unigram TF-IDF vectorizer achieved the highest accuracy of 94.44%. Our proposed system outperforms previous multiclass sentiment classification techniques by a fine margin.
Бесплатно
Bioinformatics Analysis and Characteristics of the giant panda Interferon-alpha
YueYi, Zhiwen Xu
Статья научная
In this report, the amino acid sequence of giant panda interferon-α (gpIFN-α) was determined and compared with 15 corresponding IFN-α sequences. Phylogenetic analysis showed that the 15 interferons fell into two large groups. The giant panda and ferret branched and were most closely related to fox and dog and evolved into a distinct phylogenetic lineage from that of eukaryotic mammalians which evolved into another lineage. After analyzing the encoded amino acid sequence of the gpIFN-α using bioinformatics, the results revealed that in the full amino acid sequence, there were no transmembrane domain, one N-glycosylation sites, eight O-glycosylation sites and nine antigenic determinants. Secondary structure analyzed showed that the Alpha helix, Extended strand, Beta turn and Random coil each occupied 60.37%(99aa), 4.88%(8aa), 9.76%, 25%(41aa) respectively. In conclusion, our results will give the opportunity to investigate more in detail function study in giant panda and add to studies on the evolution of the IFN system in vertebrates and avian more generally.
Бесплатно
Blockchain and IFPS based Secure System for Managing e-FIR
Khandaker Mohammad Mohi Uddin, Sadia Mahamuda, Sikder Sajib Al Shahriar, Md Ashraf Uddin
Статья научная
In recent times, various forms of crime have been happening worldwide. The law-and-order department of any country officially records a crime in electronic forms or on paper when the crime is reported by a victim or someone on behalf of the victim. The document that is prepared to file any perceptible committed crimes including dowry, kidnap, murder, rape, theft, and others is called First Information Report(FIR). Nowadays, online FIR also known as e-FIR has been used worldwide. Every day a number of e-FIR are filed, and they are maintained in a centralized database with the aid of third-party trust. Consequently, malicious entities including insiders and outsiders’ dishonest personnel, and third-party authorities may tamper with e-FIR that questions the transparency and integrity of FIR reports. To address this exposure, in this paper, we propose a blockchain based FIR system to store all kinds of offense-related records to assure security, fidelity and privacy of FIR records. In this proposed system, the blockchain technology that refers to a decentralized and distributed ledger across peer-to-peer networks continually updates the shared ledger and strictly maintains synchronization among all network nodes. Though blockchain technology guarantees tamper-proof of the data, it cannot store a large amount of data due to the replication of ledger among all network nodes. To solve this issue, we adopt the Inter-Planetary File system (IPFS) protocol to store data in the blockchain. IPFS is a distributed file-sharing system that can be leveraged to store and share large files. The blockchain based FIR system has been tested on an Ethereum environment using blockchain and IPFS technology.
Бесплатно
Body and Face Animation Based on Motion Capture
Xiaoting Wang, Lu Wang, Guosheng Wu
Статья научная
This paper introduces the motion capture technology and its use in computer animation. Motion capture is a powerful aid in computer animation and a supplement to the traditional key-frame animation. We use professional cameras to record the body motion and facial expression of the actor and then manipulate the data in software to eliminate some occlusion and confusion errors. As to data that is still not satisfying, we use data filter to smooth the motion by cutting some awry frames. Then we import the captured data into Motionbuilder to adjust the motion and preview the real-time animation. At last in Maya we combine the motion data and character model, let the captured data drive the character and add the scene model and music to export the whole animation. In the course of computer animation, we use this method to design the animation of military boxing, basketball playing, folk dancing and facial expression.
Бесплатно
Boosting Afaan Oromo Named Entity Recognition with Multiple Methods
Abdo Ababor Abafogi
Статья научная
Named Entity Recognizer (NER) is a widely used method of Information extraction (IE) in Natural language processing (NLP) and Information Retrieval (IR) aimed at predicting and categorizing words of a given text into predefined classes of Named Entities like a person, date/time, organization, location, etc. This paper adopts boosting NER for Afaan Oromo by using multiple methods. Combinations of approaches such as machine learning, the stored rules, and pattern matching make a system more efficient and accurate to recognize candidates name entities (NEs). It takes the strongest points from each method to boost the system performance by voting a candidate NE which is detected in more than 1 entity category or out of context because of word ambiguity, it penalized by Word senses disambiguation. Subsequent NEs tagged with identical tags merged as a single tag before the final output. The evaluation shows the system is outperformed. Finally, the future direction is forwarded a hybrid approach of rule-based with unsupervised zero-resource cross-lingual to enhance more.
