Informatica最新文献

筛选
英文 中文
Improved Model for Identifying the Cyberbullying based on Tweets of Twitter 基于推特推文识别网络欺凌的改进模型
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-06-09 DOI: 10.31449/inf.v47i6.4534
Darwin Samalo, Rizky Martin, D. N. Utama
{"title":"Improved Model for Identifying the Cyberbullying based on Tweets of Twitter","authors":"Darwin Samalo, Rizky Martin, D. N. Utama","doi":"10.31449/inf.v47i6.4534","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4534","url":null,"abstract":"The surge of cyberbullying on social media platforms is a major concern in today's digital age, with its prevalence escalating alongside advancements in technology. Thus, devising methods to detect and eliminate cyberbullying has become a crucial task. This research meticulously presents a refined model for identifying instances of cyberbullying, building on previous methodologies. The process of devising the model involved a thorough literature review, object-oriented design","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45112721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities 主题建模对软件漏洞严重程度预测的影响
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-06-08 DOI: 10.31449/inf.v47i6.3712
Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon
{"title":"The Effect of Topic Modelling on Prediction of Criticality Levels of Software Vulnerabilities","authors":"Prarna Mehta, Shubhangi Aggarwal, Abhishek Tandon","doi":"10.31449/inf.v47i6.3712","DOIUrl":"https://doi.org/10.31449/inf.v47i6.3712","url":null,"abstract":"identify a critical","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45171018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Processing of Municipal Wastewater Recycling Based on Genetic Algorithm 基于遗传算法的城市污水回用数据处理
4区 计算机科学
Informatica Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4038
Zijun Zhao, Jianchao Zhu, Kaiming Yang, Song Wang, Mingxiao Zeng
{"title":"Data Processing of Municipal Wastewater Recycling Based on Genetic Algorithm","authors":"Zijun Zhao, Jianchao Zhu, Kaiming Yang, Song Wang, Mingxiao Zeng","doi":"10.31449/inf.v47i3.4038","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4038","url":null,"abstract":"In order to accurately process the data of urban sewage recycling, this paper designs an adaptive genetic algorithm, which integrates genetic algorithm, adaptive genetic algorithm and traditional PID respectively, and designs simulation experiments to compare their performance. The simulation results show that the self-adaptive PID control algorithm is superior to the genetic PID control algorithm in both control accuracy and dynamic characteristics. The PID controller with good optimization performance is applied to the control object of sewage treatment system. Through simulation analysis, the adaptive genetic algorithm only needs 52s when adjusting the step response simulation. The overshoot of the system is 8%. The interference in the simulation is restored to a stable state within the interference 18S, and the adjustment time in the robustness simulation is reduced by about 15s compared with the genetic algorithm. In conclusion, the adjustment time of the system is shortened, the overshoot of the system is reduced, and the anti-interference and robustness are enhanced. For the dissolved oxygen concentration of the key object in the control system, the above controller with good performance is applied to the sewage treatment control system, which not only reduces the overshoot and regulation time, but also improves the control accuracy, and can well meet the control requirements of sewage treatment.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-based Cnn Multi-modal Camera Model Identification for Video Source Identification 基于深度学习的Cnn多模态摄像机模型识别用于视频源识别
4区 计算机科学
Informatica Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4392
Surjeet Singh, Vivek Kumar Sehgal
{"title":"Deep Learning-based Cnn Multi-modal Camera Model Identification for Video Source Identification","authors":"Surjeet Singh, Vivek Kumar Sehgal","doi":"10.31449/inf.v47i3.4392","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4392","url":null,"abstract":"There is a high demand for multimedia forensics analysts to locate the original camera of photographs and videos that are being taken nowadays. There has been considerable progress in the technology of identifying the source of data, which has enabled conflict resolutions involving copyright infringements and identifying those responsible for serious offences to be resolved. This study focuses on the issue of identifying the camera model used to acquire video sequences used in this research that is, identifying the type of camera used to capture the video sequence under investigation. For this purpose, we created two distinct CNN-based camera model recognition techniques to be used in an innovative multi-modal setting. The proposed multi-modal methods combine audio and visual information in order to address the identification issue, which is superior to mono-modal methods which use only the visual or audio information from the investigated video to provide the identification information.According to legal standards of admissible evidence and criminal procedure, Forensic Science involves the application of science to the legal aspects of criminal and civil law, primarily during criminal investigations, in line