首页 > 最新文献

2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)最新文献

英文 中文
Improving Higher Education Institutions’ Innovative Teaching and Learning in Tanzania Through Information Communications Technology Tools 利用信息通信技术工具改善坦桑尼亚高等教育机构的创新教学
G. I. Mwandosya, Calkin Suero Montero, E. Mbise, Edda Tandi Lwoga, Respickius Casmir, Moses Nkundwe Mwasaga
The application of information communications technologies (ICTs) in higher education institutions has created opportunities for improving teaching and learning. One such avenue is innovation. However, in the Tanzanian HEIs environment little is known on the extent ICTs tools are utilized for innovative teaching and learning. The aim of this study was to find the extent ICT infrastructure, teachers’ skills, and readiness influence innovative teaching and learning. Guided by the Activity Theory, the sample for the study was 80 teachers and Information Technology (IT) staff from three HEIs. Data was collected through an administered survey questionnaire and interviews. The results indicate that the infrastructure is adequate and teachers have skills and are ready to use ICT tools in classrooms. However, wireless technology is inadequate in all the three HEIs. Furthermore, the results show that innovative curriculums and collaborative innovation projects among the different HEIs are factors for improving innovative teaching and learning.
信息通信技术(ict)在高等教育机构中的应用为改善教与学创造了机会。其中一条途径就是创新。然而,在坦桑尼亚的高等教育环境中,人们对利用信息通信技术工具进行创新教学的程度知之甚少。本研究旨在探讨资讯及通讯科技基础建设、教师技能及准备程度对创新教与学的影响程度。在活动理论的指导下,本研究的样本是来自三所高等教育院校的80名教师和资讯科技人员。数据是通过管理调查问卷和访谈收集的。结果表明,基础设施充足,教师具备技能,并准备在课堂上使用信息通信技术工具。然而,无线技术在这三个高等教育机构中都是不足的。此外,研究结果还表明,不同高校之间的创新课程和协同创新项目是促进创新教与学的因素。
{"title":"Improving Higher Education Institutions’ Innovative Teaching and Learning in Tanzania Through Information Communications Technology Tools","authors":"G. I. Mwandosya, Calkin Suero Montero, E. Mbise, Edda Tandi Lwoga, Respickius Casmir, Moses Nkundwe Mwasaga","doi":"10.1109/ICONIC.2018.8601210","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601210","url":null,"abstract":"The application of information communications technologies (ICTs) in higher education institutions has created opportunities for improving teaching and learning. One such avenue is innovation. However, in the Tanzanian HEIs environment little is known on the extent ICTs tools are utilized for innovative teaching and learning. The aim of this study was to find the extent ICT infrastructure, teachers’ skills, and readiness influence innovative teaching and learning. Guided by the Activity Theory, the sample for the study was 80 teachers and Information Technology (IT) staff from three HEIs. Data was collected through an administered survey questionnaire and interviews. The results indicate that the infrastructure is adequate and teachers have skills and are ready to use ICT tools in classrooms. However, wireless technology is inadequate in all the three HEIs. Furthermore, the results show that innovative curriculums and collaborative innovation projects among the different HEIs are factors for improving innovative teaching and learning.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Interfacing a Brake-by-Wire Simulink Model with SUMO 线控制动Simulink模型与SUMO的接口
Erik Martín Campaña, Nils Müllner, S. Mubeen
This paper presents an adapter to link the Matlab/Simulink model of a custom braking system into an open-source road traffic simulator, namely SUMO. The traditional braking models in SUMO work on a coarser level, generally modeling the deceleration of the vehicle based on a single equation. Substituting this model with a detailed system allows adjustments on a very low level, including delays between components, the traction of individual tires, and controllers for the anti-locking system by simulating those in Simulink. Besides introducing the novel adapter linked into SUMO and discussing parameter fitting to mimic the behavior of the traditional braking system, this paper discusses the amount of performance deterioration as the price for simulating a more sophisticated braking system.
