Search Results

Now showing 1 - 10 of 10
  • Article
    Citation - WoS: 10
    Citation - Scopus: 18
    An Ontology-Based Information Extraction System for Organic Farming
    (Igi Global, 2021) Abayomi-Alli, Adebayo Adewumi; Arogundade, Oluwasefunmi 'Tale; Misra, Sanjay; Akala, Mulkah Opeyemi; Ikotun, Abiodun Motunrayo; Ojokoh, Bolanle Adefowoke
    In the existing farming system, information is obtained manually, and most times, farmers act based on their discretion. Sometimes, farmers rely on information from experts and extension officers for decision making. In recent times, a lot of information systems are available with relevant information on organic farming practices; however, such information is scattered in different context, form, and media all over the internet, making their retrieval difficult. The use of ontology with the aid of a conceptual scheme makes the comprehensive and detailed formalization of any subject domain possible. This study is aimed at acquiring, storing, and providing organic farming-based information available to current and intending software developer who may wish to develop applications for farmers. It employs information extraction (IE) and ontology development techniques to develop an ontology-based information extraction (OBIE) system called ontology-based information extraction system for organic farming (OBIESOF). The knowledge base was built using protege editor; Java was used for the implementation of the ontology knowledge base with the aid of the high-level application programming language for working web ontology language application program interface (OWLAPI). In contrast, HermiT was used to checking the consistencies of the ontology and for submitting queries in order to verify their validity. The queries were expressed in description logic (DL) query language. The authors tested the capability of the ontology to respond to user queries by posing instances of the competency questions from DL query interface. The answers generated by the ontology were promising and serve as positive pointers to its usefulness as a knowledge repository.
  • Article
    Citation - WoS: 4
    Document Type Definition (dtd) Metrics
    (Editura Acad Romane, 2011) Basci, Dilek; Misra, Sanjay
    In this paper, we present two complexity metrics for the assessment of schema quality written in Document Type Definition (DTD) language. Both "Entropy (E) metric: E(DTD)" and "Distinct Structured Element Repetition Scale (DSERS) metric: DSERS(DTD)" are intended to measure the structural complexity of schemas in DTD language. These metrics exploit a directed graph representation of schema document and consider the complexity of schema due to its similar structured elements and the occurrences of these elements. The empirical and theoretical validations of these metrics prove the robustness of the metrics.
  • Article
    Citation - WoS: 197
    Citation - Scopus: 296
    Co-Lstm: Convolutional Lstm Model for Sentiment Analysis in Social Big Data
    (Elsevier Sci Ltd, 2021) Behera, Ranjan Kumar; Jena, Monalisa; Rath, Santanu Kumar; Misra, Sanjay
    Analysis of consumer reviews posted on social media is found to be essential for several business applications. Consumer reviews posted in social media are increasing at an exponential rate both in terms of number and relevance, which leads to big data. In this paper, a hybrid approach of two deep learning architectures namely Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) (RNN with memory) is suggested for sentiment classification of reviews posted at diverse domains. Deep convolutional networks have been highly effective in local feature selection, while recurrent networks (LSTM) often yield good results in the sequential analysis of a long text. The proposed Co-LSTM model is mainly aimed at two objectives in sentiment analysis. First, it is highly adaptable in examining big social data, keeping scalability in mind, and secondly, unlike the conventional machine learning approaches, it is free from any particular domain. The experiment has been carried out on four review datasets from diverse domains to train the model which can handle all kinds of dependencies that usually arises in a post. The experimental results show that the proposed ensemble model outperforms other machine learning approaches in terms of accuracy and other parameters.
  • Article
    Citation - WoS: 11
    Citation - Scopus: 18
    Prospects of Ocean-Based Renewable Energy for West Africa's Sustainable Energy Future
    (Emerald Group Publishing Ltd, 2021) Adesanya, Ayokunle; Misra, Sanjay; Maskeliunas, Rytis; Damasevicius, Robertas
    Purpose The limited supply of fossil fuels, constant rise in the demand of energy and the importance of reducing greenhouse emissions have brought the adoption of renewable energy sources for generation of electrical power. One of these sources that has the potential to supply the world's energy needs is the ocean. Currently, ocean in West African region is mostly utilized for the extraction of oil and gas from the continental shelf. However, this resource is depleting, and the adaptation of ocean energy could be of major importance. The purpose of this paper is to discuss the possibilities of ocean-based renewable energy (OBRE) and analyze the economic impact of adapting an ocean energy using a thermal gradient (OTEC) approach for energy generation. Design/methodology/approach The analysis is conducted from the perspective of cost, energy security and environmental protection. Findings This study shows that adapting ocean energy in the West Africa region can significantly produce the energy needed to match the rising energy demands for sustainable development of Nigeria. Although the transition toward using OBRE will incur high capital cost at the initial stage, eventually, it will lead to a cost-effective generation, transmission, environmental improvement and stable energy supply to match demand when compared with the conventional mode of generation in West Africa. Originality/value The study will contribute toward analysis of the opportunities for adopting renewable energy sources and increasing energy sustainability for the West Africa coast regions.
