首页 > 最新文献

2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
RBF Neural Network Controller In Shunt Active Power Filter 并联有源电力滤波器中的RBF神经网络控制器
P. S. Puhan, S. Sandeep, G. Kumar
Performance Improvement of Shunt active Power filter using different control techniques is an important research area in the recent age. This paper explores the effectiveness of Radial Basis Function Neural Network controller filtering technique in Conjunction with indirect current controller and proportional Integral. Extensive simulation studies under steady state condition are conducted with the proposed control Techniques, which proves the effectiveness of RBF controller, To validate the results obtained, Control technique is verified through real time application using fast processor d-SPACE1104.
采用不同的控制技术提高并联型有源电力滤波器的性能是近年来的一个重要研究领域。本文探讨了径向基函数神经网络控制器滤波技术与间接电流控制器和比例积分相结合的有效性。在稳态条件下对所提出的控制技术进行了大量的仿真研究,验证了RBF控制器的有效性。为了验证所得到的结果,利用d-SPACE1104快速处理器对控制技术进行了实时应用验证。
{"title":"RBF Neural Network Controller In Shunt Active Power Filter","authors":"P. S. Puhan, S. Sandeep, G. Kumar","doi":"10.1109/ICCMC.2018.8487574","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487574","url":null,"abstract":"Performance Improvement of Shunt active Power filter using different control techniques is an important research area in the recent age. This paper explores the effectiveness of Radial Basis Function Neural Network controller filtering technique in Conjunction with indirect current controller and proportional Integral. Extensive simulation studies under steady state condition are conducted with the proposed control Techniques, which proves the effectiveness of RBF controller, To validate the results obtained, Control technique is verified through real time application using fast processor d-SPACE1104.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"18 1","pages":"190-194"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81473849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Identifying Provenance of Information and Anomalous Paths in Attributed Social Networks 在属性社会网络中识别信息来源和异常路径
Hetuk Trivedi, P. Bindu, P. S. Thilagam
Information provenance problem is an important and challenging problem in social network analysis and it deals with identifying the origin or source of information spread in a social network. In this paper, an approach for detecting the source of an information spread as well as suspicious anomalous paths in a social network is proposed. An anomalous path is a sequence of nodes that propagates an anomalous information to the given destination nodes who cause an anomalous event. The proposed approach is based on attribute-based anomalies and information cascading technique. The anomalous paths are identified in two steps. The first step assigns an anomalous score to each and every vertex in the given graph based on suspicious attributes. The second step detects the source and suspicious anomalous paths in the network using the anomaly scores. The approach is tested on datasets such as Enron and Facebook to demonstrate its effectiveness. Detecting anomalous paths is useful in several applications including identifying terrorist attacks communication path, disease spreading pattern, and match-fixing hidden path between bookie and a cricketer.
信息来源问题是社会网络分析中的一个重要问题,它涉及识别社会网络中传播的信息的来源或来源。本文提出了一种在社交网络中检测信息传播源和可疑异常路径的方法。异常路径是将异常信息传播到导致异常事件的给定目标节点的节点序列。该方法基于基于属性的异常和信息级联技术。异常路径的识别分两步进行。第一步是根据可疑属性为给定图中的每个顶点分配异常分数。第二步使用异常分数检测网络中的源异常和可疑异常路径。这种方法在安然(Enron)和Facebook等数据集上进行了测试,以证明其有效性。检测异常路径在许多应用中是有用的,包括识别恐怖袭击的通信路径,疾病传播模式,以及赌徒和板球运动员之间的假球隐藏路径。
{"title":"Identifying Provenance of Information and Anomalous Paths in Attributed Social Networks","authors":"Hetuk Trivedi, P. Bindu, P. S. Thilagam","doi":"10.1109/ICCMC.2018.8488006","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488006","url":null,"abstract":"Information provenance problem is an important and challenging problem in social network analysis and it deals with identifying the origin or source of information spread in a social network. In this paper, an approach for detecting the source of an information spread as well as suspicious anomalous paths in a social network is proposed. An anomalous path is a sequence of nodes that propagates an anomalous information to the given destination nodes who cause an anomalous event. The proposed approach is based on attribute-based anomalies and information cascading technique. The anomalous paths are identified in two steps. The first step assigns an anomalous score to each and every vertex in the given graph based on suspicious attributes. The second step detects the source and suspicious anomalous paths in the network using the anomaly scores. The approach is tested on datasets such as Enron and Facebook to demonstrate its effectiveness. Detecting anomalous paths is useful in several applications including identifying terrorist attacks communication path, disease spreading pattern, and match-fixing hidden path between bookie and a cricketer.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"14 1","pages":"914-919"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82302986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Mining with Linked Data: Past, Present, and Future 关联数据的数据挖掘:过去、现在和未来
Rohit Beniwal, Vikas Gupta, Manish Rawat, Rishabh Aggarwal
Linked Data has emerged as a popular method for representing structured data. One of the prime aims is to convert today’s web of documents into a web of data where the data is machine-readable as well as processable. This research paper focuses on the data mining techniques used for mining the raw data. However, these techniques are cumbersome and can be optimized using Linked Data. Hence, we discuss the data mining techniques with Linked Data that may play a pivotal role in future in extracting meaningful information from unstructured or semi-structured data.
