Webology最新文献

筛选
英文 中文
Evolution of the Latin American Digital Ecosystem in COVID-19 新冠肺炎疫情下拉丁美洲数字生态系统的演变
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19174
Edwin Ramirez-Asis, Dr. Martha Guerra-Muñoz, Dr. Maximiliano Asís-López, Dr. Rolando Saenz-Rodriguez, Dr. Jorge Castillo-Picon
{"title":"Evolution of the Latin American Digital Ecosystem in COVID-19","authors":"Edwin Ramirez-Asis, Dr. Martha Guerra-Muñoz, Dr. Maximiliano Asís-López, Dr. Rolando Saenz-Rodriguez, Dr. Jorge Castillo-Picon","doi":"10.14704/web/v19i1/web19174","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19174","url":null,"abstract":"The relevance of digital technology to fight isolation, distribute preventive measures and assist economic systems began to build as early as the installation of the first health measures for covid 19. This study's goal is to analyze Latin America's ability to fulfill this challenge. The following are the conclusions: Latin America's digital ecosystem is at an intermediate degree of development, allowing it to somewhat alleviate the consequences of the epidemic. Also, the rural/urban contrast shows a significant amount of digital marginalization. The digital divide prevents key segments of the population from receiving health information, downloading instructional resources to improve school performance, or purchasing things online. The digital gap is compounded by the fact that most Latin American homes only use the internet for communication and social networking. A home digital resilience index (calculated on the use of the Internet to download health apps, educational apps, perform e-commerce operations and use fintech). It also suggests a lack of technology adoption, but rather a lack of technological integration in manufacturing processes, notably supply networks. The share of the workforce that can telework adds to the labor market disruption in COVID-19.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43695456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Easing and Monetary Policy Legitimate Perspective 量化宽松与货币政策的正当性视角
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19203
Dr. Abdul Aziz Shwaish Abdul Hameed
{"title":"Quantitative Easing and Monetary Policy Legitimate Perspective","authors":"Dr. Abdul Aziz Shwaish Abdul Hameed","doi":"10.14704/web/v19i1/web19203","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19203","url":null,"abstract":"Many economists, monetary policy makers and bankers view interest rates as an efficient tool for allocating funds, evaluating the efficiency of projects, and measuring financing costs, and that they are the main indicator of many economic variables and phenomena. Other variables, and enables those authorities to implement the monetary policy desired by them. This has led to an important fact, which is that interest rates have lost their effectiveness as a tool for resource allocation or as an influence on economic, credit and monetary policies, and then central banks resorted to new and unconventional tools and forms of monetary policy with the aim of pumping additional liquidity into the banking system or stimulating economic activity. These unconventional policies are the quantitative easing policy that is called quantitative easing sometimes or credit easing at other times, which is based on the central bank’s resort to buying troubled assets that caused a lack of liquidity in commercial banks, or buying assets and government securities from those banks in order to enable them to Adjusting its liquidity position and resuming its lending activity.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43704630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Valence State Analysis Using Discrete Wavelet Transform Features for Early Detection of Autism Spectrum Disorder in Young Kids 基于离散小波变换特征的价态分析用于幼儿自闭症谱系障碍的早期检测
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19325
A. J., Cyril Prasanna Raj P., Elangovan K.
{"title":"Valence State Analysis Using Discrete Wavelet Transform Features for Early Detection of Autism Spectrum Disorder in Young Kids","authors":"A. J., Cyril Prasanna Raj P., Elangovan K.","doi":"10.14704/web/v19i1/web19325","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19325","url":null,"abstract":"Autism spectrum disorder is a developmental disorder that has affected many children around the globe in recent years. It is possible to reduce the severity of the symptoms when the affected children are identified and treated early. Hence, early detection and treatment of this neurodevelopmental disorder significantly help the patient’s (young ASD kids) well-being. In this regard, the research has been initiated by developing an algorithm based on a neural network that can efficiently differentiate the brain activity of a normal young subject and an autistic young subject. In this research, Electroencephalography (EEG) data were collected from normal kids and kids with ASD from age 4 to 6. Discrete Wavelet Transform (DWT) is used for feature extraction of EEG data for valence state analysis on younger kids. It was inferred that there is a linear increase in Power Spectral Density (PSD) irrespective of age during valence state analysis of various EEG bands such as gamma, beta, alpha, and theta. When comparing the PSD of normal subjects with subjects of ASD, the PSD of ASD subjects is comparatively higher than the PSD of normal subjects. The trained network can classify the EEG data as normal subjects and subjects with ASD with good accuracy from the datasets.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41664774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sensor-aware Offloading Model for IoT Edge Computing 物联网边缘计算的传感器感知卸载模型
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19297
S. Byun
