for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: IGI Global   (Total: 146 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

              [Sort by number of followers]   [Restore default list]

Showing 1 - 146 of 146 Journals sorted alphabetically
Information Resources Management J.     Full-text available via subscription   (Followers: 8, SJR: 0.108, CiteScore: 0)
Intl. J. of 3-D Information Modeling     Full-text available via subscription   (Followers: 3)
Intl. J. of Actor-Network Theory and Technological Innovation     Full-text available via subscription   (Followers: 5)
Intl. J. of Adaptive, Resilient and Autonomic Systems     Full-text available via subscription   (Followers: 3)
Intl. J. of Adult Vocational Education and Technology     Hybrid Journal   (Followers: 13)
Intl. J. of Advanced Pervasive and Ubiquitous Computing     Full-text available via subscription   (Followers: 4)
Intl. J. of Agent Technologies and Systems     Full-text available via subscription   (Followers: 5)
Intl. J. of Agricultural and Environmental Information Systems     Full-text available via subscription   (Followers: 2, SJR: 0.157, CiteScore: 1)
Intl. J. of Ambient Computing and Intelligence     Full-text available via subscription   (Followers: 2, SJR: 0.161, CiteScore: 2)
Intl. J. of Applied Behavioral Economics     Full-text available via subscription   (Followers: 13)
Intl. J. of Applied Evolutionary Computation     Full-text available via subscription   (Followers: 4)
Intl. J. of Applied Geospatial Research     Hybrid Journal   (Followers: 5, SJR: 0.208, CiteScore: 0)
Intl. J. of Applied Industrial Engineering     Full-text available via subscription   (Followers: 7)
Intl. J. of Applied Logistics     Full-text available via subscription   (Followers: 7)
Intl. J. of Applied Metaheuristic Computing     Full-text available via subscription   (Followers: 4)
Intl. J. of Art, Culture and Design Technologies     Full-text available via subscription   (Followers: 9)
Intl. J. of Artificial Life Research     Full-text available via subscription   (Followers: 1)
Intl. J. of Asian Business and Information Management     Full-text available via subscription   (Followers: 3)
Intl. J. of Aviation Technology, Engineering and Management     Full-text available via subscription   (Followers: 5)
Intl. J. of Biomaterials Research and Engineering     Full-text available via subscription   (Followers: 2)
Intl. J. of Biomedical and Clinical Engineering     Full-text available via subscription   (Followers: 4)
Intl. J. of Business Data Communications and Networking     Full-text available via subscription   (Followers: 2, SJR: 0.115, CiteScore: 0)
Intl. J. of Business Intelligence Research     Full-text available via subscription   (Followers: 3)
Intl. J. of Chemoinformatics and Chemical Engineering     Full-text available via subscription   (Followers: 2)
Intl. J. of Cloud Applications and Computing     Hybrid Journal   (Followers: 13)
Intl. J. of Cognitive Informatics and Natural Intelligence     Full-text available via subscription   (Followers: 3, SJR: 0.212, CiteScore: 2)
Intl. J. of Computational Models and Algorithms in Medicine     Full-text available via subscription  
Intl. J. of Computer Vision and Image Processing     Full-text available via subscription   (Followers: 19)
Intl. J. of Computer-Assisted Language Learning and Teaching     Full-text available via subscription   (Followers: 13)
Intl. J. of Conceptual Structures and Smart Applications     Full-text available via subscription   (Followers: 2)
Intl. J. of Creative Interfaces and Computer Graphics     Full-text available via subscription   (Followers: 3)
Intl. J. of Customer Relationship Marketing and Management     Full-text available via subscription   (Followers: 17)
Intl. J. of Cyber Behavior, Psychology and Learning     Full-text available via subscription   (Followers: 6, SJR: 0.238, CiteScore: 1)
Intl. J. of Cyber Ethics in Education     Full-text available via subscription   (Followers: 2)
Intl. J. of Data Warehousing and Mining     Full-text available via subscription   (Followers: 11, SJR: 0.267, CiteScore: 1)
Intl. J. of Decision Support System Technology     Full-text available via subscription   (Followers: 2, SJR: 0.172, CiteScore: 1)
Intl. J. of Dependable and Trustworthy Information Systems     Full-text available via subscription  
Intl. J. of Digital Crime and Forensics     Full-text available via subscription   (Followers: 11, SJR: 0.17, CiteScore: 1)
Intl. J. of Digital Library Systems     Full-text available via subscription   (Followers: 72)
Intl. J. of Digital Literacy and Digital Competence     Full-text available via subscription   (Followers: 6)
Intl. J. of Distance Education Technologies     Full-text available via subscription   (Followers: 7, SJR: 0.283, CiteScore: 1)
Intl. J. of Distributed Systems and Technologies     Full-text available via subscription   (Followers: 3, SJR: 0.186, CiteScore: 1)
Intl. J. of E-Adoption     Full-text available via subscription  
Intl. J. of E-Business Research     Hybrid Journal   (Followers: 4, SJR: 0.301, CiteScore: 1)
Intl. J. of e-Collaboration     Full-text available via subscription   (Followers: 1, SJR: 0.49, CiteScore: 1)
Intl. J. of E-Entrepreneurship and Innovation     Full-text available via subscription   (Followers: 7)
Intl. J. of E-Health and Medical Communications     Full-text available via subscription   (Followers: 2, SJR: 0.129, CiteScore: 1)
Intl. J. of E-Planning Research     Full-text available via subscription  
