2020 3rd International Conference on Information and Computer Technologies (ICICT)最新文献

筛选
英文 中文
Exploring the Influence of Organizational Context on Cross-boundary Information-Sharing Initiatives: The Case of the Saudi’s Government Secure Bus 探讨组织情境对跨界信息共享举措的影响:以沙特政府安全巴士为例
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00036
Mohammed A. Gharawi, Hashim H. Alneami
{"title":"Exploring the Influence of Organizational Context on Cross-boundary Information-Sharing Initiatives: The Case of the Saudi’s Government Secure Bus","authors":"Mohammed A. Gharawi, Hashim H. Alneami","doi":"10.1109/ICICT50521.2020.00036","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00036","url":null,"abstract":"This study addresses the organizational factors influencing cross-boundary information sharing (CBIS) initiatives within the context of Saudi Arabia (SA). The study starts by synthesizing the pertinent literature toward implementing an integrated model for the organizational factors influencing CBIS. A qualitative research approach was used to guide the research and the data was collected using interviews and documentation. The study shows that the adoption of the Government Secure Bus (GSB), implemented to facilitate information sharing between government agencies in SA, is influenced by nine factors identified by previous research. These factors include goals and interests of participating organizations, trust, executive support, risks, costs, benefits, authority and hierarchical structures, organizational culture, and leadership. Additionally, the study pointed to three additional factors that influence GSB adoption. The additional factors include mimetic pressures, e-government transformation measurement, and organizations’ perception of data quality.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection: Issues, Problems and Solutions 入侵检测:问题、问题和解决方案
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00070
O. A. Adeleke
{"title":"Intrusion Detection: Issues, Problems and Solutions","authors":"O. A. Adeleke","doi":"10.1109/ICICT50521.2020.00070","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00070","url":null,"abstract":"Computers have become ubiquitous. They now control some of our most complicated industrial systems and they are also used in virtually every field of human endeavor today, to store, process and transfer sensitive data. However, this increased popularity of computers and internet, has also increased the severity and consequences of possible intrusion by malicious actors. Furthermore, the level of sophistication of intrusive attacks seen, continues to increase at a very high rate, making it more difficult for organizations to stay ahead of attackers. These factors make the study of intrusion detection very important. Therefore, in this paper, we carry out a detail study of intrusion detection, discussing popular attacks, examining problems associated with their detection and exploring possible solutions.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131370844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Significance of Agile Software Development and SQA Powered by Automation 敏捷软件开发和自动化驱动的SQA的意义
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00009
Bilal Gonen, D. Sawant
{"title":"Significance of Agile Software Development and SQA Powered by Automation","authors":"Bilal Gonen, D. Sawant","doi":"10.1109/ICICT50521.2020.00009","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00009","url":null,"abstract":"Today's software industry is fast moving and has daily changing demands. Many organizations are struggling to cope up with these emerging demands and they are looking for change in software development. Agile is most popular software development strategy in today's software industry, Agile provides different methods, organizations can choose suitable method to implement agility. Among all agile methods, Scrum is the most popular as of today. Although, agile is well suitable for large organization with distributed systems. Agile method such as 'scrum' can be improved further and it can work with other process and automation tools coupled with agile artifacts to improve software development team's performance such a solution can be applied to large scale industries. As no one solution is best suitable for today's business, hence the concept of 'Agile Genome' is becoming more popular, which encourages organizations to use combination of other methods and automation tools that can be used based on the application. Hence there is a need of discussing areas where agile and automation can work together and finding different ways of utilizing full potential of agile methods along with automation tools to achieve maximum benefits for the software industries.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114260087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Big Data Pipeline with ML-Based and Crowd Sourced Dynamically Created and Maintained Columnar Data Warehouse for Structured and Unstructured Big Data 基于ml和众包的大数据管道,动态创建和维护结构化和非结构化大数据的列式数据仓库
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00018
K. Ghane
{"title":"Big Data Pipeline with ML-Based and Crowd Sourced Dynamically Created and Maintained Columnar Data Warehouse for Structured and Unstructured Big Data","authors":"K. Ghane","doi":"10.1109/ICICT50521.2020.00018","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00018","url":null,"abstract":"The existing big data platforms take data through distributed processing platforms and store them in a data lake. The architectures such as Lambda and Kappa address the real-time and batch processing of data. Such systems provide real time analytics on the raw data and delayed analytics on the curated data. The data denormalization, creation and maintenance of a columnar dimensional data warehouse is usually time consuming with no or limited support for unstructured data. The system introduced in this paper automatically creates and dynamically maintains its data warehouse as a part of its big data pipeline in addition to its data lake. It creates its data warehouse on structured, semi-structured and unstructured data. It uses Machine Learning to identify and create dimensions. It also establishes relations among data from different data sources and creates the corresponding dimensions. It dynamically optimizes the dimensions based on the crowd sourced data provided by end users and also based on query analysis.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124751769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Coronary Artery Disease Diagnosis Using Feature Selection Based Hybrid Extreme Learning Machine 基于特征选择的混合极限学习机诊断冠状动脉疾病
