{"title":"A Review of Applications of Linear Programming to Optimize Agricultural Solutions","authors":"A. Alotaibi, F. Nadeem","doi":"10.5815/IJIEEB.2021.02.02","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.02.02","url":null,"abstract":": Quantitative methods help farmers plan and make decisions. An apt example of these methods is the linear programming (LP) model. These methods acknowledge the importance of economizing on available resources among them being water supply, labor, and fertilizers. It is through this economizing that farmers maximize their profit. The significance of linear programming is to provide a solution to the existing real-world problems through the evaluation of existing resources and the provision of relevant solutions. This research studies various LP applications including feed mix, crop pattern and rotation plan, irrigation water, and product transformation; that have the main role to enhance various facets of the agriculture sector. The paper will be a review that will probe into the applications of the LP model and it will also highlight the various tools that are central to analyzing LP model results. The review will culminate in a discussion on the different approaches that help optimize agricultural solutions.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115423841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybercrimes during COVID -19 Pandemic","authors":"Raghad Khweiled, M. Jazzar, Derar Eleyan","doi":"10.5815/IJIEEB.2021.02.01","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.02.01","url":null,"abstract":"COVID-19 pandemic has changed the lifestyle of all aspects of life. These circumstances have created new patterns in lifestyle that people had to deal with. As such, full and direct dependence on the use of the unsafe Internet network in running all aspects of life. As example, many organizations started officially working through the Internet, students moved to e-education, online shopping increased, and more. These conditions have created a fertile environment for cybercriminals to grow their activity and exploit the pressures that affected human psychology to increase their attack success. The purpose of this paper is to analyze the data collected from global online fraud and cybersecurity service companies to demonstrate on how cybercrimes increased during the COVID-19 epidemic. The significance and value of this research is to highlight by evident on how criminals exploit crisis, and for the need to develop strategies and to enhance user awareness for better detection and prevention of future cybercrimes.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115509704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Application Performance Analysis of ECommerce Sites in Bangladesh: An Empirical Study","authors":"Mahfida Amjad, Md. Tutul Hossain, Rakib Hassan, Md. Abdur Rahman","doi":"10.5815/IJIEEB.2021.02.04","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.02.04","url":null,"abstract":"The users of e-commerce sites are growing rapidly day by day for easy internet access where the performance of web applications plays a key role to satisfy the end-users. The performance of these websites or web applications depends on several parameters such as load time, fully loaded (time), fully loaded (requests), etc. This research tries to investigate and find out the parameters that affects the web performance and it has been tested on ecommerce applications of Bangladesh, where eleven parameters are considered and these are fully loaded (requests), first CPU idle, speed index, start render, load time, fully loaded (time), document complete (time), last painted hero, first contentful paint, and first byte. According to the analysis some applications need to take care of or the developers need to re-modify it. As per the investigation of scanned information, the applications fall under three classes. To start with, the applications do not demonstrate acceptable records to be investigated. The second and third classification applications required medium and high reaction times at the user end separately. Also, the fully loaded (requests)’ and document complete (requests) show the most noteworthy required time at the user end, where maximum values are 347 and 344 seconds individually.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"685 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126621468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Saady, Qurat Ul-ain, Sidra Anwar, Sadia Anayat, S. Rafique
{"title":"Value-Risk Analysis of Crowdsourcing in Pakistan‘s Perspective","authors":"Muhammad Saady, Qurat Ul-ain, Sidra Anwar, Sadia Anayat, S. Rafique","doi":"10.5815/IJIEEB.2021.02.03","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.02.03","url":null,"abstract":": The benefits of crowdsourcing are enabled by open environments where multiple external stakeholders contribute to a firm's outcomes. In recent years, crowdsourcing has emerged as a distributed model of problem-solving and market development. Here, model assignments are assigned to networked individuals to complete so that the manufacturing expense of a business can be minimized considerably. The main objective of this research is to develop a methodology which will capture the value generation process in the presence of uncertainties (Risk factors) in crowdsourcing context. This study is designed to make an important contribution to the field of practice and knowledge. Value-Risk Analysis of crowd souring is one of