首页 > 最新文献

2020 International Conference on Computer Science and Software Engineering (CSASE)最新文献

英文 中文
Hybrid Chaotic Scheme for Secure OFDM-PON Transmission OFDM-PON安全传输的混合混沌方案
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142120
Huda Ismail Olewi, R. Fyath
Different chaotic security schemes have been applied in the literature to secure transmission over orthogonal frequencies-division multiplexing (OFDM)-passive optical networks (PONs). All these schemes have been based on threedimensional (3D) or four-dimensional (4D) chaos systems and have been applied to direct-detection (DD) OFDM-PONs. This paper proposes the use of 7D hybrid chaotic scheme to provide physical-layer security in both DD and coherent OFDM-PONs. The hybrid scheme uses a combination of 3D chaotic mapping scheme and 4D chaotic discrete Hartley transform precoding. The proposed chaotic security scheme is applied successfully for both DD-and coherent OFDM-PONs, and the results show that the security is very sensitive to initial conditions of both subchaotic systems.
不同的混沌安全方案已经在文献中应用于正交频分复用(OFDM)-无源光网络(pon)上的安全传输。所有这些方案都基于三维(3D)或四维(4D)混沌系统,并已应用于直接检测(DD) ofdm - pon。本文提出了使用7D混合混沌方案来提供DD和相干ofdm - pon的物理层安全性。混合方案采用三维混沌映射方案和四维混沌离散哈特利变换预编码相结合的方法。将所提出的混沌安全方案成功应用于dd -和相干OFDM-PONs,结果表明,该方案对两种子混沌系统的初始条件都非常敏感。
{"title":"Hybrid Chaotic Scheme for Secure OFDM-PON Transmission","authors":"Huda Ismail Olewi, R. Fyath","doi":"10.1109/CSASE48920.2020.9142120","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142120","url":null,"abstract":"Different chaotic security schemes have been applied in the literature to secure transmission over orthogonal frequencies-division multiplexing (OFDM)-passive optical networks (PONs). All these schemes have been based on threedimensional (3D) or four-dimensional (4D) chaos systems and have been applied to direct-detection (DD) OFDM-PONs. This paper proposes the use of 7D hybrid chaotic scheme to provide physical-layer security in both DD and coherent OFDM-PONs. The hybrid scheme uses a combination of 3D chaotic mapping scheme and 4D chaotic discrete Hartley transform precoding. The proposed chaotic security scheme is applied successfully for both DD-and coherent OFDM-PONs, and the results show that the security is very sensitive to initial conditions of both subchaotic systems.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CSASE 2020 Keynote Speaker-3 CSASE 2020主题演讲-3
Pub Date : 2020-04-01 DOI: 10.1109/csase48920.2020.9142047
{"title":"CSASE 2020 Keynote Speaker-3","authors":"","doi":"10.1109/csase48920.2020.9142047","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142047","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124962679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network-Based Model for Dissemination of Advertising 基于网络的广告传播模型
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142074
Thaer Alramli, Basim Mahmood, D. Kadhim
The rapid development of mobile devices and their vast range of affordances have been widely exploited for commercial purposes these days. Moreover, mobile advertising is considered as a new trend of commercials for advertisers and marketers. It provides an opportunity to access consumers remotely at any time and any place. Recently, mobile advertising has been grown faster than most of other digital advertising formats. The current infrastructure of mobile devices provides with a convenient platform for mobile advertising. Therefore, the most effective way for mobile advertising is the use of mobile applications. Yet, advertising companies try to adopt new methods for improving their advertising campaign. In this paper, we investigate two dissemination-related issues in mobile advertising, namely, dissemination distance (for an ad), and dissemination direction. We propose two social inspired methods for the purpose of controlling the dissemination of ads within an area of interest. The first method is based on the concept of weak ties (in social networks) among individuals for disseminating ads and the second method is based on the concept of degree centrality of individuals. The findings show that our proposed approaches are efficient and reflected a high performance in terms of dissemination distance, and dissemination direction.
