Journal of Systems Engineering and Information Technology (JOSEIT)最新文献

筛选
英文 中文
An Optimal Solution to the Overfitting and Underfitting Problem of Healthcare Machine Learning Models 医疗机器学习模型过拟合和欠拟合问题的最优解
Journal of Systems Engineering and Information Technology (JOSEIT) Pub Date : 2023-10-03 DOI: 10.29207/joseit.v2i2.5460
Anil Kumar Prajapati Anil, Umesh Kumar Singh
{"title":"An Optimal Solution to the Overfitting and Underfitting Problem of Healthcare Machine Learning Models","authors":"Anil Kumar Prajapati Anil, Umesh Kumar Singh","doi":"10.29207/joseit.v2i2.5460","DOIUrl":"https://doi.org/10.29207/joseit.v2i2.5460","url":null,"abstract":"In the current technological era, artificial intelligence is becoming increasingly popular. Machine learning, as the branch of AI is taking charge in every field such as healthcare, the Stock market, Automation, Robotics, Image Processing, and so on. In the current scenario, machine learning and/or deep learning are becoming very popular in medical science for disease prediction. Much research is underway in the form of disease prediction models by machine learning. To ensure the performance and accuracy of the machine learning model, it is important to keep some basic things in mind during training. The machine learning model has several issues which must be rectified duration of the training of the model so that the learning model works efficiently such as model selection, parameter tuning, dataset splitting, cross-validation, bias-variance tradeoff, overfitting, underfitting, and so on. Under- and over-fitting are the two main issues that affect machine learning models. This research paper mainly focuses on minimizing and/or preventing the problem of overfitting and underfitting machine learning models.","PeriodicalId":496970,"journal":{"name":"Journal of Systems Engineering and Information Technology (JOSEIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135689650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Mobile Ad-Hoc Networks Based on TCP and UDP Traffic on AODV Protocol for Warship Communication 舰船通信AODV协议下基于TCP和UDP流量的移动自组网性能分析
Journal of Systems Engineering and Information Technology (JOSEIT) Pub Date : 2023-09-17 DOI: 10.29207/joseit.v2i2.5343
None Alon Jala Tirta Segara, Afifah Dwi Ramadhani
{"title":"Performance Analysis of Mobile Ad-Hoc Networks Based on TCP and UDP Traffic on AODV Protocol for Warship Communication","authors":"None Alon Jala Tirta Segara, Afifah Dwi Ramadhani","doi":"10.29207/joseit.v2i2.5343","DOIUrl":"https://doi.org/10.29207/joseit.v2i2.5343","url":null,"abstract":"This research focuses on evaluating two key parameters in Mobile Ad-Hoc Networks (MANETs) that use the AODV protocol for warship communication, namely the packet delivery ratio (PDR) and end-to-end delay. PDR describes the percentage of data packets that successfully reach their destination without loss or damage during transmission. The study will analyze and compare PDR in MANETs with TCP and UDP traffic to understand the reliability and efficiency of the AODV protocol in data delivery. Furthermore, the research will also assess end-to-end delay, which measures the time it takes data packets to reach their final destination. Evaluating this delay will provide insights into the network's responsiveness in transmitting data between source and destination. The results of this research will offer valuable information about the performance of MANETs using the AODV protocol with TCP and UDP traffic. These findings can be used to optimize warship communication systems by selecting the most suitable protocol and traffic to achieve high PDR and minimal end-to-end delay; this study has the potential to serve as a critical foundation for developing reliable and efficient mobile ad hoc networks for military communication in dynamic and challenging environments.","PeriodicalId":496970,"journal":{"name":"Journal of Systems Engineering and Information Technology (JOSEIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135258412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring System for Temperature and Humidity Sensors in the Production Room Using Node-Red as the Backend and Grafana as the Frontend 以Node-Red为后端,Grafana为前端的生产机房温湿度传感器监控系统
Journal of Systems Engineering and Information Technology (JOSEIT) Pub Date : 2023-09-17 DOI: 10.29207/joseit.v2i2.5222
Khoirul Anam, Difa Nur Rofi, Ruci Meiyanti
{"title":"Monitoring System for Temperature and Humidity Sensors in the Production Room Using Node-Red as the Backend and Grafana as the Frontend","authors":"Khoirul Anam, Difa Nur Rofi, Ruci Meiyanti","doi":"10.29207/joseit.v2i2.5222","DOIUrl":"https://doi.org/10.29207/joseit.v2i2.5222","url":null,"abstract":"The client from the TRIAS project is facing issues with a decrease in production quality or defective products. They require a monitoring system for temperature and humidity in the production area, providing real-time notifications in case of any anomalies in temperature and humidity. However, the project has a limited budget, which poses a challenge for the contractor in developing a monitoring system that tracks temperature and humidity changes using temperature and humidity sensors as the data source. It should also provide alarms if the temperature and humidity values exceed the standard values for the room. Additionally, the pricing offer should be adjusted using information technology. The research methodology used in this study includes qualitative methods such as observation, literature review, and interviews to gather data on the mentioned issues. The SWOT method is used to analyze business process problems, while the Waterfall method is employed for system development. Based on the research findings, the researcher concludes that this project requires cost reduction in material usage and also needs a data visualization application for the mentioned sensors. The visualization application system utilizes Grafana as the frontend, chosen for its high flexibility in processing. The temperature and humidity data obtained from the sensors will be recorded by Node-Red as the backend and synchronized on the server. The data stored on the server will be saved in a MySQL database. The data from the database will be synchronized with Grafana for processing and visualization, presenting the data in easily understandable graphical forms.","PeriodicalId":496970,"journal":{"name":"Journal of Systems Engineering and Information Technology (JOSEIT)","volume":"37 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135258409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods For Development Mobile Stunting Application: A Systematic Literature Review 开发移动发育不良应用的方法:系统的文献综述