Intl. J. of E-Politics     Full-text available via subscription   (Followers: 4)
Intl. J. of E-Services and Mobile Applications     Full-text available via subscription   (Followers: 6)
Intl. J. of Electronic Government Research     Full-text available via subscription   (Followers: 5, SJR: 0.201, CiteScore: 1)
Intl. J. of Embedded and Real-Time Communication Systems     Full-text available via subscription   (Followers: 6, SJR: 0.176, CiteScore: 1)
Intl. J. of Energy Optimization and Engineering     Hybrid Journal   (Followers: 5)
Intl. J. of Enterprise Information Systems     Full-text available via subscription   (Followers: 1, SJR: 0.191, CiteScore: 1)
Intl. J. of Fuzzy System Applications     Full-text available via subscription   (Followers: 4, SJR: 0.265, CiteScore: 1)
Intl. J. of Game-Based Learning     Hybrid Journal   (Followers: 16, SJR: 0.268, CiteScore: 1)
Intl. J. of Gaming and Computer-Mediated Simulations     Full-text available via subscription   (Followers: 6, SJR: 0.273, CiteScore: 1)
Intl. J. of Geotechnical Earthquake Engineering     Full-text available via subscription   (Followers: 9, SJR: 0.116, CiteScore: 0)
Intl. J. of Green Computing     Full-text available via subscription   (Followers: 1)
Intl. J. of Grid and High Performance Computing     Full-text available via subscription   (Followers: 2, SJR: 0.154, CiteScore: 1)
Intl. J. of Handheld Computing Research     Full-text available via subscription  
Intl. J. of Healthcare Delivery Reform Initiatives     Full-text available via subscription   (Followers: 1)
Intl. J. of Healthcare Information Systems and Informatics     Hybrid Journal   (Followers: 7, SJR: 0.157, CiteScore: 0)
Intl. J. of Human Capital and Information Technology Professionals     Full-text available via subscription   (Followers: 3, SJR: 0.28, CiteScore: 1)
Intl. J. of ICT Research and Development in Africa     Full-text available via subscription   (Followers: 4)
Intl. J. of Information and Communication Technology Education     Full-text available via subscription   (Followers: 17, SJR: 0.202, CiteScore: 1)
Intl. J. of Information Communication Technologies and Human Development     Full-text available via subscription   (Followers: 6)
Intl. J. of Information Retrieval Research     Full-text available via subscription   (Followers: 32)
Intl. J. of Information Security and Privacy     Full-text available via subscription   (Followers: 9, SJR: 0.11, CiteScore: 0)
Intl. J. of Information System Modeling and Design     Full-text available via subscription   (Followers: 2, SJR: 0.199, CiteScore: 1)
Intl. J. of Information Systems and Social Change     Full-text available via subscription   (Followers: 2)
Intl. J. of Information Systems and Supply Chain Management     Full-text available via subscription   (Followers: 22, SJR: 0.244, CiteScore: 1)
Intl. J. of Information Systems for Crisis Response and Management     Full-text available via subscription   (Followers: 4)
Intl. J. of Information Systems in the Service Sector     Full-text available via subscription   (Followers: 3, SJR: 0.25, CiteScore: 1)
Intl. J. of Information Technologies and Systems Approach     Full-text available via subscription   (Followers: 2, SJR: 0.204, CiteScore: 1)
Intl. J. of Information Technology and Web Engineering     Hybrid Journal   (Followers: 1, SJR: 0.168, CiteScore: 1)
Intl. J. of Information Technology Project Management     Full-text available via subscription   (Followers: 12)
Intl. J. of Innovation in the Digital Economy     Full-text available via subscription   (Followers: 4)
Intl. J. of Intelligent Information Technologies     Full-text available via subscription   (Followers: 2, SJR: 0.323, CiteScore: 2)
Intl. J. of Intelligent Mechatronics and Robotics     Full-text available via subscription   (Followers: 4)
Intl. J. of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 3)
Intl. J. of Interdisciplinary Telecommunications and Networking     Full-text available via subscription   (Followers: 5)
Intl. J. of IT Standards and Standardization Research     Full-text available via subscription  
Intl. J. of IT/Business Alignment and Governance     Full-text available via subscription  
Intl. J. of Knowledge and Systems Science     Full-text available via subscription   (Followers: 1)
Intl. J. of Knowledge Discovery in Bioinformatics     Full-text available via subscription   (Followers: 3)
Intl. J. of Knowledge Management     Full-text available via subscription   (Followers: 14, SJR: 0.261, CiteScore: 1)
Intl. J. of Knowledge Society Research     Full-text available via subscription   (Followers: 1)
Intl. J. of Knowledge-Based Organizations     Full-text available via subscription   (Followers: 2)
Intl. J. of Manufacturing, Materials, and Mechanical Engineering     Full-text available via subscription   (Followers: 16, SJR: 0.272, CiteScore: 1)
Intl. J. of Measurement Technologies and Instrumentation Engineering     Full-text available via subscription   (Followers: 1)
Intl. J. of Mobile and Blended Learning     Full-text available via subscription   (Followers: 22, SJR: 0.331, CiteScore: 1)
Intl. J. of Mobile Computing and Multimedia Communications     Full-text available via subscription   (Followers: 4, SJR: 0.133, CiteScore: 0)
Intl. J. of Mobile Human Computer Interaction     Hybrid Journal   (Followers: 9, SJR: 0.136, CiteScore: 1)
Intl. J. of Monitoring and Surveillance Technologies Research     Full-text available via subscription   (Followers: 3)
