International journal of applied information systems最新文献

筛选
英文 中文
Developing Virtual Class Room Models with Bio Inspired Algorithms for E-Learning: A Survey for Higher Technical Education for Saudi Arabia Vision 2030 利用生物启发算法开发电子学习的虚拟教室模型:沙特阿拉伯2030年远景高等技术教育调查
International journal of applied information systems Pub Date : 2017-11-09 DOI: 10.5120/IJAIS2017451709
Khalid A. Fakeeh
{"title":"Developing Virtual Class Room Models with Bio Inspired Algorithms for E-Learning: A Survey for Higher Technical Education for Saudi Arabia Vision 2030","authors":"Khalid A. Fakeeh","doi":"10.5120/IJAIS2017451709","DOIUrl":"https://doi.org/10.5120/IJAIS2017451709","url":null,"abstract":"In recent times there has been a growing trend for more information and knowledge to enhance learning based on cognitive load theory with increased use of Educational Technology based on Web ICT with online education resources. There are also various instructional and expert models being developed for the adaptive e-learning mechanisms as required for effective learning based on Genetic, Neural Networks, Swarm Intelligence and other Bio inspired algorithms or Evolutionary algorithms. Computational Intelligence or Artificial Intelligence has also established new paradigms for Learning Systems in creating virtual class rooms in the physical absence of tutors. It is also possible to create virtual labs on which students that are registered can carry out their experiments from remote with Interactive Intelligent Tutoring Systems. The current paper will develop a problem model using Markov Chain and greedy algorithms for Tutor or Instructor –Student interactive model for virtual labs and virtual class rooms which will be built on the Deep Belief Network architecture as a novel approach for state-of-art courses related to Energy and Wireless Communication for Higher Education proposed as part of Inter University Research Groups. Further, a Bio inspired Differential Evolution algorithm will be deployed for the virtual labs and virtual class rooms to meet the specific learning requirements for the Instructor-Student interactions specific to this E-learning platform. The proposed study will help improve the learning environment to stimulate creativity and innovation as envisaged by the Ministry of Education under the Saudi Arabia Vision 2030 and will help in moving towards creating an international benchmark for deploying innovative E-learning mechanisms for Higher Education.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"22 1","pages":"8-21"},"PeriodicalIF":0.0,"publicationDate":"2017-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90918991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Validation of Antecedents of ERP Success in Indian Higher Educational Institutes 印度高等教育机构ERP成功前因的验证
International journal of applied information systems Pub Date : 2017-10-06 DOI: 10.5120/IJAIS2017451712
Pratima N. Dabholkar, Hema Date
{"title":"Validation of Antecedents of ERP Success in Indian Higher Educational Institutes","authors":"Pratima N. Dabholkar, Hema Date","doi":"10.5120/IJAIS2017451712","DOIUrl":"https://doi.org/10.5120/IJAIS2017451712","url":null,"abstract":"Educational institutes are started adopting Enterprise Resource Planning (ERP) systems to manage their resources. Despite such huge amounts being spent on ERPs, recent industry reports and academic studies have indicated that many adopting Higher Educational Institutes (HEI) have come to realize that the deployments of such systems were not as effective as expected. In spite of implementation of ERP in HEI, ERP usage is very limited. The main objective of the study was to identify the factors influencing ERP usage in Indian higher educational institutes. The conceptual framework of this study is based on DeLone & McLean ERP success model. Organizational factors are integrated with the technological factors of the DeLone and McLean ERP Success model for the study and was tested empirically using questionnaire as a survey instrument. Primary data was collected from 205 Indian higher educational institutes of pan India. Total 346 respondents participated in the study. Technological factor “ease of use” and organizational factor “top management support” are found to be most reliable measures for measuring ERP success in higher educational institutes. Other technological and organizational factors are also found to be suitable for measuring ERP success in higher educational institutes. Identification of factors for measuring ERP success in Indian higher educational institutes is the unique contribution of this study.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"40 1","pages":"9-20"},"PeriodicalIF":0.0,"publicationDate":"2017-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89871874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Detection in E-mails using Machine Learning 利用机器学习检测电子邮件中的网络钓鱼
International journal of applied information systems Pub Date : 2017-10-06 DOI: 10.5120/IJAIS2017451713
Srishti Rawal, Bhuvan Rawal, A. Shaheen, Shubham Malik
{"title":"Phishing Detection in E-mails using Machine Learning","authors":"Srishti Rawal, Bhuvan Rawal, A. Shaheen, Shubham Malik","doi":"10.5120/IJAIS2017451713","DOIUrl":"https://doi.org/10.5120/IJAIS2017451713","url":null,"abstract":"Emails are widely used as a means of communication for personal and professional use. The information exchanged over mails is often sensitive and confidential such as banking information, credit reports, login details etc. This makes them valuable to cyber criminals who can use the information for malicious purposes. Phishing is a strategy used by fraudsters to obtain sensitive information from people by pretending to be from recognized sources. In a phished email, the sender can convince you to provide personal information under false pretenses. This experimentation considers the detection of a phished email as a classification problem and this paper describes the use of machine learning algorithms to classify emails as phished or ham. Maximum accuracy of 99. 87% is achieved in classification of emails using SVM and Random Forest classifier. General Terms Phishing, security, classification","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"150 1","pages":"21-24"},"PeriodicalIF":0.0,"publicationDate":"2017-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80994030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Design and Implementation of a Comprehensive Information Security Risk Management Tool based on Multi-agents Systems 基于多agent系统的综合信息安全风险管理工具的设计与实现
