{"title":"Comparison of the LoRa Image Transmission Efficiency Based on Different Encoding Methods","authors":"Ching-Chuan Wei, Pei-Yi Su, Shutin Chen","doi":"10.18178/ijiee.2020.10.1.712","DOIUrl":"https://doi.org/10.18178/ijiee.2020.10.1.712","url":null,"abstract":"The booming Internet of Things (IoT) can be seen in all areas of daily life. In the traditional wireless sensing network technology, there are difficult factors such as insufficient transmission distance or high power consumption. The emergence of LoRa (Long Range) technology has broken the difficult factors of traditional wireless sensing network technology. Due to the demand for image in IoT applications, the LoRa technology of low data rate will be designed to transmit the image of high data quantity in this paper. Different encoding methods will influence the transmitted file size and the transmission efficiency. Two major encoding methods are presented to conduct the comparison experiment of image transmission efficiency. PSNR (Peak Signal-to-Noise Ratio), SSIM index (Structural Similarity Index) and transmission time are used to evaluate the image transmission efficiency under different encoding method.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. W. H. A. D. Silva, Carlos Paz de Araujo, Edward Chow
{"title":"An Efficient Homomorphic Data Encoding with Multiple Secret Hensel Codes","authors":"D. W. H. A. D. Silva, Carlos Paz de Araujo, Edward Chow","doi":"10.18178/ijiee.2020.10.1.713","DOIUrl":"https://doi.org/10.18178/ijiee.2020.10.1.713","url":null,"abstract":"Abstract—Data encoding is widely used for a variety of reasons. Encoding schemes in general serve to convert one form of data to another in order to enhance the efficiency of data storage, transmission, computation and privacy, to name just a few. When it comes to privacy, data may be encoded to hide its meaning from direct access or encrypted to attain a certain security level. If the encoding scheme preserves additive and multiplicative homomorphisms, then operations on encoded data may be performed without prior decoding, which improves the utility of such mechanism. We introduce a probabilistic fully homomorphic encoding scheme that is practical as a stand-alone entry-level solution to data privacy or as an added component of existing encryption schemes, especially those that are deterministic. We demonstrate how the finite segment of p-adic numbers can be explored to derive probabilistic multiple secret Hensel codes which yields multiple layers of obscurity in an efficient way. Our encoding scheme is compact, ultra lightweight and suitable for applications ranging from edge to cloud computing. Without significant changes in its mathematical foundation, as a proposed continuation of this present work, further investigation can take place in order to confirm if the same encoding scheme can be extended to be a standalone secure instance of a fully homomorphic encryption scheme.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125975290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TCP Throughput Achieved by a Folded Clos Network Controlled by Different Flow Diffusion Algorithms","authors":"S. Ohta","doi":"10.18178/ijiee.2020.10.1.714","DOIUrl":"https://doi.org/10.18178/ijiee.2020.10.1.714","url":null,"abstract":"A folded Clos network (FCN) is the topology often used for data center networks. Its performance depends on the flow diffusion algorithm executed at the input/output switches. Several algorithms that diffuse flows more equally between links than conventional random routing have been proposed in the past. It is expected that those algorithms prevent the TCP (transmission control protocol) throughput from decreasing due to traffic congestion. However, it is unclear whether these flow diffusion algorithms are significantly effective for avoiding throughput degradation of a TCP flow compared with conventional random routing. This paper investigates the effectiveness of flow diffusion algorithms for TCP throughput through packet-level computer simulation. The results confirm that flow diffusion algorithms can efficiently reduce the number of TCP flows, the throughputs of which are degraded.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132646345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Electronic Voting Systems: Strategy for a Novel","authors":"S. Olumide, K. B. Olutayo, Salako E. Adekunle","doi":"10.5815/ijieeb.2020.01.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2020.01.03","url":null,"abstract":"The voting system in the world has been characterised with many fundamental challenges, thereby resulting to a corrupt contestant winning an election. Researchers have been emotionally, physically, socially and intellectually concerned about the election malpractices recorded at various levels of electing a representative. Questions on how corrupt stakeholders in elections could be prevented from fraudulent activities such as rigging and impersonation called for discussion and answers. Consequences of declaring a corrupt contestant as a winner are bad governance, insecurities and diversification of public funds for personal gains. There must be approaches to tackle the problems of voting systems. This paper focused on a comprehensive review of electronic voting systems by different scholars as a platform for identifying shortcomings or drawbacks towards the implementation of a highly secured electronic voting system. The methods used by different scholars were technically reviewed so as to identify areas that need improvement towards providing solutions to the identified problems. Furthermore, countries with history on the adoption of e-voting systems were reviewed. Based on the problems identified from various works, a novel for future work on developing a secured electronic voting system using fingerprint and visual semagram techniques was proposed.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123698344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deceptive Opinion Detection Using Machine Learning Techniques","authors":"Naznin Sultana, S. Palaniappan","doi":"10.5815/ijieeb.2020.01.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2020.01.01","url":null,"abstract":"Nowadays, online reviews have become a valuable resource for customer decision making before purchasing a product. Research shows that most of the people look at online reviews before purchasing any product. So, customers reviews are now become a crucial part of doing business online. Since review can either promote or demote a product or a service, so buying and selling fake reviews turns into a profitable business for some people now a days. In the past few years, deceptive review detection has attracted significant attention from both the industrial organizations and academic communities. However, the issue remains to be a challenging problem due to the lack of labeled dataset for supervised learning and evaluation. Also, study shows that both the state of the art computational approaches and human readers acquire an error rate of about 35% to 48% in identifying fake reviews. This study thoroughly investigated and analyzed customers’ online reviews for deception detection using different supervised machine learning methods and proposes a machine learning model using stochastic gradient descent algorithm for the detection of spam review. To reduce bias and variance, bagging and boosting approach was integrated into the model. Furthermore, to select the most appropriate features in the feature selection step, some rules using regular expression were also generated. Experiments on hotel review dataset demonstrate the effectiveness of the proposed approach.