Journal of Advances in Information Technology最新文献

筛选
英文 中文
Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity 基于促进意外发现的五个评价概念的理想高效推荐系统
IF 1
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.701-717
O. Stitini, I. García-Magariño, S. Kaloun, O. Bencharef
{"title":"Towards Ideal and Efficient Recommendation Systems Based on the Five Evaluation Concepts Promoting Serendipity","authors":"O. Stitini, I. García-Magariño, S. Kaloun, O. Bencharef","doi":"10.12720/jait.14.4.701-717","DOIUrl":"https://doi.org/10.12720/jait.14.4.701-717","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach 标准文莱马来语词性标注:基于概率和神经的方法
IF 1
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.4.830-837
Izzati Mohaimin, R. Apong, A. R. Damit
{"title":"Part-of-Speech (POS) Tagging for Standard Brunei Malay: A Probabilistic and Neural-Based Approach","authors":"Izzati Mohaimin, R. Apong, A. R. Damit","doi":"10.12720/jait.14.4.830-837","DOIUrl":"https://doi.org/10.12720/jait.14.4.830-837","url":null,"abstract":"—As online information increases over the years, text mining researchers developed Natural Language Processing tools to extract relevant and useful information from textual data such as online news articles. The Malay language is widely spoken, especially in the Southeast Asian region, but there is a lack of Natural Language Processing (NLP) tools such as Malay corpora and Part-of-Speech (POS) taggers. Existing NLP tools are mainly based on Standard Malay of Malaysia and Indonesian language, but there is none for the Bruneian Malay. We addressed this issue by designing a Standard Brunei Malay corpus consisting of over 114,000 lexical tokens, annotated using 17 Malay POS tagsets. Furthermore, we implemented two commonly used POS tagging techniques, Conditional Random Field (CRF) and Bi-directional Long Short-Term Memory (BLSTM), to develop Bruneian POS taggers and compared their performances. The results showed that both CRF and BLSTM models performed well in predicting POS tags on Bruneian texts. However, CRF models outperform BLSTM, where CRF using all features achieved an F-Measure of 92.06% on news articles and 90.71% of F-Measure on crime articles. Adding a batch normalization layer to the BLSTM model architecture increased the performance by 7.13%. To further improve the BLSTM models, we suggested increasing the training data and experimenting with different hyperparameter settings. The findings also indicated that modelling BLSTM with fastText has improved the POS prediction of Bruneian words.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Language Model Role in Improving Machine Translation Accuracy for Extremely Low Resource Languages 语言模型在提高极低资源语言机器翻译准确率中的作用分析
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1073-1081
Herry Sujaini, Samuel Cahyawijaya, Arif B. Putra
{"title":"Analysis of Language Model Role in Improving Machine Translation Accuracy for Extremely Low Resource Languages","authors":"Herry Sujaini, Samuel Cahyawijaya, Arif B. Putra","doi":"10.12720/jait.14.5.1073-1081","DOIUrl":"https://doi.org/10.12720/jait.14.5.1073-1081","url":null,"abstract":"—Several previous studies have suggested using statistical machine translation instead of neural machine translation for extremely low-resource languages. We could translate texts from 12 different regional languages into Indonesian using machine translation experiments. We increased the accuracy of machine translation for 12 extremely low-resource languages by using several monolingual corpus sizes on the language model’s target side. Since many Indonesian sources are available, we added this corpus to improve the model’s performance. Our study aims to analyze and evaluate the impact of different language models trained on various monolingual corpus on the accuracy of machine translation. The increase in accuracy when enlarging the monolingual corpus is not observed every time, according to our experiments. Therefore, it is necessary to perform several experiments to determine the monolingual corpus to optimize the quality. Experiments showed that Melayu Pontianak achieved the highest bilingual evaluation understudy improvement point. Specifically, we found that by adding a monolingual corpus of 50–100K, they performed a bilingual evaluation understudy improvement point of 2.15, the highest improvement point they reached for any of the twelve languages tested.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135052618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of ERS Techniques for Next-Generation Opportunistic Networks 下一代机会网络ERS技术性能分析
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1117-1123
Nguyen Minh Quy, Abdellah Chehri, Pham Duc Khai, Dao Manh Linh, Dang Van Anh
