Proceedings of the 2019 5th International Conference on Computer and Technology Applications最新文献

筛选
英文 中文
Hue combinations for the web: Towards a repertoire of design guidelines for combining color hues based on cultural background 网页色彩组合:基于文化背景的色彩组合设计指南
Vidal Ruse, Montathar Faraon, M. Wetterstrand
{"title":"Hue combinations for the web: Towards a repertoire of design guidelines for combining color hues based on cultural background","authors":"Vidal Ruse, Montathar Faraon, M. Wetterstrand","doi":"10.1145/3323933.3324059","DOIUrl":"https://doi.org/10.1145/3323933.3324059","url":null,"abstract":"Existing research shows that users tend to assess the visual appeal of a web page within 50 ms and color is the first thing that is noticed on a screen. This directly influences the user's perception of a website, and a choice of appealing color combinations may, therefore, be crucial in successful web design. This article aims to identify, formulate, and evaluate design guidelines to support designers in the process of combining color hues for websites in the context of the Swedish and Thai cultures. A quantitative approach was used to evaluate the proposed design guidelines. The results show that culture plays a role in the evaluation of color hue combinations; Thai participants rated Thai designs significantly more highly than the Swedish participants, but the reverse was not true, and Thai designs were rated more highly than Swedish designs by all participants. The results may have implications for practitioners working in the field of web design and for the broader debate of cultural influence on color preference.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"102 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132365056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Between Habit and Addiction: An Overview of Preliminary Finding on Social Networking Sites Usage among Teenagers 在习惯与成瘾之间:青少年社交网站使用的初步调查综述
Yazriwati Yahya, N. A. Rahim, Roslina Ibrahim, Nurulhuda Firdaus Mohd Azmi, N. N. A. Sjarif, H. Sarkan
{"title":"Between Habit and Addiction: An Overview of Preliminary Finding on Social Networking Sites Usage among Teenagers","authors":"Yazriwati Yahya, N. A. Rahim, Roslina Ibrahim, Nurulhuda Firdaus Mohd Azmi, N. N. A. Sjarif, H. Sarkan","doi":"10.1145/3323933.3324090","DOIUrl":"https://doi.org/10.1145/3323933.3324090","url":null,"abstract":"Social networking sites (SNS) usage have impacted our lives in many ways. Researches on SNS usage mostly were focus on adults compared to teenagers. Nowadays, teenagers are so mesmerize with the SNS applications offered by the provider until they get addicted to it. Yet, SNS addiction is not an isolation process. It started off with high engagement and originated from habit behaviour. This study focuses on exploring and analyzing the usage of SNS among the teenagers in Malaysia specifically in urban area. It also examined the SNS habit and addiction behaviors of the teenagers and emphasized the differences of the behaviors between genders. An online survey form was distributed among the teenagers in urban area. The data were analyzed using SPSS and cross tabulations were constructed to understand the correlation between gender and SNS behaviors. From the analysis, comparisons between genders were done based on the frequency of the SNS habit and addiction behaviors. Based on the preliminary findings, it shows that there are slightly differences between the genders across the behaviors that may have shed some light for other researchers in the niche area.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121899342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Search Engine Optimization (SEO) for Websites 搜索引擎优化(SEO)的网站
Aziz Barbar, Anis Ismail
{"title":"Search Engine Optimization (SEO) for Websites","authors":"Aziz Barbar, Anis Ismail","doi":"10.1145/3323933.3324072","DOIUrl":"https://doi.org/10.1145/3323933.3324072","url":null,"abstract":"With the growth of the Internet in the recent years, search engines such as Google, Bing, and Yahoo are becoming more and more crucial and reliable. The role of search engines is to index billions of web pages and display only the most relevant results for a given search query. When creating the website, many webmasters forget to take into consideration an essential factor, which is making the world aware of their website. Most of the times the main focus is set on making the website as user-friendly as possible, stable, fast, and secure. However, all of these techniques can be useless if the website does not have any visitor or people just cannot find it. To solve this problem, and to enhance the structure of the website to become more search-engine-friendly, a web application is developed to analyze any given webpage and to provide information on how to enhance and improve its structure to make it more search-engine-friendly and to improve its ranking on search engines. This process is also known as Search Engine Optimization (SEO).","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132150912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Deep Feature Extraction for Pap-Smear Image Classification: A Comparative Study 基于深度特征提取的Pap-Smear图像分类的比较研究
Wafa Mousser, S. Ouadfel
