{"title":"Impact of Digitalization in Construction: Enriching As-built Facilities and Operations using BIM","authors":"H. Biswas, Sian Lun Lau, Tze Ying Sim","doi":"10.1109/ICOCO56118.2022.10031694","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031694","url":null,"abstract":"3D Terrestrial Laser Scanning (TLS) technology has achieved massive acceptance to produce and visualise the 3D point clouds of existing facilities in the Architectural, Engineering and construction (AEC) industry. In addition, Building Information Modelling (BIM) is also well recognised to digitalise every component of actual buildings. Integration of TLS and BIM has been established as a disruptive technology to increase the quality and performance of the construction industry. Apart from all these recognised contributions of using the technologies, significant flaws in creating 3D BIM models of existing facilities must be addressed to improve the functionalities and operations in the facility management system. It is worth mentioning that the effective geometric modelling and semantic-rich object recognitions of existing construction buildings (behind the concrete wall) and point cloud overlapping are challenging issues in laser scanning technologies that ultimately lead to incomplete BIM models of as-built facilities. In this study, the contribution to the knowledge gap is represented by considering the two real case studies of existing facilities to optimise facility management and operations in the construction industry. Nevertheless, the main focus of this research is to introduce the current challenges in generating an effective 3D BIM model for the existing buildings satisfying the specified specifications and standards. Further research should consider the issues and more robust and effective evaluation procedures for the larger-scale real case containing more complex and hidden objects.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127232612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Long Doan, Tho Nguyen Duc, Chuanzhe Jing, E. Kamioka, Phan Xuan Tan
{"title":"Automatic Keyword Extraction for Viewport Prediction of 360-degree Virtual Tourism Video","authors":"Long Doan, Tho Nguyen Duc, Chuanzhe Jing, E. Kamioka, Phan Xuan Tan","doi":"10.1109/ICOCO56118.2022.10032026","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10032026","url":null,"abstract":"In 360-degree streaming videos, viewport prediction can reduce the bandwidth needed during the stream while still maintaining a quality experience for the users by streaming only the area that is visible to the user. Existing research in viewport prediction aims to predict the user’s viewport with data from the user’s head movement trajectory, video saliency, and subtitles of the video. While these subtitles can contain much information necessary for viewport prediction, previous studies can only extract these information manually, which requires in-depth knowledge about the topic of the video. Moreover, extracting these information by hand can still miss some important keywords from the subtitles and limit the accuracy of the viewport prediction. In this paper, we focus on automate this extraction process by proposing three types of automatic keyword extraction methods, namely Adverb, NER (Named entity recognition) and Adverb+NER. We provide an analysis to demonstrate the effectiveness of our automatic methods compared to extracting important keywords by hand. We also incorporate our methods into an existing viewport prediction model to improve prediction accuracy. The experimental results show that the model with our automatic keyword extraction methods outperforms baseline methods which only use manually extracted information.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Salfarina Abdullah, Al Dulaimi Moatasem Abdulmajeed Alwan, Y. Y. Jusoh
{"title":"Blockchain Technologies in e-Government Services: A Literature Review","authors":"Salfarina Abdullah, Al Dulaimi Moatasem Abdulmajeed Alwan, Y. Y. Jusoh","doi":"10.1109/ICOCO56118.2022.10031634","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031634","url":null,"abstract":"The efficiency of blockchain technologies in managing transactions using distributed ledgers provides new age of government services. This enhances citizen-government transparency to establish public-sector trust by preventing fraud. However, using and adopting blockchain in e-Government context was insufficiently explored in previously published literatures. This paper systematically reviews relevant works to illustrate blockchain issues, challenges, while detecting the new directions for future research of using blockchain applications in e-Government. Discussed literatures explained that adopting blockchain applications to build e-Government services still has obvious lack in empirical evidence. Predominantly, major challenges facing blockchain adoption are summarized in scalability, flexibility and security aspects. organizationally, acceptability issues in blockchain and demanding new models of e-government are illustrated as major obstacles against the adoption. Furthermore, the lack in legislations and helping regulatory represents the major environmental obstacles against the adoption.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127452316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shoichi Nakamura, H. Nakayama, R. Onuma, Junichi Tachibana, H. Kaminaga, Y. Miyadera
