首页 > 最新文献

2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)最新文献

英文 中文
Electrical Energy Usage Analysis for all Residences of a South African Academic Institution 南非某学术机构所有住宅的电能使用分析
S. Ntsaluba, M. Michael, Solathiso Shasha, Isaac Dlamini
This study presents an analysis of the energy usage of the twenty-eight residences at the University of Johannesburg during the 2017 calendar year. The paper presents the energy consumption if the residences based on the total energy usage per residence as well as in terms of the number of students at each of the residences for the different seasons of the year. The results of this study show a strong correlation between energy usage and factors such as temperature, time of day and building occupancy. Furthermore, an analysis of the load factors and power factors for each of these residences during different months of the 2017 calendar year revealed possible opportunities for energy saving interventions.
本研究分析了约翰内斯堡大学2017年28栋住宅的能源使用情况。本文根据每所住宅的总能源使用量以及每所住宅在一年中不同季节的学生人数,给出了住宅的能源消耗情况。这项研究的结果表明,能源使用与温度、一天中的时间和建筑物占用率等因素之间存在很强的相关性。此外,对2017日历年不同月份每个住宅的负荷因素和功率因素的分析揭示了节能干预的可能机会。
{"title":"Electrical Energy Usage Analysis for all Residences of a South African Academic Institution","authors":"S. Ntsaluba, M. Michael, Solathiso Shasha, Isaac Dlamini","doi":"10.1109/ICONIC.2018.8601093","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601093","url":null,"abstract":"This study presents an analysis of the energy usage of the twenty-eight residences at the University of Johannesburg during the 2017 calendar year. The paper presents the energy consumption if the residences based on the total energy usage per residence as well as in terms of the number of students at each of the residences for the different seasons of the year. The results of this study show a strong correlation between energy usage and factors such as temperature, time of day and building occupancy. Furthermore, an analysis of the load factors and power factors for each of these residences during different months of the 2017 calendar year revealed possible opportunities for energy saving interventions.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124921410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Review of Automated Detection Methods for Cyberbullying 网络欺凌自动检测方法综述
Thabo Mahlangu, Chunling Tu, P. Owolawi
As we see the cyberspace evolve we also see a directly proportional growth of the people using the cyberspace for communication. As a result, the misuse of the cyberspace has given rise to negative issues such as cyberbullying, which is a form of harassing other people using information technology in a deliberate and continual manner. The detection and prevention of cyberbullying becomes critical for safe and health social media platforms. In this paper, a review of the cyberbullying content in Internet, the categories of cyberbullying, data sources containing cyberbullying data for research, and machine learning techniques for cyberbullying detection are overviewed. The main challenges of the cyberbullying detection are demonstrated, including the lack of multimedia content-based detection and availability of public accessible dataset. Suggestions are provided as the conclusion of the overview.
随着网络空间的发展,我们也看到使用网络空间进行交流的人数成正比地增长。因此,对网络空间的滥用产生了网络欺凌等负面问题,网络欺凌是一种故意和持续地使用信息技术骚扰他人的形式。发现和预防网络欺凌对于安全和健康的社交媒体平台至关重要。本文综述了网络欺凌的内容、网络欺凌的分类、包含网络欺凌研究数据的数据源以及用于网络欺凌检测的机器学习技术。指出了网络欺凌检测的主要挑战,包括缺乏基于多媒体内容的检测和公共可访问数据集的可用性。建议作为概述的结论。
{"title":"A Review of Automated Detection Methods for Cyberbullying","authors":"Thabo Mahlangu, Chunling Tu, P. Owolawi","doi":"10.1109/ICONIC.2018.8601278","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601278","url":null,"abstract":"As we see the cyberspace evolve we also see a directly proportional growth of the people using the cyberspace for communication. As a result, the misuse of the cyberspace has given rise to negative issues such as cyberbullying, which is a form of harassing other people using information technology in a deliberate and continual manner. The detection and prevention of cyberbullying becomes critical for safe and health social media platforms. In this paper, a review of the cyberbullying content in Internet, the categories of cyberbullying, data sources containing cyberbullying data for research, and machine learning techniques for cyberbullying detection are overviewed. The main challenges of the cyberbullying detection are demonstrated, including the lack of multimedia content-based detection and availability of public accessible dataset. Suggestions are provided as the conclusion of the overview.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131184427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks 认知无线电Ad-hoc网络中拜占庭攻击缓解方案的设计
S. Mapunya, M. Velempini
The ever-increasing number of wireless network systems brought a problem of spectrum congestion leading to slow data communications. All of the radio spectrums are allocated to different users, services and applications. Hence studies have shown that some of those spectrum bands are underutilized while others are congested. Cognitive radio concept has evolved to solve the problem of spectrum congestion by allowing cognitive users to opportunistically utilize the underutilized spectrum while minimizing interference with other users. Byzantine attack is one of the security issues which threaten the successful deployment of this technology. Byzantine attack is compromised cognitive radios which relay falsified data about the availability of the spectrum to other legitimate cognitive radios in the network leading interference. In this paper we are proposing a security measure to thwart the effect caused by these attacks and compared it to Attack-Proof Cooperative Spectrum Sensing.
