International Journal of Innovative Computing Information and Control最新文献

筛选
英文 中文
Recurrent neural network based stock price prediction using multiple stock brands 基于递归神经网络的多品牌股票价格预测
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2020-01-01 DOI: 10.24507/IJICIC.16.03.1093
Shota Rikukawa, H. Mori, Taku Harada
{"title":"Recurrent neural network based stock price prediction using multiple stock brands","authors":"Shota Rikukawa, H. Mori, Taku Harada","doi":"10.24507/IJICIC.16.03.1093","DOIUrl":"https://doi.org/10.24507/IJICIC.16.03.1093","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"15 1","pages":"1093-1099"},"PeriodicalIF":1.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74172212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Integrating Virtual Reality and Augmented Reality in a Collaborative User Interface 在协作用户界面中集成虚拟现实和增强现实
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-11-28 DOI: 10.11113/ijic.v9n2.242
M. N. A. Nor’a, A. W. Ismail
{"title":"Integrating Virtual Reality and Augmented Reality in a Collaborative User Interface","authors":"M. N. A. Nor’a, A. W. Ismail","doi":"10.11113/ijic.v9n2.242","DOIUrl":"https://doi.org/10.11113/ijic.v9n2.242","url":null,"abstract":"Application that adopts collaborative system allows multiple users to interact with other users in the same virtual space either in Virtual Reality (VR) or Augmented Reality (AR). This paper aims to integrate the VR and AR space in a Collaborative User Interface that enables the user to cooperate with other users in a different type of interfaces in a single shared space manner. The gesture interaction technique is proposed as the interaction tool in both of the virtual spaces as it can provide a more natural gesture interaction when interacting with the virtual object. The integration of VR and AR space provide a cross-discipline shared data interchange through the network protocol of client-server architecture.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"1 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86455871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The effect of stimulus pattern, color combination and flicker frequency on steady-state visual evoked potentials topography 刺激方式、颜色组合和闪烁频率对稳态视觉诱发电位形貌的影响
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-08-01 DOI: 10.24507/IJICIC.15.04.1521
K. Goto, T. Sugi, H. Fukuda, T. Yamasaki, S. Tobimatsu, Y. Goto
{"title":"The effect of stimulus pattern, color combination and flicker frequency on steady-state visual evoked potentials topography","authors":"K. Goto, T. Sugi, H. Fukuda, T. Yamasaki, S. Tobimatsu, Y. Goto","doi":"10.24507/IJICIC.15.04.1521","DOIUrl":"https://doi.org/10.24507/IJICIC.15.04.1521","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"92 1","pages":"1521-1530"},"PeriodicalIF":1.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75923456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient matrix embedding technique by using submatrix transform for grayscale images 基于子矩阵变换的灰度图像矩阵嵌入技术
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-08-01 DOI: 10.24507/IJICIC.15.04.1565
Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin, Chin-hsing Chen
{"title":"An efficient matrix embedding technique by using submatrix transform for grayscale images","authors":"Hsi-Yuan Chang, Jyun-Jie Wang, Chi-Yuan Lin, Chin-hsing Chen","doi":"10.24507/IJICIC.15.04.1565","DOIUrl":"https://doi.org/10.24507/IJICIC.15.04.1565","url":null,"abstract":"","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"48 1","pages":"1565-1580"},"PeriodicalIF":1.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87935952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study for the Development of Automated Essay Scoring (AES) in Malaysian English Test Environment 马来西亚英语考试环境中自动作文评分系统的开发研究
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.220
Wee Sian Wong, Chih How Bong
{"title":"A Study for the Development of Automated Essay Scoring (AES) in Malaysian English Test Environment","authors":"Wee Sian Wong, Chih How Bong","doi":"10.11113/IJIC.V9N1.220","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.220","url":null,"abstract":"Automated Essay Scoring (AES) is the use of specialized computer programs to assign grades to essays written in an educational assessment context. It is developed to overcome time, cost, and reliability issues in writing assessment. Most of the contemporary AES are “western” proprietary product, designed for native English speakers, where the source code is not made available to public and the assessment criteria may tend to be associated with the scoring rubrics of a particular English test context. Therefore, such AES may not be appropriate to be directly adopted in Malaysia context. There is no actual software development work found in building an AES for Malaysian English test environment. As such, this work is carried out as the study for formulating the requirement of a local AES, targeted for Malaysia's essay assessment environment. In our work, we assessed a well-known AES called LightSide for determining its suitability in our local context. We use various Machine Learning technique provided by LightSide to predict the score of Malaysian University English Test (MUET) essays; and compare its performance, i.e. the percentage of exact agreement of LightSide with the human score of the essays. Besides, we review and discuss the theoretical aspect of the AES, i.e. its state-of-the-art, reliability and validity requirement. The finding in this paper will be used as the basis of our future work in developing a local AES, namely Intelligent Essay Grader (IEG), for Malaysian English test environment.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"96 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86988761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Review of Bioinformatics Model and Computational Software of Next Generation Sequencing 下一代测序的生物信息学模型及计算软件研究进展