Intl. J. of Multimedia Data Engineering and Management     Full-text available via subscription   (Followers: 5)
Intl. J. of Nanotechnology and Molecular Computation     Full-text available via subscription   (Followers: 3)
Intl. J. of Natural Computing Research     Hybrid Journal  
Intl. J. of Online Marketing     Full-text available via subscription   (Followers: 6)
Intl. J. of Online Pedagogy and Course Design     Full-text available via subscription   (Followers: 8)
Intl. J. of Open Source Software and Processes     Full-text available via subscription   (Followers: 7, SJR: 0.107, CiteScore: 0)
Intl. J. of Operations Research and Information Systems     Full-text available via subscription   (Followers: 7)
Intl. J. of Organizational and Collective Intelligence     Hybrid Journal   (Followers: 2)
Intl. J. of People-Oriented Programming     Full-text available via subscription  
Intl. J. of Privacy and Health Information Management     Full-text available via subscription   (Followers: 3)
Intl. J. of Public and Private Healthcare Management and Economics     Full-text available via subscription   (Followers: 4)
Intl. J. of Quality Assurance in Engineering and Technology Education     Full-text available via subscription   (Followers: 2)
Intl. J. of Reliable and Quality E-Healthcare     Full-text available via subscription   (Followers: 1)
Intl. J. of Robotics Applications and Technologies     Full-text available via subscription   (Followers: 2)
Intl. J. of Secure Software Engineering     Full-text available via subscription   (Followers: 6)
Intl. J. of Service Science, Management, Engineering, and Technology     Full-text available via subscription   (Followers: 2)
Intl. J. of Signs and Semiotic Systems     Full-text available via subscription  
Intl. J. of Social and Organizational Dynamics in IT     Full-text available via subscription   (Followers: 3)
Intl. J. of Social Ecology and Sustainable Development     Full-text available via subscription   (Followers: 7, SJR: 0.131, CiteScore: 0)
Intl. J. of Sociotechnology and Knowledge Development     Full-text available via subscription   (Followers: 1, SJR: 0.175, CiteScore: 1)
Intl. J. of Software Innovation     Full-text available via subscription   (Followers: 2)
Intl. J. of Software Science and Computational Intelligence     Full-text available via subscription   (Followers: 2)
Intl. J. of Space Technology Management and Innovation     Full-text available via subscription   (Followers: 6)
Intl. J. of Strategic Decision Sciences     Full-text available via subscription   (Followers: 2)
Intl. J. of Strategic Information Technology and Applications     Full-text available via subscription   (Followers: 1)
Intl. J. of Surface Engineering and Interdisciplinary Materials Science     Full-text available via subscription   (Followers: 1)
Intl. J. of Sustainable Economies Management     Full-text available via subscription  
Intl. J. of Swarm Intelligence Research     Full-text available via subscription   (Followers: 3)
Intl. J. of Synthetic Emotions     Full-text available via subscription   (Followers: 1)
Intl. J. of System Dynamics Applications     Full-text available via subscription   (Followers: 3)
Intl. J. of Systems and Service-Oriented Engineering     Full-text available via subscription  
Intl. J. of Systems Biology and Biomedical Technologies     Full-text available via subscription   (Followers: 2)
Intl. J. of Technoethics     Full-text available via subscription   (Followers: 2, SJR: 0.132, CiteScore: 0)
Intl. J. of Technology and Educational Marketing     Full-text available via subscription   (Followers: 3)
Intl. J. of Technology and Human Interaction     Full-text available via subscription   (Followers: 2, SJR: 0.211, CiteScore: 1)
Intl. J. of Technology Diffusion     Full-text available via subscription   (Followers: 1)
Intl. J. of Telework and Telecommuting Technologies     Full-text available via subscription  
Intl. J. of User-Driven Healthcare     Full-text available via subscription   (Followers: 1)
Intl. J. of Virtual and Personal Learning Environments     Full-text available via subscription   (Followers: 14, SJR: 0.145, CiteScore: 0)
Intl. J. of Virtual Communities and Social Networking     Full-text available via subscription   (Followers: 1)
Intl. J. of Web Portals     Full-text available via subscription   (Followers: 19, SJR: 0.144, CiteScore: 0)
Intl. J. of Web Services Research     Full-text available via subscription   (SJR: 0.15, CiteScore: 1)
Intl. J. of Web-Based Learning and Teaching Technologies     Hybrid Journal   (Followers: 18, SJR: 0.251, CiteScore: 1)
Intl. J. of Wireless Networks and Broadband Technologies     Full-text available via subscription   (Followers: 3)
Intl. J. on Semantic Web and Information Systems     Hybrid Journal   (Followers: 3, SJR: 0.414, CiteScore: 2)
J. of Cases on Information Technology     Full-text available via subscription   (Followers: 5, SJR: 0.132, CiteScore: 1)
J. of Database Management     Full-text available via subscription   (Followers: 9, SJR: 0.15, CiteScore: 0)
J. of Electronic Commerce in Organizations     Full-text available via subscription   (Followers: 1, SJR: 0.117, CiteScore: 0)
J. of Global Information Management     Full-text available via subscription   (Followers: 9, SJR: 0.232, CiteScore: 1)
J. of Information Technology Research     Full-text available via subscription   (Followers: 3, SJR: 0.163, CiteScore: 1)
J. of Organizational and End User Computing     Full-text available via subscription   (Followers: 1, SJR: 0.342, CiteScore: 1)

