{"title":"A Study on Junior-College Students' Maladaptive Cognition and Behaviour in Computer Programming Courses","authors":"Yen-Zhang Huang, Wan-Chun Wu, Ke-Fan Lin, Tien-Chi Huang","doi":"10.1109/CCOMS.2018.8463309","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463309","url":null,"abstract":"Background and Purpose: The teaching objectives of senior vocational education emphasise professional skills training. In information technology and computer studies, computer programming is an extremely important foundation course for its corresponding professions. However, many studies on programming courses have pointed out that computer programming is a difficult subjectto learn; even undergraduates in information technology and computer studies are deterred by it. According to past research, learners' maladaptive cognition and behavior when learning computer programming tend to affect learning achievement. The purpose of this study is to explore the effects of the maladaptive cognition and learners' behavior in computer programming courses on their learning achievement. Methods: For that reason, this study applied a research survey to investigate the relationship between learners' maladaptive cognition and behavior and learning achievement in computer programming courses. The research participants were students in the information management department of technical and vocational schools who had previously taken programming courses. A surface strategy scale and a procrastination scale were adopted as research instruments to measure learners' maladaptive cognition and behaviour, respectively. Results: The results showed that learners' maladaptive cognition in the learning processes of computer programming courses had a significant, positive impact on their maladaptive behaviour and a significant, negative impact on their learning achievement. These findings indicate that learners' maladaptive cognition affects learning processes and effectiveness. For that reason, learners should reduce the incidence of maladaptive cognition during learning activities, so as to effectively lessen its negative impact on learning outcomes. The results of this study could be used as a reference for educators and educational researchers when designing curricula in the field of computer programming.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128656028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adoption Challenges of the Internet of Things: ASurvey","authors":"Abdallah Tubaishat, Suhail Paliath","doi":"10.1109/CCOMS.2018.8463303","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463303","url":null,"abstract":"The internet had been considered as pre-dominantly human-to-human interaction. However, this is changing rapidly with the onset of “smart” devices. The potential of a connected world is very much dependent on the adoption of the technologies to realize Internet of Things or IoT. IoT devices produces a unique set of challenges in which the current deployment standards, models & technologies fall short. In this survey paper, the various architectures are explored including the newly introduced fog architecture. The challenges in the cloud based IoT architectures and the IoT paradigm are discussed and categorized. Furthermore, some of the identified solutions and future directions toward overcoming the challenges are described.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127905905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cheng-Ta Huang, C. Weng, Jui-Tai Wong, Shiuh-Jeng Wang
{"title":"A Reversible Data Hiding Scheme Based on Frequency Domain with Pseudo-Block-Quantization and Prediction-Error-Expansion","authors":"Cheng-Ta Huang, C. Weng, Jui-Tai Wong, Shiuh-Jeng Wang","doi":"10.1109/CCOMS.2018.8463264","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463264","url":null,"abstract":"In this paper, we propose a prediction-error-expansion (PEE) algorithm based on pseudo-block quantization and two prediction-generation methods (PGMs) in the discrete wavelet transform (DWT) domain. Using pseudo-block quantization (PBQ) to construct a pseudo block for generating a prediction value yields a higher probability that a message can be embedded, and using two PGMs makes possible the use of both smooth and rough areas in the frequency domain. In this article, we apply the tools of context-value ordering and context-weight averaging to identify areas that are similar. In the experimental results, we achieve an overall optimization on Embedding efficiency (EE). The results show that our proposed scheme clearly demonstrates better performance than previous scheme.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing the Impact of Mobility over α-μ Generalized Fading Channels in Wireless Communication","authors":"Ekkaphot Meesa-Ard, S. Pattaramalai","doi":"10.1109/CCOMS.2018.8463314","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463314","url":null,"abstract":"In this paper, the impact of mobility on generalized $alpha-mu$ fading distribution is investigated. The mobile user is considered to exhibit Random Way Point (RWP) mobility in three-dimensional network deployment topologies. Novel closed form expressions for Probability Density Function (PDF), Cumulative Distribution Function (CDF) are derived. Thereby performance analysis on Outage Probability (OP), Average Bit Error Rate (ABER) is conducted. Different combinations of $alpha$ and $mu$ in the derived expressions produce various fading distributions including N akagami- $.m$ and Weibull as special cases.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132215731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Availability Analysis with Database Cluster, Load Balancer and Virtual Router Redudancy Protocol","authors":"Hero Handoko, S. M. Isa, S. Si, M. Kom","doi":"10.1109/CCOMS.2018.8463263","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463263","url":null,"abstract":"The purpose of this paper is to analyze high availability by using MariaDB Galera Cluster, then the performance will be compared if added load balancer HAProxy and Virtual Router Redundancy Protocol (VRRP) using Keepalived. The purpose of this research is to design high availability reliability using MariaDB Galera Cluster, HAProxy and Keepalived, and get results from high availability test of MariaDB Galera Cluster, HAProxy and Keepalived. Analytical methods are used using the down time scenario and compare the performance of Threads, Transaction Per Second (TPS) and Response Time. The results of this study are high availability analysis and performance comparison between the default configuration database clustering using load balancer and VRRP running on virtual machine and cloud. Based on test results that run on virtual machine and cloud, it can be concluded that testing with load balancer configuration has better performance, compared with without using load balancer.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relationships between Usage Situations and Spatiotemporal QoE in Audio and Video IP Transmission","authors":"Toshiro Nunome, Keita Abe","doi":"10.1109/CCOMS.2018.8463229","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463229","url":null,"abstract":"QoE (Quality of Experience) of audio and video IP transmission can change according to users' attributes and usage situations. This paper evaluates the effect of usage situations on QoE from a quality tradeoff point of view. As a usage situation, this paper employs distracted watching; the users watch video and audio while doing a calculation task. We perform a subjective experiment to compare two video output schemes: frame skipping and error concealment. We then find that the task can affect the tradeoff between spatial quality and temporal quality.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121309774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hendrik, Irving Vitra Paputungan, Tomi Budi Susilo, Hari Setiaji
