首页 > 最新文献

2022 IEEE International Conference on Computing (ICOCO)最新文献

英文 中文
Performance Evaluation of Self-Organising Map Model in Organising the Unstructured Data 自组织映射模型在组织非结构化数据中的性能评价
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10032038
C. C. You, Joi San Tan, Seng Poh Lim, Seng Chee Lim, Chen Kang Lee
Surface reconstruction becomes a difficult task in reverse engineering when the data obtained during the data acquisition process is unstructured. The unstructured data do not contain the connectivity information required to represent the surface correctly with the least error. Hence, it should be organised to obtain the connectivity information. Various types of Self-Organising Map (SOM) models are utilised in the previous works to organise the unstructured data and represent the surface. However, the performance of the SOM models is affected when different topologies are involved in the organising process. Therefore, the purposes of this experiment are to evaluate the performance of the SOM models with different topologies and to determine the limitation of the various SOM models. The SOM models involved are 2-D SOM, 3-D SOM, Cube Kohonen (CK) SOM, and Spherical SOM (SSOM). Three 3-D unstructured closed surface data sets are applied in this experiment to evaluate the models. The experimental results show that the CKSOM and SSOM models can represent the closed surface correctly with a medium speed. Overall, the CKSOM model performs better than the SSOM model as its grid size can be tuned and it achieved 9 out of 9 minimum error in presenting the surface.
当数据采集过程中获取的数据是非结构化数据时,曲面重构成为逆向工程中的一个难点。非结构化数据不包含以最小误差正确表示曲面所需的连接信息。因此,应该对其进行组织以获取连接信息。在之前的工作中,使用了各种类型的自组织映射(SOM)模型来组织非结构化数据并表示表面。然而,当组织过程中涉及不同的拓扑结构时,SOM模型的性能会受到影响。因此,本实验的目的是评估具有不同拓扑的SOM模型的性能,并确定各种SOM模型的局限性。所涉及的SOM模型有二维SOM、三维SOM、立方体Kohonen (CK) SOM和球面SOM (SSOM)。本实验采用三个三维非结构化封闭曲面数据集对模型进行评价。实验结果表明,CKSOM和SSOM模型可以在中等速度下正确地表示封闭表面。总体而言,CKSOM模型表现优于SSOM模型,因为它的网格大小可以调整,并且在呈现表面时实现了9 / 9的最小误差。
{"title":"Performance Evaluation of Self-Organising Map Model in Organising the Unstructured Data","authors":"C. C. You, Joi San Tan, Seng Poh Lim, Seng Chee Lim, Chen Kang Lee","doi":"10.1109/ICOCO56118.2022.10032038","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10032038","url":null,"abstract":"Surface reconstruction becomes a difficult task in reverse engineering when the data obtained during the data acquisition process is unstructured. The unstructured data do not contain the connectivity information required to represent the surface correctly with the least error. Hence, it should be organised to obtain the connectivity information. Various types of Self-Organising Map (SOM) models are utilised in the previous works to organise the unstructured data and represent the surface. However, the performance of the SOM models is affected when different topologies are involved in the organising process. Therefore, the purposes of this experiment are to evaluate the performance of the SOM models with different topologies and to determine the limitation of the various SOM models. The SOM models involved are 2-D SOM, 3-D SOM, Cube Kohonen (CK) SOM, and Spherical SOM (SSOM). Three 3-D unstructured closed surface data sets are applied in this experiment to evaluate the models. The experimental results show that the CKSOM and SSOM models can represent the closed surface correctly with a medium speed. Overall, the CKSOM model performs better than the SSOM model as its grid size can be tuned and it achieved 9 out of 9 minimum error in presenting the surface.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"162 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129151080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rice Price Prediction in Malaysia 马来西亚大米价格预测
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031931
Nor Haziqah Mohd Yusri, Nur Amalina binti Shafie, N. A. M. Ghani
Rice is a staple food in Malaysia. There are three leading crops consumed by humans which include rice, wheat, and maize. Among these three crops, rice is by far the most important for people in low and low-middle-income countries. Thus, rice has a pivotal role as a source of nutrition for most Malaysians and a principal source of income for farmers. In this study, a data set of monthly rice prices in Malaysia from January 2013 to December 2021 is used from IndexMundi. A total of108 observations were examined by using the Box-Jenkins method which is Autoregressive Integrated Moving Average (ARIMA). This study found that the ARIMA(2,1,1) is the best model using the data based on Akaike’s Information Criterion (AIC) and Bayesian Information Criterion (BIC) value. This research aimed to identify the behavior, the best fit model, and forecast the future value of rice prices in Malaysia.
