首页 > 最新文献

2022 IEEE International Conference on Computing (ICOCO)最新文献

英文 中文
An End-To-End Cyber Security Maturity Model For Technology Startups 面向科技创业公司的端到端网络安全成熟度模型
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031900
A. Selamat, Mohamed Noordin Yusuff Marican, S. H. Othman, S. Razak
Cybersecurity is increasingly becoming an important discussion topic in the boardroom of companies, regardless of the size or industry. Hackers nowadays are becoming increasingly smart. Instead of attacking big multi-national companies, international banks and government organisations which have built strong protection against cyber threats, the perpetrators now placed their focus on smaller and medium size businesses like technology start-ups through a variety of attacks from phishing, ransomware to the exploitation of vulnerabilities in the web or mobile applications. Therefore, it is imperative that technology start-ups have the capability in assessing their cyber security maturity to combat against cyber threats. However, for technology start-ups, it is especially imperative as cyber-attacks or data breaches could undeniably result in the loss of customers’ confidence, regulatory implications and revenue loss which could eventually result in the start-up untimely closure. Although there are available security frameworks commonly used in the industry by cyber security practitioners, these frameworks are not suitable for technology start-ups as they tend to be broad and generic, taking a long time to conduct the assessment requiring adequate manpower or even the need for a budget to hire external consultants to help in conducting the assessment. This study seeks to analyse the current cyber security frameworks and introduce an end-to-end Cyber Security Maturity Model, which can be used specifically for technology start-ups. The proposed model not only provides an end-to-end maturity assessment of the start-up’s cyber security posture but also coupled with an existing quantification model to justify the investments allocated in implementing cyber security measures for the start-up. Right-sizing the cyber security measures for the start-up in the different stages of the start-up lifecycle could allow reasonable controls to be implemented at the appropriate phase.
网络安全正日益成为企业董事会讨论的重要话题,无论规模大小或行业如何。如今的黑客正变得越来越聪明。攻击者不再攻击大型跨国公司、国际银行和政府机构,而是通过网络钓鱼、勒索软件、利用网络或移动应用程序漏洞等各种攻击,将重点放在科技初创企业等中小型企业上。因此,科技初创企业必须具备评估其网络安全成熟度的能力,以应对网络威胁。然而,对于科技初创企业来说,这一点尤为重要,因为网络攻击或数据泄露无疑会导致客户信心的丧失、监管影响和收入损失,最终可能导致初创企业过早关闭。虽然业界有网络安全从从者常用的保安架构,但这些架构并不适合科技初创公司,因为它们往往过于宽泛和笼统,需要很长时间进行评估,需要足够的人力,甚至需要预算聘请外部顾问协助进行评估。本研究旨在分析当前的网络安全框架,并引入端到端的网络安全成熟度模型,该模型可专门用于技术初创企业。所提出的模型不仅提供了对初创企业网络安全状况的端到端成熟度评估,而且还与现有的量化模型相结合,以证明为初创企业实施网络安全措施所分配的投资是合理的。在初创企业生命周期的不同阶段,适当调整网络安全措施的规模,可以在适当的阶段实施合理的控制。
{"title":"An End-To-End Cyber Security Maturity Model For Technology Startups","authors":"A. Selamat, Mohamed Noordin Yusuff Marican, S. H. Othman, S. Razak","doi":"10.1109/ICOCO56118.2022.10031900","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031900","url":null,"abstract":"Cybersecurity is increasingly becoming an important discussion topic in the boardroom of companies, regardless of the size or industry. Hackers nowadays are becoming increasingly smart. Instead of attacking big multi-national companies, international banks and government organisations which have built strong protection against cyber threats, the perpetrators now placed their focus on smaller and medium size businesses like technology start-ups through a variety of attacks from phishing, ransomware to the exploitation of vulnerabilities in the web or mobile applications. Therefore, it is imperative that technology start-ups have the capability in assessing their cyber security maturity to combat against cyber threats. However, for technology start-ups, it is especially imperative as cyber-attacks or data breaches could undeniably result in the loss of customers’ confidence, regulatory implications and revenue loss which could eventually result in the start-up untimely closure. Although there are available security frameworks commonly used in the industry by cyber security practitioners, these frameworks are not suitable for technology start-ups as they tend to be broad and generic, taking a long time to conduct the assessment requiring adequate manpower or even the need for a budget to hire external consultants to help in conducting the assessment. This study seeks to analyse the current cyber security frameworks and introduce an end-to-end Cyber Security Maturity Model, which can be used specifically for technology start-ups. The proposed model not only provides an end-to-end maturity assessment of the start-up’s cyber security posture but also coupled with an existing quantification model to justify the investments allocated in implementing cyber security measures for the start-up. Right-sizing the cyber security measures for the start-up in the different stages of the start-up lifecycle could allow reasonable controls to be implemented at the appropriate phase.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
