Pub Date : 2018-08-23DOI: 10.1109/ICCCI.2018.8441286
Kian Son Hoon, Kheng Cher Yeo, S. Azam, Bharanidharan Shunmugam, F. De Boer
Distributed Denial of Service (DDoS) attacks are becoming more frequent and easier to execute. The sharp increase in network traffic presents challenges to conduct DDoS forensics. Despite different tools being developed, few take into account of the increase in network traffic. This research aims to recommend the best learning model for DDoS forensics. To this extend, the paper reviewed different literature to understand the challenges and opportunities of employing big data in DDoS forensics. Multiple simulations were carried out to compare the performance of different models. Two data mining tools WEKA and H2O were used to implement both supervised and unsupervised learning models. The training and testing of the models made use of intrusion dataset from oN-Line System - Knowledge Discovery & Data mining (NSL-KDD). The models are then evaluated according to their efficiency and accuracy. Overall, result shows that supervised learning algorithms perform better than unsupervised learning algorithms. It was found that Naïve Bayes, Gradient Boosting Machine and Distributed Random Forest are the most suitable model for DDoS detection because of its accuracy and time taken to train. Both Gradient Boosting Machine and Distributed Random Forest were further investigated to determine the parameters that can yield better accuracy. Future research can be extended by installing different DDoS detection models in an actual environment and compare their performances in actual attacks.
{"title":"Critical review of machine learning approaches to apply big data analytics in DDoS forensics","authors":"Kian Son Hoon, Kheng Cher Yeo, S. Azam, Bharanidharan Shunmugam, F. De Boer","doi":"10.1109/ICCCI.2018.8441286","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441286","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are becoming more frequent and easier to execute. The sharp increase in network traffic presents challenges to conduct DDoS forensics. Despite different tools being developed, few take into account of the increase in network traffic. This research aims to recommend the best learning model for DDoS forensics. To this extend, the paper reviewed different literature to understand the challenges and opportunities of employing big data in DDoS forensics. Multiple simulations were carried out to compare the performance of different models. Two data mining tools WEKA and H2O were used to implement both supervised and unsupervised learning models. The training and testing of the models made use of intrusion dataset from oN-Line System - Knowledge Discovery & Data mining (NSL-KDD). The models are then evaluated according to their efficiency and accuracy. Overall, result shows that supervised learning algorithms perform better than unsupervised learning algorithms. It was found that Naïve Bayes, Gradient Boosting Machine and Distributed Random Forest are the most suitable model for DDoS detection because of its accuracy and time taken to train. Both Gradient Boosting Machine and Distributed Random Forest were further investigated to determine the parameters that can yield better accuracy. Future research can be extended by installing different DDoS detection models in an actual environment and compare their performances in actual attacks.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121577135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-23DOI: 10.1109/ICCCI.2018.8441251
J. Joseph, M. Jonkman, S. Azam, F. De Boer, D. Hill, Bharanidaran Shanmugam
Exercise is a key aspect of a healthy lifestyle. The purpose of this research is to investigate the effects of exercise on APG signals in a cool environment. Twenty seven healthy volunteers above the age of 18 years were selected for the experiments. They were asked to walk at a speed of 5 km/hour on a treadmill with an inclination of 1% for 30 minutes, which corresponds to moderate exercise. The PPG signals were collected before and immediately after the exercise. The second derivative is taken to find the APG and APG indices are calculated. After analysing the data it was found that c-d-e component of APG became smoother after exercise. The d-point depression became much less pronounced and disappeared completely in a number of cases. No significant change in the b/a and c/a indices was found for the subjects tested. Results indicate that the d-point depression is inversely related to the heart rate. It may, however, also affected by other variables, such as body temperature or blood flow distribution.
{"title":"Detection of the effect of exercise on APG signals","authors":"J. Joseph, M. Jonkman, S. Azam, F. De Boer, D. Hill, Bharanidaran Shanmugam","doi":"10.1109/ICCCI.2018.8441251","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441251","url":null,"abstract":"Exercise is a key aspect of a healthy lifestyle. The purpose of this research is to investigate the effects of exercise on APG signals in a cool environment. Twenty seven healthy volunteers above the age of 18 years were selected for the experiments. They were asked to walk at a speed of 5 km/hour on a treadmill with an inclination of 1% for 30 minutes, which corresponds to moderate exercise. The PPG signals were collected before and immediately after the exercise. The second derivative is taken to find the APG and APG indices are calculated. After analysing the data it was found that c-d-e component of APG became smoother after exercise. The d-point depression became much less pronounced and disappeared completely in a number of cases. No significant change in the b/a and c/a indices was found for the subjects tested. Results indicate that the d-point depression is inversely related to the heart rate. It may, however, also affected by other variables, such as body temperature or blood flow distribution.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128364494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-23DOI: 10.1109/ICCCI.2018.8441213
Ayush Gai, S. Azam, Bharanidharan Shanmugam, M. Jonkman, F. De Boer
IoT (Internet of Things) refers to the daily use of devices connected to the Internet that can be controlled by a remote device such as mobile phones. This research focuses to identify and categorize the threats and create threat vectors for IoT based home appliances. Some previous research has been conducted by OWASP to identify IoT device threats, but these studies have not clearly mentioned what devices were tested and what their vulnerabilities were. Smart televisions, home theatres, refrigerators, CCTV, thermostats, kettles and light/bulbs were selected for testing and examined to identify attacking surface and vulnerabilities. More than 15 attack surfaces and 11 vulnerabilities were found across these devices after conducting the current research. Possible basic security measures have been discussed, which can be implemented by the user and developer to make smart devices safer.