大米是马来西亚的主食。人类食用的三种主要作物包括水稻、小麦和玉米。在这三种作物中,水稻对低收入和中低收入国家的人们来说是最重要的。因此,大米作为大多数马来西亚人的营养来源和农民的主要收入来源具有关键作用。在本研究中,马来西亚2013年1月至2021年12月的月度大米价格数据集来自IndexMundi。采用自回归综合移动平均(ARIMA)的Box-Jenkins方法对108个观测值进行了检验。本研究发现,基于赤池信息准则(AIC)和贝叶斯信息准则(BIC)值的数据,ARIMA(2,1,1)是最佳模型。本研究旨在确定行为,最佳拟合模型,并预测未来价值的大米价格在马来西亚。
{"title":"Rice Price Prediction in Malaysia","authors":"Nor Haziqah Mohd Yusri, Nur Amalina binti Shafie, N. A. M. Ghani","doi":"10.1109/ICOCO56118.2022.10031931","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031931","url":null,"abstract":"Rice is a staple food in Malaysia. There are three leading crops consumed by humans which include rice, wheat, and maize. Among these three crops, rice is by far the most important for people in low and low-middle-income countries. Thus, rice has a pivotal role as a source of nutrition for most Malaysians and a principal source of income for farmers. In this study, a data set of monthly rice prices in Malaysia from January 2013 to December 2021 is used from IndexMundi. A total of108 observations were examined by using the Box-Jenkins method which is Autoregressive Integrated Moving Average (ARIMA). This study found that the ARIMA(2,1,1) is the best model using the data based on Akaike’s Information Criterion (AIC) and Bayesian Information Criterion (BIC) value. This research aimed to identify the behavior, the best fit model, and forecast the future value of rice prices in Malaysia.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construct an Intelligent Querying System in Education based on Ontology Integration 构建基于本体集成的教育智能化查询系统
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031735
D. Truong, H. Nguyen, Sang Vu, Vuong T. Pham, Diem Nguyen
E-learning is an online educational system using technological and electronic devices through the internet. Using e-learning educational systems, learners can refer to documents and communicate directly with teachers to effectuate the acquisition of knowledge. In this paper, the method for creating an intelligent querying system for e-learning is proposed. The knowledge base of this system is organized based on the integrating of ontology and the structure of database. Some searching issues for knowledge content, such as studying and resolving knowledge searches based on classification of knowledge, are studied and solved. This method is applied to build an intelligent querying system on the course of Database Foundation in Information Technology (IT) curriculum at university. This system aims to support students to review lessons and understand more the knowledge of courses by their self-learning. The experimental results show that it would be expected to contribute in supporting online-based learning facilities for students.
