Journal of Cases on Information Technology最新文献

筛选
英文 中文
Norm Augmented Reinforcement Learning Agents With Synthesized Normative Rules 具有合成规范规则的规范增强强化学习代理
IF 0.7
Journal of Cases on Information Technology Pub Date : 2024-07-16 DOI: 10.4018/jcit.345650
Mohd Rashdan Abdul Kadir, Ali Selamat, Ondrej Krejcar
{"title":"Norm Augmented Reinforcement Learning Agents With Synthesized Normative Rules","authors":"Mohd Rashdan Abdul Kadir, Ali Selamat, Ondrej Krejcar","doi":"10.4018/jcit.345650","DOIUrl":"https://doi.org/10.4018/jcit.345650","url":null,"abstract":"The dynamic deontic (DD) is a norm synthesis framework that extracts normative rules from reinforcement learning (RL), however it was not designed to be applied in agent coordination. This study proposes a norm augmented reinforcement learning framework (NARLF) that extends said model to include a norm deliberation mechanism for learned norms re-imputation for norm biased decision-making RL agents. This study aims to test the effects of synthesized norms applied on-line and off-line on agent learning performance. The framework consists of the DD framework extended with a pre-processing and deliberation component to allow re-imputation of normative rules. A deliberation model, the Norm Augmented Q-Table (NAugQT), is proposed to map normative rules into RL agents via q-values weight updates. Results show that the framework is able to map and improve RL agent's performance but only when synthesized off-line edited absolute norm salience value norms are used. This shows limitations when unstable salience norms are applied. Improvement in norm extraction and pre-processing are required.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141642858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Education Curriculum Innovation Based on Flipped Classroom and Network Education Model 基于翻转课堂和网络教育模式的计算机教育课程创新
IF 1
Journal of Cases on Information Technology Pub Date : 2024-04-17 DOI: 10.4018/jcit.342115
Yue Cheng
{"title":"Computer Education Curriculum Innovation Based on Flipped Classroom and Network Education Model","authors":"Yue Cheng","doi":"10.4018/jcit.342115","DOIUrl":"https://doi.org/10.4018/jcit.342115","url":null,"abstract":"This article conducts a series of research on computer network courses based on “flipped classroom.” Teaching reform will be carried out for computer networks, but the results are mediocre. The author of this article has carefully considered and summarized computer network teaching based on his years of teaching experience and has put forward suggestions for widespread application. This article discusses the application of translation. The necessity and connotation of transitioning to classroom mode were emphasized, and the design of this teaching method was emphasized, adopting a three-step approach of “consolidating and improving knowledge after class.” Therefore, teachers should start from their own perspective, based on process preview, in class learning, and after class review, find the connection point between flipped classroom and computer network courses, reflect on the problems in teaching, and adopt targeted teaching methods to solve problems. This article provides guidance for improving teachers' teaching level.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140692822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving English Teaching Strategies From the Perspective of College Students' Mental Health 从大学生心理健康的角度改进英语教学策略
IF 1
Journal of Cases on Information Technology Pub Date : 2024-04-09 DOI: 10.4018/jcit.342090
Xinhui Zhang
{"title":"Improving English Teaching Strategies From the Perspective of College Students' Mental Health","authors":"Xinhui Zhang","doi":"10.4018/jcit.342090","DOIUrl":"https://doi.org/10.4018/jcit.342090","url":null,"abstract":"Implementing mental health education (MHE) in schools is vital for students' psychological well-being. Subject infiltration integrates psychological factors into subject learning, promoting healthy development. However, English learning can introduce issues like self-confidence and language anxiety. Early identification of mental health problems (MHP) is crucial. This study, rooted in humanistic psychology and constructivism, explores affective factors, strategies, teaching, and English listening. The algorithm, based on the DeepPsy model, shows promise, identifying 75% of students with MHP. This research aids universities in offering timely support to high-risk students, minimizing long-term harm. The algorithm contributes to a healthier learning environment by enhancing English teaching and addressing mental health issues early.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140721516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting and Visualizing Lateral Movements Based on ATT&CK and Quantification Theory Type 3 基于 ATT&CK 和量化理论的侧向移动预测和可视化 3 型
IF 1
Journal of Cases on Information Technology Pub Date : 2024-03-20 DOI: 10.4018/jcit.340722
Satoshi Okada, Yosuke Katano, Yukihiro Kozai, Takuho Mitsunaga
