Journal of information technology & software engineering最新文献

筛选
英文 中文
Optimization of Construction Logistics Planning Cost in Egypt Using Genetic Algorithms 基于遗传算法的埃及建筑物流规划成本优化
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000205
M. N. Shamma, K. Shawki, H. Bassioni
{"title":"Optimization of Construction Logistics Planning Cost in Egypt Using Genetic Algorithms","authors":"M. N. Shamma, K. Shawki, H. Bassioni","doi":"10.4172/2165-7866.1000205","DOIUrl":"https://doi.org/10.4172/2165-7866.1000205","url":null,"abstract":"The effective and efficient management of construction resources is the core of success for any construction project. Traditionally, researchers and industry professionals identify the five main construction resources to include, time, capital, labor, equipment and material. Although, one of the important project resources that have been overlooked during the planning phases of most construction projects is site space. The contractors in Egypt impose serious challenges to plan for material procurement and site logistics due to the insufficiency of construction site space. The aim of this research is to optimize the construction logistics planning cost in Egypt. A literature review is performed on an adapted construction logistics planning model, whereas, implementing and verifying the automated construction logistics planning model using genetic algorithms, applying and validating a case study to the automated construction logistics planning model to the Egyptian industry which is expected to help contractors in Egypt to develop more optimized site layout plans and procurement plans to avoid material shortage and unorganized site layouts that could led to cost overruns.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000205","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity 移动代理和平台的安全:保护代码和保护其完整性
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000220
M. R. Karim
{"title":"Security for Mobile Agents and Platforms: Securing the Code and Protecting its Integrity","authors":"M. R. Karim","doi":"10.4172/2165-7866.1000220","DOIUrl":"https://doi.org/10.4172/2165-7866.1000220","url":null,"abstract":"At present, mobile agent technology is an important research area for researcher to develop its new features, confirming its security and usability. Mobile agent is a program, which can be act in a computer network in order to perform some activities on behalf of a human user or an application. In this paper, we describe an overview of the security issues related to the mobile agent paradigm. Then we look in some existing security standards and technologies for mobile agent to analysis their goals that are keeping platform of security against a malicious mobile agent. Finally, we introduce a new framework for improvement of mobile agent security in order to secure the code and protect its integrity.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"189 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000220","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CONDENZA: A System for Extracting Abstract from a Given Source Document 从给定的源文档中提取摘要的系统
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000222
Mgbeafulike Ij, C. Ejiofor
{"title":"CONDENZA: A System for Extracting Abstract from a Given Source Document","authors":"Mgbeafulike Ij, C. Ejiofor","doi":"10.4172/2165-7866.1000222","DOIUrl":"https://doi.org/10.4172/2165-7866.1000222","url":null,"abstract":"Despite the increasingly availability of documents in electronic form and the availability of desktop publishing software, abstracts continue to be produced manually. The purpose of CONDENZA is to develop a system for abstract extraction from a given source document. CONDENZA describes a system on automatic methods of obtaining abstracts. The rationale of abstracts is to facilitate quick and accurate identification of the topic of published papers. The idea is to save a prospective reader time and effort in finding useful information in a given article or report. The system generates a shorter version of a given sentence while attempting to preserve its meaning. This task is carried out using summarization techniques. CONDENZA implements a method that combines apriori algorithm for keyword frequency detection with clustering based approach for grouping similar sentences together. The result from the system shows that our approach helps in summarizing the text documents efficiently by avoiding redundancy among the words in the document and ensures highest relevance to the input text. The guiding factors of our results are the ratio of input to output sentences after summarization.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
User Perception Analysis of Medical Information Management System (Medistem) 医疗信息管理系统(Medistem)用户感知分析
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000208
Ahakonye Lac, Eze Uf, Nwakanma Ic
{"title":"User Perception Analysis of Medical Information Management System (Medistem)","authors":"Ahakonye Lac, Eze Uf, Nwakanma Ic","doi":"10.4172/2165-7866.1000208","DOIUrl":"https://doi.org/10.4172/2165-7866.1000208","url":null,"abstract":"Health Information Systems used in the Nigerian National Petroleum Corporation (NNPC) Clinics is restricted to geographical locations and has over the years been implemented to improve the quality of service to staff and dependants of the multinational oil and gas industry. However this system has maintained a level of proficiency but has also constantly received criticisms from the users for shortfalls in certain areas. This therefore calls for an upgrade. Hence, in this paper an attempt is made at analyzing the existing medical information management system to ascertain the need for upgrade. Relative Index Importance (RII) is the statistical tool used to analyze data gotten from primary source. It was discovered that there is need to access patients’ medical history (32.14%), casenote (52.22%) and capture medical detail (70.00%) on-site and off-site. Hence the argument of the research is valid and it is strongly recommended that the system be upgraded to accommodate the user requirements and expectations.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"116 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000208","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Large-Scale Smart Card Data to Investigate Public Transport Travel Behaviour Using Big Data Analytics 使用大数据分析分析大规模智能卡数据以调查公共交通出行行为
