articles+ search results
10,653 articles+ results
1 - 20
Next
Number of results to display per page
1 - 20
Next
Number of results to display per page
-
Snežana Tadić and Miloš Veljović
- Tehnika. 76:485-489
- Subjects
-
ComputerApplications_COMPUTERSINOTHERSYSTEMS and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Logistics flows in urban areas are generated by systems engaged in various business. Flows generators can be divided into typical logistics systems (logistics, distribution centers, freight terminals, logistics systems of companies, etc.), for which logistics is the core business, and other generators of city logistics (trade, hospitality, craft, service facilities etc.). These two categories of generators differ in terms of flow volume, location, infrastructure, surrounding conditions, form of goods, logistics units and consolidation system, logistics demands, goods handling, etc. In this paper, the basic differences between typical logistics systems and other generators of city logistics are analyzed, thus achieving the basic goal and contribution of paper.
2. Comparison of Serial and Parallel Computation on Predicting Missing Data with EM Algorithm [2021]
-
Erna Nurmawati, Robby Hasan Pangaribuan, and Ibnu Santoso
- Jurnal Matematika, Statistika dan Komputasi. 18:22-30
- Subjects
-
InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS and ComputerApplications_COMPUTERSINOTHERSYSTEMS
- Abstract
-
One way to deal with the presence of missing value or incomplete data is to impute the data using EM Algorithm. The need for large and fast data processing is necessary to implement parallel computing on EM algorithm serial program. In the parallel program architecture of EM Algorithm in this study, the controller is only related to the EM module whereas the EM module itself uses matrix and vector modules intensively. Parallelization is done by using OpenMP in EM modules which results in faster compute time on parallel programs than serial programs. Parallel computing with a thread of 4 (four) increases speed up, reduces compute time, and reduces efficiency when compared to parallel computing by the number of threads 2 (two).
-
Xiuli Xu
- RAIRO - Operations Research. 55:2807-2825
- Subjects
-
Management Science and Operations Research, Computer Science Applications, Theoretical Computer Science, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
This paper considers the equilibrium balking behavior of customers in a single-server Markovian queue with variable vacation and vacation interruption, where the server can switch across four states: vacation, working vacation, idle period, and busy period. Once the queue becomes empty, the server commences a working vacation and slows down its service rate. However, this period may be interrupted anytime by the vacation interruption. Upon the completion of a working vacation, the server takes a vacation in a probability-based manner and stops service if the system is empty. The system stays idle after a vacation until a new customer arrives. The comparisons between the equilibrium balking strategy of customers and the optimal expected social benefit per time unit for each type of queue are elucidated and the inconsistency between the individual optimization and the social optimization is revealed. Moreover, the sensitivity of the expected social benefit and the equilibrium threshold with respect to the several parameters as well as diverse precision levels is illustrated through numerical examples in a competitive cloud environment.
-
Svitlana Bondarenko, Valentyna Rusavska, Viktoriia Niziaieva, Tetiana Manushkina, Tetiana Kachanova, and Ulana Ivaniuk
- Journal of Information Technology Management, Vol 13, Iss Special Issue: Role of ICT in Advancing Business and Management, Pp 1-21 (2021)
- Subjects
-
tourism, tourist logistics, logistics system of tourism, digital logistics service, flows in the field of tourism, Information resources (General), ZA3040-5185, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
The article considers the main aspects of using the tools of the system organization of logistics flow management in the field of tourism, in terms of digitalization of logistics services. The research is based on experience in the transformation of the tourist product, it is perception by consumers, modern technologies, digital channels and logistics tools. The analysis showed that the organization of tourism based on a systematic approach, when service providers, tour operators, travel agencies and end users are elements of a single information system. The essential features of tourism logistics considered, basic tactics and tools related to the concept of digital logistics service. It established that digital tools of logistics services implemented with the identification of the main tourist services: food, accommodation, transportation, sightseeing, shopping, recreation and entertainment, education, management and research.
