Ghazi M. Qasaimeh, Anwar Al-Gasaymeh, T. Kaddumi, Qais Kilani
{"title":"Expert Systems and Neural Networks and their Impact on the Relevance of Financial Information in the Jordanian Commercial Banks","authors":"Ghazi M. Qasaimeh, Anwar Al-Gasaymeh, T. Kaddumi, Qais Kilani","doi":"10.1109/ICBATS54253.2022.9759047","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759047","url":null,"abstract":"The current study aims to discern the impact of expert systems and neural network on the Jordanian commercial banks. In achieving the objective, the study employed descriptive analytical approach and the population consisted of the 13 Jordanian commercial banks listed at Amman Stock Exchange-ASE. The primary data were obtained by using a questionnaire with 188 samples distributed to a group of accountants, internal auditors, and programmers, who constitute the study sample. The results unveiled that there is an impact of the application of expert systems and neural networks on the relevance of financial information in Jordanian commercial banks. It also revealed that there is a high level of relevance of financial information in Jordanian commercial banks. Accordingly, the study recommended the need for banks to keep pace with the progress and development taking place in connection to the process and environment of expertise systems by providing modern and developed devices to run various programs and expert systems. It also recommended that, Jordanian commercial banks need to rely more on advanced systems to operate neural network technology more efficiently.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130830363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vocabulary Taught Via Mobile Application Gamification: Receptive, Productive and Long-Term Usability of Words Taught Using Quizlet and Quizlet Live","authors":"John Senior","doi":"10.1109/ICBATS54253.2022.9759019","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759019","url":null,"abstract":"Much of the research into Quizlet to date looks at Quizlet only in a holistic or general way to determine its impact on vocabulary acquisition. This paper addresses the need for a more detailed look into exactly what impact Quizlet has on vocabulary learning. It looks at three things specificall:; the effect of vocabulary deployed via Quizlet on: 1) receptive vocabulary retention, 2) productive vocabulary use, and 3) the long-term retention and ability to use vocabulary learned via Quizlet. The study investigates the implementation of Quizlet gamified features within a basic-level English second language course. What was found is that Quizlet has a significant impact on receptive vocabulary knowledge, but a much lesser impact on productive vocabulary and long-term vocabulary retention.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve the security for voice cryptography in the RSA algorithm","authors":"Sara Al-Ghamdi, Hala Al-Sharari","doi":"10.1109/ICBATS54253.2022.9759016","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759016","url":null,"abstract":"Network security aims to protect network data to improve its integrity and usability. The cryptography methods used in network security aid in the transfer of data in a specified manner that can only be read and processed by the intended recipient. Furthermore, the speech is encoded as a cipher voice, which is subsequently decoded on the receiving end. The voice is also encoded as a cipher voice, which the receiver decodes. By upgrading the RSA algorithm, the proposed approach in this work improved the security of voice cryptography. The goal of our research is to use the RSA algorithm to increase the security of voice cryptography in images. The first step is to use the RSA method to generate two public keys for the voice before encrypting it in the image (sender). The second phase is decrypting each of the images.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Anomaly Detection of Diabetes Using Decision Tree Classifier and an Innovative Back Propagation Algorithm using Fit as a Parameter","authors":"Aluru Pradeepik, R. Sabitha","doi":"10.1109/ICBATS54253.2022.9759012","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759012","url":null,"abstract":"Aim: The work aims to evaluate the accuracy and precision in the analysis of Anomaly detection of diabetes using Decision tree and Backpropagation classification algorithm. Materials and Methods: Back Propagation Classification is applied on a Pima Indian diabetes dataset that consist of 769 records. A machine learning techniques for earlier prediction of diabetes disease which compares Decision tree and Back Propagation Classification algorithms has been proposed and developed. The sample size was measured as 27 per group using Glower. Sample size was calculated using clincalc analysis, with alpha and beta values 0.07 and 0.5, 95% confidence, pretest power 80% and enrolment ratio 1. The accuracy and precision of the classifiers was evaluated and recorded. Results: The accuracy was maximum in predicting diabetes usingBack propagation (77.29%) with minimum mean error when compared with Decision tree classifier (70.09%). There is a significant difference of 0.05 between the classifiers. Conclusion: The study proves that Back Propagation exhibits better accuracy than Decision tree classifier in predicting diabetes.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122593948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ema Utami, Suwanto Raharjo, Omar Muhammad Altoumi Alsyaibani, Candra Adipradana