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00060
Afzal Hussain Shahid, M. Singh, Bishwajit Roy, Aashish Aadarsh
{"title":"Coronary Artery Disease Diagnosis Using Feature Selection Based Hybrid Extreme Learning Machine","authors":"Afzal Hussain Shahid, M. Singh, Bishwajit Roy, Aashish Aadarsh","doi":"10.1109/ICICT50521.2020.00060","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00060","url":null,"abstract":"Coronary artery disease (CAD) is the most common cardiovascular disease (CVD) that cause millions of deaths worldwide due to heart failure, heart attack, and angina. The symptoms of the CAD do not appear in the early stage of the disease and it causes deadly conditions; therefore, accurate and early diagnosis of CAD is necessary to take appropriate and timely action for preventing or minimizing such conditions. Angiography, being the most accurate method for diagnosis of CAD, is often used by the clinicians to diagnose the CAD but this is an invasive procedure, costly, and may cause side effects. Therefore, researchers are trying to develop alternative diagnostic modalities for the efficient diagnosis of CAD. To that end, machine learning and data mining techniques have been widely employed. This paper proposes and develops hybrid Particle swarm optimization based Extreme learning machine (PSO-ELM) for diagnosis of CAD using the publicly available Z-Alizadeh sani dataset. To enhance the performance of the proposed model, a feature selection algorithm, namely Fisher, is used to find more discriminative feature subset. In the training period, the PSO algorithm is used to calibrate the ELM input weights and hidden biases. Further, the performance of the proposed model is compared with the basic ELM in terms of accuracy, Pearson correlation coefficient (R2) and Root mean square error (RMSE) goodness-of-fit functions. The results show that the performance of the proposed model is better than the basic ELM. The obtained CAD classification performance in terms of sensitivity, accuracy, specificity, and F1-measure is competitive to the known approaches in the literature.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121421542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on Mixed Planning Method of 5G and LTE 5G与LTE混合规划方法研究
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00084
Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen
{"title":"Research on Mixed Planning Method of 5G and LTE","authors":"Quan Yuan, Quanzhi Qian, Yong Mo, Hao Chen","doi":"10.1109/ICICT50521.2020.00084","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00084","url":null,"abstract":"5G will enter the stage of large-scale commercial deployment. It can be said that \"quick deployment of 5G network\" is the choice that telecom operators must make now. Due to the need to seize the 5G competition and the smooth evolution of the architecture, most domestic and foreign operators currently adopt the NSA solution. However, how to implement 5G network deployment can achieve accurate delivery of network resources and avoid waste of network resources and investment costs in 5G network deployment. In view of this problem, at the same time, the current 5G is still in the early stage of development, and there is no experience of large-scale planning and deployment. This paper proposes a hybrid planning method of 5G and LTE under the NSA mode. Firstly, the analysis introduces 5G network performance, NSA networking mode, system network planning indicators, and summarizes 5G network planning indicators, business forecasting, frequency planning, capacity planning and so on. Then, through the uplink and downlink budget, the coverage of 5G and LTE is determined. Finally, the grid analysis method is used to deploy the 5G network, and the simulation results are analyzed. The simulation results show that the proposed method can maintain the existing network structure and reduce the cost of network construction, so that operators can quickly deploy 5G on existing LTE sites, which has important guiding significance for the construction and deployment of the previous 5G network.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131415438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Semantic Segmentation and Contextual Information Based Image Scene Interpretation: A Review 基于语义分割和上下文信息的图像场景解释研究进展
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00031
Ajay Koul, Apeksha Koul
{"title":"Semantic Segmentation and Contextual Information Based Image Scene Interpretation: A Review","authors":"Ajay Koul, Apeksha Koul","doi":"10.1109/ICICT50521.2020.00031","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00031","url":null,"abstract":"The images in the scene consist of several objects that depict different relationships among themselves. Interpretation understands those relationships. Thus, scene interpretation is a scene description in which the scene models are consistent with the evidence, context information, and world knowledge. On one side, images in scene interpretation are useful in extracting the information that is related to the physical world and is meant for human operators. On the other side, it has always constituted a great challenge because of the varieties of complex objects due to which computer vision is not much capable to comprehend the information regarding the images in the scene. It also requires many efforts to extract the deeper meaning of the scene. So in review paper, we are going to summarize the methodology proposed by various researchers in terms of semantic segmentation and contextual information to interpret the images and highlight their contributions and challenges which still persist. Our analysis of the different methods proposed is also provided to draw some conclusions.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An IT Service Management Methodology for an Electoral Public Institution 一个选举公共机构的IT服务管理方法