the under studies Worldwide, especially in Pakistan. Provided the need, we have discussed the crowdsourcing as business process and presented an understanding of the risks associated with crowdsourcing use and possible strategies that can be used to maximize the value and minimize the identified risks. For the better understanding of crowdsourcing practices in Pakistan, three case studies were conducted based on three well reputed organizations of Pakistan and results gathered to help understand its practices, some of the risks associated with it and how they manage those risks. could gleaned that though there are risks involved in crowdsourcing, they can be easily taken care of by proper management of the process. Several risk management approaches by the participants are practical in nature, though some recommendations are very creative, such as anonymizing the data and gamifying the process, reflecting participants‘ relatively extensive experience with crowdsourcing. Value generation of the crowdsourcing concepts by Amit & Zatt are mapped to generate value from case studies. Risk management and value generation are integrated to do value-risk analysis. Value-risk analysis shows the values generated by the case studies in presence of certain risk factor and risk level. Results shows how much value is generated by a case study in presence of what risk factor. The scientific contribution of this research work is a better understanding of the crowdsourcing process and the risks associated with it. Managing those risks and generating value.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"12 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114020314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Client Server iOS in Player versus Player (PVP) of “Borneo Snap”","authors":"R. Andrea","doi":"10.5815/IJIEEB.2021.01.03","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.01.03","url":null,"abstract":": Borneo Snap is a Kalimantan’s animals snap card game. Play proceeds with the players taking it in turns to remove a card from the top of their deck and place it face-up on a central pile. If two cards placed consecutively on the pile are identical (same picture) then the first player to shout \"Snap!\" will get all of it. This game is built for the iOS platform. Game Player Versus Player (PVP) Borneo Snap using peer-to-peer API from Game Kit (XCode Framework) and Wi-Fi or Bluetooth, but actually, Borneo Snap uses client-server architecture model, each player in a player versus player game session only can communicate with server intermediaries. If the player sends data updates when playing cards to other players, this data update will first be through the server, then forwarded to all other players. The result of this research, with client-server framework Borneo Snap can be played by more than 1 player and more iOS gadget too","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133328073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bengali News Headline Categorization Using Optimized Machine Learning Pipeline","authors":"Prashengit Dhar, Md. Zainal Abedin","doi":"10.5815/IJIEEB.2021.01.02","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.01.02","url":null,"abstract":": Bengali text based news portal is now very common and increasing day by day. With easy access of internet technology, reading news through online is now a regular task. Different types of news are represented in the news portal. The system presented in this paper categorizes the news headline of news portal or sites. Prediction is made by machine learning algorithm. Large number of collected data are trained and tested. As pre-processing tasks such as tokenization, digit removal, removing punctuation marks, symbols, and deletion of stop words are processed. A set of stop words is also created manually. Strong stop words leads to better performance. Stop words deletion plays a lead role in feature selection. For optimization, genetic algorithm is used which results in reduced feature size. A comparison is also explored without optimization process. Dataset is established by collecting news headline from various Bengali news portal and sites. Resultant output shows well performance in categorization .","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124074110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Systematic Analysis of Virtual Reality & Augmented Reality","authors":"A. Laghari, A. Jumani, K. Kumar, M. Chhajro","doi":"10.5815/IJIEEB.2021.01.04","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.01.04","url":null,"abstract":": Nowadays, users are moving from old 2D screens to modern devices such as 3D screens and virtual reality devices to enjoy videos and games like real-world experience, and this demand increased further development. Virtual Reality (VR) is based on the creation of a simulated environment of real-world with computer creation, and Augmented Reality (AR) is based on the addition of simulation components (environment) in the real-world scene. In this paper, systematic analysis of relationships and features both VR and AR varies by outline, arrangement, administrations, and devices for associations and clients. This paper provides a difference between AR and VR, advantages, future, and open research issues.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130545190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emoghene Ogidiaka, F. Ogwueleka, Martins E. Irhebhude