本文提出了一种适配器,将定制制动系统的Matlab/Simulink模型连接到开源的道路交通模拟器SUMO中。传统的相扑制动模型在较粗糙的水平上工作,通常基于单个方程对车辆的减速进行建模。用一个详细的系统代替这个模型,可以在非常低的水平上进行调整,包括组件之间的延迟,单个轮胎的牵引力,以及通过模拟Simulink中的防抱死系统控制器。除了介绍连接到SUMO的新型适配器和讨论参数拟合以模拟传统制动系统的行为外,本文还讨论了性能下降的数量作为模拟更复杂制动系统的代价。
{"title":"Interfacing a Brake-by-Wire Simulink Model with SUMO","authors":"Erik Martín Campaña, Nils Müllner, S. Mubeen","doi":"10.1109/ICONIC.2018.8601239","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601239","url":null,"abstract":"This paper presents an adapter to link the Matlab/Simulink model of a custom braking system into an open-source road traffic simulator, namely SUMO. The traditional braking models in SUMO work on a coarser level, generally modeling the deceleration of the vehicle based on a single equation. Substituting this model with a detailed system allows adjustments on a very low level, including delays between components, the traction of individual tires, and controllers for the anti-locking system by simulating those in Simulink. Besides introducing the novel adapter linked into SUMO and discussing parameter fitting to mimic the behavior of the traditional braking system, this paper discusses the amount of performance deterioration as the price for simulating a more sophisticated braking system.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131163306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forensic Profiling of Cyber-Security Adversaries based on Incident Similarity Measures Interaction Index 基于事件相似性度量交互索引的网络安全攻击者取证分析
V. Kebande, Nickson M. Karie, R. Wario, H. Venter
In today’s complex cyber space, forecasting the likelihood or probability that a Cyber Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked environment requires a critical analysis of digital data that at that particular time is treated as potential evidence. Digital forensic tools have more often than not been employed in such tasks, however, this aspect has often faced a number of uncertainties. This paper addresses the lack of effective techniques of profiling CSAs in order to discover adversarial motives based on incident similarity measure metrics. The authors of this paper propose an approach that uses an Incident Similarity Measure Interaction Index (ISMII) metric, through which, for example, two independent Cyber Security Incidents (CSI) can be measured and be correlated in order to link a digital crime to the perpetrator. By realising such measures using the ISMII metric, digital forensic investigators are able to profile, predict, and correlate CSI patterns with a degree of certainty. The result of the study depicts a new ISMII metric that is able to compute closely matching cyber-security based incidents.
在当今复杂的网络空间中,预测网络安全对手(CSA)可能攻击给定基础设施、系统或网络环境的可能性或概率,需要对在特定时间被视为潜在证据的数字数据进行批判性分析。数字取证工具通常用于此类任务,然而,这方面往往面临许多不确定性。本文解决了缺乏有效的分析csa的技术,以发现基于事件相似性度量指标的敌对动机。本文的作者提出了一种使用事件相似度测量交互指数(ISMII)度量的方法,例如,通过该度量,可以测量两个独立的网络安全事件(CSI)并将其关联起来,以便将数字犯罪与犯罪者联系起来。通过使用ISMII度量实现这些措施,数字法医调查员能够在一定程度上确定CSI模式的轮廓、预测和关联。研究结果描述了一种新的ISMII度量,能够计算出与网络安全事件密切匹配的事件。
{"title":"Forensic Profiling of Cyber-Security Adversaries based on Incident Similarity Measures Interaction Index","authors":"V. Kebande, Nickson M. Karie, R. Wario, H. Venter","doi":"10.1109/ICONIC.2018.8601279","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601279","url":null,"abstract":"In today’s complex cyber space, forecasting the likelihood or probability that a Cyber Security Adversary (CSA) is likely to attack a given infrastructure, system or a networked environment requires a critical analysis of digital data that at that particular time is treated as potential evidence. Digital forensic tools have more often than not been employed in such tasks, however, this aspect has often faced a number of uncertainties. This paper addresses the lack of effective techniques of profiling CSAs in order to discover adversarial motives based on incident similarity measure metrics. The authors of this paper propose an approach that uses an Incident Similarity Measure Interaction Index (ISMII) metric, through which, for example, two independent Cyber Security Incidents (CSI) can be measured and be correlated in order to link a digital crime to the perpetrator. By realising such measures using the ISMII metric, digital forensic investigators are able to profile, predict, and correlate CSI patterns with a degree of certainty. The result of the study depicts a new ISMII metric that is able to compute closely matching cyber-security based incidents.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130824796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
System for Monitoring and Control of the Baxter Robot 巴克斯特机器人的监控系统
Y. Yordanov, O. Nakov, V. Mladenov
This scientific report details how a software and hardware system can be created to allow the surveillance, access and control of a Baxter industrial robot from any location connected to the Internet. Baxter is being aimed at the nearly 270,000 small to midsize manufacturers, which have five hundred or fewer employees - companies of that size are unlikely to be able to invest hundreds of thousands of dollars into robots that require a redesign of their workspace and IT personnel to run them. Commonly used, the robot can handle many different industry tasks – co-packing and end-of-line packaging, pick and place operations, plastic injection, printed circuit board handling and many others. It’s important to noted, that the platform on which the control software works is Microsoft Windows. The programming language used to write the code for the system is Python 2.7. For monitoring a robot when executing a command, a high-quality camera - AUSDOM AW615 1080p - is also used in the system.