关联数据已经成为表示结构化数据的一种流行方法。主要目标之一是将今天的文档网络转换为数据网络,其中的数据既可由机器读取,又可由机器处理。本文主要研究用于挖掘原始数据的数据挖掘技术。然而,这些技术很麻烦,可以使用关联数据进行优化。因此,我们讨论了关联数据的数据挖掘技术,这些技术可能在未来从非结构化或半结构化数据中提取有意义的信息方面发挥关键作用。
{"title":"Data Mining with Linked Data: Past, Present, and Future","authors":"Rohit Beniwal, Vikas Gupta, Manish Rawat, Rishabh Aggarwal","doi":"10.1109/ICCMC.2018.8487861","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487861","url":null,"abstract":"Linked Data has emerged as a popular method for representing structured data. One of the prime aims is to convert today’s web of documents into a web of data where the data is machine-readable as well as processable. This research paper focuses on the data mining techniques used for mining the raw data. However, these techniques are cumbersome and can be optimized using Linked Data. Hence, we discuss the data mining techniques with Linked Data that may play a pivotal role in future in extracting meaningful information from unstructured or semi-structured data.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"39 1","pages":"1031-1035"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82327771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Modern Approach for Load Balancing Using Forest Optimization Algorithm 基于森林优化算法的现代负载平衡方法
Subasish Mohapatra, Ishan Aryendu, Anshuman Panda, A. K. Padhi
Load Balancing plays a dynamic role in keeping the tempo of the Cloud Computing framework. This research paper proposes a Forest Optimization Algorithm for load balancing in distributed computing structure. This depends on the conduct of the trees in the forest and uses the seed dispersal strategies for streamlining the makespan, which results in improved average response time and the total execution time. The simulation results prove that the proposed algorithm gives better outcomes than its counterpart load balancing algorithms.
负载平衡在保持云计算框架的速度方面起着动态的作用。针对分布式计算结构下的负载均衡问题,提出了一种森林优化算法。这取决于森林中树木的行为,并使用种子传播策略来简化makespan,从而提高平均响应时间和总执行时间。仿真结果表明,该算法比同类负载均衡算法具有更好的结果。
{"title":"A Modern Approach for Load Balancing Using Forest Optimization Algorithm","authors":"Subasish Mohapatra, Ishan Aryendu, Anshuman Panda, A. K. Padhi","doi":"10.1109/ICCMC.2018.8487765","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487765","url":null,"abstract":"Load Balancing plays a dynamic role in keeping the tempo of the Cloud Computing framework. This research paper proposes a Forest Optimization Algorithm for load balancing in distributed computing structure. This depends on the conduct of the trees in the forest and uses the seed dispersal strategies for streamlining the makespan, which results in improved average response time and the total execution time. The simulation results prove that the proposed algorithm gives better outcomes than its counterpart load balancing algorithms.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90385415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PARTS OF SPEECH TAGGING FOR KONKANI LANGUAGE konkani语词性标注
Diksha N. Prabhu Khorjuvenkar, Megha Ainapurkar, S. Chagas
It is remarkable to note that the scope of Natural Language Processing (NLP) is developing and increasing in the area of text mining. Natural Language Processing is a field that covers computer understanding and deals with manipulation of human language. Human language is an unstructured source of information, and hence to use it, as an input to a computer program, it has to be, first, converted into a structured format [3]. Parts of Speech (POS) tagging is one of the steps which assigns a particular part of speech to a respective word. POS is difficult because most words tend to have more than one parts of speech in different cases and some parts of speech are complex or unspoken. This paper aims at developing part of speech tagging model for Konkani language, using the Konkani corpus.
