{"title":"Self-regulated learning (SRL): The impact of incomplete SRL development on the management of conflicting goals","authors":"Angelika Maag, P. Prasad, L. S. Hoe, A. Elchouemi","doi":"10.1109/ICOICT.2017.8074717","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074717","url":null,"abstract":"This short case study represents a preliminary exploration of the impact of a poorly developed higher order level of self-regulation on self-regulated learning (SRL), testing the relevance to students' capacity to manage conflicting academic and non-academic goals. We further problematize culture in this context and develop a model, as a basis for future research. The environments for the study are countries that provide tertiary education to international students. The overall aim is to demonstrate that incomplete development of self-regulated learning prevents students from effectively managing conflicting high-priority goals (H2-4). Secondary aims are to test if poorly developed self-regulation coincides with unsatisfactory development of general study skills (H5) and to theoretically justify future research on the impact of culture on SRL (H1). The data source for this study is an entry level skills/knowledge test. Three scenario-based motivational questions were added and data analysis is expected to confirm H2-4. This has implications for educators as it points to an opportunity for appropriate intervention at an earlier stage than is at present common. However, the low number of questions impose significant limitations on validity of results. There are plans to repeat the study based on a significantly higher number of questions and a pre-validated instrument.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection against code exploitation using ROP and check-summing in IoT environment","authors":"R. Shrivastava, C. Hota, Prashast Shrivastava","doi":"10.1109/ICOICT.2017.8074641","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074641","url":null,"abstract":"The operations of devices in automated, possibly in hostile environments, puts the dependability and reliability of the IoT systems at stake. More specifically, adversaries may tamper with the devices, tamper with sensor values triggering false alarms, instrument the data gathering and overall operation to their own interest. Protecting integrity and confidentiality of IoT devices from tampering attempts is a big challenge. Protection against code tampering is the focal point of this research. This paper entails a contemporary methodology to guard the code against exploitation. The approach focuses on a novel distributed solution by which the tamper resistance of the program code is magnified by the inclusion of two modules that work in tandem with each other. These security modules employ Return Oriented Programming (ROP) techniques and code check-summing techniques to protect critical pieces of code. When working together they provide dual lines of defence to the critical piece of code where the malicious entity has to bypass both the modules in order to tamper the critical piece of code thereby hardening the overall security and increasing the cost of exploitation drastically making it infeasible to mount an attack on IoT devices.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127342207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Diaphan Nizam Arusada, N. Putri, A. Alamsyah
{"title":"Training data optimization strategy for multiclass text classification","authors":"Muhammad Diaphan Nizam Arusada, N. Putri, A. Alamsyah","doi":"10.1109/ICOICT.2017.8074652","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074652","url":null,"abstract":"Big data has been widely spread throughout social media in this digital era. Indeed, it is a good chance for business to get the information in real time. Since the data from social media is unstructured, thus we need to process it beforehand. Machine learning needs proper training data that makes the classification model perform accurately. In order to actualize it, we need a qualified domain knowledge and the right strategy to make an optimal training data. This paper shows the strategy to make optimal training data by using customer's complaint data from Twitter. We use both Naive Bayes and Support Vector Machine as classifiers. The experimental result shows that our strategy of training data optimization can give good performance for multi-class text classification model.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128323060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment analysis using Latent Dirichlet Allocation and topic polarity wordcloud visualization","authors":"M. F. A. Bashri, R. Kusumaningrum","doi":"10.1109/ICOICT.2017.8074651","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074651","url":null,"abstract":"Sentiment analysis is a field of study that analyzes sentiment. One method for doing sentiment analysis is Latent Dirichlet Allocation (LDA) that extracts the topic of documents where the topic is represented as the appearance of the words with different topic probability. Therefore, we need data representation in visual form that is easier to understand than text and tables. One form of data visualization is wordcloud that provides a visual representation of words frequency. This research will perform sentiment analysis from the students' comments toward a university, in this case the Universitas Diponegoro, using LDA and topic polarity wordcloud visualization. The purpose of this study is to generate the topic polarity wordcloud of the students' comments by using the best combination of parameters. The best combination is the parameter with the value of alpha 0.1, value of beta 0.1, number of topics 9, threshold 10−7, and perplexity values 8.07. Such parameter combination produces 3 topics as positive sentiment and 6 topics as negative sentiment. In addition, we also compare the proposed method to several algorithms such as Naïve Bayes and Logistic Regression. The final result shows that the proposed method outperforms the Naïve Bayes and Logistic Regression in terms of F-Measure by 61%, 54%, and 56%, respectively.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"54 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121009520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital forensics random access memory using live technique based on network attacked","authors":"Periyadi, Giva Andriana Mutiara, Roni Wijaya","doi":"10.1109/ICOICT.2017.8074695","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074695","url":null,"abstract":"The development of information and communication technologies are increasing rapidly. The security of data processed and stored also must be prepared in higher security. One of the techniques in data security is digital forensics. Digital forensics is an investigative technique to identify or collect the information on a digital storage as evidence to expose crimes legally defensible. However, in this research we use a live forensics digital technique. Investigations using live forensics technique requires special handling because the volatile data in Random Access Memory which can be lost if the system is in off investigation. This investigation conducted on the system by dump memory investigator to the system which has been attacked and then transferred the file on system investigator. We investigate the data inside the RAM and make analysis about the accuracy using several cyber attacks like session hijacking, FTP attack, and illegal access. The result shows that all the attacks can be investigated and produced the evidence which is authentic, reliable, and defensible.