首页 > 最新文献

2018 Majan International Conference (MIC)最新文献

英文 中文
Design and implementation of private cloud for higher education using OpenStack 基于OpenStack的高等教育私有云的设计与实现
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363161
G. Bhatia, Ismail Al Noutaki, Sheikha Al Ruzeiqi, Jawaher Al Maskari
Higher Education Institutions requires ready to access dedicated devices and various operating systems to assist in teaching, learning various courses. Due to the high cost of hardware, providing physical devices in ever changing IT field is neither economical nor feasible. A higher education IT course may demand specific software running on the specific operating system at particular hardware configuration. Different operating systems requirement and their complex installation and maintenance process poses difficulty to manage them. OpenStack can address both issues by providing IaaS for hardware resources and standard mechanism to manage and distribute course specific VMs. This paper provides design of private cloud for higher education and proof-of-concept implementation methodology for OpenStack platform. Furthermore, to facilitate the construction of the private cloud, the resource requirement model is formulated by which the requirement of physical resources can be measured for a specific number of virtual machines.
高等教育机构需要准备好访问专用设备和各种操作系统,以协助教学,学习各种课程。由于硬件的高成本,在不断变化的IT领域提供物理设备既不经济也不可行。高等教育的IT课程可能需要在特定硬件配置的特定操作系统上运行特定的软件。不同的操作系统需求及其复杂的安装和维护过程给管理带来了困难。OpenStack可以通过提供IaaS(硬件资源)和标准机制来管理和分发特定课程的虚拟机来解决这两个问题。本文提供了高等教育私有云的设计和OpenStack平台的概念验证实现方法。此外,为了便于私有云的建设,我们制定了资源需求模型,通过该模型可以衡量特定数量的虚拟机对物理资源的需求。
{"title":"Design and implementation of private cloud for higher education using OpenStack","authors":"G. Bhatia, Ismail Al Noutaki, Sheikha Al Ruzeiqi, Jawaher Al Maskari","doi":"10.1109/MINTC.2018.8363161","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363161","url":null,"abstract":"Higher Education Institutions requires ready to access dedicated devices and various operating systems to assist in teaching, learning various courses. Due to the high cost of hardware, providing physical devices in ever changing IT field is neither economical nor feasible. A higher education IT course may demand specific software running on the specific operating system at particular hardware configuration. Different operating systems requirement and their complex installation and maintenance process poses difficulty to manage them. OpenStack can address both issues by providing IaaS for hardware resources and standard mechanism to manage and distribute course specific VMs. This paper provides design of private cloud for higher education and proof-of-concept implementation methodology for OpenStack platform. Furthermore, to facilitate the construction of the private cloud, the resource requirement model is formulated by which the requirement of physical resources can be measured for a specific number of virtual machines.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application of text classification and clustering of Twitter data for business analytics Twitter数据的文本分类和聚类在商业分析中的应用
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363162
Alrence S. Halibas, Abubucker Samsudeen Shaffi, Mohamed Mohamed
In the recent years, social networks in business are gaining unprecedented popularity because of their potential for business growth. Companies can know more about consumers' sentiments towards their products and services, and use it to better understand the market and improve their brand. Thus, companies regularly reinvent their marketing strategies and campaigns to fit consumers' preferences. Social analysis harnesses and utilizes the vast volume of data in social networks to mine critical data for strategic decision making. It uses machine learning techniques and tools in determining patterns and trends to gain actionable insights. This paper selected a popular food brand to evaluate a given stream of customer comments on Twitter. Several metrics in classification and clustering of data were used for analysis. A Twitter API is used to collect twitter corpus and feed it to a Binary Tree classifier that will discover the polarity lexicon of English tweets, whether positive or negative. A k-means clustering technique is used to group together similar words in tweets in order to discover certain business value. This paper attempts to discuss the technical and business perspectives of text mining analysis of Twitter data and recommends appropriate future opportunities in developing this emerging field.
