Int. J. Inf. Technol. Web Eng.最新文献

筛选
英文 中文
Predicting Academic Performance of Immigrant Students Using XGBoost Regressor 用XGBoost回归量预测移民学生学业成绩
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.304052
Selvaprabu Jeganathan, Arunraj Lakshminarayanan, Nandhakumar Ramachandran, Godwin Brown Tunze
{"title":"Predicting Academic Performance of Immigrant Students Using XGBoost Regressor","authors":"Selvaprabu Jeganathan, Arunraj Lakshminarayanan, Nandhakumar Ramachandran, Godwin Brown Tunze","doi":"10.4018/ijitwe.304052","DOIUrl":"https://doi.org/10.4018/ijitwe.304052","url":null,"abstract":"The education sector has been effectively dealing with the prediction of academic performance of the Immigrant students since the research associated with this domain proves beneficial enough for those countries where the ministry of education has to cater to such immigrants for altering and updating policies in order to elevate the overall education pedagogy for them. The present research begins with analyzing varied educational data mining and machine learning techniques that helps in assessing the data fetched form PISA. It’s elucidated that XGBoost stands out to be the ideal most machine learning technique for achieving the desired results. Subsequently, the parameters have been optimized using the hyper parameter tuning techniques and implemented on the XGBoost Regressor algorithm. Resultant there is low error rate and higher level of predictive ability using the machine learning algorithms which assures better predictions using the PISA data. The final results have been discussed along with the upcoming future research work.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128824202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML 基于ML的多网络关联的Twitter好友推荐社交网络分析
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.304050
Dharmendra Kumar Singh Singh, N. Nithya, L. Rahunathan, Preyal Sanghavi, Ravirajsinh Sajubha Vaghela, Poongodi Manoharan, Mounir Hamdi, Godwin Brown Tunze
{"title":"Social Network Analysis for Precise Friend Suggestion for Twitter by Associating Multiple Networks Using ML","authors":"Dharmendra Kumar Singh Singh, N. Nithya, L. Rahunathan, Preyal Sanghavi, Ravirajsinh Sajubha Vaghela, Poongodi Manoharan, Mounir Hamdi, Godwin Brown Tunze","doi":"10.4018/ijitwe.304050","DOIUrl":"https://doi.org/10.4018/ijitwe.304050","url":null,"abstract":"The main aim in this paper is to create a friend suggestion algorithm that can be used to recommend new friends to a user on Twitter when their existing friends and other details are given. The information gathered to make these predictions includes the user's friends, tags, tweets, language spoken, ID, etc. Based on these features, the authors trained their models using supervised learning methods. The machine learning-based approach used for this purpose is the k-nearest neighbor approach. This approach is by and large used to decrease the dimensionality of the information alongside its feature space. K-nearest neighbor classifier is normally utilized in arrangement-based situations to recognize and distinguish between a few parameters. By using this, the features of the central user's non-friends were compared. The friends and communities of a user are likely to be very different from any other user. Due to this, the authors select a single user and compare the results obtained for that user to suggest friends.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network 基于自我网络的多层语义建模的社交网络用户分析
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.304049
P. Tamilselvi, Kishore Balasubramaniam, S. Vidhya, N. Jayapandian, K. Ramya, M. Poongodi, Mounir Hamdi, Godwin Brown Tunze
{"title":"Social Network User Profiling With Multilayer Semantic Modeling Using Ego Network","authors":"P. Tamilselvi, Kishore Balasubramaniam, S. Vidhya, N. Jayapandian, K. Ramya, M. Poongodi, Mounir Hamdi, Godwin Brown Tunze","doi":"10.4018/ijitwe.304049","DOIUrl":"https://doi.org/10.4018/ijitwe.304049","url":null,"abstract":"Social and information networks undermine the real relationship between the individuals (ego) and the friends (alters) they are connected with on social media. The structure of individual network is highlighted by the ego network. Egocentric approach is popular due to its focus on individuals, groups, or communities. Size, structure, and composition directly impact the ego networks. Moreover, analysis includes strength of ego – alter ties degree and strength of ties. Degree gives the first overview of network. Social support in the network is explored with the “gap” between the degree and average strength. These outcomes firmly propose that, regardless of whether the approaches to convey and to keep up social connections are evolving because of the dispersion of online social networks, the way individuals sort out their social connections appears to remain unaltered. As online social networks evolve, they help in receiving more diverse information.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127064527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches SCNTA:使用机器学习方法监测网络可用性和异常识别活动
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.297971
Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, V. Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla, Rina Mishra
{"title":"SCNTA: Monitoring of Network Availability and Activity for Identification of Anomalies Using Machine Learning Approaches","authors":"Romil Rawat, Bhagwati Garg, Kiran Pachlasiya, V. Mahor, Shrikant Telang, Mukesh Chouhan, Surendra Kumar Shukla, Rina Mishra","doi":"10.4018/ijitwe.297971","DOIUrl":"https://doi.org/10.4018/ijitwe.297971","url":null,"abstract":"Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three modules: Capturing_of_Packets (CoP) and pre-processing, Reconciliation_of_Flow (RoF), and categorization of Machine Learning (ML). Based on parallel processing along with well-defined interfacing of data, the modules are framed, allowing each module to be modified and upgraded separately. The Reconciliation_of_Flow (RoF) mechanism becomes the output bottleneck in this pipeline. In this implementation, an optimal reconciliation process was used, resulting in an average delivery time of 0.62 seconds. In order to verify our method, we equated the results of the AdaBoost Ensemble Learning Algorithm (ABELA), Naive Bayes (NB), Decision Tree (DT), K-Nearest Neighbor (KNN), and Flexible Naive Bayes (FNB) in the classification module. The architectural design of the run time CSNTA categorization (flow-based) scheme is presented in this paper.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115295430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Winning the War on Terror: Using "Top-K" Algorithm and CNN to Assess the Risk of Terrorists 赢得反恐战争:使用“Top-K”算法和CNN来评估恐怖分子的风险
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.288038
Yaojie Wang, Xiaolong Cui, Peiyong He
{"title":"Winning the War on Terror: Using \"Top-K\" Algorithm and CNN to Assess the Risk of Terrorists","authors":"Yaojie Wang, Xiaolong Cui, Peiyong He","doi":"10.4018/ijitwe.288038","DOIUrl":"https://doi.org/10.4018/ijitwe.288038","url":null,"abstract":"From the perspective of counter-terrorism strategies, terrorist risk assessment has become an important approach for counter-terrorism early warning research. Combining with the characteristics of known terrorists, a quantitative analysis method of active risk assessment method with terrorists as the research object is proposed. This assessment method introduces deep learning algorithms into social computing problems on the basis of information coding technology. We design a special \"Top-k\" algorithm to screen the terrorism related features, and optimize the evaluation model through convolution neural network, so as to determine the risk level of terrorist suspects. This study provides important research ideas for counter-terrorism assessment, and verifies the feasibility and accuracy of the proposed scheme through a number of experiments, which greatly improves the efficiency of counter-terrorism early warning.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128870566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020 2011 - 2020年跨境人民币结算的自相关回归模型分析与选择
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.314569
Cheng Zhang, Nianjia Hu, Qiang Yan
{"title":"Autocorrelation Regression Model Analysis and Selection of Cross-Border RMB Settlement From 2011 to 2020","authors":"Cheng Zhang, Nianjia Hu, Qiang Yan","doi":"10.4018/ijitwe.314569","DOIUrl":"https://doi.org/10.4018/ijitwe.314569","url":null,"abstract":"With China's continuous opening to the outside world, changes in the international environment and the operation of the cross-border RMB settlement system (CIPS), the scale of cross-border RMB settlement has fluctuated continuously. In response to this phenomenon, the authors collected and sorted out the total amount of RMB cross-border settlement and payments from 2011 to 2020 time sequence data in China, then use five AR models including ARMA, GARCH(1.1), EGARCH(1.1), PARCH(1.1), and CARCH(1.1) to fit. The experimental results show that the four autocorrelation models all prove that the cross-border RMB settlement has autocorrelation relationship, and the long-term trend continues to grow up. According to the precision and accuracy of the five models, the ARMA model equation is one optimal prediction equation. On the basis of the ARMA model equation, and the establishment of the VENSIM system dynamics simulation model, the scale of China's cross-border RMB settlement in the next 10 years is predicted.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart Systems 面向数据密集型智能系统的时效性云资源调度方法
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.306915
J. Duan, Yan Li, L. Duan, Ajay Sharma
