Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » International Journal of Data and Network Science

Journals

  • IJIEC (777)
  • MSL (2643)
  • DSL (690)
  • CCL (528)
  • USCM (1092)
  • ESM (421)
  • AC (562)
  • JPM (293)
  • IJDS (952)
  • JFS (101)
  • HE (32)
  • SCI (26)

IJDS Volumes

    • Volume 1 (8)
      • Issue 1 (5)
      • Issue 2 (3)
    • Volume 2 (12)
      • Issue 1 (3)
      • Issue 2 (3)
      • Issue 3 (3)
      • Issue 4 (3)
    • Volume 3 (27)
      • Issue 1 (4)
      • Issue 2 (9)
      • Issue 3 (8)
      • Issue 4 (6)
    • Volume 4 (37)
      • Issue 1 (6)
      • Issue 2 (15)
      • Issue 3 (7)
      • Issue 4 (9)
    • Volume 5 (86)
      • Issue 1 (9)
      • Issue 2 (11)
      • Issue 3 (32)
      • Issue 4 (34)
    • Volume 6 (163)
      • Issue 1 (30)
      • Issue 2 (33)
      • Issue 3 (40)
      • Issue 4 (60)
    • Volume 7 (200)
      • Issue 1 (53)
      • Issue 2 (46)
      • Issue 3 (46)
      • Issue 4 (55)
    • Volume 8 (243)
      • Issue 1 (60)
      • Issue 2 (61)
      • Issue 3 (60)
      • Issue 4 (62)
    • Volume 9 (96)
      • Issue 1 (20)
      • Issue 2 (6)
      • Issue 3 (30)
      • Issue 4 (40)
    • Volume 10 (80)
      • Issue 1 (40)
      • Issue 2 (40)

Keywords

Supply chain management(168)
Jordan(165)
Vietnam(151)
Customer satisfaction(120)
Performance(115)
Supply chain(112)
Service quality(98)
Competitive advantage(97)
Tehran Stock Exchange(94)
SMEs(89)
optimization(87)
Sustainability(86)
Artificial intelligence(85)
Financial performance(84)
Trust(83)
TOPSIS(83)
Job satisfaction(81)
Genetic Algorithm(78)
Factor analysis(78)
Social media(78)


» Show all keywords

Authors

Naser Azad(82)
Zeplin Jiwa Husada Tarigan(66)
Mohammad Reza Iravani(64)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(40)
Dmaithan Almajali(37)
Jumadil Saputra(36)
Muhammad Turki Alshurideh(35)
Ahmad Makui(33)
Barween Al Kurdi(32)
Hassan Ghodrati(31)
Basrowi Basrowi(31)
Sautma Ronni Basana(31)
Mohammad Khodaei Valahzaghard(30)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Haitham M. Alzoubi(28)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)


» Show all authors

Countries

Iran(2192)
Indonesia(1311)
Jordan(813)
India(793)
Vietnam(510)
Saudi Arabia(478)
Malaysia(444)
China(231)
United Arab Emirates(226)
Thailand(160)
United States(114)
Ukraine(110)
Turkey(110)
Egypt(106)
Peru(94)
Canada(93)
Morocco(86)
Pakistan(85)
United Kingdom(80)
Nigeria(78)


» Show all countries
Sort articles by: Volume | Date | Most Rates | Most Views | Reviews | Alphabet
1.

Predictive data mining approaches in medical diagnosis: A review of some diseases prediction Pages 47-70 Right click to download the paper Download PDF

Authors: Ramin Ghorbani, Rouzbeh Ghousi

DOI: 10.5267/j.ijdns.2019.1.003

Keywords: Healthcare, Classification, Heart Disease, Breast Cancer, Diabetes Mellitus, Review

Abstract:
Due to the increasing technological advances in all fields, a considerable amount of data has been collected to be processed for different purposes. Data mining is the process of determining and an-alyzing hidden information from different perspectives to obtain useful knowledge. Data mining can have many various applications, one of them is in medical diagnosis. Today, many diseases are regarded as dangerous and deadly. Heart disease, breast cancer, and diabetes are among the most dangerous ones. This paper investigates 168 articles associated with the implementation of data mining for diagnosing such diseases. The study concentrates on 85 selected papers which have received more attention between 1997 and 2018. All algorithms, data mining models, and evaluation methods are thoroughly reviewed with special consideration. The study attempts to determine the most efficient data mining methods used for medical diagnosing purposes. Also, one of the other significant results of this study is the detection of research gaps in the application of data mining in health care.
Details
  • 68
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 7038 | Reviews: 0

 
2.

