Search results

1 – 10 of 141
Article
Publication date: 21 December 2023

Majid Rahi, Ali Ebrahimnejad and Homayun Motameni

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is…

Abstract

Purpose

Taking into consideration the current human need for agricultural produce such as rice that requires water for growth, the optimal consumption of this valuable liquid is important. Unfortunately, the traditional use of water by humans for agricultural purposes contradicts the concept of optimal consumption. Therefore, designing and implementing a mechanized irrigation system is of the highest importance. This system includes hardware equipment such as liquid altimeter sensors, valves and pumps which have a failure phenomenon as an integral part, causing faults in the system. Naturally, these faults occur at probable time intervals, and the probability function with exponential distribution is used to simulate this interval. Thus, before the implementation of such high-cost systems, its evaluation is essential during the design phase.

Design/methodology/approach

The proposed approach included two main steps: offline and online. The offline phase included the simulation of the studied system (i.e. the irrigation system of paddy fields) and the acquisition of a data set for training machine learning algorithms such as decision trees to detect, locate (classification) and evaluate faults. In the online phase, C5.0 decision trees trained in the offline phase were used on a stream of data generated by the system.

Findings

The proposed approach is a comprehensive online component-oriented method, which is a combination of supervised machine learning methods to investigate system faults. Each of these methods is considered a component determined by the dimensions and complexity of the case study (to discover, classify and evaluate fault tolerance). These components are placed together in the form of a process framework so that the appropriate method for each component is obtained based on comparison with other machine learning methods. As a result, depending on the conditions under study, the most efficient method is selected in the components. Before the system implementation phase, its reliability is checked by evaluating the predicted faults (in the system design phase). Therefore, this approach avoids the construction of a high-risk system. Compared to existing methods, the proposed approach is more comprehensive and has greater flexibility.

Research limitations/implications

By expanding the dimensions of the problem, the model verification space grows exponentially using automata.

Originality/value

Unlike the existing methods that only examine one or two aspects of fault analysis such as fault detection, classification and fault-tolerance evaluation, this paper proposes a comprehensive process-oriented approach that investigates all three aspects of fault analysis concurrently.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 17 July 2023

Nghia Nguyen, Thuy-Hien Nguyen, Yen-Nhi Nguyen, Dung Doan, Minh Nguyen and Van-Ho Nguyen

The purpose of this paper is to expand and analyze deeply customer emotions, concretize the levels of positive or negative emotions with the aim of using machine learning methods…

Abstract

Purpose

The purpose of this paper is to expand and analyze deeply customer emotions, concretize the levels of positive or negative emotions with the aim of using machine learning methods, and build a model to identify customer emotions.

Design/methodology/approach

The study proposed a customer emotion detection model and data mining method based on the collected dataset, including 80,593 online reviews on agoda.com and booking.com from 2009 to 2022.

Findings

By discerning specific emotions expressed in customers' comments, emotion detection, which refers to the process of identifying users' emotional states, assumes a crucial role in evaluating the brand value of a product. The research capitalizes on the vast and diverse data sources available on hotel booking websites, which, despite their richness, remain largely unexplored and unanalyzed. The outcomes of the model, pertaining to the detection and classification of customer emotions based on ratings and reviews into four distinct emotional states, offer a means to address the challenge of determining customer satisfaction regarding their actual service experiences. These findings hold substantial value for businesses operating in this domain, as the findings facilitate the evaluation and formulation of improvement strategies within their business models. The experimental study reveals that the proposed model attains an exact match ratio, precision, and recall rates of up to 81%, 90% and 90%, respectively.

Research limitations/implications

The study has yet to mine real-time data. Prediction results may be influenced because the amount of data collected from the web is insufficient and preprocessing is not completely suppressed. Furthermore, the model in the study was not tested using all algorithms and multi-label classifiers. Future research should build databases to mine data in real-time and collect more data and enhance the current model.

Practical implications

The study's results suggest that the emotion detection models can be applied to the real world to quickly analyze customer feedback. The proposed models enable the identification of customers' emotions, the discovery of customer demand, the enhancement of service, and the general customer experience. The established models can be used by many service sectors to learn more about customer satisfaction with the offered goods and services from customer reviews.

Social implications

The research paper helps businesses in the hospitality area analyze customer emotions in each specific aspect to ensure customer satisfaction. In addition, managers can come up with appropriate strategies to bring better products and services to society and people. Subsequently, fostering the growth of the hotel tourism sector within the nation, thereby facilitating sustainable economic development on a national scale.

Originality/value

This study developed a customer emotions detection model for detecting and classifying customer ratings and reviews as 4 specific emotions: happy, angry, depressed and hopeful based on online booking hotel websites agoda.com and booking.com that contains 80,593 reviews in Vietnamese. The research results help businesses check and evaluate the quality of their services, thereby offering appropriate improvement strategies to increase customers' satisfaction and demand more effectively.

