{"title":"Students' performance tracking in distributed open education using big data analytics","authors":"A. S. Hussein, Hamayun A. Khan","doi":"10.1145/3018896.3018975","DOIUrl":"https://doi.org/10.1145/3018896.3018975","url":null,"abstract":"The field of Big Data Analytics (BDA) is advancing rapidly, and it is finding adoption in diverse areas such as Health, Commerce, Logistics, Retail and Manufacturing to name a few. Adoption of BDA techniques in the field of Higher Education is new, and it is steadily increasing. In this work, BDA techniques have been applied to track the Key Academic Performance Indicators (KAPIs) related to students at the Arab Open University (AOU) and to support the corresponding decisions in this regard. Since the AOU is a Pan Arab multi-campus distributed institution operating in 8 countries and makes extensive use of a wide range of cloud based applications to manage the students' life cycle, hence it is an ideal candidate for adoption of BDA techniques to track students' KAPIs across the AOU multiple country campuses. In order to achieve this objective, we have used IBM Watson Analytics (WA) platform to track the students' KAPIs. As a pilot project, we have focused in this work on the Information Technology and Computing (ITC) academic programme across the AOU. The Exploration and Business Intelligence BDA capabilities of WA have enabled us to analyze and track the academic KAPIs of the ITC students across AOU country campuses while the Predictive Analytics (PA) has led to identifying the dominant factors behind some of our problems such as students drop out rates. One of the most promising outcomes is the decision support dashboards such as the one related to the Student Risk Factor (SRF). By identifying At Risk Students, such dashboard can act as an \"Early Alert System\" to enable the AOU management to take corrective action to provide needed support to such students.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114537000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Image splicing detection using singular value decomposition","authors":"Z. Moghaddasi, H. Jalab, R. M. Noor","doi":"10.1145/3018896.3036383","DOIUrl":"https://doi.org/10.1145/3018896.3036383","url":null,"abstract":"The use of digital images in criminal activities is common because they can be easily manipulated with the application of various available software tools. Image splicing is a common operation for image forgery. In order to detect the spliced images, several methods utilizing the statistical features of the digital images were proposed. In this study, an efficient, singular value, decomposition-based feature extraction method for image splicing detection is presented. Kernel Principal Component Analysis is also applied as classifier feature preprocessor to improve the classification process; and finally, support vector machine is used to distinguish the authenticated and spliced images. The results show a detection accuracy of 98.78% for the proposed method with only 50-dimensional feature vector.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ENAGS: energy and network-aware genetic scheduling algorithm on cloud data centers","authors":"Soha Rawas, W. Itani, A. Zekri, A. Zaart","doi":"10.1145/3018896.3018944","DOIUrl":"https://doi.org/10.1145/3018896.3018944","url":null,"abstract":"Cloud computing plays a significant role in today's network computing by delivering virtualized resources as pay-as-you-go services over the Internet. However, the growing demand drastically increases the energy consumption of data centers, which has become a prominent problem. Hence, energy efficient solutions are required to minimize system power consumption and increase the availability of computational resources and obviously reduce the operational expenses. In this paper we present ENAGS (Energy and Network-Aware Genetic Scheduling algorithm) to minimize the energy consumption of servers and reduce the network traffic. The proposed algorithm takes into account communication dependencies among VMs and computational requirements of tasks to improve communication performance and minimize the energy consumption by maximizing the resource utilization. Our experimental results show that the proposed ENAGS algorithm can reduce data center energy consumption as well as network traffic by approximately 38% compared to other placement algorithms.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mir Lodro, Muhammad Younis Lodro, Nahdia Majeed Lodro, T. J. Khanzada, S. Greedy