近年来,商业社交网络因其潜在的商业增长潜力而获得前所未有的普及。企业可以更多地了解消费者对其产品和服务的看法,并利用它来更好地了解市场,提升品牌。因此,公司经常重新设计他们的营销策略和活动,以适应消费者的偏好。社交分析利用社交网络中的大量数据来挖掘关键数据以进行战略决策。它使用机器学习技术和工具来确定模式和趋势,以获得可操作的见解。本文选择了一个受欢迎的食品品牌来评估Twitter上给定的客户评论流。使用数据分类和聚类的几个指标进行分析。Twitter API用于收集Twitter语料库并将其提供给二进制树分类器,该分类器将发现英语tweet的极性词典,无论是积极的还是消极的。使用k-means聚类技术将tweet中的相似词分组,以发现某些商业价值。本文试图讨论Twitter数据的文本挖掘分析的技术和商业角度,并建议适当的未来发展这一新兴领域的机会。
{"title":"Application of text classification and clustering of Twitter data for business analytics","authors":"Alrence S. Halibas, Abubucker Samsudeen Shaffi, Mohamed Mohamed","doi":"10.1109/MINTC.2018.8363162","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363162","url":null,"abstract":"In the recent years, social networks in business are gaining unprecedented popularity because of their potential for business growth. Companies can know more about consumers' sentiments towards their products and services, and use it to better understand the market and improve their brand. Thus, companies regularly reinvent their marketing strategies and campaigns to fit consumers' preferences. Social analysis harnesses and utilizes the vast volume of data in social networks to mine critical data for strategic decision making. It uses machine learning techniques and tools in determining patterns and trends to gain actionable insights. This paper selected a popular food brand to evaluate a given stream of customer comments on Twitter. Several metrics in classification and clustering of data were used for analysis. A Twitter API is used to collect twitter corpus and feed it to a Binary Tree classifier that will discover the polarity lexicon of English tweets, whether positive or negative. A k-means clustering technique is used to group together similar words in tweets in order to discover certain business value. This paper attempts to discuss the technical and business perspectives of text mining analysis of Twitter data and recommends appropriate future opportunities in developing this emerging field.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
An energy aware secure wireless network using particle swarm optimization 基于粒子群优化的能量感知安全无线网络
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363148
K. Stephen, V. Mathivanan
A Wireless sensor networks (WSN) typically has no infrastructure. It is composed of number of sensor nodes working together to monitor an environment to obtain data about it. Structured and unstructured are the two types of WSNs. An unstructured WSN contains a dense collection of sensor nodes. These sensors are small, computing resources, with limited processing and they are inexpensive. It can sense, measure, and gather information from the environment based on some local decision process; they can transmit the sensed data to the user. Security and lifetime of a sensor node in a network plays an important role. Data Securing is very important as these networks usually are put in dangerous scenarios and the sensor nodes in these networks have very limited battery life. Authorizing a new node involves a major work in the fundamental build for a secure WSN. In this paper, we propose a mobile sinks along with Particle Swarm Optimization for combined WSN. The new algorithm outperforms the normal convergence algorithm both in efficiency and in the quality of solutions.
