Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1265

Synchronization New 3D Chaotic System Using Brain Emotional Learning Based Intelligent Controller

Synchronization New 3D Chaotic System Using Brain Emotional Learning Based Intelligent Controller

Masoud Taleb Ziabari, Ali Reza Sahab, Seyedeh Negin Seyed Fakhari

Статья научная

One of the most important phenomena of some systems is chaos which is caused by nonlinear dynamics. In this paper, the new 3 dimensional chaotic system is firstly investigated and then utilizing an intelligent controller which based on brain emotional learning (BELBIC), this new chaotic system is synchronized. The BELBIC consists of reward signal which accept positive values. Improper selection of the parameters causes an improper behavior which may cause serious problems such as instability of system. It is needed to optimize these parameters. Genetic Algorithm (GA), Cuckoo Optimization Algorithm (COA), Particle Swarm Optimization Algorithm (PSO) and Imperialist Competitive Algorithm (ICA) are used to compute the optimal parameters for the reward signal of BELBIC. These algorithms can select appropriate and optimal values for the parameters. These minimize the Cost Function, so the optimal values for the parameters will be founded. Selected cost function is defined to minimizing the least square errors. Cost function enforce the system errors to decay to zero rapidly. Numerical simulation results are presented to show the effectiveness of the proposed method.

Бесплатно

Syntactic and Sentence Feature Based Hybrid Approach for Text Summarization

Syntactic and Sentence Feature Based Hybrid Approach for Text Summarization

D.Y. Sakhare, Raj Kumar

Статья научная

Recently, there has been a significant research in automatic text summarization using feature-based techniques in which most of them utilized any one of the soft computing techniques. But, making use of syntactic structure of the sentences for text summarization has not widely applied due to its difficulty of handling it in summarization process. On the other hand, feature-based technique available in the literature showed efficient results in most of the techniques. So, combining syntactic structure into the feature-based techniques is surely smooth the summarization process in a way that the efficiency can be achieved. With the intention of combining two different techniques, we have presented an approach of text summarization that combines feature and syntactic structure of the sentences. Here, two neural networks are trained based on the feature score and the syntactic structure of sentences. Finally, the two neural networks are combined with weighted average to find the sentence score of the sentences. The experimentation is carried out using DUC 2002 dataset for various compression ratios. The results showed that the proposed approach achieved F-measure of 80% for the compression ratio 50 % that proved the better results compared with the existing techniques.

Бесплатно

Systematic Review and Classification on Video Surveillance Systems

Systematic Review and Classification on Video Surveillance Systems

Fereshteh Falah Chamasemani, Lilly Suriani Affendey

Статья научная

Recently, various conferences and journals have published articles related to Video Surveillance Systems, indicating researchers’ attention. The goal of this review is to examine the latest works were published in journals, propose a new classification framework of video surveillance systems and investigate each aspect of this classification framework. This paper provides a comprehensive and systematic literature review of video surveillance systems from 2010-2011, extracted from six online digital libraries using article’s title and keyword. The proposed classification framework is expanded on the basis of architecture of video surveillance systems, which is composed of six layers: Concept and Foundation Layer, Network Infrastructure Layer, Processing Layer, Communication Layer, Application Layer, and User Interaction Layer. This review shows, although many publication and research focus on real-time aspect of the challenge, only few researches have investigated the deployment of extracted and retrieved information for forensic video surveillance.

Бесплатно

TSSR: A Proposed Tool for Secure Software Requirement Management

TSSR: A Proposed Tool for Secure Software Requirement Management

Mohammad Ubaidullah Bokhari, Shams Tabrez Siddiqui

Статья научная

This paper provides a unified framework in which entire design of the project can be captured right from the beginning of the software development. This paper discusses about the requirements which should be included in the development of the requirement management tools. As the requirements, criteria which have been discussed, we introduce a requirement management tool known as TSSR (Tool for Secure Software Requirement). This tool manages risk analysis, system requirements, security of the system and project, users/group restriction, encrypted database, traceability and extension of the tool to interact with external requirement management tools. The aim of this paper is to describe the TSSR framework and its four components: Planner, Modeller, Prover and Documenter which will be helpful in interacting and managing requirements with arbitrary number of external tools for secure software development.

