Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031694
H. Biswas, Sian Lun Lau, Tze Ying Sim
3D Terrestrial Laser Scanning (TLS) technology has achieved massive acceptance to produce and visualise the 3D point clouds of existing facilities in the Architectural, Engineering and construction (AEC) industry. In addition, Building Information Modelling (BIM) is also well recognised to digitalise every component of actual buildings. Integration of TLS and BIM has been established as a disruptive technology to increase the quality and performance of the construction industry. Apart from all these recognised contributions of using the technologies, significant flaws in creating 3D BIM models of existing facilities must be addressed to improve the functionalities and operations in the facility management system. It is worth mentioning that the effective geometric modelling and semantic-rich object recognitions of existing construction buildings (behind the concrete wall) and point cloud overlapping are challenging issues in laser scanning technologies that ultimately lead to incomplete BIM models of as-built facilities. In this study, the contribution to the knowledge gap is represented by considering the two real case studies of existing facilities to optimise facility management and operations in the construction industry. Nevertheless, the main focus of this research is to introduce the current challenges in generating an effective 3D BIM model for the existing buildings satisfying the specified specifications and standards. Further research should consider the issues and more robust and effective evaluation procedures for the larger-scale real case containing more complex and hidden objects.
{"title":"Impact of Digitalization in Construction: Enriching As-built Facilities and Operations using BIM","authors":"H. Biswas, Sian Lun Lau, Tze Ying Sim","doi":"10.1109/ICOCO56118.2022.10031694","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031694","url":null,"abstract":"3D Terrestrial Laser Scanning (TLS) technology has achieved massive acceptance to produce and visualise the 3D point clouds of existing facilities in the Architectural, Engineering and construction (AEC) industry. In addition, Building Information Modelling (BIM) is also well recognised to digitalise every component of actual buildings. Integration of TLS and BIM has been established as a disruptive technology to increase the quality and performance of the construction industry. Apart from all these recognised contributions of using the technologies, significant flaws in creating 3D BIM models of existing facilities must be addressed to improve the functionalities and operations in the facility management system. It is worth mentioning that the effective geometric modelling and semantic-rich object recognitions of existing construction buildings (behind the concrete wall) and point cloud overlapping are challenging issues in laser scanning technologies that ultimately lead to incomplete BIM models of as-built facilities. In this study, the contribution to the knowledge gap is represented by considering the two real case studies of existing facilities to optimise facility management and operations in the construction industry. Nevertheless, the main focus of this research is to introduce the current challenges in generating an effective 3D BIM model for the existing buildings satisfying the specified specifications and standards. Further research should consider the issues and more robust and effective evaluation procedures for the larger-scale real case containing more complex and hidden objects.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10032026
Long Doan, Tho Nguyen Duc, Chuanzhe Jing, E. Kamioka, Phan Xuan Tan
In 360-degree streaming videos, viewport prediction can reduce the bandwidth needed during the stream while still maintaining a quality experience for the users by streaming only the area that is visible to the user. Existing research in viewport prediction aims to predict the user’s viewport with data from the user’s head movement trajectory, video saliency, and subtitles of the video. While these subtitles can contain much information necessary for viewport prediction, previous studies can only extract these information manually, which requires in-depth knowledge about the topic of the video. Moreover, extracting these information by hand can still miss some important keywords from the subtitles and limit the accuracy of the viewport prediction. In this paper, we focus on automate this extraction process by proposing three types of automatic keyword extraction methods, namely Adverb, NER (Named entity recognition) and Adverb+NER. We provide an analysis to demonstrate the effectiveness of our automatic methods compared to extracting important keywords by hand. We also incorporate our methods into an existing viewport prediction model to improve prediction accuracy. The experimental results show that the model with our automatic keyword extraction methods outperforms baseline methods which only use manually extracted information.