无线传感器网络(WSN)通常没有基础设施。它是由多个传感器节点共同工作来监视环境以获取有关环境的数据。结构化和非结构化是wsn的两种类型。非结构化WSN包含传感器节点的密集集合。这些传感器体积小,计算资源有限,处理能力有限,而且价格低廉。它可以感知、测量和收集基于局部决策过程的环境信息;它们可以将感知到的数据传输给用户。在网络中,传感器节点的安全性和生存期起着至关重要的作用。数据安全非常重要,因为这些网络通常被置于危险的场景中,而这些网络中的传感器节点的电池寿命非常有限。授权新节点是安全无线传感器网络基础构建中的一项重要工作。本文提出了一种结合粒子群算法的移动汇算法。新算法在效率和解的质量上都优于常规的收敛算法。
{"title":"An energy aware secure wireless network using particle swarm optimization","authors":"K. Stephen, V. Mathivanan","doi":"10.1109/MINTC.2018.8363148","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363148","url":null,"abstract":"A Wireless sensor networks (WSN) typically has no infrastructure. It is composed of number of sensor nodes working together to monitor an environment to obtain data about it. Structured and unstructured are the two types of WSNs. An unstructured WSN contains a dense collection of sensor nodes. These sensors are small, computing resources, with limited processing and they are inexpensive. It can sense, measure, and gather information from the environment based on some local decision process; they can transmit the sensed data to the user. Security and lifetime of a sensor node in a network plays an important role. Data Securing is very important as these networks usually are put in dangerous scenarios and the sensor nodes in these networks have very limited battery life. Authorizing a new node involves a major work in the fundamental build for a secure WSN. In this paper, we propose a mobile sinks along with Particle Swarm Optimization for combined WSN. The new algorithm outperforms the normal convergence algorithm both in efficiency and in the quality of solutions.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117035905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IRDM watermarking with EMRC6 encryption for DRM system 基于EMRC6加密的IRDM数字水印
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363157
S. Mary, S. Joe, M. Siddique
The information in the digital form encounters various form of attacks while it is being sent through the communication channel. To withstand the attacks the information has to be secured by any one of the security mechanism. Digital Right Management (DRM) system is one where the right of ownership, authentication and integrity of the information and such other safety protocols are maintained. This paper consists of a working model for DRM system that is a combination of Improved Rational Dither Modulation (IRDM) for watermarking and Enhanced Modified Rivet Cipher 6 (EMRC6) for encryption. Since both the watermarking and encryption schemes are integrated together, this model provides a high level of security thus making the DRM system more robust. The input information can be either text or two dimensional image but this model can be extended to multidimensional information also. IRDM is a frequency domain scheme and is used for improving the robustness of the watermarking system. When compared to its predecessor RDM, IRDM is resistant to all attacks on watermark information and especially to scaling attack. The EMRC6 encryption scheme is a block ciphering method that is faster than the other version of RC6 and it has no attack. Hence it provides a high level of security to the information. The information from the output of this model ensures that the output digital image does not have any visual artifact since the PSNR value is around 41 dB on an average and the correlation coefficient is near to zero. The encryption time is very low and the throughput is high thus concluding that the working model is very fast.
数字形式的信息在通过通信通道发送的过程中会受到各种形式的攻击。为了抵御攻击,信息必须由任何一种安全机制来保护。数字版权管理(DRM)系统是一种维护信息的所有权、身份验证和完整性以及其他安全协议的系统。本文提出了一种基于改进理性抖动调制(IRDM)的数字水印和基于改进改进铆钉密码6 (EMRC6)的数字加密系统的工作模型。由于水印和加密方案集成在一起,该模型提供了高水平的安全性,从而使DRM系统更加健壮。输入信息可以是文本,也可以是二维图像,但该模型也可以扩展到多维信息。IRDM是一种频域格式,用于提高水印系统的鲁棒性。与之前的RDM相比,IRDM能够抵抗各种针对水印信息的攻击,特别是抗缩放攻击。EMRC6加密方案是一种分组加密方法,比其他版本的RC6更快,并且没有攻击。因此,它为信息提供了高度的安全性。该模型输出的信息确保了输出的数字图像没有任何视觉伪影,因为PSNR值平均在41 dB左右,相关系数接近于零。加密时间非常短,吞吐量很高,因此工作模型非常快。
{"title":"IRDM watermarking with EMRC6 encryption for DRM system","authors":"S. Mary, S. Joe, M. Siddique","doi":"10.1109/MINTC.2018.8363157","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363157","url":null,"abstract":"The information in the digital form encounters various form of attacks while it is being sent through the communication channel. To withstand the attacks the information has to be secured by any one of the security mechanism. Digital Right Management (DRM) system is one where the right of ownership, authentication and integrity of the information and such other safety protocols are maintained. This paper consists of a working model for DRM system that is a combination of Improved Rational Dither Modulation (IRDM) for watermarking and Enhanced Modified Rivet Cipher 6 (EMRC6) for encryption. Since both the watermarking and encryption