Details

Journal of Hospitality and Tourism Insights, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9792

Keywords

Article
Publication date: 3 January 2023

Saleem Raja A., Sundaravadivazhagan Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran and Karthikeyan R.

The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about…

Abstract

Purpose

The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about people and organizations is available online, which encourages the proliferation of cybercrimes. Cybercriminals often use malicious links for large-scale cyberattacks, which are disseminated via email, SMS and social media. Recognizing malicious links online can be exceedingly challenging. The purpose of this paper is to present a strong security system that can detect malicious links in the cyberspace using natural language processing technique.

Design/methodology/approach

The researcher recommends a variety of approaches, including blacklisting and rules-based machine/deep learning, for automatically recognizing malicious links. But the approaches generally necessitate the generation of a set of features to generalize the detection process. Most of the features are generated by processing URLs and content of the web page, as well as some external features such as the ranking of the web page and domain name system information. This process of feature extraction and selection typically takes more time and demands a high level of expertise in the domain. Sometimes the generated features may not leverage the full potentials of the data set. In addition, the majority of the currently deployed systems make use of a single classifier for the classification of malicious links. However, prediction accuracy may vary widely depending on the data set and the classifier used.

Findings

To address the issue of generating feature sets, the proposed method uses natural language processing techniques (term frequency and inverse document frequency) that vectorize URLs. To build a robust system for the classification of malicious links, the proposed system implements weighted soft voting classifier, an ensemble classifier that combines predictions of base classifiers. The ability or skill of each classifier serves as the base for the weight that is assigned to it.

Originality/value

The proposed method performs better when the optimal weights are assigned. The performance of the proposed method was assessed by using two different data sets (D1 and D2) and compared performance against base machine learning classifiers and previous research results. The outcome accuracy shows that the proposed method is superior to the existing methods, offering 91.4% and 98.8% accuracy for data sets D1 and D2, respectively.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 28 February 2023

Lin-Lin Xie, Yajiao Chen, Sisi Wu, Rui-Dong Chang and Yilong Han

Project scheduling plays an essential role in the implementation of a project due to the limitation of resources in practical projects. However, the existing research tend to…

Abstract

Purpose

Project scheduling plays an essential role in the implementation of a project due to the limitation of resources in practical projects. However, the existing research tend to focus on finding suitable algorithms to solve various scheduling problems and fail to find the potential scheduling rules in these optimal or near-optimal solutions, that is, the possible intrinsic relationships between attributes related to the scheduling of activity sequences. Data mining (DM) is used to analyze and interpret data to obtain valuable information stored in large-scale data. The goal of this paper is to use DM to discover scheduling concepts and obtain a set of rules that approximate effective solutions to resource-constrained project scheduling problems. These rules do not require any search and simulation, which have extremely low time complexity and support real-time decision-making to improve planning/scheduling.

Design/methodology/approach

The resource-constrained project scheduling problem can be described as scheduling a group of interrelated activities to optimize the project completion time and other objectives while satisfying the activity priority relationship and resource constraints. This paper proposes a new approach to solve the resource-constrained project scheduling problem by combining DM technology and the genetic algorithm (GA). More specifically, the GA is used to generate various optimal project scheduling schemes, after that C4.5 decision tree (DT) is adopted to obtain valuable knowledge from these schemes for further predicting and solving new scheduling problems.

Findings

In this study, the authors use GA and DM technology to analyze and extract knowledge from a large number of scheduling schemes, and determine the scheduling rule set to minimize the completion time. In order to verify the application effect of the proposed DT classification model, the J30, J60 and J120 datasets in PSPLIB are used to test the validity of the scheduling rules. The results show that DT can readily duplicate the excellent performance of GA for scheduling problems of different scales. In addition, the DT prediction model developed in this study is applied to a high-rise residential project consisting of 117 activities. The results show that compared with the completion time obtained by GA, the DT model can realize rapid adjustment of project scheduling problem to deal with the dynamic environment interference. In a word, the data-based approach is feasible, practical and effective. It not only captures the knowledge contained in the known optimal scheduling schemes, but also helps to provide a flexible scheduling decision-making approach for project implementation.

Originality/value

This paper proposes a novel knowledge-based project scheduling approach. In previous studies, intelligent optimization algorithm is often used to solve the project scheduling problem. However, although these intelligent optimization algorithms can generate a set of effective solutions for problem instances, they are unable to explain the process of decision-making, nor can they identify the characteristics of good scheduling decisions generated by the optimization process. Moreover, their calculation is slow and complex, which is not suitable for planning and scheduling complex projects. In this study, the set of effective solutions of problem instances is taken as the training dataset of DM algorithm, and the extracted scheduling rules can provide the prediction and solution of new scheduling problems. The proposed method focuses on identifying the key parameters of a specific dynamic scheduling environment, which can not only reproduces the scheduling performance of the original algorithm well, but also has the ability to make decisions quickly under the dynamic interference construction scenario. It is helpful for project managers to implement quick decisions in response to construction emergencies, which is of great practical significance for improving the flexibility and efficiency of construction projects.

