Journal of Innovative Computing and Emerging Technologies最新文献

筛选
英文 中文
A Hybrid Book Recommendation System Using Genetic Algorithm for Enhancing Book Rating 基于遗传算法提高图书评级的混合图书推荐系统
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-09-05 DOI: 10.56536/jicet.v2i2.29
†. AqsaMaryum, Fawad Nasim
{"title":"A Hybrid Book Recommendation System Using Genetic Algorithm for Enhancing Book Rating","authors":"†. AqsaMaryum, Fawad Nasim","doi":"10.56536/jicet.v2i2.29","DOIUrl":"https://doi.org/10.56536/jicet.v2i2.29","url":null,"abstract":"Recommendation systems have emerged as the most prevailing systems due to the abrupt use of online services during pandemics from past years. Multi-billiondollar industries such as kindle, Alibaba, amazon, Careem, and many other local online applications of grocery and medicine are heavily dependent on these systems. Applications based on machine learning models increase the accuracy and efficiency of the recommendation system and eliminate the possibility of human effort in finding relevant items. Machine learning models learn, recognize patterns, and make decisions with minimal human intervention based on data. We have developed an innovative and novel book recommendation system. We have used a genetic algorithm to enhance the rating of books and find the distance between similar users and recommend books. The Dataset is being used is taken from Amazon web services and it is available on Kaggle as Books.csv.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133972197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirement introspection and involvement of stakeholder 需求自省和涉众的参与
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.20
{"title":"Requirement introspection and involvement of stakeholder","authors":"","doi":"10.56536/jicet.v2i1.20","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.20","url":null,"abstract":"In this paper, we clarify how to fulfil the need of client. When a client has giant idea and he don’t know how to describe it to others than the requirement engineers approach this technique. The involvement of stakeholder to inspect the need of client and give a hint near to his requirement. How the client introduces his idea to company and how the requirement engineer will work on it will be explain in this paper. Client attitude may also a reflection of his requirement. Introspection is basically the self-perception. An organization is responsible for taking care of stakeholder. Once they show their involvement in any organization, it will be grateful for both parties i.e. their business will grow on the power of two. Once the communication is started requirement engineer will use some techniques for gathering requirement. As the stakeholders duties is to operate the organization and they are all connected virtually to each other. So during using techniques, introspection is also very important and without it requirement gathering process won’t be complete. Some organization use groupware tools for gathering requirement. Elicitation technique is also use in this process. Elicitation technique is also known as appropriate and qualitative technique. No attribute is considered in introspection.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Requirement Engineering Processes, Activities, Flaws, Importance And Review 需求工程过程、活动、缺陷、重要性和评审
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.19
{"title":"Requirement Engineering Processes, Activities, Flaws, Importance And Review","authors":"","doi":"10.56536/jicet.v2i1.19","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.19","url":null,"abstract":"IT and Software industries are the fastest and most improving industries all over the world. Even in countries like India, Pakistan and other development counties the trend of IT and different TECH technologies is rapidly increasing time to time. There is no doubt on the fact that that all the IT and Software industries follows the Software Development Life Cycle (SDLC) for their software or product development process. Following the IT trends it is essential for the industries to follow the SDLC for their software development. The most important and the first step of any software development is Requirement engineering. In short words requirement engineering is the backbone of any software development process, other than that it also provides an estimation from the start that is the project doable in the time given or not.  After reading the paper one will be well aware of what software requirement engineering really is and what activities are involved what flaws are made in those activities and the importance of a requirement engineer in any industry. The information is conducted from different software industries. The data is gathered from all source means and is analyzed and refined with different software like Turnitin. The information conducted will be useful for all local and global software industries including other TECH industries.  ","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Functional Requirements (Usability, security) 非功能性需求(可用性、安全性)
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.18
{"title":"Non-Functional Requirements (Usability, security)","authors":"","doi":"10.56536/jicet.v2i1.18","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.18","url":null,"abstract":"Ideally the use of software is determined by the performance of both its functionality, such as its usefulness, flexibility, functionality, synergy, security. However, there has been a third-party emphasis on software performance, even if the functionality is not helpful or used without he necessary non-functional features. we discuss the state of the art in the design of non-functional requirements (hereafter, NFRs), while providing hope for some future directions.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134604546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Right Elistication Technique For Right Project 正确的项目,正确的调试技术
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.24
{"title":"Right Elistication Technique For Right Project","authors":"","doi":"10.56536/jicet.v2i1.24","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.24","url":null,"abstract":"Elicitation technique is the process in which an analyst gather these requirements from the customer, stakeholders and users, who satisfy and fulfill the needs of customer, stakeholders and users. Right requirements are the key of successful project and this key is in the hand of analysts. Because analyst that person who select the elicitation technique. If the analyst select the right technique for the right project then the project will be goes to success otherwise it will be fail.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of Artificial Intelligence in Software Development Life Cycle 人工智能在软件开发生命周期中的应用
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.25