International journal of applied information systems Pub Date : 2017-10-06 DOI: 10.5120/IJAIS2017451711
M. Ghazouani, H. Medromi, L. Moussaid
{"title":"Design and Implementation of a Comprehensive Information Security Risk Management Tool based on Multi-agents Systems","authors":"M. Ghazouani, H. Medromi, L. Moussaid","doi":"10.5120/IJAIS2017451711","DOIUrl":"https://doi.org/10.5120/IJAIS2017451711","url":null,"abstract":"While there are many framework that help users in Governance, Risk, and Compliance (GRC), we know of none which actually try to automate the process by using multi agent systems. The Team of Systems’ Architecture proposes an integrated IT GRC architecture for a high level IT GRC management. This article focuses on IT Risk topic and presents a new approach for a multi-agent expert system, where managers of IT GRC can in an intelligent manner specify the IT needs following the strategic directives through a questionnaire about specific business goals. The key element that differentiates this research from the previous ones is that none of them are based on multi-agents system. The system was verified on concrete example. Future works consists on realizing a practical example of the proposed subsystem on real company systems that are involved in the research in order to overcomes obstacles and achieve IT organization objectives. General Terms Security risk assessment, risk management system, information system","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"18 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2017-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79362640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Significance of Security Metrics in Secure Software Development 安全度量在安全软件开发中的意义
International journal of applied information systems Pub Date : 2017-09-09 DOI: 10.5120/IJAIS2017451710
Shams Tabrez Siddiqui
{"title":"Significance of Security Metrics in Secure Software Development","authors":"Shams Tabrez Siddiqui","doi":"10.5120/IJAIS2017451710","DOIUrl":"https://doi.org/10.5120/IJAIS2017451710","url":null,"abstract":"With increasing advancement of technology in the past years rise various security issues and problems. In this connected world, security is a paramount and challenging issue in software development and is the demand of time. However usually engineers/developers think about it after the development of the entire software and at that it’s too late. Though, the software developers are aware of the importance of security and its priority throughout software development life cycle. Considering the security challenging issues right from the early stages of software development and incorporating it during software development indicates good research and development. When the metrics considered during software development process from the initial stage then it assess the security risks more efficiently. One of the best known approaches to develop security metrics is Goal/Question/Metric (GQM) approach that assesses the security risks in various stages of software development process. Software security can be measured with the help of metrics derived from the source available. The main aim of this paper is to focus on numerous security metrics of software development phases and some standardized criteria is used for validation. Each and every phase have different metrics as compared to other. Those metrics are defined on the bases of their results and products. The final product derived from the proposed security metrics of the software will be secure and qualified. General Terms Security, software development phases, validation.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"9 1","pages":"10-15"},"PeriodicalIF":0.0,"publicationDate":"2017-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75181742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Minimum Connected Dominating Set based Virtual Backbone Construction in OLSR Protocol 基于最小连接支配集的OLSR协议虚拟主干构建
International journal of applied information systems Pub Date : 2017-09-09 DOI: 10.5120/IJAIS2017451707
P. Vinayagam
{"title":"Minimum Connected Dominating Set based Virtual Backbone Construction in OLSR Protocol","authors":"P. Vinayagam","doi":"10.5120/IJAIS2017451707","DOIUrl":"https://doi.org/10.5120/IJAIS2017451707","url":null,"abstract":"In ad hoc wireless networks, nodes have limited energy and short transmission range. There are no pre-designated routers in these networks and hence routing cannot be done in the conventional way as done in wired networks. To facilitate routing in ad hoc wireless networks, some sort of backbone like structure needs to be built. One of the widely used routing protocols in ad hoc wireless networks is Optimized Link State Routing Protocol (OLSR), which makes use of Multipoint Relay sets (MPRs) to construct the virtual backbone. Various improvements have been proposed in the literature for the MPR selection scheme used in OLSR to improve its efficiency. In this paper, with the aim of enhancing the performance of OLSR, we propose an Improved OLSR (IOLSR) protocol, wherein Minimum Connected Dominating Set (MCDS) is used, instead of multipoint relay sets, to construct the virtual backbone. The performance of IOLSR is compared with that of OLSR in terms of the performance metrics – throughput, packet delivery ratio, end-to-end delay and size of the backbone. From the results, it is found that IOLSR protocol performs better than OLSR with respect to all these metrics.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"7 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2017-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80128411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Semantic Web-based Search Model for Ecommerce using OWL2 使用OWL2的改进的基于语义的电子商务搜索模型
International journal of applied information systems Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451691
B. Pam, A. Obiniyi, O. N. Oyelade