{"title":"A System for Identification of Stumbles in Construction of Program Logic that Does Not Appear as Compilation Errors","authors":"Shoichi Nakamura, H. Nakayama, R. Onuma, Junichi Tachibana, H. Kaminaga, Y. Miyadera","doi":"10.1109/ICOCO56118.2022.10031920","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031920","url":null,"abstract":"In programing exercises, it is important to identify the stumbling of each student and to provide appropriate guidance. However, there are circumstances in which students’ stumbling cannot be fully understood due to the diverse nature of their stumbling and the limited number of instructors. In particular, students tend to stumble when trying to shape their programs to match the target processing (“stumbling in construction of a program logic”). However, it is difficult to identify this stumbling since it does not appear as a compilation error. We have developed a system for automatically estimating the stumbling in the construction of a program logic. An experiment to evaluate the effectiveness of the proposed system produced promising results regarding its effectiveness for identifying stumbling in logic construction.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Syahir Nazarudin, H. M. Hanum, S. A. Rahman, S. Mutalib
{"title":"Geotagging for Malay documents using Name-Entity Recognition Approach","authors":"Muhammad Syahir Nazarudin, H. M. Hanum, S. A. Rahman, S. Mutalib","doi":"10.1109/ICOCO56118.2022.10031639","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031639","url":null,"abstract":"There are many tourist places in Malaysia, and still many to be discovered. The Internet is an agent to find web documents describing a place or a location. The precise location or place is always connected to the geotagging process. However, a limited geotagging approach is applied in Malay documents. Hence, a geotagging application is developed using the name-place entity recognition approach. A geotagging algorithm is developed for tagging geographic information in Malay documents. The algorithm performs word filtering and name-place extraction from both the MyGazetteer resources and tourism web resources. An application is built to demonstrate the tagging of geographic information onto each web document. The geotagging prototype (MyGeo-NER) allows users to edit tags of existing web documents, add new ones, and search for documents containing the names of places or locations they have entered.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Nakayama, R. Onuma, Kota Chiba, H. Kaminaga, Y. Miyadera, Shoichi Nakamura
{"title":"A System for Extracting Discussion Circumstances on Social Media to Promote Inexperienced Students Understand Discussion Cases","authors":"H. Nakayama, R. Onuma, Kota Chiba, H. Kaminaga, Y. Miyadera, Shoichi Nakamura","doi":"10.1109/ICOCO56118.2022.10031826","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031826","url":null,"abstract":"Opportunities are increasing for students to conduct discussions in problem-based learning (PBL) while observing discussions on social media. However, they often lack experience in examining actual discussion cases. We aim to develop methods for extracting discussion circumstances on social media to provide them to students so that they can use them as clues to understanding actual discussion cases. Specifically, we extract what kind of topics exist and how utterances are exchanged as discussion circumstances. In this paper, we describe methods for extracting the discussion circumstances and an overview of a support system that we developed. Moreover, we describe an experiment on extracting the circumstances from actual conversation data and discuss the effectiveness of our methods on the basis of the results.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131899795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on Challenges and Solutions in Novice Programming Education","authors":"Tze Ying Sim, Sian Lun Lau","doi":"10.1109/ICOCO56118.2022.10031657","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031657","url":null,"abstract":"Novice programming subject refers to the first programming subject taken by a student. This is also commonly known as Computer Science 1 (CS1) subject. It is concluded that the average failure rate of a novice programming class is 30%. The systematic review collects data between 2000 and 2022 via the Scopus database. Keywords utilized were ”programming, coding, computer” and ”introductory, novice”. The first search resulted in 940 results. The second search added the focus on curriculum. This search only returned 11 results. The papers were analysed to determine if imperative-first or object-first should be adopted. The research indicates that block-based programming is mainly used in K12 education, or CS1 without programming in K12 education. Even though the programming languages used are objectoriented, the activities and class content do not focus on object-oriented programming. The main focus is still learning to solve problems, and imperative-first programming is more commonly implemented. The third search with the word challenges and difficulties returned 163 results. Further search was done for the word within abstract, returning 39 results. The findings indicate 17 research implemented imperative programming vs 1 on object. Most of the research in undergraduate studies implemented textbased programming (22 cases) vs block-based programming (5 cases). Another two observations are automated tools to support teaching and learning, especially personalizing feedback, and the social aspect of learning, for example collaborative learning. This research indicates that the trend for solution has moved from error analysis to block based programming to the future of learning tools automation.