Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701910
S. Aich, Sabyasachi Chakraborty, M. Sain, Hye-in Lee, Hee-Cheol Kim
In the current era, blockchain based system getting a lot of attention across different industries especially in the domain of supply chain because of its streamlined nature at the same time keep the privacy intact as well as more efficient than the conventional system. However the traditional supply chain faced lot of challenges these days because of the complex networks. Blockchain integrated with IoT framework has the potential to overcome the challenges faced by the conventional systems across industries. Basically the IoT integrated blockchain system provides enough benefits such as connecting the link between the flows in the supply chain to improve the efficiency of the supply chain network, makes the system transparent that can reduce the code of conduct violation throughout the supply chain networks, the immutable properties helps the stakeholders to trace the products throughout the networks. Even though blockchain based system provides enough benefits across industries, so far the implementation rate is very low because of the lack of knowledge about the benefits of blockchain system as well as lack of understanding about how and why it is needed in their fields. In this paper we will highlight the difference between the conventional supply chain as well as blockchain based supply chain and the benefits of implementing blockchain in different sectors such as automotive, pharmaceutical, food industry, retail. This article will highlights the problems currently facing by the above mentioned industries by using the conventional supply chain as well as the solutions to the problems provide the blockchain based systems in those industries. This articles helps the people across sectors to understand the benefits of the blockchain based system in their respect fields as well as implement it to improve the efficiency of the overall system.
{"title":"A Review on Benefits of IoT Integrated Blockchain based Supply Chain Management Implementations across Different Sectors with Case Study","authors":"S. Aich, Sabyasachi Chakraborty, M. Sain, Hye-in Lee, Hee-Cheol Kim","doi":"10.23919/ICACT.2019.8701910","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701910","url":null,"abstract":"In the current era, blockchain based system getting a lot of attention across different industries especially in the domain of supply chain because of its streamlined nature at the same time keep the privacy intact as well as more efficient than the conventional system. However the traditional supply chain faced lot of challenges these days because of the complex networks. Blockchain integrated with IoT framework has the potential to overcome the challenges faced by the conventional systems across industries. Basically the IoT integrated blockchain system provides enough benefits such as connecting the link between the flows in the supply chain to improve the efficiency of the supply chain network, makes the system transparent that can reduce the code of conduct violation throughout the supply chain networks, the immutable properties helps the stakeholders to trace the products throughout the networks. Even though blockchain based system provides enough benefits across industries, so far the implementation rate is very low because of the lack of knowledge about the benefits of blockchain system as well as lack of understanding about how and why it is needed in their fields. In this paper we will highlight the difference between the conventional supply chain as well as blockchain based supply chain and the benefits of implementing blockchain in different sectors such as automotive, pharmaceutical, food industry, retail. This article will highlights the problems currently facing by the above mentioned industries by using the conventional supply chain as well as the solutions to the problems provide the blockchain based systems in those industries. This articles helps the people across sectors to understand the benefits of the blockchain based system in their respect fields as well as implement it to improve the efficiency of the overall system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127865606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8702021
M. Tutunović, Pongpisit Wuttidittachotti
In Wireless Sensor Networks (WSN) power consumption has a crucial influence on the network performance. It affects the network’s availability, reliability and lifespan and therefore must be kept at minimum. Conducting experiments involving real devices and networks can be too expensive and complex, so a simulator can be used as an alternative in order to simplify the research environment. The simulator used in this paper is Cooja simulator that runs ContikiOS which is commonly used by the WSN hardware platform. The consumed energy was measured using four parameters and in five different tests, varying the number of the sensor nodes, not changing the position of the sink node. The results show that the average power consumption per node is not necessarily connected to the lowest number of nodes, as well as how energy consumption is increased if the node is acting not only as a collector node, but also as a transit node for its neighbouring nodes.