fProSentiment Analysis on Mobile Phone Brands Reviews using Convolutional Neural Network (CNN) 基于卷积神经网络(CNN)的手机品牌评论情感分析
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031660
Noor Izati Abdul Hamid, N. Kamal, H. M. Hanum, Noor Latiffah Adam, Z. Ibrahim
Due to the rapid growth of online e-commerce, customers can now voice and express their reviews and thoughts on online products. Therefore, companies who market their product on the e-commerce website will receive thousands of reviews and feedback from their end-users directly on this platform. As the amount of textual data grows tremendously, developing sentiment analysis that automatically analyses text data becomes increasingly vital. It is because reading every review manually can be a tedious task and time-consuming. Analyzing the sentiment for all reviews can provide the companies with an overview of how positive or negative the customers are about their products. The convolutional neural network (CNN) has recently been used for text classification tasks and has achieved impressive results. Hence, this study proposes a CNN method for sentiment analysis to classify the reviews on mobile phone brands. The customer reviews dataset is obtained from the Amazon website. This study combined the Word2Vec-CNN model to predict the sentiment of mobile phone reviews effectively. Pre-trained Word2Vec model is utilized to generate word vectors in word embedding. CNN layers are used to extract better features for sentence categorization to identify the sentiment polarity of the reviews, whether positive or negative. The obtained results give us 88% accuracy and the developed application can also function well in analyzing the sentiment of customers’ reviews.
由于网上电子商务的快速发展,顾客现在可以发声并表达他们对网上产品的评论和想法。因此,在电子商务网站上销售产品的公司将直接在这个平台上收到来自最终用户的数千条评论和反馈。随着文本数据量的急剧增长,开发能够自动分析文本数据的情感分析变得越来越重要。这是因为手动阅读每一篇评论是一项乏味且耗时的任务。分析所有评论的情绪可以为公司提供客户对其产品的积极或消极程度的概述。卷积神经网络(CNN)最近被用于文本分类任务,并取得了令人印象深刻的结果。因此,本研究提出了一种CNN情感分析方法,对手机品牌的评论进行分类。客户评论数据集从亚马逊网站获取。本研究结合Word2Vec-CNN模型对手机评论的情感进行了有效的预测。在词嵌入中,利用预训练的Word2Vec模型生成词向量。CNN层用于提取句子分类的更好特征,以识别评论的情感极性,是积极的还是消极的。得到的结果准确率达到88%,开发的应用程序也可以很好地分析顾客评论的情绪。
{"title":"fProSentiment Analysis on Mobile Phone Brands Reviews using Convolutional Neural Network (CNN)","authors":"Noor Izati Abdul Hamid, N. Kamal, H. M. Hanum, Noor Latiffah Adam, Z. Ibrahim","doi":"10.1109/ICOCO56118.2022.10031660","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031660","url":null,"abstract":"Due to the rapid growth of online e-commerce, customers can now voice and express their reviews and thoughts on online products. Therefore, companies who market their product on the e-commerce website will receive thousands of reviews and feedback from their end-users directly on this platform. As the amount of textual data grows tremendously, developing sentiment analysis that automatically analyses text data becomes increasingly vital. It is because reading every review manually can be a tedious task and time-consuming. Analyzing the sentiment for all reviews can provide the companies with an overview of how positive or negative the customers are about their products. The convolutional neural network (CNN) has recently been used for text classification tasks and has achieved impressive results. Hence, this study proposes a CNN method for sentiment analysis to classify the reviews on mobile phone brands. The customer reviews dataset is obtained from the Amazon website. This study combined the Word2Vec-CNN model to predict the sentiment of mobile phone reviews effectively. Pre-trained Word2Vec model is utilized to generate word vectors in word embedding. CNN layers are used to extract better features for sentence categorization to identify the sentiment polarity of the reviews, whether positive or negative. The obtained results give us 88% accuracy and the developed application can also function well in analyzing the sentiment of customers’ reviews.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121627746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Disruptive Technologies on Customer Experience Management In ASEAN: A Review 颠覆性技术对东盟客户体验管理的影响:综述
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031882
Vyankatesh Adke, Priti Bakhshi, Muniza Askari
