International Journal of Information Technology and Computer Science最新文献

筛选
英文 中文
Evaluation of Software Quality in Test-driven Development: A Perspective of Measurement and Metrics 测试驱动开发中的软件质量评估:测量和度量的视角
International Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.5815/ijitcs.2022.06.02
Ikenna Caesar Nwandu, J. Odii, E. C. Nwokorie, S. A. Okolie
{"title":"Evaluation of Software Quality in Test-driven Development: A Perspective of Measurement and Metrics","authors":"Ikenna Caesar Nwandu, J. Odii, E. C. Nwokorie, S. A. Okolie","doi":"10.5815/ijitcs.2022.06.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.06.02","url":null,"abstract":"A software product is expected to be subjected to critical evaluation on its quality attributes in order to ascertain that target quality requirements are met, and that those quality attributes responsible for revealing software quality are not omitted in the software development process. Software metrics are essential to accomplish the task. This paper has carried out an exploratory study of software measurement and software metrics in tandem. The study took into cognizance the interwoven nature of the duo in measuring and revealing software quality. The study formulated a model that expressed the mutual bonding that propels both measurement and metrics to describing software quality in numeric quantities of software attributes. The study identified six software attributes whose values are considered enough quantities to reveal the quality of a software product. The identification enabled the study to create a model equation aimed at giving a numeric value for the complete evaluation of a software system. The result of the implementation of the six software attributes into the model equation showed that two software products employed in the study are of high-quality, having quality values of 0.93 and 0.86 respectively. The attributes produced values that confirmed the maintainability (25 seconds & 20 seconds respectively) and reliability (0.78 & 0.80 respectively) of both software products among other differing features that characterize them.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114861527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parallel DBSCAN Clustering Algorithm Using Hadoop Map-reduce Framework for Spatial Data 基于Hadoop Map-reduce框架的空间数据并行DBSCAN聚类算法
International Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.5815/ijitcs.2022.06.01
M. C., C. H
{"title":"Parallel DBSCAN Clustering Algorithm Using Hadoop Map-reduce Framework for Spatial Data","authors":"M. C., C. H","doi":"10.5815/ijitcs.2022.06.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.06.01","url":null,"abstract":"Data clustering is the first step for future applications of big data analysis. It is a driving model for Artificial Intelligence and Machine Learning architectures. Processing large volumes of data in faster mode is a big challenge in these applications. which requires fast and efficient algorithms for handling big data. Parallel clustering algorithms are one promising design, which increases the speed of handling such big data. In this paper, a parallel algorithm for clustering a spatial dataset called the P-DBSCAN algorithm is implemented using Hadoop map-reduce framework. This research paper signifies the improvement for data clustering in data analytic applications. The new P-DBSCAN algorithm is executed over generated dataset. The result of this parallel algorithm is compared with existing DBSCAN algorithm to show improvement of runtime performance. This work offers an increase in the performance of execution time. In addition, the outcome of P-DBSCAN shows how to resolve the scalability problem of a large data set.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparing the Performances of Ensemble classifiers to Detect Eye Stat 集成分类器在眼状态检测中的性能比较
International Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.5815/ijitcs.2022.06.04
K. Akyol, Abdulkadir Karacı
{"title":"Comparing the Performances of Ensemble classifiers to Detect Eye Stat","authors":"K. Akyol, Abdulkadir Karacı","doi":"10.5815/ijitcs.2022.06.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.06.04","url":null,"abstract":"Brain signals required for the brain-computer interface are obtained through the electroencephalography (EEG) method. EEG data is used in the analysis of many problems such as epileptic seizure detection, bipolar mood disorder, attention deficit, and detection of the sleep state of the vehicle driver. It is very important to determine whether the eye is open or closed, which is a substantial organ for the determination of the cognitive state of the person. The aim of this paper is to present a stable and successful model for detecting the eye states that are opened or closed. In this context, the performances of several ensemble classifiers were examined on the Emotiv EEG Neuroheadset dataset, which has 14 features excluding the target variable, 14980 records that have 8225 eye states opened and 6755 eye states closed. In the experiments, firstly the min-max normalization process was applied to the dataset, and then the classification performances of these classifiers were evaluated via a 5-fold cross-validation technique. The performance of each model was measured using accuracy, sensitivity, and specificity metrics. The obtained results show that the Random Forest algorithm is an acceptable level with 92.61% value of accuracy, 94.31% value of sensitivity and 91.36% value of specificity for detecting the eye state.