International Journal of Engineering & Technology最新文献

筛选
英文 中文
Do Trust based Social Recommendation Algorithms Work as Intended? 基于信任的社会推荐算法是否如预期的那样工作?
International Journal of Engineering & Technology Pub Date : 2023-10-05 DOI: 10.14419/ijet.v12i2.32328
Chaitanya Krishna Kasaraneni, Mahima Agumbe Suresh
{"title":"Do Trust based Social Recommendation Algorithms Work as Intended?","authors":"Chaitanya Krishna Kasaraneni, Mahima Agumbe Suresh","doi":"10.14419/ijet.v12i2.32328","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32328","url":null,"abstract":"Recommender systems are powerful tools that filter and recommend content/information relevant to a given user. Collaborative filtering is the most popular technique used in building recommender systems and it has been successfully incorporated in many applications. These conventional recommendation systems require a minimum number of users, items, and ratings in order to provide effective recommendations. This results in the infamous cold-start problem where the system is not able to produce effective recommendations for new users. Recently, there has been an escalation in the popularity and usage of social networks, which persuades people to share their experiences in the form of reviews and ratings on social media. The components of social media such as the influence of friends, interests, and enjoyment create the opportunities to develop solutions for sparsity and cold start problems of recommendation systems. This paper aims to observe these patterns and analyze three of the existing social recommendation systems, SocialMF, SocialFD, and GraphRec. SocialMF and SocialFD algorithms are based on matrix factorization and distance metric learning respectively whereas GraphRec is an attention based deep learning model. Through extensive experimentation with the datasets that these algorithms were tested on and one new dataset, we compared the results based on evaluation metrics including Root Mean Squared Error (RMSE) and Mean Absolute Error (MAE). To investigate how trust impacts the performance of these models, we evaluated them by modifying the trust and social component. Experimental results show that there is no conclusive evidence that trust propagation plays a major part in these models. Moreover, these models show a slightly improved performance in the absence of trust statements.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135546987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data integration: “Seamless data harmony: The art and science of effective data integration” 数据集成:“无缝数据和谐:有效数据集成的艺术与科学”
International Journal of Engineering & Technology Pub Date : 2023-10-04 DOI: 10.14419/ijet.v12i2.32335
None Saloni Kumari
{"title":"Data integration: “Seamless data harmony: The art and science of effective data integration”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i2.32335","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32335","url":null,"abstract":"The idea of data integration has evolved as a key strategy in today's data-driven environment, as data is supplied from various and heterogeneous sources. This article explores the relevance, methodology, difficulties, and transformative possibilities of data integration, delving into its multidimensional world. Data integration serves as the cornerstone for well-informed decision-making by connecting heterogeneous datasets and fostering unified insights. This article gives readers a sneak preview of the in-depth investigation into data integration, illuminating its technical complexities and strategic ramifications for companies and organizations looking to maximize the value of their data as-sets.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135647533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Modeling: “Unlocking Ideas and Enhancing Understanding: The Power of Visual Modeling” 视觉建模:“解锁想法和增强理解:视觉建模的力量”
International Journal of Engineering & Technology Pub Date : 2023-10-04 DOI: 10.14419/ijet.v12i2.32334
None Saloni Kumari
{"title":"Visual Modeling: “Unlocking Ideas and Enhancing Understanding: The Power of Visual Modeling”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i2.32334","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32334","url":null,"abstract":"To make ideas, concepts, or systems easier to comprehend and explain, visual modelling is the act of putting them into visual form. A range of methods and tools, including mind maps, flowcharts, diagrams, and wireframes, can be used to do this. In a range of settings, including business, education, and software development, visual models can be used to organize and clarify information, uncover links and patterns, and improve communication and teamwork. This paper discusses the SWOT analysis, the concept of use cases, the organization chart and its tiers, the stakeholder map, the scoring matrix, process flowcharts, and user stories.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135647532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improve the quality of service through secure routing networks secured in the mail 通过邮件安全路由网络提高服务质量
