首页 > 最新文献

2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)最新文献

英文 中文
Comparative Evaluation of Asymmetric Price Transmission Linear Models Using rMDL, eMDL, nMDL, gMDL, AIC and BIC Across Varying Sample Sizes 不同样本量下rMDL、eMDL、nMDL、gMDL、AIC和BIC的非对称价格传导线性模型比较评价
I. K. Amponsah, H. Acquah, Nathaniel K. Howard
The Minimum Description Length (MDL), a less known criterion, is making great strides in model selection as compared to the widely known and used information criteria (AIC, BIC, etc). This study developed the MDL criterion using R-functions to evaluate Asymmetric Price Transmission (APT) models (Complex, Standard and Houck’s) for the first time ever. All six criteria’s ability to recover the true DGP was assessed under the condition of varying sample size. A 1000 Monte Carlo simulation procedure revealed that the MDL criteria on the average points to the true DGP and are comparable (if not better) to both AIC and BIC under study condition. Generally, the performances of all model selection criteria (rMDL, nMDL, gMDL, eMDL, AIC and BIC) improved with increasing sample size in their ability to recover the true DGP for both standard and complex models. This study recommends the use of MDL criterion in model selection and in the light of constraint (financial, time and inadequate resources), a sample size of 150 is sufficient in making sound decisions on asymmetric price models.
最小描述长度(MDL)是一个鲜为人知的标准,与广泛使用的信息标准(AIC, BIC等)相比,它在模型选择方面取得了很大的进步。本研究首次使用r函数开发了MDL标准来评估不对称价格传导(APT)模型(Complex、Standard和Houck’s)。在不同样本量的条件下,评估所有六个标准恢复真实DGP的能力。1000蒙特卡罗模拟程序显示,MDL标准的平均值指向真实的DGP,并且在研究条件下与AIC和BIC相当(如果不是更好的话)。一般来说,所有模型选择标准(rMDL、nMDL、gMDL、eMDL、AIC和BIC)的性能随着样本量的增加而提高,它们对标准模型和复杂模型的真实DGP的恢复能力也随之提高。本研究建议在模型选择中使用MDL标准,考虑到约束(财政、时间和资源不足),150个样本量足以对不对称价格模型做出合理的决策。
{"title":"Comparative Evaluation of Asymmetric Price Transmission Linear Models Using rMDL, eMDL, nMDL, gMDL, AIC and BIC Across Varying Sample Sizes","authors":"I. K. Amponsah, H. Acquah, Nathaniel K. Howard","doi":"10.1109/ICCMA.2019.00030","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00030","url":null,"abstract":"The Minimum Description Length (MDL), a less known criterion, is making great strides in model selection as compared to the widely known and used information criteria (AIC, BIC, etc). This study developed the MDL criterion using R-functions to evaluate Asymmetric Price Transmission (APT) models (Complex, Standard and Houck’s) for the first time ever. All six criteria’s ability to recover the true DGP was assessed under the condition of varying sample size. A 1000 Monte Carlo simulation procedure revealed that the MDL criteria on the average points to the true DGP and are comparable (if not better) to both AIC and BIC under study condition. Generally, the performances of all model selection criteria (rMDL, nMDL, gMDL, eMDL, AIC and BIC) improved with increasing sample size in their ability to recover the true DGP for both standard and complex models. This study recommends the use of MDL criterion in model selection and in the light of constraint (financial, time and inadequate resources), a sample size of 150 is sufficient in making sound decisions on asymmetric price models.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Decision Tree Classification Algorithm to Predict Learner Typologies for Project-Based Learning 基于项目的学习中使用决策树分类算法预测学习者类型
E. Gyimah, D. K. Dake
As educational data in tertiary institutions are becoming huge, it is important to deploy Data Mining algorithms in discovering knowledge and improving academic quality. One fast course delivery approach or trend, constructivism in higher education is based on Learner prioritization in the learning process where a learner transforms information, constructs hypothesis and makes decisions using mental models. Similar learner groupings for project-based learning through hidden patterns extraction can aid Active Learning and Instructor Monitoring. In our previous paper, K-means clustering algorithm was used to group learners with similar scores in three assessments. In this paper, we built a classifier model using the J48 Decision Tree Algorithm for predicting learner groupings after getting class labels through the K-means clustering algorithm. This classifier will help in predicting future groupings of learners for the same course and attributes. The weka simulation for the classifier model gave a 99.9% ROC Area curve, which indicates a general performance of the model and a 96.19% of correctly classified instances. The Confusion Matrix has 80% of the members correctly classified. The classification model has an extremely low FP Rate of 2%, another indication of a high performance predictive classifier.