无线网络系统数量的不断增加带来了频谱拥塞问题,导致数据通信速度缓慢。所有的无线电频谱都分配给不同的用户、业务和应用。因此,研究表明,其中一些频谱带未得到充分利用,而另一些则拥挤不堪。认知无线电概念的发展是为了解决频谱拥塞问题,允许认知用户投机地利用未充分利用的频谱,同时尽量减少对其他用户的干扰。拜占庭攻击是威胁该技术成功部署的安全问题之一。拜占庭攻击是一种受损的认知无线电,它将有关频谱可用性的伪造数据转发给网络中其他合法的认知无线电,从而导致干扰。在本文中,我们提出了一种安全措施来阻止这些攻击所带来的影响,并将其与防攻击协同频谱感知进行了比较。
{"title":"The Design of Byzantine Attack Mitigation Scheme in Cognitive Radio Ad-hoc Networks","authors":"S. Mapunya, M. Velempini","doi":"10.1109/ICONIC.2018.8601087","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601087","url":null,"abstract":"The ever-increasing number of wireless network systems brought a problem of spectrum congestion leading to slow data communications. All of the radio spectrums are allocated to different users, services and applications. Hence studies have shown that some of those spectrum bands are underutilized while others are congested. Cognitive radio concept has evolved to solve the problem of spectrum congestion by allowing cognitive users to opportunistically utilize the underutilized spectrum while minimizing interference with other users. Byzantine attack is one of the security issues which threaten the successful deployment of this technology. Byzantine attack is compromised cognitive radios which relay falsified data about the availability of the spectrum to other legitimate cognitive radios in the network leading interference. In this paper we are proposing a security measure to thwart the effect caused by these attacks and compared it to Attack-Proof Cooperative Spectrum Sensing.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132019329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detecting and Removing the Impulsive Noise in OFDM Channels Using Different ANN Techniques 利用不同的人工神经网络技术检测和去除OFDM信道中的脉冲噪声
Olamide M. Shekoni, Ali N. Hasan, T. Shongwe
Orthogonal frequency division multiplexer (OFDM) is a recent modulation scheme used to transmit signals across power line communication (PLC) channel due to its robustness against some known PLC problems. However, this scheme is greatly affected by the impulsive noise (IN) and often causes corruption with the transmitted bits. Different impulsive noise error correcting methods have been introduced and used to remove impulsive noise in OFDM systems. However, these techniques suffer some limitations and require much signal to noise ratio (SNR) power to operate. In this paper, an approach of designing an effective impulsive-noise error-correcting technique was introduced using three-known artificial neural network techniques (Levenberg-Marquardt, Scaled conjugate gradient, and Bayesian regularization). Findings suggest that both Bayesian regularization and Levenberg-Marquardt ANN techniques can be used to effectively remove the impulsive noise present in an OFDM channel and using the least SNR power.
