Journal of ICT Standardization最新文献

筛选
英文 中文
Comparative Techniques Using Hierarchical Modelling and Machine Learning for Procedure Recognition in Smart Hospitals 智能医院过程识别的层次建模与机器学习比较技术
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1023
Shaheena Noor;Muhammad Aamir;Najma Ismat;Muhammad Imran Saleem
{"title":"Comparative Techniques Using Hierarchical Modelling and Machine Learning for Procedure Recognition in Smart Hospitals","authors":"Shaheena Noor;Muhammad Aamir;Najma Ismat;Muhammad Imran Saleem","doi":"10.13052/jicts2245-800X.1023","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1023","url":null,"abstract":"6G is one of the key cornerstone elements of the futuristic smart system setup - the others being cloud computing, big data, wearable devices and Artificial Intelligence. Also, smart offices and homes have become even more popular than before, because of the advancement in computer vision and Machine Learning (ML) technologies. Recognition of human actions and situations are fundamental components of such systems, especially in complex environments like healthcare, for example at the dentist clinic, where we need cues such as eye movement to distinguish procedures being undertaken. In this work, we compare models based on hierarchical modelling and machine learning to identify the dental procedure. We used the objects seen while following the eye trajectories and focussed on elements including material used for treatment, equipment involved and the teeth conditions i.e. symptoms. Our experiments showed that using Artificial Neural Network (ANN) increased the accuracy of prediction compared to hierarchical modelling. Our experiments show an improvement in accuracy for each of the constituent parameters i.e., symptom (ANN: 95.58% vs. Hierarchical: 45.68%), material (ANN: 86.32% vs. Hierarchical: 45.18%) and equipment (ANN: 92.65% vs. Hierarchical: 59.39%).","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 2","pages":"145-164"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10254727/10254661.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68110513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Health Data in Electronic Health Records (EHR): Security and Privacy Issues in Era of 6G 电子健康记录(EHR)中的物联网健康数据:6G时代的安全和隐私问题
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1014
Ana Koren;Ramjee Prasad
{"title":"IoT Health Data in Electronic Health Records (EHR): Security and Privacy Issues in Era of 6G","authors":"Ana Koren;Ramjee Prasad","doi":"10.13052/jicts2245-800X.1014","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1014","url":null,"abstract":"Millions of wearable devices with embedded sensors (e.g., fitness trackers) are present in daily lives of its users, with the number growing continuously, especially with the approaching 6G communication technology. These devices are helping their users in monitoring daily activities and promoting positive health habits. Potential integration of such collected data into central medical system would lead to more personalized healthcare and an improved patient-physician experience. However, this process is met with several challenges, as medical data is of a highly sensitive nature. This paper focuses on the security and privacy issues for such a process. After providing a comprehensive list of security and privacy threats relevant to data collection and its handling within a Central Health Information system, the paper addresses the challenges of designing a secure system and offeres recommendations, solutions and guidelines for identified pre-6G and 6G security and privacy issues.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 1","pages":"63-84"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255387/10255403.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68134610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
6G Technologies - How Can It Help Future Green Business Model Innovation 6G技术如何帮助未来的绿色商业模式创新
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1012
Peter Lindgren
{"title":"6G Technologies - How Can It Help Future Green Business Model Innovation","authors":"Peter Lindgren","doi":"10.13052/jicts2245-800X.1012","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1012","url":null,"abstract":"In the last few years businesses have been motivated and pushed by governments and global society on innovating and developing Green Business Models. However, Reconfiguring, designing and developing green business models to become efficient and valuing Green Business Models have shown to be much more complex than expected. It includes balancing monetary and non monetary value formulas of business models in symbiosis. Not just for the single business - but for businesses in their entire value network. This includes security challenges related to securing that green business models really are green - and not based on greenwashing. As green business models demand in long term perspective a very open business model innovation approach, it calls for stronger and new security technologies. Protection of IPR's of Business Models and businesses competences, so they are not one to one copied with out giving value back to “the Business Model designer” and the rightful original owner of the business models is a major security challenge related to green business models. Green Business Models and Green business Model Innovation calls therefore for new and more advanced security approach, technologies and understanding. Previous business model innovation security practice and systems cannot fully offer these solutions - but 6G of wide-area wireless security technologies - as an umbrella - gives hope and can potentially play major role with new security technologies supported by AI, AR and blockchain technologies. This evolvement is highly and urgent needed to support the success of our society's green transformation. The paper document through Nordic green business model cases some of the above mention security challenges that green business models and green business model innovation stand in front of and need to innovate solutions for. The paper discuss and propose how 6G and related technologies could help.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 1","pages":"11-37"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255387/10255425.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68134612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Managers' Perception on the IT Audit Recommendations: The Effect of Risk Significance, Ease of Implementation and Added Value on Implementation of Recommendations 管理者对IT审计建议的感知:风险显著性、实施容易性和附加值对建议实施的影响