IoT (Internet of Things)是指日常使用的连接到互联网的设备,可以通过手机等远程设备进行控制。本研究的重点是识别和分类威胁,并为基于物联网的家用电器创建威胁向量。OWASP之前已经进行了一些研究来识别物联网设备威胁,但这些研究并没有明确提到测试了哪些设备以及它们的漏洞是什么。智能电视、家庭影院、冰箱、闭路电视、恒温器、水壶和灯泡被选中进行测试和检查,以确定攻击面和漏洞。在进行目前的研究后,在这些设备上发现了超过15个攻击面和11个漏洞。已经讨论了可能的基本安全措施,这些措施可以由用户和开发人员实施,使智能设备更安全。
{"title":"Categorisation of security threats for smart home appliances","authors":"Ayush Gai, S. Azam, Bharanidharan Shanmugam, M. Jonkman, F. De Boer","doi":"10.1109/ICCCI.2018.8441213","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441213","url":null,"abstract":"IoT (Internet of Things) refers to the daily use of devices connected to the Internet that can be controlled by a remote device such as mobile phones. This research focuses to identify and categorize the threats and create threat vectors for IoT based home appliances. Some previous research has been conducted by OWASP to identify IoT device threats, but these studies have not clearly mentioned what devices were tested and what their vulnerabilities were. Smart televisions, home theatres, refrigerators, CCTV, thermostats, kettles and light/bulbs were selected for testing and examined to identify attacking surface and vulnerabilities. More than 15 attack surfaces and 11 vulnerabilities were found across these devices after conducting the current research. Possible basic security measures have been discussed, which can be implemented by the user and developer to make smart devices safer.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128898824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-20DOI: 10.1109/ICCCI.2018.8441236
C. S. Chaitanya, P. Kumar
In most of the VLSI systems, multiplier being the vital part consumes nearly 15-20% of total IC power and is quiet slow in overall operation of the system. Thus it is essential to have an efficient design for the multipliers to improve the overall performance of the system. Booth multiplier reduces the number of partial products, taking into account two bits of the multiplier at a time, resulting in speed advantage over other multiplier architectures. With this advantage, Booth Multiplier is widely used in multiplication process for various digital and DSP circuits. The objective of this paper is to implement an optimized Booth Multiplier (8*8) with improved Power consumption and Delay Product (PDP). The sign extension is implemented using a single inverter and the addition operation is implemented by using custom designed Carry Skip Adders with IOT Full Adder. The design implementation and the simulations are done in Cadence Virtuoso V13.0 under 45nm technology.
{"title":"Design and Analysis of Booth Multiplier with Optimised Power Delay Product","authors":"C. S. Chaitanya, P. Kumar","doi":"10.1109/ICCCI.2018.8441236","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441236","url":null,"abstract":"In most of the VLSI systems, multiplier being the vital part consumes nearly 15-20% of total IC power and is quiet slow in overall operation of the system. Thus it is essential to have an efficient design for the multipliers to improve the overall performance of the system. Booth multiplier reduces the number of partial products, taking into account two bits of the multiplier at a time, resulting in speed advantage over other multiplier architectures. With this advantage, Booth Multiplier is widely used in multiplication process for various digital and DSP circuits. The objective of this paper is to implement an optimized Booth Multiplier (8*8) with improved Power consumption and Delay Product (PDP). The sign extension is implemented using a single inverter and the addition operation is implemented by using custom designed Carry Skip Adders with IOT Full Adder. The design implementation and the simulations are done in Cadence Virtuoso V13.0 under 45nm technology.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-20DOI: 10.1109/ICCCI.2018.8441471
N. D. Adesh, A. Renuka
Resource scheduling process in LTE network plays a vital role in enhancing the system performance. Therefore, in this paper, rotation based resource scheduling along with queue monitoring algorithm is proposed for LTE downlink transmission, to reduce overflow of packets from user queue at eNodeB, and to reduce the transmission delay of the packet. On the other hand, proposed algorithm also enhances the system throughput and maintains fairness among the users. The experimental results illustrate that the proposed algorithm enhance the system throughput compared to other existing schedulers. Further, it also improves Packet Delivery Fraction (PDF) and reduces the transmission delay of the packets.
