Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586825
Ug Singh, T. Obafemi
The benefits of the use of information and communication technology (ICT) in teaching and learning is a subject of ongoing debate. In terms of the benefit of improved students’ performance, there has been a major focus on educators with regards to proficiency, acceptance, intentions and actual use of ICTs for teaching and learning. However, the effect of these educators’ teaching strategy on how they use ICTs for teaching and learning is less well studied. The purpose of this paper is to examine educators’ teaching strategies in order to identify those educators who agree with educational approaches which are compatible with the learning advantages associated with elearning. This will enable the proposal of a suitable teaching and learning strategy that will facilitate the improvement of students’ performance through e-learning. A survey of 65 educators in Camperdown schools in the Pinetown district of KwaZulu-Natal province was conducted. The survey was based on a literature review of teaching and learning theories. The results showed that constructivist and progressivist educators have a positive perception of e-learning. Such educators are therefore recommended to pilot elearning projects in schools.
{"title":"Educators’ Teaching Strategies in eLearning Environments","authors":"Ug Singh, T. Obafemi","doi":"10.1109/CCCS.2018.8586825","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586825","url":null,"abstract":"The benefits of the use of information and communication technology (ICT) in teaching and learning is a subject of ongoing debate. In terms of the benefit of improved students’ performance, there has been a major focus on educators with regards to proficiency, acceptance, intentions and actual use of ICTs for teaching and learning. However, the effect of these educators’ teaching strategy on how they use ICTs for teaching and learning is less well studied. The purpose of this paper is to examine educators’ teaching strategies in order to identify those educators who agree with educational approaches which are compatible with the learning advantages associated with elearning. This will enable the proposal of a suitable teaching and learning strategy that will facilitate the improvement of students’ performance through e-learning. A survey of 65 educators in Camperdown schools in the Pinetown district of KwaZulu-Natal province was conducted. The survey was based on a literature review of teaching and learning theories. The results showed that constructivist and progressivist educators have a positive perception of e-learning. Such educators are therefore recommended to pilot elearning projects in schools.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"58 1","pages":"35-39"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82296967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586832
Ashwin Dhakal, Arpan Poudel, S. Pandey, S. Gaire, Hari Prasad Baral
Question duplication is the major problem encountered by Q &A forums like Quora, Stack-overflow, Reddit, etc. Answers get fragmented across different versions of the same question due to the redundancy of questions in these forums. Eventually, this results in lack of a sensible search, answer fatigue, segregation of information and the paucity of response to the questioners. The duplicate questions can be detected using Machine Learning and Natural Language Processing. Dataset of more than 400,000 questions pairs provided by Quora are preprocessed through tokenization, lemmatization and removal of stop words. This pre-processed dataset is used for the feature extraction. Artificial Neural Network is then designed and the features hence extracted, are fit into the model. This neural network gives accuracy of 86.09%. In a nutshell, this research predicts the semantic coincidence between the question pairs extracting highly dominant features and hence, determine the probability of question being duplicate.
{"title":"Exploring Deep Learning in Semantic Question Matching","authors":"Ashwin Dhakal, Arpan Poudel, S. Pandey, S. Gaire, Hari Prasad Baral","doi":"10.1109/CCCS.2018.8586832","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586832","url":null,"abstract":"Question duplication is the major problem encountered by Q &A forums like Quora, Stack-overflow, Reddit, etc. Answers get fragmented across different versions of the same question due to the redundancy of questions in these forums. Eventually, this results in lack of a sensible search, answer fatigue, segregation of information and the paucity of response to the questioners. The duplicate questions can be detected using Machine Learning and Natural Language Processing. Dataset of more than 400,000 questions pairs provided by Quora are preprocessed through tokenization, lemmatization and removal of stop words. This pre-processed dataset is used for the feature extraction. Artificial Neural Network is then designed and the features hence extracted, are fit into the model. This neural network gives accuracy of 86.09%. In a nutshell, this research predicts the semantic coincidence between the question pairs extracting highly dominant features and hence, determine the probability of question being duplicate.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"25 1","pages":"86-91"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90427744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586808
Sudan Prajapati, S. R. Joshi, Aman Maharjan, Bikash Balami
This paper evaluates the performance of Nepali Script OCR using Tesseract and ANN. A dataset of 69 Nepali fonts with the 2,484 character samples of consonants was used in the study. With Tesseract, the overall accuracy of 96% was obtained in the training phase and 69% in the testing phase. Similarly, with ANN, an accuracy of 98% was obtained in training and 81% in testing.