{"title":"Correlated SNR and double threshold based energy conservation in cognitive radio wireless sensor networks","authors":"Mir Lodro, Muhammad Younis Lodro, Nahdia Majeed Lodro, T. J. Khanzada, S. Greedy","doi":"10.1145/3018896.3056781","DOIUrl":"https://doi.org/10.1145/3018896.3056781","url":null,"abstract":"In this work various techniques are proposed to reduce the energy consumption in Cognitive Radio Wireless Sensor Networks (CRWSNs) and hence enhance the network life-time of CRWSNs. We propose CRWSNs network life-time can be improved by using concept of correlated signal-to-noise ratio (SNR) and on-demand spectrum sensing with double threshold based energy-detector. It is analytical and intuitively explained that energy in densely deployed CRWSNs can be conserved by using double threshold energy-detector and limiting sensing activity to few sensors which participate in spectrum sensing and pass the decision to neighboring sensors with little compromise in performance degradation. The sensing decision of current sensing node can be used because of the correlated SNR values hence little difference in probability of detection and probability of false alarm values.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127633751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comprehensive analytical model for QoS-based routing protocols evaluation in WBANs","authors":"Nawel Yessad, Farah-Sarah Ouada, Mawloud Omar","doi":"10.1145/3018896.3036369","DOIUrl":"https://doi.org/10.1145/3018896.3036369","url":null,"abstract":"WBANs (Wireless Body Area Networks) emerge as a promising solution for monitoring human's physiological activities and actions and overcoming a lot of promising application scenarios. The increasing demand on real time applications in WBANs anticipates efficient quality of service (QoS) based routing protocols for data delivery. In this paper, we develop an analytical model for the framework of QoS-based routing protocols taking in charge important metrics in order to estimate the success and failure of routing process. The proposed analytical model is based on Markov chain, in which an absorbing chain is constructed to characterize the packet delivery process which take into consideration priorities of traffics, single-hop and multi-hop strategies. An extensive numerical results are presented to illustrate the effectiveness of the proposed model.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132268332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Selectivity estimation in web query optimization","authors":"Shashidhar H R, G T Raju, V. Murthy","doi":"10.1145/3018896.3152305","DOIUrl":"https://doi.org/10.1145/3018896.3152305","url":null,"abstract":"Web Query optimization techniques have not scaled up to the quality of classical database optimizers. The main reason is the lack of availability of meta data statistics from local data sources. This leads to enormous errors in the calculation of optimization parameters such as selectivity of an operator which can degrade the query execution performance and result in bloated response time. In this work, the problem of selectivity estimation is addressed through Histogram construction and Probabilistic selectivity estimation. Both these techniques are robust and scalable to any kind of Web Query Engine. Empirical results also demonstrate the superior quality of these techniques.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124178903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From smart-city and IoT simulation to big data generation","authors":"A. Bounceur","doi":"10.1145/3018896.3066908","DOIUrl":"https://doi.org/10.1145/3018896.3066908","url":null,"abstract":"Our world is digitized everyday and increasingly. In 2020, it is expected that over 70% of the population will live in or around cities. To guarantee a good quality of life, it is necessary to ensure fast and reliable services in all areas, in particular those which are mainly based on the use of connected objects. This is one of the cornerstones of a smart city project. It will make possible to provide close to real-time the remote monitoring of sick patients, the monitoring of the environment in order to know its evolution over time and to anticipate developments that can be harmful to health and the environment itself, and to accurately analyze the signals transmitted by the on-board sensors. To further develop domains such as eHealth or the monitoring of other networks in the context of Smart Cities, fast and reliable design tools are needed. Their objectives are to study the realizability of such networks, their behavior in terms of energy consumption, safety, cost and other reliability parameters. This keynote aims to present a new platform called CupCarbon that allows to design systems of connected objects mainly representing sensors and to prepare future deployments of large-scale IoT infrastructures for Smart cities in optimal conditions. This kind of platforms will be a part of systems in the world that will participate in the generation of Big Data.1","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"23 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114849157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A deep relation learning method for IoT interoperability enhancement within semantic formalization framework","authors":"Bin Xiao, R. Rahmani","doi":"10.1145/3018896.3036392","DOIUrl":"https://doi.org/10.1145/3018896.3036392","url":null,"abstract":"Internet