-
Rahul Anandpara
- International Journal for Research in Applied Science and Engineering Technology. 9:1880-1886
- Subjects
-
InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, ComputingMilieux_COMPUTERSANDSOCIETY, ComputingMilieux_LEGALASPECTSOFCOMPUTING, ComputingMethodologies_PATTERNRECOGNITION, and InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL
- Abstract
-
Today, Email Spam has become a major problem, with Rapid increament of internet users, Email spams is also increasing. People are using email spam for illegal and unethical conducts, phishing and fraud. Sending malicious link through spam emails which can damage the system and can also seek in into your system. Spammer creates a fake profile and email account which is easier for them. These spammers target those peoples who are not aware about frauds. So there is a need to identify the fraud in terms of spam emails. In this paper we will identify the spam by using machine learning algorithms.
6. Email Spam Detection using SVM [2021]
-
Azhar Baig
- International Journal for Research in Applied Science and Engineering Technology. 9:669-672
- Subjects
-
InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, ComputingMilieux_LEGALASPECTSOFCOMPUTING, and ComputingMethodologies_PATTERNRECOGNITION
- Abstract
-
E-mail contributes to internet messaging as a necessary component. Spam mails are unwanted messages that appear in large numbers and are exploited by spammers to divulge personal information of the user. These e-mails are frequently company/control announcements or malware that the user receives suddenly. Email spamming is one of the Internet's unsolved challenges, causing inconvenience to users and loss to businesses. Filtering is one of the foremost widely used and important methods for preventing spam emails. Email filters are commonly wont to organize incoming emails, protect computers from viruses, and eliminate spam. We present this method to classifying spam emails using support vector machines during this study, the SVM outperformed other classifiers.
-
Rifqi Asy'ari, null Rusdin Tahir, null Cecep Ucu Rakhman, and null Ayu Khrisna Yuliawati
- EDUTOURISM Journal Of Tourism Research. 3:13-21
- Subjects
-
GeneralLiterature_MISCELLANEOUS, ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATION, GeneralLiterature_INTRODUCTORYANDSURVEY, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Tourism emphasizes the authenticity of an area with the principle of preservation and sustainable development, but technology is one factor that influences it enough to attract tourists or ease management in the tourism sector. The terminology of smart tourism appears as a direction in the support system for supporters in the tourism sector. One system in implementing smart tourism is gamification, which is still a lot of ordinary people in the system. This article examines the extent of the application of gamification in the concept of smart tourism and what things are still obstacles in the application of gamification in the tourism industry so that it can be a recommendation for further research. So that both are expected to provide an understanding of the application of gamification and the extent of realization in the concept of smart tourism. The method used in this research is a literature study. The results got by the application of gamification in smart tourism are very helpful in the tourism industry. This system provides tourism development, namely providing education, using the potential and use of technology. Gamification is a system where tourists are given more flexibility for activities and interacting with tourist areas, both visually and directly.
-
Madlazim, Eko Hariyono, and Dyah Permata Sari
- Science of Tsunami Hazards, Vol 40, Iss 2, Pp 114-121 (2021)
- Subjects
-
ombak learning model, online learning, tsunami mitigation capabilities, tsunami potential, Oceanography, GC1-1581, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Many communities in Indonesia are potentially affected by tsunamis but do not have adequate preparedness in dealing with such disasters. This study aims to improve the preparedness capacity of the people living around the coast that are potentially affected by the tsunami through tsunami mitigation learning by using OMBAK learning model. The learning is done online to avoid the transmission of covid-19. Before the online learning begins, the student community is asked to work on the tsunami mitigation pre-test. The number of people living around the coast who took part in this learning was 62 people, ranging in age from 13 to 55 years old. Furthermore, students were briefed via a zoom meeting (synchronous) about the implementation of this online learning, especially relating on how to learn tsunami mitigation by using disaster mitigation video media. In this tsunami mitigation learning process, students are allowed to learn asynchronously. We also allow students to discuss tsunami mitigation materials through the WhatApp Group (WAG) during the learning process. After completing the learning process, students were asked to work on post- test questions. Based on the results of the percentage analysis on the learning implementation, it was found that the implementation of tsunami mitigation learning by using OMBAK learning model was carried out very well. In addition, based on the analysis of t-test and gain score from pre- test and post-test data, it was obtained that there was a significant increase in the students’ tsunami mitigation ability.