{"title":"Evaluating Performance of Nepali Script OCR using Tesseract and Artificial Neural Network","authors":"Sudan Prajapati, S. R. Joshi, Aman Maharjan, Bikash Balami","doi":"10.1109/CCCS.2018.8586808","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586808","url":null,"abstract":"This paper evaluates the performance of Nepali Script OCR using Tesseract and ANN. A dataset of 69 Nepali fonts with the 2,484 character samples of consonants was used in the study. With Tesseract, the overall accuracy of 96% was obtained in the training phase and 69% in the testing phase. Similarly, with ANN, an accuracy of 98% was obtained in training and 81% in testing.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"3 1","pages":"104-107"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72883144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586822
S. T, Sudarsan Sd, Janne Starck, Timothy R. Vittor
Building a secure architecture in the devices and systems used in the power automation system in parallel with supporting power automation protocols is key for the improvement of operational efficiency and reliability of electrical power system network. Creation of effective cyber secure architecture is addressed with specific focus on power transmission and distribution automation solutions and systems. Paper provides practices and methods for adoption. Key advantages of proposed methods, practices and techniques include (i) robustness to withstand cyber-attacks, (ii) resilient to be able to recover in the adverse situation of unwanted/unexpected compromise to security and (iii) continuation of core functionality of the device/system while attack is still ongoing. This is achieved by adopting a defense-indepth strategy across different aspects from product design to having a dedicated security test center, and secure system architecture.
{"title":"Cyber Security – Securing electrical power transmission and distribution systems","authors":"S. T, Sudarsan Sd, Janne Starck, Timothy R. Vittor","doi":"10.1109/CCCS.2018.8586822","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586822","url":null,"abstract":"Building a secure architecture in the devices and systems used in the power automation system in parallel with supporting power automation protocols is key for the improvement of operational efficiency and reliability of electrical power system network. Creation of effective cyber secure architecture is addressed with specific focus on power transmission and distribution automation solutions and systems. Paper provides practices and methods for adoption. Key advantages of proposed methods, practices and techniques include (i) robustness to withstand cyber-attacks, (ii) resilient to be able to recover in the adverse situation of unwanted/unexpected compromise to security and (iii) continuation of core functionality of the device/system while attack is still ongoing. This is achieved by adopting a defense-indepth strategy across different aspects from product design to having a dedicated security test center, and secure system architecture.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"45 1","pages":"230-235"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76330991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586842
V. Joshi, S. Panday
Extraction of core character with related components, exactness and consistency of extracted symbol determines accuracy of any Digital Image Processing Systems. Furthermore, pre-categorization of extracted symbols reduces lots of processing load at classification level. This paper proposes a core character and its component segmentation and categorization method of Machine Printed Text in Devanagari-Nepali Script. This paper also presents a method that extract modifier components which are not connected to core character. Here, Shirorekha or Dika or header line is considered as major component of segmentation and categorization. The proposed model removes the Shirorekha or Dika using horizontal projection profile on word and label the image of word to extract the objects as components. We have supplied one object has one label. Some character loose some property at removal of Shirorekha. Thus, we have reconstructed character for exactness and consistency of extracted object. We have used a set of structural layout - height width ratio, appearance position in word, presence of Shirorekha over the extracted symbol to categorize the extracted objects. We categorize extracted symbol into five categories - Non-dika character, regular character, conjuncts, upper modifiers and lower modifiers. The result obtained shows we have an accuracy of 98.26% to 100% as compared to previous method.