值得注意的是,自然语言处理(NLP)在文本挖掘领域的应用范围正在不断扩大。自然语言处理是一个涵盖计算机理解和处理人类语言操作的领域。人类语言是一种非结构化的信息源,因此要使用它作为计算机程序的输入,首先必须将其转换为结构化格式[3]。词性标注是将词性标注在一个词上的步骤之一。词性定位是困难的,因为大多数单词在不同的情况下往往有多个词性,有些词性是复杂的或未说出的。本文旨在利用Konkani语料库开发Konkani语词性标注模型。
{"title":"PARTS OF SPEECH TAGGING FOR KONKANI LANGUAGE","authors":"Diksha N. Prabhu Khorjuvenkar, Megha Ainapurkar, S. Chagas","doi":"10.1109/iccmc.2018.8487620","DOIUrl":"https://doi.org/10.1109/iccmc.2018.8487620","url":null,"abstract":"It is remarkable to note that the scope of Natural Language Processing (NLP) is developing and increasing in the area of text mining. Natural Language Processing is a field that covers computer understanding and deals with manipulation of human language. Human language is an unstructured source of information, and hence to use it, as an input to a computer program, it has to be, first, converted into a structured format [3]. Parts of Speech (POS) tagging is one of the steps which assigns a particular part of speech to a respective word. POS is difficult because most words tend to have more than one parts of speech in different cases and some parts of speech are complex or unspoken. This paper aims at developing part of speech tagging model for Konkani language, using the Konkani corpus.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"36 1","pages":"605-607"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85209946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Web Effort Estimation Using FP and WO: A Critical Study 基于FP和WO的Web工作量估算:一项批判性研究
S. Saif, A. Wahid
Web based services are becoming more ubiquitous. The ease-in access and the availability of web applications have increased the volume of the users who routinely access web for diverse functionality. Most of the organisations have endorsed web applications over traditional applications as a medium to deliver and offer their diverse services. With the increasing demand, the complexity of web application development has increased proportionally. The most important and critical component in web project management is to develop web projects on time and within budget. Accurate budget estimates have positive and productive impact on project management. Accuracy in estimated web efforts have direct and deeper influence on development industry. It is mandatory for any development industry to ensure accuracy and effectiveness in their web effort estimation process. This helps project management to acquire and retain good customer base and reputation among the other competing companies. This paper is an attempt to study the impact and effectiveness of function points(FP) and web objects(WO) on web size and consequently on web efforts estimation. A dataset of ten industrial web projects were used and it was observed that size estimated by using WO was more than FP in most of the projects however, the effort in most of the projects calculated by using WO were significantly better in comparison to FP.
