Int. J. Recent Contributions Eng. Sci. IT最新文献

筛选
英文 中文
Preserving the Privacy of Sensitive Data Using Bit-Coded-Sensitive Algorithm (BCSA) 使用位码敏感算法(BCSA)保护敏感数据的隐私
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-12-07 DOI: 10.3991/ijes.v10i04.35023
P. Ghann, E. Tetteh, Kobby Asare Obeng, Muhyideen Elias
{"title":"Preserving the Privacy of Sensitive Data Using Bit-Coded-Sensitive Algorithm (BCSA)","authors":"P. Ghann, E. Tetteh, Kobby Asare Obeng, Muhyideen Elias","doi":"10.3991/ijes.v10i04.35023","DOIUrl":"https://doi.org/10.3991/ijes.v10i04.35023","url":null,"abstract":"Organizations now deal with massive amounts of data. Data is collected from various points such as hospitals, credit card companies, and search engines. After collecting this voluminous data, it is published and shared for research. Data that is collected may have sensitive information that might be used to identify an individual and consequently lead to privacy violations when published. To address this challenge, privacy-preserving data publishing (PPDP) seeks to remove threats to privacy while ensuring that the necessary information is released for data mining. Various techniques have been proposed to solve the problems associated with sensitive information. One such technique is k- anonymity. This technique is the best and very efficient. However, it also leads to loss of information, reduces data utility, and works well only with static tables. In this paper, we proposed a technique that addresses the challenges of K-anonymity known as the Bit-Coded-Sensitive Algorithm (BCSA). This algorithm is more efficient and effective and ensures that the privacy of the individual is preserved by avoiding disclosure, and linkages and at the same time ensuring high quality and utility of data. BCSA first identifies the source of data and based on that, uses bits to code sensitive data with a key.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127302182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Pattern Searching Algorithms and Their Application 模式搜索算法分析及其应用
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-12-07 DOI: 10.3991/ijes.v10i04.35295
Festinë Retkoceri, Florim Idrizi, Shpend Ismaili, Florinda Imeri, Agon Memeti
{"title":"Analysis of Pattern Searching Algorithms and Their Application","authors":"Festinë Retkoceri, Florim Idrizi, Shpend Ismaili, Florinda Imeri, Agon Memeti","doi":"10.3991/ijes.v10i04.35295","DOIUrl":"https://doi.org/10.3991/ijes.v10i04.35295","url":null,"abstract":"Nowadays data is growing tremendously. Therefore, there is a great need to store and process data. The problem of Pattern Searching has different applications. When searching for text or words in computer application systems, Pattern searching is used to display the search results. The purpose of Pattern searching is to find text within another text. For example, searching for text in books will take a long time and is hard work. Using Pattern searching will save you time and effort. If similar words are found within the requested text, it will underline the word similar to what was requested, otherwise it does not display any matches if there are no similar words within a text.  This paper presents comparisons of the speed of different Pattern searching algorithms, precisely the Naive, KMP, Rabin-Karp, Finite Automata, Boyer-Moore, Aho-Corasick, Z Algorithm algorithms. We will test the time complexity of these algorithms in the three programming languages C#, Java and Python using three different CPUs. According to the results that appear in this comparison, we are able to perform the comparison between the programming languages and the comparison between the CPUs used in this research.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Hand Pose Recognition System for Mobile and Embedded Devices 一种用于移动和嵌入式设备的手部姿势识别系统设计
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-12-07 DOI: 10.3991/ijes.v10i04.35163
Houssem Lahiani, M. Neji
