Статьи журнала - International Journal of Information Technology and Computer Science
Все статьи: 1195
Application of Cloud Theory in Association Rules
Статья научная
The data mining is to discover knowledge from the database, quantitative association rules mining method is difficult for their values are too large. The usual means is dividing quantitative Data to discrete conception. The Cloud model combines fuzziness and randomness organically, so it fits the real world objectively, a new method to mine association rules from quantitative data based on the cloud model was proposed, which first take the original data distribution in the database into account, and then use the trapezoidal cloud model to complicate concepts division, and transforms qualitative data to the quantitative concept, in the conversion take account of the basic characteristics of human behavior fully, divides quantitative Data with trapezium Cloud model to create discreet concepts, the concept cluster within one class, and separated with each other. So the quantitative Data can be transforms to Boolean data well, the Boolean data can be mined by the mature Boolean association rules mining method to find useful knowledge.
Бесплатно
Application of Materialized View in Incremental Data Mining Operation
Статья научная
Materialized view is a database object used to store the results of a query set. It is used to avoid the costly processing time that is required to execute complex queries involving aggregation and join operations. Materialized view may be associated with the operations of a data warehouse. Data mining is a technique to extract knowledge from a data warehouse and the incremental data mining is another process that periodically updates the knowledge that has been already identified by a data mining process. This happens when a new set of data gets added with the existing set. This paper proposes a method to apply the materialized view in incremental data mining.
Бесплатно
Статья научная
The demand for workload prediction approaches has recently increased to manage the cloud resources, improve the performance of the cloud services and reduce the power consumption. The prediction accuracy of these approaches affects the cloud performance. In this application paper, we apply an enhanced variant of the differential evolution (DE) algorithm named MSaDE as a learning algorithm to the artificial neural network (ANN) model of the cloud workload prediction. The ANN prediction model based on MSaDE algorithm is evaluated over two benchmark datasets for the workload traces of NASA server and Saskatchewan server at different look-ahead times. To show the improvement in accuracy of training the ANN prediction model using MSaDE algorithm, training is performed with other two algorithms: the back propagation (BP) algorithm and the self-adaptive differential evolution (SaDE) algorithm. Comparisons are made in terms of the root mean squared error (RMSE) and the average root mean squared error (ARMSE) through all prediction intervals. The results show that the ANN prediction model based on the MSaDE algorithm predicts the cloud workloads with higher prediction accuracy than the other algorithms compared with.
Бесплатно
Статья научная
In investigation of consequences of atmosphere and commutating striking voltages, for simulation of the overvoltage are used the models of generators whose RC circuits have standard passive parameters of the elements upon which the form of striking overvoltage depends. According to IEC 62 305-1 standard, these formulas in the theoretical model serve for dimensioning the RC circuit of the generator of striking voltages although the definitions of time constants and passive parameters have only axiomatic character. Related to classical solution, this paper presents the model formed by mathematical procedure the solutions of which give sufficiently accurate values of time constants and essential parameters of RC circuit as well as the shape of striking voltage wave. The formulas for voltages and currents in model contain parameters of passive elements, and their accuracy has been confirmed by diagrams obtained in simulation by means of adapted psbtrnsrg.mdl part of MATLAB program. Theoretical model is suitable for simulation of standard wave forms of striking atmospheric and commutating overvoltages which replace laboratory testing.
Бесплатно
Applied an Efficient Site-directed Mutagenesis Method into Escherichia coli
Статья научная
A new technique for conducting site-directed mutagenesis was developed. This method allows the color selection of mutants through the simultaneous activation or deactivation of the α-peptide of ß-galactosidase. The method can efficiently create mutations at multiple sites simultaneously and can be used to perform multiple rounds of mutation on the same construct. In this paper, in order to develop an efficient site-directed mutagenesis method in vivo, the tests were tested by the following methods. The methods that the fragment knock-out ompR gene was constructed through overlapping PCR, digested by Notand SalⅠⅠ, ligated to plasmid pKOV were applied. The recombination plasmid was transformed into Escherichia coli WMC-001 strain, integrated into the genomic DNA through two step homologous recombination. The Escherichia coli WMC-001/ompR- mutant was obtained due to gene replacement. The fragment of the mutant ompR gene was amplified through overlapping PCR, cloned into pKOV vector. The recombinant plasmid was introduced into Escherichia coli WMC-001/ompR- mutant. The Escherichia coli WMC-001/ompR mutant was also obtained due to gene replacement. Results: The site-directed mutagenesis has been successfully constructed in the ompR gene by sequencing. Conclusion: The method is effective for construction of gene site-directed mutagenesis in vivo.
