2018 3rd International Conference on Computer and Communication Systems (ICCCS)最新文献

筛选
英文 中文
A Study on Junior-College Students' Maladaptive Cognition and Behaviour in Computer Programming Courses 初中生在计算机程序设计课程中的不良认知与行为研究
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463309
Yen-Zhang Huang, Wan-Chun Wu, Ke-Fan Lin, Tien-Chi Huang
{"title":"A Study on Junior-College Students' Maladaptive Cognition and Behaviour in Computer Programming Courses","authors":"Yen-Zhang Huang, Wan-Chun Wu, Ke-Fan Lin, Tien-Chi Huang","doi":"10.1109/CCOMS.2018.8463309","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463309","url":null,"abstract":"Background and Purpose: The teaching objectives of senior vocational education emphasise professional skills training. In information technology and computer studies, computer programming is an extremely important foundation course for its corresponding professions. However, many studies on programming courses have pointed out that computer programming is a difficult subjectto learn; even undergraduates in information technology and computer studies are deterred by it. According to past research, learners' maladaptive cognition and behavior when learning computer programming tend to affect learning achievement. The purpose of this study is to explore the effects of the maladaptive cognition and learners' behavior in computer programming courses on their learning achievement. Methods: For that reason, this study applied a research survey to investigate the relationship between learners' maladaptive cognition and behavior and learning achievement in computer programming courses. The research participants were students in the information management department of technical and vocational schools who had previously taken programming courses. A surface strategy scale and a procrastination scale were adopted as research instruments to measure learners' maladaptive cognition and behaviour, respectively. Results: The results showed that learners' maladaptive cognition in the learning processes of computer programming courses had a significant, positive impact on their maladaptive behaviour and a significant, negative impact on their learning achievement. These findings indicate that learners' maladaptive cognition affects learning processes and effectiveness. For that reason, learners should reduce the incidence of maladaptive cognition during learning activities, so as to effectively lessen its negative impact on learning outcomes. The results of this study could be used as a reference for educators and educational researchers when designing curricula in the field of computer programming.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128656028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption Challenges of the Internet of Things: ASurvey 采用物联网的挑战:调查
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463303
Abdallah Tubaishat, Suhail Paliath
{"title":"Adoption Challenges of the Internet of Things: ASurvey","authors":"Abdallah Tubaishat, Suhail Paliath","doi":"10.1109/CCOMS.2018.8463303","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463303","url":null,"abstract":"The internet had been considered as pre-dominantly human-to-human interaction. However, this is changing rapidly with the onset of “smart” devices. The potential of a connected world is very much dependent on the adoption of the technologies to realize Internet of Things or IoT. IoT devices produces a unique set of challenges in which the current deployment standards, models & technologies fall short. In this survey paper, the various architectures are explored including the newly introduced fog architecture. The challenges in the cloud based IoT architectures and the IoT paradigm are discussed and categorized. Furthermore, some of the identified solutions and future directions toward overcoming the challenges are described.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Reversible Data Hiding Scheme Based on Frequency Domain with Pseudo-Block-Quantization and Prediction-Error-Expansion 一种基于伪块量化和预测误差扩展的频域可逆数据隐藏方案
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463264
Cheng-Ta Huang, C. Weng, Jui-Tai Wong, Shiuh-Jeng Wang
{"title":"A Reversible Data Hiding Scheme Based on Frequency Domain with Pseudo-Block-Quantization and Prediction-Error-Expansion","authors":"Cheng-Ta Huang, C. Weng, Jui-Tai Wong, Shiuh-Jeng Wang","doi":"10.1109/CCOMS.2018.8463264","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463264","url":null,"abstract":"In this paper, we propose a prediction-error-expansion (PEE) algorithm based on pseudo-block quantization and two prediction-generation methods (PGMs) in the discrete wavelet transform (DWT) domain. Using pseudo-block quantization (PBQ) to construct a pseudo block for generating a prediction value yields a higher probability that a message can be embedded, and using two PGMs makes possible the use of both smooth and rough areas in the frequency domain. In this article, we apply the tools of context-value ordering and context-weight averaging to identify areas that are similar. In the experimental results, we achieve an overall optimization on Embedding efficiency (EE). The results show that our proposed scheme clearly demonstrates better performance than previous scheme.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Impact of Mobility over α-μ Generalized Fading Channels in Wireless Communication 无线通信中α-μ广义衰落信道移动性的影响分析