{"title":"Predicting and Visualizing Lateral Movements Based on ATT&CK and Quantification Theory Type 3","authors":"Satoshi Okada, Yosuke Katano, Yukihiro Kozai, Takuho Mitsunaga","doi":"10.4018/jcit.340722","DOIUrl":"https://doi.org/10.4018/jcit.340722","url":null,"abstract":"When a cyber incident occurs, organizations need to identify the attack's impacts. They have to investigate potentially infected devices as well as certainly infected devices. However, as an organization's network expands, it is difficult to investigate all devices. In addition, the cybersecurity workforce shortage has risen, so organizations need to respond to incidents efficiently with limited human resources. To solve this problem, this paper proposes a tool to assist an incident response team. It can visualize ATT&CK techniques attacker used and, furthermore, detect lateral movements efficiently. The tool consists of two parts: a web application that extracts ATT&CK techniques from logs and a lateral movement detection system. The web application was implemented and could map the collected logs obtained from an actual Windows device to the ATT&CK matrix. Furthermore, actual lateral movements were performed in an experimental environment that imitated an organizational network, and the proposed detection system could detect them.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Customer Segmentation Marketing Strategy Based on Big Data Analysis and Clustering Algorithm 基于大数据分析和聚类算法的客户细分营销策略
IF 1
Journal of Cases on Information Technology Pub Date : 2024-02-07 DOI: 10.4018/jcit.336916
Xiaotong Li, Young Sook Lee
{"title":"Customer Segmentation Marketing Strategy Based on Big Data Analysis and Clustering Algorithm","authors":"Xiaotong Li, Young Sook Lee","doi":"10.4018/jcit.336916","DOIUrl":"https://doi.org/10.4018/jcit.336916","url":null,"abstract":"Traditional customer segmentation methods cannot obtain more effective information from massive customer data, which affects the formulation of marketing strategies. Based on this, this study constructs a customer segmentation marketing strategy model that integrates support vector machines and clustering algorithms. This model first utilizes support vector machines to segment existing customer data, and then integrates support vector machines and clustering algorithms to construct a customer segmentation model. Finally, simulation experiments are conducted using the dataset. The results show that the model algorithm obtains the optimal solution when the quantity of iterations is 50. Meanwhile, the average error rate of the model algorithm in the customer segmentation process is 6.82%, the average recall rate is 91.28%, and the average profit predicted by the impact strategy developed by the segmentation model is 29.88%, which is 2.53% different from the true value.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139795190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Critical Success Factors (CSF) in ERP Implementation Using AHP 利用 AHP 识别企业资源规划实施过程中的关键成功因素 (CSF)
IF 1
Journal of Cases on Information Technology Pub Date : 2024-02-07 DOI: 10.4018/jcit.337389
R. H. Kusumawardhana, I. Eitiveni, Warda Yaziji, Zahrina Aulia Adriani
{"title":"Identifying Critical Success Factors (CSF) in ERP Implementation Using AHP","authors":"R. H. Kusumawardhana, I. Eitiveni, Warda Yaziji, Zahrina Aulia Adriani","doi":"10.4018/jcit.337389","DOIUrl":"https://doi.org/10.4018/jcit.337389","url":null,"abstract":"Enterprise resource planning (ERP) implementations often encounter multifaceted challenges, leading to failures. Success relies on technical competence, management support, and user engagement. Unique organizational processes significantly influence outcomes. Failures can disrupt operations, highlighting the need to identify critical success factors (CSFs) for effective ERP implementation. This study employed analytic hierarchy process (AHP) methodology to analyze CSFs. Data collection involved surveys administered to a social insurance company's ERP project team in Indonesia. This study revealed 15 success factors, categorized into organization, process, and technology dimensions. Organization emerged as the most crucial, followed by technology and process. Among these, five CSFs stood out: project team competence, vendor and consultant quality, ERP fit, top management support, and hardware and software selection.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139856650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying Critical Success Factors (CSF) in ERP Implementation Using AHP 利用 AHP 识别企业资源规划实施过程中的关键成功因素 (CSF)
IF 1
Journal of Cases on Information Technology Pub Date : 2024-02-07 DOI: 10.4018/jcit.337389
R. H. Kusumawardhana, I. Eitiveni, Warda Yaziji, Zahrina Aulia Adriani
{"title":"Identifying Critical Success Factors (CSF) in ERP Implementation Using AHP","authors":"R. H. Kusumawardhana, I. Eitiveni, Warda Yaziji, Zahrina Aulia Adriani","doi":"10.4018/jcit.337389","DOIUrl":"https://doi.org/10.4018/jcit.337389","url":null,"abstract":"Enterprise resource planning (ERP) implementations often encounter multifaceted challenges, leading to failures. Success relies on technical competence, management support, and user engagement. Unique organizational processes significantly influence outcomes. Failures can disrupt operations, highlighting the need to identify critical success factors (CSFs) for effective ERP implementation. This study employed analytic hierarchy process (AHP) methodology to analyze CSFs. Data collection involved surveys administered to a social insurance company's ERP project team in Indonesia. This study revealed 15 success factors, categorized into organization, process, and technology dimensions. Organization emerged as the most crucial, followed by technology and process. Among these, five CSFs stood out: project team competence, vendor and consultant quality, ERP fit, top management support, and hardware and software selection.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139797018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Customer Segmentation Marketing Strategy Based on Big Data Analysis and Clustering Algorithm 基于大数据分析和聚类算法的客户细分营销策略