{"title":"Character Component Segmentation and Categorization of Machine Printed Text in Devanagari (Nepali) Script in Digital Image Processing","authors":"V. Joshi, S. Panday","doi":"10.1109/CCCS.2018.8586842","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586842","url":null,"abstract":"Extraction of core character with related components, exactness and consistency of extracted symbol determines accuracy of any Digital Image Processing Systems. Furthermore, pre-categorization of extracted symbols reduces lots of processing load at classification level. This paper proposes a core character and its component segmentation and categorization method of Machine Printed Text in Devanagari-Nepali Script. This paper also presents a method that extract modifier components which are not connected to core character. Here, Shirorekha or Dika or header line is considered as major component of segmentation and categorization. The proposed model removes the Shirorekha or Dika using horizontal projection profile on word and label the image of word to extract the objects as components. We have supplied one object has one label. Some character loose some property at removal of Shirorekha. Thus, we have reconstructed character for exactness and consistency of extracted object. We have used a set of structural layout - height width ratio, appearance position in word, presence of Shirorekha over the extracted symbol to categorize the extracted objects. We categorize extracted symbol into five categories - Non-dika character, regular character, conjuncts, upper modifiers and lower modifiers. The result obtained shows we have an accuracy of 98.26% to 100% as compared to previous method.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"33 1","pages":"191-198"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75283793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586839
N. R. Rao, K. C. Sekharaiah, Ram Narayan
Information technology and the development process have driven to dynamic approach towards the bug fix and its improvement. In the process of the software development with respect to time and trend, market has changed a lot in the context of the time and material based projects and many more. Software process development in terms of the agile where most of the client based or can be called service based organization have seen a drastically change where the client involved directly either the process making as scrum master. In the process of the development, we come across the bugs either from the testing or production environment. In this paper, we have tracked the each bug and corresponding solution; facilitates to increase the efficiency of bug fix. In that extend, we have given emphasis on the process of the governance in terms of the all the phases starting from the requirement gathering ending at the product delivery and maintenance, along with priority of bug which is distributed and make sense in terms of the quality and time with the state, behaviour and identity. Hence we have given emphasis on the part of the query based approach to rally like tool which make the process of the development on the distributed easier and simplified.
{"title":"Aspects Oriented Approach towards the Bug Fixing Performance Lifecycle","authors":"N. R. Rao, K. C. Sekharaiah, Ram Narayan","doi":"10.1109/CCCS.2018.8586839","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586839","url":null,"abstract":"Information technology and the development process have driven to dynamic approach towards the bug fix and its improvement. In the process of the software development with respect to time and trend, market has changed a lot in the context of the time and material based projects and many more. Software process development in terms of the agile where most of the client based or can be called service based organization have seen a drastically change where the client involved directly either the process making as scrum master. In the process of the development, we come across the bugs either from the testing or production environment. In this paper, we have tracked the each bug and corresponding solution; facilitates to increase the efficiency of bug fix. In that extend, we have given emphasis on the process of the governance in terms of the all the phases starting from the requirement gathering ending at the product delivery and maintenance, along with priority of bug which is distributed and make sense in terms of the quality and time with the state, behaviour and identity. Hence we have given emphasis on the part of the query based approach to rally like tool which make the process of the development on the distributed easier and simplified.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"103 1","pages":"108-111"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80644547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586846
Bidur Khanal, S. Pant, Kushal Pokharel, S. Gaire
Mental States are a function of brain activity; with advancements in Brain Computer Interface (BCI) tools, they can be effectively predicted. Generally, BCI researches are sophisticated requiring multi-channel electrodes, and often carried out in controlled lab environment. This paper illustrates that a simple BCI research, targeting specific region of brain, can be conducted with an elementary setup. A method is demonstrated to predict the level of attentiveness using Electroencephalography (EEG) signal obtained from single-channel, non-invasive, dry-electrode placed on prefrontal cortex region. The acquired raw signal was processed to obtain features which were used to classify the attention state into three classes. As Support Vector Machine (SVM) is more effective in training and classification of high dimensional data, it was implemented and its results were studied.