这份科学报告详细介绍了如何创建一个软件和硬件系统,以便从连接到互联网的任何位置监视、访问和控制百特工业机器人。百特的目标客户是近27万家雇员在500人或以下的中小型制造商——这种规模的公司不太可能投入数十万美元购买需要重新设计工作空间和IT人员来运行的机器人。通常使用,机器人可以处理许多不同的行业任务-共同包装和末端包装,取放操作,塑料注射,印刷电路板处理和许多其他。需要注意的是,控制软件的工作平台是Microsoft Windows。用于编写系统代码的编程语言是Python 2.7。为了在执行命令时监控机器人,系统中还使用了高质量的摄像机- AUSDOM AW615 1080p。
{"title":"System for Monitoring and Control of the Baxter Robot","authors":"Y. Yordanov, O. Nakov, V. Mladenov","doi":"10.1109/ICONIC.2018.8601217","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601217","url":null,"abstract":"This scientific report details how a software and hardware system can be created to allow the surveillance, access and control of a Baxter industrial robot from any location connected to the Internet. Baxter is being aimed at the nearly 270,000 small to midsize manufacturers, which have five hundred or fewer employees - companies of that size are unlikely to be able to invest hundreds of thousands of dollars into robots that require a redesign of their workspace and IT personnel to run them. Commonly used, the robot can handle many different industry tasks – co-packing and end-of-line packaging, pick and place operations, plastic injection, printed circuit board handling and many others. It’s important to noted, that the platform on which the control software works is Microsoft Windows. The programming language used to write the code for the system is Python 2.7. For monitoring a robot when executing a command, a high-quality camera - AUSDOM AW615 1080p - is also used in the system.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"4 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120812337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Composing Scalable Solver for Simulation of Electronic Circuits in SPICE SPICE中电子电路仿真的可伸缩求解器组成
D. Cerny, J. Dobes
The most efficient solvers use composite procedures that adaptively rearrange computation algorithms to maximize simulation performance. A similar concept can be integrated into a process of electronic circuit analysis, where the combination of different algorithms allows scalability of simulation performance. In this paper, we propose a new adaptive internal solver based on Biconjugate gradient stabilized method for the iterative solution of nonsymmetric linear systems supplemented with incomplete LU factorization as an efficient replacement for the direct solver implemented in program Spice for solving large-scale circuits. We describe basic concepts of a simulation of electronic circuits with nonlinear time dependent devices and present implementation examples of the proposed methods. Optimal setting of the method and its application in program Spice is shown in comparison to other modern iterative solvers for nonsymmetric linear systems.