              [Sort by number of followers]   [Restore default list]

Journal Cover
International Journal of Software Innovation
Number of Followers: 2  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 2166-7160 - ISSN (Online) 2166-7179
Published by IGI Global Homepage  [146 journals]
  • Agent-Development Framework Based on Modular Structure to Research
           Disaster-Relief Activities
    • Authors: IGI Global
      Abstract:
      Authors : Shunki Takami (University of Tsukuba, Tsukuba, Japan), Kazuo Takayanagi (Aichi Institute of Technology, Toyota, Japan), Shivashish Jaishy (Aichi Institute of Technology, Toyota, Japan), Nobuhiro Ito (Aichi Institute of Technology, Toyota, Japan), Kazunori Iwata (Department of Business Administration, Aichi University, Nagoya, Japan)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100101
      Date Posted: 10/1/2018 12:00:00 AM This article describes approaches to the RoboCup Rescue Simulation league which is a part of the response to recent large-scale natural disasters. In particular, the project provides a platform for studying disaster-relief agents and simulations. The aim of the project is to contribute to society is by making widely available the findings our research into disaster relief. Some disaster-relief agents contain excellent algorithm modules, which should ideally be shareable among developers. However, this is hindered when the program structure of the agents are different among different teams. Therefore, this article designs and implements a modular agent-development framework that unifies the structure within RoboCup Rescue Simulation agents to facilitate such technical exchange.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • Using Non-Intrusive Environmental Sensing for ADLS Recognition in
           One-Person Household
    • Authors: IGI Global
      Abstract:
      Authors : Long Niu (Graduate School of System Informatics, Kobe University, Kobe, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Kobe, Japan), Masahide Nakamura (Graduate School of System Informatics, Kobe University, Kobe, Japan & RIKEN AIP, Tokyo, Japan)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100102
      Date Posted: 10/1/2018 12:00:00 AM This article describes how pervasive sensing technologies are promising for increasing one-person household (OPH), where a system monitors and assists a resident to maintain healthy life rhythm. Automatic recognition of activities of daily living (ADLS) has been a hot research topic in pervasive computing. However, most existing methods have limitations in development cost, privacy exposure, and inconvenience for residents. To cope with the limitations, this article presents a new ADL recognition system especially for OPH. To minimize the development cost as well as intrusions to user and house, the system exploits an IoT-based environment sensing device, called autonomous sensor box (sensorbox) which can autonomously measure 7 kinds of environment attributes. The system then applies machine-learning techniques to predict 7 kinds of ADLS. Finally, this article conducts an experiment within an actual apartment of a single user. The result shows that the proposed system achieves the average accuracy of ADLS recognition with about 88%, by carefully developing the features of environment attributes.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • Unsupervised Estimation of Facial Expression Intensity for Emotional Scene
           Retrieval in Lifelog Videos
    • Authors: IGI Global
      Abstract:
      Authors : Shota Sakaue (Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100103
      Date Posted: 10/1/2018 12:00:00 AM This article describes how in order to facilitate the retrieval of impressive scenes from lifelog videos, a method to estimate the intensity of a facial expression of a person in a lifelog video is proposed. The previous work made it possible to estimate the facial expression intensity, but the previous method requires some training samples which should be manually and carefully selected. This makes the previous method quite inconvenient. This article attempts to solve this problem by introducing an unsupervised learning method. The proposed method estimates the facial expression intensity via a clustering on the basis of several facial features computed from the positional relationship of a number of facial feature points. For the evaluation of the proposed method, an experiment to estimate the facial expression intensity is performed using a lifelog video data set. The estimation performance of the proposed method is compared with that of the previous method.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • PRISM: Visualizing Personalized Real-Time Incident on Security Map
    • Authors: IGI Global
      Abstract:
      Authors : Takuhiro Kagawa (Graduate School of System Informatics, Kobe University, Kobe, Japan), Sachio Saiki (Graduate School of System Informatics, Kobe University, Kobe, Japan), Masahide Nakamura (Graduate School of System Informatics, Kobe University, Kobe, Japan & RIKEN AIP, Tokyo, Japan)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100104
      Date Posted: 10/1/2018 12:00:00 AM This article describes how local governments in Japan recently provide security information services for residents, which deliver regional incident information using Email or Web. However, since the conventional services usually provide “one-for-all” information. users tend to miss important incidents within the flood of information. This article proposes a new security information service, called PRISM (Personalized Real-time Information with Security Map). For given incident information and user's living area, PRISM first computes severity of the incident, based on distance, time, and type of the incident. It then visualizes the incidents with the severity on a heat map. Thus, PRISM provides real-time personalized information adapted to individual situation of users. To illustrate the feasibility, we implement PRISM as a Web application using Hyogo Bouhan Net, and Kobe city facility open data.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • A Preliminary Study on Adaptive Evolution Control Using Rank Correlation
           for Surrogate-Assisted Evolutionary Computation
    • Authors: IGI Global
      Abstract:
      Authors : Yudai Kuwahata (Kagoshima University, Kagoshima, Japan), Jun-ichi Kushida (Hiroshima City University, Hiroshima, Japan), Satoshi Ono (Kagoshima University, Kagoshima, Japan)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100105
      Date Posted: 10/1/2018 12:00:00 AM This article describes how surrogate-assisted evolutionary computation (SAEC) has widely applied to approximate expensive optimization problems, which require much computational time such as hours for one solution evaluation. SAEC may potentially also reduce the processing time of inexpensive optimization problems wherein solutions are evaluated within a few seconds or minutes. To achieve this, the approximation model construction for an objective function should be iterated as few times as possible during optimization. Therefore, this article proposes an adaptive evolution control mechanism for SAEC using rank correlations between actually evaluated and approximately evaluated values of the objective function. These correlations are then used to adaptively switch the approximation and actual evaluation phases, reducing the number of runs required to learn the approximation model. Experiments show that the proposed method could successfully reduce the processing time in some benchmark functions even under inexpensive scenario.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • Automatic Composition System Based on Melodic Outlines and Music Theory
    • Authors: IGI Global
      Abstract:
      Authors : Takayuki Yoshida (Kyoto Institute of Technology, Kyoto, Japan), Teruhisa Hochin (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan), Hiroki Nomiya (Graduate School of Information Science, Kyoto Institute of Technology, Kyoto, Japan)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100106
      Date Posted: 10/1/2018 12:00:00 AM The purpose of this article is to compose music clips satisfying selected ambience on an intended melody easily, and to get the satisfaction of self-making. The targets are beginners of music theory. To achieve those purposes, this article proposes the automatic composing system that takes impression words and outlines, which represent the melody's profile lines, as inputs. This system makes several arrangements and modifications to the initial melody based on the music theory. It is experimentally clarified that the music clips composed by the system are satisfactory, and their moods fit the specified impression words.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • Taxicab Geometry Based Analysis on Skyline for Business Intelligence
    • Authors: IGI Global
      Abstract:
      Authors : Partha Ghosh (Kingston School of Management & Science, West Bengal, India), Takaaki Goto (Ryutsu Keizai University, Chiba, Japan), Soumya Sen (University of Calcutta, West Bengal, India)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100107
      Date Posted: 10/1/2018 12:00:00 AM This article describes how multi-criteria decision making problems are difficult to handle in normal SQL query processing. Skyline computation is generally used to solve these types of requirements by using dominance analysis and finding shortest distance with respect to a prime interesting point. However, in real life scenarios shortest distance may not be applicable in most of the cases due to different obstacles or barriers exist between the point of interests or places. In order to consider the presence of obstacles for geographically dispersed data, this research work uses Taxicab geometry for distance calculation, which is a simple Non-Euclidian geometry with minimum time complexity. Another limitation of previous skyline based works are that they only focus upon a single interesting point and can't be apply for multiple interesting points. This research article focuses upon multiple visiting points for the travelers in an optimized way. In addition to this, the article also selects areas for setting up of new business properties considering the constraints.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • Research on Facial Expression Recognition Technology Based on
           Convolutional-Neural-Network Structure
    • Authors: IGI Global
      Abstract:
      Authors : Junqi Guo (College of Information Science and Technology, Beijing Normal University, Beijing, China), Ke Shan (College of Information Science and Technology, Beijing Normal University, Beijing, China), Hao Wu (College of Information Science and Technology, Beijing Normal University, Beijing, China), Rongfang Bie (College of Information Science and Technology, Beijing Normal University, Beijing, China), Wenwan You (College of Information Science and Technology, Beijing Normal University, Beijing, China), Di Lu (College of Information Science and Technology, Beijing Normal University, Beijing, China)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100108
      Date Posted: 10/1/2018 12:00:00 AM Human facial expressions change so subtly that recognition accuracy of most traditional approaches largely depend on feature extraction. In this article, the authors employ a deep convolutional neural network (CNN) to devise a facial expression recognition system to discover deeper feature representation of facial expression. The proposed system is composed of the input module, the pre-processing module, the recognition module and the output module. The authors introduce jaffe and ck+ to simulate and evaluate the performance under the influence of different factors (e.g. network structure, learning rate and pre-processing). The authors also examine the anti-noise property of the system with zero-mean gaussian white noise. In addition, they simulate the recognition accuracy on different expression pairs and discuss the confusion issue on similar expression recognition. Finally, they introduce the k-nearest neighbor (KNN) algorithm compared with CNN to make the results more convincing.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • Improving the Bluetooth Hopping Sequence for Better Security in IoT
           Devices
    • Authors: IGI Global
      Abstract:
      Authors : Matt Sinda (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Tyler Danner (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Sean O'Neill (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Abeer Alqurashi (Department of Computer Science, Central Michigan University, Mount Pleasant, USA), Haeng-Kon Kim (Daegu Catholic University, Daegu, Korea)
      Volume/Issue: 6/4