schemes are integrated together, this model provides a high level of security thus making the DRM system more robust. The input information can be either text or two dimensional image but this model can be extended to multidimensional information also. IRDM is a frequency domain scheme and is used for improving the robustness of the watermarking system. When compared to its predecessor RDM, IRDM is resistant to all attacks on watermark information and especially to scaling attack. The EMRC6 encryption scheme is a block ciphering method that is faster than the other version of RC6 and it has no attack. Hence it provides a high level of security to the information. The information from the output of this model ensures that the output digital image does not have any visual artifact since the PSNR value is around 41 dB on an average and the correlation coefficient is near to zero. The encryption time is very low and the throughput is high thus concluding that the working model is very fast.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116201905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Internet of nanothings: Challenges & opportunities 纳米物联网:挑战与机遇
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363165
Manal N. K. Al-Rawahi, Tripti Sharma, Praba Palanisamy
Nanotechnology is an upfront technology used to develop and design devices in the scale of nanometers. It offers opportunities and effective solutions in the field of medicine, military, agriculture, environment and computing systems. There are a lot of funding, initiatives by different countries around the world such as US, China for the project based on Nanotechnology in different areas. Recently, Oman is also incorporating nanotechnology to be deployed in different fields. Getting different sensors connected and interact intelligently with each other is the main application of IoT. However, replacing sensors with Nano sensors has provided a completely a new aspect to the Internet of Things (IoT) that is IoNT. IoNT is the new evolution that is a blend of IoT and nanotechnology. Because of its promising prospects and applications in the different areas, IoNT can be considered as the next generation of the IoT. Therefore in this paper, we will study and analyze the opportunities and the challenges of IoNT in the applications pertaining to the various domains.
纳米技术是一种用于开发和设计纳米级设备的前沿技术。它为医学、军事、农业、环境和计算系统领域提供了机会和有效的解决方案。世界上不同的国家,比如美国和中国,为不同领域的纳米技术项目提供了很多资金和倡议。最近,阿曼也正在将纳米技术应用于不同的领域。将不同的传感器连接起来并相互智能交互是物联网的主要应用。然而,用纳米传感器取代传感器为物联网(IoT)提供了一个全新的方面,即IoNT。物联网是物联网和纳米技术融合的新发展。由于其广阔的前景和在不同领域的应用,物联网可以被认为是下一代物联网。因此,在本文中,我们将研究和分析IoNT在各个领域的应用中的机遇和挑战。
{"title":"Internet of nanothings: Challenges & opportunities","authors":"Manal N. K. Al-Rawahi, Tripti Sharma, Praba Palanisamy","doi":"10.1109/MINTC.2018.8363165","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363165","url":null,"abstract":"Nanotechnology is an upfront technology used to develop and design devices in the scale of nanometers. It offers opportunities and effective solutions in the field of medicine, military, agriculture, environment and computing systems. There are a lot of funding, initiatives by different countries around the world such as US, China for the project based on Nanotechnology in different areas. Recently, Oman is also incorporating nanotechnology to be deployed in different fields. Getting different sensors connected and interact intelligently with each other is the main application of IoT. However, replacing sensors with Nano sensors has provided a completely a new aspect to the Internet of Things (IoT) that is IoNT. IoNT is the new evolution that is a blend of IoT and nanotechnology. Because of its promising prospects and applications in the different areas, IoNT can be considered as the next generation of the IoT. Therefore in this paper, we will study and analyze the opportunities and the challenges of IoNT in the applications pertaining to the various domains.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127667187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Review of potential security attacks in VANET 审查VANET中潜在的安全攻击
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363152
M. Shahid, A. Jaekel, C. Ezeife, Qasim Al-Ajmi, Ikjot Saini
Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars as network nodes, Road-side units (RSU) and On-Board Unit(OBU). Basic purpose of VANETs is to provide efficient routing and better safety for drivers and passengers. This emerging technology is gaining more and more popularity as car accidents are increasing in the world. In this self-oriented network, security and privacy is so crucial. In this paper, we review the potential threats to Availability, Confidentiality, Authentication and Integrity in VANETs and, we also compare the type of potential attacks and its solutions.