{"title":"Automatic Keyword Extraction for Viewport Prediction of 360-degree Virtual Tourism Video","authors":"Long Doan, Tho Nguyen Duc, Chuanzhe Jing, E. Kamioka, Phan Xuan Tan","doi":"10.1109/ICOCO56118.2022.10032026","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10032026","url":null,"abstract":"In 360-degree streaming videos, viewport prediction can reduce the bandwidth needed during the stream while still maintaining a quality experience for the users by streaming only the area that is visible to the user. Existing research in viewport prediction aims to predict the user’s viewport with data from the user’s head movement trajectory, video saliency, and subtitles of the video. While these subtitles can contain much information necessary for viewport prediction, previous studies can only extract these information manually, which requires in-depth knowledge about the topic of the video. Moreover, extracting these information by hand can still miss some important keywords from the subtitles and limit the accuracy of the viewport prediction. In this paper, we focus on automate this extraction process by proposing three types of automatic keyword extraction methods, namely Adverb, NER (Named entity recognition) and Adverb+NER. We provide an analysis to demonstrate the effectiveness of our automatic methods compared to extracting important keywords by hand. We also incorporate our methods into an existing viewport prediction model to improve prediction accuracy. The experimental results show that the model with our automatic keyword extraction methods outperforms baseline methods which only use manually extracted information.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031634
Salfarina Abdullah, Al Dulaimi Moatasem Abdulmajeed Alwan, Y. Y. Jusoh
The efficiency of blockchain technologies in managing transactions using distributed ledgers provides new age of government services. This enhances citizen-government transparency to establish public-sector trust by preventing fraud. However, using and adopting blockchain in e-Government context was insufficiently explored in previously published literatures. This paper systematically reviews relevant works to illustrate blockchain issues, challenges, while detecting the new directions for future research of using blockchain applications in e-Government. Discussed literatures explained that adopting blockchain applications to build e-Government services still has obvious lack in empirical evidence. Predominantly, major challenges facing blockchain adoption are summarized in scalability, flexibility and security aspects. organizationally, acceptability issues in blockchain and demanding new models of e-government are illustrated as major obstacles against the adoption. Furthermore, the lack in legislations and helping regulatory represents the major environmental obstacles against the adoption.
{"title":"Blockchain Technologies in e-Government Services: A Literature Review","authors":"Salfarina Abdullah, Al Dulaimi Moatasem Abdulmajeed Alwan, Y. Y. Jusoh","doi":"10.1109/ICOCO56118.2022.10031634","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031634","url":null,"abstract":"The efficiency of blockchain technologies in managing transactions using distributed ledgers provides new age of government services. This enhances citizen-government transparency to establish public-sector trust by preventing fraud. However, using and adopting blockchain in e-Government context was insufficiently explored in previously published literatures. This paper systematically reviews relevant works to illustrate blockchain issues, challenges, while detecting the new directions for future research of using blockchain applications in e-Government. Discussed literatures explained that adopting blockchain applications to build e-Government services still has obvious lack in empirical evidence. Predominantly, major challenges facing blockchain adoption are summarized in scalability, flexibility and security aspects. organizationally, acceptability issues in blockchain and demanding new models of e-government are illustrated as major obstacles against the adoption. Furthermore, the lack in legislations and helping regulatory represents the major environmental obstacles against the adoption.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127452316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031920
Shoichi Nakamura, H. Nakayama, R. Onuma, Junichi Tachibana, H. Kaminaga, Y. Miyadera
In programing exercises, it is important to identify the stumbling of each student and to provide appropriate guidance. However, there are circumstances in which students’ stumbling cannot be fully understood due to the diverse nature of their stumbling and the limited number of instructors. In particular, students tend to stumble when trying to shape their programs to match the target processing (“stumbling in construction of a program logic”). However, it is difficult to identify this stumbling since it does not appear as a compilation error. We have developed a system for automatically estimating the stumbling in the construction of a program logic. An experiment to evaluate the effectiveness of the proposed system produced promising results regarding its effectiveness for identifying stumbling in logic construction.
{"title":"A System for Identification of Stumbles in Construction of Program Logic that Does Not Appear as Compilation Errors","authors":"Shoichi Nakamura, H. Nakayama, R. Onuma, Junichi Tachibana, H. Kaminaga, Y. Miyadera","doi":"10.1109/ICOCO56118.2022.10031920","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031920","url":null,"abstract":"In programing exercises, it is important to identify the stumbling of each student and to provide appropriate guidance. However, there are circumstances in which students’ stumbling cannot be fully understood due to the diverse nature of their stumbling and the limited number of instructors. In particular, students tend to stumble when trying to shape their programs to match the target processing (“stumbling in construction of a program logic”). However, it is difficult to identify this stumbling since it does not appear as a compilation error. We have developed a system for automatically estimating the stumbling in the construction of a program logic. An experiment to evaluate the effectiveness of the proposed system produced promising results regarding its effectiveness for identifying stumbling in logic construction.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031639
Muhammad Syahir Nazarudin, H. M. Hanum, S. A. Rahman, S. Mutalib
There are many tourist places in Malaysia, and still many to be discovered. The Internet is an agent to find web documents describing a place or a location. The precise location or place is always connected to the geotagging process. However, a limited geotagging approach is applied in Malay documents. Hence, a geotagging application is developed using the name-place entity recognition approach. A geotagging algorithm is developed for tagging geographic information in Malay documents. The algorithm performs word filtering and name-place extraction from both the MyGazetteer resources and tourism web resources. An application is built to demonstrate the tagging of geographic information onto each web document. The geotagging prototype (MyGeo-NER) allows users to edit tags of existing web documents, add new ones, and search for documents containing the names of places or locations they have entered.
