Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601210
G. I. Mwandosya, Calkin Suero Montero, E. Mbise, Edda Tandi Lwoga, Respickius Casmir, Moses Nkundwe Mwasaga
The application of information communications technologies (ICTs) in higher education institutions has created opportunities for improving teaching and learning. One such avenue is innovation. However, in the Tanzanian HEIs environment little is known on the extent ICTs tools are utilized for innovative teaching and learning. The aim of this study was to find the extent ICT infrastructure, teachers’ skills, and readiness influence innovative teaching and learning. Guided by the Activity Theory, the sample for the study was 80 teachers and Information Technology (IT) staff from three HEIs. Data was collected through an administered survey questionnaire and interviews. The results indicate that the infrastructure is adequate and teachers have skills and are ready to use ICT tools in classrooms. However, wireless technology is inadequate in all the three HEIs. Furthermore, the results show that innovative curriculums and collaborative innovation projects among the different HEIs are factors for improving innovative teaching and learning.
{"title":"Improving Higher Education Institutions’ Innovative Teaching and Learning in Tanzania Through Information Communications Technology Tools","authors":"G. I. Mwandosya, Calkin Suero Montero, E. Mbise, Edda Tandi Lwoga, Respickius Casmir, Moses Nkundwe Mwasaga","doi":"10.1109/ICONIC.2018.8601210","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601210","url":null,"abstract":"The application of information communications technologies (ICTs) in higher education institutions has created opportunities for improving teaching and learning. One such avenue is innovation. However, in the Tanzanian HEIs environment little is known on the extent ICTs tools are utilized for innovative teaching and learning. The aim of this study was to find the extent ICT infrastructure, teachers’ skills, and readiness influence innovative teaching and learning. Guided by the Activity Theory, the sample for the study was 80 teachers and Information Technology (IT) staff from three HEIs. Data was collected through an administered survey questionnaire and interviews. The results indicate that the infrastructure is adequate and teachers have skills and are ready to use ICT tools in classrooms. However, wireless technology is inadequate in all the three HEIs. Furthermore, the results show that innovative curriculums and collaborative innovation projects among the different HEIs are factors for improving innovative teaching and learning.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601239
Erik Martín Campaña, Nils Müllner, S. Mubeen
This paper presents an adapter to link the Matlab/Simulink model of a custom braking system into an open-source road traffic simulator, namely SUMO. The traditional braking models in SUMO work on a coarser level, generally modeling the deceleration of the vehicle based on a single equation. Substituting this model with a detailed system allows adjustments on a very low level, including delays between components, the traction of individual tires, and controllers for the anti-locking system by simulating those in Simulink. Besides introducing the novel adapter linked into SUMO and discussing parameter fitting to mimic the behavior of the traditional braking system, this paper discusses the amount of performance deterioration as the price for simulating a more sophisticated braking system.
{"title":"Interfacing a Brake-by-Wire Simulink Model with SUMO","authors":"Erik Martín Campaña, Nils Müllner, S. Mubeen","doi":"10.1109/ICONIC.2018.8601239","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601239","url":null,"abstract":"This paper presents an adapter to link the Matlab/Simulink model of a custom braking system into an open-source road traffic simulator, namely SUMO. The traditional braking models in SUMO work on a coarser level, generally modeling the deceleration of the vehicle based on a single equation. Substituting this model with a detailed system allows adjustments on a very low level, including delays between components, the traction of individual tires, and controllers for the anti-locking system by simulating those in Simulink. Besides introducing the novel adapter linked into SUMO and discussing parameter fitting to mimic the behavior of the traditional braking system, this paper discusses the amount of performance deterioration as the price for simulating a more sophisticated braking system.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601279
V. Kebande, Nickson M. Karie, R. Wario, H. Venter
In today’s complex cyber space, forecasting the likelihood or probability that a Cyber Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked environment requires a critical analysis of digital data that at that particular time is treated as potential evidence. Digital forensic tools have more often than not been employed in such tasks, however, this aspect has often faced a number of uncertainties. This paper addresses the lack of effective techniques of profiling CSAs in order to discover adversarial motives based on incident similarity measure metrics. The authors of this paper propose an approach that uses an Incident Similarity Measure Interaction Index (ISMII) metric, through which, for example, two independent Cyber Security Incidents (CSI) can be measured and be correlated in order to link a digital crime to the perpetrator. By realising such measures using the ISMII metric, digital forensic investigators are able to profile, predict, and correlate CSI patterns with a degree of certainty. The result of the study depicts a new ISMII metric that is able to compute closely matching cyber-security based incidents.
