The document describes a novel approach to question answering on mobile devices for domain-specific questions, focusing on Mexico's labor law domain. It presents an architecture that allows users to ask questions in natural language via mobile devices. The questions are processed by intelligent agents that search text from Mexico's Federal Labor Law using various techniques like analyzing the question, searching relevant articles and passages, and applying lemmatization, specialized thesauri, or fuzzy string matching to extract the answer. Evaluation on a corpus of labor law showed the approach can effectively and reliably answer domain-specific questions on mobile devices.
CONNECTING O*NET® DATABASE TO CYBERSECURITY WORKFORCE PROFESSIONAL CERTIFICAT...IJITE
The Occupational Information Network O*NET is considered the primary source of occupational
information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce
readiness certification programs. The O*NET database is used to map out education requirements and how
they relate to professional certifications as required by employers and job designers in accordance with the
National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information
Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Statistics (BLS),
and finally tied back to NICCS source work role to identify certifications requirements. I found that no site
has listed any certification as required, desirable or mandatory. NICCS offered general guidance to potential
topics and areas of certification. Careeronestop site provided the ultimate guidance for this role certification.
Professional certifications are still not integrated in the Cybersecurity Workforce Framework official
guidance.
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...IAIN Datokarama Palu
The emergence of social media is enabling researchers to consider new data collection and triangulation strategies. Quantitative researchers have taken advantage of the emergence of the Internet as a medium to gather data. Meanwhile, interpretive researchers are only now being able to harness the potential that social media provide in generating more insight into collected data. Using a case of government e-procurement implementation and use in an Indonesian regency, we illustrate how social media exchange, postings, and conversations can be used as a source of rich qualitative data to enhance understanding of a topic being studied. Our findings show that monitoring social media exchange, postings, and conversation can strengthen our understanding and interpretation of offline data (such as interviews). This study contributes to literature on the use of online media for interpretive data collection.
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
Wow! Nearly 3,000 views since I posted this document.
I wrote this to help five R&D project managers to document the results of their efforts. It appears many of you found it helpful, as well.
CONNECTING O*NET® DATABASE TO CYBERSECURITY WORKFORCE PROFESSIONAL CERTIFICAT...IJITE
The Occupational Information Network O*NET is considered the primary source of occupational
information in the U.S. I explore here possible uses of O*NET data to inform cybersecurity workforce
readiness certification programs. The O*NET database is used to map out education requirements and how
they relate to professional certifications as required by employers and job designers in accordance with the
National Initiative for Cybersecurity Careers and Studies (NICCS). The search focuses on the “Information
Security Analysts” occupation as listed on O*NET, Careeronestop, U.S. Bureau of Labor Statistics (BLS),
and finally tied back to NICCS source work role to identify certifications requirements. I found that no site
has listed any certification as required, desirable or mandatory. NICCS offered general guidance to potential
topics and areas of certification. Careeronestop site provided the ultimate guidance for this role certification.
Professional certifications are still not integrated in the Cybersecurity Workforce Framework official
guidance.
The Use of Social Media to Gather Qualitative Data: A Case of Government E-P...IAIN Datokarama Palu
The emergence of social media is enabling researchers to consider new data collection and triangulation strategies. Quantitative researchers have taken advantage of the emergence of the Internet as a medium to gather data. Meanwhile, interpretive researchers are only now being able to harness the potential that social media provide in generating more insight into collected data. Using a case of government e-procurement implementation and use in an Indonesian regency, we illustrate how social media exchange, postings, and conversations can be used as a source of rich qualitative data to enhance understanding of a topic being studied. Our findings show that monitoring social media exchange, postings, and conversation can strengthen our understanding and interpretation of offline data (such as interviews). This study contributes to literature on the use of online media for interpretive data collection.
Sentiment analysis of comments in social media IJECEIAES
Social media platforms are witnessing a significant growth in both size and purpose. One specific aspect of social media platforms is sentiment analysis, by which insights into the emotions and feelings of a person can be inferred from their posted text. Research related to sentiment analysis is acquiring substantial interest as it is a promising filed that can improve user experience and provide countless personalized services. Twitter is one of the most popular social media platforms, it has users from different regions with a variety of cultures and languages. It can thus provide valuable information for a diverse and large amount of data to be used to improve decision making. In this paper, the sentiment orientation of the textual features and emoji-based components is studied targeting “Tweets” and comments posted in Arabic on Twitter, during the 2018 world cup event. This study also measures the significance of analyzing texts including or excluding emojis. The data is obtained from thousands of extracted tweets, to find the results of sentiment analysis for texts and emojis separately. Results show that emojis support the sentiment orientation of the texts and those texts or emojis cannot separately provide reliable information as they complement each other to give the intended meaning.
Wow! Nearly 3,000 views since I posted this document.
