American Journal of Information Science and Technology

Volume 8, Issue 2, June 2024

  • Research Article

    A Method to Improve the Multiplicative Inconsistency Preserving the Preference Information of Every Element of an Intuitionistic Fuzzy Preference Relation

    Hyonil Oh*, Gukchol Ri, Yungil Kim, Cholju Kim

    Issue: Volume 8, Issue 2, June 2024
    Pages: 22-33
    Received: 12 April 2024
    Accepted: 23 May 2024
    Published: 24 May 2024
    Downloads:
    Views:
    Abstract: In general, almost intuitionistic fuzzy preference relations (IFPRs) provided by experts are multiplicutively inconsistent because of the complexity of a problem, lack of correct or sufficient knowledge about the problem domain, the ambiguity inherent in human thinking and so forth on. To solve this subject, we propose a method to improve the multi... Show More
  • Research Article

    Development of Pidgin English Hate Speech Classification System for Social Media

    Folake Oluwatoyin Adegoke*, Bashir Tenuche, Eneh Agozie

    Issue: Volume 8, Issue 2, June 2024
    Pages: 34-44
    Received: 16 March 2024
    Accepted: 2 April 2024
    Published: 14 June 2024
    Downloads:
    Views:
    Abstract: With the widespread use of social media, people from all walks of life—individuals, friends, family, public and private organizations, business communities, states, and entire nations—are exchanging information in various formats, including text, messages, audio, video, cartons, and pictures. Social media also facilitates the distribution and propa... Show More
  • Research Article

    The Need for Adaptive Access Control System at the Network Edge

    Muhammad Bello Aliyu*, Hassan Suru, Danlami Gabi, Muhammad Garba, Musa Argungu

    Issue: Volume 8, Issue 2, June 2024
    Pages: 45-55
    Received: 17 April 2024
    Accepted: 31 May 2024
    Published: 14 June 2024
    Downloads:
    Views:
    Abstract: The emergence of edge computing, characterized by its distributed nature and real-time processing, necessitates a paradigm shift in access control mechanisms. Traditional, static methods struggle to adapt to the dynamic and heterogeneous environment of edge computing. This research addresses this gap by proposing an Adaptive Risk-Based Access Contr... Show More