{"title":"Forensic Profiling of Cyber-Security Adversaries based on Incident Similarity Measures Interaction Index","authors":"V. Kebande, Nickson M. Karie, R. Wario, H. Venter","doi":"10.1109/ICONIC.2018.8601279","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601279","url":null,"abstract":"In today’s complex cyber space, forecasting the likelihood or probability that a Cyber Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked environment requires a critical analysis of digital data that at that particular time is treated as potential evidence. Digital forensic tools have more often than not been employed in such tasks, however, this aspect has often faced a number of uncertainties. This paper addresses the lack of effective techniques of profiling CSAs in order to discover adversarial motives based on incident similarity measure metrics. The authors of this paper propose an approach that uses an Incident Similarity Measure Interaction Index (ISMII) metric, through which, for example, two independent Cyber Security Incidents (CSI) can be measured and be correlated in order to link a digital crime to the perpetrator. By realising such measures using the ISMII metric, digital forensic investigators are able to profile, predict, and correlate CSI patterns with a degree of certainty. The result of the study depicts a new ISMII metric that is able to compute closely matching cyber-security based incidents.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601217
Y. Yordanov, O. Nakov, V. Mladenov
This scientific report details how a software and hardware system can be created to allow the surveillance, access and control of a Baxter industrial robot from any location connected to the Internet. Baxter is being aimed at the nearly 270,000 small to midsize manufacturers, which have five hundred or fewer employees - companies of that size are unlikely to be able to invest hundreds of thousands of dollars into robots that require a redesign of their workspace and IT personnel to run them. Commonly used, the robot can handle many different industry tasks – co-packing and end-of-line packaging, pick and place operations, plastic injection, printed circuit board handling and many others. It’s important to noted, that the platform on which the control software works is Microsoft Windows. The programming language used to write the code for the system is Python 2.7. For monitoring a robot when executing a command, a high-quality camera - AUSDOM AW615 1080p - is also used in the system.
{"title":"System for Monitoring and Control of the Baxter Robot","authors":"Y. Yordanov, O. Nakov, V. Mladenov","doi":"10.1109/ICONIC.2018.8601217","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601217","url":null,"abstract":"This scientific report details how a software and hardware system can be created to allow the surveillance, access and control of a Baxter industrial robot from any location connected to the Internet. Baxter is being aimed at the nearly 270,000 small to midsize manufacturers, which have five hundred or fewer employees - companies of that size are unlikely to be able to invest hundreds of thousands of dollars into robots that require a redesign of their workspace and IT personnel to run them. Commonly used, the robot can handle many different industry tasks – co-packing and end-of-line packaging, pick and place operations, plastic injection, printed circuit board handling and many others. It’s important to noted, that the platform on which the control software works is Microsoft Windows. The programming language used to write the code for the system is Python 2.7. For monitoring a robot when executing a command, a high-quality camera - AUSDOM AW615 1080p - is also used in the system.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"4 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120812337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601234
D. Cerny, J. Dobes
The most efficient solvers use composite procedures that adaptively rearrange computation algorithms to maximize simulation performance. A similar concept can be integrated into a process of electronic circuit analysis, where the combination of different algorithms allows scalability of simulation performance. In this paper, we propose a new adaptive internal solver based on Biconjugate gradient stabilized method for the iterative solution of nonsymmetric linear systems supplemented with incomplete LU factorization as an efficient replacement for the direct solver implemented in program Spice for solving large-scale circuits. We describe basic concepts of a simulation of electronic circuits with nonlinear time dependent devices and present implementation examples of the proposed methods. Optimal setting of the method and its application in program Spice is shown in comparison to other modern iterative solvers for nonsymmetric linear systems.