I wrote this to help five R&D project managers to document the results of their efforts. It appears many of you found it helpful, as well.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...eraser Juan José Calderón
Law, Ethics and Tech Aspects for an Irrevocable
BlockChain Based Curriculum Vitae Created by Big
Data Analytics Fed by Internet of Things, Sensors and
Approved Data Sources. Vasilios Kanavas, Athanasios Zisopoulos & Konstantinos Spinthiropoulos
Comparative review on information and communication technology issues in educ...riyaniaes
The use of information and communication technology is very beneficial in the education sector because it can enhance the quality of education. However, the implementation of ICT in the education sector of developed and developing countries is a challenging task. This paper explains the comparative study of ICT issues in the education sector of developed and developing countries. In particular, we compare issues between Pakistan and high-tech countries. Our study reveals the fact that the education sector is facing numerous ICT problems that are based on culture, finance, management, infrastructure, lack of training, lack of equipment, teacher’s refusal, and ethical issues. At the end of this paper, various issues faced by the implementation of ICT in the education sector of Pakistan have been categorized into various types, namely, infrastructure, lack of IT professionals, lack of high-speed internet and equipment. Our research is based on five key research questions related to ICT issues. We used a mixed approach where the results of this study can be used as a set of guidelines to help make the learning environment technology-oriented, fast, planned, and productive. Future directions are also given at the end of this paper.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP
and Android to provide a robust, secure, user friendly solution.
Going Mobile With Enterprise Applications - A study on user behavior and perceptions.
This paper presents findings from three research studies carried out to understand the user behavior and explore the value in using mobile devices for accessing enterprise products.
The focus is essentially on the expectations of the end-‐users, namely, information technology (IT) administrators. In this case, we were exploring how the users of enterprise products might want to leverage mobile technology to access their everyday tasks and information, and therefore identify potential opportunities and challenges for extending their user experience to such devices.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Semantics in Financial Services -David NewmanPeter Berger
David Newman serves as a Senior Architect in the Enterprise Architecture group at Wells Fargo Bank. He has been following semantic technology for the last 3 years; and has developed several business ontologies. He has been instrumental in thought leadership at Wells Fargo on the application of Semantic Technology and is a representative of the Financial Services Technology Consortium (FSTC)on the W3C SPARQL Working Group.
The internet of things is an emerging technology that is currently present in most processes and devices, allowing to improve the quality of life of people and facilitating the access to specific information and services. The main purpose of the present article is to offer a general overview of internet of things, based on the analysis of recently published work. The added value of this article lies in the analysis of the main recent publications and the diversity of applications of internet of things technology. As a result of the analysis of the current literature, internet of things technology stands out as a facilitator in business and industrial performance but above all in improving the quality of life. As a conclusion to this document, the internet of things is a technology that can overcome the challenges in terms of security, processing capacity and data mobility, as long as the development related to other technologies follows its expected course.
Law, Ethics and Tech Aspects for an Irrevocable BlockChain Based Curriculum V...eraser Juan José Calderón
Law, Ethics and Tech Aspects for an Irrevocable
BlockChain Based Curriculum Vitae Created by Big
Data Analytics Fed by Internet of Things, Sensors and
Approved Data Sources. Vasilios Kanavas, Athanasios Zisopoulos & Konstantinos Spinthiropoulos
Comparative review on information and communication technology issues in educ...riyaniaes
The use of information and communication technology is very beneficial in the education sector because it can enhance the quality of education. However, the implementation of ICT in the education sector of developed and developing countries is a challenging task. This paper explains the comparative study of ICT issues in the education sector of developed and developing countries. In particular, we compare issues between Pakistan and high-tech countries. Our study reveals the fact that the education sector is facing numerous ICT problems that are based on culture, finance, management, infrastructure, lack of training, lack of equipment, teacher’s refusal, and ethical issues. At the end of this paper, various issues faced by the implementation of ICT in the education sector of Pakistan have been categorized into various types, namely, infrastructure, lack of IT professionals, lack of high-speed internet and equipment. Our research is based on five key research questions related to ICT issues. We used a mixed approach where the results of this study can be used as a set of guidelines to help make the learning environment technology-oriented, fast, planned, and productive. Future directions are also given at the end of this paper.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP
and Android to provide a robust, secure, user friendly solution.
Going Mobile With Enterprise Applications - A study on user behavior and perceptions.
This paper presents findings from three research studies carried out to understand the user behavior and explore the value in using mobile devices for accessing enterprise products.
The focus is essentially on the expectations of the end-‐users, namely, information technology (IT) administrators. In this case, we were exploring how the users of enterprise products might want to leverage mobile technology to access their everyday tasks and information, and therefore identify potential opportunities and challenges for extending their user experience to such devices.
State regulation of the IoT in the Russian Federation: Fundamentals and chall...IJECEIAES
The purpose of this section is to study the problems with implementing technical and legal regulations for the development of public administration functions in the Russian Federation when using the internet of things (IoT). The introduction is based on an analysis of regulatory legal acts and presents the main strategic directions for the development of public administration functions in the Russian federation when using IoT. State reports, scientific literature, a system of technical and legal regulation are analyzed, and the main problems of implementing the IoT that impede the achievement of effective public administration are studied. The Russian practice of using IoT in various economic areas is investigated. Based on an analysis of the mechanisms for ensuring data safety of information technology users in the Russian federation, problems were investigated, such as the collecting data through IoT, including publicly available personal data in order to profile human activities, and creating of a digital twin of a person. The social constraints for introducing distributed registry technologies are users' distrust in the field of data privacy protection and mathematical algorithms that are used to establish trust in a digital environment instead of trusted centralized intermediaries; these problems were also analyzed. The Russian approach was analyzed in comparison to European experience in this field. To ensure information security and the possibility of its distribution, the IoT is revealed.