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132015003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evelyn Yeap Ewe Lin, Kok Cheng Lim, M. A. Faudzi, Mohd Hazli Mohamed Zabil, Ridha Omar, A. Selamat, O. Krejcar
{"title":"A Systematic Review on English Language e-Learning Technologies","authors":"Evelyn Yeap Ewe Lin, Kok Cheng Lim, M. A. Faudzi, Mohd Hazli Mohamed Zabil, Ridha Omar, A. Selamat, O. Krejcar","doi":"10.1109/ICOCO56118.2022.10031709","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031709","url":null,"abstract":"Language e-learning technologies (LELT) is an emerging area focusing on application of computing technologies in language learning of all kinds. Being a communication skill that requires much face to face interactions, electronic learning approach is definitely a challenge since e-learning focuses on self-paced remote engagements. This paper collects paper pertaining technologies in language learning from year 2019 to 2022 seeking into five research questions on finding out the current trends of research types, evaluation methods, contributions and correlations of between them. This research through a filtration process has found 27 relevant papers. This paper will first present all descriptive findings, data analysis, correlations and lastly insights of the review analysis processes. This paper identified 3 research domain gaps and 3 recommendations of novel future works.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"475 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133039992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Learning-based Anomaly Detection in ZigBee Networks","authors":"Tomoya Oshio, Satoshi Okada, Takuho Mitsunaga","doi":"10.1109/ICOCO56118.2022.10031837","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031837","url":null,"abstract":"With the development of information technology, IoT devices are spreading rapidly. ZigBee is one of the short-range wireless communication standards used in IoT devices and is expected to be used in smart homes and industrial control systems because of its low power consumption and low-cost operation despite its low communication speed. However, ZigBee can be subject to cyber-attacks because eavesdropping on packets and sending forged packets against wireless communication is easier than wired ones. In order to use ZigBee safely in smart home and industrial control systems, it is necessary to develop a method to detect cyber-attacks quickly. In this paper, we propose a machine learning-based anomaly detection system for Zigbee networks. We focus on characteristics of ZigBee communication and investigate a method to detect network anomalies and cyber attacks on ZigBee networks using machine learning. Furthermore, since we primarily put emphasis on practicality, our proposed system is simple and consists of widely used tools such as Wireshark. To evaluate the detection accuracy of our proposed system, we conduct some experiments. As a result, it is shown that our proposed system can detect attacks with high accuracy. In addition, we varied the features used in machine learning and discuss which feature has a high contribution to anomaly detection.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133442135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bukhary Ikhwan Ismail, Shahrol Hisham Baharom, Hishamadie Ahmad, Muhammad Nurmahir Mohamad Sehmi, Mohammad Fairus Khalid
{"title":"Unmanned Ground Vehicle Research Platform for Agricultural Environment","authors":"Bukhary Ikhwan Ismail, Shahrol Hisham Baharom, Hishamadie Ahmad, Muhammad Nurmahir Mohamad Sehmi, Mohammad Fairus Khalid","doi":"10.1109/ICOCO56118.2022.10031658","DOIUrl":"https://doi.org/10.1109/ICOCO56118.2022.10031658","url":null,"abstract":"Palm oil can grow in almost flexible topography. On flats, slopes, hilly, or undulating areas and whether on inland or reclaimed coastal areas. This makes the plantation environment unique with various soil types & surfaces. Each surface has a unique physical characteristic that directly influences the driving, handling, stability and safety of the robot. A mobile robot in palm oil plantation should able to traverse the estate with ease. In this work, we present our development process in converting an all-terrain vehicle (ATV) into Unmanned Ground Vehicle (UGV) agricultural usage, targeting for palm oil plantation estate. We explain the mechanical and electrical conversion activities. We then perform several experiments to verify the responsiveness of our drive-by-wire system conversion.","PeriodicalId":319652,"journal":{"name":"2022 IEEE International Conference on Computing (ICOCO)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}