电子学习是一种通过互联网使用技术和电子设备的在线教育系统。使用e-learning教育系统,学习者可以参考文档并直接与教师交流,从而实现知识的获取。本文提出了一种构建面向网络学习的智能查询系统的方法。该系统的知识库采用本体与数据库结构相结合的方式进行组织。研究并解决了基于知识分类的知识搜索研究与求解等知识内容搜索问题。将该方法应用于高校《信息技术数据库基础》课程的智能查询系统的构建。该系统旨在支持学生通过自学来复习课程,更好地理解课程知识。实验结果表明,它将有助于支持学生的在线学习设施。
{"title":"Construct an Intelligent Querying System in Education based on Ontology Integration","authors":"D. Truong, H. Nguyen, Sang Vu, Vuong T. Pham, Diem Nguyen","doi":"10.1109/ICOCO56118.2022.10031735","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031735","url":null,"abstract":"E-learning is an online educational system using technological and electronic devices through the internet. Using e-learning educational systems, learners can refer to documents and communicate directly with teachers to effectuate the acquisition of knowledge. In this paper, the method for creating an intelligent querying system for e-learning is proposed. The knowledge base of this system is organized based on the integrating of ontology and the structure of database. Some searching issues for knowledge content, such as studying and resolving knowledge searches based on classification of knowledge, are studied and solved. This method is applied to build an intelligent querying system on the course of Database Foundation in Information Technology (IT) curriculum at university. This system aims to support students to review lessons and understand more the knowledge of courses by their self-learning. The experimental results show that it would be expected to contribute in supporting online-based learning facilities for students.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"32 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125731820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of Infected Devices Using the Quantification Theory Type 3 Based on MITRE ATT&CK Technique 基于MITRE攻击& ck技术的量化理论3型感染设备预测
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031822
Yosuke Katano, Yukihiro Kozai, Satoshi Okada, Takuho Mitsunaga
Reports of cyber attacks are increasing every year. Although many companies, groups, and organizations have taken various measures against cyber attacks, such as security education and attack detection systems. However, it is still practically challenging to prevent security incidents completely and proactively. In addition, attackers continue to attack internally after their initial intrusion. In other words, it is essential to prevent the attacker’s intrusion and quickly identify and stop the damage after the intrusion. However, it takes time and effort to quickly identify the infection status from a large number of logs. The purpose of this research is to identify the infection status of an organization quickly. We hypothesized that the behavior of the initially infected device and the secondary one by lateral movement would be similar. To put it differently, we thought it was possible to detect laterally moved devices based on the similarity between an initially infected device and a secondary one. In this research, we propose a method to find a device secondarily infected by lateral movement. We determine the similarity between the initially infected device and the secondary one by embodying the device’s behavior in terms of MITRE ATT&CK’s Technique. Our experiment results show a substantial similarity between the initially infected device and the secondary one by lateral movement.
关于网络攻击的报道每年都在增加。尽管许多公司、团体和组织已经采取了各种措施来应对网络攻击,例如安全教育和攻击检测系统。然而,如何全面、主动地预防安全事件,在实践中仍具有一定的挑战性。此外,攻击者在初次入侵后还会继续进行内部攻击。也就是说,防止攻击者的入侵,并在入侵后快速识别和停止破坏是至关重要的。但是,从大量的日志中快速识别感染状态需要花费大量的时间和精力。本研究的目的是快速识别组织的感染状态。我们假设最初受感染的设备和通过横向移动的继发设备的行为是相似的。换句话说,我们认为可以根据最初受感染的设备和次要设备之间的相似性来检测横向移动的设备。在这项研究中,我们提出了一种方法来寻找继发感染横向运动的装置。我们根据MITRE at&ck的技术体现设备的行为,确定最初受感染设备与次要设备之间的相似性。我们的实验结果表明,最初感染的设备与通过横向移动的次要设备之间存在实质性的相似性。
{"title":"Prediction of Infected Devices Using the Quantification Theory Type 3 Based on MITRE ATT&CK Technique","authors":"Yosuke Katano, Yukihiro Kozai, Satoshi Okada, Takuho Mitsunaga","doi":"10.1109/ICOCO56118.2022.10031822","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031822","url":null,"abstract":"Reports of cyber attacks are increasing every year. Although many companies, groups, and organizations have taken various measures against cyber attacks, such as security education and attack detection systems. However, it is still practically challenging to prevent security incidents completely and proactively. In addition, attackers continue to attack internally after their initial intrusion. In other words, it is essential to prevent the attacker’s intrusion and quickly identify and stop the damage after the intrusion. However, it takes time and effort to quickly identify the infection status from a large number of logs. The purpose of this research is to identify the infection status of an organization quickly. We hypothesized that the behavior of the initially infected device and the secondary one by lateral movement would be similar. To put it differently, we thought it was possible to detect laterally moved devices based on the similarity between an initially infected device and a secondary one. In this research, we propose a method to find a device secondarily infected by lateral movement. We determine the similarity between the initially infected device and the secondary one by embodying the device’s behavior in terms of MITRE ATT&CK’s Technique. Our experiment results show a substantial similarity between the initially infected device and the secondary one by lateral movement.