Abstract. Finding the optimal solution out of all reasonable solutions is the goal of an optimization problem. Numerous metaheuristic algorithms have been created in the literature during the past 30 years. It is essential to assess each algorithm's performance using broad case studies in order to assist engineers in selecting the optimal metaheuristic algorithm for the given problem. In this research, we give a comparative analysis of four metaheuristic algorithms used to solve the test redundancy reduction problem: the teaching-learning-based optimization (TLBO), the jaya algorithm (JA), the sine-cosine algorithm (SCA), and the sparrow-search algorithm (SSA). To achieve statistical significance, the evaluation of these algorithms' performance is carried out by running every algorithm thirty times. Finding a minimal subset of the test suite that satisfies the specified test criteria is the aim of test redundancy reduction. It was discovered that, in terms of average reduction rate and runtime effectiveness, the SSA is the more efficient metaheuristic algorithm for the test redundancy reduction problem among all the competing metaheuristic algorithms.
{"title":"A Comparison of Four Metaheuristic Algorithms for the Problem of Test Redundancy Reduction","authors":"Mizanur Rahman, K. Z. Zamli, M. A. Mohamad","doi":"10.1145/3587828.3587879","DOIUrl":"https://doi.org/10.1145/3587828.3587879","url":null,"abstract":"Abstract. Finding the optimal solution out of all reasonable solutions is the goal of an optimization problem. Numerous metaheuristic algorithms have been created in the literature during the past 30 years. It is essential to assess each algorithm's performance using broad case studies in order to assist engineers in selecting the optimal metaheuristic algorithm for the given problem. In this research, we give a comparative analysis of four metaheuristic algorithms used to solve the test redundancy reduction problem: the teaching-learning-based optimization (TLBO), the jaya algorithm (JA), the sine-cosine algorithm (SCA), and the sparrow-search algorithm (SSA). To achieve statistical significance, the evaluation of these algorithms' performance is carried out by running every algorithm thirty times. Finding a minimal subset of the test suite that satisfies the specified test criteria is the aim of test redundancy reduction. It was discovered that, in terms of average reduction rate and runtime effectiveness, the SSA is the more efficient metaheuristic algorithm for the test redundancy reduction problem among all the competing metaheuristic algorithms.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121593734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noratikah Nordin, Z. Zainol, Mohd Halim Mohd Noor, L. Chan
Classifying an individual with suicidal behavior is a complex problem. A clinical decision support system (CDSS) helps medical experts in their daily work and supports them in effective decision-making. The huge amount of medical information and the complex correlation between the risk factors and the level of risk for suicidal behavior makes the representation of data is challenging. Therefore, this paper proposes an ontology-based modeling to classify an individual with at-risk of suicidal behavior for effective clinical decision support system. The case study is conducted to evaluate the ontology model and provides a general approach to knowledge sharing and reusing knowledge for suicide risk prevention and management. The finding shows that the ontology model can be used as a knowledge base for classification, and it is suitable to capture medical knowledge, detailed concepts, and relationships in a formal way using Web Ontology Language (OWL). The results of the proposed ontology model in terms of accuracy, specificity, and sensitivity are 83%, 84%, and 82% respectively.
