2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)最新文献

筛选
英文 中文
HarX: Real-time harassment detection tool using machine learning HarX:使用机器学习的实时骚扰检测工具
Kainat Rizwan, Sehar Babar, Sania Nayab, M. Hanif
{"title":"HarX: Real-time harassment detection tool using machine learning","authors":"Kainat Rizwan, Sehar Babar, Sania Nayab, M. Hanif","doi":"10.1109/MTICTI53925.2021.9664755","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664755","url":null,"abstract":"Cybersecurity has a great deal of importance over the digital market for organizations in this modern era. Nowadays all kinds of communications and connections are established by using the internet. Chatting is a main source of communication. The major problem faced by users is harassment. User starts to get harassed frequently as most of users does not know what to do and how to take action or how to stop this. In this work, we employ machine learning and natural language processing to tackle online harassment. This study proposed a real time machine learning based algorithm which detects harassment actively and alert user to take action against it. For detection mechanism, Naïve Bayes classification is used. The proposed approach attain approximately 77% accuracy. The result shows that the algorithm actively detects harassing keywords in chat messages.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126854386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review on Modern Analytical Methods for Detecting and Quantifying Adulteration in Honey 蜂蜜中掺假的现代检测与定量分析方法综述
Mokhtar A. Al-Awadhi, R. Deshmukh
{"title":"A Review on Modern Analytical Methods for Detecting and Quantifying Adulteration in Honey","authors":"Mokhtar A. Al-Awadhi, R. Deshmukh","doi":"10.1109/MTICTI53925.2021.9664767","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664767","url":null,"abstract":"Honey has been a target for adulteration with various inexpensive industrial sugars. Discriminating between authentic and adulterated honey is a challenging problem for consumers. Several studies have proposed different methods for detecting adulterated honey. Traditional methods, such as stable carbon isotope ratio analysis, chromatography, and physicochemical parameter analysis, provided good qualitative and quantitative detection. These technologies utilize different approaches, such as profiles of honey constituents, physical and chemical properties of honey, and specific marker traces for the sugar adulterants. Spectroscopy and hyperspectral imaging provided fast and nondestructive detection with no sample preparation. Sensory techniques, such as low-cost optic fiber sensors, demonstrated their effectiveness in quantifying honey adulteration. This paper discusses various technologies for detecting and quantifying honey adulteration. We also discuss the machine learning models and their performance in this research.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of a Learning Analytics extension in Open edX Open edX中学习分析扩展的开发
Youness Chaabi, Yahya Al-Ashmoery
{"title":"Development of a Learning Analytics extension in Open edX","authors":"Youness Chaabi, Yahya Al-Ashmoery","doi":"10.1109/MTICTI53925.2021.9664754","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664754","url":null,"abstract":"Persistence in online courses remains a concern for various institutions. The case of (Massive Open Online Courses) MOOCs represents a particular situation of online courses with an even higher dropout rate. This type of training highlights problems that have already been identified such as sociological isolation of the learner, loss of motivation, empowerment of the learner, acquisition of identity within a group and appreciation of the group pedagogical progress. In this context, the importance of a follow-up by a human tutor is unanimously recognized by the different a ctors. Despite the numerous services offered by open and distance learning platforms, one of the main difficulties encountered by tutors in this task is to have a sufficient understanding of what the distant learners are doing. One way that seems particularly promising to solve this problem is the exploitation of interaction traces left by learners within MOOCs, and the elaboration of indicators that can help the tutor in monitoring learners’ activities. This is why it seems imperative to me to propose a tool to visualize the work accomplished by each learner. The system must provide indicators that help the tutor to appreciate the work of the learners.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"777 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Utilizing Multi-Agent Systems Approach in Firefly Algorithm 多智能体系统方法在萤火虫算法中的应用
Arian Yousefiankalareh, Taraneh Kamyab, Ali Mojarrad Ghahfarokhi, Fatemehalsadat Beheshtinejad, Hossein Mirzanejad, Shahaboddin Seddighi