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Data Mining Techniques to Predict Cardiovascular Disease 数据挖掘技术预测心血管疾病的比较分析
International Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.5815/ijitcs.2022.06.03
Md. Al Muzahid Nayim, Fahmidul Alam, Mostafa Rasel, Ragib Shahriar, Dipannyta Nandi
{"title":"Comparative Analysis of Data Mining Techniques to Predict Cardiovascular Disease","authors":"Md. Al Muzahid Nayim, Fahmidul Alam, Mostafa Rasel, Ragib Shahriar, Dipannyta Nandi","doi":"10.5815/ijitcs.2022.06.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.06.03","url":null,"abstract":"Cardiovascular disease is the leading cause of death. In recent days, most people are living with cardiovascular disease because of their unhealthy lifestyle and the most alarming issue is the majority of them do not get any symptoms in the early stage. This is why this disease is becoming more deadly. However, medical science has a large amount of data regarding cardiovascular disease, so this data can be used to apply data mining techniques to predict cardiovascular disease at the early stage to reduce its deadly effect. Here, five data mining classification techniques, such as: Naïve Bayes, K-Nearest Neighbors, Support Vector Machine, Random Forest and Decision Tree were implemented in the WEKA tool to get the best accuracy rate and a dataset of 12 attributes with more than 300 instances was used to apply all the data mining techniques to get the best accuracy rate. After doing this research people who are at the early stage of cardiovascular disease or probably going to be a victim can be identified more accurately.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121647953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent Management of a Network of Smart Billboards on the IoT Platform in Industry 4.0 工业4.0下物联网平台下智能广告牌网络的智能化管理
International Journal of Information Technology and Computer Science Pub Date : 2022-12-08 DOI: 10.5815/ijitcs.2022.06.05
Hashimova Kamala
{"title":"Intelligent Management of a Network of Smart Billboards on the IoT Platform in Industry 4.0","authors":"Hashimova Kamala","doi":"10.5815/ijitcs.2022.06.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.06.05","url":null,"abstract":"Artificial intelligence plays a special role in new technologies used to develop advertising and marketing. Artificial intelligence, which plays a special role in improving the effectiveness of advertising and marketing, has had its say in the business market, and this process continues. A quick search for any product in Internet search engines is an indispensable process for the marketing market. With the help of artificial intelligence, it is possible to present the required product or service in a timely manner, at a high level, taking into account the individual characteristics of the customer using virtual environments and street advertising. In the modern world of cyber-physical systems, machines created using intelligent algorithms facilitate human labor in almost all areas. Intelligent management of a network of smart billboards AI research in advertising and marketing has a positive impact on economic development. The article deals with the application of artificial intelligence in the field of advertising and the principle of their work. In this area, the processes of application of new technologies are studied. When preparing the article, scientific analysis of problems and their solutions, application of results, methodological system approach were used.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126080658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of an Improved Obstacle Avoidance Model for Land Mower 一种改进型割草机避障模型设计与实现
International Journal of Information Technology and Computer Science Pub Date : 2022-10-08 DOI: 10.5815/ijitcs.2022.05.03
Samuel M. Alade, Adebayo S. Afonrinwo