{"title":"Discovery of Suitable Node Number for Wireless Sensor Networks Based on Energy Consumption using Cooja","authors":"M. Tutunović, Pongpisit Wuttidittachotti","doi":"10.23919/ICACT.2019.8702021","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702021","url":null,"abstract":"In Wireless Sensor Networks (WSN) power consumption has a crucial influence on the network performance. It affects the network’s availability, reliability and lifespan and therefore must be kept at minimum. Conducting experiments involving real devices and networks can be too expensive and complex, so a simulator can be used as an alternative in order to simplify the research environment. The simulator used in this paper is Cooja simulator that runs ContikiOS which is commonly used by the WSN hardware platform. The consumed energy was measured using four parameters and in five different tests, varying the number of the sensor nodes, not changing the position of the sink node. The results show that the average power consumption per node is not necessarily connected to the lowest number of nodes, as well as how energy consumption is increased if the node is acting not only as a collector node, but also as a transit node for its neighbouring nodes.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117003141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701969
Navaporn Chockwanich, V. Visoottiviseth
Nowadays intrusion detection systems (IDS) plays an important role in organizations since there are a ton of cyber attacks which affect to security issues: confidential, integrity, availability. Currently, there are many open source tools for intrusion detection but they have different syntax of rules and signatures which cannot be used across different tools. In this paper, we propose an intrusion detection technique by using deep learning model which can classify different types of attacks without human-generated rules or signature mapping. We apply the supervised deep learning technology which are RNN, Stacked RNN, and CNN to classify five popular types of attacks by using Keras on the top of TensorFlow. Our technique requires only the packet header information and does not need any user payload. To verify the performance, we use MAWI dataset which are pcap files and compare our results with Snort IDS. Due to the lack of user payloads, the results show that Snort could not detect the network scan attack via ICMP and UDP. Meanwhile, we prove that RNN, Stacked RNN, and CNN can be used to classify attack for Port scan, Network scan via ICMP, Network scan via UDP, Network scan via TCP, and DoS attack with high accuracy. RNN delivers the highest accuracy.
{"title":"Intrusion Detection by Deep Learning with TensorFlow","authors":"Navaporn Chockwanich, V. Visoottiviseth","doi":"10.23919/ICACT.2019.8701969","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701969","url":null,"abstract":"Nowadays intrusion detection systems (IDS) plays an important role in organizations since there are a ton of cyber attacks which affect to security issues: confidential, integrity, availability. Currently, there are many open source tools for intrusion detection but they have different syntax of rules and signatures which cannot be used across different tools. In this paper, we propose an intrusion detection technique by using deep learning model which can classify different types of attacks without human-generated rules or signature mapping. We apply the supervised deep learning technology which are RNN, Stacked RNN, and CNN to classify five popular types of attacks by using Keras on the top of TensorFlow. Our technique requires only the packet header information and does not need any user payload. To verify the performance, we use MAWI dataset which are pcap files and compare our results with Snort IDS. Due to the lack of user payloads, the results show that Snort could not detect the network scan attack via ICMP and UDP. Meanwhile, we prove that RNN, Stacked RNN, and CNN can be used to classify attack for Port scan, Network scan via ICMP, Network scan via UDP, Network scan via TCP, and DoS attack with high accuracy. RNN delivers the highest accuracy.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117343739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701986
Hind R’bigui, Chiwoon Cho
Process mining is new techniques whereby knowledge from event log stored in today’s information systems are extracted to automatically construct business process models to have a full understanding of the real behaviour of processes, identify bottlenecks, and then improve them. Many process discovery algorithms have been proposed today. However, there are complex control-flow constructs that current discovery techniques cannot correctly discover in models based on event logs. These constructs are short loops, invisible tasks, and nonfree choice constructs. There is currently no algorithm that can handle all of these structures in a restricted time. In this paper, we propose a framework that detects from event logs the complex control-flow constructs that exist. By identifying the existing constructs from a given event log, one can identify the process model notation or the process discovery algorithm appropriate for the given event log. The framework has been implemented in ProM and the results show that constructs are identified correctly.