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125771717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ML Detection Method for Malicious Operation in Hybrid Zero Trust Architecture 混合零信任架构下恶意操作的机器学习检测方法
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031702
Koshi Ishide, Satoshi Okada, Mariko Fujimoto, Takuho Mitsunaga
Recently, remote work has become popular due to the widespread of infectious diseases. Many organizations and companies have turned to a Virtual Private Network (VPN) in an attempt to provide secure remote access to their on-premises infrastructure. However, intensive access to such VPN devices places a heavy burden on network performance, and there is also a high risk of cyber-attacks targeting them. Therefore, the demand for zero trust architecture without using VPN devices is increasing these days. However, it takes much time for organizations to introduce a zero trust architecture. Furthermore, it is difficult for some organizations to implement the so-called “ideal zero trust environment” because of some security problems and confidential information management. Thus, it is expected that a hybrid environment in which a zero trust architecture and a conventional on-premises environment coexist is introduced at first in many organizations. In this environment, access logs for each service are distributed in both cloud and on-premise servers. Thus, conventional log-based anomaly detection methods will not work well. In this paper, we propose a method for detecting unauthorized access to such a hybrid environment using machine learning and verify its effectiveness in a virtual environment. As a result, we detect abnormal behavior with high accuracy. Furthermore, based on the experimental results, we discuss how logs should be collected and what kind of log information is useful for anomaly detection in hybrid environments.
最近,由于传染病的广泛传播,远程工作变得流行起来。许多组织和公司已经转向虚拟专用网(VPN),试图提供对其本地基础设施的安全远程访问。然而,对此类VPN设备的密集访问给网络性能带来了沉重的负担,而且针对这些设备的网络攻击风险也很高。因此,对不使用VPN设备的零信任架构的需求越来越大。然而,组织引入零信任体系结构需要花费大量时间。此外,由于一些安全问题和机密信息管理,一些组织难以实现所谓的“理想零信任环境”。因此,期望在许多组织中首先引入零信任体系结构和传统的本地环境共存的混合环境。在这种环境下,每个服务的访问日志都分布在云和本地服务器上。因此,传统的基于日志的异常检测方法将不能很好地工作。在本文中,我们提出了一种使用机器学习来检测对这种混合环境的未经授权访问的方法,并验证其在虚拟环境中的有效性。因此,我们检测异常行为的准确性很高。在实验的基础上,讨论了在混合环境中如何收集日志信息以及哪些日志信息对异常检测有用。
{"title":"ML Detection Method for Malicious Operation in Hybrid Zero Trust Architecture","authors":"Koshi Ishide, Satoshi Okada, Mariko Fujimoto, Takuho Mitsunaga","doi":"10.1109/ICOCO56118.2022.10031702","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031702","url":null,"abstract":"Recently, remote work has become popular due to the widespread of infectious diseases. Many organizations and companies have turned to a Virtual Private Network (VPN) in an attempt to provide secure remote access to their on-premises infrastructure. However, intensive access to such VPN devices places a heavy burden on network performance, and there is also a high risk of cyber-attacks targeting them. Therefore, the demand for zero trust architecture without using VPN devices is increasing these days. However, it takes much time for organizations to introduce a zero trust architecture. Furthermore, it is difficult for some organizations to implement the so-called “ideal zero trust environment” because of some security problems and confidential information management. Thus, it is expected that a hybrid environment in which a zero trust architecture and a conventional on-premises environment coexist is introduced at first in many organizations. In this environment, access logs for each service are distributed in both cloud and on-premise servers. Thus, conventional log-based anomaly detection methods will not work well. In this paper, we propose a method for detecting unauthorized access to such a hybrid environment using machine learning and verify its effectiveness in a virtual environment. As a result, we detect abnormal behavior with high accuracy. Furthermore, based on the experimental results, we discuss how logs should be collected and what kind of log information is useful for anomaly detection in hybrid environments.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123421020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Class Imbalance Detection And Classification Performance: A New Potential of Combination Resample and Random Forest 提高类不平衡检测和分类性能:组合样本和随机森林的新潜力