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000211
Jamal Maktoubian
{"title":"Analyzing Large-Scale Smart Card Data to Investigate Public Transport Travel Behaviour Using Big Data Analytics","authors":"Jamal Maktoubian","doi":"10.4172/2165-7866.1000211","DOIUrl":"https://doi.org/10.4172/2165-7866.1000211","url":null,"abstract":"In urban public transport, Smart card data have been used more and more in order to collect fare automatically. They allowed passengers to access almost all type of public transportation system modes (bus, train, tram, funiculars, LRT, metro, and ferryboats) with a single card that is valid for the complete journey. Although Smart card major concentration is in revenue collection, they also generate massive amounts of passive data from the technological devices installed to control the operation of them. Generated data could be beneficial to transit planners which could rise the better understanding of passengers’ behavioral patterns for short and long term service planning. However, one of the major challenges is the fact that traditional infrastructures and methods are inefficient when processing or analyzing a large volume of data. Thus, as an alternative, big data technology could be employed to enhance collecting, storing, processing, and analyzing the data. Moreover, the main motivation would be cost-efficiency of this methodology as the cost of processing and analyzing large-scale data is huge. This experience demonstrates that a combination of planning knowledge, big data, and data mining tool allows to produce travel behaviors indicators, public transport policies, operational performance, and fare policies.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"7 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000211","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring Academic Use of Online Social Networking Sites (SNS) for Language Learning: Japanese Students Perceptions and Attitudes Towards Facebook 探索在线社交网站(SNS)在语言学习中的学术应用:日本学生对Facebook的看法和态度
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000223
Shugufta Abrahim, Bilal Ahmed Mir, Hayato Suhara, Masahiro Sato
{"title":"Exploring Academic Use of Online Social Networking Sites (SNS) for Language Learning: Japanese Students Perceptions and Attitudes Towards Facebook","authors":"Shugufta Abrahim, Bilal Ahmed Mir, Hayato Suhara, Masahiro Sato","doi":"10.4172/2165-7866.1000223","DOIUrl":"https://doi.org/10.4172/2165-7866.1000223","url":null,"abstract":"Social networking sites (SNS) have become an integral part of modern society. Among online social networks, Facebook is considered as one of the most popular platforms for online social networking among millions of users including students of all ages. This paper attempts to evaluate whether Japanese students consider Social networking site Facebook as effective online language-learning platform and whether this social learning approach provide students with the opportunity to voluntarily learn English as a second language and gain experiences that help them to better communicate with foreigners using English. A survey was carried out with 88 undergraduates, postgraduate and research students at University of Toyama, Japan to observe learners' perceptions and attitudes towards the usefulness of Facebook for online language learning. Data collected with the use of structured questionnaire from randomly selected students. Most of candidates agreed that Facebook offer great promises to facilitate them learn English and to improve their motivation as well as confidence level in peer- to- peer communication using English. The result of the survey demonstrated that students believed that Facebook could be used as an effective online platform for English learning and related online educational discussions. In conclusion, Facebook may serve as a meaningful and promising teaching tool which can be used not only by English language instructors but also by other educators for fostering quality in online education.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"8 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000223","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Survey on Vehicle Tracking Services 车辆追踪服务调查
Journal of information technology & software engineering Pub Date : 2017-01-01 DOI: 10.4172/2165-7866.1000224
Ankush Das, N. Gandhewar, Devendra Singh Nehra, Mayank Baraskar, Shubham Gurjar, Mubbshir Khan
{"title":"Survey on Vehicle Tracking Services","authors":"Ankush Das, N. Gandhewar, Devendra Singh Nehra, Mayank Baraskar, Shubham Gurjar, Mubbshir Khan","doi":"10.4172/2165-7866.1000224","DOIUrl":"https://doi.org/10.4172/2165-7866.1000224","url":null,"abstract":"If a person moves to a new place or a new city and there is some problem to vehicle then it is difficult to find a mechanic nearby. This application provides service of mechanic to the user. This application helps to search nearest mechanic available to the user’s location. This application allows to trace the mechanic and provide different services to the user and it also provide video tutorial to help the user. Our application tracks the mechanic and user location with the help of google maps. Also, we have studied some papers and application related to the tracking of the vehicle using some hardware devices, we are planning to use google map and GPS tracking available in mobile to track a vehicle.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"36 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000224","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MPLS based VPN Implementation in a Corporate Environment 企业环境下基于MPLS的VPN实现
Journal of information technology & software engineering Pub Date : 2016-12-12 DOI: 10.4172/2165-7866.1000193
Farooq Ahmed, Zain Butt, Uzair Siddiqui