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00041
Mario Barcelo-Valenzuela, Carlos Maximiliano Leal-Pompa, Gerardo Sanchez-Schmitz
{"title":"An IT Service Management Methodology for an Electoral Public Institution","authors":"Mario Barcelo-Valenzuela, Carlos Maximiliano Leal-Pompa, Gerardo Sanchez-Schmitz","doi":"10.1109/ICICT50521.2020.00041","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00041","url":null,"abstract":"The document presents an adaptation of the Information Technology Infrastructure Library (ITIL) standards and best practices provided from its service life cycle in the IT department (ITD) of a Local Electoral Public Institution (LEPI) in Mexico. These type of autonomous and public organizations are in charge of organizing elections in each state. The ITD is in charge of IT problem solving and improvement projects related to elections and other needs of the organization. Most of the work is generated from user needs as they arise, but there's a lack of Standard Operating Procedures (SOPs) which prevents continuous monitoring, improvement and follow through. The main challenge to providing quality IT services in Electoral Institutions of this nature, is their adaptability to unexpected changes that occur in regulations. Service requests are caused by untimely changes arising from agreements and resolutions of Institutes and Court; this creates a work environment in which sudden decision-making is encouraged in terms of IT solutions management, which is why having an IT strategy that aligns with the strategic objectives of LEPI is crucial to guarantee a continuous improvement in the local democratic functioning. There is limited research on the application of standards and best practices in IT services for the public sector in Mexico, this methodology can be implemented in each of the 32 IT departments within the country.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123991953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile Learning for Just-in-Time Knowledge Acquisition in a Workplace Environment 工作环境中即时知识获取的移动学习
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00038
T. Alade, Ruel Welch, Andrew Robinson, Lynn Nichol
{"title":"Mobile Learning for Just-in-Time Knowledge Acquisition in a Workplace Environment","authors":"T. Alade, Ruel Welch, Andrew Robinson, Lynn Nichol","doi":"10.1109/ICICT50521.2020.00038","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00038","url":null,"abstract":"The use of mobile devices in an educational context to support learning has drawn considerable attention, however, there is relatively little systematic knowledge about how it can be used effectively as a knowledge acquisition tool in workplace environments. This paper proposes mobile learning (m-learning) as a just-in-time learning tool to support and manage ICT problem related calls in a Science Museum (SM). Employees' intention to use m-learning is investigated using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. Selected UTAUT factors including performance expectancy, effort expectancy, social influence and facilitating conditions are analysed to explain the determinants of m-learning adoption at the SM. Results demonstrate that the selected UTAUT factors had a significant impact on employee's behavioral intention to use m-learning at the SM. Further examination found age and gender moderate the relationship between the UTAUT factors. These findings present several useful implications for m-learning research and practice for ICT service desks.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130451469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Short-Term Prediction Model for Multi-currency Exchange Using Artificial Neural Network 基于人工神经网络的多币种汇兑短期预测模型
2020 3rd International Conference on Information and Computer Technologies (ICICT) Pub Date : 2020-03-01 DOI: 10.1109/ICICT50521.2020.00024
Isha Zameer Memon, Shahnawaz Talpur, Sanam Narejo, Aisha Zahid Junejo, Engr. Fawwad Hassan
{"title":"Short-Term Prediction Model for Multi-currency Exchange Using Artificial Neural Network","authors":"Isha Zameer Memon, Shahnawaz Talpur, Sanam Narejo, Aisha Zahid Junejo, Engr. Fawwad Hassan","doi":"10.1109/ICICT50521.2020.00024","DOIUrl":"https://doi.org/10.1109/ICICT50521.2020.00024","url":null,"abstract":"Forecasting the exchange rates is a serious issue that is getting expanding consideration particularly as a result of its trouble and pragmatic applications. Artificial neural networks (ANNs) have been generally utilized as a promising elective methodology for an anticipating task as a result of a few recognized highlights. Research endeavors on ANNs for gauging exchange rates are extensive. In this paper, we endeavor to give a review of research around there. A few structure factors fundamentally sway the exactness of neural network gauges. These elements incorporate the determination of information factors, getting ready information, and network design. There is no accord about the components. In various cases, different choices have their own adequacy. We additionally depict the combination of ANNs with different strategies and report the correlation between exhibitions of ANNs also, those of other anticipating techniques, and finding blended outcomes. At long last, what's to come inquire about headings around there are examined. This paper presents the forecast of top exchanged monetary utilizing diverse Machine learning models which incorporate top foreign exchange (Forex) monetary standards utilizing a hybrid comparison of Support Vector Regressor (SVR) and Artificial Neural Network (ANN), Short-Term Memory (STM), and Neural Network with Hidden Layers. They anticipate the exchange rate between world's top exchanged monetary forms, for example, USD/PKR, from information by day, 30-39 years till December 2018.","PeriodicalId":445000,"journal":{"name":"2020 3rd International Conference on Information and Computer Technologies (ICICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134216552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信