{"title":"Rotation-based LTE downlink resource scheduling using queue status monitoring","authors":"N. D. Adesh, A. Renuka","doi":"10.1109/ICCCI.2018.8441471","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441471","url":null,"abstract":"Resource scheduling process in LTE network plays a vital role in enhancing the system performance. Therefore, in this paper, rotation based resource scheduling along with queue monitoring algorithm is proposed for LTE downlink transmission, to reduce overflow of packets from user queue at eNodeB, and to reduce the transmission delay of the packet. On the other hand, proposed algorithm also enhances the system throughput and maintains fairness among the users. The experimental results illustrate that the proposed algorithm enhance the system throughput compared to other existing schedulers. Further, it also improves Packet Delivery Fraction (PDF) and reduces the transmission delay of the packets.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116698822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441469
Ripon Patgiri, S. Borgohain, Shyamosree Pal
In this paper, we present an elastic array, called Elastica (Elastic Array). The Elastica is the most space efficient resizable array, that is, Elastica allows increment and decrement of an array size. The Elastica is an array-of-array data structure which promotes increment and decrement of an array size dynamically. Most interestingly, the Elastica allocates memory blocks-wise and provides a functionality of accessing an element with O(1) time complexity. The Elastica allows the available memory blocks to be non-contiguous without violating the properties of the conventional single dimensional array. The Elastica offers the most space-efficient resizable array with O (log2n) extra space complexity. The Elastica is used to implement various data structures similar to conventional array. Besides, the Elastica has got other added advantages in implementing the available data structure.
{"title":"Elastica a Large Scale Elastic Array Data Structure","authors":"Ripon Patgiri, S. Borgohain, Shyamosree Pal","doi":"10.1109/ICCCI.2018.8441469","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441469","url":null,"abstract":"In this paper, we present an elastic array, called Elastica (Elastic Array). The Elastica is the most space efficient resizable array, that is, Elastica allows increment and decrement of an array size. The Elastica is an array-of-array data structure which promotes increment and decrement of an array size dynamically. Most interestingly, the Elastica allocates memory blocks-wise and provides a functionality of accessing an element with O(1) time complexity. The Elastica allows the available memory blocks to be non-contiguous without violating the properties of the conventional single dimensional array. The Elastica offers the most space-efficient resizable array with O (log2n) extra space complexity. The Elastica is used to implement various data structures similar to conventional array. Besides, the Elastica has got other added advantages in implementing the available data structure.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441229
S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan
Image has become an indispensible part of data communication through embedded devices. LightWeight Stream Encryption (LWSE) algorithm for images had been already proposed and evaluated with Matlab code on a desktop system. This paper evaluates the real-time lightweight property of an existing LWSE algorithm in terms of its memory footprint and execution time on a resource constrained low power embedded device containing ARM7 core. A modification on LWSE algorithm is also proposed through the insertion of a shuffling process on plain image prior to the encryption. Various analysis and tests have been performed to validate the results of original and modified LWSE algorithm in the aspect of security. The study on lightweight parameters such as code size, and execution time of the embedded hardware while running the original and modified versions of LWSE algorithm shows its aptness for realtime applications.
{"title":"On the Diffusion of Lightweight Image Encryption in Embedded Hardware","authors":"S. Janakiraman, K. Sree, V. Manasa, Sundararaman Rajagopalan, K. Thenmozhi, Rengarajan Amirtharajan","doi":"10.1109/ICCCI.2018.8441229","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441229","url":null,"abstract":"Image has become an indispensible part of data communication through embedded devices. LightWeight Stream Encryption (LWSE) algorithm for images had been already proposed and evaluated with Matlab code on a desktop system. This paper evaluates the real-time lightweight property of an existing LWSE algorithm in terms of its memory footprint and execution time on a resource constrained low power embedded device containing ARM7 core. A modification on LWSE algorithm is also proposed through the insertion of a shuffling process on plain image prior to the encryption. Various analysis and tests have been performed to validate the results of original and modified LWSE algorithm in the aspect of security. The study on lightweight parameters such as code size, and execution time of the embedded hardware while running the original and modified versions of LWSE algorithm shows its aptness for realtime applications.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media has become an important part of human life; not only has it become a platform for people to interact with each other, it has become the news portal, a stage for people to express themselves, and even for heinous tasks such as cyber bullying, stalking etc. India being a country with the world's second largest population, not to mention the lingual diversity, the usage of social media in all its forms, is at its heights. This resulted in the evolution of code-mixed data, which is a combination of more than one language. The Bengali-English code mixed data used in this work is provided by the NLP Tool Contest, SAIL @ ICON 2017. The Convolutional Neural Network has been used to classify the data as positive, negative or neutral. Later to analyze performance of the system in the native script of Indian languages, the same procedure has been applied on Telugu dataset which is created manually from various source of online movie reviews and the results are compared.