{"title":"Mental State Prediction by Deployment of Trained SVM Model on EEG Brain Signal","authors":"Bidur Khanal, S. Pant, Kushal Pokharel, S. Gaire","doi":"10.1109/CCCS.2018.8586846","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586846","url":null,"abstract":"Mental States are a function of brain activity; with advancements in Brain Computer Interface (BCI) tools, they can be effectively predicted. Generally, BCI researches are sophisticated requiring multi-channel electrodes, and often carried out in controlled lab environment. This paper illustrates that a simple BCI research, targeting specific region of brain, can be conducted with an elementary setup. A method is demonstrated to predict the level of attentiveness using Electroencephalography (EEG) signal obtained from single-channel, non-invasive, dry-electrode placed on prefrontal cortex region. The acquired raw signal was processed to obtain features which were used to classify the attention state into three classes. As Support Vector Machine (SVM) is more effective in training and classification of high dimensional data, it was implemented and its results were studied.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"16 1","pages":"82-85"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74857381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/CCCS.2018.8586838
V. Butram, Alok Naugarhiya
Piezoelectric Energy harvester provides an alternate source of energy to feed ultra-low power electronic devices as well as WSNs. This paper demonstrates a new idea of covering free end of unimorph PZT-5H cantilever structure with Tungsten proof mass to get higher power with minimum active area. The simulation results an electrical output power and mechanical to electrical conversion efficiency of the piezoelectric generator. The proof mass is arranged in all four sides of the free end of cantilever, resulting in 0.32 V of electric potential at 280 Hz of frequency for input acceleration of 1.0 g. Based on the results obtained, the reported structure harvests $1,mu mathrm {W}$ of power with $5,mathrm {M}Omega $ of resistive load and constitute very less active area of $approx 0.085(mm)^{2}$.
{"title":"Non Traditional Proof Mass Arrangement in Cantilever based Piezoelectric Energy Harvester","authors":"V. Butram, Alok Naugarhiya","doi":"10.1109/CCCS.2018.8586838","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586838","url":null,"abstract":"Piezoelectric Energy harvester provides an alternate source of energy to feed ultra-low power electronic devices as well as WSNs. This paper demonstrates a new idea of covering free end of unimorph PZT-5H cantilever structure with Tungsten proof mass to get higher power with minimum active area. The simulation results an electrical output power and mechanical to electrical conversion efficiency of the piezoelectric generator. The proof mass is arranged in all four sides of the free end of cantilever, resulting in 0.32 V of electric potential at 280 Hz of frequency for input acceleration of 1.0 g. Based on the results obtained, the reported structure harvests $1,mu mathrm {W}$ of power with $5,mathrm {M}Omega $ of resistive load and constitute very less active area of $approx 0.085(mm)^{2}$.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"48 1","pages":"100-103"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77621125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-08DOI: 10.1007/978-3-030-00012-7_50
Qing Ye, Xiaomeng Yang, Xixi Yan, Zongqu Zhao
{"title":"Efficient Group Signature Scheme Over NTRU Lattice","authors":"Qing Ye, Xiaomeng Yang, Xixi Yan, Zongqu Zhao","doi":"10.1007/978-3-030-00012-7_50","DOIUrl":"https://doi.org/10.1007/978-3-030-00012-7_50","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"37 1","pages":"554-562"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75643706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-06-08DOI: 10.1007/978-3-030-00006-6_40
X. Xie, Qiangqing Zheng, Zhihong Guo, Qi Wang, Xinrong Li
{"title":"Design and Research on B2B Trading Platform Based on Consortium Blockchains","authors":"X. Xie, Qiangqing Zheng, Zhihong Guo, Qi Wang, Xinrong Li","doi":"10.1007/978-3-030-00006-6_40","DOIUrl":"https://doi.org/10.1007/978-3-030-00006-6_40","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":"36 1","pages":"436-447"},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75854593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}