最有效的求解器使用复合程序,自适应地重新安排计算算法,以最大限度地提高模拟性能。类似的概念可以集成到电子电路分析过程中,其中不同算法的组合允许仿真性能的可扩展性。本文提出了一种新的基于双共轭梯度稳定法的自适应内求解器,用于求解非对称线性系统的迭代解,并补充了不完全LU分解,作为Spice程序中实现的直接求解器的有效替代。我们描述了具有非线性时间相关器件的电子电路仿真的基本概念,并给出了所提出方法的实现示例。通过与其它现代非对称线性系统迭代求解方法的比较,说明了该方法的最优设置及其在Spice程序中的应用。
{"title":"Composing Scalable Solver for Simulation of Electronic Circuits in SPICE","authors":"D. Cerny, J. Dobes","doi":"10.1109/ICONIC.2018.8601234","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601234","url":null,"abstract":"The most efficient solvers use composite procedures that adaptively rearrange computation algorithms to maximize simulation performance. A similar concept can be integrated into a process of electronic circuit analysis, where the combination of different algorithms allows scalability of simulation performance. In this paper, we propose a new adaptive internal solver based on Biconjugate gradient stabilized method for the iterative solution of nonsymmetric linear systems supplemented with incomplete LU factorization as an efficient replacement for the direct solver implemented in program Spice for solving large-scale circuits. We describe basic concepts of a simulation of electronic circuits with nonlinear time dependent devices and present implementation examples of the proposed methods. Optimal setting of the method and its application in program Spice is shown in comparison to other modern iterative solvers for nonsymmetric linear systems.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126428880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Setting Heuristics for Eye-Tracking Assessment on Divisibility Rules 基于可分性规则的眼动追踪评价启发式设置
P. Potgieter, P. Blignaut
True/false questions are one of the basic question types widely used in assessments. Although true/false questions are easy to construct and take little time to be answered, there is a high probability of learners guessing the correct answer. A correct answer to a true/false question is not an indication that a learner fully understands the concept being tested. That said, an incorrect answer does not necessarily mean that the learner does not understand the concept being tested. There may be another reason why the learner gave an incorrect answer. Specifically, when a teacher uses true/false questions to assess learners on divisibility rules, the teacher has to ensure that learners use their knowledge to determine the answer. Therefore, careful compilation of the dividends for an assessment can contribute to determining whether the learner applied the divisibility rules correctly. Eye-tracking can be used to provide objective and quantitative information about the user’s intended gaze-patterns over a specific stimulus. Therefore, the gaze behaviour of learners can be used as an indication whether they inspected the appropriate digits of the dividend. It is suggested that (i) heuristics on compiling appropriate dividends, and (ii) setting minimum gaze requirements for attention levels per digit of the dividend for each divisor, could assist teachers in compiling effective true/false assessments to test learners’ knowledge of divisibility rules.
真假题是测评中广泛使用的基本题型之一。虽然真假问题很容易构建,回答时间也很短,但学习者猜出正确答案的概率很高。对真假问题的正确回答并不表明学习者完全理解了被测试的概念。也就是说,一个不正确的答案并不一定意味着学习者不理解被测试的概念。学习者给出错误答案可能还有另外一个原因。具体来说,当教师使用真假问题来评估学习者的可除性规则时,教师必须确保学习者使用他们的知识来确定答案。因此,仔细编制评估的股息可以有助于确定学习者是否正确地应用了可除性规则。眼动追踪技术可以为特定刺激下用户预期的注视模式提供客观和定量的信息。因此,学习者的注视行为可以作为他们是否检查了红利的适当数字的指示。建议(1)启发式地编制适当的除数,(2)对每个除数的每个数字的注意水平设定最低注视要求,可以帮助教师编制有效的真假评估,以测试学习者对除数规则的知识。
{"title":"Setting Heuristics for Eye-Tracking Assessment on Divisibility Rules","authors":"P. Potgieter, P. Blignaut","doi":"10.1109/ICONIC.2018.8601297","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601297","url":null,"abstract":"True/false questions are one of the basic question types widely used in assessments. Although true/false questions are easy to construct and take little time to be answered, there is a high probability of learners guessing the correct answer. A correct answer to a true/false question is not an indication that a learner fully understands the concept being tested. That said, an incorrect answer does not necessarily mean that the learner does not understand the concept being tested. There may be another reason why the learner gave an incorrect answer. Specifically, when a teacher uses true/false questions to assess learners on divisibility rules, the teacher has to ensure that learners use their knowledge to determine the answer. Therefore, careful compilation of the dividends for an assessment can contribute to determining whether the learner applied the divisibility rules correctly. Eye-tracking can be used to provide objective and quantitative information about the user’s intended gaze-patterns over a specific stimulus. Therefore, the gaze behaviour of learners can be used as an indication whether they inspected the appropriate digits of the dividend. It is suggested that (i) heuristics on compiling appropriate dividends, and (ii) setting minimum gaze requirements for attention levels per digit of the dividend for each divisor, could assist teachers in compiling effective true/false assessments to test learners’ knowledge of divisibility rules.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127374623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework to Determine the Digital Skills Preparedness of Graduates for Industry 确定毕业生数字技能准备的框架
S. Civilcharran, M. Maharaj
Rapid technological advancements are disrupting traditional job markets necessitating job seekers to develop new skillsets suitable for the digital economy. This phenomenon has a major impact on the economy, particularly in developing countries. Consequently, it is crucial for institutional offerings to be aligned to industry requirements in every discipline of higher education, in order to ultimately sustain and improve the economy. This paper presents a framework designed to determine the alignment of the digital skills that students acquire from higher education to the digital skills requirements of industry. This alignment will aid higher education institutions in improving the digital skills preparedness of their graduates, and ultimately sustaining the digital economy. Given that the digital economy requires its employees to possess a specific level of digital skills, which may vary in each sector, the proposed framework is therefore not discipline specific. Consequently, this framework may employed to establish an alignment between any discipline in higher education and the respective industry that its graduates feed into. The authors have systematically reviewed related articles to determine the factors influencing the digital skills preparedness of graduates for industry. Relevant studies were analyzed, thereby resulting in the development of a digital skills preparedness model.