{"title":"Design of a Hand Pose Recognition System for Mobile and Embedded Devices","authors":"Houssem Lahiani, M. Neji","doi":"10.3991/ijes.v10i04.35163","DOIUrl":"https://doi.org/10.3991/ijes.v10i04.35163","url":null,"abstract":"Today, smart devices such smart watches and smart cell phones are becoming ever-present in all fields that influence the quality of life of the modern people. These on-board systems have revolutionized the behavior of human beings and especially their way of communicating. In this context and to improve the experience of using these devices, we aim to develop a system that recognizes hand poses in the air by a smart device.  In this work, the system is based on Histogram of Oriented Gradient (HOG) features and Support Vector Machine (SVM) classifier. The impact of using HOG and SVM on mobile devices is studied. To carry out this study, we used an improved version of the \"NUS I\" dataset and obtained a recognition rate of approximately 94%. In addition, we conducted run speed experiments on various mobile devices to study the impact of this task on this embedded platform. The main contribution of this work is to test the impact of using the HOG descriptor and the SVM classifier in terms of recognition rate and execution time on low-end smartphones.Today, smart devices such smart watches and smart cell phones are becoming ever-present in all fields that influence the quality of life of the modern people. These on-board systems have revolutionized the behavior of human beings and especially their way of communicating. In this context and to improve the experience of using these devices, we aim to develop a system that recognizes hand poses in the air by a smart device.  In this work, the system is based on Histogram of Oriented Gradient (HOG) features and Support Vector Machine (SVM) classifier. The impact of using HOG and SVM on mobile devices is studied. To carry out this study, we used an improved version of the \"NUS I\" dataset and obtained a recognition rate of approximately 94%. In addition, we conducted run speed experiments on various mobile devices to study the impact of this task on this embedded platform. The main contribution of this work is to test the impact of using the HOG descriptor and the SVM classifier in terms of recognition rate and execution time on low-end smartphones.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115119434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Reality in Education: A Comparative Social Media Data and Sentiment Analysis Study 教育中的虚拟现实:一项比较社会媒体数据和情感分析研究
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-11-04 DOI: 10.3991/ijes.v10i03.34057
G. Lampropoulos, E. Keramopoulos
{"title":"Virtual Reality in Education: A Comparative Social Media Data and Sentiment Analysis Study","authors":"G. Lampropoulos, E. Keramopoulos","doi":"10.3991/ijes.v10i03.34057","DOIUrl":"https://doi.org/10.3991/ijes.v10i03.34057","url":null,"abstract":"It is essential to consider the public’s viewpoints when it comes to significant issues, such as the adoption and integration of technologies in education. This study aims at analyzing and comprehending the public’s perspectives, sentiments and attitudes towards the use of virtual reality in general and in educational settings. After setting the necessary data requirements, 10,457,344 related tweets from Twitter were identified and retrieved. The data was then analyzed using text mining and sentiment analysis. Based on the results, the public positively perceived the use of virtual reality and mostly expressed emotions of anticipation, trust and joy when referring to its use in education. Finally, the role of virtual reality as an effective educational tool that can enhance students’ engagement, motivation and academic performance was highlighted.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116485358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lecturers' Adoption of ICT Tools in Ghanaian Colleges of Education 加纳教育学院讲师对ICT工具的采用
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-11-04 DOI: 10.3991/ijes.v10i03.35059
Emmanuel Kwasi Boateng, U. Ogbonnaya, M. Graham
{"title":"Lecturers' Adoption of ICT Tools in Ghanaian Colleges of Education","authors":"Emmanuel Kwasi Boateng, U. Ogbonnaya, M. Graham","doi":"10.3991/ijes.v10i03.35059","DOIUrl":"https://doi.org/10.3991/ijes.v10i03.35059","url":null,"abstract":"This study investigated lecturers’ adoption of ICT tools in Ghanaian colleges of education. The participants of this study were 390 lecturers from 25 colleges of education in Ghana. Data was collected using a questionnaire and lesson observation, and the results were analysed quantitatively and qualitatively using descriptive statistics and thematic analysis.    