Journal of Information and Telecommunication最新文献

筛选
英文 中文
COLAFOS: a hybrid machine learning model to forecast potential coseismic landslides severity COLAFOS:一个混合机器学习模型,用于预测潜在的同震滑坡严重程度
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-05-11 DOI: 10.1080/24751839.2022.2062918
A. Psathas, Andonis Papaleonidas, L. Iliadis, G. Papathanassiou, S. Valkaniotis
{"title":"COLAFOS: a hybrid machine learning model to forecast potential coseismic landslides severity","authors":"A. Psathas, Andonis Papaleonidas, L. Iliadis, G. Papathanassiou, S. Valkaniotis","doi":"10.1080/24751839.2022.2062918","DOIUrl":"https://doi.org/10.1080/24751839.2022.2062918","url":null,"abstract":"ABSTRACT Timely and rational prediction of coseismic landslides is crucial for the design and development of key infrastructure capable to protect human lives in seismically active regions. This research introduces the novel Hybrid Coseismic Landslide Forecasting model (COLAFOS) that takes into consideration three parameters namely: The Average Slope of the Active Areas, the Slope Aspect and the types of Geological forms. The developed model was tested on two datasets from the island of Lefkada Greece, for years 2003 and 2015. COLAFOS is a hybrid model, employing the Fuzzy c-Means clustering, the Ensemble Adaptive Boosting (ENS_AdaBoost) and the Ensemble Subspace k-Nearest Neighbour (ENSUB k-NN) algorithms. The introduced model managed to correctly classify the coseismic landslides according to their severity, with a success rate of 70.07% and 72.88% for 2003 and 2015, respectively. The algorithm has shown very good performance for the classes of major severity, reaching an accuracy up to 92%. Accuracy, Sensitivity, Specificity, Precision and F-1 Score, were used to evaluate the performance of the model. Given the fact that this is a multi-class classification problem, ‘One Versus All’ Strategy was used in the evaluation process. Although the datasets were relatively unbalanced, the evaluation indices sealed the efficiency of the model.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"420 - 449"},"PeriodicalIF":2.7,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial SIRD model with different risk groups – multiagent approach for modelling an epidemic 具有不同风险群体的空间SIRD模型——流行病建模的多因子方法
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-05-11 DOI: 10.1080/24751839.2022.2065765
Mihailo Ilic, M. Ivanović
{"title":"Spatial SIRD model with different risk groups – multiagent approach for modelling an epidemic","authors":"Mihailo Ilic, M. Ivanović","doi":"10.1080/24751839.2022.2065765","DOIUrl":"https://doi.org/10.1080/24751839.2022.2065765","url":null,"abstract":"ABSTRACT This paper highlights the use of software agents and simulating real-world medical phenomena. We start with a brief overview of different approaches and tools for developing software agents and running simulations. One of the more recent tools was utilized in this paper to develop a model of disease spread in a population of agents and for performing experiments. We proposed an extension of the SIRD model, which includes a new state for agents, spatial component, and also different risk groups based on age. Multiple factors affect the longevity of a pathogen in a given population, for instance, its infectivity and deadliness. This paper shows interesting results of extensive experiments performed with novel, modified SIRD model and impact of key factors on disease spread.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"450 - 464"},"PeriodicalIF":2.7,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47442878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for learning resource recommendation using deep matrix factorization 一种基于深度矩阵分解的学习资源推荐方法
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-04-10 DOI: 10.1080/24751839.2022.2058250
Tran Thanh Dien, Nguyen Thanh Hai, Nguyen Thai-Nghe