Assessing the adoption of e government using tam model case of egyptIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
ASSESSING THE ADOPTION OF E-GOVERNMENT USING TAM MODEL: CASE OF EGYPTIJMIT JOURNAL
Electronic government (e-government) was known as an efficient method for government expertness and proficiency as a vital facilitator for citizen-oriented services. Since their initiation over a decade ago, Egovernment services are recognised as a vehicle for accessing online public services. Both governments and academic researchers understand the difficulty of low-level adoption of e-government services among citizens; a common problem between both developing and developed countries. This paper investigates determinants and factors necessary to enhance adoption of citizens for e-government services in developing countries, with particular focus on Egypt, by extending the Technology Acceptance Model (TAM) using a set of political, social, and design constructs that were developed from different sources of research literature.
Semantics in Financial Services -David NewmanPeter Berger
David Newman serves as a Senior Architect in the Enterprise Architecture group at Wells Fargo Bank. He has been following semantic technology for the last 3 years; and has developed several business ontologies. He has been instrumental in thought leadership at Wells Fargo on the application of Semantic Technology and is a representative of the Financial Services Technology Consortium (FSTC)on the W3C SPARQL Working Group.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
Artificial Intelligence - Implications for Business Strategy 2017-11-20. MIT-...Winston Dodson
Mixing two clichés - “Change happens!”. Our challenge in business, as in life, is to not only to meet these challenges but to take advantage of them while benefitting ourselves, our associates and our societies. The fast-moving development of Artificial Intelligence (AI) is a significant change and we may be living through an inflection point caused by these developments. In order to understand how we meet these many challenges must first understand AI.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
Running head PROFESSIONAL INTERVIEW REPORT 1PROFESSIONAL INT.docxjeanettehully
Running head: PROFESSIONAL INTERVIEW REPORT 1
PROFESSIONAL INTERVIEW REPORT 4
Experience as a Computer Scientist
Opening Statement
For this report, the professional interviewed is a computer Engineer/ Web Developer who works for Omnivision Technologies Inc., a corporation that designs and develops advance digital technologies to use in mobile phones, notebooks, security cameras etc. across the United States. The interviewee is the technical manager of the organization and works at its headquarters in Santa Clara, California and has been working in this position for the last five years. This computer science expert provided very useful information about the computer science profession and highlighted a number of challenges common in the career. Further, he provided some recommendations on how the challenges can be dealt with. From the information provided by the interviewee, it is clear that the computer science profession is full of challenges particularly regarding the fast changing technology. The interview revealed several important topics which require further research.
Methodology
The interview was conducted on a skype video call and lasted for slightly above 30 minutes. Before the interview, the interviewee was contacted one hour in advance in order to avoid an ambush. He was also made to understand that the questions which were to be asked during the interview regards the profession, its concerns and challenges. The phone call was recorded during the entire conversation and the information later transcribed and key points extracted. This report is based only on important points and not everything that the interviewee said.
Essential Background
Computer science is a field of technology that deals with studying processes that interact with data and which can be depicted as data in program form. Skills in computer science enables one to manipulate, use, or communicate digital information using programing algorithms. An expert in computer science has knowledge in computation theory as well as the practice of software systems design. Computer scientists are also popularly known as computer and information scientists and can work in a range of environments. For instance, these professionals work in private software publishers, government agencies, academic institutions, and engineering firms (Page & Smart, 2013). Wherever they work, computer scientists’ general roles include solving computing problems as well as developing new products.
The professional interviewed for this report has in-depth knowledge in computer systems and management. Through his leadership skill, he organizes the successful delivery of effective and efficient technical solutions within the company. In particular, he is responsible for planning, designing, developing, production, and testing communication systems. He is also responsible for supervising technical and operations teams, landline and cellular network, IT infrastructure, and service platforms. He ...
Submit by 6am on 16th JuneAs a backlash, the professional mode.docxpicklesvalery
Submit by 6am on 16th June
As a backlash, the professional model, which reflects a "we are the experts and you are not" attitude, alienated the police from the public. Problems and crime kept growing, and people wanted to be more involved in their communities. Therefore, community members started to work closely with the police. The police saw their resources diminish and decided it was critical to engage the communities to more effectively combat rising crime.
Today, the vast majority of law enforcement agencies state that they subscribe to the community policing philosophy. The implementation of the philosophy is varied, but most agencies acknowledge the value of having a positive working relationship within the community.
Thus, it is important to understand the history of modern policing to comprehend some possible conclusions as to why agencies began adopting the community policing philosophy.
Tasks:
Prepare a three to four page report answering the following questions.
· What are the main reasons for the majority of US law enforcement agencies to adopt the community policing philosophy?