{"title":"Game-Theoretic Resource Allocation Algorithms for Device-to-Device Communications in Fifth Generation Cellular Networks: A Review","authors":"Emoghene Ogidiaka, F. Ogwueleka, Martins E. Irhebhude","doi":"10.5815/IJIEEB.2021.01.05","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.01.05","url":null,"abstract":"Game-theoretic resource allocation algorithms are essential to managing the interference that Device-toDevice (D2D) and cellular transmissions could generate to each other in cellular networks since game-theoretic solutions are naturally autonomous and robust. In this paper, we present a survey on D2D communication in cellular networks with respect to the performance of the existing and accessible game-theoretic resource allocation algorithms published in 2013-2019. Each of the game-theoretic resource allocation algorithms with its properties such as utility, complexity, fairness, overhead cost, and convergence rate are reviewed and compared. The survey proved that gametheoretic solutions could be a viable strategy for practical implementation in 5G networks as each of the reviewed scheme attempts to optimize one or various essential performance metrics in the system. Finally, the paper recommends that serious efforts should be made by standardization bodies in incorporating game-theoretic strategy in D2D-enabled 5G networks while considering it as a road map for reliable and resource-efficient solutions in future cellular networks.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124853814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PriceCop – Price Monitor and Prediction Using Linear Regression and LSVM-ABC Methods for E-commerce Platform","authors":"Mohamed Zaim Shahrel, S. Mutalib, S. Abdul-Rahman","doi":"10.5815/IJIEEB.2021.01.01","DOIUrl":"https://doi.org/10.5815/IJIEEB.2021.01.01","url":null,"abstract":"In early 2020, the world was shocked by the outbreak of COVID-19. World Health Organization (WHO) urged people to stay indoors to avoid the risk of infection. Thus, more people started to shop online, significantly increasing the number of e-commerce users. After some time, users noticed that a few irresponsible online retailers misled customers by hiking product prices before and during the sale, then applying huge discounts. Unfortunately, the \"discounted” prices were found to be similar or only slightly lower than standard pricing. This problem occurs because users were unable to monitor product pricing due to time restrictions. This study proposes a Web application named PriceCop to help customers' monitor product pricing. PriceCop is a significant application because it offers price prediction features to help users analyse product pricing within the next day;thus, it can help users to plan before making purchases. The price prediction model is developed by using Linear Regression (LR) technique. LR is commonly used to determine outcomes and used as predictors. Least Squares Support Vector Machine (LSSVM) and Artificial Bee Colony (ABC) are used as a comparison to evaluate the accuracy of the LR technique. LSSVM-ABC was initially proposed for stock market price predictions. The results show the accuracy of pricing prediction using LSSVM-ABC is 84%, while it is 62% when LR is employed. ABC is integrated into SVM to optimize the solution and is responsible for the best solution in every iteration. Even though LSSVM-ABC predicts product pricing more accurately than LR, this technique is best trained using at least a year's worth of product prices, and the data is limited for this purpose. In the future, the dataset can be collected daily and trained for accuracy.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133716294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Business Intelligence to Determine Evaluation of Activities (Case Study Indonesia Stock Exchange)","authors":"A. Fajri, Ardiles Sinaga","doi":"10.5815/ijieeb.2020.06.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2020.06.05","url":null,"abstract":"This study aims to examine how to evaluate the activities undertaken in IDX. By building the system \"business intelligence implementation to determine the evaluation of activities \". Where in this study also used the algorithm Naive Bayes in the process of data classification activities that have been done. The approach to the development of this software is through the study of libraries, data collection, system design, system implementation, Test systems and analysis. The tools used in the development of this software are Pentaho, PostgreSQL (as a data processing tool), Microsoft Excel (as a tool for creating training data), XAMPP (as a Web server tool) and the encoding used in this software development is the PHP CodeIgniter framework (as the backend), Highcharts (as Dashboard views) and DataTables (as table views). In this study, authors build software that is expected to help the Directorate of Development (RPE) in conducting evaluation activities in IDX. The analysis of the study uses variables from budgetrealization data and activity categories as comparators to figure out the activity status. The study also used IDX activity data in 2018 to implement a built-in system. The results of this study show that the realization of the budget and category of this activity strongly affects the activities that will be evaluated or not evaluated. Activities in each of the IDX representative offices are also potentially to be evaluated, depending on the value of the budget specified in the training data set.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}