{"title":"Geotagging for Malay documents using Name-Entity Recognition Approach","authors":"Muhammad Syahir Nazarudin, H. M. Hanum, S. A. Rahman, S. Mutalib","doi":"10.1109/ICOCO56118.2022.10031639","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031639","url":null,"abstract":"There are many tourist places in Malaysia, and still many to be discovered. The Internet is an agent to find web documents describing a place or a location. The precise location or place is always connected to the geotagging process. However, a limited geotagging approach is applied in Malay documents. Hence, a geotagging application is developed using the name-place entity recognition approach. A geotagging algorithm is developed for tagging geographic information in Malay documents. The algorithm performs word filtering and name-place extraction from both the MyGazetteer resources and tourism web resources. An application is built to demonstrate the tagging of geographic information onto each web document. The geotagging prototype (MyGeo-NER) allows users to edit tags of existing web documents, add new ones, and search for documents containing the names of places or locations they have entered.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031826
H. Nakayama, R. Onuma, Kota Chiba, H. Kaminaga, Y. Miyadera, Shoichi Nakamura
Opportunities are increasing for students to conduct discussions in problem-based learning (PBL) while observing discussions on social media. However, they often lack experience in examining actual discussion cases. We aim to develop methods for extracting discussion circumstances on social media to provide them to students so that they can use them as clues to understanding actual discussion cases. Specifically, we extract what kind of topics exist and how utterances are exchanged as discussion circumstances. In this paper, we describe methods for extracting the discussion circumstances and an overview of a support system that we developed. Moreover, we describe an experiment on extracting the circumstances from actual conversation data and discuss the effectiveness of our methods on the basis of the results.
{"title":"A System for Extracting Discussion Circumstances on Social Media to Promote Inexperienced Students Understand Discussion Cases","authors":"H. Nakayama, R. Onuma, Kota Chiba, H. Kaminaga, Y. Miyadera, Shoichi Nakamura","doi":"10.1109/ICOCO56118.2022.10031826","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031826","url":null,"abstract":"Opportunities are increasing for students to conduct discussions in problem-based learning (PBL) while observing discussions on social media. However, they often lack experience in examining actual discussion cases. We aim to develop methods for extracting discussion circumstances on social media to provide them to students so that they can use them as clues to understanding actual discussion cases. Specifically, we extract what kind of topics exist and how utterances are exchanged as discussion circumstances. In this paper, we describe methods for extracting the discussion circumstances and an overview of a support system that we developed. Moreover, we describe an experiment on extracting the circumstances from actual conversation data and discuss the effectiveness of our methods on the basis of the results.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131899795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031657
Tze Ying Sim, Sian Lun Lau
Novice programming subject refers to the first programming subject taken by a student. This is also commonly known as Computer Science 1 (CS1) subject. It is concluded that the average failure rate of a novice programming class is 30%. The systematic review collects data between 2000 and 2022 via the Scopus database. Keywords utilized were ”programming, coding, computer” and ”introductory, novice”. The first search resulted in 940 results. The second search added the focus on curriculum. This search only returned 11 results. The papers were analysed to determine if imperative-first or object-first should be adopted. The research indicates that block-based programming is mainly used in K12 education, or CS1 without programming in K12 education. Even though the programming languages used are objectoriented, the activities and class content do not focus on object-oriented programming. The main focus is still learning to solve problems, and imperative-first programming is more commonly implemented. The third search with the word challenges and difficulties returned 163 results. Further search was done for the word within abstract, returning 39 results. The findings indicate 17 research implemented imperative programming vs 1 on object. Most of the research in undergraduate studies implemented textbased programming (22 cases) vs block-based programming (5 cases). Another two observations are automated tools to support teaching and learning, especially personalizing feedback, and the social aspect of learning, for example collaborative learning. This research indicates that the trend for solution has moved from error analysis to block based programming to the future of learning tools automation.