The financial services sector in the Association of South East Asian Nations (ASEAN) region has seen significant growth, driven by digitalization and the rise of fintech firms. Financial services accounted for about 8% of the overall Gross Domestic Product (GDP) at around ${$}$ 3 Trillion in 2021 [1]. While the GDP contracted slightly due to the COVID-19 pandemic, the overall outlook over the next five years remains positive.To further boost this growth, and foster innovation, regulators across ASEAN are establishing foundations for open finance, as is clear from policies in Singapore [2], the Philippines [3], and Indonesia [4].The main objectives of the open finance framework are to offer integrated financial services by making customer experiences that are fully digital, frictionless, empathetic, and anticipatory to customer needs.Customers today are more digitally empowered, expect personalized service, and often maintain relationships with multiple retail banks. As such, Customer Experience (CX) management is a top priority for retail banks to ensure overall brand recall, customer loyalty, and growth.This however also poses a new challenge to incumbent banks, as they need to embark on complex digital transformation journeys to stay relevant and competitive with due consideration for costs and accrued benefits.In this context, this study explores the impact of cloud, Artificial Intelligence (AI), and digital channels, collectively referred to as disruptive technologies, on customer experience management.It does so by critically examining existing literature on the evolution of digital technologies, their applications for customer engagement and the consequent impact on customer behaviours, and customer experience measures such as the Customer Satisfaction Score (CSAT) and Net Promoter Score (NPS). Based on the review, the study identifies opportunities for future research in the form of research questions, which include factors like experience quality, behaviour traits, and customer segmentation attributes that impact customer experience.The study contributes by providing insights to retail banks on key factors to consider while embarking on digital transformation projects to improve customer experience. While the study focuses on retail banking, its contributions could be beneficial to adjacent financial services like lending and insurance in ASEAN.
在数字化和金融科技公司崛起的推动下,东南亚国家联盟(ASEAN)地区的金融服务业出现了显著增长。到2021年,金融服务业约占整体国内生产总值(GDP)的8%,约为3万亿美元。虽然国内生产总值因COVID-19大流行而略有收缩,但未来五年的总体前景仍然乐观。为了进一步推动这一增长并促进创新,东盟各国的监管机构正在为开放金融奠定基础,新加坡[2]、菲律宾[3]和印度尼西亚[2]的政策清楚地表明了这一点。开放式金融框架的主要目标是通过提供完全数字化、无摩擦、移情和预期客户需求的客户体验来提供综合金融服务。今天的客户更加数字化,期望个性化服务,并且经常与多家零售银行保持关系。因此,客户体验(CX)管理是零售银行确保整体品牌召回、客户忠诚度和增长的重中之重。然而,这也给现有银行带来了新的挑战,因为它们需要开始复杂的数字化转型之旅,以保持相关性和竞争力,同时适当考虑成本和应计收益。在此背景下,本研究探讨了云计算、人工智能(AI)和数字渠道(统称为颠覆性技术)对客户体验管理的影响。它通过批判性地研究现有的关于数字技术发展的文献,它们对客户参与的应用及其对客户行为的影响,以及客户满意度评分(CSAT)和净推荐值(NPS)等客户体验指标来实现这一目标。在回顾的基础上,该研究以研究问题的形式确定了未来研究的机会,其中包括影响客户体验的体验质量、行为特征和客户细分属性等因素。该研究为零售银行提供了在开展数字化转型项目以改善客户体验时需要考虑的关键因素的见解。虽然这项研究的重点是零售银行业,但它的贡献可能对东盟的贷款和保险等邻近金融服务有益。
{"title":"Impact of Disruptive Technologies on Customer Experience Management In ASEAN: A Review","authors":"Vyankatesh Adke, Priti Bakhshi, Muniza Askari","doi":"10.1109/ICOCO56118.2022.10031882","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031882","url":null,"abstract":"The financial services sector in the Association of South East Asian Nations (ASEAN) region has seen significant growth, driven by digitalization and the rise of fintech firms. Financial services accounted for about 8% of the overall Gross Domestic Product (GDP) at around ${$}$ 3 Trillion in 2021 [1]. While the GDP contracted slightly due to the COVID-19 pandemic, the overall outlook over the next five years remains positive.To further boost this growth, and foster innovation, regulators across ASEAN are establishing foundations for open finance, as is clear from policies in Singapore [2], the Philippines [3], and Indonesia [4].The main objectives of the open finance framework are to offer integrated financial services by making customer experiences that are fully digital, frictionless, empathetic, and anticipatory to customer needs.Customers today are more digitally empowered, expect personalized service, and often maintain relationships with multiple retail banks. As such, Customer Experience (CX) management is a top priority for retail banks to ensure overall brand recall, customer loyalty, and growth.This however also poses a new challenge to incumbent banks, as they need to embark on complex digital transformation journeys to stay relevant and competitive with due consideration for costs and accrued benefits.In this context, this study explores the impact of cloud, Artificial Intelligence (AI), and digital channels, collectively referred to as disruptive technologies, on customer experience management.It does so by critically examining existing literature on the evolution of digital technologies, their applications