车辆自组织网络(VANETs)是由汽车作为网络节点、路侧单元(RSU)和车载单元(OBU)组成的自组织网络的一个特殊分支。VANETs的基本目的是为司机和乘客提供有效的路线和更好的安全。随着世界上交通事故的增加,这项新兴技术越来越受欢迎。在这个以自我为中心的网络中,安全和隐私是至关重要的。在本文中,我们回顾了vanet中可用性、机密性、身份验证和完整性的潜在威胁,并比较了潜在攻击的类型及其解决方案。
{"title":"Review of potential security attacks in VANET","authors":"M. Shahid, A. Jaekel, C. Ezeife, Qasim Al-Ajmi, Ikjot Saini","doi":"10.1109/MINTC.2018.8363152","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363152","url":null,"abstract":"Vehicular Ad hoc Networks (VANETs) is a special branch of ad hoc network which consists of cars as network nodes, Road-side units (RSU) and On-Board Unit(OBU). Basic purpose of VANETs is to provide efficient routing and better safety for drivers and passengers. This emerging technology is gaining more and more popularity as car accidents are increasing in the world. In this self-oriented network, security and privacy is so crucial. In this paper, we review the potential threats to Availability, Confidentiality, Authentication and Integrity in VANETs and, we also compare the type of potential attacks and its solutions.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126311616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Analysis of effectiveness of smart city implementation in transportation sector in Oman 阿曼交通部门实施智慧城市的有效性分析
Pub Date : 2018-03-19 DOI: 10.1109/MINTC.2018.8363163
Wisam Ahmed Al Farsi, Geetha Achuthan
Due to the observed growth in world population and high utilization of basic services, a prerequisite to transform cities into urban ones had emerged in last few years. Oman is now running urbanization process as its cities are improved day by day. With this framework, a vast amount of data is generated and it can be analysed in appropriate manner & utilized in order to make these cities smart and can adopt themselves. Here, the concept of Big Data was born to be the primary factor of rapid urbanization and towards smart city. Thus, this paper aims to study the smart city concept, analyse and provide a clear illustration of the effectiveness of smart city implementation in public transportation in Oman using Big Data and its applications. Data collected from five of the Mwasalat internal bus routes in Muscat are used to predict passengers travel pattern in these routes. The predictions are formed using different forecasting methods namely TBATS and ARIMA. These methods are applied to passengers' dataset and is found that TBATS method is perfectly fitted with the dataset.
由于世界人口的明显增长和对基本服务的高度利用,在过去几年中出现了将城市转变为都市的先决条件。随着城市的日益改善,阿曼正在进行城市化进程。有了这个框架,就会产生大量的数据,这些数据可以以适当的方式进行分析和利用,以使这些城市变得智能,并可以自我采用。在这里,大数据的概念诞生了,成为快速城市化和走向智慧城市的首要因素。因此,本文旨在研究智慧城市概念,利用大数据及其应用分析并提供阿曼公共交通智慧城市实施有效性的清晰说明。从马斯喀特的5条Mwasalat内部巴士路线收集的数据用于预测这些路线上的乘客旅行模式。采用TBATS和ARIMA两种不同的预测方法进行预测。将这些方法应用于乘客数据集,发现TBATS方法与数据集很好地拟合。
{"title":"Analysis of effectiveness of smart city implementation in transportation sector in Oman","authors":"Wisam Ahmed Al Farsi, Geetha Achuthan","doi":"10.1109/MINTC.2018.8363163","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363163","url":null,"abstract":"Due to the observed growth in world population and high utilization of basic services, a prerequisite to transform cities into urban ones had emerged in last few years. Oman is now running urbanization process as its cities are improved day by day. With this framework, a vast amount of data is generated and it can be analysed in appropriate manner & utilized in order to make these cities smart and can adopt themselves. Here, the concept of Big Data was born to be the primary factor of rapid urbanization and towards smart city. Thus, this paper aims to study the smart city concept, analyse and provide a clear illustration of the effectiveness of smart city implementation in public transportation in Oman using Big Data and its applications. Data collected from five of the Mwasalat internal bus routes in Muscat are used to predict passengers travel pattern in these routes. The predictions are formed using different forecasting methods namely TBATS and ARIMA. These methods are applied to passengers' dataset and is found that TBATS method is perfectly fitted with the dataset.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127327229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recursive clustering technique for students' performance evaluation in programming courses 递归聚类技术在程序设计课程学生成绩评估中的应用