对有自杀行为的个体进行分类是一个复杂的问题。临床决策支持系统(CDSS)可以帮助医学专家在日常工作中进行有效的决策。海量的医疗信息以及风险因素与自杀行为风险水平之间复杂的相关性使得数据的表示具有挑战性。因此,本文提出了一种基于本体的模型来对有自杀行为风险的个体进行分类,为有效的临床决策支持系统提供支持。通过案例研究对本体模型进行了评价,为自杀风险预防和管理提供了知识共享和知识重用的通用方法。研究结果表明,该本体模型可以作为分类的知识库,并且适合使用Web ontology Language (OWL)以形式化的方式捕获医学知识、详细概念和关系。所提出的本体模型的准确率、特异性和灵敏度分别为83%、84%和82%。
{"title":"An Ontology-based Modeling for Classifying Risk of Suicidal Behavior","authors":"Noratikah Nordin, Z. Zainol, Mohd Halim Mohd Noor, L. Chan","doi":"10.1145/3587828.3587840","DOIUrl":"https://doi.org/10.1145/3587828.3587840","url":null,"abstract":"Classifying an individual with suicidal behavior is a complex problem. A clinical decision support system (CDSS) helps medical experts in their daily work and supports them in effective decision-making. The huge amount of medical information and the complex correlation between the risk factors and the level of risk for suicidal behavior makes the representation of data is challenging. Therefore, this paper proposes an ontology-based modeling to classify an individual with at-risk of suicidal behavior for effective clinical decision support system. The case study is conducted to evaluate the ontology model and provides a general approach to knowledge sharing and reusing knowledge for suicide risk prevention and management. The finding shows that the ontology model can be used as a knowledge base for classification, and it is suitable to capture medical knowledge, detailed concepts, and relationships in a formal way using Web Ontology Language (OWL). The results of the proposed ontology model in terms of accuracy, specificity, and sensitivity are 83%, 84%, and 82% respectively.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116146390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah A. Aziz
The vulnerability of in-vehicle networks, particularly those based on the Controller Area Network (CAN) protocol, has prompted the development of numerous techniques for intrusion detection on the CAN bus. However, these CAN IDS are often evaluated in disparate experimental settings, with different datasets and evaluation metrics, which hinder direct comparison. This has given rise to efforts at benchmarking and comparative evaluation of CAN IDS under similar experimental conditions to provide an understanding of the relative performance of these CAN IDS. This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. The ROAD dataset differs from datasets used in previous work in that it includes the stealthiest possible version of targeted ID fabrication attacks which are more difficult to detect. It also consists of masquerade attacks, which have not been commonly used in comparative evaluation studies. Furthermore, in addition to metrics such as accuracy, precision, recall, and F1-score, we report balanced accuracy, informedness, markedness, and Matthews correlation coefficient, which place equal important on positive and negative classes and are better measures of detection capability, especially for imbalanced datasets. We also report training and testing times for each CAN IDS as an indicator of real-time intrusion detection performance. Results of experiments were found to be generally concordant with previous work, in terms of accuracy, precision, recall, and F1-score. Entropy- and frequency-based CAN IDS were found to be relatively better at detecting attacks, particularly fabrication attacks; while other algorithms did not perform well, as indicated by low MCC scores.
{"title":"Comparative Evaluation of Anomaly-Based Controller Area Network IDS","authors":"Shaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah A. Aziz","doi":"10.1145/3587828.3587861","DOIUrl":"https://doi.org/10.1145/3587828.3587861","url":null,"abstract":"The vulnerability of in-vehicle networks, particularly those based on the Controller Area Network (CAN) protocol, has prompted the development of numerous techniques for intrusion detection on the CAN bus. However, these CAN IDS are often evaluated in disparate experimental settings, with different datasets and evaluation metrics, which hinder direct comparison. This has given rise to efforts at benchmarking and comparative evaluation of CAN IDS under similar experimental conditions to provide an understanding of the relative performance of these CAN IDS. This work contributes to these efforts by reporting results of the comparative evaluation of four statistical and two machine learning-based CAN intrusion detection algorithm, against the Real ORNL Automotive Dynamometer (ROAD) CAN intrusion dataset. The ROAD dataset differs from datasets used in previous work in that it includes the stealthiest possible version of targeted ID fabrication attacks which are more difficult to detect. It also consists of masquerade attacks, which have not been commonly used in comparative evaluation studies. Furthermore, in addition to metrics such as accuracy, precision, recall, and F1-score, we report balanced accuracy, informedness, markedness, and Matthews correlation coefficient, which place equal important on positive and negative classes and are better measures of detection capability, especially for imbalanced datasets. We also report training and testing times for each CAN IDS as an indicator of real-time intrusion detection performance. Results of experiments were found to be generally concordant with previous work, in terms of accuracy, precision, recall, and F1-score. Entropy- and frequency-based CAN IDS were found to be relatively better at detecting attacks, particularly fabrication attacks; while other algorithms did not perform well, as indicated by low MCC scores.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"14 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Bimenyimana, P. Nsengiyumva, Said Rutabayiro Ngoga