{"title":"Utilizing Multi-Agent Systems Approach in Firefly Algorithm","authors":"Arian Yousefiankalareh, Taraneh Kamyab, Ali Mojarrad Ghahfarokhi, Fatemehalsadat Beheshtinejad, Hossein Mirzanejad, Shahaboddin Seddighi","doi":"10.1109/MTICTI53925.2021.9664757","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664757","url":null,"abstract":"Generally, using collective intelligence is one of the interesting topics is researchers of recent years, which its purpose is modeling creatures’ simple behaviors and their interaction with the environment and neighbor creatures to obtain more complex behaviors. We could utilize algorithms based on collective intelligence to solve complicated problems like optimization problems. So far, various algorithms have been purposed in this field which firefly algorithm is a variant of these. In this algorithm, each member acts as a better response concerning itself. However, this algorithm has some drawbacks like the consistency of parameters value, lack of balance between local search and global search, and others. On one hand, multi-agent systems are software systems that contain sets of agents. These agents perform their tasks together to solve a problem and reach the desired purpose. In this paper, we have tried to utilize a multi-agent system, in addition to meta-heuristic optimization algorithms, to improve the performance of the firefly algorithm to better cooperate warms populations with each other. The results of the experiment show the acceptable performance of the proposed algorithm.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoT Threats and Solutions with Blockchain and Context-Aware Security Design: A Review 物联网威胁和解决方案与区块链和上下文感知安全设计:回顾
Dana F. Doghramachi, S. Ameen
{"title":"IoT Threats and Solutions with Blockchain and Context-Aware Security Design: A Review","authors":"Dana F. Doghramachi, S. Ameen","doi":"10.1109/MTICTI53925.2021.9664784","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664784","url":null,"abstract":"Nowadays, the Internet of Things (IoT) applications will increase rapidly, such as smart cities, smart transportation, smart healthcare, and smart things are all composed of the IoT, which connects a wide range of heterogeneous devices. This review paper provides a comprehensive overview of blockchain architectures designed for IoT networks. The IoT has emerged as a sector with enormous impact, potential, and growth, with billions of devices expected to connect to the Internet in the coming years. The first big challenge we will be faced with this big network is security; it must be taken into account. In contrast to other endpoint devices such as smartphones, laptops, and PCs, most IoT devices are more sensitive to assaults. Because of the various specifications and heterogeneity problems, traditional protection primitives cannot be explicitly applied to IoT technologies. This paper investigates these critical and essential issues regarding IoT threats, security requirements, and challenges with particular emphasis on and relation to IoT layered architecture. Next, the paper addresses various existing IoT security technologies to achieve high security for IoT applications. It also addresses how two methods, Blockchain, and context-aware, can help solve many IoT security issues. Finally, the paper assesses and suggests some recommendations for future research in the field of IoT security.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115098629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Energy Conservation Strategies in Wireless Sensor Networks: A Review 无线传感器网络中的节能策略综述
Sarah Amjad Inad, Khattab M. Ali Alheeti, S. S. Al-Rawi
{"title":"Energy Conservation Strategies in Wireless Sensor Networks: A Review","authors":"Sarah Amjad Inad, Khattab M. Ali Alheeti, S. S. Al-Rawi","doi":"10.1109/MTICTI53925.2021.9664777","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664777","url":null,"abstract":"Wireless Sensor Networks (WSNs) consist of small devices that sense environmental and physical phenomena. WSNs have proven their high capabilities in various fields, but there are some challenges facing sensor nodes, such as limited battery power and their communication and storage capabilities. This review of recent literature on energy improvement strategies is compressed in this review paper. The concepts of WSNs, power sources, WSNs node component, Energy Saving Techniques, power consumption were extracted and clarified. Finally, the results of previous studies regarding energy improvement were extracted, discussed, and compared at the end of the paper.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[MTICTI 2021 Front cover] [MTICTI 2021封面]
{"title":"[MTICTI 2021 Front cover]","authors":"","doi":"10.1109/mticti53925.2021.9664768","DOIUrl":"https://doi.org/10.1109/mticti53925.2021.9664768","url":null,"abstract":"","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123549739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques 基于机器学习技术的新型MANET入侵检测系统