Бесплатно

Technology Adoption in Pakistani Banking Industry using UTAUT

Technology Adoption in Pakistani Banking Industry using UTAUT

M. Mustafa Khan, Waqas Mahmood

Статья научная

The success of any software product could be measured by its uses and adoption of that technology by the end-users. In this study, we investigate the factors on which bank user intents to adopt internet banking in Pakistan. A survey was conducted on Pakistani banking industry customers using the unified theory of acceptance and use of technology (UTAUT) model which explains the intention of bank users to use the banking systems. The four predictors of UTAUT which were facilitating conditions, social influence, effort expectancy and performance expectancy were significant in predicting the intention of bank users to adopt the banking systems. Finally, we discuss the results, restrictions, implications and future recommendations. The findings of the study may help to provide insights into a better approach to promote e-banking acceptance.

Бесплатно

Temporal Logics Specifications for Debit and Credit Transactions

Temporal Logics Specifications for Debit and Credit Transactions

Rafat M. Alshorman

Статья научная

Recently, with the emergence of mobile technology and mobile banking, debit and credit transactions have been the most common transactions that are widely spreading, using such technologies. In this research, we specify the concurrent debit and credit transactions in temporal logics such as CTL (Computational Tree Logic) and LTL (Linear-Time Temporal Logic). These specifications describe the infinite histories that may be produced by the iterations of such concurrent transactions infinitely many times. We represent the infinite histories as a model of temporal logics formulae. Then, model checkers, such as NuSMV or SPIN, can carry out exhaustive checks of the correctness of the concurrent debit and credit transactions. Moreover, in this paper, we presume that the serializability condition is too strict. Therefore, a relaxed condition has been suggested to keep the database consistent. Moreover, the relaxed condition is easier to encode into temporal logics formulae.

Бесплатно

Text extraction from natural scene images using OpenCV and CNN

Text extraction from natural scene images using OpenCV and CNN

Vaibhav Goel, Vaibhav Kumar, Amandeep Singh Jaggi, Preeti Nagrath

Статья научная

The influence of exponentially increasing camera-embedded smartphones all around the world has magnified the importance of computer vision tasks, and gives rise to a vast number of opportunities in the field. One of the major research areas in this field is the extraction of text embedded in natural scene images. Natural scene images are the images taken from a camera, where the background is random, and the variety of colors used in the image may be diverse. When text is present in such type of images, it is usually difficult for a machine to detect and extract this text due to a number of parameters. This paper presents a technique that uses a combination of the Open Source Computer Vision Library (OpenCV) and the Convolutional Neural Networks (CNN), to extract English text from images efficiently. The CNN model is based on a two-stage pipeline that uses a single neural network to directly detect the characters in the scene images. It eliminates the unnecessary intermediate steps that are present in the previous approaches to this task making them slower and inaccurate, thereby improving the time complexity and the performance of the algorithm.

Бесплатно

Text summarization system using Myanmar verb frame resources

Text summarization system using Myanmar verb frame resources

May Thu Naing, Aye Thida

Статья научная

In today’s era, when the size of information and data is increasing exponentially, there is an upcoming need to create a concise version of the information available. Until now, humans have tried to create “summaries” of the documents. Especially, Myanmar Natural Language Processing does not have computerized text summarization. Therefore, this paper presents a summary generation system that will accept a single document as input in Myanmar. In addition, this work presents analysis on the influence of the semantic roles in summary generation. The proposed text summarization system involves three steps: first, the sentences are parsed using Part of Speech tagger with Myanmar Language Tool Knowledge Resource (ML2KR); secondly, pronouns in the original text are resolved using Myanmar Pronoun Resolution Algorithm (MPAR); thirdly, the sentences are labeled with semantic roles using Myanmar Verb Frame Resource (MVF), finally, extraction of the sentences containing specific semantic roles for the most relevant entities in text. After that, the system abstracts the important information in fewer words from extraction summary from single documents.

Бесплатно

The Choice of the Best Proposal in Tendering with AHP Method: Case of Procurement of IT Master Plan's Realization

The Choice of the Best Proposal in Tendering with AHP Method: Case of Procurement of IT Master Plan's Realization

Amadou Diabagaté, Abdellah Azmani, Mohamed El Harzli

Статья научная

The computer system has become one of the centerpieces in the functioning of organizations hence the importance of an IT (Information Technology) master plan to manage its development. To find a provider for the IT master plan's realization, organizations are increasingly using tendering as the mode of awarding contracts. This article focuses on the use of multi-criteria decision-making method AHP for analysis and evaluation of tenders during the awarding of contracts of IT master plan's realization. To achieve this goal, a painstaking work was realized, on the one hand, for making an inventory of criteria and sub-criteria involved in the evaluation of bids and on the other hand for specifying the degrees of preference for each pair of criteria and each pair of sub-criteria. Finally, a test was performed by using fictitious tenders. The goals of this work are to make available to members of tenders committee a decision support tool for evaluating tenders of IT master plan's realization submitted by bidders and endow the organizations with effective IT master plans in order to increase the performance of their information systems.