for customer engagement and the consequent impact on customer behaviours, and customer experience measures such as the Customer Satisfaction Score (CSAT) and Net Promoter Score (NPS). Based on the review, the study identifies opportunities for future research in the form of research questions, which include factors like experience quality, behaviour traits, and customer segmentation attributes that impact customer experience.The study contributes by providing insights to retail banks on key factors to consider while embarking on digital transformation projects to improve customer experience. While the study focuses on retail banking, its contributions could be beneficial to adjacent financial services like lending and insurance in ASEAN.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"496 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126563056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Public Sentiment Towards a Public Rally Using Text and Social Media Analytic 利用文本和社交媒体分析了解公众对公共集会的情绪
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031692
Sian Lun Lau, Marvin J. H. Lee, Min Xuan Teoh
The use of social media for analysing behaviours and trends of the public is a growing research area. In 2021, the #LAWAN social movement emerged in Malaysia as a result of discontentment of the people towards the government. This study intends to study and discover the public perception and sentiment towards the #LAWAN rally. The investigation also questions whether is the civil society supportive of such social movement and rally, especially when rally, protests and demonstration are traditionally and often seen as a negative and non-constructive approach in the country. Tweets with the hashtag #LAWAN over a day on and before the rally day on 31st July 2021 have been collected and analysed. Sentiment analysis helped to identify the public sentiments towards the rally, and topic modelling helped to discover common topics from the 5000+ tweets scrapped from the social media.
利用社交媒体分析公众的行为和趋势是一个不断发展的研究领域。2021年,由于人民对政府的不满,马来西亚出现了#LAWAN社会运动。本研究旨在研究和发现公众对#LAWAN集会的认知和情绪。调查还质疑民间社会是否支持这种社会运动和集会,特别是因为集会、抗议和示威在该国传统上常常被视为消极和非建设性的做法。在2021年7月31日集会日当天和之前的一天内,已经收集和分析了带有#LAWAN标签的推文。情绪分析有助于确定公众对这次集会的情绪,话题建模有助于从社交媒体上废弃的5000多条推文中发现共同话题。
{"title":"Understanding Public Sentiment Towards a Public Rally Using Text and Social Media Analytic","authors":"Sian Lun Lau, Marvin J. H. Lee, Min Xuan Teoh","doi":"10.1109/ICOCO56118.2022.10031692","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031692","url":null,"abstract":"The use of social media for analysing behaviours and trends of the public is a growing research area. In 2021, the #LAWAN social movement emerged in Malaysia as a result of discontentment of the people towards the government. This study intends to study and discover the public perception and sentiment towards the #LAWAN rally. The investigation also questions whether is the civil society supportive of such social movement and rally, especially when rally, protests and demonstration are traditionally and often seen as a negative and non-constructive approach in the country. Tweets with the hashtag #LAWAN over a day on and before the rally day on 31st July 2021 have been collected and analysed. Sentiment analysis helped to identify the public sentiments towards the rally, and topic modelling helped to discover common topics from the 5000+ tweets scrapped from the social media.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127706858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Bibliometric Analysis of Global Scientific Literature on Robust Neural Network 基于鲁棒神经网络的全球科学文献计量分析
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031676
Tengku Nurul Aimi Balqis Tengku, Malim Busu, Saadi Ahmad Kamarudin, N. Ahad, Norazlina Mamat
The study aims to present a bibliographic review of publications from the Scopus database related to the robust neural network topic. As of 13th September 2022, this study managed to gather 16 articles from 2019-2023 based on the keywords of robust neural network used for the searching process. The three tools have been used to analyze the gathered Scopus database, which are Microsoft Excel, VOSviewer software and Harzing’s Publish and Perish software. This study reports the findings in terms of the current trend and the impact of publications of robust neural network studies. According to bibliometrics analysis, the number of publications has been increasing over time. This study focuses only on the Scopus database. For future research, other databases like PubMed, Lens, Dimensions, and Web of Science could be considered so the findings will be more meaningful and impactful. This study is the first article to do a bibliographic review related to the neural network.