Бесплатно
Applying Clustering and Topic Modeling to Automatic Analysis of Citizens’ Comments in E-Government
Статья научная
The paper proposes an approach to analyze citizens' comments in e-government using topic modeling and clustering algorithms. The main purpose of the proposed approach is to determine what topics are the citizens' commentaries about written in the e-government environment and to improve the quality of e-services. One of the methods used to determine this is topic modeling methods. In the proposed approach, first citizens' comments are clustered and then the topics are extracted from each cluster. Thus, we can determine which topics are discussed by citizens. However, in the usage of clustering and topic modeling methods appear some problems. These problems include the size of the vectors and the collection of semantically related of documents in different clusters. Considering this, the semantic similarity of words is used in the approach to reduce measure. Therefore, we only save one of the words that are semantically similar to each other and throw the others away. So, the size of the vector is reduced. Then the documents are clustered and topics are extracted from each cluster. The proposed method can significantly reduce the size of a large set of documents, save time spent on the analysis of this data, and improve the quality of clustering and LDA algorithm.
Бесплатно
Статья научная
Bluff and truth are major pillars of deception technology. Deception technology majorly relies on decoy-generated data and looks for any behavior deviation to flag that interaction as an attack or not. But at times a legitimate user can also do suspicious decoy interactions due to lack of knowledge and can be categorized under the “ATTACK” category which in a true sense should not be flagged that way. Hence, there is a need of doing collaborative analysis on honeypot, which are set up to monitor and log activities of sources that compromise or probe them. This goldmine provides ample information about the attacker intent and target, how it is moving forward in the kill chain as this information can be used to enhance threat intelligence and upgrade behaviors analysis rules. In this paper, decoys which are strategically placed in the network pointing to various databases, services, and Ips are used providing information of interactions made. This data is analyzed to understand underlying facts which can help in strengthening defense strategy, it also enhances confidence on the findings as analysis is not restricted to single decoy interaction which could be false positive or un-intentional in nature but analyzing holistically to conclude on the exact attack patten and progression. With experiment we have highlighted is reconciling various honeypots data and weighing IP visits and Honeypot interaction counts against scores and then using KNN and Weightage KNN to derive inclination of target IP against Source IP which can also be summarized as direction of Attack and count/frequency of interaction from highlights criticality of the interactions. Used KNN and W-KNN have shown approx. 94% accuracy which is best in class, also silhouette score highlighted high cohesion of data points in the experiment. Moreover, this was also analyzed that increasing the number of decoys in the analysis helps in getting better confidence on attack probability and direction.
Бесплатно
Статья научная
This study examines the individuals' participation intentions and behaviour on Social Networking Sites. For this purpose, the Decomposed Theory of Planned Behaviour is utilized. Data collected from a survey of 1100 participants and distilled to 657 usable sets has been analysed to assess the predictive power of Decomposed Theory of Planned Behaviour' model via structural equation modelling. The results show that attitude and subjective norm have significant effect on the participation intention of adopters. Further, the results show that participation intention has significant effect on participation behaviour. However, the study findings also show that perceived behavioural control has no significant effect on participation intention or behaviour of adopters. The model adopted in this study explains 47% of the variance in "Participation Intentions" and 36% of the variance in "Participation Behaviour". Participation of behavioural intention in the model' explanatory power was the highest amongst the constructs (able to explain 14.6% of usage behaviour). While, "attitude" explain around 9% of SNSs usage behaviour.