Бесплатно

The Control and Modeling of Diesel Generator Set in Electric Propulsion Ship

The Control and Modeling of Diesel Generator Set in Electric Propulsion Ship

Le Luo, Lan Gao, Hehe Fu

Статья научная

This paper analyzes the characteristics of power system on electric propulsion ship. The mathematical model and simulation model of diesel engine PID speed control system and synchronous generator’s AVR+PSS excitation control system was built. At last the simulation test of suddenly add load was did in MATLAB/simulink environment. The result shows that the speed control and excitation control system has well stability, rapidity and some robustness.

Бесплатно

The Development and Implementation of a Loan Classification Database System

The Development and Implementation of a Loan Classification Database System

Eludire A. A.

Статья научная

This work documents the development and implementation of a commercial bank's loan classification database system. It employed multiple discriminant analysis models to assess the relationship between relevant loan variables and existing bad loan problem. It also made use of mathematical model to replicate the Examiner's classification process to classify loans in a more objective and sober way. Classification of loan is grouping of loans in accordance to their likelihood of ultimate recovery from borrowers. Banking business is one of the most highly levered businesses especially on loan accounts. It is likely to collapse in case of a slight deterioration in quality of loans. Six important factors (propriety of use of funds borrowed; operation of Borrower's overdraft account; cooperation with the Bank, collateral and number of days the loan is past due) were identified and grouped as variables in determining the quality of loan portfolio. The developed classification model shows that there exists a linear relation between loan classification and the six variables considered. Four classification functions were developed and implemented in Microsoft Access database to assist in effective classification. The implementation of a database system makes it easy to store relevant classification information and revert to them whenever needed for comparative analysis on quarterly, half-yearly and annual basis.

Бесплатно

The Extensive Bit-level Encryption System (EBES)

The Extensive Bit-level Encryption System (EBES)

Satyaki Roy

Статья научная

In the present work, the Extensive Bit-level Encryption System (EBES), a bit-level encryption mechanism has been introduced. It is a symmetric key cryptographic technique that combines advanced randomization of bits and serial bitwise feedback generation modules. After repeated testing with a variety of test inputs, frequency analysis, it would be safe to conclude that the algorithm is free from standard cryptographic attacks. It can effectively encrypt short messages and passwords.

Бесплатно

The Image Recognition of Mobile Robot Based on CIE Lab Space

The Image Recognition of Mobile Robot Based on CIE Lab Space

Xuan Zou, Bin Ge

Статья научная

The image recognition of mobile robot is to extract the effective target information. The essence of image extraction is image segmentation. By extracting and distinguishing planar objects and three-dimensional objects, we propose two new algorithms. The color image is extracted by using CIE Lab Space. Then we propose a comparison method through the collection of two image samples. According to the principle of geometric distortion in the geometric space, we can easily distinguish the planar object in the environment. Therefore, Experimental results show that the combination of these two methods is accurate and fast in the color image recognition.

Бесплатно

The Impact of Financial Statement Integration in Machine Learning for Stock Price Prediction

The Impact of Financial Statement Integration in Machine Learning for Stock Price Prediction

Febrian Wahyu Christanto, Victor Gayuh Utomo, Rastri Prathivi, Christine Dewi

Статья научная

In the capital market, there are two methods used by investors to make stock price predictions, namely fundamental analysis, and technical analysis. In computer science, it is possible to make prediction, including stock price prediction, use Machine Learning (ML). While there is research result that said both fundamental and technical parameter should give an optimum prediction there is lack of confirmation in Machine Learning to this result. This research conducts experi-ment using Support Vector Regression (SVR) and Support Vector Machine (SVM) as ML method to predict stock price. Further, the result is compared between 3 groups of parameters, technical only (TEC), financial statement only (FIN) and combination of both (COM). Our experimental results show that integrating financial statements has a neutral impact on SVR predictions but a positive impact on SVM predictions and the accuracy value of the model in this research reached 83%.

Бесплатно

The Implementation of Clinical Decision Support System: A Case Study in Saudi Arabia

The Implementation of Clinical Decision Support System: A Case Study in Saudi Arabia

Sahar S. Alqahtani, Sabah Alshahri, Ahood I. Almaleh, Farrukh Nadeem

Статья научная

In recent years, the healthcare sector has shown inclination towards restructuring of healthcare systems to harmonize with technological innovations and adopting decision support system in routine clinical practices. The objective of this paper is to summarize challenges of Clinical Decision Support System (CDSS) and focus on the effectiveness of CDSS to improve clinical practice. This paper also describes the experience of CDSS in healthcare sector in Saudi Arabia and addresses the requirements for implementing successful CDSS with a real example. This study concludes that healthcare sector is in dire need to increase quality of patients' care and improve clinical practices by adopting CDSS.

