BOHR International Journal of Smart Computing and Information Technology最新文献

筛选
英文 中文
The Importance of ICTs on Service Delivery at MTC, Namibia 信息通信技术对纳米比亚MTC服务提供的重要性
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.008
Ndahafa Eline Namene, Nikodemus Angula
{"title":"The Importance of ICTs on Service Delivery at MTC, Namibia","authors":"Ndahafa Eline Namene, Nikodemus Angula","doi":"10.54646/bijscit.008","DOIUrl":"https://doi.org/10.54646/bijscit.008","url":null,"abstract":"The purpose of the study was to examine the effect of information and communication technology on service delivery in the Telecommunications industry. A descriptive survey research method was used as it helped the researcher to determine how the use of ICTs can improve service delivery at MTC, Namibia. Findings showed that variables of information and communication technology have positive effect on service delivery. Therefore, the study concluded that training collectively with changes in corporate policies and support, can result in better service delivery. It was recommended that employees have to acquire skills on how to use computers and communication software in order to offer efficient services. It is vital for the Telecommunications sector to foster digital opportunities by enhancing the use of ICTs to improve service delivery. Barriers to be overcome are no longer only technological but also educational, cultural and linguistic in nature. With that in mind, neglecting to invest sufficiently in human capacity may result in clientele dissatisfaction.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114434391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A case study: Grid services for satellite image processing 案例研究:用于卫星图像处理的网格服务
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.20
R. Patil, Mane Siddhi
{"title":"A case study: Grid services for satellite image processing","authors":"R. Patil, Mane Siddhi","doi":"10.54646/bijscit.20","DOIUrl":"https://doi.org/10.54646/bijscit.20","url":null,"abstract":"Satellite image processing is an intricate task that requires vast computation and data processing, which cannot be handled by a single computer. Furthermore, the processing of the massive amount of data accumulated by the satellite is a huge challenge for the end user. Hence, grid computing is the essential platform to provide high computing performance at the user end. This article reviews the grid services used for satellite image processing and significant data processing.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122131296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Semantic Interoperability of Regional Trends of Disease Surveillance Data for Namibia Through a Health-Standards-Based Approach 通过基于健康标准的方法实现纳米比亚疾病监测数据区域趋势的语义互操作性
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.005
Nikodemus Angula, N. Dlodlo, Progress Mtshali
{"title":"Enabling Semantic Interoperability of Regional Trends of Disease Surveillance Data for Namibia Through a Health-Standards-Based Approach","authors":"Nikodemus Angula, N. Dlodlo, Progress Mtshali","doi":"10.54646/bijscit.005","DOIUrl":"https://doi.org/10.54646/bijscit.005","url":null,"abstract":"The Ministry of Health and Social Services in Namibia under the division of epidemiology uses a manual paper-based approach to capture disease surveillance data through 5 levels of reporting which include the community level, the health facility level, the district level, and the national level. As a result, this method of communicating and exchanging disease surveillance information is cost and time consuming, which delay disease surveillance information from reaching the head office on time. The current method that is being used to exchange and communicate disease surveillance data is a manual process which very time consuming due to the fact that surveillance officers have to organise and store the files and hunt down the information when it is needed and this can take time. Therefore, the study developed a prototype that aggregates disease surveillance data from the 14 regions in Namibia and can thus enable the disease service office to capture disease surveillance data through the use of mobile devices. The functionality of the prototype would allow a disease surveillance office in one regional office to access disease surveillance data of other regional office in real time. The method used to communicate disease surveillance data is through the excel spreadsheet (IDSR) which is called the integrated disease surveillance and response. Furthermore, the excel file will be sent to the relevant authority through email. However, we still do not have a web based system to report cases of diseases, instead this is a process starting from the intermediate hospital disease surveillance data which is captured then sent to the regional office and from the regional office the information is sent to the district office and then sent to the national office and from the national office the information is further sent to the WHO and other development partners as well as to the top management or to the highest authority. So it does not end at the national level but goes to management such as the Permanent Secretary, and the data is used to inform the development partners and the national surveillance office prepares official letters to the management as a form of reporting disease surveillance data. The symphonic surveillance office helps to detect a particular disease. The doctors send an investigation case form to the laboratory for testing the disease that has been identified.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Intelligence Approach to Handling Data Leakage Risks in the Corporate Information Security Process 在企业资讯保安过程中处理资料外泄风险的改进智能方法