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.217
Jalilah Arijah Mohd Kamarudin, A. Abdullah, R. Sallehuddin
{"title":"A Review of Bioinformatics Model and Computational Software of Next Generation Sequencing","authors":"Jalilah Arijah Mohd Kamarudin, A. Abdullah, R. Sallehuddin","doi":"10.11113/IJIC.V9N1.217","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.217","url":null,"abstract":"In the past decade it has become increasingly the effort for researcher to surpass the bioinformatics challenges foremost in next generation sequencing (NGS). This review paper gives an overview of the computational software and bioinformatics model that has been used for next generation sequencing. In this paper, the description on functionalities, source type and website of the program or software are provided. These computational software and bioinformatics model are differentiating into three types of bioinformatics analysis stages including alignment, variant calling and filtering and annotation. Besides, we discuss the future work and the development for new bioinformatics tool to be advanced.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"11 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75211376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhancement of TOE Model by Investigating the Influential Factors of Cloud Adoption Security Objectives 研究云采用安全目标影响因素对TOE模型的改进
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.192
Md Yeahia Bhuiyan, S. H. Othman, Raja Zahilah Raja Md Radzi
{"title":"An Enhancement of TOE Model by Investigating the Influential Factors of Cloud Adoption Security Objectives","authors":"Md Yeahia Bhuiyan, S. H. Othman, Raja Zahilah Raja Md Radzi","doi":"10.11113/IJIC.V9N1.192","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.192","url":null,"abstract":"Cloud computing (CC) is a future technological trend for technological infrastructure development. And it is growing strongly as the backbone of industrial future technological infrastructure. As CC service has a lot to offer, it also has some major downside that clients cannot ignore. For CC service adoption, the potential candidates are SMEs but due to lack of resources, experience, expertise and low financial structure scenario CC can be most helpful. CC faces a major issue in term of cloud security, an organization doesn’t understand the cloud security factors in the organization and data owner doubts about their data. In the research paper, an investigation on the cloud security objectives to find out the influential factors for cloud adoption in SMEs by proposing an enhancement of Technology-Organization-Environment (TOE) model with some positive influential factor like cloud security, relative advantages, cost saving, availability, SLA, capability, top management, organizational readiness, IS knowledge, malicious insiders, government regulatory support, competitive pressure, size and type. Some negative influencing factors like technological readiness, cloud trust and lack of standards in cloud security. Data were collected by questionnaires from a selected IT company based on SaaS and public cloud. Case study method has been used for validating the enhance TOE model. The IBM Statistics SPSS v22 tool was used for data analysis. The results of data analysis support the enhancement as well as all the proposed hypotheses. In summary, the results of the analysis show that all the enhancement factors were found to have a significant cloud security influence on adoption of cloud computing for SMEs.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"149 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91142121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Conceptual Framework of Information Security Database Audit and Assessment 信息安全数据库审计与评估的概念框架
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.206
Muneeb ul-Hasan, S. H. Othman, Marina Md Arshad