该研究旨在对Scopus数据库中与鲁棒神经网络主题相关的出版物进行书目综述。截至2022年9月13日,本研究基于鲁棒神经网络搜索过程中的关键词,成功收集了2019-2023年的16篇文章。这三种工具被用来分析收集到的Scopus数据库,它们是Microsoft Excel, VOSviewer软件和Harzing的Publish and Perish软件。本研究报告了鲁棒神经网络研究的当前趋势和出版物的影响。根据文献计量学分析,出版物的数量一直在增加。本研究仅关注Scopus数据库。对于未来的研究,可以考虑其他数据库,如PubMed, Lens, Dimensions和Web of Science,这样研究结果将更有意义和影响力。本研究首次对神经网络相关文献进行综述。
{"title":"Bibliometric Analysis of Global Scientific Literature on Robust Neural Network","authors":"Tengku Nurul Aimi Balqis Tengku, Malim Busu, Saadi Ahmad Kamarudin, N. Ahad, Norazlina Mamat","doi":"10.1109/ICOCO56118.2022.10031676","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031676","url":null,"abstract":"The study aims to present a bibliographic review of publications from the Scopus database related to the robust neural network topic. As of 13th September 2022, this study managed to gather 16 articles from 2019-2023 based on the keywords of robust neural network used for the searching process. The three tools have been used to analyze the gathered Scopus database, which are Microsoft Excel, VOSviewer software and Harzing’s Publish and Perish software. This study reports the findings in terms of the current trend and the impact of publications of robust neural network studies. According to bibliometrics analysis, the number of publications has been increasing over time. This study focuses only on the Scopus database. For future research, other databases like PubMed, Lens, Dimensions, and Web of Science could be considered so the findings will be more meaningful and impactful. This study is the first article to do a bibliographic review related to the neural network.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129712170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weight Perception Simulation in Virtual Reality with Passive Force using Force Sensing Resistors 基于力感电阻的被动力虚拟现实体重感知仿真
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031797
Woan Ning Lim, Yunli Lee, K. Yap, Ching-Chiuan Yen
There is a rise of interest in promoting Virtual Reality (VR) in many industries since the VR headsets released as consumer products and getting affordable. The advantage of VR lies in its capability in creating a sense of presence and immersion, however it is still a major challenge to enable humans to feel the weight of the object in VR. There have been remarkable advancements in the development of haptic interfaces throughout the years. However, a number of challenges limit the progression to enable humans to sense the weight of virtual objects. Pseudo-haptic approach is a less costly alternative with better mobility compared to haptic interfaces. It is a software approach seeks to use the overall dominance of the visual system to create haptic illusions to render the perception of weight. In this paper, a pseudo-haptic model using passive force to simulate weight perception is proposed. The hand pressures are captured during the interaction to simulate the objects’ behavior to create the pseudo-weight illusion. The design and implementation of the force detection and visual feedback modules are discussed, and the preliminary evaluations of the force sensing resistors are presented.
自从VR头显作为消费产品发布并变得价格合理以来,许多行业对推广虚拟现实(VR)的兴趣日益浓厚。VR的优势在于它能够创造一种存在感和沉浸感,但是在VR中,让人类感受到物体的重量仍然是一个主要的挑战。多年来,触觉界面的发展取得了显著的进步。然而,许多挑战限制了人类感知虚拟物体重量的进展。与触觉接口相比,伪触觉接口成本更低,移动性更好。这是一种软件方法,试图利用视觉系统的整体优势来创造触觉错觉,以呈现对重量的感知。本文提出了一种利用被动力模拟重量感知的伪触觉模型。在交互过程中捕捉手的压力来模拟物体的行为,从而产生伪重量错觉。讨论了力检测和视觉反馈模块的设计与实现,并对力传感电阻进行了初步评价。
{"title":"Weight Perception Simulation in Virtual Reality with Passive Force using Force Sensing Resistors","authors":"Woan Ning Lim, Yunli Lee, K. Yap, Ching-Chiuan Yen","doi":"10.1109/ICOCO56118.2022.10031797","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031797","url":null,"abstract":"There is a rise of interest in promoting Virtual Reality (VR) in many industries since the VR headsets released as consumer products and getting affordable. The advantage of VR lies in its capability in creating a sense of presence and immersion, however it is still a major challenge to enable humans to feel the weight of the object in VR. There have been remarkable advancements in the development of haptic interfaces throughout the years. However, a number of challenges limit the progression to enable humans to sense the weight of virtual objects. Pseudo-haptic approach is a less costly alternative with better mobility compared to haptic interfaces. It is a software approach seeks to use the overall dominance of the visual system to create haptic illusions to render the perception of weight. In this paper, a pseudo-haptic model using passive force to simulate weight perception is proposed. The hand pressures are captured during the interaction to simulate the objects’ behavior to create the pseudo-weight illusion. The design and implementation of the force detection and visual feedback modules are discussed, and the preliminary evaluations of the force sensing resistors are presented.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116400489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Student’s Perspective On The Evaluation Of Teaching And Learning Using Student Feedback Online (SuFO) 基于学生在线反馈的教与学评价的学生视角
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031637
