International journal of applied information systems最新文献

筛选
英文 中文
Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies 确保 6G 网络时代医疗保健系统的安全:赋能技术透视
International journal of applied information systems Pub Date : 2023-11-21 DOI: 10.5120/ijais2023451954
Chinazunwa Uwaoma
{"title":"Securing Healthcare Systems in the Era of 6G Networks: A Perspective on the Enabling Technologies","authors":"Chinazunwa Uwaoma","doi":"10.5120/ijais2023451954","DOIUrl":"https://doi.org/10.5120/ijais2023451954","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"54 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the Fight against Social Media Misinformation: An Ensemble Deep Learning Framework for Detecting Deepfakes 加强打击社交媒体虚假信息:用于检测深度伪造的集合深度学习框架
International journal of applied information systems Pub Date : 2023-11-21 DOI: 10.5120/ijais2023451952
Ejike Joseph Aloke, Joshua Abah
{"title":"Enhancing the Fight against Social Media Misinformation: An Ensemble Deep Learning Framework for Detecting Deepfakes","authors":"Ejike Joseph Aloke, Joshua Abah","doi":"10.5120/ijais2023451952","DOIUrl":"https://doi.org/10.5120/ijais2023451952","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"19 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REVIEW OF ONLINE SHOPPING DESIGN IN NIGERIA: CHALLENGES AND OPPORTUNITIES 尼日利亚网上购物设计回顾:挑战与机遇
International journal of applied information systems Pub Date : 2023-11-21 DOI: 10.5120/ijais2023451953
Daniel Nuhu, Muhammad Mukhtar Liman, Timothy Moses
{"title":"REVIEW OF ONLINE SHOPPING DESIGN IN NIGERIA: CHALLENGES AND OPPORTUNITIES","authors":"Daniel Nuhu, Muhammad Mukhtar Liman, Timothy Moses","doi":"10.5120/ijais2023451953","DOIUrl":"https://doi.org/10.5120/ijais2023451953","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"24 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139254567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy And Security Issues: An Assessment of the Awareness Level of Smartphone Users in Nigeria 隐私与安全问题:尼日利亚智能手机用户认知水平评估
International journal of applied information systems Pub Date : 2023-10-20 DOI: 10.5120/ijais2023451948
Omeka Friday Odey, Joshua Abah, Dekera Kenneth Kwaghtyo
{"title":"Privacy And Security Issues: An Assessment of the Awareness Level of Smartphone Users in Nigeria","authors":"Omeka Friday Odey, Joshua Abah, Dekera Kenneth Kwaghtyo","doi":"10.5120/ijais2023451948","DOIUrl":"https://doi.org/10.5120/ijais2023451948","url":null,"abstract":"The use of smartphones in Nigeria has continued to increase daily and worsened during and after the Covid-19 pandemic that locked down even the developed nations. Like computers, smartphones keep the memory of users’ details like account details and transaction histories including passwords of their social media platforms. The huge volume of data being stored by smartphones brings about an unlimited number of privacy and security challenges. That is, security threats perpetrated by malicious actors or hackers is proportional to the ubiquity and adoption of smartphone in Nigeria. Therefore, this study aims to assess the awareness level of smartphone users in Nigeria regarding privacy and security issues associated with smartphones. By so doing, the study surveyed smartphone users across the 36 states and the FCT in Nigeria. The study employed both quantitative and qualitative methods. The quantitative research approach was utilized for data collection. While the qualitative approach was leveraged for descriptive analytics. The analysis was performed using the Statistical Package for Social Science (SPSS) to provide the graphical results. An existing mathematical model was therefore adapted and utilized to calculate the awareness level of smartphone users. The analytical outcome of the survey revealed that a considerable number of smartphone users in Nigeria are unaware of privacy and security issues allied to smartphones.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139315972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Fake News Identification in Social Media through Ensemble Learning Methods 通过集合学习方法提高社交媒体中的假新闻识别能力
International journal of applied information systems Pub Date : 2023-09-20 DOI: 10.5120/ijais2023451949
Timothy Moses, Henry Egaga Obi, C. I. Eke, Jeffrey Agushaka
{"title":"Enhancing Fake News Identification in Social Media through Ensemble Learning Methods","authors":"Timothy Moses, Henry Egaga Obi, C. I. Eke, Jeffrey Agushaka","doi":"10.5120/ijais2023451949","DOIUrl":"https://doi.org/10.5120/ijais2023451949","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139338498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Face Mask Detection Using Deep Learning 利用深度学习实时检测人脸面具
International journal of applied information systems Pub Date : 2023-06-26 DOI: 10.5120/ijais2023451944
Md. Towhidul Islam Robin, Md. Samiul Islam, Ahmed Abdal Shafi Rasel, Mehedi Hasan
{"title":"Real-Time Face Mask Detection Using Deep Learning","authors":"Md. Towhidul Islam Robin, Md. Samiul Islam, Ahmed Abdal Shafi Rasel, Mehedi Hasan","doi":"10.5120/ijais2023451944","DOIUrl":"https://doi.org/10.5120/ijais2023451944","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"213 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139368416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web-Based Integrated Restaurant Management System 基于网络的餐厅综合管理系统
International journal of applied information systems Pub Date : 2023-05-31 DOI: 10.5120/ijais2023451945
L. U. Oghenekaro, Jacinta Chielozonam Okafor