{"title":"Deep Feature Extraction for Pap-Smear Image Classification: A Comparative Study","authors":"Wafa Mousser, S. Ouadfel","doi":"10.1145/3323933.3324060","DOIUrl":"https://doi.org/10.1145/3323933.3324060","url":null,"abstract":"Cervical cancer is one of the major public health problems in the world. Even if it is one of the most preventable cancers, the early screening with reliable Pap-smear test is the key to curing. Based on the morphology and the texture of the cervix cells, Cytopathologists rely on hand-crafted features to determine whether a cellule is normal or abnormal. In medical imaging, deep learning can generate features that are more sophisticated and difficult to elaborate in descriptive means. These relevant features allow improving the classification's accuracy. In this study, we use deep neural networks to extract features from Pap-smear images and provide these extracted features as inputs for optimized MLP classifier. We study the ability of the four different pre-trained models as feature extractors toward classifying Pap-smear images. Experiments performed on the DTU/HERLEV Database and comparison show that for the Pap-smear image classification, the ResNet50 exceeds the VGGs and the InceptionV3 by 15% of accuracy.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123069334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Four Char DNA Encoding for Anomaly Intrusion Detection System 异常入侵检测系统的四字符DNA编码
O. Rashid, Z. Othman, S. Zainudin
{"title":"Four Char DNA Encoding for Anomaly Intrusion Detection System","authors":"O. Rashid, Z. Othman, S. Zainudin","doi":"10.1145/3323933.3324069","DOIUrl":"https://doi.org/10.1145/3323933.3324069","url":null,"abstract":"Recent research has shown that a Deoxyribonucleic Acid (DNA) has ability to be used to discover diseases in human body as its function can be used for an intrusion-detection system (IDS) to detect attacks against computer system and networks traffics. Three main factor influenced the accuracy of IDS based on DNA sequence, which is DNA encoding method, STR keys and classification method to classify the correctness of proposed method. The pioneer idea on attempt a DNA sequence for intrusion detection system is using a normal signature sequence with alignment threshold value, later used DNA encoding based cryptography, however the detection rate result is very low. Since the network traffic consists of 41 attributes, therefore we proposed the most possible less character number (same DNA length) which is four-character DNA encoding that represented all 41 attributes known as DEM4all. The experiments conducted using standard data KDDCup 99 and NSL-KDD. Teiresias algorithm is used to extract Short Tandem Repeat (STR), which includes both keys and their positions in the network traffic, while Brute-force algorithm is used as a classification process to determine whether the network traffic is attack or normal. Experiment run 30 times for each DNA encoding method. The experiment result shows that proposed method has performed better accuracy (15% improved) compare with previous and state of the art DNA algorithms. With such results it can be concluded that the proposed DEM4all DNA encoding method is a good method that can used for IDS. More complex encoding can be proposed that able reducing less number of DNA sequence can possible produce more detection accuracy.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115657475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
System performance anomaly detection using tracing data analysis 系统性能异常检测采用跟踪数据分析
Iman Kohyarnejadfard, Mahsa Shakeri, Daniel Aloise
{"title":"System performance anomaly detection using tracing data analysis","authors":"Iman Kohyarnejadfard, Mahsa Shakeri, Daniel Aloise","doi":"10.1145/3323933.3324085","DOIUrl":"https://doi.org/10.1145/3323933.3324085","url":null,"abstract":"In recent years, distributed systems have become increasingly complex as they grow in both scale and functionality. Such complexity makes these systems prone to performance anomalies. Efficient anomaly detection frameworks enable rapid recovery mechanisms to increase the system's reliability. In this paper, we present an anomaly detection approach for practical monitoring of processes running on a system to detect anomalous vectors of system calls. Our proposed methodology employs a Linux tracing toolkit (LTTng) to monitor the processes running on a system and extracts the streams of system calls. The system calls streams are split into short sequences using a sliding window strategy. Unlike previous studies, our proposed approach computes the execution time of system calls in addition to the frequency of each individual call in a window. Finally, a multi-class support vector machine approach is applied to evaluate the performance of the system and detect the anomalous sequences. A comprehensive experimental study on a real dataset collected using LTTng demonstrates that our proposed method is able to distinguish normal sequences from anomalous ones with CPU or memory related problems.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126999275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
User Account Risk Identification Model for Web Applications Web应用程序的用户帐户风险识别模型