Zan Azma Nasruddin, Norafifa Mohd Ariffin
Nowadays, students are the main stakeholders in any educational setting. They actively participate in the transmission of knowledge. The university’s future planning heavily relies on their feedback on the current teaching and learning techniques. The Learning Management System (LMS), an i-Learn system, has been used by Universiti Teknologi MARA (UiTM) to implement blended learning in their teaching and learning methods. Student Feedback Online (SuFo), which UiTM has made available to its students, allows them to evaluate the teaching and learning process. However, there are issues with the validity and reliability of the SuFo question in evaluating the course, the lecturer’s performance, the classroom environment, and scepticism in the students’ responses brought up by the previous study. Therefore, this study aims to understand how students perceive SuFo questions and investigate how students feel about SuFo questions and any potential biases in student evaluations. This study analyses data using quantitative methods and a survey along with SPSS. One hundred students from various faculties have fully responded to the survey. The results demonstrate that there are no gender-based biases in student ratings and that the students strongly agree if the SuFo questions are modified and changed. There are also some suggestions for future planning such as changes of SuFo questions and reduced the number of SuFo questions.
如今,学生是任何教育环境中的主要利益相关者。他们积极参与知识的传播。大学的未来规划在很大程度上依赖于他们对当前教学技术的反馈。学习管理系统(LMS)是一种i-Learn系统,已被Universiti teknologii MARA (UiTM)用于在其教学方法中实施混合学习。麻省理工大学为学生提供了学生在线反馈(SuFo),使他们能够评估教学过程。然而,SuFo问题在评估课程、讲师的表现、课堂环境和先前研究提出的学生回答中的怀疑态度方面存在效度和信度问题。因此,本研究旨在了解学生对SuFo问题的看法,并调查学生对SuFo问题的感受以及学生评价中可能存在的偏见。本研究使用定量方法和调查以及SPSS分析数据。来自不同院系的100名学生对这项调查进行了全面回应。结果表明,学生评分中不存在基于性别的偏见,并且学生对SuFo问题的修改和更改表示强烈同意。也有一些关于未来规划的建议,比如改变SuFo题目,减少SuFo题目的数量。
{"title":"A Student’s Perspective On The Evaluation Of Teaching And Learning Using Student Feedback Online (SuFO)","authors":"Zan Azma Nasruddin, Norafifa Mohd Ariffin","doi":"10.1109/ICOCO56118.2022.10031637","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031637","url":null,"abstract":"Nowadays, students are the main stakeholders in any educational setting. They actively participate in the transmission of knowledge. The university’s future planning heavily relies on their feedback on the current teaching and learning techniques. The Learning Management System (LMS), an i-Learn system, has been used by Universiti Teknologi MARA (UiTM) to implement blended learning in their teaching and learning methods. Student Feedback Online (SuFo), which UiTM has made available to its students, allows them to evaluate the teaching and learning process. However, there are issues with the validity and reliability of the SuFo question in evaluating the course, the lecturer’s performance, the classroom environment, and scepticism in the students’ responses brought up by the previous study. Therefore, this study aims to understand how students perceive SuFo questions and investigate how students feel about SuFo questions and any potential biases in student evaluations. This study analyses data using quantitative methods and a survey along with SPSS. One hundred students from various faculties have fully responded to the survey. The results demonstrate that there are no gender-based biases in student ratings and that the students strongly agree if the SuFo questions are modified and changed. There are also some suggestions for future planning such as changes of SuFo questions and reduced the number of SuFo questions.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Homes in The Age of IoT 物联网时代的智能家居
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031788
M. Ati, Arooba Khalid
With lifestyle changes, digital transformations, and increasing use of the internet, technology has become a part of our daily lives. It has become an essential factor used in all fields such as industry, commerce, education, and entertainment. Technology has also touched areas directly related to human life, such as health, medicine, and food. We are constantly engaging with technology: through smartphones and applications or even in-home devices and systems. We can control and give orders to various electrical smart devices from inside or outside the home; they all work in an interconnected way. For example, we can control the temperature of the house and water during the shower, raise the curtains, or turn on and off modern media and communication devices. This technology contributes to facilitating the user’s daily life and saving time and effort. The smart home contains remote control devices to operate and monitor electrical and electronic devices such as interior lighting, outdoor garden lighting, electric blinds, air conditioning, and TV, in addition to controlling audio systems, cameras, and electric doors using smartphones or screens on the wall. Also, this house contains remote control devices to protect against theft and fire. This study focuses on exploring the idea of smart homes and the related security techniques whilst shedding light on some work related to privacy and security in smart homes.