{"title":"Composing Scalable Solver for Simulation of Electronic Circuits in SPICE","authors":"D. Cerny, J. Dobes","doi":"10.1109/ICONIC.2018.8601234","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601234","url":null,"abstract":"The most efficient solvers use composite procedures that adaptively rearrange computation algorithms to maximize simulation performance. A similar concept can be integrated into a process of electronic circuit analysis, where the combination of different algorithms allows scalability of simulation performance. In this paper, we propose a new adaptive internal solver based on Biconjugate gradient stabilized method for the iterative solution of nonsymmetric linear systems supplemented with incomplete LU factorization as an efficient replacement for the direct solver implemented in program Spice for solving large-scale circuits. We describe basic concepts of a simulation of electronic circuits with nonlinear time dependent devices and present implementation examples of the proposed methods. Optimal setting of the method and its application in program Spice is shown in comparison to other modern iterative solvers for nonsymmetric linear systems.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601297
P. Potgieter, P. Blignaut
True/false questions are one of the basic question types widely used in assessments. Although true/false questions are easy to construct and take little time to be answered, there is a high probability of learners guessing the correct answer. A correct answer to a true/false question is not an indication that a learner fully understands the concept being tested. That said, an incorrect answer does not necessarily mean that the learner does not understand the concept being tested. There may be another reason why the learner gave an incorrect answer. Specifically, when a teacher uses true/false questions to assess learners on divisibility rules, the teacher has to ensure that learners use their knowledge to determine the answer. Therefore, careful compilation of the dividends for an assessment can contribute to determining whether the learner applied the divisibility rules correctly. Eye-tracking can be used to provide objective and quantitative information about the user’s intended gaze-patterns over a specific stimulus. Therefore, the gaze behaviour of learners can be used as an indication whether they inspected the appropriate digits of the dividend. It is suggested that (i) heuristics on compiling appropriate dividends, and (ii) setting minimum gaze requirements for attention levels per digit of the dividend for each divisor, could assist teachers in compiling effective true/false assessments to test learners’ knowledge of divisibility rules.
{"title":"Setting Heuristics for Eye-Tracking Assessment on Divisibility Rules","authors":"P. Potgieter, P. Blignaut","doi":"10.1109/ICONIC.2018.8601297","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601297","url":null,"abstract":"True/false questions are one of the basic question types widely used in assessments. Although true/false questions are easy to construct and take little time to be answered, there is a high probability of learners guessing the correct answer. A correct answer to a true/false question is not an indication that a learner fully understands the concept being tested. That said, an incorrect answer does not necessarily mean that the learner does not understand the concept being tested. There may be another reason why the learner gave an incorrect answer. Specifically, when a teacher uses true/false questions to assess learners on divisibility rules, the teacher has to ensure that learners use their knowledge to determine the answer. Therefore, careful compilation of the dividends for an assessment can contribute to determining whether the learner applied the divisibility rules correctly. Eye-tracking can be used to provide objective and quantitative information about the user’s intended gaze-patterns over a specific stimulus. Therefore, the gaze behaviour of learners can be used as an indication whether they inspected the appropriate digits of the dividend. It is suggested that (i) heuristics on compiling appropriate dividends, and (ii) setting minimum gaze requirements for attention levels per digit of the dividend for each divisor, could assist teachers in compiling effective true/false assessments to test learners’ knowledge of divisibility rules.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601250
S. Civilcharran, M. Maharaj
Rapid technological advancements are disrupting traditional job markets necessitating job seekers to develop new skillsets suitable for the digital economy. This phenomenon has a major impact on the economy, particularly in developing countries. Consequently, it is crucial for institutional offerings to be aligned to industry requirements in every discipline of higher education, in order to ultimately sustain and improve the economy. This paper presents a framework designed to determine the alignment of the digital skills that students acquire from higher education to the digital skills requirements of industry. This alignment will aid higher education institutions in improving the digital skills preparedness of their graduates, and ultimately sustaining the digital economy. Given that the digital economy requires its employees to possess a specific level of digital skills, which may vary in each sector, the proposed framework is therefore not discipline specific. Consequently, this framework may employed to establish an alignment between any discipline in higher education and the respective industry that its graduates feed into. The authors have systematically reviewed related articles to determine the factors influencing the digital skills preparedness of graduates for industry. Relevant studies were analyzed, thereby resulting in the development of a digital skills preparedness model.