如今,移动设备的快速发展及其广泛的功能已被广泛用于商业目的。此外,移动广告被广告主和营销人员认为是一种新的广告趋势。它提供了在任何时间、任何地点远程访问消费者的机会。最近,移动广告的增长速度超过了大多数其他数字广告形式。当前移动设备的基础设施为移动广告提供了便利的平台。因此,移动广告最有效的方式是使用移动应用程序。然而,广告公司试图采用新的方法来改善他们的广告活动。在本文中,我们研究了移动广告中与传播相关的两个问题,即传播距离(广告)和传播方向。我们提出了两种社会启发的方法,以控制广告在感兴趣的领域内的传播。第一种方法是基于个体之间传播广告的弱联系(在社交网络中)的概念,第二种方法是基于个体程度中心性的概念。研究结果表明,本文提出的方法在传播距离和传播方向方面具有较高的效率和性能。
{"title":"Network-Based Model for Dissemination of Advertising","authors":"Thaer Alramli, Basim Mahmood, D. Kadhim","doi":"10.1109/CSASE48920.2020.9142074","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142074","url":null,"abstract":"The rapid development of mobile devices and their vast range of affordances have been widely exploited for commercial purposes these days. Moreover, mobile advertising is considered as a new trend of commercials for advertisers and marketers. It provides an opportunity to access consumers remotely at any time and any place. Recently, mobile advertising has been grown faster than most of other digital advertising formats. The current infrastructure of mobile devices provides with a convenient platform for mobile advertising. Therefore, the most effective way for mobile advertising is the use of mobile applications. Yet, advertising companies try to adopt new methods for improving their advertising campaign. In this paper, we investigate two dissemination-related issues in mobile advertising, namely, dissemination distance (for an ad), and dissemination direction. We propose two social inspired methods for the purpose of controlling the dissemination of ads within an area of interest. The first method is based on the concept of weak ties (in social networks) among individuals for disseminating ads and the second method is based on the concept of degree centrality of individuals. The findings show that our proposed approaches are efficient and reflected a high performance in terms of dissemination distance, and dissemination direction.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127666090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Security Evaluation Methods and the used parameters for Some Cryptosystem 某些密码系统的安全性评估方法及使用的参数
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142076
S. Sadkhan, S. F. Jawad
the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.
评估过程是设计师必须执行的必要过程,以帮助避免在设计阶段出现任何弱点。对于不同的密码系统,有许多评估方法。评价主要基于对加密算法安全性的度量。安全性与算法的复杂度有关。因此,复杂度可以作为所设计密码系统的一个评价参数。通常,可以将许多不同的概念结合起来,以使评估过程适应已测试的密码系统。本文用不同的方法对密码系统的安全性进行了评估。
{"title":"Security Evaluation Methods and the used parameters for Some Cryptosystem","authors":"S. Sadkhan, S. F. Jawad","doi":"10.1109/CSASE48920.2020.9142076","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142076","url":null,"abstract":"the evaluation process is a necessary process that must be performed by the designer to help in avoiding any weakness which happens during the design stages. There are many evaluation approaches followed for different cipher systems. The evaluation mainly based on the measure of the security of the ciphering algorithm. The security is related to the complexity of the algorithm. Hence the complexity can be considered as an evaluation parameter of the designed cipher system. Generally, it is possible to combine many different concepts to adapt the evaluation process to the tested cipher systems. This paper provides the evaluation of Security of cryptosystem using different approaches.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"AES-7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126506446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Response Time Study of Cloud Web Application - Based Smart Monitoring System 基于云Web应用的智能监控系统响应时间研究
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142099
S. Al-Shammari, A. Husein
The Internet of Things (IoT) has a vital role in managing organisations in daily life. In addition, it is significant in the real-time monitoring systems. This has led to the importance of finding ways to minimise the time required to process the data. Wireless Sensor Networks (WSNs) are used in IoT to collect the data from the monitored environments to the servers. Managing real-time applications requires the management of the transmitted data between the client-side and the provider side. Managing the monitored data in IoT requires processing the transmitted data into the cloud. Web services technologies are used in managing and implementing cloud applications APIs (Application Programming Interfaces). This paper presents an implementation of a cloud web application for a smart monitoring system using Representational State Transfer (REST) architecture; the paper also introduces a performance evaluation for the transmitted data, which includes the response time required in the transmission process. This research discusses the effect of multitenancy on the overall system performance.