{"title":"An approach for learning resource recommendation using deep matrix factorization","authors":"Tran Thanh Dien, Nguyen Thanh Hai, Nguyen Thai-Nghe","doi":"10.1080/24751839.2022.2058250","DOIUrl":"https://doi.org/10.1080/24751839.2022.2058250","url":null,"abstract":"ABSTRACT In traditional learning, learners and their lecturers, or tutors can meet face-to-face. In such lectures, the lecturers, or tutors can introduce printed book tutorials. However, in several circumstances, such as distance education, learners cannot interact with their teachers. Therefore, online learning resources would be helpful for learners to get knowledge. With a large and diverse number of learning resources, selecting appropriate learning resources to learn is very important. This study presents a deep matrix decomposition model extended from standard matrix decomposition to recommend learning resources based on learners' abilities and requirements. We test the proposed model on two groups of experimental data, including the data group of students' learning outcomes at a university for course recommendation and another group of 5 datasets of user learning resources to provide valuable recommendations for supporting learners. The experiments have revealed promising results compared to some baselines. The work is expected to be a good choice for large-scale datasets.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"381 - 398"},"PeriodicalIF":2.7,"publicationDate":"2022-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42710847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital forensics: a fast algorithm for a digital sensor identification 数字取证:一种用于数字传感器识别的快速算法
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-04-05 DOI: 10.1080/24751839.2022.2058252
J. Bernacki, R. Scherer
{"title":"Digital forensics: a fast algorithm for a digital sensor identification","authors":"J. Bernacki, R. Scherer","doi":"10.1080/24751839.2022.2058252","DOIUrl":"https://doi.org/10.1080/24751839.2022.2058252","url":null,"abstract":"ABSTRACT We consider the identification of imaging devices by analysing images they produce. The problem is studied in the literature, yet the existing solutions are rather computationally demanding. We propose a high-speed algorithm for the identification of imaging devices. The aim is to provide additional security by identification of legitimate imaging devices or an identification for forensics. The experimental evaluation confirms efficient identification of devices models and brands by the proposed algorithm, compared with the state-of-the-art method. Moreover, our algorithm is approximately two orders of magnitude faster, which is very important in resource-constrained IoT ecosystems or very large databases.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"399 - 419"},"PeriodicalIF":2.7,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44523728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration strategies for balancing efficiency and comprehensibility in model checking with ant colony optimization 蚁群优化模型检验效率与可理解性平衡的探索策略
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-03-22 DOI: 10.1080/24751839.2022.2047470
Tsutomu Kumazawa, M. Takimoto, Y. Kambayashi
{"title":"Exploration strategies for balancing efficiency and comprehensibility in model checking with ant colony optimization","authors":"Tsutomu Kumazawa, M. Takimoto, Y. Kambayashi","doi":"10.1080/24751839.2022.2047470","DOIUrl":"https://doi.org/10.1080/24751839.2022.2047470","url":null,"abstract":"ABSTRACT Model checking is a formal and automated verification technique to show that a software system behaves in accordance with the given specification. Traditional model checking uses exhaustive search techniques for finding violative behaviours of the specification. The techniques, however, often do not work for huge systems because it demands a huge amount of computational resources. Search-Based Software Engineering is known to effectively solve many software engineering problems including model checking. It pursues the good balance between efficiency and qualities of solutions by using swarm intelligence and metaheuristic search methodologies. This article focuses on the state-of-the-art model checking with Ant Colony Optimization. Ant Colony Optimization is a metaheuristic, population-based and stochastic optimization algorithm. We propose two exploration strategies to further improve the balance in model checking based on Ant Colony Optimization. The proposed strategies introduce different kinds of randomized selection mechanisms to diversify solutions found by many agents. The strategies help the search algorithm extend the reachable regions effectively. Through numerical experiments, we confirmed that the proposed strategies require less computation time and memory as compared to the existing model checking with Ant Colony Optimization at the cost of finding slightly less qualified solutions.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"341 - 359"},"PeriodicalIF":2.7,"publicationDate":"2022-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42521513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A fuzzy-based trust evaluation framework for efficient privacy preservation and secure authentication in VANET 一种基于模糊的VANET中有效隐私保护和安全认证的信任评估框架
