2017 5th International Conference on Information and Communication Technology (ICoIC7)最新文献

筛选
英文 中文
Self-regulated learning (SRL): The impact of incomplete SRL development on the management of conflicting goals 自我调节学习:自我调节学习不完全发展对目标冲突管理的影响
Angelika Maag, P. Prasad, L. S. Hoe, A. Elchouemi
{"title":"Self-regulated learning (SRL): The impact of incomplete SRL development on the management of conflicting goals","authors":"Angelika Maag, P. Prasad, L. S. Hoe, A. Elchouemi","doi":"10.1109/ICOICT.2017.8074717","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074717","url":null,"abstract":"This short case study represents a preliminary exploration of the impact of a poorly developed higher order level of self-regulation on self-regulated learning (SRL), testing the relevance to students' capacity to manage conflicting academic and non-academic goals. We further problematize culture in this context and develop a model, as a basis for future research. The environments for the study are countries that provide tertiary education to international students. The overall aim is to demonstrate that incomplete development of self-regulated learning prevents students from effectively managing conflicting high-priority goals (H2-4). Secondary aims are to test if poorly developed self-regulation coincides with unsatisfactory development of general study skills (H5) and to theoretically justify future research on the impact of culture on SRL (H1). The data source for this study is an entry level skills/knowledge test. Three scenario-based motivational questions were added and data analysis is expected to confirm H2-4. This has implications for educators as it points to an opportunity for appropriate intervention at an earlier stage than is at present common. However, the low number of questions impose significant limitations on validity of results. There are plans to repeat the study based on a significantly higher number of questions and a pre-validated instrument.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection against code exploitation using ROP and check-summing in IoT environment 在物联网环境中使用ROP和校验和来防止代码被利用
R. Shrivastava, C. Hota, Prashast Shrivastava
{"title":"Protection against code exploitation using ROP and check-summing in IoT environment","authors":"R. Shrivastava, C. Hota, Prashast Shrivastava","doi":"10.1109/ICOICT.2017.8074641","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074641","url":null,"abstract":"The operations of devices in automated, possibly in hostile environments, puts the dependability and reliability of the IoT systems at stake. More specifically, adversaries may tamper with the devices, tamper with sensor values triggering false alarms, instrument the data gathering and overall operation to their own interest. Protecting integrity and confidentiality of IoT devices from tampering attempts is a big challenge. Protection against code tampering is the focal point of this research. This paper entails a contemporary methodology to guard the code against exploitation. The approach focuses on a novel distributed solution by which the tamper resistance of the program code is magnified by the inclusion of two modules that work in tandem with each other. These security modules employ Return Oriented Programming (ROP) techniques and code check-summing techniques to protect critical pieces of code. When working together they provide dual lines of defence to the critical piece of code where the malicious entity has to bypass both the modules in order to tamper the critical piece of code thereby hardening the overall security and increasing the cost of exploitation drastically making it infeasible to mount an attack on IoT devices.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Training data optimization strategy for multiclass text classification 多类文本分类的训练数据优化策略
Muhammad Diaphan Nizam Arusada, N. Putri, A. Alamsyah
{"title":"Training data optimization strategy for multiclass text classification","authors":"Muhammad Diaphan Nizam Arusada, N. Putri, A. Alamsyah","doi":"10.1109/ICOICT.2017.8074652","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074652","url":null,"abstract":"Big data has been widely spread throughout social media in this digital era. Indeed, it is a good chance for business to get the information in real time. Since the data from social media is unstructured, thus we need to process it beforehand. Machine learning needs proper training data that makes the classification model perform accurately. In order to actualize it, we need a qualified domain knowledge and the right strategy to make an optimal training data. This paper shows the strategy to make optimal training data by using customer's complaint data from Twitter. We use both Naive Bayes and Support Vector Machine as classifiers. The experimental result shows that our strategy of training data optimization can give good performance for multi-class text classification model.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Sentiment analysis using Latent Dirichlet Allocation and topic polarity wordcloud visualization 基于潜在狄利克雷分配和主题极性词云可视化的情感分析
M. F. A. Bashri, R. Kusumaningrum