随着高等院校教育数据的日益庞大,利用数据挖掘算法来发现知识、提高教学质量显得尤为重要。高等教育中的建构主义是一种快速的课程交付方法或趋势,它基于学习者在学习过程中的优先次序,学习者使用心理模型转换信息,构建假设并做出决策。通过隐藏模式提取对基于项目的学习进行类似的学习者分组,可以帮助主动学习和教师监控。在我们之前的论文中,我们使用K-means聚类算法对在三个评估中得分相似的学习者进行分组。在本文中,我们使用J48决策树算法构建了一个分类器模型,用于通过K-means聚类算法获得类标签后预测学习者分组。这个分类器将有助于预测相同课程和属性的学习者的未来分组。对分类器模型进行weka仿真,得到99.9%的ROC Area曲线,表明该模型性能一般,分类实例正确率为96.19%。混淆矩阵有80%的成员被正确分类。该分类模型的FP率极低,只有2%,这是高性能预测分类器的另一个标志。
{"title":"Using Decision Tree Classification Algorithm to Predict Learner Typologies for Project-Based Learning","authors":"E. Gyimah, D. K. Dake","doi":"10.1109/ICCMA.2019.00029","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00029","url":null,"abstract":"As educational data in tertiary institutions are becoming huge, it is important to deploy Data Mining algorithms in discovering knowledge and improving academic quality. One fast course delivery approach or trend, constructivism in higher education is based on Learner prioritization in the learning process where a learner transforms information, constructs hypothesis and makes decisions using mental models. Similar learner groupings for project-based learning through hidden patterns extraction can aid Active Learning and Instructor Monitoring. In our previous paper, K-means clustering algorithm was used to group learners with similar scores in three assessments. In this paper, we built a classifier model using the J48 Decision Tree Algorithm for predicting learner groupings after getting class labels through the K-means clustering algorithm. This classifier will help in predicting future groupings of learners for the same course and attributes. The weka simulation for the classifier model gave a 99.9% ROC Area curve, which indicates a general performance of the model and a 96.19% of correctly classified instances. The Confusion Matrix has 80% of the members correctly classified. The classification model has an extremely low FP Rate of 2%, another indication of a high performance predictive classifier.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133618212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Investigating the Actual usage of Learning Management System: From Perspectives of University Students 学习管理系统的实际使用情况调查:以大学生为视角
Charles Buabeng-Andoh, Charles Baah
This study investigated university students' actual use of learning management system using Unified Theory of Acceptance and Use of Technology (UTAUT) model. Quantitative and qualitative research strategies were adopted using close-ended and open-ended questionnaire to collect data from 149 students who were learning management system (LMS) users. Random sampling approach was used to select the students. The quantitative data were analyzed using structural equation model and the qualitative data were analyzed using thematic analysis. The results from quantitative analysis showed that performance expectancy, effort expectancy and institutional support influenced students' actual use of LMS while social influence and infrastructure support did not influence students' actual use. But, the results from qualitative analysis found lack of training, unavailability of internet connection and poor electricity supply as major concerns that affect students' actual usage of LMS. This study contributed to the current discussion on use of UTAUT to explain students' actual use of technology in developing countries. Implications, limitations and future studies were discussed.