An application of DEMATEL for transaction authentication in online banking Pages 71-76 Right click to download the paper Download PDF

Authors: Ali Sepehri-Rad, S.J. Sadjadi, Soheil Sadi-Nezhad

DOI: 10.5267/j.ijdns.2019.1.002

Keywords: Online banking, Parsian bank, Authentication, Security

Abstract:
Business trades among individuals, companies, firms, enterprises, and governments are rapidly expelled from their traditional mode, which were mainly based on paper-based exchange, and are geared towards trading through information-based systems. E-commerce has opened up a new field in terms of speed, efficiency, cost savings, and the exploitation of fleeting opportunities. This paper evaluates different authentication methods for online banking in Parsian Bank, which is one of the biggest private banks in Iran. The study designs a questionnaire and distributes it among some experts to find cause and effect factors based on a multi-criteria decision making technique named Decision Making Trial And Evaluation Laboratory (DEMATEL). The study evaluates 12 criteria and divides them into two groups of cause and effect. “Use of mobile systems in authenti-cation methods”, “Authentication with fingerprint and smart card”, “Authentication with bank card and password”, and “Authentication with digital signatures and passwords” are considered as the causative group, while “Authentication with a bank card”, “Biometric authentication and disposable codes” and “Authentication with digital signature” are among the effective group.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 2172 | Reviews: 0

 
3.

Man-in-the-middle-attack: Understanding in simple words Pages 77-92 Right click to download the paper Download PDF

Authors: Avijit Mallik, Abid Ahsan, Mhia Md. Zaglul Shahadat, Jia-Chi Tsou

DOI: 10.5267/j.ijdns.2019.1.001

Keywords: MITM attack, Cyberattack, Crime, Media

Abstract:
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just real-ized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle-attack’ (MITM/MIM). This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related da-ta/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 4888 | Reviews: 0

 
4.

Valuation and assessment of customers in banking industry using data mining techniques Pages 93-102 Right click to download the paper Download PDF

Authors: Behrooz Asareh, M.R. Ghaeli

DOI: 10.5267/j.ijdns.2018.12.006

Keywords: Data mining, Logistic regression, Bank customer

Abstract:
One of the primary concerns in most financial institutions to have an appropriate method for ranking customers. Bank customers are the primary sources of creating income and the success of banking industry depends on how to select good customers for allocation of loans. This paper uses Decision Tree, K-nearest neighbor (KNN), Support Vector Machine (SVM), Naive Bayes, and Logistic Regression for data categorization to estimate credit ranking of bank customers in one of major banks in Middle East. The results indicate that Logistic Regression was considered as the best method for ranking customers with the precision of 76.17% while Decision Tree was considered as the weakest technique with the precision of 73.30%.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2013 | Volume: 3 | Issue: 2 | Views: 1204 | Reviews: 0

 
5.

Optimization and prediction of sintering process parameters for magnetic abrasives preparation using response surface methodology Pages 103-108 Right click to download the paper Download PDF

Authors: Mukesh Kumar, Sehijpal Singh, Harnam Singh Farwaha

DOI: 10.5267/j.ijdns.2018.12.005

Keywords: Magnetic Abrasive Finishing, Percentage Improvement in Surface Finish, Magnetic Strength

Abstract:
Magnetic abrasives are important parts of Magnetic Assisted Abrasive Finishing (MAF). Magnetic abrasives are prepared by many processes, but sintering is the one of the best processes to prepare magnetic abrasives. The objective of this paper is to optimize the sintering process parameters. To do that, Response Surface Methodology (RSM) is used for the optimization of process parameters, Abrasive concentration in ferromagnetic particles (AC)%, Compacting Pressure (CP) N/mm2 and Sintering Time(ST)min. To check the performance of magnetic abrasives Percentage Improvement in Surface finish (PISF) is considered as a response variable. Optimization and prediction are executed through RSM and Central Composite Design (CCD) is used to conduct the experiments. The optimized values of process parameters obtained are AC (19.29%), ST (15min) and CP (6.9 N/mm2) and also predicted values for the response variable are obtained.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 1533 | Reviews: 0

 
6.

