Int. J. Inf. Technol. Web Eng.最新文献

筛选
英文 中文
Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network 基于自我网络的多层语义建模的社交网络用户分析
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.304049
P. Tamilselvi, Kishore Balasubramaniam, S. Vidhya, N. Jayapandian, K. Ramya, M. Poongodi, Mounir Hamdi, Godwin Brown Tunze
{"title":"Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network","authors":"P. Tamilselvi, Kishore Balasubramaniam, S. Vidhya, N. Jayapandian, K. Ramya, M. Poongodi, Mounir Hamdi, Godwin Brown Tunze","doi":"10.4018/ijitwe.304049","DOIUrl":"https://doi.org/10.4018/ijitwe.304049","url":null,"abstract":"Social and information networks undermine the real relationship between the individuals (ego) and the friends (alters) they are connected with on social media. The structure of individual network is highlighted by the ego network. Egocentric approach is popular due to its focus on individuals, groups, or communities. Size, structure, and composition directly impact the ego networks. Moreover, analysis includes strength of ego – alter ties degree and strength of ties. Degree gives the first overview of network. Social support in the network is explored with the “gap” between the degree and average strength. These outcomes firmly propose that, regardless of whether the approaches to convey and to keep up social connections are evolving because of the dispersion of online social networks, the way individuals sort out their social connections appears to remain unaltered. As online social networks evolve, they help in receiving more diverse information.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127064527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Biometric Cloud Services for Web-Based Examinations: An Empirical Approach 基于web考试的生物识别云服务:一种实证方法
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.299022
Meennapa Rukhiran, Sorapak Pukdesree, P. Netinant
{"title":"Biometric Cloud Services for Web-Based Examinations: An Empirical Approach","authors":"Meennapa Rukhiran, Sorapak Pukdesree, P. Netinant","doi":"10.4018/ijitwe.299022","DOIUrl":"https://doi.org/10.4018/ijitwe.299022","url":null,"abstract":"Biometric recognition may be used in conjunction with human authentication on a smartphone to improve accuracy, reliability, and simplicity, and to aid in fraud prevention and user authentication. While single biometric authentication addresses environmental degradation and sensor noise limitations, and the single point of failure scenario in biometric systems can result in more robust biometric systems, multimodal biometric authentication can improve the accuracy of identification and recognition. The purpose of this research is to propose a facial and speech authentication system that is cloud-based and supports a web-based examination approach. The system enables students' biometrics to be registered, students to be recognized, and student recognition results to be reported. The confusion matrix is used to compare the results of positive and negative detection in various ways, including accuracy score, precision value, and recall value. Adaptive multimodal biometric authentication should be designed and evaluated for further research using the optimal weights for each biometric.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Research Trends on Business Process Management in Higher Education and Recommendations for Vietnam 高等教育业务流程管理的研究趋势及对越南的建议
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.315609
Anh T. P. Hoang, Kha Van Phan, V. K. Solanki
{"title":"Research Trends on Business Process Management in Higher Education and Recommendations for Vietnam","authors":"Anh T. P. Hoang, Kha Van Phan, V. K. Solanki","doi":"10.4018/ijitwe.315609","DOIUrl":"https://doi.org/10.4018/ijitwe.315609","url":null,"abstract":"Business process management at universities appears to be one of the acute issues which allow universities to foster their training quality, along with significantly contributing to creating recommendation policies for the business process management to gain effectiveness. In this research, the bibliometric analysis approach is used to evaluate scientific results on publications related to research trends in business process management at universities bibliometrics in the Scopus database. 990 publications have been extracted to analyze growth trends, contributions of authors, research institutions, co-authors in research sectors, and the development of research trends. Research implications are used to suggest research trends on business process management in several developing countries, particularly case studies in Vietnam.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"135 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113983576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches SCNTA:使用机器学习方法监测网络可用性和异常识别活动
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.297971
Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, V. Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla, Rina Mishra
{"title":"SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches","authors":"Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, V. Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla, Rina Mishra","doi":"10.4018/ijitwe.297971","DOIUrl":"https://doi.org/10.4018/ijitwe.297971","url":null,"abstract":"Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three modules: Capturing_of_Packets (CoP) and pre-processing, Reconciliation_of_Flow (RoF), and categorization of Machine Learning (ML). Based on parallel processing along with well-defined interfacing of data, the modules are framed, allowing each module to be modified and upgraded separately. The Reconciliation_of_Flow (RoF) mechanism becomes the output bottleneck in this pipeline. In this implementation, an optimal reconciliation process was used, resulting in an average delivery time of 0.62 seconds. In order to verify our method, we equated the results of the AdaBoost Ensemble Learning Algorithm (ABELA), Naive Bayes (NB), Decision Tree (DT), K-Nearest Neighbor (KNN), and Flexible Naive Bayes (FNB) in the classification module. The architectural design of the run time CSNTA categorization (flow-based) scheme is presented in this paper.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115295430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Winning the War on Terror: Using "Top-K" Algorithm and CNN to Assess the Risk of Terrorists 赢得反恐战争:使用“Top-K”算法和CNN来评估恐怖分子的风险
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.288038
Yaojie Wang, Xiaolong Cui, Peiyong He
{"title":"Winning the War on Terror: Using \"Top-K\" Algorithm and CNN to Assess the Risk of Terrorists","authors":"Yaojie Wang, Xiaolong Cui, Peiyong He","doi":"10.4018/ijitwe.288038","DOIUrl":"https://doi.org/10.4018/ijitwe.288038","url":null,"abstract":"From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a quantitative analysis method of active risk assessment method with terrorists as the research object is proposed. This assessment method introduces deep learning algorithms into social computing problems on the basis of information coding technology. We design a special \"Top-k\" algorithm to screen the terrorism related features, and optimize the evaluation model through convolution neural network, so as to determine the risk level of terrorist suspects. This study provides important research ideas for counter-terrorism assessment, and verifies the feasibility and accuracy of the proposed scheme through a number of experiments, which greatly improves the efficiency of counter-terrorism early warning.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128870566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020 2011 - 2020年跨境人民币结算的自相关回归模型分析与选择
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.314569
Cheng Zhang, Nianjia Hu, Qiang Yan
{"title":"Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020","authors":"Cheng Zhang, Nianjia Hu, Qiang Yan","doi":"10.4018/ijitwe.314569","DOIUrl":"https://doi.org/10.4018/ijitwe.314569","url":null,"abstract":"With China's continuous opening to the outside world, changes in the international environment and the operation of the cross-border RMB settlement system (CIPS), the scale of cross-border RMB settlement has fluctuated continuously. In response to this phenomenon, the authors collected and sorted out the total amount of RMB cross-border settlement and payments from 2011 to 2020 time sequence data in China, then use five AR models including ARMA, GARCH(1.1), EGARCH(1.1), PARCH(1.1), and CARCH(1.1) to fit. The experimental results show that the four autocorrelation models all prove that the cross-border RMB settlement has autocorrelation relationship, and the long-term trend continues to grow up. According to the precision and accuracy of the five models, the ARMA model equation is one optimal prediction equation. On the basis of the ARMA model equation, and the establishment of the VENSIM system dynamics simulation model, the scale of China's cross-border RMB settlement in the next 10 years is predicted.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart Systems 面向数据密集型智能系统的时效性云资源调度方法
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.306915
J. Duan, Yan Li, L. Duan, Ajay Sharma