{"title":"Complex Control-Flow Constructs Detection from Process Related Data","authors":"Hind R’bigui, Chiwoon Cho","doi":"10.23919/ICACT.2019.8701986","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701986","url":null,"abstract":"Process mining is new techniques whereby knowledge from event log stored in today’s information systems are extracted to automatically construct business process models to have a full understanding of the real behaviour of processes, identify bottlenecks, and then improve them. Many process discovery algorithms have been proposed today. However, there are complex control-flow constructs that current discovery techniques cannot correctly discover in models based on event logs. These constructs are short loops, invisible tasks, and nonfree choice constructs. There is currently no algorithm that can handle all of these structures in a restricted time. In this paper, we propose a framework that detects from event logs the complex control-flow constructs that exist. By identifying the existing constructs from a given event log, one can identify the process model notation or the process discovery algorithm appropriate for the given event log. The framework has been implemented in ProM and the results show that constructs are identified correctly.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128293894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8702014
S. Shin, Zafar Makhamadjanovich Rakhmatullayev
In the meantime, e-government has evolved through the constant interaction between technology development and social change. Social issues that become increasingly complex are solved by the capacity of the department, and it is time to solve creative problems by opening and communicating on the basis of ICT. Digital transformation of public services should precede "administrative reform of government. As a new e-government model, which is an alternative to the paradigm shift of e-government, 100% digitization of government services is proposed as a vision to realize sustainable development of society as a whole. The Uzbekistan government intends to achieve governance and administrative unit optimization to create a digital government, to promote the decentralization of the administration, and to create a "single center" that serves individuals and businesses based on "single window". Specifically, it proposes to improve infrastructure, increase human resources, and improve public services. In particular, by introducing interactive portals for public services, digital government is being planned after e-government.
{"title":"Digital Transformation of the Public Service Delivery System in Uzbekistan","authors":"S. Shin, Zafar Makhamadjanovich Rakhmatullayev","doi":"10.23919/ICACT.2019.8702014","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702014","url":null,"abstract":"In the meantime, e-government has evolved through the constant interaction between technology development and social change. Social issues that become increasingly complex are solved by the capacity of the department, and it is time to solve creative problems by opening and communicating on the basis of ICT. Digital transformation of public services should precede \"administrative reform of government. As a new e-government model, which is an alternative to the paradigm shift of e-government, 100% digitization of government services is proposed as a vision to realize sustainable development of society as a whole. The Uzbekistan government intends to achieve governance and administrative unit optimization to create a digital government, to promote the decentralization of the administration, and to create a \"single center\" that serves individuals and businesses based on \"single window\". Specifically, it proposes to improve infrastructure, increase human resources, and improve public services. In particular, by introducing interactive portals for public services, digital government is being planned after e-government.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"383 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129574690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8702039
Yoichi Saito, V. Klyuev
Many products are sold on electronic commerce websites. Online customer reviews are available to help in selecting products to purchase. The products should be recommended by a special system that is capable to analyse and classify reviews because it is very hard for users to read many reviews and result of the recommendation should be personalized to suit user’s requirements. The aim of this research is to classify the online customer reviews accurately to obtain opinion mining techniques of the recommendation system. The research focuses on classifying the Japanese reviews into positive or non-positive. In this study, we classify the reviews at the sentence and the review level. The data set for the sentence-level classification contains the reviews of Electronic Devices category. The data set for the review-level classification contains the reviews of Mobile Phone Accessories category. This research also compares the results of our experiments and another research to evaluate the experimental results. This research is successful to obtain opinion mining techniques and the better results at the review-level classifications instead of the sentence-level classifications. The experimental results will contribute to the opinion mining phase of the recommendation system.