正交频分复用器(OFDM)是一种最新的用于跨电力线通信(PLC)信道传输信号的调制方案,因为它对一些已知的PLC问题具有鲁棒性。但是,该方案受脉冲噪声的影响较大,容易造成传输位的损坏。介绍了不同的脉冲噪声纠错方法,并将其用于消除OFDM系统中的脉冲噪声。然而,这些技术有一定的局限性,需要很高的信噪比(SNR)功率才能运行。本文介绍了一种利用三种已知的人工神经网络技术(Levenberg-Marquardt、缩放共轭梯度和贝叶斯正则化)设计有效的脉冲噪声纠错技术的方法。研究结果表明,贝叶斯正则化和Levenberg-Marquardt人工神经网络技术可以有效地去除OFDM信道中存在的脉冲噪声,并且使用最小的信噪比功率。
{"title":"Detecting and Removing the Impulsive Noise in OFDM Channels Using Different ANN Techniques","authors":"Olamide M. Shekoni, Ali N. Hasan, T. Shongwe","doi":"10.1109/ICONIC.2018.8601218","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601218","url":null,"abstract":"Orthogonal frequency division multiplexer (OFDM) is a recent modulation scheme used to transmit signals across power line communication (PLC) channel due to its robustness against some known PLC problems. However, this scheme is greatly affected by the impulsive noise (IN) and often causes corruption with the transmitted bits. Different impulsive noise error correcting methods have been introduced and used to remove impulsive noise in OFDM systems. However, these techniques suffer some limitations and require much signal to noise ratio (SNR) power to operate. In this paper, an approach of designing an effective impulsive-noise error-correcting technique was introduced using three-known artificial neural network techniques (Levenberg-Marquardt, Scaled conjugate gradient, and Bayesian regularization). Findings suggest that both Bayesian regularization and Levenberg-Marquardt ANN techniques can be used to effectively remove the impulsive noise present in an OFDM channel and using the least SNR power.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Tree Routing Protocol for ZigBee Healthcare Monitoring Systems 一种用于ZigBee医疗监控系统的新树路由协议
B. E. Buthelezi, M. Mphahlele, D. D. du Plessis, Solly Maswikaneng, Topside E. Mathonsi
ZigBee is an industrial standard for personal area network (PAN) developed for low power, cost and rate for wireless radio communications. Lately, ZigBee implementation in Healthcare Monitoring Systems (HMS) is exponentially increasing. ZigBee specification proposed that a number of wireless sensor nodes can be connected through a tree hierarchal topology in a ZigBee network. In Health sector, HMSs implement body sensor nodes that are capable of collecting human physiological data such as Heart Rate signals. However, routing in tree topology needs every sensor node to transmit data to a central node called coordinator. Parent-child is the mechanism that is used to forward packets to the coordinator in the original ZigBee Tree Routing (ZTR) scheme. However, parent-child mechanism is not suitable to transmit sensitive data such as heart rate pulses. Parent-child mechanism suffers from end to end delay problem which is a disadvantage for physiological signals as they require emergency attention. This paper is proposing a solution that attempts to solve this problem by implementing New Tree Routing Protocol (NTRP) algorithm. NTRP scheme is evaluated on NS-2 simulator tool and its simulation results show improvement of average end to end delay of 0.3-1% while the packet delivery ratio is 5-11.6%.
ZigBee是一种针对个人区域网络(PAN)的工业标准,为无线无线电通信的低功耗、低成本和低速率而开发。最近,ZigBee在医疗监控系统(HMS)中的应用呈指数级增长。ZigBee规范提出,在ZigBee网络中,多个无线传感器节点可以通过树形分层拓扑结构进行连接。在卫生部门,hms实现了能够收集人体生理数据(如心率信号)的身体传感器节点。然而,树拓扑中的路由需要每个传感器节点将数据传输到一个称为协调器的中心节点。在最初的ZigBee树路由(ZTR)方案中,父-子机制是将数据包转发给协调器的机制。然而,亲子机制不适合传输心率脉冲等敏感数据。亲子机制存在端到端延迟问题,这对需要紧急处理的生理信号是不利的。本文提出了一种通过实现新树路由协议(NTRP)算法来解决这一问题的方案。在NS-2仿真工具上对NTRP方案进行了仿真,仿真结果表明,NTRP方案的端到端平均时延提高了0.3-1%,数据包投递率提高了5-11.6%。
{"title":"A New Tree Routing Protocol for ZigBee Healthcare Monitoring Systems","authors":"B. E. Buthelezi, M. Mphahlele, D. D. du Plessis, Solly Maswikaneng, Topside E. Mathonsi","doi":"10.1109/ICONIC.2018.8601221","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601221","url":null,"abstract":"ZigBee is an industrial standard for personal area network (PAN) developed for low power, cost and rate for wireless radio communications. Lately, ZigBee implementation in Healthcare Monitoring Systems (HMS) is exponentially increasing. ZigBee specification proposed that a number of wireless sensor nodes can be connected through a tree hierarchal topology in a ZigBee network. In Health sector, HMSs implement body sensor nodes that are capable of collecting human physiological data such as Heart Rate signals. However, routing in tree topology needs every sensor node to transmit data to a central node called coordinator. Parent-child is the mechanism that is used to forward packets to the coordinator in the original ZigBee Tree Routing (ZTR) scheme. However, parent-child mechanism is not suitable to transmit sensitive data such as heart rate pulses. Parent-child mechanism suffers from end to end delay problem which is a disadvantage for physiological signals as they require emergency attention. This paper is proposing a solution that attempts to solve this problem by implementing New Tree Routing Protocol (NTRP) algorithm. NTRP scheme is evaluated on NS-2 simulator tool and its simulation results show improvement of average end to end delay of 0.3-1% while the packet delivery ratio is 5-11.6%.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130588746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Effects of a Software Artefact Designed to Stimulate Abstract Thinking Ability on the Academic Performance in Object Oriented Programming of First Year Information Technology Students 为激发抽象思维能力而设计的软件构件对信息技术一年级学生面向对象编程学习成绩的影响