-
Rahul Anandpara
- International Journal for Research in Applied Science and Engineering Technology. 9:5098-5101
- Subjects
-
InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Every year, the number of uninvited email received by the common email user will increase dramatically. According to IDC, Spam has accounted for 38 percent of the 31 billion emails sent each day in North America in 2004, up from 24 percent in 2002. keeping pace with amount of spam is that the quantity of filtering solutions out there to assist eliminate it. This paper describes in detail how several of the most common spam filtering technologies work, how effective they are at stopping spam, their strengths and weaknesses, and techniques used by spammers to circumvent them.
-
Mr. B. Krishna
- International Journal for Research in Applied Science and Engineering Technology. 9:5209-5214
- Subjects
-
InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, ComputingMethodologies_PATTERNRECOGNITION, and ComputingMilieux_LEGALASPECTSOFCOMPUTING
- Abstract
-
— E-mail spam is the very recent problem for every individual. The e-mail spam is nothing it’s an advertisement of any company/product or any kind of virus which is receiving by the email client mailbox without any notification. To solve this problem the different spam filtering technique is used. The spam filtering techniques are used to protect our mailbox for spam mails. In this project, we are using the Naïve Bayesian Classifier for spam classification. The Naïve Bayesian Classifier is very simple and efficient method for spam classification. Here we are using the Lingspam dataset for classification of spam and non-spam mails. The feature extraction technique is used to extract the feature. The result is to increase the accuracy of the system.
-
Lin Yang, Edwin Lazo, James Byrnes, Shirish Chodankar, Stephen Antonelli, and Maksim Rakitin
- Journal of Synchrotron Radiation
- Subjects
-
Instrumentation, Nuclear and High Energy Physics, Radiation, Beamlines, mail-in, solution scattering, automation, GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries), and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
The development of instrumentation and software to support mail-in solution scattering is presented.
During the COVID-19 pandemic, synchrotron beamlines were forced to limit user access. Performing routine measurements became a challenge. At the Life Science X-ray Scattering (LiX) beamline, new instrumentation and mail-in protocols have been developed to remove the access barrier to solution scattering measurements. Our efforts took advantage of existing instrumentation and coincided with the larger effort at NSLS-II to support remote measurements. Given the limited staff–user interaction for mail-in measurements, additional software tools have been developed to ensure data quality, to automate the adjustments in data processing, as users would otherwise rely on the experience of the beamline staff, and produce a summary of the initial assessments of the data. This report describes the details of these developments.
- Full text View on content provider's site
-
Michail Semenovich Prokopyev, Natalia Anatolyevna Kostikova, Zotik Semyonovich Kuzin, Tatyana Sergeevna Ilina, and Liudmila Anatolievna Tyagulskaya
- Laplage em Revista, Vol 7, Iss Extra-C (2021)
- Subjects
-
E-learning, Messengers, Telegram, Educational process organization, Education, Special aspects of education, LC8-6691, InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI), InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, and ComputingMilieux_COMPUTERSANDSOCIETY
- Abstract
-
This article objective is providing methodological guidelines on Telegram messenger using by educational process participants in the context of e-learning. The problem analysis is focused on examination of opportunities for messenger tools and technologies in interacting with users. The procedures of messenger using by teachers as part of e-learning are systematized. The trend for messenger using expansion as a tool for fast communication and monitoring task execution in e-learning is described. Methodological guidelines for teachers on using Telegram messenger for improving the educational organization efficiency in e-learning have been developed. The theoretical significance of the results lies in summarizing Russian and foreign experience in messenger гising for e-learning purposes. The necessity of using messengers in educational activity arrangement is justified. The effectiveness of their use is well-grounded.
-
P Sai Teja
- International Journal for Research in Applied Science and Engineering Technology. 9:1107-1112
- Subjects
-
ComputingMethodologies_PATTERNRECOGNITION and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Unsolicited e-mail also known as Spam has become a huge concern for each e-mail user. In recent times, it is very difficult to filter spam emails as these emails are produced or created or written in a very special manner so that anti-spam filters cannot detect such emails. This paper compares and reviews performance metrics of certain categories of supervised machine learning techniques such as SVM (Support Vector Machine), Random Forest, Decision Tree, CNN, (Convolutional Neural Network), KNN(K Nearest Neighbor), MLP(Multi-Layer Perceptron), Adaboost (Adaptive Boosting) Naïve Bayes algorithm to predict or classify into spam emails. The objective of this study is to consider the details or content of the emails, learn a finite dataset available and to develop a classification model that will be able to predict or classify whether an e-mail is spam or not.