· What is the most important aspect of community policing that is attractive to the community?
· What is the most important aspect of community policing that is attractive to the police?
· What aspects of prior policing models are not acceptable in today's communities?
Note: Use at least three scholarly sources, with at least one source that is not part of the assigned readings. Include a separate page at the end of the report, in APA format, that links back to your in-text citations and supports your recommendations.
Assignment 3 Grading Criteria
Maximum Points
Analyzed the main reasons that led the majority of US law enforcement agencies to adopt the community policing philosophy.
28
Evaluated the most important aspect of community policing that is attractive to the community and the police.
28
Evaluated various aspects of prior policing models that are not acceptable in today's communities.
24
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in the accurate representation and attribution of sources; and used accurate spelling, grammar, and punctuation.
20
Total:
100
Class,
I'm providing a recently example of a critical analysis written by Dr. Valorie King. This example is based on the 1st case study for this class, CSIA 350.
I think most of you have a good idea of what's required for the case studies, but use the information as you need. I will continue to grade appropriate.
A Critical Analysis (CA) is a discussion response that has an introductory paragraph, an analysis section (around 3 paragraphs or so), and a brief summary. For Case Study #1, a really good CA would have looked something like this:
There are many reasons why a business should invest in cybersecurity products and services. In [her / his] essay, [student name] addressed ethical principles which drive such investments. While ethics are impor ...
Read and analyze the attached case. You must discuss the case and ho.pdfinfo324235
Read and analyze the attached case. You must discuss the case and how Information Technology
is used or misused. Discuss the effectiveness and ineffectiveness of its application if appropriate,
or discuss your opinion of the case and how IT could have been more effectively used.
Each analysis must be at least 1-2 pages in length and no more than 3 pages. It should include a
section summarizing the case (1-2 paragraphs), and then an analysis of how IT was used or
misused. The analysis portion must be the bulk of the feedback. I am looking for your
observations of the case, what you think!!
http://www.gao.gov/assets/680/674906.pdf
Solution
Computer crime is a very vast topic. It includes many mal functions by computer users. It is all
about making bad use of information technology for personal interest or in order to create
troublesome situation for others.
Plagiarism is one aspect. It is passing off the work of other people as your own without giving
any credit to them. Piracy is another topic worth thinking about because people make a lot of
effort and spend lot of money to create or make something where other just make a copy of them
instant of buying the original one. Crackers are basically attention who break into computer
system and make illegitimate use of them. With the rapid evolution in Information Technology,
the numbers of crackers are also growing. It is very difficult to get hold of all these issues that is
why we have some association running, aiming to reduce and stop these concerns.
nformation technology and its systems have become so important that large organization can no
longer operate without them, not to mention operate efficiently. Each organization has its unique
purpose, use of information technology is now becomes one of most important means to achieve
the goals as claimed by Hawkins (2004). Technology could increase an organization’s
effectiveness by refine its operations, business process and internal collaboration. In the context
of education, technology could break down communication barriers between students and
faculties and among students themselves. For example, email system could enable lecturers and
students have effective communication when both of them are remote from campus and located
at different time zone of the world. Technology could also help students have better access to the
learning information, experts and learning communities. In most universities’ library system,
students could now access, view and finding citations of thousands of academic journals which
are integral part of student’s academic study from its online database and database’s associated
subscriptions. Technology could also enable active new learning modes, such as multi-media
teaching, computer lab and virtual learning environment that could connect students from
different parts of the world in one virtual environment simultaneously.
However, technology by itself could not delivery the outcomes desired and pursued by the
organiza.
Building a recommendation system based on the job offers extracted from the w...IJECEIAES
Recruitment, or job search, is increasingly used throughout the world by a large population of users through various channels, such as websites, platforms, and professional networks. Given the large volume of information related to job descriptions and user profiles, it is complicated to appropriately match a user's profile with a job description, and vice versa. The job search approach has drawbacks since the job seeker needs to search a job offers in each recruitment platform, manage their accounts, and apply for the relevant job vacancies, which wastes considerable time and effort. The contribution of this research work is the construction of a recommendation system based on the job offers extracted from the web and on the e-portfolios of job seekers. After the extraction of the data, natural language processing is applied to structured data and is ready for filtering and analysis. The proposed system is a content-based system, it measures the degree of correspondence between the attributes of the e-portfolio with those of each job offer of the same list of competence specialties using the Euclidean distance, the result is classified with a decreasing way to display the most relevant to the least relevant job offers
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Water Industry Process Automation and Control Monthly - May 2024.pdf
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
DOI: 10.5121/ijcsit.2018.10404 39
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC
SUPPORTED BY INTELLIGENT AGENTS
Fernando Zacarias1
, Rosalba Cuapa 2
, Guillermo De Ita1
and Miguel Bracamontes1
1
Computer Science, Universidad Autonoma de Puebla, Puebla, México.
2
Faculty of Architecture, Universidad Autónoma de Puebla, Puebla, México.