Marwa Mohammed Khalifa, O. Ucan, Khattab M. Ali Alheeti
{"title":"New Intrusion Detection System to Protect MANET Networks Employing Machine Learning Techniques","authors":"Marwa Mohammed Khalifa, O. Ucan, Khattab M. Ali Alheeti","doi":"10.1109/MTICTI53925.2021.9664782","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664782","url":null,"abstract":"The Intrusion Detection System (IDS) is one of the technologies available to protect mobile ad hoc networks. The system monitors the network and detects intrusion from malicious nodes, aiming at passive (eavesdropping) or positive attack to disrupt the network. This paper proposes a new Intrusion detection system using three Machine Learning (ML) techniques. The ML techniques were Random Forest (RF), support vector machines (SVM), and Naïve Bayes(NB) were used to classify nodes in MANET. The data set was generated by the simulator network simulator-2 (NS-2). The routing protocol was used is Dynamic Source Routing (DSR). The type of IDS used is a Network Intrusion Detection System (NIDS). The dataset was pre-processed, then split into two subsets, 67% for training and 33% for testing employing Python Version 3.8.8. Obtaining good results for RF, SVM and NB when applied randomly selected features in the trial and error method from the dataset to improve the performance of the IDS and reduce time spent for training and testing. The system showed promising results, especially with RF, where the accuracy rate reached 100%.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection of Adulteration in Coconut Milk using Infrared Spectroscopy and Machine Learning 利用红外光谱和机器学习技术检测椰奶中的掺假成分
Mokhtar A. Al-Awadhi, R. Deshmukh
{"title":"Detection of Adulteration in Coconut Milk using Infrared Spectroscopy and Machine Learning","authors":"Mokhtar A. Al-Awadhi, R. Deshmukh","doi":"10.1109/MTICTI53925.2021.9664764","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664764","url":null,"abstract":"In this paper, we propose a system for detecting adulteration in coconut milk, utilizing infrared spectroscopy. The machine learning-based proposed system comprises three phases: preprocessing, feature extraction, and classification. The first phase involves removing irrelevant data from coconut milk spectral signals. In the second phase, we employ the Linear Discriminant Analysis (LDA) algorithm for extracting the most discriminating features. In the third phase, we use the K-Nearest Neighbor (KNN) model to classify coconut milk samples into authentic or adulterated. We evaluate the performance of the proposed system using a public dataset comprising Fourier Transform Infrared (FTIR) spectral information of pure and contaminated coconut milk samples. Findings show that the proposed method successfully detects adulteration with a cross-validation accuracy of 93.33%.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Role of Virtual Reality in Improving Students’ LMS Experiences: Structural Equation Modelling Based Study 虚拟现实在提高学生LMS体验中的作用:基于结构方程模型的研究
Saadia Anwar Pasha, E. Youssef, Humaira Sharif
{"title":"Role of Virtual Reality in Improving Students’ LMS Experiences: Structural Equation Modelling Based Study","authors":"Saadia Anwar Pasha, E. Youssef, Humaira Sharif","doi":"10.1109/MTICTI53925.2021.9664769","DOIUrl":"https://doi.org/10.1109/MTICTI53925.2021.9664769","url":null,"abstract":"This study focuses on examining the role of Virtual Reality in improving the students’ educational experiences through Learning Management System in Pakistan. The researchers adopted a cross-sectional design and analyzed the gathered data by using survey questionnaires. By using the SEM, findings indicated a strong, significant relationship between Virtual Reality, Expectation Confirmation (p < 0.000), Attitude (p < 0.000), and Knowledge Acquisition (p < 0.000. However, the relationship between Behavioral Intention, Expectation Confirmation (p < 0.451) and Attitude (p < 0.161) remained insignificant. On the other hand, the proposed relationship between Knowledge Acquisition and Behavioral was strongly significant, with the p-value at 0.000. Finally, results revealed a strong, significant relationship between Behavioral Intention and Improved Learning Management System Experiences with the t-value at 10.474 and p-value at 0.000. Thus, this article concluded that it is important to develop and incorporate Virtual and Augmented Reality in education. Especially when the students depend on digital learning platforms, Virtual Reality adoption improves their learning experiences.","PeriodicalId":218225,"journal":{"name":"2021 International Conference of Modern Trends in Information and Communication Technology Industry (MTICTI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125532325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信