{"title":"Web-Based Integrated Restaurant Management System","authors":"L. U. Oghenekaro, Jacinta Chielozonam Okafor","doi":"10.5120/ijais2023451945","DOIUrl":"https://doi.org/10.5120/ijais2023451945","url":null,"abstract":"This project work studies the development of restaurant management system. It is as a result of problem associated with the existing system which involves the use of Hashmicro system to compliment the manual method in keeping information in Sammies restaurant. The existing system are characterized with many problems which are staff are taking too much time pursuing mistakes instead of tending to customers, inventory doesn’t match your tallies, sales going unrecorded, and other. Restaurant personnel use computerized management database information system to gather data, process data and also keep it for future use and product ordering. The proposed system was implemented using HTML/CSS for the user interface, PHP and MYSQL database for the back end. Structured system analysis and design methodology was adopted. The designed system will allow the pliability to the Users/ Customers to order from Restaurants. It will also give recommendations to the users from the owners of the restaurants uploaded daily. In the proposed system, there will be no limitation on the amount of order the customer wants.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"133 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139372365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in Data Analytics using Big Data and Cloud Computing 使用大数据和云计算的数据分析进展
International journal of applied information systems Pub Date : 2018-12-05 DOI: 10.5120/IJAIS2018451724
Rayan Dasoriya, Krishna Samdani
{"title":"Advancements in Data Analytics using Big Data and Cloud Computing","authors":"Rayan Dasoriya, Krishna Samdani","doi":"10.5120/IJAIS2018451724","DOIUrl":"https://doi.org/10.5120/IJAIS2018451724","url":null,"abstract":"With the increase in the amount of data present over the cloud, there is a need for an efficient management of data to research and industry. Big Data is used by different organizations to extract valuable information which can be analyzed computationally to reveal trends, patterns, and associations exposing the human interaction and behavior for making various industrial decisions. Due to the enormous volume of data, the traditional systems are becoming incapable of storing and computing such voluminous data. To resolve this issue, the data is stored in the cloud, and all the analysis is done over Big Data using the cloud. But to make any practical decision, the data must be optimized, secured and visualized. Analysing large volume of data is not beneficial always unless it is adequately investigated. A perfect knowledge base should be selected. The techniques which are available right now are insufficient to analyze the Big Data and identify the frequent services accessed by the cloud users. Various functions can be integrated to provide a better environment to work in. Using these services, people become widely vulnerable to exposure. That is, it becomes possible to collect more data than it is required which may lead to leakage of the data and hence security concerns are at stake. Results can be analyzed in a better way by visuals like graphs, charts, etc. and thus, helps in faster and efficient decision-making and predictive modeling which can further extend this domain to Artificial Intelligence. MapReduce Algorithm assists in maintaining a log of user’s activities in the cloud and show the frequently used services. This paper shows the advancements done in the field of Data Analytics with Cloud Computing and Big Data, and also proposes a scheme for making Big Data Analytics more accurate, efficient and beneficial to the Cloud environment.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88548756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Medical Video Denoising with Deep Learning: Application to Angiography. 基于深度学习的实时医学视频去噪:在血管造影中的应用。
International journal of applied information systems Pub Date : 2018-05-01 DOI: 10.5120/ijais2018451755
Praneeth Sadda, Taha Qarni
{"title":"Real-Time Medical Video Denoising with Deep Learning: Application to Angiography.","authors":"Praneeth Sadda,&nbsp;Taha Qarni","doi":"10.5120/ijais2018451755","DOIUrl":"https://doi.org/10.5120/ijais2018451755","url":null,"abstract":"<p><p>This paper describes the design, training, and evaluation of a deep neural network for removing noise from medical fluoroscopy videos. The method described in this work, unlike the current standard techniques for video denoising, is able to deliver a result quickly enough to be used in real-time scenarios. Furthermore, this method is able to produce results of a similar quality to the existing industry-standard denoising techniques.</p>","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"12 13","pages":"22-28"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.5120/ijais2018451755","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36201860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts 安全需求建模:用安全需求工程概念扩展SysML
International journal of applied information systems Pub Date : 2017-12-08 DOI: 10.5120/IJAIS2017451731
Ilham Maskani, J. Boutahar, Souhaïl El Ghazi El Houssaïni
{"title":"Modeling Security Requirements: Extending SysML with Security Requirements Engineering Concepts","authors":"Ilham Maskani, J. Boutahar, Souhaïl El Ghazi El Houssaïni","doi":"10.5120/IJAIS2017451731","DOIUrl":"https://doi.org/10.5120/IJAIS2017451731","url":null,"abstract":"In Security Requirements Engineering, many approaches offer different ways to model security requirements. This paper presents a model that can be used in conjunction with any of the former approaches. The model is an extension of SysML requirements diagrams that adds concepts from Security Requirements Engineering: Stakeholder, Goal, Asset and Risk. The proposed model is illustrated by applying it to a telemedicine system.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"25 1","pages":"30-36"},"PeriodicalIF":0.0,"publicationDate":"2017-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83291481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信