ABSTRACT
Search for answers in specific domains is a new milestone in question answering. Traditionally, question
answering has focused on general domain questions. Thus, the most relevant answers (or passages) are
selected according to the type of question and the Named Entities included in the possible answers. In this
paper, we present a novel approach on question answering over specific (or technical) domains. This
proposal allows us to answer questions such as “What article is appropriate for … “, “What are the
articles related to … “, these kind of questions cannot be answered by a general question answering
system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws
regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic
categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly
reliable.
KEYWORDS
Question Answering, Search for Answers, Mobiles, Intelligent Agents, & Question Answering
1. INTRODUCTION
Question Answering (QA – for its acronym in English) is an area that has grown rapidly in recent
years, however this has not been able to respond concretely to specific questions on technical or
specific contexts, although this being the main goal of QA. Currently, many proposals are focused
on answering specific questions in specialized context and have taken much more relevance. This
is because some groups of professionals are reluctant to use general search engines in their
professional activities because they do not receive satisfactory and concrete answers. Those
professionals have their own work habits, and they consider browsing the Web as an inefficient
way to find professional information. In order to satisfy these professionals must consider some
aspects such as build machines search for specialized contexts and build search engines that
provide accurate answers to your questions. This makes it possible to improve search engines
with a specialized QA.
While a lot of effort has been spent on general-purpose QA, few research projects have focused
on domain-specific QA, such as in the labor sector. One of the major problems in the area of labor
expertise lies primarily in two broad themes: First, know each and every one of the existing laws
within the legal framework of the question and second, identify which of these laws may be
applicable to a particular problem into the labor sector. For this reason, we have developed
various strategies to address these problems, one is seeking answers to specific questions within a
particular area, as is the case of “The Labor Law”.
The search for answers through mobile devices is an issue that is growing rapidly in recent years,
due to growing demand from users to obtain satisfactory answers to their needs on large volumes
of digital information currently available. Moreover, mobile search becomes more relevant for the
usability of mobile content, similar to how our machines look online at the usability of web
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
40
content. Currently there are not companies that do not offer a mobile service of some kind. Many
operators in internet portals show their best content available. However, much of the content
developed for mobile devices pass unnoticed by users.
Accordingly, we developed a novel approach based on a fully automated algorithm and
supervised by intelligent agents that allows through a mobile device look for answers that users
demand about labor law. Thus, contrary to what internet systems perform, we seek for answers
concrete to problems related with labor law into the labor sector (specifically for Mexico).
Furthermore, the rapid emergence and growth of mobile technologies has detonated the
development of mobile applications that allow users to satisfy many of their needs from
anywhere, from any mobile device and any time. In addition, we take advantage of the fact that
for every personal computer currently there are more than six mobile devices. In the United States
in 2013, 91% of adults have a cell phone, and of these, 63% use it to connect to internet [1]. This
represents an excellent opportunity for new proposals as presented in this paper. New trends in
the area of question answering has emerged as a new interesting research domain, various
proposals are still based predominantly on processing questions and methodologies for the
extraction of answers. Today, question-answering systems are primarily focused on to answer
questions from casual users, i.e., from the point of view of a user who does not have expertise in
the field of treating search. Therefore, questions have as answer a fact, situation or specific data.
Gradually has increased the level of difficulty of questions, for instance, questions whose answer
is a list of instances or a definition. For this reason, in this paper we extend the existing
approaches to QA systems to deal with domain-specific questions. In particular, our algorithm
makes use of a set of laws that apply to a specific domain called "Federal Labor Law", which
governs labor relations in Mexico.
2. LABOR LAW AS SPECIFIC DOMAIN
The labor justice system is responsible for effective enforcement of labor laws, together with
other instances like the labor inspectorate and trade unions themselves. The malfunctioning of
such a system, creates a strong incentive for employers to choose for not respecting the workers’
rights, with the expectation that they will desist from claiming them facing the many obstacles
that would have to overcome to implement them. Thus, one of the most common problems in our
country is the lack of knowledge of laws concerning workers, that is, the information exists but is
not divulged properly or adequately. Therefore, we have developed a system based on the search
for answers that will allow the system to recover accurate information tailored to user's request,
allowing you to always know the laws that apply to your specific case. In addition, we incorporate
mobile technologies that can be put into the user's hand a tool that allows you to make your
natural language queries and whose goal is to know his rights enshrined by law. Our main
objective is modeling and development of a tool to assist in understanding and correct application
of our Mexican labor law. With this novel proposal, we solve the needs that demand sectors such
as: accounting firms, universities, offices, employees, etc.
3. STATE OF THE ART
The general QA systems have focused all their energy to answer common sense questions.
Namely, they often try to answer questions whose answer types are: date, person name,
organization and so on. For instance,
When was Trec-10 held? Or Who was the President of USA?
Whose answers type are DATE and PERSON respectively. Recent research has focused on
developing systems for question answering to open domain, that is, systems that takes as their
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
41
source of information a collection of texts on a variety of topics, and solve questions whose
answers can be obtained from the collection of departure. From question answering systems
developed so far, we can identify three main phases [2]:
3.1. THE QUESTION IS ANALYZED
This first phase will identify the type of response expected from the given question, that is
expected to be a question of “When” a kind of response time, or a question “Where” will lead us
to identify a place. Response rates are most commonly used personal name, name organization,
number, date and place.