基于Web的服务正变得越来越普遍。web应用程序的易于访问和可用性增加了经常访问web以获取各种功能的用户的数量。大多数组织都支持web应用程序而不是传统应用程序作为交付和提供各种服务的媒介。随着需求的增加,web应用程序开发的复杂性也成比例地增加。在网络项目管理中最重要和最关键的组成部分是在预算范围内按时开发网络项目。准确的预算估算对项目管理具有积极和富有成效的影响。估算网络工作量的准确性对开发行业有着直接而深刻的影响。任何开发行业都必须确保其web工作量评估过程的准确性和有效性。这有助于项目管理在其他竞争公司中获得并保持良好的客户基础和声誉。本文试图研究功能点(FP)和web对象(WO)对web大小的影响和有效性,从而对web工作量估计产生影响。使用了十个工业网络项目的数据集,观察到在大多数项目中,使用WO估计的规模大于FP,然而,与FP相比,使用WO计算的大多数项目的工作量明显更好。
{"title":"Web Effort Estimation Using FP and WO: A Critical Study","authors":"S. Saif, A. Wahid","doi":"10.1109/ICCMC.2018.8487472","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487472","url":null,"abstract":"Web based services are becoming more ubiquitous. The ease-in access and the availability of web applications have increased the volume of the users who routinely access web for diverse functionality. Most of the organisations have endorsed web applications over traditional applications as a medium to deliver and offer their diverse services. With the increasing demand, the complexity of web application development has increased proportionally. The most important and critical component in web project management is to develop web projects on time and within budget. Accurate budget estimates have positive and productive impact on project management. Accuracy in estimated web efforts have direct and deeper influence on development industry. It is mandatory for any development industry to ensure accuracy and effectiveness in their web effort estimation process. This helps project management to acquire and retain good customer base and reputation among the other competing companies. This paper is an attempt to study the impact and effectiveness of function points(FP) and web objects(WO) on web size and consequently on web efforts estimation. A dataset of ten industrial web projects were used and it was observed that size estimated by using WO was more than FP in most of the projects however, the effort in most of the projects calculated by using WO were significantly better in comparison to FP.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"174 1","pages":"357-361"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79578501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Overview of Primary User Emulation Attack in Cognitive Radio Networks 认知无线网络中主用户仿真攻击研究综述
Ishu Gupta, O. P. Sahu
With the emerging new license-exempt wireless devices, the problem of spectrum scarcity has become a major concern. Cognitive Radio is a new technology that is widely studied nowadays to prevent the problem of spectrum shortage and its underutilization. The main task to implement this technology lies in sensing the available free spectrum. Most of the present research revolves around spectrum sensing in Cognitive radio Network (CRN). However, due to dynamic nature of Cognitive Radio technology, it suffers from various security threats. In this paper, one such attack named as Primary User Emulation Attack (PUEA) that degrades the performance of CRNs drastically is reviewed. Also, future scope and challenges are discussed.
随着新型免牌照无线设备的出现,频谱短缺问题已成为人们关注的主要问题。认知无线电是目前为防止频谱短缺和利用不足而广泛研究的一项新技术。实现该技术的主要任务是检测可用的自由频谱。目前的研究大多围绕认知无线电网络(CRN)中的频谱感知展开。然而,由于认知无线电技术的动态性,它受到各种安全威胁。本文综述了一种严重降低crn性能的主用户仿真攻击(PUEA)。此外,还讨论了未来的范围和挑战。
{"title":"An Overview of Primary User Emulation Attack in Cognitive Radio Networks","authors":"Ishu Gupta, O. P. Sahu","doi":"10.1109/ICCMC.2018.8487476","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487476","url":null,"abstract":"With the emerging new license-exempt wireless devices, the problem of spectrum scarcity has become a major concern. Cognitive Radio is a new technology that is widely studied nowadays to prevent the problem of spectrum shortage and its underutilization. The main task to implement this technology lies in sensing the available free spectrum. Most of the present research revolves around spectrum sensing in Cognitive radio Network (CRN). However, due to dynamic nature of Cognitive Radio technology, it suffers from various security threats. In this paper, one such attack named as Primary User Emulation Attack (PUEA) that degrades the performance of CRNs drastically is reviewed. Also, future scope and challenges are discussed.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"81 12","pages":"27-31"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91437713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Temperature & Humidity Control By Using Neural Network For Oyster Mushroom Cultivation 基于神经网络的平菇栽培温湿度控制
D. Gajbhiye, Kavita Joshi, Madana Mekala
In oyster mushroom cultivation process, the temperature and the humidity are very important parameter for the growth of mushroom. Controlling temperature and humidity are very delicate task because cultivation space remains stable at temperatures range between 22 -28 ° C and humidity 60-90 %. For accurate measurement of temperature and humidity we are proposing a project in which the values of the humidity and temperature are given to the Arduino through serial communication and the ANN is used for decision making of DC FAN and Mist Maker which are basically used to control temperature and Humidity respectively. The aim of this system is to control the temperature and humidity automatically in mushroom cultivation plant.