Бесплатно
Applying Scrum Development on Safety Critical Systems
Статья научная
Scaled agile approaches are increasingly being used by automotive businesses to cope with the complexity of their organizations and products. The development of automotive systems necessitates the use of safe procedures. SafeScrum® is a real example of how agile approaches may be used in the creation of high-reliability systems on a small scale. A framework like SAFe or LeSS does not facilitate the creation of safety-critical systems in large-scale contexts from the start. User stories are a wonderful approach to convey flexible demands, the lifecycle is iterative, and testing is the initial stage in the development process. Scrum plus extra XP approaches may be used to build high-reliability software and certification by the IEC 61508 standard is required for the software. This adds a slew of new needs to the workflow. Scrum's quality assurance measures proved to be inadequate in a recent industry situation. Our study's overarching goal is to provide light on the Scrum development process so that it may be improved for use with life-or-death systems. Our study of the business world was a mixed-methods affair. The findings demonstrated that although Scrum is helpful in ensuring the security of each release, it is less nimble in other respects. The difficulties of prioritization, communication, time constraints, and preparing for and accepting new safety standards were all discussed. In addition, we have had some helpful feedback from the business world, but the generality issue arising from this particular setting has yet to be addressed.
Бесплатно
Approaches to Sensitivity Analysis in MOLP
Статья научная
The paper presents two approaches to the sensitivity analysis in multi-objective linear programming (MOLP). The first one is the tolerance approach and the other one is the standard sensitivity analysis. We consider the perturbation of the objective function coefficients. In the tolerance method we simultaneously change all of the objective function coefficients. In the standard sensitivity analysis we change one objective function coefficient without changing the others. In the numerical example we compare the results obtained by using these two different approaches.
Бесплатно
Appropriate Tealeaf Harvest Timing Determination Based on NIR Images
Статья научная
Method for most appropriate tealeaves harvest timing with Near Infrared (NIR) camera images is proposed. In the proposed method, NIR camera images of tealeaves are used for estimation of nitrogen content in tealeaves. The nitrogen content is highly correlated to Theanine (amid acid) content in tealeaves. Theanine rich tealeaves taste good. Therefore, tealeaves quality can be estimated with NIR camera images. Also, leaf area of tealeaves is highly correlated to NIR reflectance of tealeaf surface. Therefore, not only tealeaf quality but also harvest mount can be estimated with NIR camera images. Experimental results shows the proposed method does work for estimation of appropriate tealeaves harvest timing with NIR camera images.
Бесплатно
Arabic Text Categorization Using Mixed Words
Статья научная
There is a tremendous number of Arabic text documents available online that is growing every day. Thus, categorizing these documents becomes very important. In this paper, an approach is proposed to enhance the accuracy of the Arabic text categorization. It is based on a new features representation technique that uses a mixture of a bag of words (BOW) and two adjacent words with different proportions. It also introduces a new features selection technique depends on Term Frequency (TF) and uses Frequency Ratio Accumulation Method (FRAM) as a classifier. Experiments are performed without both of normalization and stemming, with one of them, and with both of them. In addition, three data sets of different categories have been collected from online Arabic documents for evaluating the proposed approach. The highest accuracy obtained is 98.61% by the use of normalization.
Бесплатно
Architecture Aware Key Management Scheme for Wireless Sensor Networks
Статья научная
The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexibility, facility of use and deployment as well as their low cost give them an increasing field of applications. Usually sensors are limited in capacities deployed in a hostile and unpredictable environment, making the security of these networks a challenging task. In this paper we are going to present a key management scheme in which the base station play the role of the secure third party responsible of distributing key and managing security in the network, two versions of this scheme are presented the first one for flat networks and the second one for hierarchical networks in which the cluster head play the key role in all key agreement with the base station.
Бесплатно
Architecture for Accessing Heterogeneous Databases
Статья научная
This paper presents the architecture for accessing heterogeneous databases. Two major processes in this architecture which are extracting SQL statement and ontology. The algorithms for extracting SQL statement was created and tested in order to improve time performance during searching and retrieving process. Ontology approach was implemented and combined with these algorithms. In ontology approach, web semantic was implemented in order to retrieve only relevant data from database. A prototype based on this architecture was developed using JAVA technology. JAVA technology was chosen because this technology have Jena library. This library is provide API and support SPARQL. Several experiments have been executed and tested. The result indicates this architecture able to improve web query processing in term of time. The result also indicates this architecture able to retrieve and displayed more relevant data to web users.
Бесплатно
Artificial Bee Colony Algorithm based Multi-Objective Node Placement for Wireless Sensor Network
Статья научная
The recent popularity of applications based on wireless sensor networks (WSN) provides a strong motivation for pursuing research in different dimensions of WSN. Node placement is an essential task in wireless sensor network and is a multi-objective combinatorial problem in nature. The positions of sensor nodes are very important and must be able to provide maximum coverage with longer lifetimes. So, for efficient node placement, a novel multi-objective Artificial Bee Colony (ABC) algorithm based framework is proposed in this paper. The framework optimizes the operational modes of the sensor nodes along with clustering schemes and transmission signal strengths. The results show that the proposed algorithm outperformed the contemporary methodology based on TPSMA, PSO and ACO.