Journal of Systems Engineering and Information Technology (JOSEIT) Pub Date : 2023-09-17 DOI: 10.29207/joseit.v2i2.5288
Hildamayanti Hildamayanti, None Dhani Ariatmanto
{"title":"Methods For Development Mobile Stunting Application: A Systematic Literature Review","authors":"Hildamayanti Hildamayanti, None Dhani Ariatmanto","doi":"10.29207/joseit.v2i2.5288","DOIUrl":"https://doi.org/10.29207/joseit.v2i2.5288","url":null,"abstract":"Stunting is a growth disorder in children. Stunting is one of the indicators of failure to thrive in toddlers caused by a chronic lack of nutritional intake in the first 1,000 days of life, from a fetus to a child aged 23 months. The object of this review is to review the current literature and help researchers find out what methods have been used in the development of stunting prevention applications. In a systematic search of the literature using quality databases including SpringerLink, ScienceDirect, and IEEE Xplore. The article included in this review is a stunting prevention application information system by describing the methods most often used by researchers in making the stunting prevention application information system. There were 41 results based on the exclusion of titles and abstracts, based on the introduction and exclusion of conclusions there were 35 results, so we included 12 results for the full-text exclusion in the final analysis.","PeriodicalId":496970,"journal":{"name":"Journal of Systems Engineering and Information Technology (JOSEIT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135258408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview and Exploratory Analyses of CICIDS 2017 Intrusion Detection Dataset CICIDS 2017入侵检测数据集综述与探索性分析
Journal of Systems Engineering and Information Technology (JOSEIT) Pub Date : 2023-09-17 DOI: 10.29207/joseit.v2i2.5411
Akinyemi Oyelakin, None Ameen A.O, None Ogundele T.S, None Salau-Ibrahim T, None Abdulrauf U.T, None Olufadi H.I, None Ajiboye I.K, None Muhammad-Thani S, None Adeniji I. A
{"title":"Overview and Exploratory Analyses of CICIDS 2017 Intrusion Detection Dataset","authors":"Akinyemi Oyelakin, None Ameen A.O, None Ogundele T.S, None Salau-Ibrahim T, None Abdulrauf U.T, None Olufadi H.I, None Ajiboye I.K, None Muhammad-Thani S, None Adeniji I. A","doi":"10.29207/joseit.v2i2.5411","DOIUrl":"https://doi.org/10.29207/joseit.v2i2.5411","url":null,"abstract":"Intrusion detection systems are used to detect attacks on a network. Machine learning (ML) approaches have been widely used to build such intrusion detection systems (IDSs) because they are more accurate when built from a very large and representative dataset. Recently, one of the benchmark datasets that are used to build ML-based intrusion detection models is the CICIDS2017 dataset. The data set is contained in eight groups and was collected from the Data Set & Repository of the Canadian Institute of Cyber Security. The data set is available in both PCAP and net flow formats. This study used the net flow records in the CIDIDS2017 dataset, as they were found to contain newer attacks, very large, and useful for traffic analysis. Exploratory data analysis (EDA) techniques were used to reveal various characteristics of the dataset. The general objective is to provide more insight into the nature, structure, and issues of the data set so as to identify the best ways to use it to achieve improved ML-based IDS models. Furthermore, some of the open problems that can arise from the use of the dataset in any machine learning-based intrusion detection systems are highlighted and possible solutions are briefly discussed. The EDA techniques used revealed important relationships between the input variables and the target class. The study concluded that the EDA can better influence the decision about future IDS research using the dataset.","PeriodicalId":496970,"journal":{"name":"Journal of Systems Engineering and Information Technology (JOSEIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135258411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acceleration and Clustering of Liver Disorder Using K-Means Clustering Method with Mahout’s Library 基于Mahout库的K-Means聚类方法对肝脏疾病的加速和聚类
Journal of Systems Engineering and Information Technology (JOSEIT) Pub Date : 2023-09-08 DOI: 10.29207/joseit.v2i2.5334
Tariq Bin Samer, Cahyo Darujati
{"title":"Acceleration and Clustering of Liver Disorder Using K-Means Clustering Method with Mahout’s Library","authors":"Tariq Bin Samer, Cahyo Darujati","doi":"10.29207/joseit.v2i2.5334","DOIUrl":"https://doi.org/10.29207/joseit.v2i2.5334","url":null,"abstract":"Evaluation of liver disorders was performed to observed and clustered in Big Data environment applications. However, since liver disorder is a common illness, global awareness of such cases can be life threatening, therefore the urge to avoid and study must be essential. The idea of parallel computing is established on the basis of the K-means method. The MapReduce framework is used to complete multi-node data processing, and a solution to the MapReduce K-Means method is given. The ultimate goal is to establish clusters that allow each entity to be examined and assigned to a certain cluster. These algorithms are designed to accelerate computations, reduce the volume of enormous data that must be computed, and improve the efficiency of arithmetic operations. The combination of theoretical analysis and experimental evaluation is very significant.","PeriodicalId":496970,"journal":{"name":"Journal of Systems Engineering and Information Technology (JOSEIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136298476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信