{"title":"Structural Relationship Between Environmental Uncertainty, Organizational Agility, and Business Performance in SMMEs","authors":"Dongkwan Jo, Y. Seo","doi":"10.4018/ijsi.304879","DOIUrl":"https://doi.org/10.4018/ijsi.304879","url":null,"abstract":"Despite that small and medium-sized manufacturing firms have been playing a role to promote economic growth and development in national industries, the management activities of small and medium-sized manufacturing firms are restricted by numerous internal and external environmental factors and are facing diverse challenges. Therefore, this study empirically verified the structural relationships among environmental uncertainty, organizational agility, and business performance recognized by small and medium-sized manufacturing firms. According to the results of this study, it can be said to be important to identify the characteristics of the uncertain management environment and secure and strengthen agile organizational capabilities to respond to the foregoing in order to secure competitive advantages and achieve sustainable growth of small and medium-sized manufacturing firms in the rapidly changing business environment.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Black Box DVR System in IT-Based Vehicle Emergency Rescue Environment","authors":"Sun-O. Choi, Jong-Bae Kim","doi":"10.4018/ijsi.309961","DOIUrl":"https://doi.org/10.4018/ijsi.309961","url":null,"abstract":"In this paper, the driving habits and patterns are analyzed by automatically recognizing vehicle accidents and recording event data when dangerous situations occur, applying connected car service through IT technology. In addition, SBDS designs the highly scalable modeling that reproduces videos which are recorded before and after accidents. SBDS provides emergency rescue and traffic information services by receiving IoT sensor data connected to have an embedded system in the vehicle and notifying the accident location and video information to the control center, using wireless network service even when the vehicle is dormant. In addition, it is possible to implement a wireless e-Call service by interlocking ECU information and vehicle sensor data in case an emergency occurs.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"2001 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117119144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Niaz Imtiaz, Md. Toukir Ahmed, Md Rakibul Hasan
{"title":"Identifying Biased Reviews: An Analysis on Amazon Electronic Products","authors":"Md. Niaz Imtiaz, Md. Toukir Ahmed, Md Rakibul Hasan","doi":"10.4018/ijsi.297991","DOIUrl":"https://doi.org/10.4018/ijsi.297991","url":null,"abstract":"Online reviews play a significant role in our community contributing to the prediction of the marketing situation, making industries modifying their advertising policies. Many consumers choose online reviews for making the decision to buy a specific product. In recent years, product sellers provide some lucrative offers to write biased reviews which are usually very positive that increases the rating of the products significantly. So it is very important to detect biased reviews for online shopping to help the consumers in their decision making to buy proper products. In this work, a new method has been developed for detecting those biased reviews generated on some products at Amazon. At first online reviews of Amazon product like- Fire Tablet, Alkaline Batteries, etc. are collected. Then sentiment analysis is introduced for calculating the sentiment score of the text reviews with the help of natural language processing. Naïve-Bayes-Analyzer model and TextBlob library are used to calculate the sentiment scores. Finally, statistical measurements are used to detect biased reviews.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125657526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle Type Classification Using Hybrid Features and a Deep Neural Network","authors":"N. Sathyanarayana, A. Narasimhamurthy","doi":"10.4018/ijamc.292518","DOIUrl":"https://doi.org/10.4018/ijamc.292518","url":null,"abstract":"Currently, considerable research has been done in vehicle type classification, especially due to the success of deep learning in many image classification problems. In this research, a system incorporating hybrid features is proposed to improve the performance of vehicle type classification. The feature vectors are extracted from the pre-processed images using Gabor features, a histogram of oriented gradients and a local optimal oriented pattern. The hybrid set of features contains complementary information that could help discriminate between the classes better, further, an ant colony optimizer is utilized to reduce the dimension of the extracted feature vectors. Finally, a deep neural network is used to classify the types of vehicles in the images. The proposed approach was tested on the MIO vision traffic camera dataset and another more challenging real-world dataset consisting of videos of multiple lanes of a toll plaza. The proposed model showed an improvement in accuracy ranging from 0.28% to 8.68% in the MIO TCD dataset when compared to well-known neural network architectures.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128960140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text-Dependent and Text-Independent Writer Identification Approaches: Challenges and Future Directions","authors":"R. Kaur, Rajneesh Rani, Roop Pahuja","doi":"10.4018/ijsi.297514","DOIUrl":"https://doi.org/10.4018/ijsi.297514","url":null,"abstract":"Writer identification is a wide-spreading biometric which can be used as a legitimate mean to identify an individual. It facilitates the experts to automatically identify the person in many security concerns applications such as forensic science. Due to this, much attention has been drawn in this field from the last few decades. On the basis of input text, it can have various forms like online, offline, text-dependent or text-independent writer identification. The paper will present a systematic study on text-dependent and text-independent writer identification of handwritten text images for various Indic and non-Indic scripts. The various segmentation techniques used to segment handwritten text are also presented in detail. The various datasets available for researchers are given for various scripts such as English, Arabic, Chinese, Japanese, Dutch, Farsi, Devanagari, Bangla, and Kannada discussed by doing exhaustive analysis of various studies. We hope that our research will be helpful in giving better understanding of the area and provides various directions for further research.