初级编程课程是指学生学习的第一门编程课程。这也通常被称为计算机科学1 (CS1)科目。得出的结论是,一个新手编程课的平均失败率为30%。该系统综述通过Scopus数据库收集了2000年至2022年间的数据。使用的关键词是“编程、编码、计算机”和“入门、新手”。第一次搜索产生了940个结果。第二次搜索增加了对课程的关注。这个搜索只返回了11个结果。对这些文件进行了分析,以确定应采用命令优先还是对象优先。研究表明,基于块的编程主要用于K12教育,或CS1无编程用于K12教育。尽管使用的编程语言是面向对象的,但是活动和类内容并不关注面向对象编程。主要的焦点仍然是学习如何解决问题,命令式优先编程的实现更为普遍。第三个搜索词是challenges and difficulties,返回163个结果。进一步搜索abstract内的单词,返回39个结果。结果表明,17家研究机构实现了命令式编程,1家研究机构实现了对象编程。大多数本科研究实现了基于文本的编程(22例)和基于块的编程(5例)。另外两个观察是支持教学和学习的自动化工具,特别是个性化反馈,以及学习的社会方面,例如协作学习。这项研究表明,解决方案的趋势已经从错误分析转向基于块的编程,再到学习工具自动化的未来。
{"title":"Review on Challenges and Solutions in Novice Programming Education","authors":"Tze Ying Sim, Sian Lun Lau","doi":"10.1109/ICOCO56118.2022.10031657","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031657","url":null,"abstract":"Novice programming subject refers to the first programming subject taken by a student. This is also commonly known as Computer Science 1 (CS1) subject. It is concluded that the average failure rate of a novice programming class is 30%. The systematic review collects data between 2000 and 2022 via the Scopus database. Keywords utilized were ”programming, coding, computer” and ”introductory, novice”. The first search resulted in 940 results. The second search added the focus on curriculum. This search only returned 11 results. The papers were analysed to determine if imperative-first or object-first should be adopted. The research indicates that block-based programming is mainly used in K12 education, or CS1 without programming in K12 education. Even though the programming languages used are objectoriented, the activities and class content do not focus on object-oriented programming. The main focus is still learning to solve problems, and imperative-first programming is more commonly implemented. The third search with the word challenges and difficulties returned 163 results. Further search was done for the word within abstract, returning 39 results. The findings indicate 17 research implemented imperative programming vs 1 on object. Most of the research in undergraduate studies implemented textbased programming (22 cases) vs block-based programming (5 cases). Another two observations are automated tools to support teaching and learning, especially personalizing feedback, and the social aspect of learning, for example collaborative learning. This research indicates that the trend for solution has moved from error analysis to block based programming to the future of learning tools automation.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132015003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031709
Evelyn Yeap Ewe Lin, Kok Cheng Lim, M. A. Faudzi, Mohd Hazli Mohamed Zabil, Ridha Omar, A. Selamat, O. Krejcar
Language e-learning technologies (LELT) is an emerging area focusing on application of computing technologies in language learning of all kinds. Being a communication skill that requires much face to face interactions, electronic learning approach is definitely a challenge since e-learning focuses on self-paced remote engagements. This paper collects paper pertaining technologies in language learning from year 2019 to 2022 seeking into five research questions on finding out the current trends of research types, evaluation methods, contributions and correlations of between them. This research through a filtration process has found 27 relevant papers. This paper will first present all descriptive findings, data analysis, correlations and lastly insights of the review analysis processes. This paper identified 3 research domain gaps and 3 recommendations of novel future works.