In developing countries, many customers do not get good quality of electricity power supply due to frequent and prolonged power fluctuations/cuts. Distribution transformer (DT) is a service transformer that provides the final voltage transformation in the electric power distribution system, stepping down the voltage to the level used by the customers. Monitoring and control of DT (as a crucial and expensive asset in the network) is a key enabler of power stability to consumers. A power utility is said to be a business oriented with good image representation if it delivers a reliable and affordable electricity. Modern technologies such as the Internet of Things (IoT) offer a wide range of applications in the energy sector to smoothly monitor, control and optimize processes. Currently, many energy companies in developing countries are not yet implementing the remote system to control and monitor the secondary side of DTs and timely get the notifications of fluctuations/abnormalities occurred on those DTs. That is why it is still challenging and time consuming to intervene urgently and do the necessary actions to prevent severe and prolonged power cuts/fluctuations and safeguard the damage of DTs themselves with customer's appliances connected on those DTs. The secondary side of DT is the one connected directly and supply power to the customers. For this reason, we developed an affordable IoT system that automatically detects the abnormalities/fluctuations of three core technical parameters of DT (which are voltage, current and temperature) using current sensors, voltage sensors, and temperature sensor with ATmega 328P Microcontroller to collect and process data from sensors connected to DT system. Once one or all of those technical parameters become abnormal, the system cut off automatically the secondary side of DT in 2 seconds to isolate and protect the customers’ load with safeguarding DT itself using a power relay. At the same time, GSM/GPRS module uploads the sensed abnormal data to the cloud storage, displays them on web-based application for visualization, and sends the corresponding short message service (sms) to notify the issue to the authorized person in 5 seconds for speeding up the interventions and power restoration. In case there is a movement related to the vandalism in the compound of DT, a PIR sensor detects the human motion then a camera takes the related picture and send it to the utility with the corresponding sms. A buzzer generates an audio signaling to warn the culprit/criminal until he left the site. If there is no abnormality detected, the system keeps sensing without sending the data to the cloud. We can open and close remotely the secondary side of DT and buzzer. This system is powered using a rechargeable battery.
{"title":"IoT monitoring and control system of Distribution Transformers in Rwanda","authors":"E. Bimenyimana, P. Nsengiyumva, Said Rutabayiro Ngoga","doi":"10.1145/3587828.3587866","DOIUrl":"https://doi.org/10.1145/3587828.3587866","url":null,"abstract":"In developing countries, many customers do not get good quality of electricity power supply due to frequent and prolonged power fluctuations/cuts. Distribution transformer (DT) is a service transformer that provides the final voltage transformation in the electric power distribution system, stepping down the voltage to the level used by the customers. Monitoring and control of DT (as a crucial and expensive asset in the network) is a key enabler of power stability to consumers. A power utility is said to be a business oriented with good image representation if it delivers a reliable and affordable electricity. Modern technologies such as the Internet of Things (IoT) offer a wide range of applications in the energy sector to smoothly monitor, control and optimize processes. Currently, many energy companies in developing countries are not yet implementing the remote system to control and monitor the secondary side of DTs and timely get the notifications of fluctuations/abnormalities occurred on those DTs. That is why it is still challenging and time consuming to intervene urgently and do the necessary actions to prevent severe and prolonged power cuts/fluctuations and safeguard the damage of DTs themselves with customer's appliances connected on those DTs. The secondary side of DT is the one connected directly and supply power to the customers. For this reason, we developed an affordable IoT system that automatically detects the abnormalities/fluctuations of three core technical parameters of DT (which are voltage, current and temperature) using current sensors, voltage sensors, and temperature sensor with ATmega 328P Microcontroller to collect and process data from sensors connected to DT system. Once one or all of those technical parameters become abnormal, the system cut off automatically the secondary side of DT in 2 seconds to isolate and protect the customers’ load with safeguarding DT itself using a power relay. At the same time, GSM/GPRS module uploads the sensed abnormal data to the cloud storage, displays them on web-based application for visualization, and sends the corresponding short message service (sms) to notify the issue to the authorized person in 5 seconds for speeding up the interventions and power restoration. In case there is a movement related to the vandalism in the compound of DT, a PIR sensor detects the human motion then a camera takes the related picture and send it to the utility with the corresponding sms. A buzzer generates an audio signaling to warn the culprit/criminal until he left the site. If there is no abnormality detected, the system keeps sensing without sending the data to the cloud. We can open and close remotely the secondary side of DT and buzzer. This system is powered using a rechargeable battery.