{"title":"Designing a Cloud-Based System for Small and Medium Enterprises with Multiple Branches","authors":"Hendrik, Irving Vitra Paputungan, Tomi Budi Susilo, Hari Setiaji","doi":"10.1109/CCOMS.2018.8463343","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463343","url":null,"abstract":"Small and medium enterprises (SMEs) make a significant contribution to national economies, especially in developing countries. Their potential impacts include contributing to gross domestic product (GDP) and generating employment. However, along with these potentials, SMEs in developing countries often face issues related to their sustainability. This paper aims to exhibit the design of a cloud-based system that can provide a low-cost platform for SMEs. The resulting design is a cloud-based system that consists of two subsystems, back-end and front-end systems. The frontend system is for daily operations and is used by the staff. It comprises the point of sales (PoS) module and an attendance system. Meanwhile, the back-end system is intended for the manager or owner of the SME and contains an analytic module to support management in decision making.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123727930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Least Square Reinforcement Learning for Solving Inverted Pendulum Problem","authors":"Satta Panyakaew, Papangkorn Inkeaw, Jakramate Bootkrajang, Jeerayut Chaijaruwanich","doi":"10.1109/CCOMS.2018.8463234","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463234","url":null,"abstract":"Inverted pendulum is one of the classic control problem that could be solved by reinforcement learning approach. Most of the previous work consider the problem in discrete state space with only few exceptions assume continuous state domain. In this paper, we consider the problem of cart-pole balancing in the continuous state space setup with constrained track length. We adopted a least square temporal difference reinforcement learning algorithm for learning the controller. A new reward function is then proposed to better reflect the nature of the task. In addition, we also studied various factors which play important roles in the success of the learning. The empirical studies validate the effectiveness of our method.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124785688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. A. Khan, Mumtaz A. Kaloi, Z. A. Shaikh, A. A. Arain
{"title":"A Hybrid Technique for Copy-Move Image Forgery Detection","authors":"U. A. Khan, Mumtaz A. Kaloi, Z. A. Shaikh, A. A. Arain","doi":"10.1109/CCOMS.2018.8463337","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463337","url":null,"abstract":"The authenticity of digital images has remained questionable ever since the technology has progressed to the extent where a plethora of freely available software can drastically change the image contents with much less effort. This offers a dedicated challenge to ascertain the veracity of a digital image, especially when it is to be presented as a legal evidence. A number of techniques have been proposed to detect image forgery, albeit their respective efficacy depends on the type of forgery and/or the image features used to detect the forgery. Hence, their respective performance with respect to accuracy and execution time also varies. This paper focuses on the most frequently used image forgery, referred to as copy-move forgery. The work carried out in this paper is two-fold. First, a hybrid approach combining the existing block-based and non-block-based techniques of copy-move forgery is proposed. Second, the performance of the proposed technique is evaluated with different image features, including SIFT, SURF, MSER, MinEigen, FAST and Harris. The evaluation criteria comprising accuracy, precision, recall, F-1 score and execution time help to select a desired tradeoff between accuracy and execution time. The results proposed in the paper show that the proposed image forgery detection technique can successfully detect copy-move forgery with a high accuracy and reasonable execution time. Apart from this, the proposed technique also works fine with smoothed and brightened images.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124051279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicole Anne C. Atienza, Jave Renzo Augustine T. Jao, Janica Arielle D.S. Angeles, Ernersto Lance T. Singzon, Donata D. Acula
{"title":"Prediction and Visualization of Electricity Consumption in the Philippines Using Artificial Neural Networks, Particle Swarm Optimization, and Autoregressive Integrated Moving Average","authors":"Nicole Anne C. Atienza, Jave Renzo Augustine T. Jao, Janica Arielle D.S. Angeles, Ernersto Lance T. Singzon, Donata D. Acula","doi":"10.1109/CCOMS.2018.8463351","DOIUrl":"https://doi.org/10.1109/CCOMS.2018.8463351","url":null,"abstract":"Electricity is vital in the development of a country like the Philippines. The researchers of the study developed a long-term prediction model to predict and visualize the regional electricity consumption in the Philippines through implementing Particle Swarm Optimization (PSO) instead of Backpropagation (BP) to train the Artificial Neural Networks (ANN) and implementing Autoregressive Integrated Moving Average (ARIMA) to forecast future predictors. The average prediction accuracy of BP-ANN is 85.95% while the average prediction accuracy of PSO-ANN is 92.40%. Moreover, the average accuracy of PSO-ANN and ARIMA is 96.05%. The results indicated that PSO-ANN is a better prediction model than BP-ANN and that ARIMA performed well in forecasting the future predictors. The study can be of great help to improve the electricity allocation in the Philippines.","PeriodicalId":405664,"journal":{"name":"2018 3rd International Conference on Computer and Communication Systems (ICCCS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}