The study revealed that more than two-thirds of the participants/respondents used personal computers, projectors, social media, and LMSs in their education. The lecturers asserted that they utilise ICT tools for research, for storing, retrieving, and sharing files and information in addition to utilising them to teach their courses. The respondents/participants recounted that they grow professionally as a result of using these ICT tools. Additionally, it was discovered that the respondents/participants employed ICT tools in their instruction due to its mobility, time-saving qualities, accessibility, and user-friendliness which aided in the planning and delivery of lessons which boosted the T&L process. It was therefore recommended, among other things, that the Ghanaian government keep the necessary pedagogical ICT tools accessible to lecturers, and that workshops and seminars be organised for all lecturers in Ghana's COEs on how to use some common pedagogical ICT tools that will enhance lecturers' teaching techniques to promote effective learning and fulfill 21st-century teaching skills.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"50 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130759461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High School Students' Difficulties and their Causes due to the Electromotive Force, in the Study of Direct Current Simple Electric Circuits 高中生在直流简单电路学习中遇到的电动势困难及其原因
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-11-04 DOI: 10.3991/ijes.v10i03.34375
Gerasimos Vavasis, E. Kapotis, G. Tombras
{"title":"High School Students' Difficulties and their Causes due to the Electromotive Force, in the Study of Direct Current Simple Electric Circuits","authors":"Gerasimos Vavasis, E. Kapotis, G. Tombras","doi":"10.3991/ijes.v10i03.34375","DOIUrl":"https://doi.org/10.3991/ijes.v10i03.34375","url":null,"abstract":"This work is part of a larger research, conducted in Greece, about the students' difficulties in understanding the concepts and phenomena of Electricity. The goal of this study is to present the high school students’ difficulties and their causes into the study of basic direct current (dc) circuits, due to the concept of the electromotive force (emf). Researches in over the world have highlighted that the concepts of the emf and the potential difference (pd) create many problems to the students in the study of dc circuits. These difficulties are presented, analyzed and is made an attempt to identify their causes. The results show that, in addition to confirming the existing literature enriched with new findings, to address these difficulties is necessary the development of a teaching approach based on an education model with a new curriculum, where needed (in Greece, for example) and an appropriate education material so that to overcome the lack of understanding of the concepts and laws shown by the students.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127359849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Approaches to Predict Future Frames in Videos 预测视频中未来帧的深度学习方法
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-11-04 DOI: 10.3991/ijes.v10i03.33893
T. Islam, Md. Hafizul Imran, Md. Ramim Hossain, Md. Tamjeed Monshi, Himanish Debnath Himu, Md. Ashikur Rahman, Gourob Saha Surjo
{"title":"Deep Learning Approaches to Predict Future Frames in Videos","authors":"T. Islam, Md. Hafizul Imran, Md. Ramim Hossain, Md. Tamjeed Monshi, Himanish Debnath Himu, Md. Ashikur Rahman, Gourob Saha Surjo","doi":"10.3991/ijes.v10i03.33893","DOIUrl":"https://doi.org/10.3991/ijes.v10i03.33893","url":null,"abstract":"Deep neural networks are becoming central in several areas of computer vision. While there have been a lot of studies regarding the classification of images and videos, future frame prediction is still a rarely investigated approach, and even some applications could make good use of the knowledge regarding the next frame of an image sequence in pixel-space. Examples include video compression and autonomous agents in robotics that have to act in natural environments. Learning how to forecast the future of an image sequence requires the system to understand and efficiently encode the content and dynamics for a certain period. It is viewed as a promising avenue from which even supervised tasks could benefit since labeled video data is limited and hard to obtain. Therefore, this work gives an overview of scientific advances covering future frame prediction and proposes a recurrent network model which utilizes recent techniques from deep learning research. The presented architecture is based on the recurrent decoder-encoder framework with convolutional cells, which allows the preservation of Spatio-temporal data correlations. Driven by perceptual-motivated objective functions and a modern recurrent learning strategy, it can outperform existing approaches concerning future frame generation in several video content types. All this can be achieved with fewer training iterations and model parameters.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Analysis of Background Subtraction Models Applied on a Local Dataset Using a New Approach for Ground-truth Generation 基于地面真值生成新方法的局部数据集背景减法模型对比分析
