Aofan Liu, Mst. Surma Khatun, Han Liu, Mahdi H. Miraz
{"title":"Lightweight Blockchain of Things (BCoT) Architecture for Enhanced Security: A Literature Review","authors":"Aofan Liu, Mst. Surma Khatun, Han Liu, Mahdi H. Miraz","doi":"10.1109/contesa52813.2021.9657112","DOIUrl":"https://doi.org/10.1109/contesa52813.2021.9657112","url":null,"abstract":"Both the internet of things (IoT) and distributed ledger technology (DLT), more commonly known as the blockchain, are two popular emerging technologies of this era. While blockchain offers strengthened security, along with other benefits, it requires peer-to-peer (P2P) nodes for its consensus process. On the contrary, IoT ecosystems inherently consist of many P2P nodes but it is highly critiqued for its lack of security measures. Therefore, the fusion of these complementary duos, known as the blockchain of things (BCoT), has become a recent research trend. While the fit is good and the benefits such consolidation can offer are obvious, a lot of challenges are yet to be addressed. Therefore, we have conducted a comprehensive literature review, covering 33 research articles, spanning over the last six years (2016–2021), to report the state-of-the-art research in this domain. We have synthesised the existing literature by comparing, contrasting, resembling as well as critically evaluating them and thus, deduced the current challenges and future research directions, particularly with regards to lightweightness.","PeriodicalId":323624,"journal":{"name":"2021 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131273776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Fahim Faisal, Mohammad Neyamath Ullah Saqlain, M. Bhuiyan, Mahdi H. Miraz, M. Patwary
{"title":"Credit Approval System Using Machine Learning: Challenges and Future Directions","authors":"Mohammad Fahim Faisal, Mohammad Neyamath Ullah Saqlain, M. Bhuiyan, Mahdi H. Miraz, M. Patwary","doi":"10.1109/contesa52813.2021.9657153","DOIUrl":"https://doi.org/10.1109/contesa52813.2021.9657153","url":null,"abstract":"The applications of machine learning have now reached variety of industries, including banking and financial organisations. While credit approval is a key concern of the banking industry, machine learning is widely regarded as one of the most effective methods for credit approval. In fact, due to significant amount of research being conducted in this domain, enhanced new algorithms and/or approaches are continuously being proposed by the researchers. Therefore, to compare, contrast and synthesise the performance of these machine learning algorithms, this literature survey covered 52 articles since as far back as 2000. We have also recommended the application of fuzziness-based semi-supervised learning, which has never been previously utilised in the credit approval process, as per our survey findings.","PeriodicalId":323624,"journal":{"name":"2021 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dilshad Jahin, Israt Jahan Emu, Subrina Akter, M. Patwary, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz
{"title":"A Novel Oversampling Technique to Solve Class Imbalance Problem: A Case Study of Students’ Grades Evaluation","authors":"Dilshad Jahin, Israt Jahan Emu, Subrina Akter, M. Patwary, Mohammad Arif Sobhan Bhuiyan, Mahdi H. Miraz","doi":"10.1109/contesa52813.2021.9657151","DOIUrl":"https://doi.org/10.1109/contesa52813.2021.9657151","url":null,"abstract":"The academic performance of the students is one of the critical aspects in ranking educational institutions, particularly at the secondary level. If the student’s performance is not appropriately defined, then the institution’s reputation is at risk. Therefore, data mining could be used for this purpose, to attain high accuracy. However, the data being incomplete, inaccurate and/or noisy, or with an imbalance class label in the dataset, is highly likely to affect the accuracy of the data mining model. This paper proposes a semi-supervised oversampling method to first prepare a balanced dataset and then to classify the students’ grades into a binary class with overall performance in any given course. The student performance dataset from the UCI machine learning repository is used, which contains student performance related data of two different courses. A detailed validation result shows that the decision tree algorithm performs better with the balanced dataset compared to the imbalanced one.","PeriodicalId":323624,"journal":{"name":"2021 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122495155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Fetaji, B. Fetaji, Maaruf Ali, I. Zeqiri, Halil Snopçe, M. Ebibi
{"title":"Analysis and Performance Evaluation of E-Commerce Implementation","authors":"M. Fetaji, B. Fetaji, Maaruf Ali, I. Zeqiri, Halil Snopçe, M. Ebibi","doi":"10.1109/contesa52813.2021.9657111","DOIUrl":"https://doi.org/10.1109/contesa52813.2021.9657111","url":null,"abstract":"The problems facing the implementation and adoption of e-commerce (electronic-commerce) is investigated in the Balkan region, specifically in North Macedonia. The strengths and weaknesses are analysed by using a questionnaire targeting the stakeholders and consumers located in Northern Macedonia. 40 consumers were chosen dealing with 20 selected companies. The total population under examination were gender balanced with their age starting from 18 years old. Each group had their own set of questions. The questions were of mixed modality consisting of binary responses, multiple choices and the use of the Likert Scale. The responses were analysed and recommendations made.","PeriodicalId":323624,"journal":{"name":"2021 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131995997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommender System based on Deep Neural Network and Long Short Term Memory","authors":"Sandeep Kumar Rachamadugu, Jayanarayana Reddy Dwaram, Kiran Rao Patike","doi":"10.1109/contesa52813.2021.9657131","DOIUrl":"https://doi.org/10.1109/contesa52813.2021.9657131","url":null,"abstract":"To provide relevant recommendations for clients, a recommendation system is essential in online commerce, streaming services, and news article websites. Existing methods in recommendation systems are limited by the cold start problem. The Deep Neural Network (DNN) – Long Short-Term Memory (LSTM) technique is developed in this study to improve the efficiency of recommendation systems. The DNN method is used to predict new user ratings based on prior user ratings, while the LSTM method is used to recommend a relevant movie to the user. The user-item similarity was calculated and used in the LSTM algorithm to offer the relevant recommendation. The LSTM approach has the advantage of storing relevant information over time and making appropriate recommendations. The proposed DNN-LSTM (Deep Neural Network-Long Short-Term Memory) technique in the recommendation system is evaluated using the MovieLens 100k and 1M datasets. In the MovieLens 100k dataset, the proposed DNN-LSTM approach has an RMSE of 0.431, while the existing HCBCF (Hellinger Coefficient Based Collaborative Filtering) method has an RMSE of 0.871.","PeriodicalId":323624,"journal":{"name":"2021 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127360083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploration of the Attacking Web Vectors","authors":"Tea Osmëni, Maaruf Ali","doi":"10.1109/contesa52813.2021.9657129","DOIUrl":"https://doi.org/10.1109/contesa52813.2021.9657129","url":null,"abstract":"Most people in the industrial world use a wide variety of web applications daily with the majority being insecure and vulnerable. This gives hackers the opportunity to steal data from the user’s web application, which may contain sensitive information. Vulnerability detection may be conducted by a rigorous penetration test. A penetration tester’s duty is to define and exploit the web applications’ vulnerabilities.This paper describes a technique for automatic vulnerable web application generation application. Firstly, the prepared web application is sent to the tool to create the vulnerable web application version. This tool does this by the injection of Cross Site Request Forgery (CSRF) and Cross Site Scripting (XSS) into the web application. Different variant vulnerabilities may be injected too, so different methods are needed, in order to exploit vulnerabilities dependent on the variant. One of the tool’s tasks is to produce web applications, which will be used to train the penetration testers.","PeriodicalId":323624,"journal":{"name":"2021 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129723622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}