Бесплатно
Building Consumers' Trust Based on Pick-up Goods Behavior in the Convenience Stores in Taiwan
Chun-Chia Wang
Статья научная
With the adoption of Internet, online shopping has provided a convenience way to purchase goods or services from anywhere at any time in recent years globally. Especially, convenience stores are available for consumers to pick up goods ordered from Internet shops in Taiwan. Therefore, convenience stores have become an important success factor for increasing a lot of profit in online shopping in Taiwan. In the past, researches have indicated that consumers dare not or are not willing to purchase goods in online shopping. The reasons include the problem of security and the lack of consumers’ trust. Thus, these problems constitute a key barrier to the use of online shopping as well as long-term commitment to the relationship building. Therefore, there is a need to build up consumers’ trust in order to overcome the influential factors in online shopping. In this paper, we use statistic analysis method by questionnaires to discuss the characteristics of pick-up goods in the convenience stores and illustrate the relationship between consumers’ trust in online shopping and pick-up goods behavior in convenience stores. In our experiment, questionnaire items are measured by Likert scale. In 227 valid questionnaires, 90% participants deeply believe that pick-up goods in the convenience stores can promote consumers’ trust in online shopping.
Бесплатно
Business Process Re-Engineering in Public Administration of Kingdom of Saudi Arabia
Arwa S. Bokhari, Rizwan J. Qureshi
Статья научная
The government of Saudi Arabia is in the phase of transformation. Business process reengineering (BPR) can play a vital role in assessing this conversion. BPR methodologies provide ways to optimize the use of resources while maintaining high-quality services. The aim of this paper is to investigate the introduction of BPR in Saudi Arabia public sector. A framework is proposed to transform change using a knowledge based. The proposed solution is validated through survey. The results of the survey show that Saudi Governmental Agencies acquire the power to implement the BPR successfully especially if it is implemented with knowledge management and the BPR movement started at small scale.
Бесплатно
Business decision support system based on sentiment analysis
Stephen Opoku Oppong, Dominic Asamoah, Emmanuel Ofori Oppong, Derrick Lamptey
Статья научная
Since organizational decisions are vital to organizational development, customers’ views and feedback are equally important to inform good decisions. Given this relevance, this paper seeks to automate a sentiment analysis system - SentDesk- that can aid tracking sentiments in customers’ reviews and feedback. The study was contextualised in some business organisations in Ghana. Three business organizational marketers were made to annotate emotions and as well tag sentiments to each instance in the corpora. Kappa and Krippendoff coefficients were computed to obtain the annotation agreement in the corpora. The SentDesk system was evaluated in the environment alongside comparing the output to that of the average sentiments tagged by the marketers. Also, the SentDesk system was evaluated in the environment by the selected marketers after they had tested the platform. By finding the average kappa value from the corpora (CFR + ISEAR), the average kappa coefficient was found to be 0.40 (40%). The results of evaluating the SentDesk system with humans shows that the system performed as better as humans. The study also revealed that, while annotating emotions and sentiments in the datasets, counsellor’s own emotions influences their perception of emotions.
Бесплатно
CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Omar A. Batarfi, Aisha M. Alshiky, Alaa A. Almarzuki, Nora A. Farraj
Статья научная
The number of Internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for ordinary users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers' snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user's browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack success, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution is successful in preventing this type of attack.