{"title":"A Framework to Determine the Digital Skills Preparedness of Graduates for Industry","authors":"S. Civilcharran, M. Maharaj","doi":"10.1109/ICONIC.2018.8601250","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601250","url":null,"abstract":"Rapid technological advancements are disrupting traditional job markets necessitating job seekers to develop new skillsets suitable for the digital economy. This phenomenon has a major impact on the economy, particularly in developing countries. Consequently, it is crucial for institutional offerings to be aligned to industry requirements in every discipline of higher education, in order to ultimately sustain and improve the economy. This paper presents a framework designed to determine the alignment of the digital skills that students acquire from higher education to the digital skills requirements of industry. This alignment will aid higher education institutions in improving the digital skills preparedness of their graduates, and ultimately sustaining the digital economy. Given that the digital economy requires its employees to possess a specific level of digital skills, which may vary in each sector, the proposed framework is therefore not discipline specific. Consequently, this framework may employed to establish an alignment between any discipline in higher education and the respective industry that its graduates feed into. The authors have systematically reviewed related articles to determine the factors influencing the digital skills preparedness of graduates for industry. Relevant studies were analyzed, thereby resulting in the development of a digital skills preparedness model.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601289
J. Coetzer
Countries in sub-Saharan Africa played a mere spectator role in the first three industrial revolutions. However, researchers, business community, governments and civil society, acknowledges that these countries have the potential to play an active role in the 4th Industrial Revolution. In the case of South Africa, mobile phone technology will play a critical role to this end. It can be argued that the various phases of Information and Communication for Development (ICT4D) have prepared grounds for this shift. However, as articulated in ICT4D 3.0, most ICT4D implementations have fallen trap to the unsustainable and irrelevant transfer of Northern designs to Southern realities. Putting in mind the implicit elements of the status quo, cultural transfers and mutual learning, this paper presents an adaptive, user-centered approach to development of an innovative Mobile-Health (M-Health) intervention for a semi-literate rural community in Sethakeng in the Northern Cape province of South Africa. This is done in the recognition of the fact that one of the main development challenges currently facing the Country is education, skills development and information illiteracy, which is the inability of users to locate, evaluate and effectively use information and communication technology. To achieve the development and implementation of an M-Health intervention, human-computer-interface design concepts of anthropomorphic and affective design principles were employed because they not only lead to mutual-learning but also aspire to implore an emotional or a positively reinforced sub-conscious reaction from users. Three pilot studies carried out using the resulting intervention illustrated a sustained increase in adoption.
{"title":"Application of HCI Design Principles in overcoming Information Illiteracy: Case of a M-Health Application for a Rural Community in South Africa","authors":"J. Coetzer","doi":"10.1109/ICONIC.2018.8601289","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601289","url":null,"abstract":"Countries in sub-Saharan Africa played a mere spectator role in the first three industrial revolutions. However, researchers, business community, governments and civil society, acknowledges that these countries have the potential to play an active role in the 4th Industrial Revolution. In the case of South Africa, mobile phone technology will play a critical role to this end. It can be argued that the various phases of Information and Communication for Development (ICT4D) have prepared grounds for this shift. However, as articulated in ICT4D 3.0, most ICT4D implementations have fallen trap to the unsustainable and irrelevant transfer of Northern designs to Southern realities. Putting in mind the implicit elements of the status quo, cultural transfers and mutual learning, this paper presents an adaptive, user-centered approach to development of an innovative Mobile-Health (M-Health) intervention for a semi-literate rural community in Sethakeng in the Northern Cape province of South Africa. This is done in the recognition of the fact that one of the main development challenges currently facing the Country is education, skills development and information illiteracy, which is the inability of users to locate, evaluate and effectively use information and communication technology. To achieve the development and implementation of an M-Health intervention, human-computer-interface design concepts of anthropomorphic and affective design principles were employed because they not only lead to mutual-learning but also aspire to implore an emotional or a positively reinforced sub-conscious reaction from users. Three pilot studies carried out using the resulting intervention illustrated a sustained increase in adoption.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601263
Claude Nawej, Pius Adewale Owolawi
In data communication network, one of the ideal network procedures is to transmit files securely from sender to a receiver. However, security alone without speed is not sufficient. In this paper, two network characteristics of an ideal file transfer, security and speed are considered. Using Wireshark network analyzer, we investigate, compare, and finally model the spent transmission time of the same size file between two encrypted WinSCP’s protocols, the Secure File Transfer Protocol, and the Secure Copy Protocol. In terms of speed in transferring files, experiment results show that, while retaining the same file size and security integrity, Secure File Transfer Protocol performs faster than its counterpart Secure Copy Protocol does. In order to predict the SFTP protocol speed in transferring files from the slower SCP, a polynomial model of order of three is proposed with a square correlation coefficient of 0.5207.