物联网(IoT)在日常生活中管理组织方面发挥着至关重要的作用。此外,它在实时监控系统中具有重要意义。这导致了寻找最小化处理数据所需时间的方法的重要性。无线传感器网络(wsn)在物联网中用于从被监控环境收集数据到服务器。管理实时应用程序需要管理客户端和提供程序端之间传输的数据。在物联网中管理监控数据需要将传输的数据处理到云中。Web服务技术用于管理和实现云应用程序api(应用程序编程接口)。本文提出了一种基于REST (Representational State Transfer, Representational State Transfer)架构的智能监控系统的云web应用实现方案;本文还介绍了传输数据的性能评估,包括传输过程中所需的响应时间。本研究讨论了多租户对整体系统性能的影响。
{"title":"Response Time Study of Cloud Web Application - Based Smart Monitoring System","authors":"S. Al-Shammari, A. Husein","doi":"10.1109/CSASE48920.2020.9142099","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142099","url":null,"abstract":"The Internet of Things (IoT) has a vital role in managing organisations in daily life. In addition, it is significant in the real-time monitoring systems. This has led to the importance of finding ways to minimise the time required to process the data. Wireless Sensor Networks (WSNs) are used in IoT to collect the data from the monitored environments to the servers. Managing real-time applications requires the management of the transmitted data between the client-side and the provider side. Managing the monitored data in IoT requires processing the transmitted data into the cloud. Web services technologies are used in managing and implementing cloud applications APIs (Application Programming Interfaces). This paper presents an implementation of a cloud web application for a smart monitoring system using Representational State Transfer (REST) architecture; the paper also introduces a performance evaluation for the transmitted data, which includes the response time required in the transmission process. This research discusses the effect of multitenancy on the overall system performance.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125978348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Enhancement of Speech Scrambling Techniques Based on Many Chaotic Signals 基于多混沌信号的语音置乱技术性能增强
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142062
Ammar M. Raheema, Sattar B. Sadkhan-SMIEEE, Sinan M. Abdul Satar
scrambling method structure consists of three main components: scrambling, noisy channel and descrambling. The scrambling and descrambling processes. On the basis of chaotic signals, a speech scrambling technique is an essential work to upgrade and improve data protection in secure communication applications, especially military applications, and the main idea is immunity against eavesdropper to achieve security. The aim of uses the key encrypted in the Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing QAM OFDM system to improve performance of the Bits Error Rates BER on the receiving side that is robust against the effects of the Additive White Gaussian Noise AWGN. This paper has been published a speech authentication model using five separate chaotic maps / flows: Logistic maps LM, Baker maps BM, Henon map HM, Rössler system RÖS and Lorenz system LS based on 16-64 QAM_OFDM technique. The evaluation measures included six different tests: Segmental spectral signal to ratio of noise SSSNR, Log spectral distance dLOG, Linear predict coding distance dLPC, cepstral distance dCD, Frequency Weighted log Spectral distance dFWLOG and Bit error rate BER. Objective tests to measure the residual intelligibility R.I. of speech between the original and scrambling/ descrambling signal for proposed models: dLOG= 14.5415, dLPC= 0.9741, dCD= 8.8503, SSSNR= −26.506, and dFWLOG= 20.9976, While the BER between the original signal and recovered signal at 10 dB about 10-03, Which is big enough to protect the brute force attack encryption signal. We conducted a series of unpredictable map / flow randomness tests: Lyapunov exponent test and Auto correlation.