with the standards of admissible evidence and criminal procedure in the law. It is responsible for collecting, preserving, and analyzing scientific evidence in the course of an investigation. It has become a critical part of criminology as a result of the rapid rise in crime rates over the last few decades. Our proposed methods were tested on a well-known dataset known as the Vision dataset, which contains about 2000 video sequences gathered from various devices of varying types. It is conducted experiments on social media platforms such as YouTube and WhatsApp as well as native videos directly obtained from their acquisition devices by the means of their acquisition devices. According to the results of the study, the multimodal approaches suggest that they greatly outperform their mono-modal equivalents in addressing the challenge at hand, constituting an effective approach to address the challenge and offering the possibility of even more difficult circumstances in the future","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing A Permissioned Blockchain Network For The Insurance Claim Process Using Hyperledger Fabric And Composer 使用Hyperledger Fabric和Composer为保险索赔过程设计一个许可的区块链网络
4区 计算机科学
Informatica Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4158
Archana Hombalimath, Neha Mangla, Arun Balodi
{"title":"Designing A Permissioned Blockchain Network For The Insurance Claim Process Using Hyperledger Fabric And Composer","authors":"Archana Hombalimath, Neha Mangla, Arun Balodi","doi":"10.31449/inf.v47i3.4158","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4158","url":null,"abstract":"This research aims to examine the benefits of blockchain technology (BCT) in the vehicle insurance process. The article addresses a number of benefits offered by BCT, including automating the identity verification and doing away with the need for numerous parties to manually certify the legitimacy of transactions. India's financial and business networks can be anticipated to change the accounting process to a different extreme with the introduction of BCT. Unfortunately, they are having some difficulties implementing and acclimating to this modern technology. Here is the solution, blockchain technology may help us solve the existing problem. Insurance firms and car owners can benefit from blockchain technology since it can effectively open up communication channels, encourage industry integration, and improve insurance provider’s ability to access record. Using BCT, banking operations will be more efficient, quicker, and less expensive because to the removal of middlemen. Decentralization, transparency, and secure transactions will be the main advantages.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study of Missing Value Imputation Techniques on E-Commerce Product Ratings 电子商务产品评级缺失价值归算技术的比较研究
4区 计算机科学
Informatica Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4156
Dimple Chehal, Parul Gupta, Payal Gulati, Tanisha Gupta
{"title":"Comparative Study of Missing Value Imputation Techniques on E-Commerce Product Ratings","authors":"Dimple Chehal, Parul Gupta, Payal Gulati, Tanisha Gupta","doi":"10.31449/inf.v47i3.4156","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4156","url":null,"abstract":"Missing data is a common occurrence in practically all studies, and it adds a layer of ambiguity to data interpretation. Missing values in a dataset mean loss of important information. It is one of the most common data quality issues. Missing values are values that are not present in the data set. These are usually written as NAN’s, blanks, or any other placeholders. Missing values create imbalanced observations, biased estimates and sometimes lead to misleading results. The majority of real-world datasets have missing values. As a result, to deliver an efficient and valid analysis and the solutions should be taken into account appropriately. By filling in the missing values a complete dataset can be created and the challenge of dealing with complex patterns of missingness can be avoided. Missing values can be of both continuous and categorical types. To get more precise results, a variety of techniques to fill out missing values can be used. In the present study, nine different imputation methods: Simple Imputer, Last Observation Carried forward (LOCF), KNN Imputation (KNN), Hot Deck, Linear Regression, MissForest, Random Forest Regression, DataWig, and Multivariate Imputation by Chained Equation (MICE) were compared. The comparison was performed on Amazon real-time dataset based on three evaluation criteria: R- Squared (R 2 ), Mean squared error (MSE), and Mean absolute error (MAE). As a result of the findings KNN had the best outcomes, while DataWig had the worst results for R- Squared (R 2 ). The R-squared value ranges from 0-1. In terms of mean squared error (MSE) and mean absolute error (MAE), the Hot deck imputation approach fared best, whereas MissForest performed worst (MAE). The hot deck imputation method appears to be of interest and merits further investigation in practice.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Analysis of Uplink NOMA and OMA for 5G Applications: An Optimized Network 面向5G应用的上行NOMA和OMA计算分析:一个优化的网络
4区 计算机科学
Informatica Pub Date : 2023-06-05 DOI: 10.31449/inf.v47i3.4145
Shelesh Krishna Saraswat, Vinay Kumar Deolia, Aasheesh Shukla