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125144297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Frame Work for Classification of Multi Class Medical Data based on Deep Learning and Naive Bayes Classification Model","authors":"N. Ramesh, G. L. Devi, K. S. Sekhara Rao","doi":"10.5815/ijieeb.2020.01.05","DOIUrl":"https://doi.org/10.5815/ijieeb.2020.01.05","url":null,"abstract":"From the past decade there has been drastic development and deployment of digital data stored in electronic health record (EHR). Initially, it is designed for getting patient general information and performing health care tasks like billing, but researchers focused on secondary and most important use of these data for various clinical applications. In this paper we used deep learning based clinical note multi-label multi class approach using GloVe model for feature extraction from text notes, Auto-Encoder for training based on model and Navie basian classification and we map those classes for multiclasses. And we perform experiments with python and we used libraries of keras, tensor flow, numpy, matplotlib and we use MIMIC-III data set. And we made comparison with existing works CNN, skip-gram, n-gram and bag-of words. The performance results shows that proposed frame work performed good while classifying the text notes.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"322 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sinkon Nayak, Mahendra Kumar Gourisaria, M. Pandey, S. Rautaray
{"title":"Heart Disease Prediction Using Frequent Item Set Mining and Classification Technique","authors":"Sinkon Nayak, Mahendra Kumar Gourisaria, M. Pandey, S. Rautaray","doi":"10.5815/ijieeb.2019.06.02","DOIUrl":"https://doi.org/10.5815/ijieeb.2019.06.02","url":null,"abstract":"The heart is the most important part of the human body. Any abnormality in heart results heart related illness in which it obstructs blood vessels which causes heart attack, chest pain or stroke. Care and improvement of the health by the help of identification, prevention, and care of any kind of diseases is the main goal. So for this various prediction analysis methods are used which job is to identify the illness at prelim phase so that prevention and care of heart disease is done. This paper emphasizes on the care of heart diseases at a primitive phase so that it will lead to a successful cure. In this paper, diverse data mining classification method like Decision tree classification, Naive Bayes classification, Support Vector Machine classification, and k-NN classification are used for determination and safeguard of the diseases.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125169531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Engineering based Approach for Prediction of Movie Ratings","authors":"S. Sathiyadevi, G. Parthasarathy","doi":"10.5815/ijieeb.2019.06.04","DOIUrl":"https://doi.org/10.5815/ijieeb.2019.06.04","url":null,"abstract":"The buying behavior of the consumer is grown nowadays through recommender systems. Though it recommends, still there are limitations to give a recommendation to the users. In order to address data sparsity and scalability, a hybrid approach is developed for the effective recommendation in this paper. It combines the feature engineering attributes and collaborative filtering for prediction. The proposed system implemented using supervised learning algorithms. The results empirically proved that the mean absolute error of prediction was reduced. This approach shows very promising results.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121927694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Putu Wulan Wahyu Sandhiani, I. Sukarsa, I. Pratama
{"title":"The Improvement of IT Processes at Office X in one of the Cities in Indonesia","authors":"Putu Wulan Wahyu Sandhiani, I. Sukarsa, I. Pratama","doi":"10.5815/ijieeb.2019.06.01","DOIUrl":"https://doi.org/10.5815/ijieeb.2019.06.01","url":null,"abstract":"The proper use of information technology can improve the efficiency and effectiveness of an organization’s performance. The use of information technology in educational institutions also require good governance so as to ensure transparency, efficiency, and effectiveness of any business process that runs on the institutions. Audit is one of the ways that can be done to determine the company’s ability to execute business process in it so that the performance of the process in the company can run better and more effective, and it can also improve the performance of employees. The audit process conducted at Office X aims to evaluate the work program using the COBIT 5 framework as a guide because it already contains four main perspectives, namely the customer perspective, financial perspective, internal business process perspective, and the learning and growth perspective. Results of research conducted at Office X show that the capability level of the four processes in the audit which are APO07 (Manage human resources), BAI02 (Manage requirements definition), BAI04 (Manage availability and capacity), and EDM04 (Ensure resource optimization) achieved by the Office still stop at level 1 and there is still a difference of 4 levels from what is expected by the company so that there needs to be improvements to achieve the specified target level 5.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129600262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Corpus Based Approach to Build Arabic Sentiment Lexicon","authors":"Afnan Alsolamy, M. Siddiqui, Imtiaz Hussain Khan","doi":"10.5815/ijieeb.2019.06.03","DOIUrl":"https://doi.org/10.5815/ijieeb.2019.06.03","url":null,"abstract":"Sentiment analysis is an application of artificial intelligence that determines the sentiment associated sentiment with a piece of text. It provides an easy alternative to a brand or company to receive customers' opinions about its products through user generated contents such as social media posts. Training a machine learning model for sentiment analysis requires the availability of resources such as labeled corpora and sentiment lexicons. While such resources are easily available for English, it is hard to find them for other languages such as Arabic. The aim of this research is to build an Arabic sentiment lexicon using a corpus-based approach. Sentiment scores were propagated from a small, manually labeled, seed list to other terms in a term co-occurrence graph. To achieve this, we proposed a graph propagation algorithm and compared different similarity measures. The lexicon was evaluated using a manually annotated list of terms. The use of similarity measures depends on the fact that the words that are appearing in the same context will have similar polarity. The main contribution of the work comes from the empirical evaluation of different similarity to assign the best sentiment scores to terms in the co-occurrence graph.","PeriodicalId":427770,"journal":{"name":"International Journal of Information Engineering and Electronic Business","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}