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-03-06 DOI: 10.1080/24751839.2022.2040898
N. Jyothi, Rekha Patil
{"title":"A fuzzy-based trust evaluation framework for efficient privacy preservation and secure authentication in VANET","authors":"N. Jyothi, Rekha Patil","doi":"10.1080/24751839.2022.2040898","DOIUrl":"https://doi.org/10.1080/24751839.2022.2040898","url":null,"abstract":"ABSTRACT The Vehicular Adhoc Network (VANET) is a newly added smart technique in vehicles to ensure safety and reduce time consumption. Even though it saves time and guarantees safe travel, security and privacy are the most difficult issues in the VANET. Moreover, this is due to the fact that the methods exploit public key infrastructure, group signature, etc., Meanwhile, the hackers can acquire the sensitive data’s which are usually kept in the tamper-proof devices by using side-channel attacks. The VANET also possesses several security-related issues. To circumvent this we propose an efficient privacy-preserving and fuzzy-based trust evaluation scheme. This method ensures the security and authenticity of the VANET. To ensure security our proposed method utilizes a modified Elliptical Curve cryptographic (ECC) method which also reduces the computational complexities created by the conventional ECC. In our proposed method the TPD parameters are renewed more often to eliminate the attacks and permits batch verification methods to reduce the time. The experimental analysis is conducted in Matlab simulator in terms of computational cost, communication cost, evaluation of trustworthiness, privacy protection. The experimental analysis shows that proposed method provides 94% of trustworthiness and time consumption and communication overheads are reduced to greater extent.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"270 - 288"},"PeriodicalIF":2.7,"publicationDate":"2022-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46844822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Special issue: Innovations in Intelligent Systems and Applications 特刊:智能系统与应用的创新
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-01-02 DOI: 10.1080/24751839.2021.1989242
P. Koprinkova-Hristova, M. Ivanović, B. Diri
{"title":"Special issue: Innovations in Intelligent Systems and Applications","authors":"P. Koprinkova-Hristova, M. Ivanović, B. Diri","doi":"10.1080/24751839.2021.1989242","DOIUrl":"https://doi.org/10.1080/24751839.2021.1989242","url":null,"abstract":"Intelligent Systems can be thought of as a concept with a very broad scope. They can have hardware from small microprocessors to large processors, micro-mechanics to macromechanics. Intelligent Systems can have software from low-level simple codes to much more complex codes, can be connected locally or via Internet or can work offline independently. They can be operated or managed remotely or can be autonomous and able to act as a rule-based system or as a learning capable Artificial Intelligence system. We can see ‘Intelligent Systems’ in every area that comes to mind such as Robotics, Finance, Industry, Space technologies, Education, Home Appliances, Health, Communication, Security, Military, Aviation, Energy, and so on. The 14th International Conference on Innovations in Intelligent Systems and Applications (INISTA 2020) took place during the period between 24 August and 26 August 2020 as an online event, organized by the University of Novi Sad, Serbia. Previously, INISTA had been hosted at Sofia, Bulgaria (2019), Thessaloniki, Greece (2018), Gdynia, Poland (2017), Sinaia, Romania (2016), Madrid, Spain (2015), Alberobello, Italy (2014), Albena, Bulgaria (2013), Trabzon, Turkey (2012), Istanbul, Turkey (2011), Kayseri, Turkey (2010), Trabzon, Turkey (2009), Istanbul, Turkey (2007), and Istanbul, Turkey (2005). Authors had been invited to submit high-quality, original research papers on the range of topics including, but not limited to, the following:","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"1 - 5"},"PeriodicalIF":2.7,"publicationDate":"2022-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47567926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Periodic distributed delivery routes planning subject to operation uncertainty of vehicles travelling in a convoy 车队车辆运行不确定性下的周期性分布式配送路线规划
IF 2.7
Journal of Information and Telecommunication Pub Date : 2022-01-01 DOI: 10.1080/24751839.2022.2051925