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031922
A. Zakaria, A. Selamat, Lim Kok Cheng, O. Krejcar
Data mining is a knowledge discovery of the data that extracts and discovers patterns and relationships to predict outcomes. Class imbalance is one of the obstacles that can drive misclassification. The class imbalance affected the result of classification machine learning. The classification technique can divide the data into the given class target. This research focuses on four pre-processing methods: SMOTE, Spread Subsample, Class Balancer, and Resample. These methods can help to clean the data before undergoing the classification techniques. Resample shows the best result for solving the imbalance problem with 41.321 for Mean and Standard Deviation, 64.101. Besides, this research involves six classification techniques: Naïve Bayes, BayesNet, Random Forest, Random Tree, Logistics, and Multilayer Perceptron. Indeed, the combination of Resample and Random Forest has the best result of Precision, 0.941, and ROC Area is 0.983.
数据挖掘是对数据的一种知识发现,通过提取和发现模式和关系来预测结果。类别不平衡是导致错误分类的障碍之一。类不平衡影响分类机器学习的结果。分类技术可以将数据划分为给定的类目标。本文主要研究了四种预处理方法:SMOTE、Spread Subsample、Class Balancer和ressample。这些方法可以帮助在进行分类技术之前清理数据。在解决不平衡问题时,样本均值和标准差分别为41.321和64.101。此外,本研究涉及六种分类技术:Naïve贝叶斯,贝叶斯网,随机森林,随机树,物流和多层感知器。的确,Resample和Random Forest的组合得到了精度为0.941的最佳结果,ROC Area为0.983。
{"title":"Improving Class Imbalance Detection And Classification Performance: A New Potential of Combination Resample and Random Forest","authors":"A. Zakaria, A. Selamat, Lim Kok Cheng, O. Krejcar","doi":"10.1109/ICOCO56118.2022.10031922","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031922","url":null,"abstract":"Data mining is a knowledge discovery of the data that extracts and discovers patterns and relationships to predict outcomes. Class imbalance is one of the obstacles that can drive misclassification. The class imbalance affected the result of classification machine learning. The classification technique can divide the data into the given class target. This research focuses on four pre-processing methods: SMOTE, Spread Subsample, Class Balancer, and Resample. These methods can help to clean the data before undergoing the classification techniques. Resample shows the best result for solving the imbalance problem with 41.321 for Mean and Standard Deviation, 64.101. Besides, this research involves six classification techniques: Naïve Bayes, BayesNet, Random Forest, Random Tree, Logistics, and Multilayer Perceptron. Indeed, the combination of Resample and Random Forest has the best result of Precision, 0.941, and ROC Area is 0.983.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122285742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
2022 IEEE Conference on Computing (ICOCO) 2022年IEEE计算大会(ICOCO)
Pub Date : 2022-11-14 DOI: 10.1109/icoco56118.2022.10031974
{"title":"2022 IEEE Conference on Computing (ICOCO)","authors":"","doi":"10.1109/icoco56118.2022.10031974","DOIUrl":"https://doi.org/10.1109/icoco56118.2022.10031974","url":null,"abstract":"","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logistic Regression Model for Measuring Perception on Open and Distance Learning (ODL) during COVID-19 Pandemic based on Impeding Factors among Students 基于阻碍因素的新型冠状病毒大流行期间学生开放远程学习感知的Logistic回归模型
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031675
Al Mamun Mizan, Farah Aliah Nur Mansor, N. A. M. Ghani, A. Kamarudin, Mahayaudin M. Mansor, Siti Afiqah Muhamad Jamil, N. Ibrahim
Authorities have suggested emergency remote instruction to guarantee that students are not left idle during the pandemic due to the sudden closing of educational facilities. Then for the time being, traditional methods (face-to-face) have been replaced by Open and Distance Learning (ODL). Face-to-face learning was preferred by the majority of students over online learning since students were not able transit to online learning and lacked inspiration. Hence, this study focuses on perception towards ODL during COVID-19 among statistics’ students at FSKM UiTM Shah Alam based on some impeding factors such as social issue, lecturer issue, accessibility issue, academic issue, generic skills and learner intentions. The aim of this study is to investigate the perception of statistics’ students on ODL based on impeding factors and to identify the significant impeding factors effect on statistics students’ perception on ODL. There are 160 observations that are used in this study. The methods that are being used in this study are descriptive analysis and logistic regression. Overall, from the result obtained, students’ perception on ODL are approximately to agree for social issue, academic issue and learner intentions variables. Meanwhile, the significance impeding factors in this study are social issue and learner intentions. This study may help higher education institution to improve and make a better strategy to improve the existing teaching method that have been applied by all lecturers.