-
Medit Leonard and Bethzy Williams
- Science Progress and Research. 1:63-69
- Subjects
-
InformationSystems_MISCELLANEOUS and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Social networking sites have been a common forum for exchanging health-related insights and information. This study aims to look at Twitter use in the intervention of diabetes. Specifically, utilising a prior analysis as a reference, we use a revised approach to analyse trends in the existing use of hash-tags, trending hash-tags, and the incidence of diabetes-related tweets. Our findings indicate that the diabetes population on Twitter has grown significantly over time, as well as proof that this community is becoming more capable of spreading diabetes-related health information. An enhanced system for storing, cleaning, and reviewing Twitter data relevant to diabetes, as well as the use of regular expressions to categorise subsets of tweets, are among our computational contributions. To recognise tweets from diabetic patients, we built a model focused on word embedding and long short- term memory.
15. TOSDS: Tenant-centric Object-based Software Defined Storage for Multitenant SaaS Applications [2021]
-
Aditi Sharma and Parmeet Kaur
- Arabian Journal for Science and Engineering
- Subjects
-
Research Article-Computer Engineering and Computer Science, Multitenancy, Distributed database, Software defined storage, Location, Bin, Virtualization, Object storage, Multidisciplinary, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Enormous amounts of unstructured data such as images, videos, emails, sensors’ data and documents of multiple types are being generated daily by varied applications. Apart from the challenges related to collection or processing of this data, its efficient storage is also a significant challenge since this data do not conform to any predefined storage model. Therefore, any enterprise dealing with huge unstructured data requires a scalable storage system that can provide data durability and availability at a low cost. The paper proposes a tenant-centric approach to develop an object-based software defined storage system for SaaS multi-tenant applications. We present TOSDS (Tenant-centric Object-based Software Defined Storage), a system that can efficiently meet the storage requirements of users or tenants with diverse needs who are using a multitenant SaaS application. The experimental verification of TOSDS illustrates its effectiveness in storage utilization as well as tenant isolation.
- Full text View on content provider's site
-
Jaeil Lee, Yongjoon Lee, Donghwan Lee, Hyukjin Kwon, and Dongkyoo Shin
- IEEE Access, Vol 9, Pp 80866-80872 (2021)
- Subjects
-
General Engineering, General Materials Science, General Computer Science, Phishing mail, hacking, cyber attack group, profiling, Electrical engineering. Electronics. Nuclear engineering, TK1-9971, ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS, InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, and ComputingMilieux_COMPUTERSANDSOCIETY
- Abstract
-
In recent years, there has been an increase in the number of phishing attacks targeting people in the fields of defense, security, and diplomacy around the world. In particular, hacking attack group Kimsuky has been conducting phishing attacks to collect key information from public institutions since 2013. The main feature of the attack techniques used by the Kimsuky attack group are to conceal malicious code in phishing e-mails disguised as normal e-mails to spread a document file that is vulnerable to security, such as a Hangul file, or to induce interest through a social engineering attack technique to collect account information. This study classified the types of phishing e-mail attacks into spoofed e-mails, e-mail body vulnerability use, and attached file spoofing, and detailed analyses of their attack methods, such as commonality and characteristic analyses, were performed to analyze the profile of this phishing e-mail attack group. Based on the results, the purpose of the attacking group was determined to be intelligence gathering because it focused on phishing attacks targeting Korean diplomatic and defense public institutions and related foreign institutions. Finally, a countermeasure that can be used by mail service providers and mail users to respond to phishing e-mails is suggested.