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123139759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social network data analytics for market segmentation in Indonesian telecommunications industry","authors":"Indrawati, A. Alamsyah","doi":"10.1109/ICOICT.2017.8074677","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074677","url":null,"abstract":"Understanding market segmentation is a crucial aspect for business organizations to survive in high competitive environment. Traditional approach relies on sampling methodologies to gather demographic and other specific properties of market segment is considered expensive. The need of real-time decision making force us to adopt the new approach, which is taking advantage of social media data. In this paper, we investigate the conversation about specific product of telecommunication industry in social media Twitter. We use social network analysis methodology to identify group formation based on those conversations. By using social network to perform data analytics activities, we call our approach as Social Network Data Analytics based on community detection methods. Our result will show how many group formed, how many actors involved on each group, and with qualitative analysis we also have knowledge about the topics on each group formed and the attitude toward product.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130698773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the number of ants in ant colony system algorithm","authors":"M. M. Alobaedy, A. A. Khalaf, I. D. Muraina","doi":"10.1109/ICOICT.2017.8074653","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074653","url":null,"abstract":"This study presents an analysis of the number of ants in ant colony system algorithm. The study focuses on the effect of changing the number of ants in the algorithm behavior rather than find the optimum number. The factors investigated in this study are algorithm execution time, best solution, pheromones accumulative, pheromone dispersion, and the number of new solutions found by the ants. The experiment was conducted using travelling salesman problem to investigate those factors. The results show that the number of ants changes the algorithm behavior dramatically. Therefore, tuning the parameter number of ants in ant colony system could be easier by applying the min and max number of ants recommended in this study.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115955805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwriting recognition on form document using convolutional neural network and support vector machines (CNN-SVM)","authors":"Darmatasia, M. I. Fanany","doi":"10.1109/ICOICT.2017.8074699","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074699","url":null,"abstract":"In this paper, we propose a workflow and a machine learning model for recognizing handwritten characters on form document. The learning model is based on Convolutional Neural Network (CNN) as a powerful feature extraction and Support Vector Machines (SVM) as a high-end classifier. The proposed method is more efficient than modifying the CNN with complex architecture. We evaluated some SVM and found that the linear SVM using L1 loss function and L2 regularization giving the best performance both of the accuracy rate and the computation time. Based on the experiment results using data from NIST SD 192nd edition both for training and testing, the proposed method which combines CNN and linear SVM using L1 loss function and L2 regularization achieved a recognition rate better than only CNN. The recognition rate achieved by the proposed method are 98.85% on numeral characters, 93.05% on uppercase characters, 86.21% on lowercase characters, and 91.37% on the merger of numeral and uppercase characters. While the original CNN achieves an accuracy rate of 98.30% on numeral characters, 92.33% on uppercase characters, 83.54% on lowercase characters, and 88.32% on the merger of numeral and uppercase characters. The proposed method was also validated by using ten folds cross-validation, and it shows that the proposed method still can improve the accuracy rate. The learning model was used to construct a handwriting recognition system to recognize a more challenging data on form document automatically. The pre-processing, segmentation and character recognition are integrated into one system. The output of the system is converted into an editable text. The system gives an accuracy rate of 83.37% on ten different test form document.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131696340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fasee Ullah, A. Abdullah, Marina Md Arshad, K. Qureshi
{"title":"Energy efficient and delay-aware adaptive slot allocation medium access control protocol for Wireless Body Area Network","authors":"Fasee Ullah, A. Abdullah, Marina Md Arshad, K. Qureshi","doi":"10.1109/ICOICT.2017.8074659","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074659","url":null,"abstract":"Wireless Body Area Network (WBAN) is the cheapest solution using BioMedical Sensors. They monitor different physiological vital signs of a patient. The output of vital signs does not accept collision, delay, loss, and a high energy consumption of BMSs. This paper proposes Energy Efficient and Delay-Aware Adaptive Slots Allocation Medium Access Control (EED-MAC) Protocol for WBAN. This Proposed MAC provides sufficient and dedicated channels to all types of BMSs. The patient's data are divided according to the need of a patient. Moreover, the contentions of BMSs are reduced and does not drop data by proposing a Reduced Contention Adaptive Slots Allocation CSMA/CA (RCA-CSMA/CA) scheme. The third proposed scheme is Reliability-Aware Channel Allocation (RAC), which allocates channels for emergency-based BMSs using alert signals without contention. The simulation of the proposed MAC and other schemes achieve significant improvements against the state-of-the-art MAC protocols.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130220884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Java implementation of paillier homomorphic encryption scheme","authors":"Radjab Harerimana, Syh-Yuan Tan, Wei-Chuen Yau","doi":"10.1109/ICOICT.2017.8074646","DOIUrl":"https://doi.org/10.1109/ICOICT.2017.8074646","url":null,"abstract":"This paper discusses how to implement Paillier homomorphic encryption (HE) scheme in Java as an API. We first analyze existing Pailler HE libraries and discuss their limitations. We then design a comparatively accomplished and efficient Pailler HE Java library. As a proof of concept, we applied our Pailler HE library in an electronic voting system that allows the voting server to sum up the candidates' votes in the encrypted form with voters remain anonymous. Our library records an average of only 2766ms for each vote placement through HTTP POST request.","PeriodicalId":244500,"journal":{"name":"2017 5th International Conference on Information and Communication Technology (ICoIC7)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}