{"title":"Design and Implementation of an Improved Obstacle Avoidance Model for Land Mower","authors":"Samuel M. Alade, Adebayo S. Afonrinwo","doi":"10.5815/ijitcs.2022.05.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.05.03","url":null,"abstract":"The paper presents the design, simulation and evaluation of an improved obstacle avoidance model for the lawnmower. Studies has shown that there has been few or no work done has on the total minimization of computational time in obstacle avoidances of land mower. Sample image data were collected through a digital camera of high resolution. The obstacle avoidance model was designed using the Unified Modelling Language tools to model the autonomous system from the higher-level perspective of the structural composition of the system. Automata theory was used to model two major components of the system, which are the conversion of the colour image to binary and the obstacle recognizer components by neural network. The model was simulated using the and evaluated using the false acceptance rate and false rejection rate as performance metrics. Results showed that the model obtained False Acceptance Rate and False Rejection Rate values of 0.075 and 0.05 respectively. In addition, the efficiency of the proposed algorithm used in the present work shows that the time taken to avoid obstacles was faster when compared with another existing model.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114156686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Studies Comparing Process Mining Tools 过程挖掘工具比较研究的系统文献综述
International Journal of Information Technology and Computer Science Pub Date : 2022-10-08 DOI: 10.5815/ijitcs.2022.05.01
Cuma Ali Kesici, N. Ozkan, Sedat Taskesenlioglu, T. Erdogan
{"title":"A Systematic Literature Review of Studies Comparing Process Mining Tools","authors":"Cuma Ali Kesici, N. Ozkan, Sedat Taskesenlioglu, T. Erdogan","doi":"10.5815/ijitcs.2022.05.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.05.01","url":null,"abstract":"Process Mining (PM) and PM tool abilities play a significant role in meeting the needs of organizations in terms of getting benefits from their processes and event data, especially in this digital era. The success of PM initiatives in producing effective and efficient outputs and outcomes that organizations desire is largely dependent on the capabilities of the PM tools. This importance of the tools makes the selection of them for a specific context critical. In the selection process of appropriate tools, a comparison of them can lead organizations to an effective result. In order to meet this need and to give insight to both practitioners and researchers, in our study, we systematically reviewed the literature and elicited the papers that compare PM tools, yielding comprehensive results through a comparison of available PM tools. It specifically delivers tools’ comparison frequency, methods and criteria used to compare them, strengths and weaknesses of the compared tools for the selection of appropriate PM tools, and findings related to the identified papers' trends and demographics. Although some articles conduct a comparison for the PM tools, there is a lack of literature reviews on the studies that compare PM tools in the market. As far as we know, this paper presents the first example of a review in literature in this regard.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124089381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparison of Missing Value Imputation Techniques on Coupon Acceptance Prediction 优惠券接受预测中缺失值估算方法的比较
International Journal of Information Technology and Computer Science Pub Date : 2022-10-08 DOI: 10.5815/ijitcs.2022.05.02
Rahin Atiq, Farzana Fariha, Mutasim Mahmud, Sadman S. Yeamin, K. I. Rushee, Shamsur Rahim
{"title":"A Comparison of Missing Value Imputation Techniques on Coupon Acceptance Prediction","authors":"Rahin Atiq, Farzana Fariha, Mutasim Mahmud, Sadman S. Yeamin, K. I. Rushee, Shamsur Rahim","doi":"10.5815/ijitcs.2022.05.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.05.02","url":null,"abstract":"The In-Vehicle Coupon Recommendation System is a type of coupon used to represent an idea of different driving scenarios to users. Basically, with the help of presenting the scenarios, the people’s opinion is taken on whether they will accept the coupon or not. The coupons offered in the survey were for Bar, Coffee Shop, Restaurants, and Take Away. The dataset consists of various attributes that capture precise information about the clients to give a coupon recommendation. The dataset is significant to shops to determine whether the coupons they offer are benefi-cial or not, depending on the different characteristics and scenarios of the users. A major problem with this dataset was that the dataset was imbalanced and mixed with missing values. Handling the missing values and imbalanced class problems could affect the prediction results. In the paper, we analysed the impact of four different imputation techniques (Frequent value, mean, KNN, MICE) to replace the missing values and use them to create prediction mod-els. As for models, we applied six classifier algorithms (Naive Bayes, Deep Learning, Logistic Regression, Decision Tree, Random Forest, and Gradient Boosted Tree). This paper aims to analyse the impact of the imputation techniques on the dataset alongside the outcomes of the classifiers to find the most accurate model among them. So that shops or stores that offer coupons or vouchers would get a real idea about their target customers. From our research, we found out that KNN imputation with Deep Learning classifier gave the most accurate outcome for prediction and false-negative rate.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115548790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying Scrum Development on Safety Critical Systems 在安全关键系统上应用Scrum开发