{"title":"Time Effective Cloud Resource Scheduling Method for Data-Intensive Smart Systems","authors":"J. Duan, Yan Li, L. Duan, Ajay Sharma","doi":"10.4018/ijitwe.306915","DOIUrl":"https://doi.org/10.4018/ijitwe.306915","url":null,"abstract":"The cloud computing platforms are being deployed nowadays for resource scheduling of real time data intensive applications. Cloud computing still deals with the challenge of time oriented effective scheduling for resource allocation, while striving to provide the efficient quality of service. This article proposes a time prioritization-based ensemble resource management and Ant Colony based optimization (ERM-ACO) algorithm in order to aid effective resource allocation and scheduling mechanism which specifically deals with the task group feasibility, assessing and selecting the computing and the storage resources required to perform specific tasks. The research outcomes are obtained in terms of time-effective demand fulfillment rate, average response time as well as resource utilization time considering various grouping mechanisms based on data arrival intensity consideration. The proposed framework when compared to the present state-of-the-art methods, optimal fitness percentage of 98% is observed signifying the feasible outcomes for real-time scenarios.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133518136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm 基于PCA算法的人脸提取与识别系统
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.315291
Mazin S. Mohammed, R. Alothman
{"title":"An Attendance System Using the Face Extraction and Recognition Technique Using PCA Algorithm","authors":"Mazin S. Mohammed, R. Alothman","doi":"10.4018/ijitwe.315291","DOIUrl":"https://doi.org/10.4018/ijitwe.315291","url":null,"abstract":"Face detection is the most critical and first step in the attendance management system. The human face is non-rigid and has many differences in visual situations, scale, clarity, poses, and rotation. The precise and reliable identification was a challenge for the researcher. A variety of methods and techniques are suggested, but due to many variations, no one technique is very effective for all sorts of faces and pictures. Many techniques show good results under certain conditions, and others are successful for various types of images. Image-discriminating methods are commonly used for pattern and image analysis. Specific forms of prejudice are discussed.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114865227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach 利用机器学习方法分析影响金融组织的恶意软件威胁
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.304051
Romil Rawat, Yagyanath Rimal, P. William, Snehil Dahima, Sonali Gupta, K. Sankaran
{"title":"Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach","authors":"Romil Rawat, Yagyanath Rimal, P. William, Snehil Dahima, Sonali Gupta, K. Sankaran","doi":"10.4018/ijitwe.304051","DOIUrl":"https://doi.org/10.4018/ijitwe.304051","url":null,"abstract":"Since 2014, Emotet has been using Man-in-the-Browsers (MITB) attacks to target companies in the finance industry and their clients. Its key aim is to steal victims' online money-lending records and vital credentials as they go to their banks' websites. Without analyzing network packet payload computing (PPC), IP address labels, port number traces, or protocol knowledge, we have used Machine Learning (ML) modeling to detect Emotet malware infections and recognize Emotet related congestion flows in this work. To classify emotet associated flows and detect emotet infections, the output outcome values are compared by four separate popular ML algorithms: RF (Random Forest), MLP (Multi-Layer Perceptron), SMO (Sequential Minimal Optimization Technique), and the LRM (Logistic Regression Model). The suggested classifier is then improved by determining the right hyperparameter and attribute set range. Using network packet (computation) identifiers, the Random Forest classifier detects emotet-based flows with 99.9726 percent precision and a 92.3 percent true positive rating.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
An Integrated Remote Control-Based Human-Robot Interface for Education Application 基于集成远程控制的人机界面在教育中的应用
Int. J. Inf. Technol. Web Eng. Pub Date : 2022-01-01 DOI: 10.4018/ijitwe.306916
Xuetao Duan, Yun-ling Wang, Wei Dou, Rajeev Kumar, Niti Saluja
{"title":"An Integrated Remote Control-Based Human-Robot Interface for Education Application","authors":"Xuetao Duan, Yun-ling Wang, Wei Dou, Rajeev Kumar, Niti Saluja","doi":"10.4018/ijitwe.306916","DOIUrl":"https://doi.org/10.4018/ijitwe.306916","url":null,"abstract":"Portable interfaced robot arms equipped with mobile user interactions are significantly being utilized in modern world. The application of teaching robotics is being used in challenging pandemic situation but it is still challenging due to mathematical formulation. This article utilizes the augmented reality (AR) concept for remote control-based human-robot interaction using the Bluetooth correspondence. The proposed framework incorporates different modules like a robot arm control, a regulator module and a distant portable smartphone application for envisioning the robot arm points for its real-time relevance. This novel approach fuses AR innovation into portable application which permit the continuous virtual coordination with actual physical platform. The simulation yields effective outcomes with 96.94% accuracy for testing stage while maintaining error and loss values of 0.194 and 0.183 respectively. The proposed interface gives consistent results for teaching application in real time changing environment by outperforming existing methods with an accuracy improvement of 13.4","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127350178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信