随着生活方式的改变、数字化转型和互联网使用的增加,科技已经成为我们日常生活的一部分。它已成为工业、商业、教育和娱乐等各个领域使用的必不可少的因素。科技还触及了与人类生活直接相关的领域,如健康、医药和食品。我们不断地与技术接触:通过智能手机和应用程序,甚至是家庭设备和系统。我们可以从室内或室外控制和命令各种电气智能设备;它们都以一种相互联系的方式工作。例如,我们可以在淋浴时控制房子的温度和水的温度,拉开窗帘,或者打开和关闭现代媒体和通讯设备。这项技术有助于方便用户的日常生活,节省时间和精力。智能家居包含远程控制设备,用于操作和监控室内照明,室外花园照明,电动百叶窗,空调,电视等电气和电子设备,除了使用智能手机或墙壁上的屏幕控制音频系统,摄像头和电动门之外。此外,这所房子有远程控制装置,以防止盗窃和火灾。本研究的重点是探索智能家居的概念和相关的安全技术,同时揭示一些与智能家居中的隐私和安全相关的工作。
{"title":"Smart Homes in The Age of IoT","authors":"M. Ati, Arooba Khalid","doi":"10.1109/ICOCO56118.2022.10031788","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031788","url":null,"abstract":"With lifestyle changes, digital transformations, and increasing use of the internet, technology has become a part of our daily lives. It has become an essential factor used in all fields such as industry, commerce, education, and entertainment. Technology has also touched areas directly related to human life, such as health, medicine, and food. We are constantly engaging with technology: through smartphones and applications or even in-home devices and systems. We can control and give orders to various electrical smart devices from inside or outside the home; they all work in an interconnected way. For example, we can control the temperature of the house and water during the shower, raise the curtains, or turn on and off modern media and communication devices. This technology contributes to facilitating the user’s daily life and saving time and effort. The smart home contains remote control devices to operate and monitor electrical and electronic devices such as interior lighting, outdoor garden lighting, electric blinds, air conditioning, and TV, in addition to controlling audio systems, cameras, and electric doors using smartphones or screens on the wall. Also, this house contains remote control devices to protect against theft and fire. This study focuses on exploring the idea of smart homes and the related security techniques whilst shedding light on some work related to privacy and security in smart homes.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130405189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ATT&CK Behavior Forecasting based on Collaborative Filtering and Graph Databases 基于协同过滤和图数据库的at&ck行为预测
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10032036
Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga
Cyber attacks are causing tremendous damage around the world. To protect against attacks, many organizations have established or outsourced Security Operation Centers (SOCs) to check a large number of logs daily. Since there is no perfect countermeasure against cyber attacks, it is necessary to detect signs of intrusion quickly to mitigate damage caused by them. However, it is challenging to analyze a lot of logs obtained from PCs and servers inside an organization. Therefore, there is a need for a method of efficiently analyzing logs. In this paper, we propose a recommendation system using the ATT&CK technique, which predicts and visualizes attackers’ behaviors using collaborative filtering so that security analysts can analyze logs efficiently.
