{"title":"Improved Classification Accuracy by Feature Selection using Adaptive Support Method","authors":"Erna Hikmawati, N. Maulidevi, K. Surendro","doi":"10.1145/3587828.3587854","DOIUrl":"https://doi.org/10.1145/3587828.3587854","url":null,"abstract":"The explosion of data which is happening now must be utilized to support decision making both in terms of business and other matters. Data which are becoming assets today needs to be analyzed and extracted in order to find valuable information. The results of data analysis can be used to make predictions, one of which is classification. For high dimensions data, we require preprocessing stage so that the model building process is not complex and the analysis is accurate. One of the preprocessing stages that need attention is feature selection. Feature selection is applied to reduce features without diminishing the accuracy and information in the data. Performing feature selection can also be done by using the association rule. Association rule refers to considering the association relationship between items and the frequency of items occurrence as features. However, the obstacle in implementing the association rule is when determining the minimum support value. Therefore, an adaptive support method is proposed to determine the minimum support value automatically based on the characteristics of the dataset. In this present study, a feature selection method using adaptive support is proposed. Based on the experimental results using 3 classifiers, the accuracy and F1-Score values for the feature selection method using adaptive support are higher compared to the Information gain method.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"275 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122937485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Alzheimer's Disease Early Diagnosis Based on Resting-State Dynamic Functional Connectivity","authors":"Fei Xie, Xiaoliang Gong, Zhenghao He, Tongqi Wu, Yan Lu, Mohan Zhao","doi":"10.1145/3587828.3587881","DOIUrl":"https://doi.org/10.1145/3587828.3587881","url":null,"abstract":"Functional magnetic resonance imaging (fMRI) technology has been widely used in the diagnosis of Alzheimer's disease, but there are some problems such as high data dimension and unclear characteristics. The nonlinear complex network of different brain regions based on the Lyapunov exponents and approximate entropy are extracted in this work. The open data set ADNI (Alzheimer's disease neuroimaging initiative) are used to test. The results show that in the other three different groups and patients with Alzheimer's disease, the accuracy of the classification results using SVM (support vector machine) classifier at the whole brain voxel level can reach more than 99%, which is better than the classification results using the correlation of the original time series. Our findings provide new insights into the complexity of brain structural networks in the process of Alzheimer's disease and other mental diseases.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128603029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Laghari, Hamdan T. A. Hraiz, Solomon I. Ghebretatios, Aamna S. H. K. Alshehhi
{"title":"Academic Course Planning Software System at EECE Department","authors":"M. Laghari, Hamdan T. A. Hraiz, Solomon I. Ghebretatios, Aamna S. H. K. Alshehhi","doi":"10.1145/3587828.3587844","DOIUrl":"https://doi.org/10.1145/3587828.3587844","url":null,"abstract":"The scheduling of student courses is an imperative as well as a trivial process that can cope with unnecessary industrial and graduation delays. The Department of Electrical and Communication (EECE) at the United Arab Emirates University (UAEU) is one such organization where students encounter problems conditional on many issues that may include improper course advising system, students’ capability to pursue upright advice from advisers, knowledge, and adequate skills of the academic advisors, etc. Inappropriately advised students may endure issues such as lost time because of incorrect course selection, course planning with conflicting offering times, not selecting appropriate courses specific for offering semesters, wrongly selecting o discipline-specific electives, planning either too less or too many courses for a specific semester, etc. An Academic Course Planning Software System (ACPSS) is devised to help students in creating a course study plan to guide them select suitable courses at the registration time. The outcome of this course selection process, which takes the form of a detailed study plan, is recorded in a text file. The system is tested by more than 20 students, however, three test cases are included in this article.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"574 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127082710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QR Code Application in Tree Management: A Pilot Project","authors":"T. Truong, Loc Tan Le","doi":"10.1145/3587828.3587842","DOIUrl":"https://doi.org/10.1145/3587828.3587842","url":null,"abstract":"Vietnam's tree cover is low compared to the global average. For this reason, the government launched the \"Plant 1 Billion Trees for Vietnam\" program in 2021. As the number of trees grows rapidly in the future, proper management will be required. Aside from the care of trees provided by tree management departments, the public's cooperation is essential for trees to grow healthily. This thesis proposes an embedded system and application software for tree management that makes use of QR codes. Each QR code will be used as a tag for tagging trees and can be scanned by anyone to learn more about the trees. This system allows tree management departments to easily collect tree data and store it in a cloud database, which can then be retrieved to serve good management and raise community awareness of the benefit of tree cover among citizens. Experiments on many trees at two pagodas in Soc Trang, a province in the South of Vietnam, were used to calibrate the performance and assess the feasibility of the proposed system.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cascading Global and Local Deep Features for Smartphone-based Human Activity Classification","authors":"Sarmela Ap Raja Sekaran, Y. Pang, S. Ooi","doi":"10.1145/3587828.3587877","DOIUrl":"https://doi.org/10.1145/3587828.3587877","url":null,"abstract":"The advancement in technology with multiple sensors embedded in smartphones results in the widespread of smartphones in the applications of human activity analysis and recognition. This promotes a variety of ambient assistive living applications, such as fitness tracking, fall detection, home automation system, healthcare monitoring etc. In this paper, a human activity recognition based on the amalgamation of statistical global features and local deep features is presented. The proposed model adopts temporal convolutional architecture to extract the long-range temporal patterns from the inertial activity signals captured by smartphones. To further enrich the information, statistical features are computed so that the global features of the time series data are encoded. Next, both global and local deep features are combined for classification. The proposed model is evaluated by using WISDM and UCI HAR datasets for user-dependent and independent protocols, respectively, to ensure its feasibility as user-dependent and independent HAR solutions. The obtained empirical results exhibit that the proposed model is outperforming the other existing deep learning models on both user-dependent and independent testing protocols.