置乱方法的结构主要由置乱、噪声信道和解扰三个部分组成。混乱和混乱的过程。基于混沌信号的语音置乱技术是安全通信应用特别是军事应用中提升和改进数据保护的必要工作,其主要思想是防止窃听以达到安全目的。目的是在正交调幅-正交频分复用QAM OFDM系统中使用加密密钥,提高接收端误码率BER的性能,使其对加性高斯白噪声AWGN的影响具有鲁棒性。本文发表了一个基于16-64 QAM_OFDM技术的语音认证模型,该模型使用五种独立的混沌映射/流:Logistic映射LM, Baker映射BM, Henon映射HM, Rössler系统RÖS和Lorenz系统LS。评价指标包括6个不同的测试:段谱信噪比SSSNR、对数谱距离dLOG、线性预测编码距离dLPC、倒谱距离dCD、频率加权对数谱距离dFWLOG和误码率BER。对dLOG= 14.5415, dLPC= 0.9741, dCD= 8.8503, SSSNR=−26.506,dFWLOG= 20.9976的模型进行了客观测试,测量了原始信号与加扰/解扰信号之间的残差语音可理解度R.I.,而原始信号与恢复信号在10 dB处的误码率约为10-03,足以保护暴力破解加密信号。我们进行了一系列不可预测的map / flow随机性测试:Lyapunov指数测试和自相关测试。
{"title":"Performance Enhancement of Speech Scrambling Techniques Based on Many Chaotic Signals","authors":"Ammar M. Raheema, Sattar B. Sadkhan-SMIEEE, Sinan M. Abdul Satar","doi":"10.1109/CSASE48920.2020.9142062","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142062","url":null,"abstract":"scrambling method structure consists of three main components: scrambling, noisy channel and descrambling. The scrambling and descrambling processes. On the basis of chaotic signals, a speech scrambling technique is an essential work to upgrade and improve data protection in secure communication applications, especially military applications, and the main idea is immunity against eavesdropper to achieve security. The aim of uses the key encrypted in the Quadrature Amplitude Modulation-Orthogonal Frequency Division Multiplexing QAM OFDM system to improve performance of the Bits Error Rates BER on the receiving side that is robust against the effects of the Additive White Gaussian Noise AWGN. This paper has been published a speech authentication model using five separate chaotic maps / flows: Logistic maps LM, Baker maps BM, Henon map HM, Rössler system RÖS and Lorenz system LS based on 16-64 QAM_OFDM technique. The evaluation measures included six different tests: Segmental spectral signal to ratio of noise SSSNR, Log spectral distance dLOG, Linear predict coding distance dLPC, cepstral distance dCD, Frequency Weighted log Spectral distance dFWLOG and Bit error rate BER. Objective tests to measure the residual intelligibility R.I. of speech between the original and scrambling/ descrambling signal for proposed models: dLOG= 14.5415, dLPC= 0.9741, dCD= 8.8503, SSSNR= −26.506, and dFWLOG= 20.9976, While the BER between the original signal and recovered signal at 10 dB about 10-03, Which is big enough to protect the brute force attack encryption signal. We conducted a series of unpredictable map / flow randomness tests: Lyapunov exponent test and Auto correlation.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Three-stage Junction Detection in Document Images 文档图像中的三阶段连接检测
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142083
Hasan S. M. Al-Khaffaf, A. Talib
Engineering drawings contain many curves that intersect at a complex junction. Detection of these junctions is vital for correct recognition of line drawings. In this paper we study the detection of junctions in document images. A threestage junction detection is proposed to detect junctions in document images. The first stage works at the pixel level. Any pixel with more than two neighbors is labeled as low-level-junction. The second stage works at connected component level. All low-level-junctions adjacent to other low-level-junctions are merged into mid-level-junctions. The third stage combines mid-level-junction at a distance less than a threshold into a high-level-junction. Experimental results on real scanned images of mechanical engineering drawings show a precision rate of 82.38% and a recall rate of 97.29%.