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132371727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ensemble Deep Learning Intrusion Detection Model for Fog Computing Environments","authors":"K. Kalaivani, M. Chinnadurai","doi":"10.4018/ijsi.303587","DOIUrl":"https://doi.org/10.4018/ijsi.303587","url":null,"abstract":"Fog computing is decentralized architecture located between the cloud and devices that produce data. It acts as an intermediate layer between IoT devices and Cloud. Fog computing can perform substantial processing for the time sensitive IoT applications to reduce the latency. At the same time the Fog layer is exposed to various kinds of attacks. Deep learning-based intrusion detection system (IDS) can be suitable for fog computing paradigms for protecting the fog nodes from attacks. In this paper we have proposed a novel ensemble deep learning intrusion detection architecture for fog computing by combining two deep learning models such as traditional CNN and IDS-AlexNet model and showed this model gives high accuracy of attack detection. The respective model implementations were applied on the UNSW-NB15 datasets. By taking full advantage of different classifiers, the proposed deep learning-based multi-model ensemble method is shown to be accurate and effective for intrusion detection. Our proposed model shows that it outperformed various other traditional and recent models.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining Optimal Release and Testing Stop Time of a Software Using Discrete Approach","authors":"A. Shrivastava, Ruchi Sharma","doi":"10.4018/ijsi.297920","DOIUrl":"https://doi.org/10.4018/ijsi.297920","url":null,"abstract":"In the last 20 years researcher’s proposed to determine the optimal release and testing termination time considering the calendar time or continuous approach. However, it has been shown in the literature that it is better to develop the model by considering the number of test cases executed to remove faults. This is possible by using the discrete modelling approach developed in the software reliability literature. In the existing discrete software reliability literature, no work has been done in the direction of separating the release and testing termination time. In this work, we have developed a discrete framework to determine the optimal release and testing termination time under budgetary constraints. The numerical illustration suggests that it is better to release the software after executing a lesser number of testing periods. Also, the total cost in the proposed strategy is significantly less as compared to the existing discrete release time literature.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133958347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection and Classification of Brain Tumors From MRI Images Using a Deep Convolutional Neural Network Approach","authors":"Menaouer Brahami, Nour El Houda Kebir, Zoulikha Dermane, Sabri Mohammed, Nada Matta","doi":"10.4018/ijsi.293269","DOIUrl":"https://doi.org/10.4018/ijsi.293269","url":null,"abstract":"Brain tumor is a severe cancer disease caused by uncontrollable and abnormal partitioning of cells. Timely disease detection and treatment plans lead to the increased life expectancy of patients. Automated detection and classification of brain tumor are a more challenging process which is based on the clinician’s knowledge and experience. For this fact, one of the most practical and important techniques is to use deep learning. Recent progress in the fields of deep learning has helped the clinician’s in medical imaging for medical diagnosis of brain tumor. In this paper, we present a comparison of Deep Convolutional Neural Network models for automatically binary classification query MRI images dataset with the goal of taking precision tools to health professionals based on fined recent versions of DenseNet, Xception, NASNet-A, and VGGNet. The experiments were conducted using an MRI open dataset of 3,762 images. Other performance measures used in the study are the area under precision, recall, and specificity.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133126199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan Zhang, Jianbing Han, H. Lin, Yuqing Jin, Zihan Gu
{"title":"Development of Bresenham-Based Step Compensation Algorithm for Manipulator Trajectory Planning","authors":"Yan Zhang, Jianbing Han, H. Lin, Yuqing Jin, Zihan Gu","doi":"10.4018/ijsi.309728","DOIUrl":"https://doi.org/10.4018/ijsi.309728","url":null,"abstract":"The trajectory planning of the manipulator end is somehow sensitive to the manipulator movement. To avoid accumulative error, the step compensation optimization method based on Bresenham algorithm is developed to overcome such an adverse effect. First, the Bresenham algorithm is applied using the manipulator modeling from Denavit-Hartenberg (D-H) parameters. The calculation process can be therefore simplified using the point interpolation method. Second, the step compensation optimization is combined with Bresenham algorithm to reduce abrupt speed changing and vibration effect, particularly at the starting or ending period during arm joint movement. The performance results verify that the manipulator can move smoothly and follow up the predefined straight-line trajectory accurately.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130845693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joseph Ofori-Mensah, Winfred Yaokumah, Ebenezer Agyemang Sakyi
{"title":"Design of Authenticated and Trusted Academic Certification Using Blockchain Technology","authors":"Joseph Ofori-Mensah, Winfred Yaokumah, Ebenezer Agyemang Sakyi","doi":"10.4018/ijsi.303580","DOIUrl":"https://doi.org/10.4018/ijsi.303580","url":null,"abstract":"It is more expensive to handle forged certificates rather than take stringent measures to prevent such occurrences. Forged certificates can lead to loss of integrity and credibility in the certificates and loss of public confidence and trust in the certificate awarding institutions. This study proposed a blend of emerging technologies that include Blockchain Smart Contract for authenticating academic certificates using the West African Examinations Council (WAEC) as the case study. The study presents a detailed design of authenticated and trusted academic certification using Blockchain technology. The Ethereum Smart Contract was used to govern, manage, and provide traceability and visibility in a manner that is secured, decentralized, and globally accessible with high integrity and transparency. Findings from the study revealed various processes by which WAEC authenticates the certificates they issued and that Blockchain technology tends to improve its methods of verification.","PeriodicalId":396598,"journal":{"name":"Int. J. Softw. Innov.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130231855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}