Бесплатно

The Leading Role of Digital Technologies in the Development of the Smart City Concept in Azerbaijan

The Leading Role of Digital Technologies in the Development of the Smart City Concept in Azerbaijan

Arzu Huseynova, Ophelya Mazanova

Статья научная

The article describes the application of the Smart City concept and the economic opportunities it creates, infrastructure and services, and opportunities to improve governance. The main features of the Smart City concept, development directions and evolution, standards and solutions, and factors and obstacles to its implementation have been analyzed by the author. The experience of different countries in the application of digital technologies is discussed. The article provides the scope and structure of the "smart" market, application stages, and scenarios The international experience in this direction was widely analyzed and examples were shown. The article talks about smart cities, the construction of which has already begun in Azerbaijan. The application of the smart city concept in Azerbaijan has been studied. It is stressed that the spread of digital technologies for the construction of a smart city in Azerbaijan is a prerequisite. The Network Readiness Index (NRI) identifies the indicators that are holding back Azerbaijan in the ranking for 2021.

Бесплатно

The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures

The Major Physical Layer Constraints of Fiber Optical fiber Packet Switch Architectures

Devesh Pratap Singh

Статья научная

Many optical packet switch (OPS) architectures are proposed and demonstrated. In the design of these architectures, most of the attention is paid on the network layer parameters like high through put (low packet loss probability) and low latency, etc. and to achieve these goals. The structure of the architectures becomes very complex. In real scenarios, these architectures may not work efficiently because of physical layer constraints. Hence, cross layer optimization needs to be considered. This paper addresses the major physical layer constraints, and it has been found that the optical packet switch architecture can work efficiently within the bounded regimes which can be called as an operation window.

Бесплатно

The Novel Life Cycle Model for Component Based Software System Based on Architecture Quality Using KCW Framework

The Novel Life Cycle Model for Component Based Software System Based on Architecture Quality Using KCW Framework

S. Kaliraj, N. Premkumar, A. Bharathi

Статья научная

With the growing size of software’s and increasing needs of people we need a complex software system to provide a solution to the many problems among the humans. For that, we need to develop the software system with high quality and limited amount of time. Due to this reason, the software development process is moved to the component based software development (CBSD). The preliminary life cycle models of software development is not compatible with component based software development. For that we need a novel life cycle model to develop the software system using components with high quality. Some of the life cycle models are developed by some researchers, but when we are considering the quality of the software system those models are not assured the highest quality. Because of this we have developed one novel life cycle model based on v-model using KCW framework which assures the quality of the architecture of a software system itself.

Бесплатно

The Obstacles in Big Data Process

The Obstacles in Big Data Process

Rasim M. Alguliyev, Rena T. Gasimova, Rahim N. Abbaslı

Статья научная

The increasing amount of data and a need to analyze the given data in a timely manner for multiple purposes has created a serious barrier in the big data analysis process. This article describes the challenges that big data creates at each step of the big data analysis process. These problems include typical analytical problems as well as the most uncommon challenges that are futuristic for the big data only. The article breaks down problems for each step of the big data analysis process and discusses these problems separately at each stage. It also offers some simplistic ways to solve these problems.

Бесплатно

The Probabilistic Method for Solving Minimum Vertex Cover Problem Using Systems of Non-linear Equations

The Probabilistic Method for Solving Minimum Vertex Cover Problem Using Systems of Non-linear Equations

Listrovoy Sergey Vladimirovich, Motsnyi Stanislav Vladimirovich

Статья научная

In this paper the probabilistic method is presented for solving the minimum vertex cover problem using systems of non-linear equations that are formed on the basis of a neighborhood relationship of a particular vertex of a given graph. The minimum vertex cover problem is one of the classic mathematical optimization problems that have been shown to be NP-hard. It has a lot of real-world applications in different fields of science and technology. This study finds solutions to this problem by means of the two basic procedures. In the first procedure three probabilistic pairs of variables according to the maximum vertex degree are formed and processed accordingly. The second procedure checks a given graph for the presence of the leaf vertices. Special software package to check the validity of these procedures was written. The experiment results show that our method has significantly better time complexity and much smaller frequency of the approximation errors in comparison with one of the most currently efficient algorithms.

Бесплатно

Журнал