IF 1
Journal of Cases on Information Technology Pub Date : 2024-02-07 DOI: 10.4018/jcit.336916
Xiaotong Li, Young Sook Lee
{"title":"Customer Segmentation Marketing Strategy Based on Big Data Analysis and Clustering Algorithm","authors":"Xiaotong Li, Young Sook Lee","doi":"10.4018/jcit.336916","DOIUrl":"https://doi.org/10.4018/jcit.336916","url":null,"abstract":"Traditional customer segmentation methods cannot obtain more effective information from massive customer data, which affects the formulation of marketing strategies. Based on this, this study constructs a customer segmentation marketing strategy model that integrates support vector machines and clustering algorithms. This model first utilizes support vector machines to segment existing customer data, and then integrates support vector machines and clustering algorithms to construct a customer segmentation model. Finally, simulation experiments are conducted using the dataset. The results show that the model algorithm obtains the optimal solution when the quantity of iterations is 50. Meanwhile, the average error rate of the model algorithm in the customer segmentation process is 6.82%, the average recall rate is 91.28%, and the average profit predicted by the impact strategy developed by the segmentation model is 29.88%, which is 2.53% different from the true value.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139855186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vector-Based Realization of Area-Weight Proportional Multiplicatively Weighted Voronoi Diagrams With the ArcGIS Engine 利用 ArcGIS 引擎实现基于矢量的面积-重量比例乘法加权沃罗诺图
IF 1
Journal of Cases on Information Technology Pub Date : 2024-02-01 DOI: 10.4018/jcit.337322
Song Tian, Zheng Wei
{"title":"Vector-Based Realization of Area-Weight Proportional Multiplicatively Weighted Voronoi Diagrams With the ArcGIS Engine","authors":"Song Tian, Zheng Wei","doi":"10.4018/jcit.337322","DOIUrl":"https://doi.org/10.4018/jcit.337322","url":null,"abstract":"In the geographical field, the studies have been on service areas using the Voronoi diagram and its derived models is extensive, but there is a lack of effective methods to achieve a good area-weight proportionality between generators and their exclusive regions. As a famous visualizing method, adaptive multiplicatively weighted Voronoi diagrams are able to achieve it, but are limited to displaying non-spatial data. The approach of the area-weight proportional multiplicatively weighted Voronoi diagram is proposed to solve these problems by allowing for spatial division with a point-fixed iteration approach and a vector-based multiplicatively weighted Voronoi diagram construction method from point features with spatial coordinates and references in GIS environments. It enables one to create a set of regions that is proportional to the weights of the generators. The method is successfully tested on a series of cases. The approach aims to establish a kind of spatial data model to represent demand and supply situations in real life.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139883494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vector-Based Realization of Area-Weight Proportional Multiplicatively Weighted Voronoi Diagrams With the ArcGIS Engine 利用 ArcGIS 引擎实现基于矢量的面积-重量比例乘法加权沃罗诺图
IF 1
Journal of Cases on Information Technology Pub Date : 2024-02-01 DOI: 10.4018/jcit.337322
Song Tian, Zheng Wei
{"title":"Vector-Based Realization of Area-Weight Proportional Multiplicatively Weighted Voronoi Diagrams With the ArcGIS Engine","authors":"Song Tian, Zheng Wei","doi":"10.4018/jcit.337322","DOIUrl":"https://doi.org/10.4018/jcit.337322","url":null,"abstract":"In the geographical field, the studies have been on service areas using the Voronoi diagram and its derived models is extensive, but there is a lack of effective methods to achieve a good area-weight proportionality between generators and their exclusive regions. As a famous visualizing method, adaptive multiplicatively weighted Voronoi diagrams are able to achieve it, but are limited to displaying non-spatial data. The approach of the area-weight proportional multiplicatively weighted Voronoi diagram is proposed to solve these problems by allowing for spatial division with a point-fixed iteration approach and a vector-based multiplicatively weighted Voronoi diagram construction method from point features with spatial coordinates and references in GIS environments. It enables one to create a set of regions that is proportional to the weights of the generators. The method is successfully tested on a series of cases. The approach aims to establish a kind of spatial data model to represent demand and supply situations in real life.","PeriodicalId":43384,"journal":{"name":"Journal of Cases on Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139823301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信