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.17
K. T, V. A, S. M
{"title":"An Improved Intelligence Approach to Handling Data Leakage Risks in the Corporate Information Security Process","authors":"K. T, V. A, S. M","doi":"10.54646/bijscit.17","DOIUrl":"https://doi.org/10.54646/bijscit.17","url":null,"abstract":"onfidentialinformationisofgreatinteresttocompetingfirms.Thiscausesaggressionandattacks.Many people underestimate the importance of the threat, and as a result, it can lead to collapse and bankruptcy for the company. Even a single case of malpractice can result in millions in damages and the loss of customer trust. Threats are subject to data on organization structure, status, and operations. Sources of such threats are its competitors, corruptofficials,andcriminals.Theyareintroducedwithcertainvalue-protectedinformationandmodifiedinorder to cause financial damage. Even 20% of such a decision can result in information leakage. Sometimes the loss of companysecretscanbeduetotheinexperienceofemployeesoralackofsecuritysystems.Inthispaper,animproved intelligence approach to handling data leakage risks in the corporate information security process is proposed. Accounting automatically calculates weighted relative class systems through a complete, complex security of the most important processes and technical and organizational measures. Their combination is an antivirus system, a firewall, and protection from electromagnetic radiation. Systems protect information on electronic media sent through communication channels, access exemptions for various documents, create backup copies, and recover confidential information after damage.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128322787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large Semi Primes Factorization with Its Implications to RSA Cryptosystems 大半素数分解及其对RSA密码系统的启示
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.011
R. Omollo, Arnold Okoth
{"title":"Large Semi Primes Factorization with Its Implications to RSA Cryptosystems","authors":"R. Omollo, Arnold Okoth","doi":"10.54646/bijscit.011","DOIUrl":"https://doi.org/10.54646/bijscit.011","url":null,"abstract":"RSA’s strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of classical computers. In this paper, we present the analysis of Fermat’s Last Theorem and Arnold’s Theorem. Also highlighted include new techniques such as Arnold’s Digitized Summation Technique (A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce the time taken to factorize large semi primes as for the case in RSA Cryptosystem.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124567721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy clustering and energy resourceful routing protocol (FCER2P) for smart dust 基于模糊聚类和能量资源路由协议的智能粉尘
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.22
R. D, Rajanna G. S.
{"title":"Fuzzy clustering and energy resourceful routing protocol (FCER2P) for smart dust","authors":"R. D, Rajanna G. S.","doi":"10.54646/bijscit.22","DOIUrl":"https://doi.org/10.54646/bijscit.22","url":null,"abstract":"Sensor nodes in smart dust are used to track and identify data that is being transferred to a sink. The accessibility of node energy poses a significant challenge for smart dust and may have an impact on the long-term viability of the network. As a result, constructing smart dust must take into account the need for algorithms and techniques that enable the most use of scarce resources, especially energy resources. For instance, routing algorithms are distinctive algorithms because they have a clear and direct connection with network longevity and energy. The offered routing techniques use clustering each round and single-hop data delivery to the sink. A Fuzzy Clustering and Energy Resourceful Routing Protocol (FCER2P) that reduces smart dust energy consumption and lengthens lifespan of the network is proposed in this research. Using a specified threshold, FCER2P proposes a new cluster-based fuzzy routing mechanism that can make use of clustering and multiple hop routing capabilities simultaneously. This research is innovative in that it adjusts multi-hop connectivity by anticipating the optimum intermediate node for aggregating and the sink, eliminates clustering each round while taking a fixed threshold into account, and eliminates clustering per round altogether. When choosing the intermediary node to employ, some fuzzy parameters, including residual energy, the number of neighbors, and the distance to the sink, are taken into account.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125462694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Translator from Portuguese (Voice and Text) to Portuguese Sign Language 自动翻译从葡萄牙语(语音和文字)到葡萄牙语手语
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.014
Ma¨eva de Brito, N. Domingues
{"title":"Automatic Translator from Portuguese (Voice and Text) to Portuguese Sign Language","authors":"Ma¨eva de Brito, N. Domingues","doi":"10.54646/bijscit.014","DOIUrl":"https://doi.org/10.54646/bijscit.014","url":null,"abstract":"One of the major focuses of technology, engineering and computer science is to solve problems and improve the quality of life in health. The relationship between health and technology has made great advances in the last decades, and many cooperations are foreseen. Some citizens still have to deal with many obstacles daily to cope with the society as it is designed. One of the obstacles citizens deal with is deaf and hearing impairment. In Portugal, there are about 100,000 to 150,000 people with some level of hearing loss, and of these, around 30,000 people use Portuguese Sign Language as their mother tongue ([3]; National Institute for Rehabilitation, 1996). The greatest difficulties are appropriate or amend if necessary. encountered