A model for supporting designers and for determining design stakeholders’ preferences Pages 109-118 Right click to download the paper Download PDF

Authors: Daneil Aikhuele

DOI: 10.5267/j.ijdns.2018.12.004

Keywords: Forklift Truck, Design concept, Intuitionistic fuzzy TOPSIS, Exponential-related Function, Intuitionistic fuzzy entropy, MCDM

Abstract:
A new flexible and adjustable model which is based on an Intuitionistic Fuzzy TOPSIS model with an exponential-related function and intuitionistic fuzzy entropy method has been presented and apply in this study. For supporting designers in determining design stakeholders’ preferences when finding the best compromise between new concepts design during early product develop-ment phase. The main advantage of the new model is that it is flexible and adjustable and affords the design stakeholders the option to a change of action in the event they receive new information or reason not to continue with a particular design or product. Finally, it uses both subjective and objective weights methods for the evaluation of the design concepts criteria, which makes the proposed model more realistic and more practical. The model has been applied for the design concept evaluation of seven forklift trucks with the view to improving the reliability of the machine.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 1451 | Reviews: 0

 
7.

Application of MADM methods as MOORA and WEDBA for ranking of FMS flexibility Pages 119-136 Right click to download the paper Download PDF

Authors: Vineet Jain, Puneeta Ajmera

DOI: 10.5267/j.ijdns.2018.12.003

Keywords: FMS, Flexibility, Ranking, MADM, MOORA, AHP WEDBA, Entropy

Abstract:
Flexibility has been cited as a key factor to enhance the performance of flexible manufacturing sys-tem (FMS). The main aim of this paper is to rank the flexibility of FMS. The ranking decisions are complex in the manufacturing field to analyze a number of alternatives based on a set of some attributes. In this research, two MADM methods i.e. MOORA (i.e. multi-objective optimization on the basis of ratio analysis) and weighted Euclidean distance based approach (WEDBA) are used for ranking of flexibility in FMS for new part development. MOORA approach can give de-cision with or without considering relative importance of attributes i.e. attribute weights. While in WEDBA, integrated attribute weights are used for evaluation which included the subjective and objective weights of attributes. Objective weights are calculated by entropy method and subjective weights are calculated by analytic hierarchy process. MOORA is applied in two ways i.e. ratio based and reference point analysis. Ranking of fifteen flexibility of FMS done on the basis fifteen variables which effect flexibility of FMS. The results of MOORA and WEDBA approach shows that product flexibility has the top most flexibility in fifteen flexibilities and programme flexibility has the least impact in fifteen flexibilities.
Details
  • 17
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 2330 | Reviews: 0

 
8.

Selection of commercially available scooters by new MCDM method Pages 137-144 Right click to download the paper Download PDF

Authors: Tapas Kumar Biswas, Pritha Saha

DOI: 10.5267/j.ijdns.2018.12.002

Keywords: TOPSIS, Hosting-right, Techno-economic criteria, Cost-benefit ratio

Abstract:
This paper presents the application of the new method in the process of making the decisions on the scooters selection. The Fuzzy AHP method was used to obtain the weight coefficients of criteria, on the basis of which the alternatives were evaluated. The selection of criteria for evaluating scooters was based on an analysis of available manufacturer website. The evaluation and selection of scooters was carried out using a new multi-criteria decision making (MCDM) method. The present study tries to identify the attributes like kerb weight, mileage, top speed, fuel tank capacity and price playing prominent role in the buying behavior of the working women while purchasing scooters. Fuzzy-AHP method has been used to obtain the relative weights of the criteria, on the basis of which the alternatives are evaluated using new MCDM. The TOPSIS and MABAC methods were tested under the same conditions. The stability of the result obtained by this method is established through a sensitivity analysis.
Details
  • 51
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 1518 | Reviews: 0

 
9.

Selection of commercially available scooters by new MCDM method Pages 137-144 Right click to download the paper Download PDF

Authors: Tapas Kumar Biswas, Pritha Saha

DOI: 10.5267/j.ijdns.2018.12.002

Keywords: TOPSIS, Hosting-right, Techno-economic criteria, Cost-benefit ratio

Abstract:
This paper presents the application of the new method in the process of making the decisions on the scooters selection. The Fuzzy AHP method was used to obtain the weight coefficients of criteria, on the basis of which the alternatives were evaluated. The selection of criteria for evaluating scooters was based on an analysis of available manufacturer website. The evaluation and selection of scooters was carried out using a new multi-criteria decision making (MCDM) method. The present study tries to identify the attributes like kerb weight, mileage, top speed, fuel tank capacity and price playing prominent role in the buying behavior of the working women while purchasing scooters. Fuzzy-AHP method has been used to obtain the relative weights of the criteria, on the basis of which the alternatives are evaluated using new MCDM. The TOPSIS and MABAC methods were tested under the same conditions. The stability of the result obtained by this method is established through a sensitivity analysis.
Details
  • 0
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: IJDS | Year: 2019 | Volume: 3 | Issue: 2 | Views: 1883 | Reviews: 0

 

® 2010-2026 GrowingScience.Com