{"title":"Applying Data Mining in Surveillance: Detecting Suspicious Activity on Social Networks","authors":"F. Harrag, Ali Alshehri","doi":"10.4018/ijdst.317930","DOIUrl":"https://doi.org/10.4018/ijdst.317930","url":null,"abstract":"In the current times where human safety is threatened by man-made and natural calamities, surveillance systems have gained immense importance. But, even in presence of high definition (HD) security cameras and manpower to monitor the live feed 24/7, room for missing important information due to human error exists. In addition to that, employing an adequate number of people for the job is not always feasible either. The solution lies in a system that allows automated surveillance through classification and other data mining techniques that can be used for extraction of useful information out of these inputs. In this research, a data mining-based framework has been proposed for surveillance. The research includes interpretation of data from different networks using hybrid data mining technique. In order to show the validity of the proposed hybrid data mining technique, an online data set containing network of a suspicious group has been utilized and main leaders of network has been identified.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131401212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Genetic Algorithm-Based Approach to Solve a New Time-Limited Travelling Salesman Problem","authors":"Moumita Mondal, D. Srivastava","doi":"10.4018/ijdst.317377","DOIUrl":"https://doi.org/10.4018/ijdst.317377","url":null,"abstract":"In this paper, the authors have explained a time limited travelling salesman problem (TSP) where a time limit is associated with each city. The traveller must reach each city on or before the predetermined time limit (that is fixed for each city) in his/her tour. Travel cost is also a parameter for the proposed model. This time limit indicates the maximum time unit by which the traveller must reach a particular city. Here, travel cost is the objective of the problem. Moreover, total travel time is also fixed for a complete tour. This research recently introduced this time limit for each of the cities. The proposed TSP is solved by using a genetic algorithm-based method. The cyclic crossover and special mutation operations have been adapted to GA for solving the proposed TSP. To show the effectiveness of proposed algorithm, the authors have considered some benchmark instances. Then the authors redefine a few benchmark instances for the proposed TSP. Computational results with different data sets are presented.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131772460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weakening the Bullwhip Effect in the Supply Chain Based on Data Fusion","authors":"Zhonghuai Wang, G. Cheng","doi":"10.4018/ijdst.307945","DOIUrl":"https://doi.org/10.4018/ijdst.307945","url":null,"abstract":"In the increasingly competitive society, as the third profit center of the enterprise, the supply chain makes scholars and industry related with the supply chain more interested in the study of relevant issues. Some scholars believe that the application of predictive analytics could have a tremendous impact on the supply chain. The uncertainty of supply chain demand and bullwhip effect challenge the supply chain. Data fusion can effectively reduce the uncertainty of demand and amplification effect. In this study, a new conceptual model was established on the traditional supply chain based on data fusion. Results show that the conceptual model refers to data fusion for solving the uncertain and inconsistent multi-source data by Bayesian estimation to provide reasonable decision information for supply chain managers.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115508365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of an Online Shopping Platform Based on DApp","authors":"Shaoying Wang, Shuo Yan, Fen Wang","doi":"10.4018/ijdst.307944","DOIUrl":"https://doi.org/10.4018/ijdst.307944","url":null,"abstract":"Shopping platform increases service speed and reduces transaction cost. However, it also leads to issues of information asymmetry. Some sellers fabricate the price of promotional goods prior to promotion, not only affecting the reputation of sellers, but also viciously influencing the goodwill of the shopping websites. On this basis, a shopping decentralized Application (DApp) based on blockchain technology was designed; this research integrates the blockchain and shopping App. The App used the decentralized technology of distributed blockchain tamper resistance and its advantages of distributed ledger, decentralization, traceability, smart contract, and information tamper-proof to reduce the adverse impact of information asymmetry on consumers.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116656796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolutionary Game of Knowledge Sharing in the Advanced Manufacturing Industry","authors":"Depeng Li, Renyong Hou, Qing Yan","doi":"10.4018/ijdst.307947","DOIUrl":"https://doi.org/10.4018/ijdst.307947","url":null,"abstract":"With the advent of the era of knowledge economy, knowledge resources have gradually become the core resources for industrial development. For advanced manufacturing, strengthening the knowledge sharing between enterprises has become a key factor of the industry to maintain their core competitiveness. Based on the perspective of knowledge sharing, this study constructs an evolutionary game model among advanced manufacturing enterprises and analyzes the dynamic evolution process of enterprises. The result shows that knowledge spillover effects, excess return distribution, knowledge costs, hidden income, and punishment mechanisms are the main factors influencing the choice of evolutionary strategies for knowledge sharing among enterprises. Based on the analysis results, the study gives some suggestions to encourage advanced manufacturing companies to choose knowledge sharing strategies, to promote the rapid development of advanced manufacturing.