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1021
Armend Salihu;Hamdi Hoti
{"title":"Managers' Perception on the IT Audit Recommendations: The Effect of Risk Significance, Ease of Implementation and Added Value on Implementation of Recommendations","authors":"Armend Salihu;Hamdi Hoti","doi":"10.13052/jicts2245-800X.1021","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1021","url":null,"abstract":"The purpose of this study is to analyse the impact of the risk significance of audit results, the quality of the recommendations given on how easy it is to implement them, and the added benefit to the organization in implementing the recommendations. After a comprehensive literature review, the study provides a statistical analysis through a questionnaire that has been distributed to investigate the effect of Risk Significance, Ease of Implementation, and the Added Value on the implementation of the recommendations within organizations. Regarding the results obtained from the questionnaire, all Cronbach's Alpha values are within the acceptable level, whereas the first three variables (Implementation of Recommendations, Risk Significance and Ease of Implementation) have a strong positive correlation between each other. There is a weak positive correlation between Added Value of Recommendations with other variables. In the regression analysis was found that all independent variables have a positive effect on the depended variable.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 2","pages":"105-124"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10254727/10254728.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68110517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Refining Word Embeddings with Sentiment Information for Sentiment Analysis 用情感信息提炼词嵌入进行情感分析
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1031
Mohammed Kasri;Marouane Birjali;Mohamed Nabil;Abderrahim Beni-Hssane;Anas El-Ansari;Mohamed El Fissaoui
{"title":"Refining Word Embeddings with Sentiment Information for Sentiment Analysis","authors":"Mohammed Kasri;Marouane Birjali;Mohamed Nabil;Abderrahim Beni-Hssane;Anas El-Ansari;Mohamed El Fissaoui","doi":"10.13052/jicts2245-800X.1031","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1031","url":null,"abstract":"Natural Language Processing problems generally require the use of pretrained distributed word representations to be solved with deep learning models. However, distributed representations usually rely on contextual information which prevents them from learning all the important word characteristics. The task of sentiment analysis suffers from such a problem because sentiment information is ignored during the process of learning word embeddings. The performance of sentiment analysis can be affected since two words with similar vectors may have opposite sentiment orientations. The present paper introduces a novel model called Continuous Sentiment Contextualized Vectors (CSCV) to address this problem. The proposed model can learn word sentiment embedding using its surrounding context words. It uses Continuous Bag-of-Words (CBOW) model to deal with the context and sentiment lexicons to identify sentiment. Existing pre-trained vectors are combined then with the obtained sentiment vectors using Principal component analysis (PCA) to enhance their quality. The experiments show that: (1) CSCV vectors can be used to enhance any pre-trained word vectors; (2) The result vectors strongly alleviate the problem of similar words with opposite polarities; (3) The performance of sentiment classification is improved by applying this approach.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 3","pages":"353-382"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255395/10255396.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67890239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hybrid Approach for Automated Test Data Generation 测试数据自动生成的混合方法
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1043
Gagan Kumar;Vinay Chopra
{"title":"Hybrid Approach for Automated Test Data Generation","authors":"Gagan Kumar;Vinay Chopra","doi":"10.13052/jicts2245-800X.1043","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1043","url":null,"abstract":"Software testing has long been thought to be a good technique to improve the software quality and reliability. Path testing is the most reliable software testing technique and the key method for improving software quality among all testing approaches. On the other hand, test data quality has a big impact on the software testing activity's ability to detect errors or defects. To solving testing problem, one must locate the entire search space for the relevant input data to encompass the different paths in the testable program. To satisfy path coverage, it is vital test to look at the accumulated test data across the thorough search area. A new approach based on ant colony optimization and negative selection algorithm (HACO-NSA) is presented in this research which overcome the flaws associated with search-based test data by generated automated test data. The optimum path testing objective is to generate appropriate test data to maximise coverage and to enhance the test data's efficacy, as a result, the test data's adequacy is validated using a path-based fitness function. In the NSA generation stage, the suggested method alters the new detectors creation using ACO. The proposed approach is evaluated for metrics such as average coverage, average generation, average time, and success rate and comparison has been done with random testing, ant colony optimization and negative selection algorithm Different benchmark programs have been used for object-oriented system. The findings show that the hybrid methodology escalates the coverage percentage and curtail test data size, reduces the redundancy in data and enhances the efficiency. The proposed approach is follows IEEE 829–2008 test documentation in entire testing process.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 4","pages":"531-561"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10254731/10255394.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68009002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diabetes Prediction Using Machine Learning Algorithms and Ontology 基于机器学习算法和本体的糖尿病预测