{"title":"Classifying User Reviews at Sentence and Review Levels Utilizing Naïve Bayes","authors":"Yoichi Saito, V. Klyuev","doi":"10.23919/ICACT.2019.8702039","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702039","url":null,"abstract":"Many products are sold on electronic commerce websites. Online customer reviews are available to help in selecting products to purchase. The products should be recommended by a special system that is capable to analyse and classify reviews because it is very hard for users to read many reviews and result of the recommendation should be personalized to suit user’s requirements. The aim of this research is to classify the online customer reviews accurately to obtain opinion mining techniques of the recommendation system. The research focuses on classifying the Japanese reviews into positive or non-positive. In this study, we classify the reviews at the sentence and the review level. The data set for the sentence-level classification contains the reviews of Electronic Devices category. The data set for the review-level classification contains the reviews of Mobile Phone Accessories category. This research also compares the results of our experiments and another research to evaluate the experimental results. This research is successful to obtain opinion mining techniques and the better results at the review-level classifications instead of the sentence-level classifications. The experimental results will contribute to the opinion mining phase of the recommendation system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701896
Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu
With the rapid development of mobile Internet and the popularization of mobile intellectual terminals, learning, working and living were getting more and more efficient. While people were enjoying the efficiency if these modern products, large amount of spam information like advertising, pornography, gambling, fraud were flocking into people’s daily life. The information mentioned above was mostly transmitted through networking data targeting any application. Different methods of detecting and filtering had been proposed by many researchers and scholars, among which the method of SVM based on content was the most popular. However, research focusing on network data had rarely been conducted. The paper proposed a networking data filter running on mobile terminals based on Bayesian Classification. It focused on the data of Chinese spam data detecting and filtering. In addition to the automatic learning of new rules, the filter also implemented a passive incremental learning. Experiments showed that the filter had a higher detection accuracy and an average level of system resource occupancy.
{"title":"Chinese Spam Data Filter Model in Mobile Internet","authors":"Yitao Yang, Runqiu Hu, Guozi Sun, Chengyan Qiu","doi":"10.23919/ICACT.2019.8701896","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701896","url":null,"abstract":"With the rapid development of mobile Internet and the popularization of mobile intellectual terminals, learning, working and living were getting more and more efficient. While people were enjoying the efficiency if these modern products, large amount of spam information like advertising, pornography, gambling, fraud were flocking into people’s daily life. The information mentioned above was mostly transmitted through networking data targeting any application. Different methods of detecting and filtering had been proposed by many researchers and scholars, among which the method of SVM based on content was the most popular. However, research focusing on network data had rarely been conducted. The paper proposed a networking data filter running on mobile terminals based on Bayesian Classification. It focused on the data of Chinese spam data detecting and filtering. In addition to the automatic learning of new rules, the filter also implemented a passive incremental learning. Experiments showed that the filter had a higher detection accuracy and an average level of system resource occupancy.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/icact.2019.8702003
{"title":"ICACT 2019 Contributor Page","authors":"","doi":"10.23919/icact.2019.8702003","DOIUrl":"https://doi.org/10.23919/icact.2019.8702003","url":null,"abstract":"","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132489639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701921
Arbab Waheed Ahmad, Nasir Mehmood Bahadar
Non-orthogonal multiple access (NOMA) enables the next generation mobile communication systems to achieve extremely high data rate with better connectivity and higher spectral efficiency. In downlink NOMA, multiple user-equipments (UEs) are grouped in a single cluster so that a single composite power signal can be transmitted from the evolved nodeB (eNB) for all UEs belong to that cluster. Each UE in the cluster then retrieves its own signal from the composite power signal while implementing successive interference cancellation (SIC). However, in NOMA uplink transmission, each UE is unaware about the transmission of other UEs in the cell. Hence each UE is considered as a unique individual entity in uplink and therefore transmits power independently. Therefore in uplink, multiple UEs cannot be grouped into a single cluster so as to transmit a single composite power signal to the eNB. In order to achieve spectral efficiency in uplink NOMA, in this paper we exploit the concept of Heterogeneous network (HetNet) model and propose a two-step power allocation scheme. UEs belong to a specific geographical area are grouped in a small cell alike cluster and a cluster-eNB (ceNB) is defined for each cluster. UEs inside the cluster transmits individually and independently to the ceNB during the first step and afterwards the ceNB multiplex multiple UEs in a single superimposed composite power signal while allocating distinct power levels to different users in the second step. Finally, the ceNB then transmits the superimposed composite power signal to the eNB. The numerical results demonstrate that the proposed technique outperforms the conventional orthogonal multiple access (OMA) technique.