本研究采用技术接受与使用统一理论(UTAUT)模型对大学生对学习管理系统的实际使用情况进行了调查。采用定量与定性相结合的研究策略,对149名使用学习管理系统(LMS)的学生进行问卷调查。采用随机抽样的方法选择学生。定量数据采用结构方程模型进行分析,定性数据采用专题分析。定量分析结果显示,绩效期望、努力期望和机构支持影响学生对LMS的实际使用,而社会影响和基础设施支持不影响学生对LMS的实际使用。但是,定性分析的结果发现,缺乏培训、互联网连接不可用和电力供应差是影响学生实际使用LMS的主要问题。这项研究促进了目前关于使用UTAUT来解释发展中国家学生实际使用技术的讨论。讨论了影响、局限性和未来的研究。
{"title":"Investigating the Actual usage of Learning Management System: From Perspectives of University Students","authors":"Charles Buabeng-Andoh, Charles Baah","doi":"10.1109/ICCMA.2019.00008","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00008","url":null,"abstract":"This study investigated university students' actual use of learning management system using Unified Theory of Acceptance and Use of Technology (UTAUT) model. Quantitative and qualitative research strategies were adopted using close-ended and open-ended questionnaire to collect data from 149 students who were learning management system (LMS) users. Random sampling approach was used to select the students. The quantitative data were analyzed using structural equation model and the qualitative data were analyzed using thematic analysis. The results from quantitative analysis showed that performance expectancy, effort expectancy and institutional support influenced students' actual use of LMS while social influence and infrastructure support did not influence students' actual use. But, the results from qualitative analysis found lack of training, unavailability of internet connection and poor electricity supply as major concerns that affect students' actual usage of LMS. This study contributed to the current discussion on use of UTAUT to explain students' actual use of technology in developing countries. Implications, limitations and future studies were discussed.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Nodal Authentication of IoT Data Using Blockchain 使用区块链的物联网数据节点认证
B. Asare, Kester Quist-Aphetsi, Laurent Nana
Pervasive systems over the years continuous to grow exponentially. Engagement of IoT in fields such as Agriculture, Home automation, industrial applications etc is on the rise. Self organizing networks within the IoT field give rise to engagement of various nodes for data communication. The rise in Cyber-attacks within IoT pose a lot of threat to these connected nodes and hence there is a need for data passing through nodes to be verified during communication. In this paper we proposed a nodal authentication approach in IoT using blockchain in securing the integrity of data passing through the nodes in IoT. In our work, we engaged the GOST algorithm in our approach. At the end, we achieved a nodal authentication and verification of the transmitted data. This makes it very difficult for an attacker to fake a node in the communication chain of the connected nodes. Data integrity was achieved in the nodes during the communication.
普适系统多年来持续呈指数增长。物联网在农业、家庭自动化、工业应用等领域的应用正在增加。物联网领域内的自组织网络导致各种节点参与数据通信。物联网中网络攻击的增加对这些连接的节点构成了很大的威胁,因此需要在通信过程中对通过节点的数据进行验证。在本文中,我们提出了一种物联网中的节点认证方法,使用区块链来保护通过物联网节点的数据的完整性。在我们的工作中,我们在我们的方法中使用了GOST算法。最后,我们实现了对传输数据的节点认证和验证。这使得攻击者很难在连接节点的通信链中伪造节点。在通信过程中,实现了节点间数据的完整性。
{"title":"Nodal Authentication of IoT Data Using Blockchain","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICCMA.2019.00028","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00028","url":null,"abstract":"Pervasive systems over the years continuous to grow exponentially. Engagement of IoT in fields such as Agriculture, Home automation, industrial applications etc is on the rise. Self organizing networks within the IoT field give rise to engagement of various nodes for data communication. The rise in Cyber-attacks within IoT pose a lot of threat to these connected nodes and hence there is a need for data passing through nodes to be verified during communication. In this paper we proposed a nodal authentication approach in IoT using blockchain in securing the integrity of data passing through the nodes in IoT. In our work, we engaged the GOST algorithm in our approach. At the end, we achieved a nodal authentication and verification of the transmitted data. This makes it very difficult for an attacker to fake a node in the communication chain of the connected nodes. Data integrity was achieved in the nodes during the communication.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Decentralized Cryptographic Blockchain Approach for Health Information System 健康信息系统的去中心化加密区块链方法
Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana
With the rise of cyber attacks and the advancement of technology providing easy access to personal data and information in real time using networks and other services such as the cloud. These advancements have placed sensitive data such as medical information under threat. Due to the ease in accessing and modifying such data leading to little or no trace of such wrongdoings. This paper proposes a cryptographic blockchain approach using the md5 hash algorithm to verify and validate the medical data of the health information system infrastructure. The approach makes it difficult for data to be altered without detection and adopts a distributed approach coupled with blockchain.
随着网络攻击的增加和技术的进步,使用网络和云等其他服务可以轻松实时访问个人数据和信息。这些进步使医疗信息等敏感数据受到威胁。由于易于访问和修改这些数据,导致很少或根本没有此类不法行为的痕迹。本文提出了一种使用md5哈希算法对卫生信息系统基础设施的医疗数据进行验证和验证的加密区块链方法。这种方法使得数据很难在没有检测的情况下被改变,并采用了与区块链相结合的分布式方法。
{"title":"A Decentralized Cryptographic Blockchain Approach for Health Information System","authors":"Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICCMA.2019.00027","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00027","url":null,"abstract":"With the rise of cyber attacks and the advancement of technology providing easy access to personal data and information in real time using networks and other services such as the cloud. These advancements have placed sensitive data such as medical information under threat. Due to the ease in accessing and modifying such data leading to little or no trace of such wrongdoings. This paper proposes a cryptographic blockchain approach using the md5 hash algorithm to verify and validate the medical data of the health information system infrastructure. The approach makes it difficult for data to be altered without detection and adopts a distributed approach coupled with blockchain.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1