  • Article
    Citation - WoS: 34
    Citation - Scopus: 59
    A Review of Soft Techniques for Sms Spam Classification: Methods, Approaches and Applications
    (Pergamon-elsevier Science Ltd, 2019) Abayomi-Alli, Olusola; Misra, Sanjay; Abayomi-Alli, Adebayo; Odusami, Modupe
    Background: The easy accessibility and simplicity of Short Message Services (SMS) have made it attractive to malicious users thereby incurring unnecessary costing on the mobile users and the Network providers' resources. Aim: The aim of this paper is to identify and review existing state of the art methodology for SMS spam based on some certain metrics: AI methods and techniques, approaches and deployed environment and the overall acceptability of existing SMS applications. Methodology: This study explored eleven databases which include IEEE, Science Direct, Springer, Wiley, ACM, DBLP, Emerald, SU, Sage, Google Scholar, and Taylor and Francis, a total number of 1198 publications were found. Several screening criteria were conducted for relevant papers such as duplicate removal, removal based on irrelevancy, abstract eligibility based on the removal of papers with ambiguity (undefined methodology). Finally, 83 papers were identified for depth analysis and relevance. A quantitative evaluation was conducted on the selected studies using seven search strategies (SS): source, methods/ techniques, AI approach, architecture, status, datasets and SMS spam mobile applications. Result: A Quantitative Analysis (QA) was conducted on the selected studies and the result based on existing methodology for classification shows that machine learning gave the highest result with 49% with algorithms such as Bayesian and support vector machines showing highest usage. Unlike statistical analysis with 39% and evolutionary algorithms gave 12%. However, the QA for feature selection methods shows that more studies utilized document frequency, term frequency and n-grams techniques for effective features selection process. Result based on existing approaches for content-based, non-content and hybrid approaches is 83%, 5%, and 12% respectively. The QA based on architecture shows that 25% of existing solutions are deployed on the client side, 19% on server-side, 6% collaborative and 50% unspecified. This survey was able to identify the status of existing SMS spam research as 35% of existing study was based on proposed new methods using existing algorithms and 29% based on only evaluation of existing algorithms, 20% was based on proposed methods only. Conclusion: This study concludes with very interesting findings which shows that the majority of existing SMS spam filtering solutions are still between the "Proposed" status or "Proposed and Evaluated" status. In addition, the taxonomy of existing state of the art methodologies is developed and it is concluded that 8.23% of Android users actually utilize this existing SMS anti-spam applications. Our study also concludes that there is a need for researchers to exploit all security methods and algorithm to secure SMS thus enhancing further classification in other short message platforms. A new English SMS spam dataset is also generated for future research efforts in Text mining, Tele-marketing for reducing global spam activities.
  • Article
    Citation - WoS: 75
    Citation - Scopus: 93
    Co-Fais: Cooperative Fuzzy Artificial Immune System for Detecting Intrusion in Wireless Sensor Networks
    (Academic Press Ltd- Elsevier Science Ltd, 2014) Shamshirband, Shahaboddin; Anuar, Nor Badrul; Kiah, Miss Laiha Mat; Rohani, Vala Ali; Petkovic, Dalibor; Misra, Sanjay; Khan, Abdul Nasir
    Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to identify such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a bio-inspired method is introduced, namely the cooperative-based fuzzy artificial immune system (Co-FATS). It is a modular-based defense strategy derived from the danger theory of the human immune system. The agents synchronize and work with one another to calculate the abnormality of sensor behavior in terms of context antigen value (CAV) or attackers and update the fuzzy activation threshold for security response. In such a multi-node circumstance, the sniffer module adapts to the sink node to audit data by analyzing the packet components and sending the log file to the next layer. The fuzzy misuse detector module (FMDM) integrates with a danger detector module to identify the sources of danger signals. The infected sources are transmitted to the fuzzy Q-learning vaccination modules (FQVM) in order for particular, required action to enhance system abilities. The Cooperative Decision Making Modules (Co-DMM) incorporates danger detector module with the fuzzy Q-learning vaccination module to produce optimum defense strategies. To evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using a network simulator. The model was subsequently compared against other existing soft computing methods, such as fuzzy logic controller (FLC), artificial immune system (AIS), and fuzzy Q-learning (FQL), in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed method improves detection accuracy and successful defense rate performance against attacks compared to conventional empirical methods. (C) 2014 Elsevier Ltd. All rights reserved.