- Full text View on content provider's site
17. Content Based E Mail Classification [2021]
-
Sonal Chakole, Sarita Padole, Apurva Kamble, Vandana Wadekar, and Ankit Dhande
- International Journal of Scientific Research in Science, Engineering and Technology. :141-144
- Subjects
-
GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Electronic Mail (E-mail) has established a significant place in information user’s life. Mails are used as a major and important mode of information sharing because emails are faster and effective way of communication. Email plays its important role of communication in both personal and professional aspects of one’s life. The rapid increase in the number of account holders from last few decades and the increase in the volume of mails have generated various serious issues too. The content base mail classification can be classified into four ways namely Private, Public, Newsletter, and Anonymous. Every user has the right to choose their keyword (a semi-private password). Those contacts who know the user’s keyword will be classified as private contacts and those users who are unknown them classified anonymous contacts. A contact can be classified as public or private, upon verification of an anonymous contact. Any newsletter or group mails are classified into newsletter contacts. It is highly likely that the rests are junk mail or spam. In this project, a spam detector to identify an email as either spam or ham is built using n-gram analysis. The system involves the classification of mails based on user’s contacts. This way any mail from a contact whom the user knows very well is being displayed.
18. 'Rozkosz dla zmysłów', czyli język kart dań [2021]
-
Lidia Przymuszała
- LingVaria. 31:225-234
- Subjects
-
InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI), InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS, and GeneralLiterature_MISCELLANEOUS
- Abstract
-
“Delight for the Senses” or the Language Used in Menus This article is about language used in menus. The recently changing approach to cooking and eating is also reflected in language that describes food. Restaurant menus are a clear example of this. It is because eating, i. e. experiencing the taste of dishes, does not only take using our tongue, but it also involves using language. Some restaurant owners are aware of the relationship between taste and word, which is reflected in the way some dishes are described in menu cards offered to customers. The purpose of the article is to analyse menus of selected restaurants and to show some linguistic tricks used by restaurant owners to encourage customers to eat in their restaurants.
-
Atilla Wohllebe and Mario Hillmers
- International Journal of Applied Research in Business and Management. 2:13-25
- Subjects
-
mental disorders, health care economics and organizations, GeneralLiterature_INTRODUCTORYANDSURVEY, GeneralLiterature_MISCELLANEOUS, ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATION, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
The relevance of smartphones and mobile apps has increased significantly in recent years. Increasingly, companies are trying to use mobile apps for their business purposes. Accordingly, the role of app marketing has become more important. Nevertheless, there is no uniform understanding of the term "app marketing". Based on scientific and gray literature, two definitions of "app marketing" are developed. In the narrower sense, app marketing refers to measures aimed at making a mobile app better known and acquiring users i. e. generating app downloads. In the broader sense, app marketing refers to all activities that are used to acquire users for a mobile app, contact them, and encourage them to reach a specified goal. Additionally, based on job ads, an overview of activities in app marketing is provided from a practical point of view. Here, the focus is primarily on paid app install campaigns as well as on monitoring, reporting and analytics.
-
Atilla Wohllebe, Dirk-Siegfried Hübner, Uwe Radtke, and Szilárd Podruzsik
- Innovative Marketing, Vol 17, Iss 2, Pp 102-111 (2021)
- Subjects
-
app user engagement, digital marketing, Germany, linear regression, mobile CRM, Marketing. Distribution of products, HF5410-5417.5, Management of Technology and Innovation, Marketing, Economics, Econometrics and Finance (miscellaneous), mental disorders, and InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
- Abstract
-
Push notifications are a core functionality of mobile apps and allow app publishers to interact with existing app users and send promotional content. Since every push notification can also interrupt or annoy app users, the frequency of push notifications is a critical success factor. This study investigates how different frequencies of push notifications affect the behavior of app users of mobile apps in retail. In an experiment with 17,500 app users, five different frequencies are tested over seven weeks, and the effects on real observed app user behavior are analyzed. The results show that as the frequency of the non-personalized push notifications increases, uninstalls increase, and the direct open rate of push notifications decreases. A significant influence on indirect opens cannot be proven. The results provide practitioners with important insights into the potential harm that a too high frequency of push notifications can cause. Furthermore, the results support the importance of relevant content tailored to the respective user.
- Full text View on content provider's site
Catalog
Books, media, physical & digital resources
Guides
Course- and topic-based guides to collections, tools, and services.
1 - 20
Next