{"title":"A Systematic Review on English Language e-Learning Technologies","authors":"Evelyn Yeap Ewe Lin, Kok Cheng Lim, M. A. Faudzi, Mohd Hazli Mohamed Zabil, Ridha Omar, A. Selamat, O. Krejcar","doi":"10.1109/ICOCO56118.2022.10031709","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031709","url":null,"abstract":"Language e-learning technologies (LELT) is an emerging area focusing on application of computing technologies in language learning of all kinds. Being a communication skill that requires much face to face interactions, electronic learning approach is definitely a challenge since e-learning focuses on self-paced remote engagements. This paper collects paper pertaining technologies in language learning from year 2019 to 2022 seeking into five research questions on finding out the current trends of research types, evaluation methods, contributions and correlations of between them. This research through a filtration process has found 27 relevant papers. This paper will first present all descriptive findings, data analysis, correlations and lastly insights of the review analysis processes. This paper identified 3 research domain gaps and 3 recommendations of novel future works.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133039992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031837
Tomoya Oshio, Satoshi Okada, Takuho Mitsunaga
With the development of information technology, IoT devices are spreading rapidly. ZigBee is one of the short-range wireless communication standards used in IoT devices and is expected to be used in smart homes and industrial control systems because of its low power consumption and low-cost operation despite its low communication speed. However, ZigBee can be subject to cyber-attacks because eavesdropping on packets and sending forged packets against wireless communication is easier than wired ones. In order to use ZigBee safely in smart home and industrial control systems, it is necessary to develop a method to detect cyber-attacks quickly. In this paper, we propose a machine learning-based anomaly detection system for Zigbee networks. We focus on characteristics of ZigBee communication and investigate a method to detect network anomalies and cyber attacks on ZigBee networks using machine learning. Furthermore, since we primarily put emphasis on practicality, our proposed system is simple and consists of widely used tools such as Wireshark. To evaluate the detection accuracy of our proposed system, we conduct some experiments. As a result, it is shown that our proposed system can detect attacks with high accuracy. In addition, we varied the features used in machine learning and discuss which feature has a high contribution to anomaly detection.
{"title":"Machine Learning-based Anomaly Detection in ZigBee Networks","authors":"Tomoya Oshio, Satoshi Okada, Takuho Mitsunaga","doi":"10.1109/ICOCO56118.2022.10031837","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031837","url":null,"abstract":"With the development of information technology, IoT devices are spreading rapidly. ZigBee is one of the short-range wireless communication standards used in IoT devices and is expected to be used in smart homes and industrial control systems because of its low power consumption and low-cost operation despite its low communication speed. However, ZigBee can be subject to cyber-attacks because eavesdropping on packets and sending forged packets against wireless communication is easier than wired ones. In order to use ZigBee safely in smart home and industrial control systems, it is necessary to develop a method to detect cyber-attacks quickly. In this paper, we propose a machine learning-based anomaly detection system for Zigbee networks. We focus on characteristics of ZigBee communication and investigate a method to detect network anomalies and cyber attacks on ZigBee networks using machine learning. Furthermore, since we primarily put emphasis on practicality, our proposed system is simple and consists of widely used tools such as Wireshark. To evaluate the detection accuracy of our proposed system, we conduct some experiments. As a result, it is shown that our proposed system can detect attacks with high accuracy. In addition, we varied the features used in machine learning and discuss which feature has a high contribution to anomaly detection.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133442135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-14DOI: 10.1109/ICOCO56118.2022.10031658
Bukhary Ikhwan Ismail, Shahrol Hisham Baharom, Hishamadie Ahmad, Muhammad Nurmahir Mohamad Sehmi, Mohammad Fairus Khalid
Palm oil can grow in almost flexible topography. On flats, slopes, hilly, or undulating areas and whether on inland or reclaimed coastal areas. This makes the plantation environment unique with various soil types & surfaces. Each surface has a unique physical characteristic that directly influences the driving, handling, stability and safety of the robot. A mobile robot in palm oil plantation should able to traverse the estate with ease. In this work, we present our development process in converting an all-terrain vehicle (ATV) into Unmanned Ground Vehicle (UGV) agricultural usage, targeting for palm oil plantation estate. We explain the mechanical and electrical conversion activities. We then perform several experiments to verify the responsiveness of our drive-by-wire system conversion.
{"title":"Unmanned Ground Vehicle Research Platform for Agricultural Environment","authors":"Bukhary Ikhwan Ismail, Shahrol Hisham Baharom, Hishamadie Ahmad, Muhammad Nurmahir Mohamad Sehmi, Mohammad Fairus Khalid","doi":"10.1109/ICOCO56118.2022.10031658","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031658","url":null,"abstract":"Palm oil can grow in almost flexible topography. On flats, slopes, hilly, or undulating areas and whether on inland or reclaimed coastal areas. This makes the plantation environment unique with various soil types & surfaces. Each surface has a unique physical characteristic that directly influences the driving, handling, stability and safety of the robot. A mobile robot in palm oil plantation should able to traverse the estate with ease. In this work, we present our development process in converting an all-terrain vehicle (ATV) into Unmanned Ground Vehicle (UGV) agricultural usage, targeting for palm oil plantation estate. We explain the mechanical and electrical conversion activities. We then perform several experiments to verify the responsiveness of our drive-by-wire system conversion.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}