  • Article
    Citation - WoS: 21
    Citation - Scopus: 29
    Providing Knowledge Recommendations: an Approach for Informal Electronic Mentoring
    (Routledge Journals, Taylor & Francis Ltd, 2014) Colomo-Palacios, Ricardo; Casado-Lumbreras, Cristina; Soto-Acosta, Pedro; Misra, Sanjay
    The use of Web 2.0 technologies for knowledge management is invading the corporate sphere. The Web 2.0 is the most adopted knowledge transfer tool within knowledge intensive firms and is starting to be used for mentoring. This paper presents IM-TAG, a Web 2.0 tool, based on semantic technologies, for informal mentoring. The tool offers recommendations of mentoring contents built upon personal competencies of the mentee, combined with content and opinion tagging. To validate the tool, a case study comparing recommendations from the IM-TAG and a group of experts was conducted. Results show that the accuracy of IM-TAG's recommendations is notable and satisfactory. The main conclusions of this research may be valuable to organizations immersed in mentoring programs.
  • Article
    Citation - WoS: 100
    Learning management systems and cloud file hosting services: A study on students' acceptance
    (Pergamon-elsevier Science Ltd, 2014) Stantchev, Vladimir; Colomo-Palacios, Ricardo; Soto-Acosta, Pedro; Misra, Sanjay
    The aim of this paper is to investigate the motivations that lead higher education students to replace several Learning Management Systems (LMS) services with cloud file hosting services for information sharing and collaboration among them. The research approach is based on the Technology Acceptance Model (TAM). More specifically, the model is devoted to identifying barriers and enablers to the acceptance of these technologies. A questionnaire comprising three factors (Attitude toward using technology, Perceived ease of use and Perceived usefulness) was applied to a sample consisting of 121 higher education students. Results show that the perceived ease of use of cloud file hosting services is above that of LMS tools and services and that cloud file hosting services presented higher levels of perceived usefulness than standard learning management tools. In addition, attitude toward using cloud file hosting services is well above that of using LMS tools. (C) 2013 Elsevier Ltd. All rights reserved.
  • Article
    Citation - WoS: 37
    Citation - Scopus: 61
    Adoption of Mobile Applications for Teaching-Learning Process in Rural Girls' Schools in India: an Empirical Study
    (Springer, 2020) Chatterjee, Sheshadri; Majumdar, Dipasree; Misra, Sanjay; Damasevicius, Robertas
    The purpose of this study is to identify the factors that can impact the adoption of mobile apps for teaching-learning process focusing on the girls' school in rural India. The hypotheses were proposed and a conceptual model has been developed. There is a survey work conducted to collect the data from different respondents using a convenience sampling method. The model has been validated statistically through PLS-SEM analysis covering feedbacks of 271 effective respondents. The study highlights the impact of different antecedents of the behavioural intention of the students of using mobile applications for teaching-learning process. The results also show that among other issues, price value has insignificant influence on the intention of the girl students of the rural India. During survey feedbacks have been obtained from the 271 respondents, which is meagre compared to vastness of the population and school of rural India. Only few predictors have been considered leaving possibilities of inclusion of other boundary conditions to enhance the explanative power more than that has been achieved in the proposed model with the explanative power of 81%. The model has provided laudable inputs to the educational policy makers and technology enablers and administrators to understand the impact of the mobile applications on the rural girls' school of India and facilitate the development of m-learning. Very few studies been conducted to explore the impact of mobile applications on the school education of rural India especially focusing on the girls' schools.
  • Article
    Citation - WoS: 38
    Citation - Scopus: 71
    Adopting Automated Whitelist Approach for Detecting Phishing Attacks
    (Elsevier Advanced Technology, 2021) Azeez, Nureni Ayofe; Misra, Sanjay; Margaret, Ihotu Agbo; Fernandez-Sanz, Luis; Abdulhamid, Shafi'i Muhammad
    Phishing is considered a great scourge in cyberspace. Presently, there are two major challenges known with the existing anti-phishing solutions. Low detection rate and lack of quick access time in a real-time environment. However, it has been established that blacklist solution methods offer quick and immediate access time but with a low detection rate. This research paper presents an automated white-list approach for detecting phishing attacks. The white-list is determined by carrying out a detailed analysis between the visual link and the actual link. The similarities of the known trusted site are calculated by juxtaposing the domain name with the contents of the whitelist and later match it with the IP address before a decision is made and further analyzing the actual link and the visual link by calculating the similarities of the known trusted site. The technique then takes a final decision on the extracted information from the hyperlink, which can also be obtained from the web address provided by the user. The experiments carried out provided a very high level of accuracy, specifically, when the dataset was relatively at the lowest level. Six different datasets were used to perform the experiments. The average accuracy obtained after the six experiments was 96.17% and the approach detects phishing sites with a 95.0% true positive rate. It was observed that the level of accuracy varies from one dataset to another. This result shows that the proposed method performs better than similar approaches benchmarked with. The efficiency of the approach was further established through its computation time, memory, bandwidth as well as other computational resources that were utilized with the minimum requirements when compared with other approaches. This solution has provided immense benefits over the existing solutions by reducing the memory requirements and computational complexity, among other benefits. It has also shown that the proposed method can provide more robust detection performances when compared to other techniques. (c) 2021 Elsevier Ltd. All rights reserved.