在平菇栽培过程中,温度和湿度是影响平菇生长的重要参数。控制温度和湿度是一项非常微妙的任务,因为栽培空间在温度22 -28°C和湿度60- 90%之间保持稳定。为了精确测量温度和湿度,我们提出了一个项目,通过串行通信将湿度和温度的值提供给Arduino,并使用ANN对DC FAN和Mist Maker进行决策,这两个基本分别用于控制温度和湿度。本系统的目的是实现香菇栽培厂房的温湿度自动控制。
{"title":"Temperature & Humidity Control By Using Neural Network For Oyster Mushroom Cultivation","authors":"D. Gajbhiye, Kavita Joshi, Madana Mekala","doi":"10.1109/ICCMC.2018.8487839","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487839","url":null,"abstract":"In oyster mushroom cultivation process, the temperature and the humidity are very important parameter for the growth of mushroom. Controlling temperature and humidity are very delicate task because cultivation space remains stable at temperatures range between 22 -28 ° C and humidity 60-90 %. For accurate measurement of temperature and humidity we are proposing a project in which the values of the humidity and temperature are given to the Arduino through serial communication and the ANN is used for decision making of DC FAN and Mist Maker which are basically used to control temperature and Humidity respectively. The aim of this system is to control the temperature and humidity automatically in mushroom cultivation plant.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"17 1","pages":"135-139"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90523492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Usability and Learnability of the "Blackboard" LMS Using SUS and Data Mining 利用SUS和数据挖掘评估“黑板”LMS的可用性和可学习性
Khalid Al-Omar
Learning management systems (LMSs) provide integrated platforms of various technologies to support instructors and students. Usability evaluation is an essential factor to measure how well technology works for users. The aim of this study is to examine the usability of the LMS in King Abdulaziz University by using some pre-defined usability standards, such as a system usability scale (SUS) questionnaire. A further investigation used data mining techniques (sentiment analysis and clustering) in order to find out the details of any usability problems. The results show that distance education students suffer the most, followed by external students. On the other hand, instructors seem to have a less negative attitude than students towards Blackboard. Overall, the usability of LMSs at KAU is inadequate and needs to be enhanced for all types of users by customising blackboard according to each group.
学习管理系统(lms)提供各种技术的综合平台,以支持教师和学生。可用性评估是衡量技术对用户工作效果的重要因素。本研究的目的是通过使用一些预先定义的可用性标准,如系统可用性量表(SUS)问卷来检查阿卜杜勒阿齐兹国王大学LMS的可用性。为了找出可用性问题的细节,进一步的调查使用了数据挖掘技术(情感分析和聚类)。结果表明,远程教育学生受影响最大,其次是校外学生。另一方面,教师对Blackboard的态度似乎没有学生那么消极。整体而言,教学管理系统的可用性不足,需要根据不同的组别为不同的用户定制黑板。
{"title":"Evaluating the Usability and Learnability of the \"Blackboard\" LMS Using SUS and Data Mining","authors":"Khalid Al-Omar","doi":"10.1109/ICCMC.2018.8488038","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488038","url":null,"abstract":"Learning management systems (LMSs) provide integrated platforms of various technologies to support instructors and students. Usability evaluation is an essential factor to measure how well technology works for users. The aim of this study is to examine the usability of the LMS in King Abdulaziz University by using some pre-defined usability standards, such as a system usability scale (SUS) questionnaire. A further investigation used data mining techniques (sentiment analysis and clustering) in order to find out the details of any usability problems. The results show that distance education students suffer the most, followed by external students. On the other hand, instructors seem to have a less negative attitude than students towards Blackboard. Overall, the usability of LMSs at KAU is inadequate and needs to be enhanced for all types of users by customising blackboard according to each group.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"386-390"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80172791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
AN INTELLIGENT AND NOVEL ALGORITHM FOR SECURING VULNERABLE USERS OF ONLINE SOCIAL NETWORK 一种保护在线社交网络弱势用户的智能新算法
S. Revathi, M. Suriakala
The last few years have witnessed a very fast-paced growth in the user base and activities of Online Social Networks (OSN). Their growth is attributed to the trust that they have received from people. People engage in social networks to make friends, chat, upload and like photos, update their status, and post comments. The use of social networks causes users to think less about the related security and privacy concerns in terms of OSNs. Trusting social networks leads to serious privacy concerns. Users disclose their information voluntarily, not knowing who exactly is going to access or use their data. They are less concerned about how safe their private information is, as they are more interested in meeting different people from across the globe. Their desire to connect with their family, friends, and virtual friends is apparent from their use of OSNs. The widespread use of social networks has also given rise to widespread impersonation. It is difficult to find a feasible solution to help counteract the negative consequences of this problem. This paper discusses the reasons behind information leaks, particularly, the way in which OSNs contribute to the intelligence used by hackers. A number of security measures for organizations are also included in the paper, to help them combat the activities related to leakage of information with respect to OSNs. It also identifies the future direction in terms of in-depth research in the fields by establishing a culture of security and implementing behavioral change. The Description Logic Rule Generation algorithm is proposed in the paper to be able to find and analyze the nature of vulnerabilities and attackers. The algorithm identifies vulnerable users on the basis of a sharing threshold. The users are removed in case they cross the threshold values. The paper also presents the security analysis of results of the OSNs popularity among users.