3.2. RECOVERY OF THE DOCUMENT
In the second stage performs a recovery process on the collection of documents using the
question, which is to identify documents on the question that probably contain the kind of
response expected. The result of this second stage is a reduced set of documents and preferably
specific paragraphs.
3.3. EXTRACTION OF THE ANSWER
The last phase uses the set of documents obtained in the previous phase and the expected type of
response identified in the first phase, to locate the desired response. Definition questions needs a
more complex process in the third stage, since they must obtain additional information segments
and at the same time are not repetitive. To achieve a good “definition” must often resort to
various documents [2].
Currently the question answering on mobile devices for open domains, there are several
commercial proposals how to we can see in [2] and [3].Seb Maslin founded the application shown
on [2]. 199QUERY is the premier Australian and New Zealand Text service that answers any
question sent to it by SMS using a combination of human experts and sophisticated algorithms to
provide bespoke answers to any customer query. We note that applications 199query and AQA
[2], which are not fully automatic because they require human assistance for its operation, as well
as the use of such applications is limited, that is, you can count on their service only in countries
where they operate. As opposed to our proposal, which is supported by intelligent agents for each
of the techniques employed in our system. In next section, we present the architecture used for
our mobile application.
4. MOBILE ARCHITECTURE
The development of mobile technology evolves vertiginously achieving change the behavior of
societies radically. Just a few years ago, the penetration of mobile devices had only reached that
users saw as entertainment devices and multimedia applications. However, these have evolved
and grown from a simple consumers to be demanding customers, now not only used as a means of
entertainment, but now are also socializing, buying, searching, creating content, etc., even now,
these new users are referred to the term “prosumer” [4]. This term applies to users who act as
channels of human communication, which means that at the same time be a consumer, are at the
same time content producers. A “prosumer” has no lucrative purposes only participate in a digital
medium of exchange of information; such is the case of peer-to-peer, networks interchangeable
pairs. The word “prosumer” perfectly describes to million participants in the revolution of Web
2.0, because there are more and more people involved uploading information to the network and,
at the same time are consumers of it, thereby creating a world of possibilities in all aspects.
Furthermore, the mobile network is different, the bandwidth is narrow, and delays are greater than
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
42
in the Personal Computer /Wired network, which supports 2 Megabits per second. The challenges
for developing an application for the mobile environment are mainly these obvious differences
between the Mobile network and the wired environment. Thus, the choice of infrastructure for
application development is critical because response times are crucial to the acceptance thereof by
the users. For this reason, we have designed an architecture that allows for processing hard on our
server with intelligent and rapid methods that allow users to provide timely and accurate answers
to your questions. Moreover, In Mexico charges 4 cents per KiloByte. Which gives us an
adequate means to provide correct and accurate answers at low cost [5].
The proposed architecture for this application consists of two main modules: one focused on
extracting the answers to the question given and other to send the response through a mobile
device. The modules of the architecture system has the following functionalities:
4.1. MOBILE QUESTION ANSWERING
Is the user interface for mobile device, which is responsible for communicating via GPRS
(General Packet Radio Service), 3G o Wi–Fi with, web service definition question answering [5].
4.2. WEB SERVICE DEFINITION QUESTION ANSWERING
Is the web service that satisfy all demands of mobile question answering, as well as requests the
site and will have the task of looking for answer to questions of “definition”. In figure 1, we can
observe the architecture used in our proposal. With this architecture our server can attend all
requests made from mobile devices and to each of these respond through the GPRS service. This
architecture makes use of the gprs technology. Assumes a new switching network superimposed
on the conventional GSM network. This technology is chosen for its high speed in data transfer.
Furthermore, its availability on mobile devices is by default as well as its low cost.
Figure1. Architecture for mobile application
Our method to question answering uses the Mexican Labor Law as collection of documents. We
take advantage two qualities: 1) The Mexican Labor Law is organized into sections that are
chapters, that is, a set of articles belonging to a section refers to a single topic and, 2) Each article
has a unique small description that we call it issue. Thus, we can index our corpus based on these
two characteristics, significantly improving recovery of relevant information. In general, our
process to answer questions asked by users consists of three main modules that we will present in
detail later.
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
43
5. MOBILE QUESTION ANSWERING IN SPECIFIC-DOMAINS
The Mexican Labor Law are statutory provisions governing labor-management relations, that is,
where are specified the rights and obligations to each one. In this law, there are 1010 articles,
which talk about an issue specific. In our proposal we took advantage of the structure that labor
law has, i.e., this has a brief general description for each of the articles that we used as passages.
In a similar form, similarly, we exploit the fact that the articles are grouped into chapters. Finally,
we use a specialized dictionary of labor terms.