International Journal of Engineering & Technology Pub Date : 2023-10-04 DOI: 10.14419/ijet.v12i2.32367
Aseil Nadhum Kadhum
{"title":"Improve the quality of service through secure routing networks secured in the mail","authors":"Aseil Nadhum Kadhum","doi":"10.14419/ijet.v12i2.32367","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32367","url":null,"abstract":"A mobile ad hoc network (MANET) is a stand-alone system with mobile nodes. Nodes can move around at will. Communication is subject to security breaches without a centralized, secure infrastructure, and the nodes are the biggest offenders. Since security has become one of the most important issues for data transfer via wired and wireless networks, many security-enhanced solutions have been created to enhance the security of data transmission over public networks. The goal of this project is to make routing safer. Proactive routing, as is well known, involves finding alternative routes and requiring packets to choose one at random from their immediate neighbors. Sending hello packets allows us to maintain track of each node's neighbors. The delivery path is then selected from nearby nodes, with the prior hop which is retained as the history node having been arbitrarily excluded. To randomize delivery channels, the proactive routing protocols DSDV and RDSDV were contrasted for various node counts. The Simulation employs this project. The rapid development of mobile computing appli-cations and distant systems has raised awareness of quality of service (QoS) for mobile ad hoc networks (MANETs). In the MANET sce-nario, security is a key component of Qos provisioning. Attacks on the system could result in problems with direction, asset reservations, or even the collapse of the QoS structure if no security tool is used. In this study, two new plans will be provided from the perspectives of two alternative techniques to manage the updating of the organizational idea and allay the worries caused by interface annoyances in order to handle the security challenges of MANET Qos and the actual commitments of this investigation.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135647531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management” 身份和访问管理:“提升安全性和效率:揭示身份和访问管理的关键方面”
International Journal of Engineering & Technology Pub Date : 2023-09-06 DOI: 10.14419/ijet.v12i1.32333
None Saloni Kumari
{"title":"Identity and access management: \"Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i1.32333","DOIUrl":"https://doi.org/10.14419/ijet.v12i1.32333","url":null,"abstract":"The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of coupling on the performance a periodic leaky wave patch antenna 耦合对周期性漏波贴片天线性能的影响
International Journal of Engineering & Technology Pub Date : 2023-09-06 DOI: 10.14419/ijet.v12i1.32289
Charmolavy G.L, Nkouka Moukengue, Barol Mafouna Kiminou
{"title":"Effect of coupling on the performance a periodic leaky wave patch antenna","authors":"Charmolavy G.L, Nkouka Moukengue, Barol Mafouna Kiminou","doi":"10.14419/ijet.v12i1.32289","DOIUrl":"https://doi.org/10.14419/ijet.v12i1.32289","url":null,"abstract":"This article demonstrates the effect of coupling between two metal strips and the substrate width of a periodic leaky wave patch antenna operating at 80 GHz. Increasing the width of the substrate and the distance between the metal patches results in directional radiation and a good reflection coefficient in the 72-86 GHz band.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data: "Navigating the Hadoop ecosystem: Unraveling the potential of big data” 大数据:“导航Hadoop生态系统:揭示大数据的潜力”
International Journal of Engineering & Technology Pub Date : 2023-09-06 DOI: 10.14419/ijet.v12i1.32332
None Saloni Kumari
{"title":"Big data: \"Navigating the Hadoop ecosystem: Unraveling the potential of big data”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i1.32332","DOIUrl":"https://doi.org/10.14419/ijet.v12i1.32332","url":null,"abstract":"Big data refers to extremely large data sets that can be analyzed to reveal patterns, trends, and associations, particularly those relating to hu-man behavior and interactions. This data is too large and complex to be processed using traditional data processing methods, necessitating the use of specialized software and systems to manage and analyze it. This paper discusses about the Big Data Architecture, Hadoop Ecosystem, HDFS, Map reduce, Yarn, Hive, and many other components of Hadoop ecosystem.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信