{"title":"A Conceptual Framework of Information Security Database Audit and Assessment","authors":"Muneeb ul-Hasan, S. H. Othman, Marina Md Arshad","doi":"10.11113/IJIC.V9N1.206","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.206","url":null,"abstract":"Today, databases are on of the most important things in the IT world and it is also becoming more and more popular and organizations globally are gradually moving their traditional IT setup to database model to gain the benefits of securing the data and in terms of providing easy access to, and elasticity of IT services. With database security, the IT service roles within an organization become integrated hence giving the overall IT operating model a more structured layout. Such objectivity however can only be materialized when proper planning and execution are put in place. As such, a proper execution and implementation of database system would include a stringent set of checks and audit processes. The goal of database auditing is central towards determining if the services engaged and its―maintainers are meeting certain legal requirements in terms of protecting customers data and organization standards to achieve secure data assets success against various security threats. Therefore, this project explores the factors influencing security audit quality by collecting data using structured group discussion.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87935315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed CESVM-DR Anomaly Detection for Wireless Sensor Network 无线传感器网络分布式CESVM-DR异常检测
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.218
Nurfazrina Mohd Zamry, A. Zainal, M. Rassam
{"title":"Distributed CESVM-DR Anomaly Detection for Wireless Sensor Network","authors":"Nurfazrina Mohd Zamry, A. Zainal, M. Rassam","doi":"10.11113/IJIC.V9N1.218","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.218","url":null,"abstract":"Nowadays, the advancement of the sensor technology, has introduced the smart living community where the sensor is communicating with each other or to other entities. This has introduced the new term called internet-of-things (IoT). The data collected from sensor nodes will be analyzed at the endpoint called based station or sink for decision making. Unfortunately, accurate data is not usually accurate and reliable which will affect the decision making at the base station. There are many reasons constituted to the inaccurate and unreliable data like the malicious attack, harsh environment as well as the sensor node failure itself. In a worse case scenario, the node failure will also lead to the dysfunctional of the entire network. Therefore, in this paper, an unsupervised one-class SVM (OCSVM) is used to build the anomaly detection schemes in recourse constraint Wireless Sensor Networks (WSNs). Distributed network topology will be used to minimize the data communication in the network which can prolong the network lifetime. Meanwhile, the dimension reduction has been providing the lightweight of the anomaly detection schemes. In this paper Distributed Centered Hyperellipsoidal Support Vector Machine (DCESVM-DR) anomaly detection schemes is proposed to provide the efficiency and effectiveness of the anomaly detection schemes.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"23 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80813322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PSO-FuzzyNN Techniques in Gender Classification Based on Bovine Bone Morphology Properties 基于牛骨形态特征的PSO-FuzzyNN性别分类技术
IF 1
International Journal of Innovative Computing Information and Control Pub Date : 2019-05-31 DOI: 10.11113/IJIC.V9N1.215
Nur A. Sahadun, N. A. Ali, H. Haron
{"title":"PSO-FuzzyNN Techniques in Gender Classification Based on Bovine Bone Morphology Properties","authors":"Nur A. Sahadun, N. A. Ali, H. Haron","doi":"10.11113/IJIC.V9N1.215","DOIUrl":"https://doi.org/10.11113/IJIC.V9N1.215","url":null,"abstract":"This simulation project aims to solve forensic anthropology issues by using the computational method. The positive identification on gender is such a potential field to be explored. Basically, gender identification in forensic anthropology by comparative skeletal anatomy by atlas and crucially affect the identification accuracy. The simulation identification method was studied in order to determine the best model, which reduce the total costs of the post-mortem as an objective. The computational method on simulation run improves the identification accuracy as proven by many studies. Fuzzy K-nearest neighbours classifier (FuzzyNN) is such a computational intelligence method and always shows the best performance in many fields including forensic anthropology. Thus, this intelligent identification method was implemented within the determining for best accuracy. The result of this proposed model was compared with raw data collection and standard collections datasets; Goldman Osteometric dataset and Ryan and Shaw Dataset (RSD) as a benchmark for the identification policy. To improve the accuracy of FuzzyNN classifier, Particle Swarm Optimization (PSO) feature selection was used as the basis for choosing the best features to be used by the selected FuzzyNN classification model. The model is called PSO-FuzzyNN and has been developed by MATLAB and WEKA tools platform. Comparisons of the performance measurement namely the percentage of the classification accuracy of the model were performed. The result show potential the proposed PSO-FuzzyNN method demonstrates the capability to the obtained highest accuracy of identification.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"88 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72553853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信