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018100109
      Date Posted: 10/1/2018 12:00:00 AM The Internet of Things (IoT) is becoming more pervasive in our daily lives and is being used to add conveniences to our everyday items. There are several standards that are allowing these devices to communicate with each other and ultimately, with our mobile devices. However, in a rush to meet market demand, security was not considered until after the device had already been placed on the market. Most of the work done in improving security has been in the area of encryption. However, with the relatively small footprint of IoT devices, this makes strong encryption difficult. The authors' method will show that the current algorithm used to determine the next Bluetooth frequency hop is vulnerable to attack, and will suggest a novel algorithm to more securely select the next frequency to use. They will simulate their solution algorithmically to showcase their approach and in so doing demonstrate that it moves to the next frequency in a more random pattern than the existing model achieves. In this article, the authors present a new framework for improving security that focuses on the timing of frequency hopping, particularly in Bluetooth. The results show that focusing on different timing sequences for how long a device stays on a particular frequency both fits the current Bluetooth Lite architecture and provides adequate security for IoT devices, as it is demonstrably more random that the existing architecture.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Oct 2018 00:00:00 GMT
       
  • A Decision Tree Analysis of a Multi-Player Card Game With Imperfect
           Information
    • Authors: IGI Global
      Abstract:
      Authors : Masato Konishi (The University of Electro-Communications, Chofu, Tokyo, Japan), Seiya Okubo (University of Shizuoka, Shizuoka, Shizuoka, Japan), Tetsuro Nishino (The University of Electro-Communications, Chofu, Tokyo, Japan), Mitsuo Wakatsuki (The University of Electro-Communications, Chofu, Tokyo, Japan)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070101
      Date Posted: 7/1/2018 12:00:00 AM This article describes how computer Daihinmin involves playing Daihinmin, a popular card game in Japan, by using a player program. Because strong player programs of Computer Daihinmin use machine-learning techniques, such as the Monte Carlo method, predicting the program's behavior is difficult. In this article, the authors extract the features of the player program through decision tree analysis. The features of programs are extracted by generating decision trees based on three types of viewpoints. To show the validity of their method, computer experiments were conducted. The authors applied their method to three programs with relatively obvious behaviors, and they confirmed that the extracted features were correct by observing real behaviors of the programs.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • Probably Secure Efficient Anonymous Credential Scheme
    • Authors: IGI Global
      Abstract:
      Authors : Chien-Nan Wu (National Sun Yat-sen University, Kaohsiung, Taiwan), Chun-I Fan (National Sun Yat-sen University, Kaohsiung, Taiwan), Jheng-Jia Huang (National Sun Yat-sen University, Kaohsiung, Taiwan), Yi-Fan Tseng (National Sun Yat-sen University, Kaohsiung, Taiwan), Hiroaki Kikuchi (Meiji University, Tokyo, Japan)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070102
      Date Posted: 7/1/2018 12:00:00 AM This article describes how after the concept of anonymous credential systems was introduced in 1985, a number of similar systems have been proposed. However, these systems use zero-knowledge protocols to authenticate users, resulting in inefficient authentication during the stage of proving credential possession. To overcome this drawback, this article presents a signature scheme that uses partially blind signatures and chameleon hash functions such that both the prover and verifier achieve efficient authentication. In addition to providing a computational cost comparison table showing that the proposed signature scheme achieves a more efficient credential possession proving compared to other schemes, concrete security proofs are provided under a random oracle model to demonstrate that the proposed scheme satisfies the properties of anonymous credentials.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • A Multiple Phases Approach for Design Patterns Recovery Based on
           Structural and Method Signature Features
    • Authors: IGI Global
      Abstract:
      Authors : Mohammed Ghazi Al-Obeidallah (Department of Computing, University of Brighton, Brighton, UK), Miltos Petridis (Department of Computing, Middlesex University, London, UK), Stelios Kapetanakis (Department of Computing, University of Brighton, Brighton, UK)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070103
      Date Posted: 7/1/2018 12:00:00 AM Design patterns describe both structure, behavior of classes and their relationships. They can improve software documentation, speed up the development process and enable large-scale reuse of software architectures. This article presents a multiple levels detection approach (MLDA) to recover design pattern instances from Java source code. MLDA is able to recover design pattern instances based on a generated class level representation of a subject system. Specifically, MLDA presents what is the so-called Structural Search Model (SSM) which incrementally builds the structure of each design pattern based on the generated source code model. Moreover, MLDA uses a rule-based approach to match the method signatures of the candidate design instances to that of the subject system. As the experiment results illustrate, MLDA is able to recover 23 design patterns with reasonable detection accuracy.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • Unfolding Models for Asymmetric Dissimilarity Data With External
           Information Based on Path Structures
    • Authors: IGI Global
      Abstract:
      Authors : Kensuke Tanioka (Wakayama Medical University, Wakayama, Japan), Hiroshi Yadohisa (Doshisha University, Kyoto, Japan)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070104
      Date Posted: 7/1/2018 12:00:00 AM This article contains asymmetric dissimilarity data which is observed in various situations. In asymmetric dissimilarity data, dissimilarity from subject i to j and from subject j to i are not the same necessarily. Asymmetric multidimensional scaling (AMDS) is a visualization method for describing the asymmetric relations between subjects, given asymmetric dissimilarity data for subjects. It is sure that AMDS is a useful tool for interpreting the asymmetric relation, however, existing AMDS cannot be considered for the external information, even if the external information of the same subjects for the asymmetric dissimilarity data is given. If the estimated coordinates can be interpreted from the loading matrix for the external information like principal component analysis (PCA), the AMDS become more useful. This is because we can interpret the relation between the estimated asymmetries and the factors of the external information on the low dimensions. In this article, we proposed new AMDS with external information. In addition to that, the proposed method can consider the path structure for variables like SEM.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • A Method of Subtopic Classification of Search Engine Suggests by
           Integrating a Topic Model and Word Embeddings
    • Authors: IGI Global
      Abstract:
      Authors : Tian Nie (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Yi Ding (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Chen Zhao (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Youchao Lin (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan), Takehito Utsuro (Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070105
      Date Posted: 7/1/2018 12:00:00 AM The background of this article is the issue of how to overview the knowledge of a given query keyword. Especially, the authors focus on concerns of those who search for web pages with a given query keyword. The Web search information needs of a given query keyword is collected through search engine suggests. Given a query keyword, the authors collect up to around 1,000 suggests, while many of them are redundant. They classify redundant search engine suggests based on a topic model. However, one limitation of the topic model based classification of search engine suggests is that the granularity of the topics, i.e., the clusters of search engine suggests, is too coarse. In order to overcome the problem of the coarse-grained classification of search engine suggests, this article further applies the word embedding technique to the webpages used during the training of the topic model, in addition to the text data of the whole Japanese version of Wikipedia. Then, the authors examine the word embedding based similarity between search engines suggests and further classify search engine suggests within a single topic into finer-grained subtopics based on the similarity of word embeddings. Evaluation results prove that the proposed approach performs well in the task of subtopic classification of search engine suggests.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • A Knowledge-Based Machine Translation Using AI Technique
    • Authors: IGI Global
      Abstract:
      Authors : Sahar A. El-Rahman (Benha University, Cairo, Egypt & Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia), Tarek A. El-Shishtawy (Benha University, Banha, Egypt), Raafat A. El-Kammar (Benha University, Banha, Egypt)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070106
      Date Posted: 7/1/2018 12:00:00 AM This article presents a realistic technique for the machine aided translation system. In this technique, the system dictionary is partitioned into a multi-module structure for fast retrieval of Arabic features of English words. Each module is accessed through an interface that includes the necessary morphological rules, which directs the search toward the proper sub-dictionary. Another factor that aids fast retrieval of Arabic features of words is the prediction of the word category, and accesses its sub-dictionary to retrieve the corresponding attributes. The system consists of three main parts, which are the source language analysis, the transfer rules between source language (English) and target language (Arabic), and the generation of the target language. The proposed system is able to translate, some negative forms, demonstrations, and conjunctions, and also adjust nouns, verbs, and adjectives according their attributes. Then, it adds the symptom of Arabic words to generate a correct sentence.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • Security Testing Framework for Web Applications
    • Authors: IGI Global
      Abstract:
      Authors : Layla Mohammed Alrawais (Prince Sultan University, Riyadh, Saudi Arabia), Mamdouh Alenezi (Prince Sultan University, Riyadh, Saudi Arabia), Mohammad Akour (Yarmouk University, Irbid, Jordan)
      Volume/Issue: 6/3