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128259620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In programming languages, a function closure is a function whose body includes possibly free variables and that is accompanied by association with their values. The association of variables with their values is called an environment. If a programming language uses lexical scope and treats functions as first-class objects, then function closures are mandatory. Function closures are provided in Common Lisp, Emacs Lisp, Scheme and other dialects of LISP, as well as in modern scripting languages such as Python, JavaScript and Ruby, and procedural languages such as C++. In our previous paper, we proposed a mechanism that enables us to extract an environment part from a function closure. However, it brings a situation that environments must be handled as a first-class object, which is a huge extension of the traditional theory to be avoid if possible, since several desirable properties will be lost. This paper presents a method for replacing the environment of a function closure in the lambda calculus with the environment of another function closure. By taking this approach rather than extracting the environment from the function closure and using it, it ise to avoid treating the environment directly as a first-class object. We introduce a new computational system called lambda calculus with environment transplantation to explore the theoretical aspects of this process. Our system is defined by its syntax and reduction rules, and we provide a semantics for it through a transformation to the lambda calculus with records. The soundness of the reduction is demonstrated within this transformation semantics. Additionally, we give a simple type system to our calculus and show its subject reduction system.
{"title":"Transplanting of Environments between Closures in the lambda calculus","authors":"S. Nishizaki","doi":"10.1145/3587828.3587847","DOIUrl":"https://doi.org/10.1145/3587828.3587847","url":null,"abstract":"In programming languages, a function closure is a function whose body includes possibly free variables and that is accompanied by association with their values. The association of variables with their values is called an environment. If a programming language uses lexical scope and treats functions as first-class objects, then function closures are mandatory. Function closures are provided in Common Lisp, Emacs Lisp, Scheme and other dialects of LISP, as well as in modern scripting languages such as Python, JavaScript and Ruby, and procedural languages such as C++. In our previous paper, we proposed a mechanism that enables us to extract an environment part from a function closure. However, it brings a situation that environments must be handled as a first-class object, which is a huge extension of the traditional theory to be avoid if possible, since several desirable properties will be lost. This paper presents a method for replacing the environment of a function closure in the lambda calculus with the environment of another function closure. By taking this approach rather than extracting the environment from the function closure and using it, it ise to avoid treating the environment directly as a first-class object. We introduce a new computational system called lambda calculus with environment transplantation to explore the theoretical aspects of this process. Our system is defined by its syntax and reduction rules, and we provide a semantics for it through a transformation to the lambda calculus with records. The soundness of the reduction is demonstrated within this transformation semantics. Additionally, we give a simple type system to our calculus and show its subject reduction system.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IoT will be the main component of the next era of computing. IoT devices are increasing in number and will continue to increase due to automation. According to cisco, up to 50 billion devices and objects get connected with each other and to the internet in 2020 [1, 6]. IoT application domains includes smart environments, smart grid, smart cities, smart healthcare, smart industries, smart agriculture, smart home, smart transportation etc [2]. However, the IoT devices are characterized as resource constrained with low computational ability, lower power consumption and small memory. PUF is embedded on IoT device to uniquely identify the device. This characteristic feature of PUF is unique and unclonable, while fuzzy logic's ability to deal with uncertainty and hazy or vague information is used to categorize nodes by computing its record, status and reputation, so that nodes are authenticated according to the trust values it attained. The authentication is in three phases; first, second and third. With PUF's unique physical characteristics; authentication, reliability and lightweight are achieved.