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463314
Ekkaphot Meesa-Ard, S. Pattaramalai
{"title":"Analyzing the Impact of Mobility over α-μ Generalized Fading Channels in Wireless Communication","authors":"Ekkaphot Meesa-Ard, S. Pattaramalai","doi":"10.1109/CCOMS.2018.8463314","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463314","url":null,"abstract":"In this paper, the impact of mobility on generalized $alpha-mu$ fading distribution is investigated. The mobile user is considered to exhibit Random Way Point (RWP) mobility in three-dimensional network deployment topologies. Novel closed form expressions for Probability Density Function (PDF), Cumulative Distribution Function (CDF) are derived. Thereby performance analysis on Outage Probability (OP), Average Bit Error Rate (ABER) is conducted. Different combinations of $alpha$ and $mu$ in the derived expressions produce various fading distributions including N akagami- $.m$ and Weibull as special cases.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132215731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
High Availability Analysis with Database Cluster, Load Balancer and Virtual Router Redudancy Protocol 基于数据库集群、负载均衡器和虚拟路由器冗余协议的高可用性分析
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463263
Hero Handoko, S. M. Isa, S. Si, M. Kom
{"title":"High Availability Analysis with Database Cluster, Load Balancer and Virtual Router Redudancy Protocol","authors":"Hero Handoko, S. M. Isa, S. Si, M. Kom","doi":"10.1109/CCOMS.2018.8463263","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463263","url":null,"abstract":"The purpose of this paper is to analyze high availability by using MariaDB Galera Cluster, then the performance will be compared if added load balancer HAProxy and Virtual Router Redundancy Protocol (VRRP) using Keepalived. The purpose of this research is to design high availability reliability using MariaDB Galera Cluster, HAProxy and Keepalived, and get results from high availability test of MariaDB Galera Cluster, HAProxy and Keepalived. Analytical methods are used using the down time scenario and compare the performance of Threads, Transaction Per Second (TPS) and Response Time. The results of this study are high availability analysis and performance comparison between the default configuration database clustering using load balancer and VRRP running on virtual machine and cloud. Based on test results that run on virtual machine and cloud, it can be concluded that testing with load balancer configuration has better performance, compared with without using load balancer.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Relationships between Usage Situations and Spatiotemporal QoE in Audio and Video IP Transmission 音视频IP传输中使用情境与时空QoE的关系
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463229
Toshiro Nunome, Keita Abe
{"title":"Relationships between Usage Situations and Spatiotemporal QoE in Audio and Video IP Transmission","authors":"Toshiro Nunome, Keita Abe","doi":"10.1109/CCOMS.2018.8463229","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463229","url":null,"abstract":"QoE (Quality of Experience) of audio and video IP transmission can change according to users' attributes and usage situations. This paper evaluates the effect of usage situations on QoE from a quality tradeoff point of view. As a usage situation, this paper employs distracted watching; the users watch video and audio while doing a calculation task. We perform a subjective experiment to compare two video output schemes: frame skipping and error concealment. We then find that the task can affect the tradeoff between spatial quality and temporal quality.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a Cloud-Based System for Small and Medium Enterprises with Multiple Branches 基于云的中小企业多分支机构系统设计
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463343
Hendrik, Irving Vitra Paputungan, Tomi Budi Susilo, Hari Setiaji
{"title":"Designing a Cloud-Based System for Small and Medium Enterprises with Multiple Branches","authors":"Hendrik, Irving Vitra Paputungan, Tomi Budi Susilo, Hari Setiaji","doi":"10.1109/CCOMS.2018.8463343","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463343","url":null,"abstract":"Small and medium enterprises (SMEs) make a significant contribution to national economies, especially in developing countries. Their potential impacts include contributing to gross domestic product (GDP) and generating employment. However, along with these potentials, SMEs in developing countries often face issues related to their sustainability. This paper aims to exhibit the design of a cloud-based system that can provide a low-cost platform for SMEs. The resulting design is a cloud-based system that consists of two subsystems, back-end and front-end systems. The frontend system is for daily operations and is used by the staff. It comprises the point of sales (PoS) module and an attendance system. Meanwhile, the back-end system is intended for the manager or owner of the SME and contains an analytic module to support management in decision making.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Least Square Reinforcement Learning for Solving Inverted Pendulum Problem 求解倒立摆问题的最小二乘强化学习