{"title":"Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart Systems","authors":"J. Duan, Yan Li, L. Duan, Ajay Sharma","doi":"10.4018/ijitwe.306915","DOIUrl":"https://doi.org/10.4018/ijitwe.306915","url":null,"abstract":"The cloud computing platforms are being deployed nowadays for resource scheduling of real time data intensive applications. Cloud computing still deals with the challenge of time oriented effective scheduling for resource allocation, while striving to provide the efficient quality of service. This article proposes a time prioritization-based ensemble resource management and Ant Colony based optimization (ERM-ACO) algorithm in order to aid effective resource allocation and scheduling mechanism which specifically deals with the task group feasibility, assessing and selecting the computing and the storage resources required to perform specific tasks. The research outcomes are obtained in terms of time-effective demand fulfillment rate, average response time as well as resource utilization time considering various grouping mechanisms based on data arrival intensity consideration. The proposed framework when compared to the present state-of-the-art methods, optimal fitness percentage of 98% is observed signifying the feasible outcomes for real-time scenarios.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm 基于PCA算法的人脸提取与识别系统
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.315291
Mazin S. Mohammed, R. Alothman
{"title":"An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm","authors":"Mazin S. Mohammed, R. Alothman","doi":"10.4018/ijitwe.315291","DOIUrl":"https://doi.org/10.4018/ijitwe.315291","url":null,"abstract":"Face detection is the most critical and first step in the attendance management system. The human face is non-rigid and has many differences in visual situations, scale, clarity, poses, and rotation. The precise and reliable identification was a challenge for the researcher. A variety of methods and techniques are suggested, but due to many variations, no one technique is very effective for all sorts of faces and pictures. Many techniques show good results under certain conditions, and others are successful for various types of images. Image-discriminating methods are commonly used for pattern and image analysis. Specific forms of prejudice are discussed.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Integrated Remote Control-Based Human-Robot Interface for Education Application 基于集成远程控制的人机界面在教育中的应用
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.306916
Xuetao Duan, Yun-ling Wang, Wei Dou, Rajeev Kumar, Niti Saluja
{"title":"An Integrated Remote Control-Based Human-Robot Interface for Education Application","authors":"Xuetao Duan, Yun-ling Wang, Wei Dou, Rajeev Kumar, Niti Saluja","doi":"10.4018/ijitwe.306916","DOIUrl":"https://doi.org/10.4018/ijitwe.306916","url":null,"abstract":"Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still challenging due to mathematical formulation. This article utilizes the augmented reality (AR) concept for remote control-based human-robot interaction using the Bluetooth correspondence. The proposed framework incorporates different modules like a robot arm control, a regulator module and a distant portable smartphone application for envisioning the robot arm points for its real-time relevance. This novel approach fuses AR innovation into portable application which permit the continuous virtual coordination with actual physical platform. The simulation yields effective outcomes with 96.94% accuracy for testing stage while maintaining error and loss values of 0.194 and 0.183 respectively. The proposed interface gives consistent results for teaching application in real time changing environment by outperforming existing methods with an accuracy improvement of 13.4","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach 利用机器学习方法分析影响金融组织的恶意软件威胁
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.304051
Romil Rawat, Yagyanath Rimal, P. William, Snehil Dahima, Sonali Gupta, K. Sankaran
{"title":"Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach","authors":"Romil Rawat, Yagyanath Rimal, P. William, Snehil Dahima, Sonali Gupta, K. Sankaran","doi":"10.4018/ijitwe.304051","DOIUrl":"https://doi.org/10.4018/ijitwe.304051","url":null,"abstract":"Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the finance industry and their clients. Its key aim is to steal victims' online money-lending records and vital credentials as they go to their banks' websites. Without analyzing network packet payload computing (PPC), IP address labels, port number traces, or protocol knowledge, we have used Machine Learning (ML) modeling to detect Emotet malware infections and recognize Emotet related congestion flows in this work. To classify emotet associated flows and detect emotet infections, the output outcome values are compared by four separate popular ML algorithms: RF (Random Forest), MLP (Multi-Layer Perceptron), SMO (Sequential Minimal Optimization Technique), and the LRM (Logistic Regression Model). The suggested classifier is then improved by determining the right hyperparameter and attribute set range. Using network packet (computation) identifiers, the Random Forest classifier detects emotet-based flows with 99.9726 percent precision and a 92.3 percent true positive rating.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书