快速的技术进步正在颠覆传统的就业市场,要求求职者培养适合数字经济的新技能。这一现象对经济产生重大影响,特别是在发展中国家。因此,为了最终维持和改善经济,在高等教育的每一个学科中,机构提供与行业要求保持一致是至关重要的。本文提出了一个框架,旨在确定学生从高等教育中获得的数字技能与行业数字技能要求的一致性。这种一致性将有助于高等教育机构提高毕业生的数字技能准备,并最终维持数字经济。鉴于数字经济要求其员工拥有特定水平的数字技能,这在每个部门可能有所不同,因此拟议的框架并非针对特定学科。因此,这个框架可以用来在高等教育的任何学科和其毕业生进入的各自行业之间建立一致。作者系统地回顾了相关文章,以确定影响毕业生数字技能准备的因素。对相关研究进行了分析,从而形成了数字技能准备模型。
{"title":"A Framework to Determine the Digital Skills Preparedness of Graduates for Industry","authors":"S. Civilcharran, M. Maharaj","doi":"10.1109/ICONIC.2018.8601250","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601250","url":null,"abstract":"Rapid technological advancements are disrupting traditional job markets necessitating job seekers to develop new skillsets suitable for the digital economy. This phenomenon has a major impact on the economy, particularly in developing countries. Consequently, it is crucial for institutional offerings to be aligned to industry requirements in every discipline of higher education, in order to ultimately sustain and improve the economy. This paper presents a framework designed to determine the alignment of the digital skills that students acquire from higher education to the digital skills requirements of industry. This alignment will aid higher education institutions in improving the digital skills preparedness of their graduates, and ultimately sustaining the digital economy. Given that the digital economy requires its employees to possess a specific level of digital skills, which may vary in each sector, the proposed framework is therefore not discipline specific. Consequently, this framework may employed to establish an alignment between any discipline in higher education and the respective industry that its graduates feed into. The authors have systematically reviewed related articles to determine the factors influencing the digital skills preparedness of graduates for industry. Relevant studies were analyzed, thereby resulting in the development of a digital skills preparedness model.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Application of HCI Design Principles in overcoming Information Illiteracy: Case of a M-Health Application for a Rural Community in South Africa HCI设计原则在克服信息文盲中的应用:以南非农村社区的移动医疗应用为例
J. Coetzer
Countries in sub-Saharan Africa played a mere spectator role in the first three industrial revolutions. However, researchers, business community, governments and civil society, acknowledges that these countries have the potential to play an active role in the 4th Industrial Revolution. In the case of South Africa, mobile phone technology will play a critical role to this end. It can be argued that the various phases of Information and Communication for Development (ICT4D) have prepared grounds for this shift. However, as articulated in ICT4D 3.0, most ICT4D implementations have fallen trap to the unsustainable and irrelevant transfer of Northern designs to Southern realities. Putting in mind the implicit elements of the status quo, cultural transfers and mutual learning, this paper presents an adaptive, user-centered approach to development of an innovative Mobile-Health (M-Health) intervention for a semi-literate rural community in Sethakeng in the Northern Cape province of South Africa. This is done in the recognition of the fact that one of the main development challenges currently facing the Country is education, skills development and information illiteracy, which is the inability of users to locate, evaluate and effectively use information and communication technology. To achieve the development and implementation of an M-Health intervention, human-computer-interface design concepts of anthropomorphic and affective design principles were employed because they not only lead to mutual-learning but also aspire to implore an emotional or a positively reinforced sub-conscious reaction from users. Three pilot studies carried out using the resulting intervention illustrated a sustained increase in adoption.