{"title":"A Unique PUF Authentication Protocol Based Fuzzy Logic Categorization for Internet of Things (IOT) Devices","authors":"J. S. Yalli, M. H. Hasan","doi":"10.1145/3587828.3587865","DOIUrl":"https://doi.org/10.1145/3587828.3587865","url":null,"abstract":"IoT will be the main component of the next era of computing. IoT devices are increasing in number and will continue to increase due to automation. According to cisco, up to 50 billion devices and objects get connected with each other and to the internet in 2020 [1, 6]. IoT application domains includes smart environments, smart grid, smart cities, smart healthcare, smart industries, smart agriculture, smart home, smart transportation etc [2]. However, the IoT devices are characterized as resource constrained with low computational ability, lower power consumption and small memory. PUF is embedded on IoT device to uniquely identify the device. This characteristic feature of PUF is unique and unclonable, while fuzzy logic's ability to deal with uncertainty and hazy or vague information is used to categorize nodes by computing its record, status and reputation, so that nodes are authenticated according to the trust values it attained. The authentication is in three phases; first, second and third. With PUF's unique physical characteristics; authentication, reliability and lightweight are achieved.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120973790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Plant health conditions can be done by calculating the vegetation index. The vegetation index produced by the camera in visible light is more economical than multi spectral or hyper spectral cameras. Image information from visible light cameras will provide an RGB (Red-Green-Blue) value for each pixel to be used to calculate the vegetation index. The RGB value will be greatly influenced by the light conditions (scene) at the time of image acquisition by the camera. Image of plants, will be influenced by the variability of high illumination conditions due to changes in various natural lighting conditions; bright, cloudy, or illuminating nearby objects. To get the right RGB value from each pixel of the image, it is necessary to make adjustments with a certain white balance method. The development of white balance research is also carried out by looking for the value of color constancy. Because the color of the light source, the inherent qualities of the object, and the color of the object's surface will determine the object's color, Color Constancy is performed.. The information generated by the reflectance of light from the surface of a shiny object (reflective) is better than that of a non-shiny object. In this study, experiments were conducted on the effect of the white balance method on color constancy in visible light. The experimental results on the data set processed by the white balance gray world and white patch methods show that there are different RGB values.
{"title":"The Effect of White Balance for Color Constancy on Visible Light","authors":"Toni Kusnandar, J. Santoso, K. Surendro","doi":"10.1145/3587828.3587850","DOIUrl":"https://doi.org/10.1145/3587828.3587850","url":null,"abstract":"Plant health conditions can be done by calculating the vegetation index. The vegetation index produced by the camera in visible light is more economical than multi spectral or hyper spectral cameras. Image information from visible light cameras will provide an RGB (Red-Green-Blue) value for each pixel to be used to calculate the vegetation index. The RGB value will be greatly influenced by the light conditions (scene) at the time of image acquisition by the camera. Image of plants, will be influenced by the variability of high illumination conditions due to changes in various natural lighting conditions; bright, cloudy, or illuminating nearby objects. To get the right RGB value from each pixel of the image, it is necessary to make adjustments with a certain white balance method. The development of white balance research is also carried out by looking for the value of color constancy. Because the color of the light source, the inherent qualities of the object, and the color of the object's surface will determine the object's color, Color Constancy is performed.. The information generated by the reflectance of light from the surface of a shiny object (reflective) is better than that of a non-shiny object. In this study, experiments were conducted on the effect of the white balance method on color constancy in visible light. The experimental results on the data set processed by the white balance gray world and white patch methods show that there are different RGB values.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126641463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Global warming is starting to become a major issue to maintain the sustainability of the environment and the earth. This phenomenon is caused by high greenhouse gas emissions, most of which come from human activities. At the university level, there have been many studies related to carbon footprint in universities, but only a few have studied the behavior and activities of the people in it, especially students. Predictive Analytics can be applied as the model to predict the future trends of emission carbon in the university based on the emission carbon data. Design Thinking can be used as an approach to solve such an abstract and complex problem to use the emission data to optimize carbon emissions at the student level. This research is expected to provide insights for universities regarding their level of carbon footprint and provide awareness of this so that several decision-making steps can be taken regarding optimizing carbon emissions at the student level. Bandung Institute of Technology will be the subject of this research. This study is preliminary research which will be implemented in the future work.