当局建议进行紧急远程教学,以确保学生在疫情期间不会因教育设施突然关闭而闲置。然后,就目前而言,传统的方法(面对面)已经被开放和远程学习(ODL)所取代。由于学生无法过渡到在线学习并且缺乏灵感,大多数学生更喜欢面对面学习而不是在线学习。因此,本研究基于社会问题、讲师问题、可及性问题、学术问题、通用技能和学习者意向等阻碍因素,重点研究FSKM Shah Alam统计专业学生在COVID-19期间对ODL的看法。本研究的目的是基于阻碍因素调查统计专业学生对ODL的感知,并找出显著的阻碍因素对统计专业学生ODL感知的影响。在这项研究中使用了160个观察结果。在本研究中使用的方法是描述性分析和逻辑回归。总体而言,从获得的结果来看,学生对ODL的感知在社会问题、学术问题和学习者意图变量上大致一致。同时,社会问题和学习者意向是本研究的显著性阻碍因素。本研究可以帮助高等教育机构改进和制定更好的策略来改进所有讲师所采用的现有教学方法。
{"title":"Logistic Regression Model for Measuring Perception on Open and Distance Learning (ODL) during COVID-19 Pandemic based on Impeding Factors among Students","authors":"Al Mamun Mizan, Farah Aliah Nur Mansor, N. A. M. Ghani, A. Kamarudin, Mahayaudin M. Mansor, Siti Afiqah Muhamad Jamil, N. Ibrahim","doi":"10.1109/ICOCO56118.2022.10031675","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031675","url":null,"abstract":"Authorities have suggested emergency remote instruction to guarantee that students are not left idle during the pandemic due to the sudden closing of educational facilities. Then for the time being, traditional methods (face-to-face) have been replaced by Open and Distance Learning (ODL). Face-to-face learning was preferred by the majority of students over online learning since students were not able transit to online learning and lacked inspiration. Hence, this study focuses on perception towards ODL during COVID-19 among statistics’ students at FSKM UiTM Shah Alam based on some impeding factors such as social issue, lecturer issue, accessibility issue, academic issue, generic skills and learner intentions. The aim of this study is to investigate the perception of statistics’ students on ODL based on impeding factors and to identify the significant impeding factors effect on statistics students’ perception on ODL. There are 160 observations that are used in this study. The methods that are being used in this study are descriptive analysis and logistic regression. Overall, from the result obtained, students’ perception on ODL are approximately to agree for social issue, academic issue and learner intentions variables. Meanwhile, the significance impeding factors in this study are social issue and learner intentions. This study may help higher education institution to improve and make a better strategy to improve the existing teaching method that have been applied by all lecturers.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133922133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Lung Nodule CT Images Using GAN Variants and CNN 基于GAN变体和CNN的肺结节CT图像分类
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031756
Muhammad Syabil Azman, Farli Rossi, N. Zulkarnain, S. S. Mokri, Ashrani Aizzuddin Abd. Rahni, Nurul Fatihah Ali
Global Cancer Statistics 2020 states that there are 2.2 million lung cancer cases worldwide with 1.8 million deaths. At present, deep learning based CAD system for lung nodules classification has been extensively explored. However, this approach requires a great size of images which becomes an issue for medical images. Thus, Generative Advesarial Network (GAN) is introduced to ease this limitation by creating synthetic images. In this study, four GAN architectures namely Deep Convolutional (DCGAN), Deep Regret Analytic GAN (DRAGAN), Wasserstein GAN (WGAN) and Wasserstein GAN with Gradient Penalty (WGANGP) are used in generating synthetic medical images which are then used to classify the lung lesions into benign and malignant via ShuffleNet. The classification