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.10212
Hakim El Massari;Zineb Sabouri;Sajida Mhammedi;Noreddine Gherabi
{"title":"Diabetes Prediction Using Machine Learning Algorithms and Ontology","authors":"Hakim El Massari;Zineb Sabouri;Sajida Mhammedi;Noreddine Gherabi","doi":"10.13052/jicts2245-800X.10212","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.10212","url":null,"abstract":"Diabetes is one of the chronic diseases, which is increasing from year to year. The problems begin when diabetes is not detected at an early phase and diagnosed properly at the appropriate time. Different machine learning techniques, as well as ontology-based ML techniques, have recently played an important role in medical science by developing an automated system that can detect diabetes patients. This paper provides a comparative study and review of the most popular machine learning techniques and ontology-based Machine Learning classification. Various types of classification algorithms were considered namely: SVM, KNN, ANN, Naive Bayes, Logistic regression, and Decision Tree. The results are evaluated based on performance metrics like Recall, Accuracy, Precision, and F-Measure that are derived from the confusion matrix. The experimental results showed that the best accuracy goes for ontology classifiers and SVM.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 2","pages":"319-337"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10254727/10255389.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68110508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Machine Learning-Based Approach for Fake News Detection 基于机器学习的假新闻检测方法
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1042
H. L. Gururaj;H. Lakshmi;B. C. Soundarya;Francesco Flammini;V. Janhavi
{"title":"Machine Learning-Based Approach for Fake News Detection","authors":"H. L. Gururaj;H. Lakshmi;B. C. Soundarya;Francesco Flammini;V. Janhavi","doi":"10.13052/jicts2245-800X.1042","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1042","url":null,"abstract":"In the modern era where the internet is found everywhere and there is rapid adoption of social media which has led to the spread of information that was never seen within human history before. This is due to the usage of social media platforms where consumers are creating and sharing more information where most of them are misleading with no relevance with reality. Classifying the text article automatically as misinformation is a bit challenging task. This development addresses how automated classification of text articles can be done. We use a machine learning approach for the classification of news articles. Our study involves exploring different textual properties that may be often used to distinguish fake contents from real ones. By using those properties, can train the model with different machine learning algorithms and evaluate their performances. The classifier with the best performance is used to build the classification model which predicts the reliability of the news articles present in the dataset.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 4","pages":"509-530"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10254731/10255417.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68009003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Random Access Mechanism Enhancement Based on a Hybrid ALOHA Protocol Using an Analytical Model 基于分析模型的混合ALOHA协议的随机接入机制增强
Journal of ICT Standardization Pub Date : 2022-01-01 DOI: 10.13052/jicts2245-800X.1032
Abdessamad Bellouch;Abdellah Zaaloul;Abdelkrim Haqiq
{"title":"Random Access Mechanism Enhancement Based on a Hybrid ALOHA Protocol Using an Analytical Model","authors":"Abdessamad Bellouch;Abdellah Zaaloul;Abdelkrim Haqiq","doi":"10.13052/jicts2245-800X.1032","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.1032","url":null,"abstract":"In this paper, we present a new MAC (Medium Access Control) protocol, called Hybrid ALOHA (H-ALOHA), which is a combination of two existing protocols: Pure ALOHA (P-ALOHA) protocol and Slotted ALOHA (S-ALOHA) protocol. The idea behind it is to design a MAC protocol that could meet some specific requirements in wireless networks, such as reducing energy consumption, delay minimization, and increasing the throughput. To the best of our knowledge, the S-ALOHA protocol is an improved version of P-ALOHA. However, during one single transmission scenario, P-ALOHA works better than S-ALOHA in terms of energy consumption and packet delivery. Motivated by that fact, we combine these two protocols, resulting in a hybrid ALOHA. A finite-state Markovian model is proposed to study the steady-state performance of H-ALOHA including normalized throughput, backlogged throughput, access delay, backlogged delay, and energy consumption. The proposed hybrid protocol has been compared with the S-ALOHA protocol. The simulation results show that the proposed hybrid protocol outperforms all ALOHA protocols. On average, the proposed protocol outperforms the S-ALOHA protocol by 60% in terms of normalized throughput, by 15% in terms of access delay, and by 23% in terms of total energy consumed during the transmission process.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 3","pages":"383-409"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255395/10255400.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67890242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial Foreword 编辑前言
Journal of ICT Standardization Pub Date : 2022-01-01
Ramjee Prasad;Anand R. Prasad
{"title":"Editorial Foreword","authors":"Ramjee Prasad;Anand R. Prasad","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"Based on 10 selected papers of the workshop “6G Knowledge Lab Opening and 36th GISFI Workshop” held on 21–22 December 2020, organized jointly by the CTIF Global Capsule (CGC) and the Global ICT Standardisation Forum for India (GISFI), the Special Issue has been divided in 2 parts, consisting of 5 papers each.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"10 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255387/10255426.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68134609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信