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130370373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Digital Forensic Artifacts Data Enrichment Mechanism for Cyber Threat Intelligence","authors":"Hyung-Woo Lee","doi":"10.1145/3587828.3587857","DOIUrl":"https://doi.org/10.1145/3587828.3587857","url":null,"abstract":"Cyber attack targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the cyber incident response system, it is necessary to apply a data enrichment mechanism for the collected digital forensic artifacts data to reinforce threat analysis and detection performance. Therefore, we designed and implemented the data enrichment mechanism for cyber threat intelligent system by analyzing the existing cyber incident response framework such as SIEM, CTI based on the aggregated digital forensic artifacts. Through this, it is expected to improve the detection performance and effectiveness when using artifact data enrichment process for analyzing cyber incidents collected from heterogeneous devices.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129781952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPU Sparse Matrix Vector Multiplication Optimization Based on ELLB Storage Format","authors":"Haonan Chen, Zhuowei Wang, Lianglun Cheng","doi":"10.1145/3587828.3587834","DOIUrl":"https://doi.org/10.1145/3587828.3587834","url":null,"abstract":"ELLPACK(ELL) sparse matrix storage format has problems such as high storage consumption and low efficiency of sparse matrix vector multiplication(SpMV). To solve this problem, we propose a Graphic Processing Unit(GPU)-based efficient ELLPACK-Block(ELLB) sparse matrix storage format. Based on the original ELL storage format, this format adaptively divides the matrix into blocks according to the average number of non-zero elements in each row, and uses auxiliary matrices to improve the efficiency of SpMV solution. We use the ELLB storage format to solve the SpMV problem for different matrices. The experimental results show that compared with the Perfect Compressed Sparse Row(PCSR) format, the ELLB sparse matrix storage format saves 50 of the memory space, and the average efficiency of solving SpMV is increased by 7 times; compared with the Effective Compressed Sparse Row(ECSR) format, the memory space usage is increased by 25, but the solution of SpMV The efficiency is increased by an average of 7.65 times.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"35 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125722184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service-Level Agreement Management with Blockchain-based Smart Contract to Improve the Quality of IT Service Management.","authors":"Z. F. Azzahra, Gusti Bagus, B. Nugraha","doi":"10.1145/3587828.3587867","DOIUrl":"https://doi.org/10.1145/3587828.3587867","url":null,"abstract":"Information Technology Service Management is managing information technology services that focus on customer satisfaction and ensure meeting Service Level Agreements (SLA). The organization used in this study is a university, and there are service providers, namely the information technology directorate center, and the service users are several sections in the university. SLA management is currently conducted by emailing SLA documents to each section. The current SLA management is challenging to manage contract recording because documents are in separate emails, and there needs to be a monitoring process for SLA. This study proposes a service-level agreement management system using blockchain-based smart contracts and uses a private blockchain network for implementing smart contracts. The results of this study show the process of managing SLA using a smart contract in a more structured to improve the quality of IT service management.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A way to find counterexamples located at deep positions with domain knowledge of authentication protocols","authors":"Naomi Okumura, K. Ogata","doi":"10.1145/3587828.3587859","DOIUrl":"https://doi.org/10.1145/3587828.3587859","url":null,"abstract":"We have model checked that a revised version of the RFC 8120 authentication protocol for HTTP enjoys the four security properties under the assumption that once a password is used for a protocol run, it is leaked to the intruder, such as the intruder, after the protocol run, and random numbers generated by servers are leaked to the intruder. The properties are (1) key secrecy (K-SEC), (2) key sharing (K-SHR), (3) client-point-of-view non-injective agreement (C-NIA), and (4) server-point-of-view non-injective agreement (S-NIA). We intuitively know that the protocol is least likely to enjoy each of the properties under the assumption. Due to the state space explosion, however, it is impossible to find a counterexample for each property with model checking. We have then split each model checking experiment into multiple model checking experiments. We first find a state in which a password has been leaked to the intruder. We next use a state as the initial state to find states in which that K-SEC, C-NIA and S-NIA are broken, respectively. We finally use a state in which C-NIA is broken as the initial state to find a state in which K-SHR is broken.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134522123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Umezawa, Mitsuaki Sawata, M. Nakazawa, S. Hirasawa
{"title":"A Study on the Relationship Between Heart Rate and Brain Waves During Programming Task in Several Experiments","authors":"K. Umezawa, Mitsuaki Sawata, M. Nakazawa, S. Hirasawa","doi":"10.1145/3587828.3587876","DOIUrl":"https://doi.org/10.1145/3587828.3587876","url":null,"abstract":"As the difficulty of a learning task increases, brain waves (β/α) activity also increases. This study investigated the learning state by measuring biometric information aside from than brain waves. We found that heart rate (HR) decreases as the difficulty of the task increases. In this study, we analyzed the results of several experiments with different participants and different target tasks. Specifically, the differences between the mean values of EEG and heart rate obtained in three different experiments were compared using a t-test. From this, we conclude that the more active the brain wave (β/α), the lower the HR. These results may suggest that this may be used to determine the state of where an individual may give up because the task is too challenging.","PeriodicalId":340917,"journal":{"name":"Proceedings of the 2023 12th International Conference on Software and Computer Applications","volume":"771 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}