G. Bocewicz, Peter Nielsen, Czeslaw Smutnicki, J. Pempera, Z. Banaszak
{"title":"Periodic distributed delivery routes planning subject to operation uncertainty of vehicles travelling in a convoy","authors":"G. Bocewicz, Peter Nielsen, Czeslaw Smutnicki, J. Pempera, Z. Banaszak","doi":"10.1080/24751839.2022.2051925","DOIUrl":"https://doi.org/10.1080/24751839.2022.2051925","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"360-380"},"PeriodicalIF":2.7,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"60140885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstruction of 3D digital heritage objects for VR and AR applications 为VR和AR应用重建3D数字遗产
IF 2.7
Journal of Information and Telecommunication Pub Date : 2021-12-02 DOI: 10.1080/24751839.2021.2008133
V. Nguyen, Son Thanh Le, Minh Khai Tran, Ha Manh Tran
{"title":"Reconstruction of 3D digital heritage objects for VR and AR applications","authors":"V. Nguyen, Son Thanh Le, Minh Khai Tran, Ha Manh Tran","doi":"10.1080/24751839.2021.2008133","DOIUrl":"https://doi.org/10.1080/24751839.2021.2008133","url":null,"abstract":"ABSTRACT Constructing the 3D objects based on geometric modelling and graphical techniques is a well-known research activity applied in computer graphics. Techniques to process graphical models are widely used in the field of digital heritage and 3D game. Virtual reality (VR) and Augmented Reality (AR) are technical trends nowadays that can be studied and used in digital high-tech fields like medical training, digital heritage, entertainment industry, digital tourism and museum, etc. In this research, we present a new proposed method for reconstructing the 3D objects of tangible cultural heritages in the virtual environment based on the combination of geometric modelling, computer graphics, VR and AR technologies. The method consists of the following steps: we first collect data of a real object by using a 3D scanner. After processing obtained data, the output is a 3D point cloud. In the next step, we remove noisy data and triangulate the object surface. The novelty point focuses on reconstructing the 3D object by filling the holes. At the end, we build VR and AR applications for visualizing a virtual museum. The contribution of this research leads to open the door for applying in other fields such as 3D Game industry or digital tourism.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"254 - 269"},"PeriodicalIF":2.7,"publicationDate":"2021-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46190644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
High accuracy human activity recognition using machine learning and wearable devices’ raw signals 利用机器学习和可穿戴设备的原始信号进行高精度的人类活动识别
IF 2.7
Journal of Information and Telecommunication Pub Date : 2021-11-10 DOI: 10.1080/24751839.2021.1987706
Andonis Papaleonidas, A. Psathas, L. Iliadis
{"title":"High accuracy human activity recognition using machine learning and wearable devices’ raw signals","authors":"Andonis Papaleonidas, A. Psathas, L. Iliadis","doi":"10.1080/24751839.2021.1987706","DOIUrl":"https://doi.org/10.1080/24751839.2021.1987706","url":null,"abstract":"ABSTRACT Human activity recognition (HAR) is vital in a wide range of real-life applications such as health monitoring of olderly people, abnormal behaviour detection and smart home management. HAR systems can employ smart human-computer interfaces and be parts of active, intelligent surveillance systems. The increasing use of high-tech mobile and wearable devices, such as smart phones, smart watches and smart bands, can be the key elements in building high accuracy models, as they can provide a tremendous number of signals. This research aims to develop and test a machine learning (ML) model, which can successfully recognize a performed activity using raw signals obtained by wearable devices. Photoplethysmography – Daily Life Activities (PPG-DaLiA) dataset contains data related to 15 individuals wearing physiological and motion sensors. PPG-DaLiA was used as an input to a custom data segmentation model to obtain the respective training and testing dataset. Overall, 23 ML well-established models were employed. The weighted and the fine k-nearest neighbours, the fine Gaussian support vector machines and the bagged trees were the algorithms that achieved the best performance with a very high accuracy level.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"6 1","pages":"237 - 253"},"PeriodicalIF":2.7,"publicationDate":"2021-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43419397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信