{"title":"A Sensor-aware Offloading Model for IoT Edge Computing","authors":"S. Byun","doi":"10.14704/web/v19i1/web19297","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19297","url":null,"abstract":"In IoT sensor network environment, offloading is an important factor that affects all design objectives. Since massive amounts of data are collected every second to the gateway and so immediate processing is difficult, offloading is critical to quickly eliminate worthless data in advance. Similar sensor data are continuously generated except in abnormal situations such as sudden changes and failure events. Therefore, the amount of data processing and frequency of data transmission can be greatly reduced by classifying, filtering, and compressing the data. In addition, more meaningful IoT context can be analyzed by combining multiple sensor data, since the sensor values generated by each sensor has its own characteristics. The previous offloading techniques mainly focused on minimizing latency without using data context and data resizing. Therefore, a new filtering technique is required to enhance the offloading efficiency through precision control using sensor context patterns. This paper proposes a new sensor-aware context offloading model called SCOM to support efficient data filtering services for the edge-based IoT environment. The architecture of SCOM consists of three layers of sensor context, pattern context and transmission context. SCOM exploits context-aware stream pattern matching using general string matching based on slide window for sensor stream offloading. Experiments show that the performance gain of SCOM reaches to 14.8% with respect to the operation throughput. Since proposed data layering and pattern-based offloading scheme can improve the sensor data filtering performance in edge gateways, it can be used for IoT sensor monitoring applications.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44763269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Comparison of File Security Using AES, DES and RSA and Anomaly Detection in Videos Using Convolutional Auto Encoder 基于AES、DES和RSA的文件安全性实现与比较以及基于卷积自动编码器的视频异常检测
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19047
S. Alex, P. A., Rakshita N Patil, A. Kanavalli, Nandish Mahadev Karki
{"title":"Implementation and Comparison of File Security Using AES, DES and RSA and Anomaly Detection in Videos Using Convolutional Auto Encoder","authors":"S. Alex, P. A., Rakshita N Patil, A. Kanavalli, Nandish Mahadev Karki","doi":"10.14704/web/v19i1/web19047","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19047","url":null,"abstract":"Security is the vital part which helps in trying to exchange huge amount of data in the form of valid data from source to destination. Nowadays technology is modifying very fast based on the view on secure information. Every individual who are interacting with social network wishes their communication to be confidential and secured from the access of the unauthenticated users over the internet. Symmetric and Asymmetric Cryptography Techniques play a vital role as the arms of security. Cryptography is the skill of properly modifying the readable plain text data into a not readable cipher form. There are many individual symmetric and asymmetric algorithms that are implemented to secure the files but have their own disadvantages. Proposed technique in this paper is to use a combination of symmetric and asymmetric encryption algorithms and compare the performance with the existing systems. The file is divided into n-parts depending on the size then each part of the file is encrypted with any of the AES, DES, and RSA algorithms. Results of this Hybrid technique provides a stronger security. The comparison is made on the basis of time taken by the proposed and existing systems in milliseconds to encrypt different numbers of bytes of text and image data.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46830000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable Competitive Advantage in the Tourism Industry with IT Managerial Resources, IT Implementation Success and Social Responsibility 旅游业可持续竞争优势与资讯科技管理资源、资讯科技实施成功及社会责任
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19180
Inneke Qamariah, Yasmin Chairunisa Muchtar, L. Maas
{"title":"Sustainable Competitive Advantage in the Tourism Industry with IT Managerial Resources, IT Implementation Success and Social Responsibility","authors":"Inneke Qamariah, Yasmin Chairunisa Muchtar, L. Maas","doi":"10.14704/web/v19i1/web19180","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19180","url":null,"abstract":"This research to analyze the influence of Information Technology managerial resources and Information Technology implementation success on sustainable competitive advantage. Moreover, the research aims to analyze the influence of Information Technology managerial resources and Information Technology implementation success on sustainable competitive advantage moderated by social responsibility. The sample of this research is the owner or manager at Micro and Small Medium Entreprises in tourism industry around the area Samosir Island. Before Pandemic Covid-19, about 215 MSME tourism were existing, which were established more than 1-year period. During the Pandemic, only 73 managers or owners were willing to answer the questionnaires. The data analysis using SmartPLS software. The findings of this research is IT Managerial Resources has impact on Sustainable Competitive Advantage and IT Implementation Success have impact on Sustainable Competitive Advantage. It is also found that Social Responsibility is significant as a moderator in the relationship between IT Managerial Resources and Sustainable Competitive Advantage. Lastly, Social Responsibility is significant as a moderator. This research limitation/implication was designed before the Pandemic Covid-19 condition. Therefore, there is a significant decreasing number of samples in data collection. Because the tourism industry is one of the industries that has suffered the biggest losses due to Covid 19, many tourism companies cannot survive, especially the Micro and Small Medium Entreprises. This research enrich the study about tourism industry which focuses on the social challenge and technological challenge to improve the sustainable competitive advantage in the area of Samosir Island.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46073425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-conventional Bio-Cryptic DOST Features for Private Cloud Secure Access Using Machine Learning Algorithms 使用机器学习算法实现私有云安全访问的非传统生物保密DOST功能