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018070107
      Date Posted: 7/1/2018 12:00:00 AM The growth of web-based applications has increased tremendously from last two decades. While these applications bring huge benefits to society, yet they suffer from various security threats. Although there exist various techniques to ensure the security of web applications, still a large number of applications suffer from a wide variety of attacks and result in financial loses. In this article, a security-testing framework for web applications is proposed with an argument that security of an application should be tested at every stage of software development life cycle (SDLC). Security testing is initiated from the requirement engineering phase using a keyword-analysis phase. The output of the first phase serves as input to the next phase. Different case study applications indicate that the framework assists in early detection of security threats and applying appropriate security measures. The results obtained from the implementation of the proposed framework demonstrated a high detection ratio with a less false-positive rate.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Jul 2018 00:00:00 GMT
       
  • A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate
           Quadratic Equations
    • Authors: IGI Global
      Abstract:
      Authors : Xiaoyi Zhou (Hainan University, Haikou, China), Jixin Ma (University of Greenwich, London, UK), Xiaoming Yao (Hainan University, Haikou, China), Honglei Li (Hainan University, Haikou, China)
      Volume/Issue: 6/2

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018040101
      Date Posted: 4/1/2018 12:00:00 AM This article proposes a novel scheme for RFID anti-counterfeiting by applying bisectional multivariate quadratic equations (BMQE) system into an RF tag data encryption. In the key generation process, arbitrarily choose two matrix sets (denoted as A and B) and a base RAB such that [(AB) ⃗ ]=λ〖R_AB〗^T, and generate 2n BMQ polynomials (denoted as ρ) over finite field F_q. Therefore, (F_q, ρ) is taken as a public key and (A,B,λ) as a private key. In the encryption process, the EPC code is hashed into a message digest d_m. Then d_m is padded to d_m^' which is a non-zero 2n×2n matrix over F_q. With (A,B,λ)and d_m^', s_m is formed as an n-vector over F_2. Unlike the existing anti-counterfeit scheme, the one the authors proposed is based on quantum cryptography, thus it is robust enough to resist the existing attacks and has high security.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Apr 2018 00:00:00 GMT
       
  • Specifying Knowledge Graph with Data Graph, Information Graph, Knowledge
           Graph, and Wisdom Graph
    • Authors: IGI Global
      Abstract:
      Authors : Yucong Duan (College of Information Science and Technology, Hainan University, Haikou, China), Lixu Shao (Hainan Unviersity, Haikou, China), Gongzhu Hu (Central Michigan University, Mount Pleasant, USA)
      Volume/Issue: 6/2

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018040102
      Date Posted: 4/1/2018 12:00:00 AM Knowledge graphs have been widely adopted, in large part owing to their schema-less nature. It enables knowledge graphs to grow seamlessly and allows for new relationships and entities as needed. A knowledge graph is a graph constructed by representing each item, entity and user as nodes, and linking those nodes that interact with each other via edges. Knowledge graphs have abundant natural semantics and can contain various and more complete information. It is an expression mechanism close to natural language. However, we still lack a unified definition and standard expression form of knowledge graph. The authors propose to clarify the expression of knowledge graph as a whole. They clarify the architecture of knowledge graph from data, information, knowledge, and wisdom aspects respectively. The authors also propose to specify knowledge graph in a progressive manner as four basic forms including data graph, information graph, knowledge graph and wisdom graph.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Apr 2018 00:00:00 GMT
       