L. Grobbelaar
A below average throughput of Information Technology students specializing in software development is a challenge that many Universities and Universities of Technology in South Africa face. Contributing factors to this phenomenon are varied at best, but one of the identified factors are that students in this field, especially first year students, find it difficult to conceptualize the associated information and manner of thinking required to become successful in their studies. This is especially true when considering object orientated programming concepts and paradigms that students are required to master as part of their studies. Literary evidence suggests that a high level of working memory, which is associated with abstract thinking ability, is required when learning and applying object orientated programming concepts. The problem becomes more evident and serious if we consider that the Information and Communication Technology sector of a country is largely dependent on the graduating student populous in terms of growing the sector sustainably. A specialized software instrument was developed and tested in an attempt to affect a change in the abstract thinking ability of students from a student sample at a University of Technology. The results of this study focusses on the effect that the instrument realized on the academic performance of first year students related to particularly to object orientated programming and their abstract thinking ability in general as gauged by, amongst other instruments, the General Scholastic Ability Test, or GSAT, rather than focusing on the instrument itself.
专门从事软件开发的信息技术学生的平均吞吐量低于平均水平,这是南非许多大学和技术大学面临的挑战。造成这一现象的因素最多是多种多样的,但其中一个确定的因素是,这一领域的学生,尤其是一年级学生,发现很难概念化在学习中取得成功所需的相关信息和思维方式。当考虑到面向对象的编程概念和范式时,这一点尤其正确,因为学生需要将其作为学习的一部分来掌握。文献证据表明,在学习和应用面向对象的编程概念时,需要高水平的工作记忆,这与抽象思维能力有关。如果我们考虑到一个国家的信息和通信技术部门在可持续发展方面很大程度上依赖于毕业生人口,那么这个问题就会变得更加明显和严重。本文开发并测试了一种专门的软件工具,试图影响一所科技大学学生样本中学生抽象思维能力的变化。本研究的结果侧重于该工具对一年级学生的学习成绩的影响,特别是对面向对象编程和抽象思维能力的影响,这些能力一般是由通用学术能力测试(GSAT)等工具衡量的,而不是侧重于工具本身。
{"title":"The Effects of a Software Artefact Designed to Stimulate Abstract Thinking Ability on the Academic Performance in Object Oriented Programming of First Year Information Technology Students","authors":"L. Grobbelaar","doi":"10.1109/ICONIC.2018.8601262","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601262","url":null,"abstract":"A below average throughput of Information Technology students specializing in software development is a challenge that many Universities and Universities of Technology in South Africa face. Contributing factors to this phenomenon are varied at best, but one of the identified factors are that students in this field, especially first year students, find it difficult to conceptualize the associated information and manner of thinking required to become successful in their studies. This is especially true when considering object orientated programming concepts and paradigms that students are required to master as part of their studies. Literary evidence suggests that a high level of working memory, which is associated with abstract thinking ability, is required when learning and applying object orientated programming concepts. The problem becomes more evident and serious if we consider that the Information and Communication Technology sector of a country is largely dependent on the graduating student populous in terms of growing the sector sustainably. A specialized software instrument was developed and tested in an attempt to affect a change in the abstract thinking ability of students from a student sample at a University of Technology. The results of this study focusses on the effect that the instrument realized on the academic performance of first year students related to particularly to object orientated programming and their abstract thinking ability in general as gauged by, amongst other instruments, the General Scholastic Ability Test, or GSAT, rather than focusing on the instrument itself.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130434325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Machine Learning Classifiers for Intrusion Detection 机器学习分类器在入侵检测中的性能分析