网络攻击在世界范围内造成了巨大的破坏。为了防止攻击,许多组织已经建立或外包了安全操作中心(soc),每天检查大量的日志。由于没有完美的应对网络攻击的对策,因此有必要迅速发现入侵迹象,以减轻其造成的损害。然而,分析从组织内的pc和服务器获得的大量日志是一项挑战。因此,需要一种有效分析日志的方法。本文提出了一种基于ATT&CK技术的推荐系统,该系统通过协同过滤对攻击者的行为进行预测和可视化,使安全分析人员能够有效地分析日志。
{"title":"ATT&CK Behavior Forecasting based on Collaborative Filtering and Graph Databases","authors":"Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga","doi":"10.1109/ICOCO56118.2022.10032036","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10032036","url":null,"abstract":"Cyber attacks are causing tremendous damage around the world. To protect against attacks, many organizations have established or outsourced Security Operation Centers (SOCs) to check a large number of logs daily. Since there is no perfect countermeasure against cyber attacks, it is necessary to detect signs of intrusion quickly to mitigate damage caused by them. However, it is challenging to analyze a lot of logs obtained from PCs and servers inside an organization. Therefore, there is a need for a method of efficiently analyzing logs. In this paper, we propose a recommendation system using the ATT&CK technique, which predicts and visualizes attackers’ behaviors using collaborative filtering so that security analysts can analyze logs efficiently.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Predictive Ability of the Bipartite Dengue Contact Network Model 登革热二部接触网络模型的预测能力评价
Pub Date : 2022-11-14 DOI: 10.1109/ICOCO56118.2022.10031962
J. Labadin, B. H. Hong, W. Tiong, B. Gill, D. Perera, A. Rigit, Sarbhan Singh, Tan Cia Vei, S. M. Ghazali, J. Jelip, Norhayati Mokhtar, Wan Ming Keong
This paper presents the predictive power analysis of the bipartite dengue contact (BDC) network model for identifying the source of dengue infection, defined as dengue hotspot. This BDC network model was earlier formulated, verified and validated using data collected in Sarawak, Malaysia. Then, a web-based BDC network system was implemented and subsequently tested by 7 other areas in Malaysia. The data collected using the system was then used to further evaluate the predictive ability of the BDC network model. The validity period of the dengue hotspots identified by the BDC network model was measured based on the accuracy of the predictive power analysis and Spearman’s Rank Correlation Coefficient (SRCC). Based on the results, using prior one-week data was sufficient to predict the dengue hotspot for the following week and subsequent two weeks. This shows that the hotspots are valid for two weeks. The accuracy for the outbreak areas is above 60%. Most of the model reported an SRCC above 0.70 which indicated a strong positive relationship between the hotspots in the targeted model and the validated model. Due to the accuracy and SRCC values obtained, it is suggested that the BDC network model can proceed further with retrospective data for other dengue outbreak areas in Malaysia and a prospective study for the areas that participated in this study.
本文对登革热传染源(登革热热点)的二部接触网络模型进行预测能力分析。这个BDC网络模型早先是根据在马来西亚沙捞越收集的数据制定、验证和验证的。然后,一个基于web的BDC网络系统被实施,随后在马来西亚的其他7个地区进行了测试。然后利用该系统收集的数据进一步评估BDC网络模型的预测能力。基于预测能力分析和Spearman等级相关系数(SRCC)的准确性,对BDC网络模型识别的登革热热点的有效期进行测量。结果表明,利用前一周的数据足以预测下一周和后两周的登革热热点。这表明热点的有效期为两周。对爆发区域的准确度在60%以上。大多数模型报告的SRCC大于0.70,这表明目标模型中的热点与验证模型之间存在很强的正相关关系。由于获得的准确性和SRCC值,建议BDC网络模型可以进一步对马来西亚其他登革热暴发地区的回顾性数据进行研究,并对参与本研究的地区进行前瞻性研究。
{"title":"Evaluating the Predictive Ability of the Bipartite Dengue Contact Network Model","authors":"J. Labadin, B. H. Hong, W. Tiong, B. Gill, D. Perera, A. Rigit, Sarbhan Singh, Tan Cia Vei, S. M. Ghazali, J. Jelip, Norhayati Mokhtar, Wan Ming Keong","doi":"10.1109/ICOCO56118.2022.10031962","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031962","url":null,"abstract":"This paper presents the predictive power analysis of the bipartite dengue contact (BDC) network model for identifying the source of dengue infection, defined as dengue hotspot. This BDC network model was earlier formulated, verified and validated using data collected in Sarawak, Malaysia. Then, a web-based BDC network system was implemented and subsequently tested by 7 other areas in Malaysia. The data collected using the system was then used to further evaluate the predictive ability of the BDC network model. The validity period of the dengue hotspots identified by the BDC network model was measured based on the accuracy of the predictive power analysis and Spearman’s Rank Correlation Coefficient (SRCC). Based on the results, using prior one-week data was sufficient to predict the dengue hotspot for the following week and subsequent two weeks. This shows that the hotspots are valid for two weeks. The accuracy for the outbreak areas is above 60%. Most of the model reported an SRCC above 0.70 which indicated a strong positive relationship between the hotspots in the targeted model and the validated model. Due to the accuracy and SRCC values obtained, it is suggested that the BDC network model can proceed further with retrospective data for other dengue outbreak areas in Malaysia and a prospective study for the areas that participated in this study.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Conference on Computing (ICOCO)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1