撒哈拉以南非洲国家在前三次工业革命中仅仅扮演了旁观者的角色。然而,研究人员、商界、政府和民间社会都承认,这些国家有潜力在第四次工业革命中发挥积极作用。就南非而言,移动电话技术将为此发挥关键作用。可以说,信息和传播促进发展的各个阶段已经为这种转变奠定了基础。然而,正如ICT4D 3.0所阐述的那样,大多数ICT4D实施都陷入了不可持续和无关紧要的北方设计向南方现实转移的陷阱。考虑到现状、文化转移和相互学习的隐含因素,本文提出了一种适应性的、以用户为中心的方法,为南非北开普省Sethakeng的一个半文盲农村社区开发创新的移动医疗(M-Health)干预措施。这样做是因为认识到该国目前面临的主要发展挑战之一是教育、技能发展和信息文盲,即用户无法找到、评价和有效使用信息和通信技术。为了实现移动健康干预的发展和实施,采用了拟人化和情感设计原则的人机界面设计概念,因为它们不仅导致相互学习,而且还渴望恳求用户的情感或积极强化的潜意识反应。利用由此产生的干预措施进行的三项试点研究表明,采用率持续上升。
{"title":"Application of HCI Design Principles in overcoming Information Illiteracy: Case of a M-Health Application for a Rural Community in South Africa","authors":"J. Coetzer","doi":"10.1109/ICONIC.2018.8601289","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601289","url":null,"abstract":"Countries in sub-Saharan Africa played a mere spectator role in the first three industrial revolutions. However, researchers, business community, governments and civil society, acknowledges that these countries have the potential to play an active role in the 4th Industrial Revolution. In the case of South Africa, mobile phone technology will play a critical role to this end. It can be argued that the various phases of Information and Communication for Development (ICT4D) have prepared grounds for this shift. However, as articulated in ICT4D 3.0, most ICT4D implementations have fallen trap to the unsustainable and irrelevant transfer of Northern designs to Southern realities. Putting in mind the implicit elements of the status quo, cultural transfers and mutual learning, this paper presents an adaptive, user-centered approach to development of an innovative Mobile-Health (M-Health) intervention for a semi-literate rural community in Sethakeng in the Northern Cape province of South Africa. This is done in the recognition of the fact that one of the main development challenges currently facing the Country is education, skills development and information illiteracy, which is the inability of users to locate, evaluate and effectively use information and communication technology. To achieve the development and implementation of an M-Health intervention, human-computer-interface design concepts of anthropomorphic and affective design principles were employed because they not only lead to mutual-learning but also aspire to implore an emotional or a positively reinforced sub-conscious reaction from users. Three pilot studies carried out using the resulting intervention illustrated a sustained increase in adoption.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Evaluation and Modelling of Secured Protocols’ Spent Transmission Time 安全协议传输时间的评估与建模
Claude Nawej, Pius Adewale Owolawi
In data communication network, one of the ideal network procedures is to transmit files securely from sender to a receiver. However, security alone without speed is not sufficient. In this paper, two network characteristics of an ideal file transfer, security and speed are considered. Using Wireshark network analyzer, we investigate, compare, and finally model the spent transmission time of the same size file between two encrypted WinSCP’s protocols, the Secure File Transfer Protocol, and the Secure Copy Protocol. In terms of speed in transferring files, experiment results show that, while retaining the same file size and security integrity, Secure File Transfer Protocol performs faster than its counterpart Secure Copy Protocol does. In order to predict the SFTP protocol speed in transferring files from the slower SCP, a polynomial model of order of three is proposed with a square correlation coefficient of 0.5207.