工程图纸包含许多曲线,这些曲线在一个复杂的交叉点相交。检测这些连接点对于正确识别线条图至关重要。本文主要研究文档图像中连接点的检测。提出了一种三级结点检测方法来检测文档图像中的结点。第一阶段在像素级工作。任何有两个以上邻居的像素都被标记为低电平结。第二阶段在连接的组件级别上工作。所有与其他低电平结点相邻的低电平结点合并为中电平结点。第三阶段将距离小于阈值的中电平结合并为高电平结。在机械工程图纸真实扫描图像上的实验结果表明,该方法的准确率为82.38%,召回率为97.29%。
{"title":"Three-stage Junction Detection in Document Images","authors":"Hasan S. M. Al-Khaffaf, A. Talib","doi":"10.1109/CSASE48920.2020.9142083","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142083","url":null,"abstract":"Engineering drawings contain many curves that intersect at a complex junction. Detection of these junctions is vital for correct recognition of line drawings. In this paper we study the detection of junctions in document images. A threestage junction detection is proposed to detect junctions in document images. The first stage works at the pixel level. Any pixel with more than two neighbors is labeled as low-level-junction. The second stage works at connected component level. All low-level-junctions adjacent to other low-level-junctions are merged into mid-level-junctions. The third stage combines mid-level-junction at a distance less than a threshold into a high-level-junction. Experimental results on real scanned images of mechanical engineering drawings show a precision rate of 82.38% and a recall rate of 97.29%.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131253406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Model of Faculty Experience in E-Learning Student Satisfaction E-Learning中教师体验的学生满意度模型
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142071
R. M. Tawafak, Ghaliya Alfarsi, M. Alnuaimi, Abdalla Eldow, S. I. Malik, M. Shakir
There is a need for several models in the higher education institutions of the Middle East to improve both teacher and student satisfaction. This study investigates the influence of combining online learning with class communication on the enhancement of teaching methods and assessment techniques. This paper aims to enhance an e-learning model for improving faculty assessment. In the first part, an organized review of the previous literature articles was determined to test and compare the common criteria used in selecting factors such as student motivation, understanding, usage, and satisfaction. Then, design a compatible model that mixed up with an online E-Learning model with course work classes for assessing both student grade and skills performance in addition to evaluate the match of teaching method and course outcomes and learning. In this study, surveys were distributed to AlBuraimi University College in Oman to assess their satisfaction with teaching and assessment. The findings of this paper give highly acceptance of SPSS statistical results.
中东的高等教育机构需要几种模式来提高教师和学生的满意度。本研究探讨线上学习与课堂交流相结合对改善教学方法与评量技巧的影响。本文旨在改进一种电子学习模式,以改善教师的评估。在第一部分中,对以前的文献文章进行了有组织的回顾,决定测试和比较在选择因素时使用的共同标准,如学生动机,理解,使用和满意度。然后,设计一个兼容的模型,将在线E-Learning模型与课程作业类混合,以评估学生的成绩和技能表现,并评估教学方法与课程成果和学习的匹配程度。在这项研究中,调查被分发到阿曼的阿尔布拉米大学学院,以评估他们对教学和评估的满意度。本文的研究结果对SPSS统计结果的接受度很高。
{"title":"Model of Faculty Experience in E-Learning Student Satisfaction","authors":"R. M. Tawafak, Ghaliya Alfarsi, M. Alnuaimi, Abdalla Eldow, S. I. Malik, M. Shakir","doi":"10.1109/CSASE48920.2020.9142071","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142071","url":null,"abstract":"There is a need for several models in the higher education institutions of the Middle East to improve both teacher and student satisfaction. This study investigates the influence of combining online learning with class communication on the enhancement of teaching methods and assessment techniques. This paper aims to enhance an e-learning model for improving faculty assessment. In the first part, an organized review of the previous literature articles was determined to test and compare the common criteria used in selecting factors such as student motivation, understanding, usage, and satisfaction. Then, design a compatible model that mixed up with an online E-Learning model with course work classes for assessing both student grade and skills performance in addition to evaluate the match of teaching method and course outcomes and learning. In this study, surveys were distributed to AlBuraimi University College in Oman to assess their satisfaction with teaching and assessment. The findings of this paper give highly acceptance of SPSS statistical results.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122805007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