Бесплатно
Grace Agyapong
Статья научная
This paper presents the calculation of the classic-curvature and the intensity-curvature term before interpolation of a bivariate polynomial model function. The classic-curvature is termed as yc (x, y) and the intensity-curvature term before interpolation is termed as E0. The classic-curvature is defined as the sum of the four second order partial derivatives of the bivariate polynomial. The intensity-curvature term before interpolation is defined as the integral of the product between the pixel intensity value termed as f(0, 0) and the classic-curvature calculated at the origin of the coordinate system of the pixel. This paper presents an application of the calculation of classic-curvature and the intensity-curvature term before interpolation using two-dimensional Magnetic Resonance Imaging (MRI) data and reports for the first time in the literature on the behavior of the intensity-curvature term before interpolation.
Бесплатно
Chance for Sustainable Fashion in Jabodetabek
Azzahra Ditri Gunawan, Fredi Andria
Статья научная
The rise of environmental awareness globally has influenced the clothing industry, prompting the emergence of sustainable fashion as a response to the negative impacts of fast fashion. Despite its positive intentions, sustainable fashion holds a modest 7% of the global market, with fast fashion dominating at 93%. In Indonesia, a growing environmental consciousness has led to an increase in sustainable fashion businesses. An analysis using Porter's five forces model and the Delphi technique for sustainable fashion in Jabodetabek indicates that the current competitive power of sustainable fashion in the broader industry is relatively low. While the competitive landscape is secure and not overly saturated, attention is needed for factors like increasing competitors, significant product differentiation, and high capital requirements, posing notable competitive threats. Key parameters, including the number of buyers and the threat of substitute products, also warrant scrutiny. Challenges persist, such as consumer confusion regarding the pricing of sustainable versus conventional products. Interestingly, the threat from suppliers in the sustainable fashion sector is low, indicating a relatively stable relationship. Despite challenges, the growing awareness of environmental issues in Indonesia presents an opportunity for sustainable fashion businesses to enhance their competitive standing and expand their market share for a more environmentally friendly future. To strengthen the position of sustainable fashion in Indonesia, the focus should be on brand differentiation through storytelling and a unique identity. Innovate products for quality and durability to counter fast fashion trends. Launch educational campaigns, collaborate with like-minded partners, and adopt transparent supply chain practices. Implement competitive pricing, engage customers through loyalty programs, and contribute to the local community, establishing a strong presence in the growing market for sustainable fashion.
Бесплатно
Class Complexity Metric to Predict Understandability
Kumar Rajnish
Статья научная
This paper presents a new class complexity metric of an Object-Oriented (OO) program which is used to predict the understandability of classes. The propose complexity metric is evaluated theoretically against Weyuker's properties to analyze the nature of metric and empirically evaluated against three small projects developed by Post Graduate (PG)/Under Graduate (UG) teams. Least Square Regression Analysis technique is performed to arrive at the result and find correlation coefficient of propose metric with the Degree of Understandability. The result indicates that the propose metric is a good predictor of understandability of classes. JHAWK TOOL (Java Code Metrics Tool) were used to evaluate the parameters values involved in propose metric and for analyzing the results of projects, Matlab6.1 and IBM SPSS software were used.
Бесплатно
Ateke Goshvarpour, Hossein Ebrahimnezhad, Atefeh Goshvarpour
Статья научная
The aim of this paper is to investigate the performance of time delay neural networks (TDNNs) and the probabilistic neural networks (PNNs) trained with nonlinear features (Lyapunov exponents and Entropy) on electroencephalogram signals (EEG) in a specific pathological state. For this purpose, two types of EEG signals (normal and partial epilepsy) are analyzed. To evaluate the performance of the classifiers, mean square error (MSE) and elapsed time of each classifier are examined. The results show that TDNN with 12 neurons in hidden layer result in a lower MSE with the training time of about 19.69 second. According to the results, when the sigma values are lower than 0.56, the best performance in the proposed probabilistic neural network structure is achieved. The results of present study show that applying the nonlinear features to train these networks can serve as useful tool in classifying of the EEG signals.
Бесплатно
- О проекте
- Правообладателям
- Правила пользования
- Контакты
- Разработчик: ООО "Технологии мобильного чтения"
Государственная аккредитация IT: АО-20230321-12352390637-3 | Минцифры России - 2024 © SciUp.org — Платформа публикаций в области науки, технологий, медицины, образования и литературы. "SciUp" — зарегистрированный товарный знак. Все права защищены.