  • Music Melodies Suited to Multiple Users' Feelings Composed by Asynchronous
           Distributed Interactive Genetic Algorithm
    • Authors: IGI Global
      Abstract:
      Authors : Kota Nomura (Fukuoka Institute of Technology, Fukuoka, Japan), Makoto Fukumoto (Fukuoka Institute of Technology, Fukuoka, Japan)
      Volume/Issue: 6/2

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018040103
      Date Posted: 4/1/2018 12:00:00 AM This article aims to compose music melody suited for multiple users' feelings by employing parallel Distributed Interactive Genetic Algorithm (DIGA). In the DIGA, each user proceeds into a general Interactive Genetic Algorithm (IGA) process by evaluating solution candidates subjectively. In some generations, individuals in IGA are exchanged between the users. With the exchange, each of the users is affected by other users' feelings. As a result, obtaining good solutions suited for all users is expected. The authors conducted listening experiments for investigating the efficiency of the DIGA for composition of a music melody. Two experimental conditions with and without the exchange were employed. Ten people participated in the experiment as subjects, and were paired for the IGA task. The experimental results showed that a higher fitness was obtained in the final generation and similar melodies were obtained with the exchange.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Apr 2018 00:00:00 GMT
       
  • Design Space Exploration for Implementing a Software-Based Speculative
           Memory System
    • Authors: IGI Global
      Abstract:
      Authors : Kohei Fujisawa (Kyoto Institute of Technology, Kyoto, Japan), Atsushi Nunome (Kyoto Institute of Technology, Kyoto, Japan), Kiyoshi Shibayama (Kyoto College of Graduate Studies for Informatics, Kyoto, Japan), Hiroaki Hirata (Kyoto Institute of Technology, Kyoto, Japan)
      Volume/Issue: 6/2

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018040104
      Date Posted: 4/1/2018 12:00:00 AM To enlarge the opportunities for parallelizing a sequentially coded program, the authors have previously proposed speculative memory (SM). With SM, they can start the parallel execution of a program by assuming that it does not violate the data dependencies in the program. When the SM system detects a violation, it recovers the computational state of the program and restarts the execution. In this article, the authors explore the design space for implementing a software-based SM system. They compared the possible choices in the following three viewpoints: (1) which waiting system of suspending or busy-waiting should be used, (2) when a speculative thread should be committed, and (3) which version of data a speculative thread should read. Consequently, the performance of the busy-waiting system which makes speculative threads commit early and read non-speculative values is better than that of others.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Apr 2018 00:00:00 GMT
       
  • A Centralized Autonomous System of Cooperation for UAVs- Monitoring and
           USVs- Cleaning
    • Authors: IGI Global
      Abstract:
      Authors : Salima Bella (Faculty of Exact and Applied Sciences, University of Oran1 Ahmed Ben Bella, Oran, Algeria), Assia Belbachir (Mechatronics Department, Polytechnic Institute of Advanced Sciences, IPSA, Ivry-sur-Seine Paris, France), Ghalem Belalem (Faculty of Exact and Applied Sciences, University of Oran1 Ahmed Ben Bella, Oran, Algeria)
      Volume/Issue: 6/2

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018040105
      Date Posted: 4/1/2018 12:00:00 AM This article proposes an approach which deals with the problem of monitoring ocean pollution and cleaning dirty zones using autonomous unmanned vehicles. The authors present a cooperative agent-based planning approach for heterogeneous unmanned vehicles with different roles. Unmanned aerial vehicles (UAVs) monitor multiple ocean regions and unmanned surface vehicles (USVs) tackle the cleaning of dirty zones. Due to the rapid deployment of these unmanned vehicles, and the increase of ocean pollution, it is convenient to use a fleet of unmanned vehicles. Thus, most of the existing studies deal with the monitoring of different zones, the detection of the polluted zones and then the cleaning of the zones. In order to optimize this process, the authors' solution aims to use one UAV and one USV to reduce the pollution level of the ocean zones while taking into account the problem of fault tolerance related to these vehicles.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Apr 2018 00:00:00 GMT
       
  • Protein Classification Using N-gram Technique and Association Rules
    • Authors: IGI Global
      Abstract:
      Authors : Fatima Kabli (GeCode Laboratory, Department of Computer Science Tahar Moulay University of Saïda, Saïda, Algeria), Reda Mohamed Hamou (GeCode Laboratory, Department of Computer Science Tahar Moulay University of Saïda, Saïda, Algeria), Abdelmalek Amine (GeCode Laboratory, Department of Computer Science Tahar Moulay University of Saïda, Saïda, Algeria)
      Volume/Issue: 6/2

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018040106
      Date Posted: 4/1/2018 12:00:00 AM The knowledge extraction process from biological data is increasingly being considered, it addresses general issues such as grouping, classification and association; The Protein classification is an important activity for the biologist to respond to biological needs. For this reason, the authors present a global framework inspired by the knowledge extraction process from biological data to classified proteins from their primary structure based on the association rules. This framework has three main steps: The first one is, the pre-processing phase, consists of extracting descriptors by N-Gram technique. The second is the extraction of associations rules, applying the Apriori algorithm. The third step is selecting the relevant rules, and applied the classifier. The experiments of this technique were performed on five classes of protein, extracted from UniProt data bank and compared with five classification methods in the WEKA platform. The obtained results satisfied the authors' purpose to propose an effective protein classifier supported by the N-gram technique and the Apriori algorithm.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Sun, 01 Apr 2018 00:00:00 GMT
       
  • A Novel Approach for Ontology-Based Feature Vector Generation for Web Text
           Document Classification
    • Authors: IGI Global
      Abstract:
      Authors : Mohamed K. Elhadad (Computer Engineering Department, Military Technical College, Cairo, Egypt), Khaled M. Badran (Computer Engineering Department, Military Technical College, Cairo, Egypt), Gouda I. Salama (Computer Engineering Department, Military Technical College, Cairo, Egypt)
      Volume/Issue: 6/1