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-11-04 DOI: 10.3991/ijes.v10i03.34317
Maryam A. Yasir, Y. Ali
{"title":"Comparative Analysis of Background Subtraction Models Applied on a Local Dataset Using a New Approach for Ground-truth Generation","authors":"Maryam A. Yasir, Y. Ali","doi":"10.3991/ijes.v10i03.34317","DOIUrl":"https://doi.org/10.3991/ijes.v10i03.34317","url":null,"abstract":"Abstract— Background subtraction is the dominant approach in the domain of moving object detection. Lots of research have been done to design or improve background subtraction models. However, there is a few well known and state of the art models which applied as a benchmark. Generally, these models are applied on different dataset benchmarks. Most of the time Choosing appropriate dataset is challenging due to the lack of datasets availability and the tedious process of creating the ground-truth frames for the sake of quantitative evaluation. \u0000Therefore, in this article we collected local video scenes for street and river taken by stationary camera focusing on dynamic background challenge. We presented a new technique for creating ground-truth frames using modelling, composing, tracking, and rendering each frame.  Eventually we applied nine promising benchmark algorithms used in this domain on our local dataset. Results obtained by quantitative evaluations exposed the effectiveness of our new technique for generating the ground-truth scenes to be benchmarked with the original scenes using number of statistical metrics. Furthermore, results shows the outperformance of SuBSENSE model against other tested models.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"48 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132709240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Choosing the Right Programming Language in Making a Website Backend Using the Waterfall Method 在使用瀑布方法制作网站后端时选择正确的编程语言
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-06-22 DOI: 10.3991/ijes.v10i02.30845
Teguh Rijanandi, Faisal Dharma Adhinata
{"title":"Choosing the Right Programming Language in Making a Website Backend Using the Waterfall Method","authors":"Teguh Rijanandi, Faisal Dharma Adhinata","doi":"10.3991/ijes.v10i02.30845","DOIUrl":"https://doi.org/10.3991/ijes.v10i02.30845","url":null,"abstract":"Often we are wrong in choosing a good programming language to create a website backend to process the data we have so that the impact is that our website is not able to handle so many requests with a lot of data so users feel uncomfortable because our application takes a very long time to process. processing each user's request. So in this journal, we will try to discuss the selection of the right programming language in making application backends according to the function of the programming language. In this journal, we will compare the programming languages ​​PHP, Python, Java and C# for the manufacture of an application backend that must be able to process very large population data","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131014897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things (IoT): A Study of Security Issues and Challenges 物联网(IoT):安全问题与挑战研究
Int. J. Recent Contributions Eng. Sci. IT Pub Date : 2022-06-22 DOI: 10.3991/ijes.v10i02.29301
Zahidah Mohamad Said, M. F. Zolkipli
{"title":"Internet of Things (IoT): A Study of Security Issues and Challenges","authors":"Zahidah Mohamad Said, M. F. Zolkipli","doi":"10.3991/ijes.v10i02.29301","DOIUrl":"https://doi.org/10.3991/ijes.v10i02.29301","url":null,"abstract":"The Internet of Things is one of the most popular networking concepts. The Internet of Things architecture promises to connect anybody, anywhere, with anything. Unlike the traditional Internet, the Internet of Things uses heterogeneous wired and wireless networks to connect a huge number of machines, resource-constrained devices, and sensors. Even though the Internet of Things might become one of the most popular networking concepts that provide many benefits to its users, it is also open to many security issues and challenges. Based on the study, shows that Perception, Network and Application layers are the most open to security issues. Next, the security challenges inside and across the Internet of Things are also highlighted in this study.","PeriodicalId":427062,"journal":{"name":"Int. J. Recent Contributions Eng. Sci. IT","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116713452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信