{"title":"Machine Learning Optimization using Bat Algorithm to Classify Sentiment of Twitter Users","authors":"Ema Utami, Suwanto Raharjo, Omar Muhammad Altoumi Alsyaibani, Candra Adipradana","doi":"10.1109/ICBATS54253.2022.9759029","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759029","url":null,"abstract":"Social-media is a very effective communication media in today’s digital era. Twitter is one of them which widely used by Internet users. Huge number of tweets has encouraged research in the field of text mining, especially in sentiment analysis. Most of sentiment analysis researches which mined data in Bahasa used TF-IDF to assign weight on every word in corpus. This traditional method resulted low accuracy when tested using machine learning methods. In this study, instead of using TF-IDF, we implemented Bat Algorithm to weight every word in corpus. We tested this on Naïve Bayes, Decision Tree and K-NN methods. The result of this study shows that Naïve Bayes, Decision Tree and K-NN methods which classified data weighted using TF-IDF reached accuracy 33.58%, 32.82% and 33.61%, respectively. Afterwards, words in corpus were weighted using Bat Algorithm and tested using the same methods. The test result shows that Naïve Bayes, Decision Tree and K-NN methods reached 39.01%, 76.63% and 66.15% in respectively. It can be inferred that Bat Algorithm usage for weighting words in corpus improves machine learning algorithms to classify sentiment of Twitter users. Moreover, it can be identified that the biggest improvement occurred in Decision Tree algorithm which increased 43.81% accuracy. On the other hand, improvement in Naïve Bayes algorithm is still minor compared to other machine learning algorithms.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122623369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach to Estimation Precision and Recall for Star Rating Online Customers Based on Negative Hotel Reviews using Multinomial Naive Bayes over Multischeme Classifier","authors":"S. Shajahan, T. Poovizhi","doi":"10.1109/ICBATS54253.2022.9759081","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759081","url":null,"abstract":"To estimate precision and recall for hotel star rating using sentiment content. Majority class classifier with sample size (N=10) and Multinomial Naive Bayes with sample size (N=10) were iterated at different times for predicting accuracy percentage of hotel review. The F1 measure used in prediction to probabilities which helps to improve the prediction of accuracy percentage. The sigmoid function used in Simple majority classifier prediction to probability which helps to improve the prediction of accuracy. There was a statistical significance between Multinomial Naive Bayes and Majority class classifiers (p=0.00). Results proved that Multinomial Naive Bayes got significant results with 68% accuracy compared to Majority Class Classifier with 67% accuracy. Multinomial Naive Bayes is a simple and most effective algorithm to build fast machine learning models. Multinomial Naive bayes with f1 measure helps in predicting with more accuracy percentage of hotel review.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133320102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Rehman, Hafiz Muhammad Haroon, J. Malik, Afia Saeed, Asad Ali, Karamath Ateeq
{"title":"Fuzzy System For Covid-19 Disease Detection","authors":"A. Rehman, Hafiz Muhammad Haroon, J. Malik, Afia Saeed, Asad Ali, Karamath Ateeq","doi":"10.1109/ICBATS54253.2022.9759014","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759014","url":null,"abstract":"In this research, by analysis the problem for detection of corona virus (COVID-19) in person by fuzzy method.as the virus is spreading very quickly in last few months around the world. So, in this all scenario the artificial intelligence is trying to involve helping the world for detection and predication of virus with different method and its algorithms. The algorithms that are used for solving out this problem is many like form fuzzy or Neural Network. But here in this paper trying to solve out this by fuzzy implementation and its techniques on the basis of some inputs and get the output as result or prediction level for our problem.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115368315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atif Ali, Raed A. Said, H. Rizwan, Khurram Shehzad, I. Naz