International Journal of Information Technology and Computer Science Pub Date : 2022-10-08 DOI: 10.5815/ijitcs.2022.05.04
Mustafizur Rahman, Shusmita Islam, Rubiyet Fardous, L. Yesmin, Dip Nandi
{"title":"Applying Scrum Development on Safety Critical Systems","authors":"Mustafizur Rahman, Shusmita Islam, Rubiyet Fardous, L. Yesmin, Dip Nandi","doi":"10.5815/ijitcs.2022.05.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.05.04","url":null,"abstract":"Scaled agile approaches are increasingly being used by automotive businesses to cope with the complexity of their organizations and products. The development of automotive systems necessitates the use of safe procedures. SafeScrum® is a real example of how agile approaches may be used in the creation of high-reliability systems on a small scale. A framework like SAFe or LeSS does not facilitate the creation of safety-critical systems in large-scale contexts from the start. User stories are a wonderful approach to convey flexible demands, the lifecycle is iterative, and testing is the initial stage in the development process. Scrum plus extra XP approaches may be used to build high-reliability software and certification by the IEC 61508 standard is required for the software. This adds a slew of new needs to the workflow. Scrum's quality assurance measures proved to be inadequate in a recent industry situation. Our study's overarching goal is to provide light on the Scrum development process so that it may be improved for use with life-or-death systems. Our study of the business world was a mixed-methods affair. The findings demonstrated that although Scrum is helpful in ensuring the security of each release, it is less nimble in other respects. The difficulties of prioritization, communication, time constraints, and preparing for and accepting new safety standards were all discussed. In addition, we have had some helpful feedback from the business world, but the generality issue arising from this particular setting has yet to be addressed.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122006344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-stage Transfer Learning for Fake News Detection Using AWD-LSTM Network 基于AWD-LSTM网络的假新闻检测多阶段迁移学习
International Journal of Information Technology and Computer Science Pub Date : 2022-10-08 DOI: 10.5815/ijitcs.2022.05.05
Sirra Kanthi Kiran, M. Shashi, K. Madhuri
{"title":"Multi-stage Transfer Learning for Fake News Detection Using AWD-LSTM Network","authors":"Sirra Kanthi Kiran, M. Shashi, K. Madhuri","doi":"10.5815/ijitcs.2022.05.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2022.05.05","url":null,"abstract":"In the recent decades, the automatic veracity verification of rumors is essential, since online social media platforms allow users to post news item or express opinion towards a circulating piece of information without much restriction. The intention of fake news is to make the readers believe in inaccurate information, where the detection of fake news by using content is a difficult task. So, the auxiliary information: user profile, social engagement of the users, and other user’s comments are useful in the detection of fake news. In this manuscript, a novel multi-stage transfer learning approach is introduced for an effective fake news detection, where it utilizes user’s comments as auxiliary information to detect whether the given tweet is true or false. The stances of the response tweets contain opinions on news/rumors are often used for verifying the veracity of the circulating information. In order to devastate the effects of the specific rumors at the earliest, the multi-stage transfer learning approach automatically predict veracity of rumors jointly with the stances of their response tweets. The proposed multi-stage transfer learning is an inductive transfer learning variation that is used to forecast the stance of responses, then to identify fake news. The proposed model’s effectiveness is evaluated on the two-benchmark datasets: semEval-2017 task 8 and PHEME. The proposed model outperformed the existing approaches by obtaining a classification accuracy of 64.30% and 65.30%, an F-measure of 65.95% and 63.90% on semEval-2017 task 8, and PHEME on event-wise datasets.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129774526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信