Pub Date : 2018-03-01 DOI: 10.1109/MINTC.2018.8363153
V. Anand, S. K. Abdul Rahiman, E. Ben George, A. S. Huda
Automated prediction of students' performance in the earlier stage is a useful prospect in the teaching learning process. If the students who are probably going to fail are identified in the initial stage, a set of corrective measures can be taken to improve their grades. This paper employs the machine learning approach called the Recursive Clustering technique to group the students of the programming course into groups based on their performance in the prerequisite courses, co-requisite, CGPA and current course work result. Students present in the lower groups will be taken into consideration since they are highly prone to fail. Each of these groups will be provided with the set of programs and notes automatically based on their group. After a time period another assessment will be carried out and again the students will be clustered based on their new performance. This process will be repeated for three times so that most of the students from the lower group will move to the higher group. The results are compared to the number of students in each group before applying the recursive clustering technique and after. The results prove that this approach provides an effective way to predict the low performing students from their early in-class assessment, thereby enabling the student to be on track.
在教学过程中,早期阶段学生表现的自动预测是一个有用的前景。如果在最初阶段就发现了可能不及格的学生,就可以采取一系列纠正措施来提高他们的成绩。本文采用递归聚类技术的机器学习方法,根据学生在预修课程、必修课程、CGPA和当前课程作业成绩的表现,对编程课程的学生进行分组。出现在较低组的学生将被考虑在内,因为他们很容易不及格。每个小组将根据他们的小组自动提供一套程序和笔记。一段时间后,将进行另一次评估,学生将根据他们的新表现再次分组。这个过程将重复三次,以便大多数来自较低组的学生将转移到较高组。将结果与应用递归聚类技术之前和之后的每组学生人数进行比较。结果表明,该方法可以有效地从早期的课堂评估中预测出表现较差的学生,从而使学生走上正轨。
{"title":"Recursive clustering technique for students' performance evaluation in programming courses","authors":"V. Anand, S. K. Abdul Rahiman, E. Ben George, A. S. Huda","doi":"10.1109/MINTC.2018.8363153","DOIUrl":"https://doi.org/10.1109/MINTC.2018.8363153","url":null,"abstract":"Automated prediction of students' performance in the earlier stage is a useful prospect in the teaching learning process. If the students who are probably going to fail are identified in the initial stage, a set of corrective measures can be taken to improve their grades. This paper employs the machine learning approach called the Recursive Clustering technique to group the students of the programming course into groups based on their performance in the prerequisite courses, co-requisite, CGPA and current course work result. Students present in the lower groups will be taken into consideration since they are highly prone to fail. Each of these groups will be provided with the set of programs and notes automatically based on their group. After a time period another assessment will be carried out and again the students will be clustered based on their new performance. This process will be repeated for three times so that most of the students from the lower group will move to the higher group. The results are compared to the number of students in each group before applying the recursive clustering technique and after. The results prove that this approach provides an effective way to predict the low performing students from their early in-class assessment, thereby enabling the student to be on track.","PeriodicalId":250088,"journal":{"name":"2018 Majan International Conference (MIC)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133214304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
2018 Majan International Conference (MIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1