2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)最新文献

筛选
英文 中文
Comparative Evaluation of Asymmetric Price Transmission Linear Models Using rMDL, eMDL, nMDL, gMDL, AIC and BIC Across Varying Sample Sizes 不同样本量下rMDL、eMDL、nMDL、gMDL、AIC和BIC的非对称价格传导线性模型比较评价
I. K. Amponsah, H. Acquah, Nathaniel K. Howard
{"title":"Comparative Evaluation of Asymmetric Price Transmission Linear Models Using rMDL, eMDL, nMDL, gMDL, AIC and BIC Across Varying Sample Sizes","authors":"I. K. Amponsah, H. Acquah, Nathaniel K. Howard","doi":"10.1109/ICCMA.2019.00030","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00030","url":null,"abstract":"The Minimum Description Length (MDL), a less known criterion, is making great strides in model selection as compared to the widely known and used information criteria (AIC, BIC, etc). This study developed the MDL criterion using R-functions to evaluate Asymmetric Price Transmission (APT) models (Complex, Standard and Houck’s) for the first time ever. All six criteria’s ability to recover the true DGP was assessed under the condition of varying sample size. A 1000 Monte Carlo simulation procedure revealed that the MDL criteria on the average points to the true DGP and are comparable (if not better) to both AIC and BIC under study condition. Generally, the performances of all model selection criteria (rMDL, nMDL, gMDL, eMDL, AIC and BIC) improved with increasing sample size in their ability to recover the true DGP for both standard and complex models. This study recommends the use of MDL criterion in model selection and in the light of constraint (financial, time and inadequate resources), a sample size of 150 is sufficient in making sound decisions on asymmetric price models.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Decision Tree Classification Algorithm to Predict Learner Typologies for Project-Based Learning 基于项目的学习中使用决策树分类算法预测学习者类型
E. Gyimah, D. K. Dake
{"title":"Using Decision Tree Classification Algorithm to Predict Learner Typologies for Project-Based Learning","authors":"E. Gyimah, D. K. Dake","doi":"10.1109/ICCMA.2019.00029","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00029","url":null,"abstract":"As educational data in tertiary institutions are becoming huge, it is important to deploy Data Mining algorithms in discovering knowledge and improving academic quality. One fast course delivery approach or trend, constructivism in higher education is based on Learner prioritization in the learning process where a learner transforms information, constructs hypothesis and makes decisions using mental models. Similar learner groupings for project-based learning through hidden patterns extraction can aid Active Learning and Instructor Monitoring. In our previous paper, K-means clustering algorithm was used to group learners with similar scores in three assessments. In this paper, we built a classifier model using the J48 Decision Tree Algorithm for predicting learner groupings after getting class labels through the K-means clustering algorithm. This classifier will help in predicting future groupings of learners for the same course and attributes. The weka simulation for the classifier model gave a 99.9% ROC Area curve, which indicates a general performance of the model and a 96.19% of correctly classified instances. The Confusion Matrix has 80% of the members correctly classified. The classification model has an extremely low FP Rate of 2%, another indication of a high performance predictive classifier.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133618212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Investigating the Actual usage of Learning Management System: From Perspectives of University Students 学习管理系统的实际使用情况调查:以大学生为视角
Charles Buabeng-Andoh, Charles Baah
{"title":"Investigating the Actual usage of Learning Management System: From Perspectives of University Students","authors":"Charles Buabeng-Andoh, Charles Baah","doi":"10.1109/ICCMA.2019.00008","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00008","url":null,"abstract":"This study investigated university students' actual use of learning management system using Unified Theory of Acceptance and Use of Technology (UTAUT) model. Quantitative and qualitative research strategies were adopted using close-ended and open-ended questionnaire to collect data from 149 students who were learning management system (LMS) users. Random sampling approach was used to select the students. The quantitative data were analyzed using structural equation model and the qualitative data were analyzed using thematic analysis. The results from quantitative analysis showed that performance expectancy, effort expectancy and institutional support influenced students' actual use of LMS while social influence and infrastructure support did not influence students' actual use. But, the results from qualitative analysis found lack of training, unavailability of internet connection and poor electricity supply as major concerns that affect students' actual usage of LMS. This study contributed to the current discussion on use of UTAUT to explain students' actual use of technology in developing countries. Implications, limitations and future studies were discussed.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Nodal Authentication of IoT Data Using Blockchain 使用区块链的物联网数据节点认证
B. Asare, Kester Quist-Aphetsi, Laurent Nana
{"title":"Nodal Authentication of IoT Data Using Blockchain","authors":"B. Asare, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICCMA.2019.00028","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00028","url":null,"abstract":"Pervasive systems over the years continuous to grow exponentially. Engagement of IoT in fields such as Agriculture, Home automation, industrial applications etc is on the rise. Self organizing networks within the IoT field give rise to engagement of various nodes for data communication. The rise in Cyber-attacks within IoT pose a lot of threat to these connected nodes and hence there is a need for data passing through nodes to be verified during communication. In this paper we proposed a nodal authentication approach in IoT using blockchain in securing the integrity of data passing through the nodes in IoT. In our work, we engaged the GOST algorithm in our approach. At the end, we achieved a nodal authentication and verification of the transmitted data. This makes it very difficult for an attacker to fake a node in the communication chain of the connected nodes. Data integrity was achieved in the nodes during the communication.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Decentralized Cryptographic Blockchain Approach for Health Information System 健康信息系统的去中心化加密区块链方法
Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana
{"title":"A Decentralized Cryptographic Blockchain Approach for Health Information System","authors":"Rexford Nii Ayitey Sosu, Kester Quist-Aphetsi, Laurent Nana","doi":"10.1109/ICCMA.2019.00027","DOIUrl":"https://doi.org/10.1109/ICCMA.2019.00027","url":null,"abstract":"With the rise of cyber attacks and the advancement of technology providing easy access to personal data and information in real time using networks and other services such as the cloud. These advancements have placed sensitive data such as medical information under threat. Due to the ease in accessing and modifying such data leading to little or no trace of such wrongdoings. This paper proposes a cryptographic blockchain approach using the md5 hash algorithm to verify and validate the medical data of the health information system infrastructure. The approach makes it difficult for data to be altered without detection and adopts a distributed approach coupled with blockchain.","PeriodicalId":413965,"journal":{"name":"2019 International Conference on Computing, Computational Modelling and Applications (ICCMA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115316708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信