Yang Wang, Zhaoxin Zhang, Lejun Chi
{"title":"User Account Risk Identification Model for Web Applications","authors":"Yang Wang, Zhaoxin Zhang, Lejun Chi","doi":"10.1145/3323933.3324058","DOIUrl":"https://doi.org/10.1145/3323933.3324058","url":null,"abstract":"With the continuous development of the Internet era, the information security environment faced by Internet users is becoming more and more severe. In view of the intensified user account theft on the Internet, this paper analyzes the user behavior habits by collecting user behavior information and application log, and proposes a user account risk identification algorithm based on user behavior. In order to improve the accuracy of user account risk identification, Firstly, use the Kmeans algorithm to cluster user accounts based on user behavior data. In the clustering process, the PSO (Particle Swarm Optimization) algorithm is introduced to form an improved PSO_Kmeans clustering algorithm. Then, extend log data with imported external \"threat intelligence\" data, to classify the clustered data, using Random Forest, Decision Tree, Naive Bayesian machine learning classification algorithm. The experimental results show that the model can effectively identify the risk account.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124153734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Join Algorithms under Apache Spark: Revisited Apache Spark下的Join算法:重访
A. Al-Badarneh
{"title":"Join Algorithms under Apache Spark: Revisited","authors":"A. Al-Badarneh","doi":"10.1145/3323933.3324094","DOIUrl":"https://doi.org/10.1145/3323933.3324094","url":null,"abstract":"Currently, we are dealing with large scale applications, which in turn generate massive amount of data and information. Large amount of data often requires processing algorithms using massive parallelism, where the main performance metrics is the communication cost. Apache Spark is highly scalable, fault-tolerance, and can be used across many computers. So join algorithm is one of the most widely used algorithms in database systems, but it is also a heavily time consuming operation. In this work, we will survey and criticize several implementations of Spark join algorithms and discuss their strengths and weaknesses, present a detailed comparison of these algorithms, and introduce optimization approaches to enhance and tune the performance of join algorithms.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122407618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of Image Filters on Various Image Datasets 图像过滤器对各种图像数据集的影响
Didem Abidin
{"title":"Effects of Image Filters on Various Image Datasets","authors":"Didem Abidin","doi":"10.1145/3323933.3324056","DOIUrl":"https://doi.org/10.1145/3323933.3324056","url":null,"abstract":"Image classification is a very common research area, on which researchers work with various classification techniques. The aim of this study is to apply different filters on four different datasets and evaluate their performances in image classification. The study was performed in WEKA environment with Random Forest algorithm and image filters are applied to the datasets one by one and as a combination. Filter combinations got better performance than applying single filter on data. Filter combinations got the worst result on artworks with a percentage of 83.42%. However they were very successful on classifying the images in natural images dataset with a performance of 99.76%.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126585516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Students Perception of Learning Online: Professor's Presence in Synchronous Versus Asynchronous Modality 学生对在线学习的看法:同步与异步模式下教授的存在
Farnaz Sharifrazi, Suki Stone
{"title":"Students Perception of Learning Online: Professor's Presence in Synchronous Versus Asynchronous Modality","authors":"Farnaz Sharifrazi, Suki Stone","doi":"10.1145/3323933.3324087","DOIUrl":"https://doi.org/10.1145/3323933.3324087","url":null,"abstract":"The purpose of this study was to investigate the students' perception of online synchronous versus asynchronous teaching modality in the Business School using students from the Information Systems Bachelor's degree. The hypothesis was: Students' will perceive a positive impact on their learning and satisfaction, given the opportunity for web-conferencing in a synchronous model with interaction between the professor and the students in online classes. The results of the data analysis were 4.07 for the synchronous versus 3.92 for asynchronous. Students' perception indicated that the synchronous model was more effective and positive for their learning. Based on the results of the study a recommendation for a multi-dimensional, multi-faceted curriculum that includes professor's real-time presence to create an atmosphere of trust, guidance and openness among students is affirmed. These events should be video-taped and made available throughout the course for students review.","PeriodicalId":137904,"journal":{"name":"Proceedings of the 2019 5th International Conference on Computer and Technology Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130946234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信