{"title":"Sentiment analysis using Latent Dirichlet Allocation and topic polarity wordcloud visualization","authors":"M. F. A. Bashri, R. Kusumaningrum","doi":"10.1109/ICOICT.2017.8074651","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074651","url":null,"abstract":"Sentiment analysis is a field of study that analyzes sentiment. One method for doing sentiment analysis is Latent Dirichlet Allocation (LDA) that extracts the topic of documents where the topic is represented as the appearance of the words with different topic probability. Therefore, we need data representation in visual form that is easier to understand than text and tables. One form of data visualization is wordcloud that provides a visual representation of words frequency. This research will perform sentiment analysis from the students' comments toward a university, in this case the Universitas Diponegoro, using LDA and topic polarity wordcloud visualization. The purpose of this study is to generate the topic polarity wordcloud of the students' comments by using the best combination of parameters. The best combination is the parameter with the value of alpha 0.1, value of beta 0.1, number of topics 9, threshold 10−7, and perplexity values 8.07. Such parameter combination produces 3 topics as positive sentiment and 6 topics as negative sentiment. In addition, we also compare the proposed method to several algorithms such as Naïve Bayes and Logistic Regression. The final result shows that the proposed method outperforms the Naïve Bayes and Logistic Regression in terms of F-Measure by 61%, 54%, and 56%, respectively.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"54 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Digital forensics random access memory using live technique based on network attacked 基于网络攻击的随机存取存储器数字取证技术
Periyadi, Giva Andriana Mutiara, Roni Wijaya
{"title":"Digital forensics random access memory using live technique based on network attacked","authors":"Periyadi, Giva Andriana Mutiara, Roni Wijaya","doi":"10.1109/ICOICT.2017.8074695","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074695","url":null,"abstract":"The development of information and communication technologies are increasing rapidly. The security of data processed and stored also must be prepared in higher security. One of the techniques in data security is digital forensics. Digital forensics is an investigative technique to identify or collect the information on a digital storage as evidence to expose crimes legally defensible. However, in this research we use a live forensics digital technique. Investigations using live forensics technique requires special handling because the volatile data in Random Access Memory which can be lost if the system is in off investigation. This investigation conducted on the system by dump memory investigator to the system which has been attacked and then transferred the file on system investigator. We investigate the data inside the RAM and make analysis about the accuracy using several cyber attacks like session hijacking, FTP attack, and illegal access. The result shows that all the attacks can be investigated and produced the evidence which is authentic, reliable, and defensible.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social network data analytics for market segmentation in Indonesian telecommunications industry 社交网络数据分析在印尼电信行业的市场细分
Indrawati, A. Alamsyah
{"title":"Social network data analytics for market segmentation in Indonesian telecommunications industry","authors":"Indrawati, A. Alamsyah","doi":"10.1109/ICOICT.2017.8074677","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074677","url":null,"abstract":"Understanding market segmentation is a crucial aspect for business organizations to survive in high competitive environment. Traditional approach relies on sampling methodologies to gather demographic and other specific properties of market segment is considered expensive. The need of real-time decision making force us to adopt the new approach, which is taking advantage of social media data. In this paper, we investigate the conversation about specific product of telecommunication industry in social media Twitter. We use social network analysis methodology to identify group formation based on those conversations. By using social network to perform data analytics activities, we call our approach as Social Network Data Analytics based on community detection methods. Our result will show how many group formed, how many actors involved on each group, and with qualitative analysis we also have knowledge about the topics on each group formed and the attitude toward product.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of the number of ants in ant colony system algorithm 蚁群系统算法中蚂蚁数量的分析
M. M. Alobaedy, A. A. Khalaf, I. D. Muraina
{"title":"Analysis of the number of ants in ant colony system algorithm","authors":"M. M. Alobaedy, A. A. Khalaf, I. D. Muraina","doi":"10.1109/ICOICT.2017.8074653","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074653","url":null,"abstract":"This study presents an analysis of the number of ants in ant colony system algorithm. The study focuses on the effect of changing the number of ants in the algorithm behavior rather than find the optimum number. The factors investigated in this study are algorithm execution time, best solution, pheromones accumulative, pheromone dispersion, and the number of new solutions found by the ants. The experiment was conducted using travelling salesman problem to investigate those factors. The results show that the number of ants changes the algorithm behavior dramatically. Therefore, tuning the parameter number of ants in ant colony system could be easier by applying the min and max number of ants recommended in this study.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115955805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Handwriting recognition on form document using convolutional neural network and support vector machines (CNN-SVM) 基于卷积神经网络和支持向量机的手写表单识别