Skhumbuzo Zwane, Paul Tarwireyi, M. Adigun
Modern tactical wireless network (TWN) communication technologies are not only capable of transmitting voice but also capable of transmitting data. Due to such capabilities, TWN have high security requirements as any security breach can lead to detrimental effects. Hence, securing such an environment is not only a requirement but also a virtual prerequisite to the network centric warfare operational (NCW) theory. One key to securing this environment is to promptly and accurately recognize information warfare attacks directed to the network and respond to them. This is achieved using intrusion detection systems (IDS). However, false detection of nodes in hostile environment remains a major problem that need to be addressed. Recently, machine learning methods and algorithms have shown applicability and are growing research area for cyber security and intrusion detection. Conversely, several decades of research in the field of machine learning have resulted in a multitude of different algorithms for solving a broad range of problems. The question then becomes, which one amongst these machine learning algorithms have the potential to enhance or address IDS issues in TWN. In this paper, seven machine learning classifiers are analyzed; Multi-Layer Perceptron, Bayesian Network, Support Vector Machine (SMO), Adaboost, Random Forest, Bootstrap Aggregation, and Decision Tree (J48). WEKA tool was used to implement and evaluate the classifiers. The results obtained indicate that ensemble-based learning methods outperformed single learning methods when we consider the detection accuracy metrics; AUC, TPR, and FPR. However, ensemble classifiers tend to be slower in in terms of build time and model test time.
现代战术无线网络通信技术不仅具有传输语音的能力,而且具有传输数据的能力。由于这些能力,由于任何安全漏洞都可能导致不利影响,因此对网络的安全性要求很高。因此,确保这样的环境不仅是网络中心战操作(NCW)理论的要求,而且是虚拟先决条件。保护这种环境的一个关键是迅速准确地识别针对网络的信息战攻击并对其作出反应。这是通过入侵检测系统(IDS)实现的。然而,在恶劣环境下节点的误检测仍然是一个需要解决的主要问题。近年来,机器学习方法和算法在网络安全和入侵检测领域的应用日益广泛。相反,机器学习领域几十年的研究已经产生了许多不同的算法来解决各种各样的问题。那么问题就变成了,在这些机器学习算法中,哪一个有潜力增强或解决《TWN》中的IDS问题。本文分析了7种机器学习分类器;多层感知机、贝叶斯网络、支持向量机(SMO)、Adaboost、随机森林、Bootstrap聚合和决策树(J48)。使用WEKA工具实现和评估分类器。结果表明,当考虑检测精度指标时,基于集成的学习方法优于单一学习方法;AUC, TPR和FPR。然而,集成分类器在构建时间和模型测试时间方面往往较慢。
{"title":"Performance Analysis of Machine Learning Classifiers for Intrusion Detection","authors":"Skhumbuzo Zwane, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICONIC.2018.8601203","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601203","url":null,"abstract":"Modern tactical wireless network (TWN) communication technologies are not only capable of transmitting voice but also capable of transmitting data. Due to such capabilities, TWN have high security requirements as any security breach can lead to detrimental effects. Hence, securing such an environment is not only a requirement but also a virtual prerequisite to the network centric warfare operational (NCW) theory. One key to securing this environment is to promptly and accurately recognize information warfare attacks directed to the network and respond to them. This is achieved using intrusion detection systems (IDS). However, false detection of nodes in hostile environment remains a major problem that need to be addressed. Recently, machine learning methods and algorithms have shown applicability and are growing research area for cyber security and intrusion detection. Conversely, several decades of research in the field of machine learning have resulted in a multitude of different algorithms for solving a broad range of problems. The question then becomes, which one amongst these machine learning algorithms have the potential to enhance or address IDS issues in TWN. In this paper, seven machine learning classifiers are analyzed; Multi-Layer Perceptron, Bayesian Network, Support Vector Machine (SMO), Adaboost, Random Forest, Bootstrap Aggregation, and Decision Tree (J48). WEKA tool was used to implement and evaluate the classifiers. The results obtained indicate that ensemble-based learning methods outperformed single learning methods when we consider the detection accuracy metrics; AUC, TPR, and FPR. However, ensemble classifiers tend to be slower in in terms of build time and model test time.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"51 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126001809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Perception of Students about the use of Social Media as an Alternate Learning Platform 学生对使用社交媒体作为替代学习平台的看法
Sindisiwe Mahlambi, S. Civilcharran, Nurudeen Ajayi