Our algorithm is based on the integration of two databases described as follows:
First of these consists of five sections for each article, these sections are created with Lucene [6],
which serve as indices in search for articles (answers), to know:
The article’s number
The subject article formed by a brief description of issue addressed, as well as chapter to
which it belongs
The general description
The combination, i.e., the combination of content and topic
A thesaurus, that is, a list of specialized terms in the labor area. The second database is
similar to the first, except that this will use lemmatization.
With respect to lemmatization, we developed our own lemmatisation algorithm truncating the last
letters of the word to take only roots of the words. Finally, we define an efficient algorithm that
allows us to obtain the best results in a fast and accurate way that satisfies the user's response.
Our algorithm is supervised by a main intelligent agent, which monitors the remaining agents
embedded in each of the following steps:
1. If query in natural language references an article’s number then, the agent specialized in
this task is invoked to search in section of the article's number by the article required. To
finally the agent deliver to the requesting user and the algorithm stop.
2. If step one does not apply then, our main agent analyze in more detail the query to select
the agent who will transfer control. If the length is short then, the agent entrusted with
section 2 (theme section) is invoked. Thus, this agent is responsible of applying the
algorithm called “NEAR”. “NEAR” tries to find that most of the terms are relatively close
to each other and returns the answer, that is, words with diameter close. In another words,
our algorithm return the most similar word based on root of the word.
3. Similar to step 2, if our main agent detects that not apply either step 1 or 2 then, the agent
responsible for applying lemmatization is invoked. In this search as previous, we use
lemmatisation of the words, but this function is simplest because it only seeks the equity
terms comparing them.
4. If the lemmatization algorithm is not applicable then the principal agent activate the agent
responsible for applying the database without lemmatization, whose goal is to find the
correct answer to the question.
5. On the other hand, the main agent may choose to invoke the agent responsible for applying
the specialized thesaurus. The use of a specialized thesaurus in a domain-specific QA
system is essential. It helps determine the appropriate meaning of terms in the domain. For
example, one of the common meanings of the term “accion” (in Spanish) “effect of
making”. However, in the legal domain, its meaning is “title that certifies and represents the
value of each of those parts”. In order to reduce ambiguity, some semantic information is
added to this kind of term. In our processing of labor-law-related questions, the term
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
44
“accion”, will be tagged with the semantic category “title that certifies” which is a general
concept in our thesaurus. The thesaurus that we have used is found in [7].
6. Finally, as final strategy we use a function called “FUZZY”, in this function we use the
Levenshtein algorithm. The Levenshtein algorithm is described as distance of editing, that
is, the minimum number of operations required to transform one string characters in
another can be an insertion, deletion or substitution of a character, for this, we use a
dictionary of words. In this way we are sure to transform a natural language word for
another that whether this contained in our database.
Thus, our algorithm finds the best response to the user, i.e., our algorithm deliver: the article(s)
request(s), articles related to the question asked by the user, the passage nearest to article(s)
requested, but in all cases, it delivers a concrete and correct answer.
6. FINDINGS
In this section we present the evaluation that we have made to our system in order to have a clear
perspective of system efficiency. For this, we have developed a series of tables, which present the
results obtained with our system. To test our system we consider a corpus of 100 questions from
students and professors of the faculty of the Accounting School at Universidad Autónoma de
Puebla.
As shown in Table 1 the results obtained by agent that apply the methodology called without
Stop-words are acceptable, considering that in this case, our algorithm removes only empty words
such as: preposition, conjunctions, question words, articles, etc. Likewise, all words are
eliminated whose repetition frequency is high, some of these are work, workers, article, boss, etc.,
as used in [8]. Thus, our proposal gives an added value to our application, since it allows users to
make their requests without worrying about their writing.
Table 1. Results With-out Stop-Words
Next, in Table 2 the results obtained are shown two strategies called lemmatisation and near. In
this case, the results are better than previous in 15%, this means that our proposal improves when
our agents combine their results. This is one of the advantages provided by the use of intelligent
agents. This is because an agent decide whether it is desirable or not to use a more sophisticated
strategy. This decision is based on the certainty of results, ie, if they are very low (55% to 65%)
then used some of these strategies and even the combination of these. It is important to note that
the use of intelligent agents allows correct decision making.
Table 2. Lemmatisation & Near
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
45
Finally, in table 3 our results are presented, which as you can see are very good. Thus, at the
bottom of the table 3, it presents the best results obtained by our system. Of 100 questions raised
in natural language to our system, it answer 81% of these, that is of 10 questions raised to our
system, this answer 8 correctly in the first instance. And if we allow the system give 3 answers to
each question, this increases their effectiveness to 90%, improving the results reported by other
similar systems. This result is excellent for this type of systems, considering that the terminology
used is very technical. This means that we can consider that our system is as effective as a
specialist advisor. In addition, if we look more instances, our system achieves a certainty of 92%,
making it even better than as any human does.