CSASE 2020 Author Index CSASE 2020作者索引
Pub Date : 2020-04-01 DOI: 10.1109/csase48920.2020.9142108
{"title":"CSASE 2020 Author Index","authors":"","doi":"10.1109/csase48920.2020.9142108","DOIUrl":"https://doi.org/10.1109/csase48920.2020.9142108","url":null,"abstract":"","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124926595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Relevance Feedback Based on Local Context 基于局部上下文的语义关联反馈
Pub Date : 2020-04-01 DOI: 10.1109/CSASE48920.2020.9142115
Hadeel M. Awad, Waffa M. Saeed
Semantic similarity is a measure based on the meaning of the word and represented by the type of semantic relationships between the meanings of two words. The semantic similarity between words or sentences can be calculated by following the method, WordNet-based similarity. In our suggested method, the proposed solution depends on the two-step to return the target document collection. Once the top d1, d2…, dn documents have been retrieved using the initial query. The second compares these retrieved documents with the query, this step takes the most frequent senses of sentences in d1, d2…, dn with the senses of the query sentences. Query enrichment is then carried out adding terms semantically related to these senses the aim is to resolve the issue of incompatibility and the ambiguity problem affecting the results of information retrieval through the use of techniques to Word sense disambiguation (WSD) the word and the results be more semantically related with the query. Our experiment, carried out using part of the fire2011 data set.
语义相似度是以词的意义为基础,用两个词之间的语义关系类型来表示的度量。单词或句子之间的语义相似度可以通过基于wordnet的相似度方法来计算。在我们建议的方法中,建议的解决方案依赖于两个步骤来返回目标文档集合。一旦使用初始查询检索了前d1、d2…、dn文档。第二步将这些检索到的文档与查询进行比较,这一步将d1、d2…、dn中最常见的句子意义与查询句子的意义进行比较。然后进行查询充实,添加与这些语义相关的词,目的是通过使用语义消歧(WSD)技术使词和结果在语义上与查询更相关,从而解决影响信息检索结果的不兼容和歧义问题。我们的实验使用了fire2011数据集的一部分。
{"title":"Semantic Relevance Feedback Based on Local Context","authors":"Hadeel M. Awad, Waffa M. Saeed","doi":"10.1109/CSASE48920.2020.9142115","DOIUrl":"https://doi.org/10.1109/CSASE48920.2020.9142115","url":null,"abstract":"Semantic similarity is a measure based on the meaning of the word and represented by the type of semantic relationships between the meanings of two words. The semantic similarity between words or sentences can be calculated by following the method, WordNet-based similarity. In our suggested method, the proposed solution depends on the two-step to return the target document collection. Once the top d1, d2…, dn documents have been retrieved using the initial query. The second compares these retrieved documents with the query, this step takes the most frequent senses of sentences in d1, d2…, dn with the senses of the query sentences. Query enrichment is then carried out adding terms semantically related to these senses the aim is to resolve the issue of incompatibility and the ambiguity problem affecting the results of information retrieval through the use of techniques to Word sense disambiguation (WSD) the word and the results be more semantically related with the query. Our experiment, carried out using part of the fire2011 data set.","PeriodicalId":254581,"journal":{"name":"2020 International Conference on Computer Science and Software Engineering (CSASE)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124682857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 International Conference on Computer Science and Software Engineering (CSASE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1