Details

Engineering, Construction and Architectural Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0969-9988

Keywords

Article
Publication date: 17 April 2024

Jahanzaib Alvi and Imtiaz Arif

The crux of this paper is to unveil efficient features and practical tools that can predict credit default.

Abstract

Purpose

The crux of this paper is to unveil efficient features and practical tools that can predict credit default.

Design/methodology/approach

Annual data of non-financial listed companies were taken from 2000 to 2020, along with 71 financial ratios. The dataset was bifurcated into three panels with three default assumptions. Logistic regression (LR) and k-nearest neighbor (KNN) binary classification algorithms were used to estimate credit default in this research.

Findings

The study’s findings revealed that features used in Model 3 (Case 3) were the efficient and best features comparatively. Results also showcased that KNN exposed higher accuracy than LR, which proves the supremacy of KNN on LR.

Research limitations/implications

Using only two classifiers limits this research for a comprehensive comparison of results; this research was based on only financial data, which exhibits a sizeable room for including non-financial parameters in default estimation. Both limitations may be a direction for future research in this domain.

Originality/value

This study introduces efficient features and tools for credit default prediction using financial data, demonstrating KNN’s superior accuracy over LR and suggesting future research directions.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 28 May 2024

Naurin Farooq Khan, Hajra Murtaza, Komal Malik, Muzammil Mahmood and Muhammad Aslam Asadi

This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive…

Abstract

Purpose

This research aims to understand the smartphone security behavior using protection motivation theory (PMT) and tests the current PMT model employing statistical and predictive analysis using machine learning (ML) algorithms.

Design/methodology/approach

This study employs a total of 241 questionnaire-based responses in a nonmandated security setting and uses multimethod approach. The research model includes both security intention and behavior making use of a valid smartphone security behavior scale. Structural equation modeling (SEM) – explanatory analysis was used in understanding the relationships. ML algorithms were employed to predict the accuracy of the PMT model in an experimental evaluation.

Findings

The results revealed that the threat-appraisal element of the PMT did not have any influence on the intention to secure smartphone while the response efficacy had a role in explaining the smartphone security intention and behavior. The ML predictive analysis showed that the protection motivation elements were able to predict smartphone security intention and behavior with an accuracy of 73%.

Research limitations/implications

The findings imply that the response efficacy of the individuals be improved by cybersecurity training programs in order to enhance the protection motivation. Researchers can test other PMT models, including fear appeals to improve the predictive accuracy.

Originality/value

This study is the first study that makes use of theory-driven SEM analysis and data-driven ML analysis to bridge the gap between smartphone security’s theory and practice.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 23 November 2023

Reema Khaled AlRowais and Duaa Alsaeed

Automatically extracting stance information from natural language texts is a significant research problem with various applications, particularly after the recent explosion of…

299

Abstract

Purpose

Automatically extracting stance information from natural language texts is a significant research problem with various applications, particularly after the recent explosion of data on the internet via platforms like social media sites. Stance detection system helps determine whether the author agree, against or has a neutral opinion with the given target. Most of the research in stance detection focuses on the English language, while few research was conducted on the Arabic language.

Design/methodology/approach

This paper aimed to address stance detection on Arabic tweets by building and comparing different stance detection models using four transformers, namely: Araelectra, MARBERT, AraBERT and Qarib. Using different weights for these transformers, the authors performed extensive experiments fine-tuning the task of stance detection Arabic tweets with the four different transformers.

Findings

The results showed that the AraBERT model learned better than the other three models with a 70% F1 score followed by the Qarib model with a 68% F1 score.

Research limitations/implications

A limitation of this study is the imbalanced dataset and the limited availability of annotated datasets of SD in Arabic.

Originality/value

Provide comprehensive overview of the current resources for stance detection in the literature, including datasets and machine learning methods used. Therefore, the authors examined the models to analyze and comprehend the obtained findings in order to make recommendations for the best performance models for the stance detection task.

Details

Arab Gulf Journal of Scientific Research, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-9899

Keywords

Article
Publication date: 7 June 2022

Sangeetha Yempally, Sanjay Kumar Singh and S. Velliangiri

Selecting and using the same health monitoring devices for a particular problem is a tedious task. This paper aims to provide a comprehensive review of 40 research papers giving…

Abstract

Purpose

Selecting and using the same health monitoring devices for a particular problem is a tedious task. This paper aims to provide a comprehensive review of 40 research papers giving the Smart health monitoring system using Internet of things (IoT) and Deep learning.