of Things (IoT) is facing with the interoperability issue due to the massive amount of heterogeneous entities (both physical and virtual entities) constantly generating heterogeneous data objects; semantic formalization has been widely recognized as a basis for the IoT interoperability, by which IoT can acquire the ability to comprehend data and further recognize the logic relations among heterogeneous IoT entities and heterogeneous data objects, thus to establish mutual understanding between each other to support with interoperability. Even semantic-driven track has emphasizes a lot on the logic relations in connection to the service rules and policies for interoperability, it is important that the quantity-driven relations should be also explored with adhering to the framework of semantic formalization. This paper explores a Deep Recursive Auto-encoders formed data relation learner in line with the semantic framework, which supports the data interoperability enhancement in a quantity-driven way based on the logic-driven framework. The learner starts with representing the virtual IoT entities via feature extraction; based on that, learner is trained in a manner of considering the surrounding relations of the targeted entity. As a baseline, a contrast learner with \"regular\" structure has been proposed which cannot functionally support semantic framework, even though the semantic formalization is indispensable; regardless the limitations in lab environment, the conducted experiments show that the proposed learner performs a bit better than the contrast learner under the same conditions. So that, the proposed method can synergistically enhances the interoperability within a semantic formalization framework.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116975279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cloud computing network and an optimization algorithm for IaaS providers","authors":"G. Colajanni, P. Daniele","doi":"10.1145/3018896.3065838","DOIUrl":"https://doi.org/10.1145/3018896.3065838","url":null,"abstract":"Cloud Computing is a type of Internet-based computing, much used in recent years, that relies on sharing computer processing resources and data to computers and other devices on demand, from any location and at any time rather than having local servers or personal devices to handle applications. This shared IT infrastructure contains large pools of systems that are linked together. Often, virtualization techniques are used to maximize the power of cloud computing. In this paper we describe the network of a cloud computing environment with five different layers, represented by hardware/datacenter, infrastructure, platform, application and end-users. Then, we present the mathematical model of the network and study the behavior of the typical IaaS provider in order to find the optimization problem. A computational procedure for the calculus of the optimal solutions is proposed and is applied to a numerical example.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123616634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Siti Salmah Md. Kassim, M. Salleh, A. Zainal, Abdul Razak Che Husin
{"title":"Risk tolerance and trust issues in cloud-based E-learning","authors":"Siti Salmah Md. Kassim, M. Salleh, A. Zainal, Abdul Razak Che Husin","doi":"10.1145/3018896.3018973","DOIUrl":"https://doi.org/10.1145/3018896.3018973","url":null,"abstract":"Moving in tandem with internet services nowadays, education institutions should leverage cloud computing which is considered as ready-made platform. One of the key performance index (KPI) for educational institutions progress in teaching and learning process is the level of enhancement in e-learning applications such as adopting the cloud computing. However, trust and risk issues obstruct the adoption process, whereas many questions arise regarding the reliability of cloud as a public platform for running and storing important and confidential data. This paper aims to identify the factors that affect the risk tolerance and user trust in cloud-based e-learning and proposes a method to deal with users and providers requirements. In particular, this paper identify risk tolerance and trust factors in cloud-based e-learning through surveying previous studies the users perspective. Moreover, a case study is included that conducts a survey regarding user trust factors in cloud-based e-learning system in Malaysian Higher Education institutes, which reflects the factors influencing the Malaysian real educational environment. Multi-criteria Decision Making (MCDM) method is used to confirm the most significant user trust factors through Analytical Hierarchical Process (AHP) technique. The outcomes from result analysis show that the identified factors affect user trust in cloud-based e-learning environment significantly.","PeriodicalId":131464,"journal":{"name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}