{"title":"Performance Analysis of ERS Techniques for Next-Generation Opportunistic Networks","authors":"Nguyen Minh Quy, Abdellah Chehri, Pham Duc Khai, Dao Manh Linh, Dang Van Anh","doi":"10.12720/jait.14.5.1117-1123","DOIUrl":"https://doi.org/10.12720/jait.14.5.1117-1123","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the Effect of Denial of Service in Web Service Environment 减少Web服务环境中拒绝服务的影响
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.1096-1102
Abdulrahman Alshayea, Mohammad Ali H. Eljinini
{"title":"Reducing the Effect of Denial of Service in Web Service Environment","authors":"Abdulrahman Alshayea, Mohammad Ali H. Eljinini","doi":"10.12720/jait.14.5.1096-1102","DOIUrl":"https://doi.org/10.12720/jait.14.5.1096-1102","url":null,"abstract":"—Denial of Service (DoS) attacks can cost online and web service providers money and damage their reputations. The lack of security protection in web services creates a vulnerability attackers can exploit. A new XDoS attack targeting web services has recently emerged, using XML rather than plain old HTML as the attack vector. This paper proposes a middleware tool for detecting and preventing web service XDoS and HTTP flooding attacks. A rule-based technique classifies requests as benign or malicious to detect XDoS attacks. According to the middleware tool’s trial findings, rule-based technology has successfully recognized and blocked XDoS and HTTP flooding assaults such as large payloads, forceful parsing, and external XML elements in near-real time, such as 0.006s across web services. Middleware protects web services from XDoS and distributed XDoS attacks by ensuring nearly 100% service availability for routine requests (DXDoS).","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Neural Network-Based Fall Detection for the Elderly Person Monitoring 基于卷积神经网络的老年人跌倒检测
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.6.1169-1176
Kishanprasad G. Gunale, Prachi Mukherji, Sumitra N. Motade
{"title":"Convolutional Neural Network-Based Fall Detection for the Elderly Person Monitoring","authors":"Kishanprasad G. Gunale, Prachi Mukherji, Sumitra N. Motade","doi":"10.12720/jait.14.6.1169-1176","DOIUrl":"https://doi.org/10.12720/jait.14.6.1169-1176","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135609318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Zero Trust Security to Reduce Ransomware Attacks in the Philippines: A Literature Review 菲律宾实施零信任安全以减少勒索软件攻击:文献综述
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.928-933
Eric Blancaflor, Angelo Dominic D. Abat, Kyle Matthew A. Degrano, Ma. Cassandra M. Lindio, Andrei Daniel A. Pamoso
{"title":"Implementation of Zero Trust Security to Reduce Ransomware Attacks in the Philippines: A Literature Review","authors":"Eric Blancaflor, Angelo Dominic D. Abat, Kyle Matthew A. Degrano, Ma. Cassandra M. Lindio, Andrei Daniel A. Pamoso","doi":"10.12720/jait.14.5.928-933","DOIUrl":"https://doi.org/10.12720/jait.14.5.928-933","url":null,"abstract":"—Zero Trust Security is an architecture that, as the name implies, trusts no one. This type of architecture is used by several firms globally due to its robust security. The Zero Trust security implementation in the Philippines is very low and it shows by looking at the number of cyberattacks that Philippine companies experience. A prominent form of cyberattack is ransomware that endangers that sensitive information that most companies hold. Ransomware attacks are common, and this is where attackers would lock certain files and will only be unlocked when the victim would pay the appropriate ransom for the information. The Philippines has been deemed by international firms as a risky venture since the cybersecurity levels are low. There are also reports that major companies in the Philippines are victims of large-scale ransomware attacks. This study aims to give an in-depth explanation of Zero Trust and see its fundamental aspects that makes it a better option. This exploratory study considers the possible capabilities of the said architecture to combat ransomware in the context of the Philippines.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Flight Delays Reduction: The Effect of Aircraft Type and Part of Day on Arrival Delays Prediction 减少航班延误:飞机类型和时间对到达延误预测的影响
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.5.980-990
Hajar Alla, Lahcen Moumoun, Youssef Balouki