{"title":"Computational Analysis of Uplink NOMA and OMA for 5G Applications: An Optimized Network","authors":"Shelesh Krishna Saraswat, Vinay Kumar Deolia, Aasheesh Shukla","doi":"10.31449/inf.v47i3.4145","DOIUrl":"https://doi.org/10.31449/inf.v47i3.4145","url":null,"abstract":"In This paper, the non-orthogonal multiple access (NOMA) schemes are compared with the multiple orthogonal access (OMA) schemes on the basis of the resource allocation validity of uplinks. By reflecting the involvement of a measure of each user’s data on the system’s total amount, we analyze the main reasons why NOMA provides justice service distribution over OMA on unequal channels. Moreover, the Jain index is observed and proposed to quantify the irregularity of numerous user channels, according to the metric for the Jain index based on the Jain index. More importantly, the proposed metric establishes the criteria for choosing between NOMA and OMA to share resources correctly. Based on this debate, we offer a program that combines NOMA and OMA to increase user integrity. Imitation effects substantiate the exactness of the proposed matrix and display improvement of the accuracy of the showcased NOMA-OMA mixture system as compared to standard OMA as well as NOMA systems.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135752697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Group Decision Support Model for Tech-Based Startup Funding using Multistage Fuzzy Logic 基于多阶段模糊逻辑的科技创业融资群体决策支持模型
IF 2.9 4区 计算机科学
Informatica Pub Date : 2023-06-01 DOI: 10.31449/inf.v47i6.4569
M. Devanda, D. N. Utama
{"title":"Group Decision Support Model for Tech-Based Startup Funding using Multistage Fuzzy Logic","authors":"M. Devanda, D. N. Utama","doi":"10.31449/inf.v47i6.4569","DOIUrl":"https://doi.org/10.31449/inf.v47i6.4569","url":null,"abstract":"","PeriodicalId":56292,"journal":{"name":"Informatica","volume":" ","pages":""},"PeriodicalIF":2.9,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46360174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized Recommendation System of E-learning Resources Based on Bayesian Classification Algorithm 基于贝叶斯分类算法的网络学习资源个性化推荐系统
4区 计算机科学
Informatica Pub Date : 2023-05-30 DOI: 10.31449/inf.v47i3.3979
Xiuhui Wang
{"title":"Personalized Recommendation System of E-learning Resources Based on Bayesian Classification Algorithm","authors":"Xiuhui Wang","doi":"10.31449/inf.v47i3.3979","DOIUrl":"https://doi.org/10.31449/inf.v47i3.3979","url":null,"abstract":"In order to meet learners' personalized learning needs, realize learners' personalized development, and solve the problem of learners' information Trek and overload, a development scheme of e-learning resources personalized recommendation system based on Bayesian algorithm is proposed. This paper studies the personalized Association recommendation model integrating association rule mining and Bayesian network, and improves the association rule mining algorithm by combining historical record pruning and Bayesian network verification. In the process of association rule mining, combined with user history, the frequent itemsets in association rules are filtered, and the itemsets below the given threshold are pruned. The pruned item set is input into the Bayesian verification network for personalized verification, and the verification results are sorted and recommended according to the ranking, so as to give priority to the readers who really like the books. The recommendation model solves the problem of weak personalization in the existing recommendation system to a certain extent. Experiments show that Bayesian network can improve the personalization of association recommendation.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"316 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135691747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AHP Algorithm for Indoor Air Pollution Detection and Evaluation System Design 室内空气污染检测评价系统的AHP算法设计
4区 计算机科学
Informatica Pub Date : 2023-05-30 DOI: 10.31449/inf.v47i3.3932
Wen Fan, Chengyang Chang, Ning Yao, Linxue Xu, Hongyan Ju
{"title":"AHP Algorithm for Indoor Air Pollution Detection and Evaluation System Design","authors":"Wen Fan, Chengyang Chang, Ning Yao, Linxue Xu, Hongyan Ju","doi":"10.31449/inf.v47i3.3932","DOIUrl":"https://doi.org/10.31449/inf.v47i3.3932","url":null,"abstract":"In order to extract a description of indoor air quality, the concentration of indoor pollutants needs to be obtained and then evaluated. Aiming at the existing indoor air quality monitoring and evaluation system, an AHP algorithm for the design of indoor air pollution detection and evaluation system is proposed, which combines the principles and methods of fuzzy mathematics to evaluate air quality in a confined environment. An experiment was carried out, using the analytic hierarchy process to assign weights. According to the principle of maximum subordination, comprehensive evaluation of air quality in a confined environment was carried out through fuzzy mathematical model. The experimental results show that the humidity value reached 54% RH when the temperature was 25°C, and the humidity value reached 60% RH when the temperature was 19°C. The evaluation results more scientifically reflect the true state of air quality.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135691746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信