by them are poor communication with hearing people and the need of a translator person. Communication became even more complicated with the mandatory use of face mask, respect for the maximum number of people per division and social distancing due to the COVID-19 pandemic. To diminish or even solve this issue, the authors developed an automatic voice and text translation system to Portuguese sign language with captions. Sign language will be very useful for deaf and hearing impairment citizens, and captions will be useful for deaf and hearing impairment citizens who don’t understand sign language. For that, programming language tools were developed to create a translator with those requests. This article describes the developments and achievements. For the proof of concept, the translator started with 16 images in the database and reached a confidence level between 70 and 90%. This is an incentive to further developments that authors are continuing to produce more improvements in the developed tool.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel intrusion detection system for IIoT using inception convolutional neural network 基于初始卷积神经网络的工业物联网入侵检测系统
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.23
Ofoegbunam Emmanuel Izuchukwu, Chigbo Paul Amalu, Ajao Saheed
{"title":"A novel intrusion detection system for IIoT using inception convolutional neural network","authors":"Ofoegbunam Emmanuel Izuchukwu, Chigbo Paul Amalu, Ajao Saheed","doi":"10.54646/bijscit.23","DOIUrl":"https://doi.org/10.54646/bijscit.23","url":null,"abstract":"The purpose of this study is to compare the accuracy of several deep-learning models for the identification of rice weed. In this study, 1500 datasets of local rice and 1000 datasets of weed were resized and applied to the input size of the network, respectively. A total of 70% of the data were used for training, and the remaining 30% were used for validation. MATLAB R2018a was used to construct the AlexNet pre-trained model using a transfer learning strategy, and by changing the AlexNet model, RiceWeedNet, a convolutional neural network, was created. Metrics such as network accuracy, recognition accuracy, precision, and recall were used to assess both models’ performances. While the test set’s identification accuracy is 97.713415%, its precision is 0.9776, and its recall value is 0.9803. The RiceWeedNet model achieved a network accuracy of 100%. A network accuracy of 90% and a recognition accuracy of 73.780488% were reported by the AlexNet model, respectively. The created model may be used instead of conventional weed detectors.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine 基于支持向量机的云计算容错方法
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.010
Gajendra Sharma
{"title":"A Practical Fault Tolerance Approach in Cloud Computing Using Support Vector Machine","authors":"Gajendra Sharma","doi":"10.54646/bijscit.010","DOIUrl":"https://doi.org/10.54646/bijscit.010","url":null,"abstract":"Fault tolerance is an important issue in the field of cloud computing which is concerned with the techniques or mechanism needed to enable a system to tolerate the faults that may encounter during its functioning. Fault tolerance policy can be categorized into three categories viz. proactive, reactive and adaptive. Providing a systematic solution the loss can be minimized and guarantee the availability and reliability of the critical services. The purpose and scope of this study is to recommend Support Vector Machine, a supervised machine learning algorithm to proactively monitor the fault so as to increase the availability and reliability by combining the strength of machine learning algorithm with cloud computing.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124717935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithm to Extract the Costume’s Size by Fuzzy Logic 基于模糊逻辑的服装尺寸提取算法
BOHR International Journal of Smart Computing and Information Technology Pub Date : 1900-01-01 DOI: 10.54646/bijscit.012
Thi Nguyen Mong Hien, Tran Thi Minh Hieu
{"title":"An Algorithm to Extract the Costume’s Size by Fuzzy Logic","authors":"Thi Nguyen Mong Hien, Tran Thi Minh Hieu","doi":"10.54646/bijscit.012","DOIUrl":"https://doi.org/10.54646/bijscit.012","url":null,"abstract":"This study presents the algorithm to extract the size of the ready-to-wear clothing, which is men's T-shirts with f. house branding. The table has four sizes, and the size labels are signed by S, M, L, and XL. Authors use fuzzy logic to establish the algorithm model. In this model, the input variables have three inputs, which are the body height, weight, and bust girth measurements. In the output variables are the results of size coding. From this size chart table, the authors choose the primary dimensions to be the input variables of the algorithm. The first dimension is a vertical dimension, and the other two dimensions are horizontal dimensions. The vertical dimension is height. Two horizontal dimensions are weight and bust girth. The sizes in the table are encoded to be used for the algorithm results, and the output is the encoded sequence number, which is also the size to be searched. After running this simulation program, measurements of three primary dimensions in size are tested on customers using two methods for two objects. An algorithm for extracting the size of ready-to-wear clothes by the fuzzy logic method reduces the time it takes to choose the size that fits body measurements. In addition, this research direction is consistent with the trend of digital development.","PeriodicalId":112029,"journal":{"name":"BOHR International Journal of Smart Computing and Information Technology","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127573334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信