{"title":"Evaluation and Modelling of Secured Protocols’ Spent Transmission Time","authors":"Claude Nawej, Pius Adewale Owolawi","doi":"10.1109/ICONIC.2018.8601263","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601263","url":null,"abstract":"In data communication network, one of the ideal network procedures is to transmit files securely from sender to a receiver. However, security alone without speed is not sufficient. In this paper, two network characteristics of an ideal file transfer, security and speed are considered. Using Wireshark network analyzer, we investigate, compare, and finally model the spent transmission time of the same size file between two encrypted WinSCP’s protocols, the Secure File Transfer Protocol, and the Secure Copy Protocol. In terms of speed in transferring files, experiment results show that, while retaining the same file size and security integrity, Secure File Transfer Protocol performs faster than its counterpart Secure Copy Protocol does. In order to predict the SFTP protocol speed in transferring files from the slower SCP, a polynomial model of order of three is proposed with a square correlation coefficient of 0.5207.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601268
Adedayo M. Balogun, T. Zuva
Cybercrime has been regarded understandably as a consequent compromise that follows the advent and perceived success of the computer and internet technologies. Equally effecting the privacy, trust, finance and welfare of the wealthy and low-income individuals and organizations, this menace has shown no indication of slowing down. Reports across the world have consistently shown exponential increase in the numbers and costs of cyber-incidents, and more worriedly low conviction rates of cybercriminals, over the years. Stakeholders increasingly explore ways to keep up with containing cyber-incidents by devising tools and techniques to increase the overall efficiency of investigations, but the gap keeps getting wider. However, criminal profiling – an investigative technique that has been proven to provide accurate and valuable directions to traditional crime investigations – has not seen a widespread application, including a formal methodology, to cybercrime investigations due to difficulties in its seamless transference. This paper, in a bid to address this problem, seeks to preliminarily identify the exact benefits criminal profiling has brought to successful traditional crime investigations and the benefits it can translate to cybercrime investigations, identify the challenges posed by the cyber-scene to its implementation in cybercrime investigations, and proffer a practicable solution.
{"title":"Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution","authors":"Adedayo M. Balogun, T. Zuva","doi":"10.1109/ICONIC.2018.8601268","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601268","url":null,"abstract":"Cybercrime has been regarded understandably as a consequent compromise that follows the advent and perceived success of the computer and internet technologies. Equally effecting the privacy, trust, finance and welfare of the wealthy and low-income individuals and organizations, this menace has shown no indication of slowing down. Reports across the world have consistently shown exponential increase in the numbers and costs of cyber-incidents, and more worriedly low conviction rates of cybercriminals, over the years. Stakeholders increasingly explore ways to keep up with containing cyber-incidents by devising tools and techniques to increase the overall efficiency of investigations, but the gap keeps getting wider. However, criminal profiling – an investigative technique that has been proven to provide accurate and valuable directions to traditional crime investigations – has not seen a widespread application, including a formal methodology, to cybercrime investigations due to difficulties in its seamless transference. This paper, in a bid to address this problem, seeks to preliminarily identify the exact benefits criminal profiling has brought to successful traditional crime investigations and the benefits it can translate to cybercrime investigations, identify the challenges posed by the cyber-scene to its implementation in cybercrime investigations, and proffer a practicable solution.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}