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463234
Satta Panyakaew, Papangkorn Inkeaw, Jakramate Bootkrajang, Jeerayut Chaijaruwanich
{"title":"Least Square Reinforcement Learning for Solving Inverted Pendulum Problem","authors":"Satta Panyakaew, Papangkorn Inkeaw, Jakramate Bootkrajang, Jeerayut Chaijaruwanich","doi":"10.1109/CCOMS.2018.8463234","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463234","url":null,"abstract":"Inverted pendulum is one of the classic control problem that could be solved by reinforcement learning approach. Most of the previous work consider the problem in discrete state space with only few exceptions assume continuous state domain. In this paper, we consider the problem of cart-pole balancing in the continuous state space setup with constrained track length. We adopted a least square temporal difference reinforcement learning algorithm for learning the controller. A new reward function is then proposed to better reflect the nature of the task. In addition, we also studied various factors which play important roles in the success of the learning. The empirical studies validate the effectiveness of our method.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124785688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Hybrid Technique for Copy-Move Image Forgery Detection 一种用于复制-移动图像伪造检测的混合技术
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463337
U. A. Khan, Mumtaz A. Kaloi, Z. A. Shaikh, A. A. Arain
{"title":"A Hybrid Technique for Copy-Move Image Forgery Detection","authors":"U. A. Khan, Mumtaz A. Kaloi, Z. A. Shaikh, A. A. Arain","doi":"10.1109/CCOMS.2018.8463337","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463337","url":null,"abstract":"The authenticity of digital images has remained questionable ever since the technology has progressed to the extent where a plethora of freely available software can drastically change the image contents with much less effort. This offers a dedicated challenge to ascertain the veracity of a digital image, especially when it is to be presented as a legal evidence. A number of techniques have been proposed to detect image forgery, albeit their respective efficacy depends on the type of forgery and/or the image features used to detect the forgery. Hence, their respective performance with respect to accuracy and execution time also varies. This paper focuses on the most frequently used image forgery, referred to as copy-move forgery. The work carried out in this paper is two-fold. First, a hybrid approach combining the existing block-based and non-block-based techniques of copy-move forgery is proposed. Second, the performance of the proposed technique is evaluated with different image features, including SIFT, SURF, MSER, MinEigen, FAST and Harris. The evaluation criteria comprising accuracy, precision, recall, F-1 score and execution time help to select a desired tradeoff between accuracy and execution time. The results proposed in the paper show that the proposed image forgery detection technique can successfully detect copy-move forgery with a high accuracy and reasonable execution time. Apart from this, the proposed technique also works fine with smoothed and brightened images.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Prediction and Visualization of Electricity Consumption in the Philippines Using Artificial Neural Networks, Particle Swarm Optimization, and Autoregressive Integrated Moving Average 使用人工神经网络、粒子群优化和自回归综合移动平均预测和可视化菲律宾的电力消耗
2018 3rd International Conference on Computer and Communication Systems (ICCCS) Pub Date : 2018-04-01 DOI: 10.1109/CCOMS.2018.8463351
Nicole Anne C. Atienza, Jave Renzo Augustine T. Jao, Janica Arielle D.S. Angeles, Ernersto Lance T. Singzon, Donata D. Acula
{"title":"Prediction and Visualization of Electricity Consumption in the Philippines Using Artificial Neural Networks, Particle Swarm Optimization, and Autoregressive Integrated Moving Average","authors":"Nicole Anne C. Atienza, Jave Renzo Augustine T. Jao, Janica Arielle D.S. Angeles, Ernersto Lance T. Singzon, Donata D. Acula","doi":"10.1109/CCOMS.2018.8463351","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463351","url":null,"abstract":"Electricity is vital in the development of a country like the Philippines. The researchers of the study developed a long-term prediction model to predict and visualize the regional electricity consumption in the Philippines through implementing Particle Swarm Optimization (PSO) instead of Backpropagation (BP) to train the Artificial Neural Networks (ANN) and implementing Autoregressive Integrated Moving Average (ARIMA) to forecast future predictors. The average prediction accuracy of BP-ANN is 85.95% while the average prediction accuracy of PSO-ANN is 92.40%. Moreover, the average accuracy of PSO-ANN and ARIMA is 96.05%. The results indicated that PSO-ANN is a better prediction model than BP-ANN and that ARIMA performed well in forecasting the future predictors. The study can be of great help to improve the electricity allocation in the Philippines.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信