The advent of Web 2.0 brought about a new medium of communication, such as social media. Today’s generation of students have been greatly influenced by the Web and hence, have become active users of the different available social media platforms. The influence of social media platforms on students, is causing a shift in learning, and as a result, educational institutions are increasingly creating alternative learning platforms, using social media to facilitate student-centred learning. This paper presents the findings from a study that was conducted to understand the perception of students regarding the use of social media as an alternative learning platform. The quantitative research method was adopted, and 331 questionnaires were administered at the Pietermaritzburg campus of University of KwaZulu-Natal (UKZN). The findings reveal that students are comfortable with the use of social media as a learning platform, because it enhances their ability to be interactive and it improves their chances of accessing educational information, even when not within the academic environment. The findings, however, also revealed that some features of social media could cause distraction to students, but when adequate measures are introduced, social media could become an additional means of interaction for students, especially for academic purposes.
Web 2.0的出现带来了一种新的交流媒介,比如社交媒体。当今一代的学生深受网络的影响,因此,他们已经成为各种可用社交媒体平台的活跃用户。社交媒体平台对学生的影响正在导致学习方式的转变,因此,教育机构越来越多地创建替代学习平台,利用社交媒体促进以学生为中心的学习。本文介绍了一项研究的结果,该研究旨在了解学生对使用社交媒体作为替代学习平台的看法。采用定量研究方法,在夸祖鲁-纳塔尔大学彼得马里茨堡校区发放问卷331份。调查结果显示,学生们乐于使用社交媒体作为学习平台,因为它增强了他们互动的能力,增加了他们获取教育信息的机会,即使不是在学术环境中。然而,研究结果也表明,社交媒体的一些功能可能会分散学生的注意力,但如果采取适当的措施,社交媒体可能会成为学生的一种额外的互动方式,尤其是在学术方面。
{"title":"The Perception of Students about the use of Social Media as an Alternate Learning Platform","authors":"Sindisiwe Mahlambi, S. Civilcharran, Nurudeen Ajayi","doi":"10.1109/ICONIC.2018.8601228","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601228","url":null,"abstract":"The advent of Web 2.0 brought about a new medium of communication, such as social media. Today’s generation of students have been greatly influenced by the Web and hence, have become active users of the different available social media platforms. The influence of social media platforms on students, is causing a shift in learning, and as a result, educational institutions are increasingly creating alternative learning platforms, using social media to facilitate student-centred learning. This paper presents the findings from a study that was conducted to understand the perception of students regarding the use of social media as an alternative learning platform. The quantitative research method was adopted, and 331 questionnaires were administered at the Pietermaritzburg campus of University of KwaZulu-Natal (UKZN). The findings reveal that students are comfortable with the use of social media as a learning platform, because it enhances their ability to be interactive and it improves their chances of accessing educational information, even when not within the academic environment. The findings, however, also revealed that some features of social media could cause distraction to students, but when adequate measures are introduced, social media could become an additional means of interaction for students, especially for academic purposes.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115854639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sustainability Simulation and Assessment of Bicycle Network Design and Maintenance Environment 自行车网络设计与维护环境的可持续性模拟与评价
E. Ginters, M. Mezitis, D. Aizstrauta
Humans are an integral part of the nature and to avoid imbalance, the impact of technology on the surrounding environment should be limited. Therefore, green technologies are becoming an important part of economy, politics and science. One of the largest sources of pollution are motorized vehicles, that account for around 14 % of the global greenhouse gas emissions [1]. Use of green transportation within the integrated multimodal transport system is important to minimize carbon emissions [2]. One of these means of transportation is cycling. For cycling to become a fully integrated element within a multimodal transport system and not just a type of tourism, an appropriate infrastructure is necessary – cycling routes, lighting, bike rental, parking, repair services, as well as alignment with other types of transport. Cyclists need route planning tools, information about road surface quality, relief, and usage patterns during different weather conditions and over different days of the week. Infrastructure development projects demand significant financial resources and therefore municipalities need sustainable tools for services design and management. In this article the authors discuss acceptance and sustainability assessment methodology IASAM use to validate the VeloRouter - cycling network designing technology.