在数据通信网络中,将文件从发送端安全地传输到接收端是理想的网络过程之一。然而,只有安全而没有速度是不够的。本文考虑了理想文件传输的两个网络特性:安全性和速度。使用Wireshark网络分析器,我们调查、比较并最终建立了相同大小文件在两种加密的WinSCP协议(安全文件传输协议和安全复制协议)之间的传输时间模型。在文件传输速度方面,实验结果表明,在保持相同的文件大小和安全完整性的情况下,安全文件传输协议的速度比对应的安全复制协议要快。为了预测SFTP协议从较慢的SCP传输文件的速度,提出了一个3阶的多项式模型,其平方相关系数为0.5207。
{"title":"Evaluation and Modelling of Secured Protocols’ Spent Transmission Time","authors":"Claude Nawej, Pius Adewale Owolawi","doi":"10.1109/ICONIC.2018.8601263","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601263","url":null,"abstract":"In data communication network, one of the ideal network procedures is to transmit files securely from sender to a receiver. However, security alone without speed is not sufficient. In this paper, two network characteristics of an ideal file transfer, security and speed are considered. Using Wireshark network analyzer, we investigate, compare, and finally model the spent transmission time of the same size file between two encrypted WinSCP’s protocols, the Secure File Transfer Protocol, and the Secure Copy Protocol. In terms of speed in transferring files, experiment results show that, while retaining the same file size and security integrity, Secure File Transfer Protocol performs faster than its counterpart Secure Copy Protocol does. In order to predict the SFTP protocol speed in transferring files from the slower SCP, a polynomial model of order of three is proposed with a square correlation coefficient of 0.5207.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114548038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution 数字取证中的犯罪侧写:假设、挑战和可能的解决方案
Adedayo M. Balogun, T. Zuva
Cybercrime has been regarded understandably as a consequent compromise that follows the advent and perceived success of the computer and internet technologies. Equally effecting the privacy, trust, finance and welfare of the wealthy and low-income individuals and organizations, this menace has shown no indication of slowing down. Reports across the world have consistently shown exponential increase in the numbers and costs of cyber-incidents, and more worriedly low conviction rates of cybercriminals, over the years. Stakeholders increasingly explore ways to keep up with containing cyber-incidents by devising tools and techniques to increase the overall efficiency of investigations, but the gap keeps getting wider. However, criminal profiling – an investigative technique that has been proven to provide accurate and valuable directions to traditional crime investigations – has not seen a widespread application, including a formal methodology, to cybercrime investigations due to difficulties in its seamless transference. This paper, in a bid to address this problem, seeks to preliminarily identify the exact benefits criminal profiling has brought to successful traditional crime investigations and the benefits it can translate to cybercrime investigations, identify the challenges posed by the cyber-scene to its implementation in cybercrime investigations, and proffer a practicable solution.
网络犯罪被认为是随着计算机和互联网技术的出现和成功而随之而来的妥协,这是可以理解的。这种威胁同样影响着富人和低收入个人和组织的隐私、信任、财务和福利,没有任何减缓的迹象。多年来,世界各地的报告一致显示,网络事件的数量和成本呈指数级增长,而更令人担忧的是,网络罪犯的定罪率很低。利益相关者越来越多地通过设计工具和技术来提高调查的整体效率,探索遏制网络事件的方法,但差距越来越大。然而,犯罪侧写——一种已被证明为传统犯罪调查提供准确和有价值的方向的调查技术——由于难以无缝转移,尚未广泛应用于网络犯罪调查,包括一种正式的方法。为了解决这一问题,本文试图初步确定犯罪侧写给成功的传统犯罪调查带来的确切好处,以及它可以转化为网络犯罪调查的好处,识别网络场景对其在网络犯罪调查中实施所带来的挑战,并提出切实可行的解决方案。
{"title":"Criminal Profiling in Digital Forensics: Assumptions, Challenges and Probable Solution","authors":"Adedayo M. Balogun, T. Zuva","doi":"10.1109/ICONIC.2018.8601268","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601268","url":null,"abstract":"Cybercrime has been regarded understandably as a consequent compromise that follows the advent and perceived success of the computer and internet technologies. Equally effecting the privacy, trust, finance and welfare of the wealthy and low-income individuals and organizations, this menace has shown no indication of slowing down. Reports across the world have consistently shown exponential increase in the numbers and costs of cyber-incidents, and more worriedly low conviction rates of cybercriminals, over the years. Stakeholders increasingly explore ways to keep up with containing cyber-incidents by devising tools and techniques to increase the overall efficiency of investigations, but the gap keeps getting wider. However, criminal profiling – an investigative technique that has been proven to provide accurate and valuable directions to traditional crime investigations – has not seen a widespread application, including a formal methodology, to cybercrime investigations due to difficulties in its seamless transference. This paper, in a bid to address this problem, seeks to preliminarily identify the exact benefits criminal profiling has brought to successful traditional crime investigations and the benefits it can translate to cybercrime investigations, identify the challenges posed by the cyber-scene to its implementation in cybercrime investigations, and proffer a practicable solution.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122299125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1