{"title":"Use of Artificial Intelligence in Software Development Life Cycle","authors":"","doi":"10.56536/jicet.v2i1.25","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.25","url":null,"abstract":"Current automated software development life cycle was mainly allotting with the automated generation code. That kind of method mostly include in the software combination from model’s design, predetermined polices or the fixed rules. In this paper we discuss about the propose an approach that should went above the SDL automated that should be presenting direct method which is able to make decision and take decision to generate code and  software. The ontology do an important part of  developer by fulfill the development of software  affair freely. [2]Thus behavior catch a database of  ontological  permit highest level judgement to explain design and incorporate the logic of system depend on the configuration system which is physical system . This kind of method  implement in graphical tools. This paper discuss the autonomated ontological form of  methodology create the code of according to artificial intelligence","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131552049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eliciting Organizational Requirements Using Stakeholder Prioritization 使用涉众优先级来引出组织需求
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v2i1.17
{"title":"Eliciting Organizational Requirements Using Stakeholder Prioritization","authors":"","doi":"10.56536/jicet.v2i1.17","DOIUrl":"https://doi.org/10.56536/jicet.v2i1.17","url":null,"abstract":"Different stakeholders come together to find the requirements of a software in an organization. While there are many contradicting requirements which can be provided by different stakeholders, they need to be prioritized properly in order to avoid the confusion in the development or requirements elicitation phase.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123299028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drawbacks of Elicitation Techniques 引出技术的缺点
Journal of Innovative Computing and Emerging Technologies Pub Date : 2021-01-01 DOI: 10.56536/jicet.v1i1.2
{"title":"Drawbacks of Elicitation Techniques","authors":"","doi":"10.56536/jicet.v1i1.2","DOIUrl":"https://doi.org/10.56536/jicet.v1i1.2","url":null,"abstract":"This paper summarizes the drawback of elicitation techniques problems and challenges of necessities engineering. necessities engineering is rotten into the want’s stimulation, specification, and validation. Most of the wants techniques nowadays target specification. Elicitation technique for a system is a crucial activity in demand engineering. A stimulation procedure is planned to handle these considerations. Consequently, the results of this paper have given North American country an honest disadvantage our analysis within the space of computer code needs stimulation.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115456532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SECURED PARKING SYSTEM USING IMAGE PROCESSING 采用图像处理的安全停车系统
Journal of Innovative Computing and Emerging Technologies Pub Date : 2020-10-01 DOI: 10.56536/jicet.v1i2.15
Ikram Syed, Huma Khan
{"title":"SECURED PARKING SYSTEM USING IMAGE PROCESSING","authors":"Ikram Syed, Huma Khan","doi":"10.56536/jicet.v1i2.15","DOIUrl":"https://doi.org/10.56536/jicet.v1i2.15","url":null,"abstract":"From the very beginning, mankind is trying to make their things safe and secure from risk of theft. After reading in depth various results of car thief-ting for last many years, Commonly those cars are been theft in the parking areas where there was no proper system to protect those cars. This work is to minimize the risk of vehicle thief-ting after creating a secured car parking system. If we talk about today's modern world, many of procedures are available to minimize or stop car thief-ting. Our Thesis is based on software and hardware application which works on real time environment. We are adopting the face detection technique under the umbrella of image processing which will provide security for public and parking places, Although we know image processing is a vast field in today’s era. This application uses OpenCV programming language C# using the Haar-cascade and more precisely canny pruning libraries for the detection of facial features. Few years back, list of procedures are adopted just to make a secure car parking system. Some procedures were by adopting RFID and many was by capturing the car number plate under the umbrella of image processing and result of these procedures was, they were failed to secure due to many factors. For example lack of accuracy in character reorganization of number plate and information about driver. However, our system is reliable as the probability of dodging is least, which provides security and flexibility to the car owners.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129427070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero-Text Watermarking Method for Embedded of Watermark Originality 嵌入水印原创性的零文本水印方法
Journal of Innovative Computing and Emerging Technologies Pub Date : 2020-09-21 DOI: 10.56536/jicet.v1i2.11
Fahad Sabah, Saleem Butt
{"title":"Zero-Text Watermarking Method for Embedded of Watermark Originality","authors":"Fahad Sabah, Saleem Butt","doi":"10.56536/jicet.v1i2.11","DOIUrl":"https://doi.org/10.56536/jicet.v1i2.11","url":null,"abstract":"In this era of technology, the ways to share information among people are completely changed. Technology made it fast to connect with people and share their views within second by using different social sites. The need for hours is how to secure data in a more precise form that can survive by any unauthorized users' raids such as copy, changing, insertion, and deletion of data. These types of attacks destroyed the originality of data. Data may be in any contents shape audio, video, and text but text contents are most difficult to survive from unauthorized access and use. As the content of the text is sharing in soft form over different social sites so the chances of attacks are increasing and the value of the text is difficult to maintain. The purposed solution of securing information or text from unauthorized attacks is text watermarking. Watermarking is the most host topic due to increasing attacks and as the technology is growing. To secure confidential information is one of the necessities of this era for preserving the originality and authentication of contents. In recent years different techniques of text watermarking are using for the security purposes of text. Different techniques and algorithms are used but the main requirements of text watermarking are not successfully achieved. These techniques may not give full access to attackers but the value of the text is degraded. This thesis presents a more enhanced technique to maintain the originality of the text.","PeriodicalId":145637,"journal":{"name":"Journal of Innovative Computing and Emerging Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126710126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信