{"title":"An Improved Semantic Web-based Search Model for Ecommerce using OWL2","authors":"B. Pam, A. Obiniyi, O. N. Oyelade","doi":"10.5120/IJAIS2017451691","DOIUrl":"https://doi.org/10.5120/IJAIS2017451691","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"38 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76784415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automated Lecture Time-tabling System for Tertiary Institutions 专上院校讲座时间表自动编排系统
International journal of applied information systems Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451700
Jumoke Soyemi, J. Akinode, M. Osei, S. Oloruntoba
{"title":"Automated Lecture Time-tabling System for Tertiary Institutions","authors":"Jumoke Soyemi, J. Akinode, M. Osei, S. Oloruntoba","doi":"10.5120/IJAIS2017451700","DOIUrl":"https://doi.org/10.5120/IJAIS2017451700","url":null,"abstract":"The need to automate the manual process of lecture time tabling system in higher institution of learning cannot be set aside. Despite the fact that several other administrative sectors of most institution have been automated, lecture time-tabling is still done manually because of its inherent problems. Planning lecture time table is an administrative responsibility that demands enormous attention and effort from any institution because of its constraint satisfaction problem. The Federal Polytechnic Ilaro, the case study in this research operates a central time tabling system implemented by a set up committee members within the institution, which makes it more difficult in getting a flawless lecture scheduling. This manual time-tabling system used in the institution is time consuming and energy sapping which leads to loss of information, general apathy, clashes and wastage of resources. This research is targeted at ameliorating the above stated challenges. The main aim of the study is to develop an automated lecture time-tabling system to provide convenience in scheduling lecture time-table, reducing time constraints in fixing the courses and venues and reducing the risk of omission of courses and clashes of halls and lecturers. The scope of work is limited to space allocation for lectures and merging of similar courses for a particular lecturer. We also administered questionnaire to sample staff, committee members and student opinion on the existing system and the new system to be developed. The data gathered was analyzed and based on the analysis; the new system (automated time tabling system) will be the best method in tackling the lapses experienced by the old system (manual time table).","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"8 1","pages":"20-27"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86996828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN] 基于级联链接的前馈神经网络(CLBFFNN)的三模态生物识别认证系统
International journal of applied information systems Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451699
B. Mercy E., Sam-Ekeke Doris C.
{"title":"Trimodal Biometric Authentication System using Cascaded Link-based Feed forward Neural Network [CLBFFNN]","authors":"B. Mercy E., Sam-Ekeke Doris C.","doi":"10.5120/IJAIS2017451699","DOIUrl":"https://doi.org/10.5120/IJAIS2017451699","url":null,"abstract":"The beginning of the 21st century was rich in events that turned the world’s attention to public security. Increase in technological advancement gave people possibilities of information transfer and ease of physical mobility unseen before. With those possibilities comes risk of fraud, theft of personal data, or even theft of identity. One of the ways to prevent this is through biometric authentication system. This paper considers a multi-biometric system involving a combination of three biometric traits: iris, fingerprint and face in order to make authentication cheaper and more reliable. When the images are captured using optical scanner and webcam, image pre-processing is done using Enhanced Extracted Face (EEF), Plainarized Region of Interest (PROI) and Advanced Processed Iris Code (APIC) methods for face, fingerprint and iris images respectively. These are fed into a Cascaded Link-Based Feed Forward Neural Network (CLBFFNN) which is a classifier trained with back-propagation algorithm. CLBFFNN comprises of CLBFFNN(1) used for training and CLBFFNN(2) used as the main classifier. Fusion of outputs from face, fingerprint and iris recognition systems is done at decision level using AND operation. With the use of the improved preprocessing methods, Optical Character Recognition (OCR) with intelligent barcode and CLBFFNN, the proposed intelligent multibiometric system is proved to be cheaper, more secure and efficient than the existing methods.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"21 1","pages":"7-19"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87797469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Aerial Image Segmentation: A Survey 航空图像分割:综述
International journal of applied information systems Pub Date : 2017-08-08 DOI: 10.5120/IJAIS2017451702
G. Bhattacharjee, Saswati Pujari
{"title":"Aerial Image Segmentation: A Survey","authors":"G. Bhattacharjee, Saswati Pujari","doi":"10.5120/IJAIS2017451702","DOIUrl":"https://doi.org/10.5120/IJAIS2017451702","url":null,"abstract":"Due to the advancement in recent times, aerial images have started gaining a widespread in every domain of science. The primary data for any region can be obtained through tables, maps, graphs, etc. but these are not sufficient enough to present a real time analysis. So, an aerial image fills in the missing element. The images obtained have to undergo a lot of processing steps to enhance their quality. One such processing is segmentation. The main goal of image segmentation is to cluster the pixels of the regions corresponding to individual surfaces, objects, or natural parts of objects and to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. In this paper, we have presented a study of various segmentation techniques applied on aerial images. The processes have been explained in detail followed by a comparative table.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"39 1","pages":"28-34"},"PeriodicalIF":0.0,"publicationDate":"2017-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84270980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信