{"title":"MPLS based VPN Implementation in a Corporate Environment","authors":"Farooq Ahmed, Zain Butt, Uzair Siddiqui","doi":"10.4172/2165-7866.1000193","DOIUrl":"https://doi.org/10.4172/2165-7866.1000193","url":null,"abstract":"Today organizations are spread across the globe due to higher business activities. The network connectivity among the offices at different geographic locations has become a challenge for network professionals. VPN is used to counter this narrative. It has become a popular industry solution in recent years. MPLS is a relatively newer WAN technology providing advantages over other technologies. At the same time, it is compatible with existing technologies like ATM, FR, Ethernet and SONET. VPN having connectivity via MPLS infrastructure is known as MPLS VPN. It offers many advantages over traditional VPN solutions. In this project, MPLS based VPN is implemented in a corporate environment. Three regional offices of an organization are connected with the central site through MPLS based ISP’s network. Hub and spoke topology is implemented in this scenario. The connectivity among the sites is established and forwarding decisions are made on the bases of MPLS labels instead of IP addresses. Furthermore, it is also observable in results that MPLS doesn’t need any other tunneling protocol unlike traditional VPNs. It makes tunnels based on labels. Concerning the security requirements, it hides the customer’s network from ISP’s network, which is discussed in the results section.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2016-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000193","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Contemporary Trends in the Information Technology (IT) World and its Transformational Effect on Chief Information Officer (CIO) Roles: Analytical Study 信息技术(IT)世界的当代趋势及其对首席信息官(CIO)角色的转型影响:分析研究
Journal of information technology & software engineering Pub Date : 2016-11-21 DOI: 10.4172/2165-7866.1000192
Q. Nijem
{"title":"Contemporary Trends in the Information Technology (IT) World and its Transformational Effect on Chief Information Officer (CIO) Roles: Analytical Study","authors":"Q. Nijem","doi":"10.4172/2165-7866.1000192","DOIUrl":"https://doi.org/10.4172/2165-7866.1000192","url":null,"abstract":"The word of IT is not, any more, exclusive for IT people and, to the contrary, it is becoming dominated more and more by business objectives and plans. Because IT is becoming a service or tool that was found and developed over decades to help business doing better using computers and networks to achieve business goals such as efficiency, resources utilization, making profit, reducing expenses, and expanding market share. If we look at few elements of the IT world such as devices, users and applications developed since the first decade of IT in mid 1940s, we can clearly see that users’ community has grown from thousands to billions of users all over the world. Similarly, software applications have grown to reach millions of software applications covering, again, billions of devices from desktop computers, notebooks, wearable devices, swallow-able chips and insulin pumps embedded in human bodies of some patients. Personalization and customizations are becoming major trend in each and every application and smart device that can monitor and track individual’s actions during day-today life i.e., travel, purchase, calls, transactions and many other types of uncountable actions. This research is going to explore the new image of IT world in the light of new trends that are shaping the directions of the IT world. Furthermore, the research is discussing the impact of these trends on related factors such as people, processes, technology, business, environment, and governments. This research will browse new trends in the IT world – Social, Mobility, Analytics, and Cloud (SMAC) – and their impact on the current role of Chief Information Officer which is clearly passing a major shift in its responsibilities and duties in the light of dramatic changes from business perspective and the security threats encountered within these emerging trends.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"2016 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2016-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70695652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Afan Oromo Sense Clustering in Hierarchical and Partitional Techniques 层次和分割技术中的Afan Oromo感觉聚类
Journal of information technology & software engineering Pub Date : 2016-11-10 DOI: 10.4172/2165-7866.1000191
Workineh Tesema Gudisa
{"title":"Afan Oromo Sense Clustering in Hierarchical and Partitional Techniques","authors":"Workineh Tesema Gudisa","doi":"10.4172/2165-7866.1000191","DOIUrl":"https://doi.org/10.4172/2165-7866.1000191","url":null,"abstract":"This paper presents the sense clustering of multi-sense words in Afan Oromo. The main idea of this work is to cluster contexts which is providing a useful way to discover semantically related senses. The similar contexts of a given senses of target word are clustered using three hierarchical and two partitional clustering. All contexts of related senses are included in the clustering and thus performed over all the contexts in the corpus. The underlying hypothesis is that clustering captures the reflected unity among the contexts and each cluster reveal possible relationships existing among the contexts. As the experiment shows, from the total five clusters, the EM and K-Means clusters which yield significantly higher accuracy than hierarchical (single clustering, complete clustering and average clustering) result. For Afan Oromo, EM and K-means enhance the accuracy of sense clustering than hierarchical clustering algorithms. Each cluster representing a unique sense. Some words have two senses to the five senses. As the result shows an average accuracy of test set was 85.5% which is encouraging with the unsupervised machine learning work. By using this approach, finding the right number of clusters is equivalent to finding the number of senses. The achieved result was encouraging, despite it is less resource requirement.","PeriodicalId":91908,"journal":{"name":"Journal of information technology & software engineering","volume":"6 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2016-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2165-7866.1000191","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70696050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信