{"title":"Sentiment Analysis of Indian Languages using Convolutional Neural Networks","authors":"Vineetha Aravind Ravikumar, Aravinda Reddy, Anand Kumar","doi":"10.1109/ICCCI.2018.8441371","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441371","url":null,"abstract":"Social media has become an important part of human life; not only has it become a platform for people to interact with each other, it has become the news portal, a stage for people to express themselves, and even for heinous tasks such as cyber bullying, stalking etc. India being a country with the world's second largest population, not to mention the lingual diversity, the usage of social media in all its forms, is at its heights. This resulted in the evolution of code-mixed data, which is a combination of more than one language. The Bengali-English code mixed data used in this work is provided by the NLP Tool Contest, SAIL @ ICON 2017. The Convolutional Neural Network has been used to classify the data as positive, negative or neutral. Later to analyze performance of the system in the native script of Indian languages, the same procedure has been applied on Telugu dataset which is created manually from various source of online movie reviews and the results are compared.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121801546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441276
S. R. Viknesh, P. Venkattappan, R. Manikandan, S. Rajendran
AC voltage controllers are often used to change the output AC voltage from fixed input AC voltage for many industrial and commercial applications by using single stage of conversion. AC voltage controllers provide better replacement of auto transformers with low cost. But their output voltage is not much qualified then auto transformers. To obtain variable and improved output voltages, different Pulse Width Modulation (PWM) techniques have been used. In this paper analysis the different PWM techniques of AC voltage controller is simulated and the results are shown with performance comparison. This is done to show that which PWM technique is more applicable for AC voltage controllers. Phase angle control, single PWM, multiple PWM and sinusoidal PWM techniques are considered for analysis. The analysis and modeling of each technique is compared with output waveforms, tabulated readings and THD graphs. Modeling is performed by using MATLAB/SIMULINK environment.
{"title":"Modeling and Analysis on PWM Techniques for AC Voltage Controllers","authors":"S. R. Viknesh, P. Venkattappan, R. Manikandan, S. Rajendran","doi":"10.1109/ICCCI.2018.8441276","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441276","url":null,"abstract":"AC voltage controllers are often used to change the output AC voltage from fixed input AC voltage for many industrial and commercial applications by using single stage of conversion. AC voltage controllers provide better replacement of auto transformers with low cost. But their output voltage is not much qualified then auto transformers. To obtain variable and improved output voltages, different Pulse Width Modulation (PWM) techniques have been used. In this paper analysis the different PWM techniques of AC voltage controller is simulated and the results are shown with performance comparison. This is done to show that which PWM technique is more applicable for AC voltage controllers. Phase angle control, single PWM, multiple PWM and sinusoidal PWM techniques are considered for analysis. The analysis and modeling of each technique is compared with output waveforms, tabulated readings and THD graphs. Modeling is performed by using MATLAB/SIMULINK environment.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130976840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICCCI.2018.8441205
Abdullahi Ya'u Gambo, H. S. Mahmud
This research extends past work that developed an information seeking tool that retrieves reading materials that matched students' learning style such as read/write, visual, aural, kinesthetic. It classifies reading materials as visual, read/write or kinesthetic, ranks and presents them in this order: the topmost being the closest match while the bottom being the least, and then record the student rating of the reading material presented. Two problems that arise from this work are the low rating received despite the recommended matched materials and the high rating for the unmatched materials. The objective of this research is to investigate suitable adaptive techniques to be integrated in the tool to address these problems. Experiments will be conducted to evaluate the performance of the tool with the integration of the adaptive technique.
{"title":"Adaptive Algorithm for Information Seeking Tool Based on Learning Style","authors":"Abdullahi Ya'u Gambo, H. S. Mahmud","doi":"10.1109/ICCCI.2018.8441205","DOIUrl":"https://doi.org/10.1109/ICCCI.2018.8441205","url":null,"abstract":"This research extends past work that developed an information seeking tool that retrieves reading materials that matched students' learning style such as read/write, visual, aural, kinesthetic. It classifies reading materials as visual, read/write or kinesthetic, ranks and presents them in this order: the topmost being the closest match while the bottom being the least, and then record the student rating of the reading material presented. Two problems that arise from this work are the low rating received despite the recommended matched materials and the high rating for the unmatched materials. The objective of this research is to investigate suitable adaptive techniques to be integrated in the tool to address these problems. Experiments will be conducted to evaluate the performance of the tool with the integration of the adaptive technique.","PeriodicalId":141663,"journal":{"name":"2018 International Conference on Computer Communication and Informatics (ICCCI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133398596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}