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121219963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Management Capability, Organizational Resilience, and the Growth of SMEs","authors":"Shuli Zheng, Yuyan Shen, Luming Liu","doi":"10.4018/ijdst.313053","DOIUrl":"https://doi.org/10.4018/ijdst.313053","url":null,"abstract":"How small and medium-sized enterprises (SMEs) survive and grow is a matter of great concern not just to enterprises but also to governments. Although past studies have mainly focused on the driving forces of corporate growth, they have yet to investigate how SMEs can build resilience and then achieve growth through their own knowledge management within challenging environments. Therefore, this paper empirically examines the internal links among knowledge management capabilities (KMC), organizational resilience (ORE), and the growth of SMEs under the influence of environmental munificence (EM). After analyzing the sample data from Chinese SMEs, results show that KMC actively promotes the growth of SMEs from both size expansion and qualitative optimization and that it can significantly positively affect the construction of ORE. In turn, ORE plays an intermediary role in the relationship between KMC and qualitative optimization. In addition, EM has negative moderating effects both on the relationship between KMC and the quality optimization of SMEs and that between KMC and ORE.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117001518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Growth Path of Industrial Clusters Embedded in Global Value Chains From the Perspective of Knowledge Transfer","authors":"He Bin, Meng Weidong","doi":"10.4018/ijdst.307942","DOIUrl":"https://doi.org/10.4018/ijdst.307942","url":null,"abstract":"How local industrial clusters realize industrial upgrading in the development process of embedded global value chain is the central topic. To explore how industrial clusters achieve the enhancement of their innovation capability and value chains when they are embedded in the global value chain, from the perspective of knowledge transfer, three fuzzy game models of knowledge transfer paths were constructed, and the model of the realization mechanism of knowledge transfer and its stability condition was analyzed, which make clear the path of cluster growth under different embedding modes. Results show that the knowledge transformation ability of local industrial clusters is the determining factor that the knowledge transfer can smoothly achieve and become stable. The conclusion also shows the feasibility of the cross-sectional growth of industrial clusters by actively embedding the global value chain and acquiring external knowledge transfer if the industrial clusters want to enhance their technology accumulation, their innovation ability, and their position in the global value chain.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133687044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bioinformatics and Patient Survival Analysis of Digestive Tract Tumor Marker NCAPG Based on Public Medical Databases","authors":"Jiahang Wang, M. Lin, Ouyang Fang","doi":"10.4018/ijdst.307946","DOIUrl":"https://doi.org/10.4018/ijdst.307946","url":null,"abstract":"The digestive tract tumor disease is a serious threat to human health. The effective identification of digestive tract tumor markers with specific characteristics is the key to the diagnosis, treatment, recognition, and rehabilitation analysis of digestive tract tumor diseases. Public medical data resource platforms represented by Oncomine, Gene Expression Profiling Interactive Analysis (GEPIA), and Human Protein Atlas (HPA) databases provide a new path for knowledge management and knowledge discovery in the medical field. Therefore, a computational analysis framework for tumor marker recognition was established to mine from massive and diversified data sets and explore the diagnosis, expression, and prognosis of Non-SMC Condensin I Complex, Subunit G (NCAPG) in gastrointestinal tumors. Patient survival and correlation analyses suggested the mRNA and protein levels of NCAPG were highly expressed in different digestive tract tumors. This study provides new treatment methods for patients with gastrointestinal cancer and a reference for the public.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126836955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Naziya Hussain, P. Rani, N. Kumar, M. G. Chaudhary
{"title":"A Deep Comprehensive Research Architecture, Characteristics, Challenges, Issues, and Benefits of Routing Protocol for Vehicular Ad-Hoc Networks","authors":"Naziya Hussain, P. Rani, N. Kumar, M. G. Chaudhary","doi":"10.4018/ijdst.307900","DOIUrl":"https://doi.org/10.4018/ijdst.307900","url":null,"abstract":"VANETs or vehicular ad hoc networks are essential & promising research areas in the ad hoc networks field. The core objective to set up VANET can upgrade road safety & diminish accidents quantity. Routing has been a complex task in VANET as the nodes are highly mobile and consequently, topology alters very quickly. Hence, it is difficult to distribute packets within the minimum period. Contemporary routing protocols cannot meet all demands and issues in VANETs routing. To provide a suitable routing protocol, the crucial factor is to analyze the VANET's protocols for routing. Hence, the paper begins by presenting the fundamental structural design of VANETs to provide a thorough account of several available routing procedures that incorporate their benefits and drawbacks. The paper concludes by providing a summary of the available routing protocols that are used in VANETs.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126753104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Access Control Model of Electric Power Information System Based on an Artificial Intelligence Semantic Network","authors":"Ying Zhang","doi":"10.4018/ijdst.308003","DOIUrl":"https://doi.org/10.4018/ijdst.308003","url":null,"abstract":"In order to solve the requirements of scheduling automation system for access control and the defects of access control model, an automatic access control model of power information system based on intelligent semantic network was designed. The overall structure of access control model of power information system is given. The detector is designed by artificial intelligence technology, combining artificial neural network and artificial immune algorithm, which provides the basis for checking access request module. By checking the access request module to find out whether there is a detector matching the access request, to judge whether the access request is legitimate. The verification results show that, the model can effectively support the access and modification of legitimate users and prevent the access of illegal users with high control precision.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"68 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}