Design/methodology/approach

Health Monitoring Systems play a significant role in the healthcare sector. The development and testing of health monitoring devices using IoT and deep learning dominate the healthcare sector.

Findings

In addition, the detailed conversation and investigation are finished by techniques and development framework. Authors have identified the research gap and presented future research directions in IoT, edge computing and deep learning.

Originality/value

The gathered research articles are examined, and the gaps and issues that the current research papers confront are discussed. In addition, based on various research gaps, this assessment proposes the primary future scope for deep learning and IoT health monitoring model.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Open Access
Article
Publication date: 7 September 2021

Ema Utami, Irwan Oyong, Suwanto Raharjo, Anggit Dwi Hartanto and Sumarni Adi

Gathering knowledge regarding personality traits has long been the interest of academics and researchers in the fields of psychology and in computer science. Analyzing profile…

2899

Abstract

Purpose

Gathering knowledge regarding personality traits has long been the interest of academics and researchers in the fields of psychology and in computer science. Analyzing profile data from personal social media accounts reduces data collection time, as this method does not require users to fill any questionnaires. A pure natural language processing (NLP) approach can give decent results, and its reliability can be improved by combining it with machine learning (as shown by previous studies).

Design/methodology/approach

In this, cleaning the dataset and extracting relevant potential features “as assessed by psychological experts” are essential, as Indonesians tend to mix formal words, non-formal words, slang and abbreviations when writing social media posts. For this article, raw data were derived from a predefined dominance, influence, stability and conscientious (DISC) quiz website, returning 316,967 tweets from 1,244 Twitter accounts “filtered to include only personal and Indonesian-language accounts”. Using a combination of NLP techniques and machine learning, the authors aim to develop a better approach and more robust model, especially for the Indonesian language.

Findings

The authors find that employing a SMOTETomek re-sampling technique and hyperparameter tuning boosts the model’s performance on formalized datasets by 57% (as measured through the F1-score).

Originality/value

The process of cleaning dataset and extracting relevant potential features assessed by psychological experts from it are essential because Indonesian people tend to mix formal words, non-formal words, slang words and abbreviations when writing tweets. Organic data derived from a predefined DISC quiz website resulting 1244 records of Twitter accounts and 316.967 tweets.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 27 April 2022

Nils M. Denter, Lukas Jan Aaldering and Huseyin Caferoglu

In recent years patents have become a very popular data source for forecasting technological changes. However, since a vast amount of patents are “worthless” (Moore, 2005), there…

Abstract

Purpose

In recent years patents have become a very popular data source for forecasting technological changes. However, since a vast amount of patents are “worthless” (Moore, 2005), there is a need to identify the promising ones. For this purpose, previous approaches have mainly used bibliographic data, thus neglecting the benefits of textual data, such as instant accessibility at patent disclosure. To leverage these benefits, this study aims to develop an approach that uses textual patent data for predicting promising patents.

Design/methodology/approach

For the identification of promising patents, the authors propose a novel approach which combines link prediction with textual patent data. Thereby the authors are able to predict the emergence of hitherto unmentioned bigrams. By mapping these future bigrams to recent patents, the authors are able to distinguish between promising and nonpromising patents. To validate this approach, the authors apply the methodology to the case example of camera technology.

Findings

The authors identify stochastic gradient descent as a suitable algorithm with both a receiver operating characteristic area under curve score and a positive predictive value of 78%, which outperforms chance by a factor of two. In addition, the authors present promising camera patents for diverse application fields, such as cameras for surgical systems, cameras for rearview vision systems in vehicles or light amplification by stimulated emission of radiation detection and ranging cameras for three-dimensional imaging.

Research limitations/implications

This study contributes in at least three directions to scholarship. First, the authors introduce a novel approach by combining link prediction with textual patent analysis and, in this way, leverage the benefits of both worlds. Second, the authors add to all theories that regard novel technologies as a recombination of existing technologies in presenting word combinations from textual data as a suitable instrument for revealing recombination in patents. And third, the approach can be used by scholars as a complementary or even integrative tool with conventional forecasting methods like the Delphi technique or Scenario planning.

Practical implications

At least three practical implications arise from the study. First, incumbent firms of a technology branch can use this approach as an early-warning system to identify technological change and to identify opportunities related to their company’s technological competence and provide inspiration for new ideas. Second, companies seeking to tap into new markets may also be interested in the approach as managers could anticipate whether their company’s technological competences are in line with upcoming trends. Third, the approach may be used as a supportive tool for various purposes, such as investment decisions or technology life cycle analysis.

Originality/value

The approach introduces textual patent data as suitable means for forecasting activities. As the statistical validation reveals, the promising patents identified by the approach are cited significantly more often than patents with less promising prospects.

Details

foresight, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-6689

Keywords

Access

Year

All dates (141)

Content type

Earlycite article (141)
1 – 10 of 141