过去几年见证了在线社交网络(OSN)的用户基础和活动的快速增长。他们的成长归功于他们从人们那里得到的信任。人们在社交网络上交友、聊天、上传和点赞照片、更新状态和发表评论。社交网络的使用导致用户较少考虑与osn相关的安全和隐私问题。信任社交网络会导致严重的隐私问题。用户自愿披露他们的信息,不知道究竟谁将访问或使用他们的数据。他们不太关心自己的私人信息是否安全,因为他们对结识来自世界各地的不同的人更感兴趣。他们与家人、朋友和虚拟朋友联系的愿望从他们对osn的使用中可以明显看出。社交网络的广泛使用也导致了广泛的假冒。很难找到一个可行的解决方案来帮助抵消这个问题的负面影响。本文讨论了信息泄露背后的原因,特别是osn为黑客使用的情报做出贡献的方式。该文件还为机构提供了一些安全措施,以帮助他们打击与osn有关的信息泄露活动。它还通过建立安全文化和实施行为改变,确定了在该领域深入研究的未来方向。为了能够发现和分析漏洞和攻击者的性质,本文提出了描述逻辑规则生成算法。该算法基于共享阈值识别易受攻击的用户。如果用户超过阈值,则删除用户。本文还对osn在用户中的受欢迎程度进行了安全性分析。
{"title":"AN INTELLIGENT AND NOVEL ALGORITHM FOR SECURING VULNERABLE USERS OF ONLINE SOCIAL NETWORK","authors":"S. Revathi, M. Suriakala","doi":"10.1109/ICCMC.2018.8487760","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487760","url":null,"abstract":"The last few years have witnessed a very fast-paced growth in the user base and activities of Online Social Networks (OSN). Their growth is attributed to the trust that they have received from people. People engage in social networks to make friends, chat, upload and like photos, update their status, and post comments. The use of social networks causes users to think less about the related security and privacy concerns in terms of OSNs. Trusting social networks leads to serious privacy concerns. Users disclose their information voluntarily, not knowing who exactly is going to access or use their data. They are less concerned about how safe their private information is, as they are more interested in meeting different people from across the globe. Their desire to connect with their family, friends, and virtual friends is apparent from their use of OSNs. The widespread use of social networks has also given rise to widespread impersonation. It is difficult to find a feasible solution to help counteract the negative consequences of this problem. This paper discusses the reasons behind information leaks, particularly, the way in which OSNs contribute to the intelligence used by hackers. A number of security measures for organizations are also included in the paper, to help them combat the activities related to leakage of information with respect to OSNs. It also identifies the future direction in terms of in-depth research in the fields by establishing a culture of security and implementing behavioral change. The Description Logic Rule Generation algorithm is proposed in the paper to be able to find and analyze the nature of vulnerabilities and attackers. The algorithm identifies vulnerable users on the basis of a sharing threshold. The users are removed in case they cross the threshold values. The paper also presents the security analysis of results of the OSNs popularity among users.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"214-219"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78378740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 Second International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1