Darmatasia, M. I. Fanany
{"title":"Handwriting recognition on form document using convolutional neural network and support vector machines (CNN-SVM)","authors":"Darmatasia, M. I. Fanany","doi":"10.1109/ICOICT.2017.8074699","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074699","url":null,"abstract":"In this paper, we propose a workflow and a machine learning model for recognizing handwritten characters on form document. The learning model is based on Convolutional Neural Network (CNN) as a powerful feature extraction and Support Vector Machines (SVM) as a high-end classifier. The proposed method is more efficient than modifying the CNN with complex architecture. We evaluated some SVM and found that the linear SVM using L1 loss function and L2 regularization giving the best performance both of the accuracy rate and the computation time. Based on the experiment results using data from NIST SD 192nd edition both for training and testing, the proposed method which combines CNN and linear SVM using L1 loss function and L2 regularization achieved a recognition rate better than only CNN. The recognition rate achieved by the proposed method are 98.85% on numeral characters, 93.05% on uppercase characters, 86.21% on lowercase characters, and 91.37% on the merger of numeral and uppercase characters. While the original CNN achieves an accuracy rate of 98.30% on numeral characters, 92.33% on uppercase characters, 83.54% on lowercase characters, and 88.32% on the merger of numeral and uppercase characters. The proposed method was also validated by using ten folds cross-validation, and it shows that the proposed method still can improve the accuracy rate. The learning model was used to construct a handwriting recognition system to recognize a more challenging data on form document automatically. The pre-processing, segmentation and character recognition are integrated into one system. The output of the system is converted into an editable text. The system gives an accuracy rate of 83.37% on ten different test form document.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Energy efficient and delay-aware adaptive slot allocation medium access control protocol for Wireless Body Area Network 无线体域网络的节能和延迟感知自适应时隙分配介质访问控制协议
Fasee Ullah, A. Abdullah, Marina Md Arshad, K. Qureshi
{"title":"Energy efficient and delay-aware adaptive slot allocation medium access control protocol for Wireless Body Area Network","authors":"Fasee Ullah, A. Abdullah, Marina Md Arshad, K. Qureshi","doi":"10.1109/ICOICT.2017.8074659","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074659","url":null,"abstract":"Wireless Body Area Network (WBAN) is the cheapest solution using BioMedical Sensors. They monitor different physiological vital signs of a patient. The output of vital signs does not accept collision, delay, loss, and a high energy consumption of BMSs. This paper proposes Energy Efficient and Delay-Aware Adaptive Slots Allocation Medium Access Control (EED-MAC) Protocol for WBAN. This Proposed MAC provides sufficient and dedicated channels to all types of BMSs. The patient's data are divided according to the need of a patient. Moreover, the contentions of BMSs are reduced and does not drop data by proposing a Reduced Contention Adaptive Slots Allocation CSMA/CA (RCA-CSMA/CA) scheme. The third proposed scheme is Reliability-Aware Channel Allocation (RAC), which allocates channels for emergency-based BMSs using alert signals without contention. The simulation of the proposed MAC and other schemes achieve significant improvements against the state-of-the-art MAC protocols.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130220884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Java implementation of paillier homomorphic encryption scheme paillier同态加密方案的Java实现
Radjab Harerimana, Syh-Yuan Tan, Wei-Chuen Yau
{"title":"A Java implementation of paillier homomorphic encryption scheme","authors":"Radjab Harerimana, Syh-Yuan Tan, Wei-Chuen Yau","doi":"10.1109/ICOICT.2017.8074646","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074646","url":null,"abstract":"This paper discusses how to implement Paillier homomorphic encryption (HE) scheme in Java as an API. We first analyze existing Pailler HE libraries and discuss their limitations. We then design a comparatively accomplished and efficient Pailler HE Java library. As a proof of concept, we applied our Pailler HE library in an electronic voting system that allows the voting server to sum up the candidates' votes in the encrypted form with voters remain anonymous. Our library records an average of only 2766ms for each vote placement through HTTP POST request.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信