is assessed based on pecificity, accuracy, sensitivity, and values of AUC-ROC. Experimental results show that DRAGAN achieved the lowest Fréchet Inception Distance (FID) score of 137.48 of the new generated datasets followed by the WGAN-GP (158.86), WGAN (176.86) and DCGAN (172.56). However, due to the lack of diversity in datasets of DRAGAN, instead WGAN-GP ShuffleNet performed the best in the classification task achieving 98.87% of accuracy, 98.36% of specificity, 99.34% of sensitivity and highest AUC among others at 99.96%. Overall, both high quality and well diversed synthetic images are equally important for the lung nodules classification problem.
《2020年全球癌症统计》指出,全球有220万例肺癌病例,其中180万人死亡。目前,基于深度学习的肺结节分类CAD系统已经得到了广泛的探索。然而,这种方法需要大尺寸的图像,这成为医学图像的一个问题。因此,生成对抗网络(GAN)通过创建合成图像来缓解这一限制。本研究采用深度卷积GAN (Deep Convolutional GAN)、深度遗憾分析GAN (Deep Regret Analytic GAN (DRAGAN)、沃瑟斯坦GAN (WGAN)和Wasserstein GAN with Gradient Penalty (WGANGP)四种GAN架构生成合成医学图像,然后通过ShuffleNet将肺病变分类为良性和恶性。分类是根据特异性、准确性、敏感性和AUC-ROC值来评估的。实验结果表明,在新生成的数据集中,DRAGAN的fr起始距离(FID)得分最低,为137.48,其次是WGAN- gp(158.86)、WGAN(176.86)和DCGAN(172.56)。然而,由于DRAGAN数据集缺乏多样性,WGAN-GP ShuffleNet在分类任务中表现最好,准确率为98.87%,特异性为98.36%,灵敏度为99.34%,AUC最高,为99.96%。总之,高质量和多样化的合成图像对肺结节分类问题同样重要。
{"title":"Classification of Lung Nodule CT Images Using GAN Variants and CNN","authors":"Muhammad Syabil Azman, Farli Rossi, N. Zulkarnain, S. S. Mokri, Ashrani Aizzuddin Abd. Rahni, Nurul Fatihah Ali","doi":"10.1109/ICOCO56118.2022.10031756","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031756","url":null,"abstract":"Global Cancer Statistics 2020 states that there are 2.2 million lung cancer cases worldwide with 1.8 million deaths. At present, deep learning based CAD system for lung nodules classification has been extensively explored. However, this approach requires a great size of images which becomes an issue for medical images. Thus, Generative Advesarial Network (GAN) is introduced to ease this limitation by creating synthetic images. In this study, four GAN architectures namely Deep Convolutional (DCGAN), Deep Regret Analytic GAN (DRAGAN), Wasserstein GAN (WGAN) and Wasserstein GAN with Gradient Penalty (WGANGP) are used in generating synthetic medical images which are then used to classify the lung lesions into benign and malignant via ShuffleNet. The classification is assessed based on pecificity, accuracy, sensitivity, and values of AUC-ROC. Experimental results show that DRAGAN achieved the lowest Fréchet Inception Distance (FID) score of 137.48 of the new generated datasets followed by the WGAN-GP (158.86), WGAN (176.86) and DCGAN (172.56). However, due to the lack of diversity in datasets of DRAGAN, instead WGAN-GP ShuffleNet performed the best in the classification task achieving 98.87% of accuracy, 98.36% of specificity, 99.34% of sensitivity and highest AUC among others at 99.96%. Overall, both high quality and well diversed synthetic images are equally important for the lung nodules classification problem.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preliminary Study on the Effect of Traffic Representation on Accuracy Degradation in Machine Learning-based IoT Device Identification 基于机器学习的物联网设备识别中流量表示对准确率下降影响的初步研究
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031725
Nik Aqil, Firdaus Afifi, Faiz Zaki, N. B. Anuar