Бесплатно
Artificial Bee Colony and Its Application for Image Fusion
Статья научная
Artificial Bee Colony (ABC) is one of the latest swarm algorithm based on the intelligent foraging behavior of honey bees introduced in the year 2005 by Karaboga since then it has been used for optimization of various solutions. And it is recently introduced for processing and analysis of images such as segmentation, object recognition and image retrieval. Fusing images from a vast collection of different images has become one of the interesting challenges and has drawn the attention of researchers towards the development of fusion techniques. In this paper, we have proposed the usage of ABC for optimal fusion of multi-temporal images and studied the effect of variation in the source area
Бесплатно
Artificial Neural Network Based Control Strategies for Paddy Drying Process
Статья научная
Paddy drying process depends upon ambient conditions, paddy quality, temperature and mass of hot drying air. Existing techniques of paddy drying process are highly nonlinear. In this paper, a neural network based automated controller for paddy drying is designed. The designed controller manages the steam temperature and blower motor speed to achieve constant paddy drying time. A Layer recurrent neural network is adopted for the controller. Atmospheric conditions such as temperature and humidity along with the size of the paddy are used as input to the network. Experimental results show that the developed controller can be used to control the paddy drying process. Implementation of developed controller will help in controlling the drying time at almost constant value which will definitely improve the quality of rice.
Бесплатно
Artificial Neural Network Turbulent Modeling for Predicting the Pressure Drop of Nanofluid
Статья научная
An Artificial Neural Network (ANN) model was developed to predict the pressure drop of titanium dioxide-water (TiO2-water). The model was developed based on experimentally measured data. Experimental measurements of fully developed turbulent flow in pipe at different particle volumetric concentrations, nanoparticle diameters, nanofluid temperature and Reynolds number were used to construct the proposed model. The ANN model was validated by comparing the predicted results with the experimental measured data at different experimental conditions. It was shown that, the present ANN model performed well in predicting the pressure drop of TiO2-water nanofluid under different flow conditions with a high degree of accuracy.
Бесплатно
Artificial Neural Networks for Diagnosis of Kidney Stones Disease
Статья научная
Artificial Neural networks are often used as a powerful discriminating classifier for tasks in medical diagnosis for early detection of diseases. They have several advantages over parametric classifiers such as discriminate analysis. The objective of this paper is to diagnose kidney stone disease by using three different neural network algorithms which have different architecture and characteristics. The aim of this work is to compare the performance of all three neural networks on the basis of its accuracy, time taken to build model, and training data set size. We will use Learning vector quantization (LVQ), two layers feed forward perceptron trained with back propagation training algorithm and Radial basis function (RBF) networks for diagnosis of kidney stone disease. In this work we used Waikato Environment for Knowledge Analysis (WEKA) version 3.7.5 as simulation tool which is an open source tool. The data set we used for diagnosis is real world data with 1000 instances and 8 attributes. In the end part we check the performance comparison of different algorithms to propose the best algorithm for kidney stone diagnosis. So this will helps in early identification of kidney stone in patients and reduces the diagnosis time.
Бесплатно
Статья научная
Webometric seeks to assess the convenience as well as experience of users, as they interact with web-based system. Businesses use websites as means to present their deliverables to a larger audience. The aim of which is to change, refocus and reshape a user’s image of an organization. Today, it has been extended to facilitate activities such as recruitment etc. We investigate usability of selected Nigerian Universities based on expert review guideline with a focus on the Federal University of Petroleum Resources Effurun (FUPRE), compare the scores achieved in each criterion among selected university websites. Result shows common strengths, common weakness, unique strengths and unique weakness of these university websites. Some websites were found to have unique characteristics which separated them from the other ones. Most university websites successfully ensured that the trust and credibility section as well as their homepages received the highest scores in their usability analysis. Some of the sites on the contrary, struggled to ensure good search usability and form, and data entry criteria, as many of the websites did not even include the mentioned essential functions in their web design. Findings suggest that even the top ranked universities have websites which is lacking in some different website usability areas.
Бесплатно