{"title":"Exploiting Heterogeneous Networks model for Cluster Formation and Power Allocation in Uplink NOMA","authors":"Arbab Waheed Ahmad, Nasir Mehmood Bahadar","doi":"10.23919/ICACT.2019.8701921","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701921","url":null,"abstract":"Non-orthogonal multiple access (NOMA) enables the next generation mobile communication systems to achieve extremely high data rate with better connectivity and higher spectral efficiency. In downlink NOMA, multiple user-equipments (UEs) are grouped in a single cluster so that a single composite power signal can be transmitted from the evolved nodeB (eNB) for all UEs belong to that cluster. Each UE in the cluster then retrieves its own signal from the composite power signal while implementing successive interference cancellation (SIC). However, in NOMA uplink transmission, each UE is unaware about the transmission of other UEs in the cell. Hence each UE is considered as a unique individual entity in uplink and therefore transmits power independently. Therefore in uplink, multiple UEs cannot be grouped into a single cluster so as to transmit a single composite power signal to the eNB. In order to achieve spectral efficiency in uplink NOMA, in this paper we exploit the concept of Heterogeneous network (HetNet) model and propose a two-step power allocation scheme. UEs belong to a specific geographical area are grouped in a small cell alike cluster and a cluster-eNB (ceNB) is defined for each cluster. UEs inside the cluster transmits individually and independently to the ceNB during the first step and afterwards the ceNB multiplex multiple UEs in a single superimposed composite power signal while allocating distinct power levels to different users in the second step. Finally, the ceNB then transmits the superimposed composite power signal to the eNB. The numerical results demonstrate that the proposed technique outperforms the conventional orthogonal multiple access (OMA) technique.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132212405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-02-01DOI: 10.23919/ICACT.2019.8701994
C. Wongwatkit
With the significance of information technology literacy in the 21st century, the university requires all students to have specific knowledge of this topic before graduation by taking the exit exam. The university has encountered the problem with the meager rate of students who passed this exam. Since they learned this topic in the freshmen year, their understanding of this topic may be lost and limited consequently. Therefore, the students need a tutoring system that can help them to review the content effectively before taking the exam. In this study, an online web-based adaptive tutoring system has been developed by adopting the context of exit exam on information technology literacy. The developed system embedded an adaptive structure on questions, assessment and learning profile that can help students to better prepare and refresh their knowledge before taking the exit exam. The system has been tested for the system performance before use. To find the effectiveness of this system, the data analysis has been conducted. The results show that the students who learning and practicing on this system have higher achievements on the exam, while the university has a higher rate of students who passed this exam accordingly. The findings of this study shed light on the significance of preparing students to be ready before graduation by the competent, meaningful support of online learning system.
{"title":"An Online Web-based Adaptive Tutoring System for University Exit Exam on IT Literacy","authors":"C. Wongwatkit","doi":"10.23919/ICACT.2019.8701994","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701994","url":null,"abstract":"With the significance of information technology literacy in the 21st century, the university requires all students to have specific knowledge of this topic before graduation by taking the exit exam. The university has encountered the problem with the meager rate of students who passed this exam. Since they learned this topic in the freshmen year, their understanding of this topic may be lost and limited consequently. Therefore, the students need a tutoring system that can help them to review the content effectively before taking the exam. In this study, an online web-based adaptive tutoring system has been developed by adopting the context of exit exam on information technology literacy. The developed system embedded an adaptive structure on questions, assessment and learning profile that can help students to better prepare and refresh their knowledge before taking the exit exam. The system has been tested for the system performance before use. To find the effectiveness of this system, the data analysis has been conducted. The results show that the students who learning and practicing on this system have higher achievements on the exam, while the university has a higher rate of students who passed this exam accordingly. The findings of this study shed light on the significance of preparing students to be ready before graduation by the competent, meaningful support of online learning system.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130914309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}