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018010101
      Date Posted: 1/1/2018 12:00:00 AM The task of extracting the used feature vector in mining tasks (classification, clustering …etc.) is considered the most important task for enhancing the text processing capabilities. This paper proposes a novel approach to be used in building the feature vector used in web text document classification process; adding semantics in the generated feature vector. This approach is based on utilizing the benefit of the hierarchal structure of the WordNet ontology, to eliminate meaningless words from the generated feature vector that has no semantic relation with any of WordNet lexical categories; this leads to the reduction of the feature vector size without losing information on the text, also enriching the feature vector by concatenating each word with its corresponding WordNet lexical category. For mining tasks, the Vector Space Model (VSM) is used to represent text documents and the Term Frequency Inverse Document Frequency (TFIDF) is used as a term weighting technique. The proposed ontology based approach was evaluated against the Principal component analysis (PCA) approach, and against an ontology based reduction technique without the process of adding semantics to the generated feature vector using several experiments with five different classifiers (SVM, JRIP, J48, Naive-Bayes, and kNN). The experimental results reveal the effectiveness of the authors' proposed approach against other traditional approaches to achieve a better classification accuracy F-measure, precision, and recall.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Jan 2018 00:00:00 GMT
       
  • A Matching Approach to Factor Scores Based on Online Sponsored Search
           Auction
    • Authors: IGI Global
      Abstract:
      Authors : Xiaohui Li (Computer Science and Technology College, Harbin Engineering University, Harbin, China), Hongbin Dong (Computer Science and Technology College, Harbin Engineering University, Harbin, China), Yang Zhou (College of Humanities and Social Sciences, Harbin Engineering University, Harbin, China), Jun He (Department of Computer Science Aberystwyth University, Aberystwyth, UK)
      Volume/Issue: 6/1

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018010102
      Date Posted: 1/1/2018 12:00:00 AM How does a search engine company decide which advertisements to display for each query to maximize its revenue' This turns out to be a generalization of the online bipartite matching problem. In this paper, search engines decide the strategy to allocate resources with an advertiser credibility factor under budget constraints. Based on the optimal algorithm, which is the notion of a trade-off revealing LP, this paper remains the competitive ratio as 1-1/e with an advertiser credibility factor. During the ranking in the keywords auctions, the authors calculate factor scores. The new arrival keywords should match to the advertisement which has the maximum factor scores. The amount of spent money, budget constraints, CTR (Click Through Rate) and a credibility factor are added to the trade-off function using in the authors' algorithms. In the long term, users tend to use the search engine with high credibility, which will bring greater revenues. The search engine will attract advertisers to bid on keywords and improve their credibility actively.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Jan 2018 00:00:00 GMT
       
  • Determinants of Personal Health Information Disclosure: A Case of Mobile
           Application
    • Authors: IGI Global
      Abstract:
      Authors : Kanokwan Atchariyachanvanich (Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand), Nichaporn Mitinunwong (Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand), Butsaraporn Tamthong (Faculty of Information Technology, King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand), Noboru Sonehara (Information and Society Research Division, National Institute of Informatics, Tokyo, Japan & Tsuda University, Tokyo, Japan)
      Volume/Issue: 6/1

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018010103
      Date Posted: 1/1/2018 12:00:00 AM This study explored the factors that affect personal health information (PHI) disclosure via a mobile application (app) in Thailand. Since mobile apps are increasingly popular, as is the Thai people's concern on their health condition, many mobile app service providers want to know which factors would persuade customers to reveal their PHI via mobile apps. This research model was, therefore, developed and included the six factors of: personalized service, self-presentation, mobile app reputation, familiarity, perceived benefits and privacy concerns. The hypotheses were tested by structural equation modeling using the questionnaire responses from 294 valid subjects. Surprisingly, privacy concern was not significantly negatively related to the intention to disclose PHI. However, the significance effect of the perceived benefit, personalized service and self-presentation were consistent with previous studies. In addition, the respondents were willing to reveal different personal information in different situations. The implication of the result will shed light on the development of a healthcare mobile app service provider.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Jan 2018 00:00:00 GMT
       
  • Evaluating the Understandability of Android Applications
    • Authors: IGI Global
      Abstract:
      Authors : Ahmad A. Saifan (Faculty of IT, Software Engineering Department, Yarmouk University, Irbid, Jordan), Hiba Alsghaier (Faculty of IT, Computer Information Systems Department, Yarmouk University, Irbid, Jordan), Khaled Alkhateeb (Yarmouk University, Irbid, Jordan)
      Volume/Issue: 6/1

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018010104
      Date Posted: 1/1/2018 12:00:00 AM Understandability is one of the major quality attributes used to measure the understandability of object oriented software and Android applications based on certain metrics. It is very important in most software development life cycles because misunderstanding any of the steps of the software development life cycle will lead to a poor-quality product. Mobile applications, like any software, need to be maintained and evolved over time, so understanding them is essential to their maintainability, reliability, quality and reusability. In this research, the authors discuss the importance of understandability in Android applications and determine the most influential metrics by using Metrics Reloaded tool to measure the metrics values. Then, based on these values, they develop a formula to measure the understandability for Android applications. The results show that the understandability of Android application can be measured by the formula developed based on object oriented and Android metrics.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Jan 2018 00:00:00 GMT
       
  • Fuzzy Mutual Information Feature Selection Based on Representative Samples
    • Authors: IGI Global
      Abstract:
      Authors : Omar A. M. Salem (Faculty of Computer Science and Informatics, Suez Canal University, Ismailia, Egypt), Liwei Wang (International School of Software, Wuhan University, Wuhan, China)
      Volume/Issue: 6/1

      ISSN : 2166-7160
      E
      ISSN : 2166-7179

      DOI : 10.4018/IJSI.2018010105
      Date Posted: 1/1/2018 12:00:00 AM Building classification models from real-world datasets became a difficult task, especially in datasets with high dimensional features. Unfortunately, these datasets may include irrelevant or redundant features which have a negative effect on the classification performance. Selecting the significant features and eliminating undesirable features can improve the classification models. Fuzzy mutual information is widely used feature selection to find the best feature subset before classification process. However, it requires more computation and storage space. To overcome these limitations, this paper proposes an improved fuzzy mutual information feature selection based on representative samples. Based on benchmark datasets, the experiments show that the proposed method achieved better results in the terms of classification accuracy, selected feature subset size, storage, and stability.This article is available on IGI Global’s premier research database, InfoSci-Journals. To obtain a copy of this article, click here. For more information about the International Journal of Software Innovation (IJSI) click here.
      PubDate: Mon, 01 Jan 2018 00:00:00 GMT
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 54.80.102.170
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-