{"title":"Towards Flight Delays Reduction: The Effect of Aircraft Type and Part of Day on Arrival Delays Prediction","authors":"Hajar Alla, Lahcen Moumoun, Youssef Balouki","doi":"10.12720/jait.14.5.980-990","DOIUrl":"https://doi.org/10.12720/jait.14.5.980-990","url":null,"abstract":"—The basic objective of this study is to develop a model that analyzes and predicts the occurrence of flight arrival delays in the United States. Macroscopic and microscopic delay factors are discussed. In this research, we proposed new features that, to the best of our knowledge, were never used in previous studies, namely departure Part and Arrival Part of the day (Mornings, Afternoons, Evenings, Nights) and type of aircraft. U.S. domestic flight data for the year 2018, extracted from the Bureau of Transportation Statistics (BTS), were adopted in order to train the predictive model. We used efficient Machine Learning classifiers such as Decision Trees, K-Nearest Neighbors, Random Forest and Multilayer Perceptron. To overcome the issue of imbalanced data, sampling techniques were performed. We chose Grid Search technique for best parameters selection. The performance of each classifier was compared in terms of evaluation metrics, parameters tuning, data sampling and features selection. The experimental results showed that tuning and sampling techniques have successfully generated the best classifier which is Multilayer Perceptron (MLP) with an accuracy of 98.72% and a higher number of correctly classified flights.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136202086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using IoT-Enabled RFID Smart Cards in an Indoor People-Movement Tracking System with Risk Assessment 在具有风险评估的室内人员运动跟踪系统中使用支持物联网的RFID智能卡
IF 1
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.2.168-177
M. Samonte, Darwin Medel, Joshua Millard N. Odicta, M. Z. Santos
{"title":"Using IoT-Enabled RFID Smart Cards in an Indoor People-Movement Tracking System with Risk Assessment","authors":"M. Samonte, Darwin Medel, Joshua Millard N. Odicta, M. Z. Santos","doi":"10.12720/jait.14.2.168-177","DOIUrl":"https://doi.org/10.12720/jait.14.2.168-177","url":null,"abstract":"As the COVID-19 pandemic ravaged the planet at a standstill, remote employment seemed inescapable. Still, for some businesses that rely on the on-site presence of employees, this was a lethal blow. As time passed, restrictions got looser and allowed people to strike a balance between on-site and remote work. Thus, tracking people's indoor movements for purposes involving activity inference, security, and contact tracing is more crucial than ever before. This research explores the applicability of (Radio Frequency Identification) RFID contactless smart cards in tracking people's movement within an enclosed establishment by building a proof-of-concept prototype that allows the mentioned purposes. Furthermore, the system underwent multiple test phases to verify that the system meets the functional and non-functional requirements listed to ensure the system's operational success. Consequently, the test results prove that: 1) the system is behaving as intended;2) the system is secure from known high-risk vulnerabilities;and 3) the system satisfies user requirements and standards, thus fulfilling the functional and non-functional requirements for a human-tracking movement system. © 2023 by the authors.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Philippines' Free Wi-Fi Roll-out Project: Safe or Not? 菲律宾免费Wi-Fi项目:安全与否?
IF 1
Journal of Advances in Information Technology Pub Date : 2023-01-01 DOI: 10.12720/jait.14.1.20-25
E. Blancaflor, Eli Christ Paula C. Castillo, Jan Miguel N. Coretico, Geremie B. Rubiano, Angela Marie D. Tobias
{"title":"Philippines' Free Wi-Fi Roll-out Project: Safe or Not?","authors":"E. Blancaflor, Eli Christ Paula C. Castillo, Jan Miguel N. Coretico, Geremie B. Rubiano, Angela Marie D. Tobias","doi":"10.12720/jait.14.1.20-25","DOIUrl":"https://doi.org/10.12720/jait.14.1.20-25","url":null,"abstract":"Free Wi-Fi networks are widely implemented in public areas to provide benefits for the people. This paper focuses on the vulnerabilities around Wi-Fi networks that people are unaware of. Discussing the risks of using free internet is viable as public places in the Philippines have started implementing free Wi-Fi networks. Along with this, the Department of Information and Communication Technology (DICT) of the Philippines is expanding the number of free Wi-Fi to help the Filipinos adjust to the new normal caused by the pandemic. With the increase of internet access, Filipinos should be informed of the risks they may have. In this study, the security of free Wi-Fi has been exploited through various technical methods of Wi-Fi penetration testing. The study simulated penetration testing using the Kali Linux in a virtual environment from consented Wi-Fi owners. The overall result of the study shows that free Wi-Fi networks in public areas may not be safe. Free Wi-Fi users must be aware of the risk; hackers accessing their devices and inevitably stealing their private personal information.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信