{"title":"Predictive Analytics Model for Optimizing Carbon Emission from Student Activity and Behavior with A Design Thinking Approach: Case Study: Bandung Institute of Technology","authors":"Michael Hans, Erna Hikmawati, K. Surendro","doi":"10.1145/3587828.3587841","DOIUrl":"https://doi.org/10.1145/3587828.3587841","url":null,"abstract":"Global warming is starting to become a major issue to maintain the sustainability of the environment and the earth. This phenomenon is caused by high greenhouse gas emissions, most of which come from human activities. At the university level, there have been many studies related to carbon footprint in universities, but only a few have studied the behavior and activities of the people in it, especially students. Predictive Analytics can be applied as the model to predict the future trends of emission carbon in the university based on the emission carbon data. Design Thinking can be used as an approach to solve such an abstract and complex problem to use the emission data to optimize carbon emissions at the student level. This research is expected to provide insights for universities regarding their level of carbon footprint and provide awareness of this so that several decision-making steps can be taken regarding optimizing carbon emissions at the student level. Bandung Institute of Technology will be the subject of this research. This study is preliminary research which will be implemented in the future work.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125275309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmad Hanis Mohd Shabli, Mawarny Md. Rejab, Nur Hani Zulkifli Abai, S. C. Chit
The adoption of the Internet of Things (IoT) enables Universiti Utara Malaysia (UUM) to create a smart campus by creating and implementing a number of intelligent applications, programmes, and services to address challenges and issues experienced by students. UUM was compelled to find a solution because of the inadequacy of the bus services offered to meet the student needs. In order to enable students to observe the available bases, routes, and locations of buses, this study developed a campus bus tracking system employing IoT technology using LoRa technology. In this study, LoRa technology was highlighted to manage patchy internet connection within campus. This paper focuses on the hardware testing and user viewpoint testing of the proposed system. Based on the survey, respondents were happy with the system's performance, usability, and effectiveness. The use of the suggested approach can resolve the mentioned issue of inadequate bus services offered to meet the needs of students.
{"title":"Campus Bus Tracking System using LoRa Technology: IoT System Testing","authors":"Ahmad Hanis Mohd Shabli, Mawarny Md. Rejab, Nur Hani Zulkifli Abai, S. C. Chit","doi":"10.1145/3587828.3587863","DOIUrl":"https://doi.org/10.1145/3587828.3587863","url":null,"abstract":"The adoption of the Internet of Things (IoT) enables Universiti Utara Malaysia (UUM) to create a smart campus by creating and implementing a number of intelligent applications, programmes, and services to address challenges and issues experienced by students. UUM was compelled to find a solution because of the inadequacy of the bus services offered to meet the student needs. In order to enable students to observe the available bases, routes, and locations of buses, this study developed a campus bus tracking system employing IoT technology using LoRa technology. In this study, LoRa technology was highlighted to manage patchy internet connection within campus. This paper focuses on the hardware testing and user viewpoint testing of the proposed system. Based on the survey, respondents were happy with the system's performance, usability, and effectiveness. The use of the suggested approach can resolve the mentioned issue of inadequate bus services offered to meet the needs of students.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The quality of development documents written in natural language is basically ensured by developer's review with quite a few man-hours. Natural language processing (NLP) tools can partially automate the time-consuming review. The authors have developed morpheme level pattern matching and processing tools morfgrep and morfawk for Japanese texts for this purpose; moreover, in this paper, extends them to perform pattern matching on dependency among phrases. Example applications of the tools, proofreading of development documents and domain-specific term extraction, are also presented.
{"title":"Morfawk.ja: A Japanese Token Level Pattern Matching and Processing Language with Dependency Analysis","authors":"Tsuneo Nakanishi, Hokuto Ototake, Toshifumi Tanabe, Kenji Yoshimura","doi":"10.1145/3587828.3587878","DOIUrl":"https://doi.org/10.1145/3587828.3587878","url":null,"abstract":"The quality of development documents written in natural language is basically ensured by developer's review with quite a few man-hours. Natural language processing (NLP) tools can partially automate the time-consuming review. The authors have developed morpheme level pattern matching and processing tools morfgrep and morfawk for Japanese texts for this purpose; moreover, in this paper, extends them to perform pattern matching on dependency among phrases. Example applications of the tools, proofreading of development documents and domain-specific term extraction, are also presented.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131678491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}