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19323
S. Godi, Kurra Rajasekhara Rao
{"title":"Non-conventional Bio-Cryptic DOST Features for Private Cloud Secure Access Using Machine Learning Algorithms","authors":"S. Godi, Kurra Rajasekhara Rao","doi":"10.14704/web/v19i1/web19323","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19323","url":null,"abstract":"Security issues in cloud computing is always challenging task for the researchers and practitioners. Especially in private cloud security is one of the critical issues to grant access to the remote server. Biometric authentication process will be one of the best solutions to grant access for private cloud server. This paper proposes a novel integrated technique for the secure cloud access by considering Bio-cryptic with DOES features, designated as ‘Bio-Cryptic DOST’ (BCDOST) method. The method is implemented in Matlab and trained with 6000 data samples and tested using 5000 biometric data samples that includes, finger, face, iris and palm biometric features. Overall, 98.7% has obtained on a K-fold cross-validation (k=5), and also the results was compared with the present DOST and 4 different customary strategies. supported the results, it's over that, the proposed methodology performed well with relation to accuracy and computation-time.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46469391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Depression among Social Media Users with Machine Learning 利用机器学习检测社交媒体用户的抑郁情绪
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19019
S. M, Arun Raj L, A. A
{"title":"Detection of Depression among Social Media Users with Machine Learning","authors":"S. M, Arun Raj L, A. A","doi":"10.14704/web/v19i1/web19019","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19019","url":null,"abstract":"Mental illnesses are a significant and growing public health concern. They have the potential to tremendously affect a person’s life. Depression, in particular, is one of the major reasons for suicide. In recent times, the popularity of social media websites has burgeoned as they are platforms that facilitate discussion and free-flowing conversation about a plethora of topics. Information and dialogue about subjects like mental health, which are still considered as a taboo in various cultures, are becoming more and more accessible. The objective of this paper is to review and comprehensively compare various previously employed Natural Language Processing techniques for the purpose of classification of social media text posts as those written by depressed individuals. Furthermore, pros, cons, and evaluation metrics of these techniques, along with the challenges faced and future directions in this area of research are also summarized.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46627072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analyzing Factors Influencing Sustainable Banking Development in Vietnam 影响越南银行业可持续发展的因素分析
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19215
Hoang Xuan Que, D. Huy, N. Thach, T. D. Thang
{"title":"Analyzing Factors Influencing Sustainable Banking Development in Vietnam","authors":"Hoang Xuan Que, D. Huy, N. Thach, T. D. Thang","doi":"10.14704/web/v19i1/web19215","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19215","url":null,"abstract":"We analyze banking sustainability via measuring impacts of various factors on net profit in an econometric model. This study will analyze a typical case of Eximbank (EIB) a listed big bank in Vietnam market. By using Eview software to conduct an econometric (OLS regression) and taking advantage of qualitative analysis and inductive methods, The research findings tell us that because total revenue has higher impact on net profit than sale cost, Eximbank (EIB) need to pay more attention to selling and increasing revenues from business, as well as managing cost better. Next, as CPI, G and R has high positive correlation with net profit, there is policy implication that CPI can increase a little but and GDP growth increase to be in favor of rising net profit of EIB.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41451380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employment of IOT Architecture and Genetic Algorithm for Early Diagnosis of Corona Virus Disease (COVID-19) 物联网架构和遗传算法在冠状病毒病(新冠肺炎)早期诊断中的应用
Webology Pub Date : 2022-01-20 DOI: 10.14704/web/v19i1/web19137
Ahmed Raee AL-Mhanawi, Alaa Sabeeh Salim, H. A. Rasool, Hayder Makki Sabti
{"title":"Employment of IOT Architecture and Genetic Algorithm for Early Diagnosis of Corona Virus Disease (COVID-19)","authors":"Ahmed Raee AL-Mhanawi, Alaa Sabeeh Salim, H. A. Rasool, Hayder Makki Sabti","doi":"10.14704/web/v19i1/web19137","DOIUrl":"https://doi.org/10.14704/web/v19i1/web19137","url":null,"abstract":"Coronavirus disease (COVID-19) has affected millions of people and thousands have died around the world. Early diagnosis of COVID 19 helps to reduce the spread of COVID-19 which could save many lives. One of the early symptoms of COVID-19 is a high temperature. In poor countries, temperature measurement devices are not available everywhere in the county due to the high cost. Therefore, in this paper, we present a low-cost system to measure the temperature. Our system is designed based on IOT architecture which is represented by Arduino UNO with a DS18B20 temperature sensor. The collected data has been analyzed utilizing a genetic algorithm where it has the ability to analyze and sort huge amounts of data. All the results collected by the Genetic algorithm are stored in the NoSQL database, which is characterized by the high data security and the ability to deal with the big data. We have tested our system with 300 people where 30 suspected persons out of 300 detected with high temperature. The 30 suspected persons have tested positive when they checked with the hospital. Our system is not expensive and easy to manufacturing in labs. At the same time, our system has shown accurate results.","PeriodicalId":35441,"journal":{"name":"Webology","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48919160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信