{"title":"Application of Computational Intelligence and Machine Learning to Conventional Operational Research Methods","authors":"Atif Ali, Raed A. Said, H. Rizwan, Khurram Shehzad, I. Naz","doi":"10.1109/ICBATS54253.2022.9759033","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759033","url":null,"abstract":"Machine learning and computational intelligence are two methods for achieving this (CI); traditional operational research methods are combined with machine learning-based computational techniques (OR). Students can handle complex decision-making problems thanks to the synergy between those methods and techniques. This research’s primary goal is to present and demonstrate potential connections amid the two computational arenas. Using applications, we show how machine learning techniques like fuzzy logic, neural networks and reinforcement learning can be combined to provide a simpler solution to more complex problems than traditional OR methods., which is a research contribution in and of itself.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114329207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M Zahid Hasan, Muhammad Adnan Khan, Ghassan F. Issa, Ayesha Atta, Alimardani Akram, M. Hassan
{"title":"Smart Waste Management and Classification System for Smart Cities using Deep Learning","authors":"M Zahid Hasan, Muhammad Adnan Khan, Ghassan F. Issa, Ayesha Atta, Alimardani Akram, M. Hassan","doi":"10.1109/ICBATS54253.2022.9759087","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9759087","url":null,"abstract":"For modern city environments to be renewable and clean, waste management and recycling are essential. Solid waste management, disposal, and recycling are issues in many Pakistani cities, particularly Karachi and Lahore. The combination of the IoTs and deep learning offers a modular technique to data categorization and real-time examining. This article illustrates a capable “Smart trash management and categorization system” based on the “internet of things (IoT)” and DL. The article provides an architectural idea for a microchips-based garbage bin that uses numerous measuring instruments to connect with the method to gather wastes as quickly as possible. The “Internet of Things (IoT)” is used in the suggested data monitoring solution to offer real-time data control. In addition, in this smart waste management and categorization scheme, a waste classification model based on convolutional neural networks was deployed. This waste classification technique will be used to sort rubbish into several categories at the waste-collecting plant to increase recycling. This proposed system offers complete trash management and recycling solution in smart cities, from waste collection to waste management and classification.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115743115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Noridayu Adnan, Siti Hendon Sheikh Abdullah, R. Yusof, Noor Faridatul Ainun Zainal
{"title":"Conceptual Framework for Adversarial Thinking Adoption in Experiential Learning Model for Robotics Learning","authors":"Noridayu Adnan, Siti Hendon Sheikh Abdullah, R. Yusof, Noor Faridatul Ainun Zainal","doi":"10.1109/ICBATS54253.2022.9758998","DOIUrl":"https://doi.org/10.1109/ICBATS54253.2022.9758998","url":null,"abstract":"In this high-technological era, cybersecurity is well-known due to various cybercrimes that happen from time to time. Adversarial thinking, which can be explained as one ability of strategic thinking commonly applied by the hacker, needs to be disclosed to society as one of cybersecurity awareness. Therefore, this study highlights the usage of adversarial thinking in education by adopting the adversarial thinking elements in the experiential learning model. The conceptual framework of adopting adversarial thinking has been developed by using the Matsuo-Nagata learning model 2020. The Matsuo-Nagata learning model has only been applied in the training programs; therefore, to apply the current learning model to the education and cybersecurity field, a new learning model has been revised and adopted with the adversarial thinking aspect. Robotic learning has been chosen as the learning tool for the revised experiential learning model. This study involves three elements of adversarial thinking: analytical, creative, and practical. By analyzing the previous study and the survey results from the expert, the findings show that adversarial thinking is suitable and essential to be adopted in the experiential learning model.","PeriodicalId":289224,"journal":{"name":"2022 International Conference on Business Analytics for Technology and Security (ICBATS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115755031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}