Table 3. Satisfactory results obtained by our proposal
7. MOBILE SYSTEM FOR QA
The rapid evolution of technology, especially focused on mobile devices and wireless network,
has allowed more people to acquire these services. Now is not necessary to have a computer and
an internet provider at home, mobile data coverage of different companies has begun to replace
this service. If also added that mobile phones have the GPRS service included in the WAP
protocol, this makes it more attractive than an application run on these.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
46
Figure 2. Mobile application for Question Answering
In figure 2, the interface of mobile application developed to answer questions related to Mexican
labor law in natural language is deployed. This gives an added value to our proposal. This
application was developed in Spanish language, because it is used in Mexico and the Mexican
labor law is in Spanish, in addition, users are Spanish speaking. The architecture used for the
development of this application is similar to that presented in [5], [8] and [9]
8. CONCLUSIONS
We have developed a mobile system for question answering (mQA) in the context of the Mexican
labor law, achieving a number of successes 92%, and a response time between 12 and 20 seconds.
However, the most remarkable aspect is effectiveness achieved by our system. We have
developed the basis for the implementation of a new methodology to answer questions in natural
language for specific domains.
Consider that our system for search for answers in domain-specific is a very useful tool in
everyday life, and that any user may take advantage of their information to certain difficulties that
arise, as well as the great interactivity that this provides to Question Answering systems. Also,
consider the Lucene system as a useful tool in extracting passages, versatility and flexibility
provided by the tool makes the task of searching for question answering is simpler and more
accurately.
As future work, we can incorporate other dictionaries of terms to be used as synonyms for words
infrequently. With this, you can get more certainty and achieve 100% effectiveness. Furthermore,
we can implement a method of validation of answers to questions about the Mexican Labor Law.
Finally, we can use "InQuery" for the extraction of passages and compare it with ours.
ACKNOWLEDGEMENTS
The authors wish to thank The Universidad Autónoma de Puebla for their financial support. In
addition, we appreciate support of the academic body Combinatorial Algorithms and Learning.
REFERENCES
[1] PewResearchCenter (2013). Internet, Science & Tech. Informe de Pew Internet. Teens and technology
2013. http://www.pewinternet.org/2013/03/13.
[2] Burger John, Cardie Claire, Chaudhri Vinay, Gaizauskas Robert, Harabagiu Sanda, Israel David,
Jacquemin Christian, Lin Chin-Yew, Maiorano Steve, Miller George, Moldovan Dan, Ogden Bill,
Prager John, Rilo+ Ellen, Singhal Amit, Shrihari Rohini, Strzalkowski Tomek, Voorhees Ellen,
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
47
Weishedel Ralph. Issues, Tasks, and Program Structures to Roadmap Research in Question
Answering (QA). Technical Report, National Institute of Standards and Technology.
[3] Bakker, Dik, André Muller, Viveka Velupillai, Soren Wichmann, Cecil, H. Brown, Pamela Brown,
Dmitry Egorov, Robert Mailhammer, Anthony Grant, and Eric W. Holman. (2009). Adding typology
to lexicostatistics: a combined approach to language classification. Linguistic Typology 13: 167-179.
[4] Junyeon Hwang, Myeong in Choi Tacklim Lee Seonki Jeon Seunghwan Kim Sounghoan Park Sehyun
Park. Energy Prosumer Business Model Using Blockchain System to Ensure Transparency and
Safety. Volume 141, December 2017, Pages 194-198. Energy Procedia, Elsevier.
[5] Fernando Zacarias, Rosalba Cuapa, Antonio Sanchez and Iris Cerecedo (2011). Puebla in the palm of
your hands. MoMM 2011: 260-263, ACM New York, USA. ISBN: 978-1-4503-0785-7.
[6] Doug Cutting. (1999). http://lucene.apache.org/.
[7] Nava Tovar A. (2015) Diccionario Jurídico, La institucionalización de la razón. Universidad
Autónoma Metropolitana. http://www.diccionariojuridico.mx/. Anthropos Editorial.
[8] Balderas Espinosa M.A. (2008) Master thesis. Faculty of Computer Science at Universidad Autónoma
de Puebla.
[9] Fernando Zacarias, Rosalba Cuapa, Guillermo De Ita, J.C. Acosta and Daniel Torres (2014). Planning
Solutions in the Real World. International Journal of Artificial Intelligence & Applications. Vol. 5
N0. 3. IJAIA –AIRCC Publishing Corporation
[10] Zhuo, Lyne, Colin, Gonzalo, Jian (2004). Domain-specific QA for the Constructor sector.
AUTHORS
He is researcher and professor of computer science at the Universidad Autónoma de
Puebla. He is a researcher in practical and theoretical computer science and mobile
technologies. He has conducted R&D projects in this area since 2000. Results from
these projects have been reported in more than 60 national and international
publications. Professor Zacarias serves at the editorial board of the Journals: IEEE
Latin America Transactions, Engineering Letters, International Transactions on
Computer Science and Engineering, Common Ground Publishing - Technology,
Learning and Social Sciences.
Guillermo De Ita Luna He did his BS in Computer Science in the Faculty of
Computer Sciences in the Autonomus University of Puebla (BUAP), México. The
master and Ph.D. Programing Electrical Engineering in the Cinvestav - I.P.N.,
México. He has worked by 10 years as developer and consulter for Database Systems
and Geographic Information Systems for different enterprises in México.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 4, August 2018.
48
INTENTIONAL BLANK