人类是自然不可分割的一部分,为了避免不平衡,技术对周围环境的影响应该受到限制。因此,绿色技术正在成为经济、政治和科学的重要组成部分。机动车是最大的污染源之一,约占全球温室气体排放量的14%[1]。在综合多式联运系统中使用绿色交通对于减少碳排放非常重要[2]。其中一种交通方式是骑自行车。为了使自行车成为多式联运系统中的一个完整的组成部分,而不仅仅是一种旅游,适当的基础设施是必要的——自行车路线、照明、自行车租赁、停车、维修服务,以及与其他类型的交通工具保持一致。骑自行车的人需要路线规划工具、路面质量、地形信息,以及在不同天气条件下和一周中不同日子的使用模式。基础设施发展项目需要大量财政资源,因此市政当局需要可持续的服务设计和管理工具。在本文中,作者讨论了可接受性和可持续性评估方法,IASAM用来验证velor外循环网络设计技术。
{"title":"Sustainability Simulation and Assessment of Bicycle Network Design and Maintenance Environment","authors":"E. Ginters, M. Mezitis, D. Aizstrauta","doi":"10.1109/ICONIC.2018.8601225","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601225","url":null,"abstract":"Humans are an integral part of the nature and to avoid imbalance, the impact of technology on the surrounding environment should be limited. Therefore, green technologies are becoming an important part of economy, politics and science. One of the largest sources of pollution are motorized vehicles, that account for around 14 % of the global greenhouse gas emissions [1]. Use of green transportation within the integrated multimodal transport system is important to minimize carbon emissions [2]. One of these means of transportation is cycling. For cycling to become a fully integrated element within a multimodal transport system and not just a type of tourism, an appropriate infrastructure is necessary – cycling routes, lighting, bike rental, parking, repair services, as well as alignment with other types of transport. Cyclists need route planning tools, information about road surface quality, relief, and usage patterns during different weather conditions and over different days of the week. Infrastructure development projects demand significant financial resources and therefore municipalities need sustainable tools for services design and management. In this article the authors discuss acceptance and sustainability assessment methodology IASAM use to validate the VeloRouter - cycling network designing technology.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115127209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Artificial Intelligence in Cyber Threats Intelligence 网络威胁情报中的人工智能
R. Trifonov, O. Nakov, V. Mladenov
In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Тhis paper describes some of the results obtained at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. The analysis of the feasibility of various Artificial Intelligence methods has shown that a method that is equally effective for all stages of the Cyber Intelligence cannot be identified. While for Tactical Cyber Threats Intelligence has been selected and experimented a Multi-Agent System, the Recurrent Neural Networks are offered for the needs of Operational Cyber Threats Intelligence.
在过去的几年里,网络安全领域已经从网络犯罪阶段过渡到网络战争阶段。针对新的挑战,专家群体主要有两种途径:一是采用军事情报的理念和方法,二是利用人工智能方法对抗网络攻击。Тhis论文描述了索非亚技术大学在实施与应用智能方法增加计算机网络安全性有关的项目中获得的一些结果。对各种人工智能方法的可行性分析表明,无法找到一种对网络智能的所有阶段都同样有效的方法。针对战术网络威胁情报,选择并试验了多智能体系统,针对作战网络威胁情报的需要,提出了递归神经网络。
{"title":"Artificial Intelligence in Cyber Threats Intelligence","authors":"R. Trifonov, O. Nakov, V. Mladenov","doi":"10.1109/ICONIC.2018.8601235","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601235","url":null,"abstract":"In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Тhis paper describes some of the results obtained at Technical University of Sofia in the implementation of project related to the application of intelligent methods for increasing the security in computer networks. The analysis of the feasibility of various Artificial Intelligence methods has shown that a method that is equally effective for all stages of the Cyber Intelligence cannot be identified. While for Tactical Cyber Threats Intelligence has been selected and experimented a Multi-Agent System, the Recurrent Neural Networks are offered for the needs of Operational Cyber Threats Intelligence.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1