The Internet of Things (IoT) has gained attention for its rapid growth in the past few years. IoT devices such as temperature and humidity sensors and voice controllers are implemented widely, from household appliances to industrial machines. However, with the rapid growth and benefits IoT offers, we are exposed to various security vulnerabilities, such as data breaches and IoT-specific malware. Researchers are using IoT device identification as a solution for IoT security issues. IoT device identification helps network administrators identify network traffic into its originating devices. However, researchers often overlook an important issue in IoT device identification, which is accuracy degradation over time. Thus, this paper explores the severity of accuracy degradation in IoT device identification on different traffic representation approaches, which are flow, sub-flow, and packet. This paper utilizes a private, and the UNSW IoT Traffic Traces public dataset. Based on the experimental findings, the sub-flow-based approach recorded the best overall performance, with only 8% degradation in the private dataset and 1% degradation in the public dataset. Meanwhile, even though the packet-based approach only degraded 5% on the private dataset, it recorded up to an 11% accuracy decrease in the public dataset.
物联网(IoT)在过去几年中因其快速增长而受到关注。物联网设备,如温度和湿度传感器和语音控制器被广泛应用,从家用电器到工业机器。然而,随着物联网的快速增长和带来的好处,我们面临着各种安全漏洞,例如数据泄露和物联网特定的恶意软件。研究人员正在使用物联网设备识别作为物联网安全问题的解决方案。物联网设备识别帮助网络管理员识别进入其源设备的网络流量。然而,研究人员经常忽视物联网设备识别中的一个重要问题,即随着时间的推移精度会下降。因此,本文探讨了物联网设备识别在不同流量表示方法(流、子流和分组)上精度下降的严重程度。本文利用了一个私有的,和UNSW物联网流量跟踪公共数据集。根据实验结果,基于子流的方法记录了最佳的整体性能,在私有数据集中仅下降8%,在公共数据集中下降1%。同时,尽管基于数据包的方法在私有数据集上只降低了5%,但在公共数据集上却记录了高达11%的准确性下降。
{"title":"Preliminary Study on the Effect of Traffic Representation on Accuracy Degradation in Machine Learning-based IoT Device Identification","authors":"Nik Aqil, Firdaus Afifi, Faiz Zaki, N. B. Anuar","doi":"10.1109/ICOCO56118.2022.10031725","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031725","url":null,"abstract":"The Internet of Things (IoT) has gained attention for its rapid growth in the past few years. IoT devices such as temperature and humidity sensors and voice controllers are implemented widely, from household appliances to industrial machines. However, with the rapid growth and benefits IoT offers, we are exposed to various security vulnerabilities, such as data breaches and IoT-specific malware. Researchers are using IoT device identification as a solution for IoT security issues. IoT device identification helps network administrators identify network traffic into its originating devices. However, researchers often overlook an important issue in IoT device identification, which is accuracy degradation over time. Thus, this paper explores the severity of accuracy degradation in IoT device identification on different traffic representation approaches, which are flow, sub-flow, and packet. This paper utilizes a private, and the UNSW IoT Traffic Traces public dataset. Based on the experimental findings, the sub-flow-based approach recorded the best overall performance, with only 8% degradation in the private dataset and 1% degradation in the public dataset. Meanwhile, even though the packet-based approach only degraded 5% on the private dataset, it recorded up to an 11% accuracy decrease in the public dataset.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"925 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113981878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Conference on Computing (ICOCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1