2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)最新文献

筛选
英文 中文
Educators’ Teaching Strategies in eLearning Environments 电子学习环境下教育者的教学策略
Ug Singh, T. Obafemi
{"title":"Educators’ Teaching Strategies in eLearning Environments","authors":"Ug Singh, T. Obafemi","doi":"10.1109/CCCS.2018.8586825","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586825","url":null,"abstract":"The benefits of the use of information and communication technology (ICT) in teaching and learning is a subject of ongoing debate. In terms of the benefit of improved students’ performance, there has been a major focus on educators with regards to proficiency, acceptance, intentions and actual use of ICTs for teaching and learning. However, the effect of these educators’ teaching strategy on how they use ICTs for teaching and learning is less well studied. The purpose of this paper is to examine educators’ teaching strategies in order to identify those educators who agree with educational approaches which are compatible with the learning advantages associated with elearning. This will enable the proposal of a suitable teaching and learning strategy that will facilitate the improvement of students’ performance through e-learning. A survey of 65 educators in Camperdown schools in the Pinetown district of KwaZulu-Natal province was conducted. The survey was based on a literature review of teaching and learning theories. The results showed that constructivist and progressivist educators have a positive perception of e-learning. Such educators are therefore recommended to pilot elearning projects in schools.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82296967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring Deep Learning in Semantic Question Matching 探索语义问题匹配中的深度学习
Ashwin Dhakal, Arpan Poudel, S. Pandey, S. Gaire, Hari Prasad Baral
{"title":"Exploring Deep Learning in Semantic Question Matching","authors":"Ashwin Dhakal, Arpan Poudel, S. Pandey, S. Gaire, Hari Prasad Baral","doi":"10.1109/CCCS.2018.8586832","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586832","url":null,"abstract":"Question duplication is the major problem encountered by Q &A forums like Quora, Stack-overflow, Reddit, etc. Answers get fragmented across different versions of the same question due to the redundancy of questions in these forums. Eventually, this results in lack of a sensible search, answer fatigue, segregation of information and the paucity of response to the questioners. The duplicate questions can be detected using Machine Learning and Natural Language Processing. Dataset of more than 400,000 questions pairs provided by Quora are preprocessed through tokenization, lemmatization and removal of stop words. This pre-processed dataset is used for the feature extraction. Artificial Neural Network is then designed and the features hence extracted, are fit into the model. This neural network gives accuracy of 86.09%. In a nutshell, this research predicts the semantic coincidence between the question pairs extracting highly dominant features and hence, determine the probability of question being duplicate.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90427744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evaluating Performance of Nepali Script OCR using Tesseract and Artificial Neural Network 用Tesseract和人工神经网络评价尼泊尔文字OCR的性能
Sudan Prajapati, S. R. Joshi, Aman Maharjan, Bikash Balami
{"title":"Evaluating Performance of Nepali Script OCR using Tesseract and Artificial Neural Network","authors":"Sudan Prajapati, S. R. Joshi, Aman Maharjan, Bikash Balami","doi":"10.1109/CCCS.2018.8586808","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586808","url":null,"abstract":"This paper evaluates the performance of Nepali Script OCR using Tesseract and ANN. A dataset of 69 Nepali fonts with the 2,484 character samples of consonants was used in the study. With Tesseract, the overall accuracy of 96% was obtained in the training phase and 69% in the testing phase. Similarly, with ANN, an accuracy of 98% was obtained in training and 81% in testing.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72883144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cyber Security – Securing electrical power transmission and distribution systems 网络安全-保护电力传输和分配系统
S. T, Sudarsan Sd, Janne Starck, Timothy R. Vittor
{"title":"Cyber Security – Securing electrical power transmission and distribution systems","authors":"S. T, Sudarsan Sd, Janne Starck, Timothy R. Vittor","doi":"10.1109/CCCS.2018.8586822","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586822","url":null,"abstract":"Building a secure architecture in the devices and systems used in the power automation system in parallel with supporting power automation protocols is key for the improvement of operational efficiency and reliability of electrical power system network. Creation of effective cyber secure architecture is addressed with specific focus on power transmission and distribution automation solutions and systems. Paper provides practices and methods for adoption. Key advantages of proposed methods, practices and techniques include (i) robustness to withstand cyber-attacks, (ii) resilient to be able to recover in the adverse situation of unwanted/unexpected compromise to security and (iii) continuation of core functionality of the device/system while attack is still ongoing. This is achieved by adopting a defense-indepth strategy across different aspects from product design to having a dedicated security test center, and secure system architecture.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76330991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Character Component Segmentation and Categorization of Machine Printed Text in Devanagari (Nepali) Script in Digital Image Processing 数字图像处理中尼泊尔文机印文字字符成分分割与分类
V. Joshi, S. Panday
{"title":"Character Component Segmentation and Categorization of Machine Printed Text in Devanagari (Nepali) Script in Digital Image Processing","authors":"V. Joshi, S. Panday","doi":"10.1109/CCCS.2018.8586842","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586842","url":null,"abstract":"Extraction of core character with related components, exactness and consistency of extracted symbol determines accuracy of any Digital Image Processing Systems. Furthermore, pre-categorization of extracted symbols reduces lots of processing load at classification level. This paper proposes a core character and its component segmentation and categorization method of Machine Printed Text in Devanagari-Nepali Script. This paper also presents a method that extract modifier components which are not connected to core character. Here, Shirorekha or Dika or header line is considered as major component of segmentation and categorization. The proposed model removes the Shirorekha or Dika using horizontal projection profile on word and label the image of word to extract the objects as components. We have supplied one object has one label. Some character loose some property at removal of Shirorekha. Thus, we have reconstructed character for exactness and consistency of extracted object. We have used a set of structural layout - height width ratio, appearance position in word, presence of Shirorekha over the extracted symbol to categorize the extracted objects. We categorize extracted symbol into five categories - Non-dika character, regular character, conjuncts, upper modifiers and lower modifiers. The result obtained shows we have an accuracy of 98.26% to 100% as compared to previous method.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75283793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aspects Oriented Approach towards the Bug Fixing Performance Lifecycle 面向方面的Bug修复性能生命周期方法
N. R. Rao, K. C. Sekharaiah, Ram Narayan
{"title":"Aspects Oriented Approach towards the Bug Fixing Performance Lifecycle","authors":"N. R. Rao, K. C. Sekharaiah, Ram Narayan","doi":"10.1109/CCCS.2018.8586839","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586839","url":null,"abstract":"Information technology and the development process have driven to dynamic approach towards the bug fix and its improvement. In the process of the software development with respect to time and trend, market has changed a lot in the context of the time and material based projects and many more. Software process development in terms of the agile where most of the client based or can be called service based organization have seen a drastically change where the client involved directly either the process making as scrum master. In the process of the development, we come across the bugs either from the testing or production environment. In this paper, we have tracked the each bug and corresponding solution; facilitates to increase the efficiency of bug fix. In that extend, we have given emphasis on the process of the governance in terms of the all the phases starting from the requirement gathering ending at the product delivery and maintenance, along with priority of bug which is distributed and make sense in terms of the quality and time with the state, behaviour and identity. Hence we have given emphasis on the part of the query based approach to rally like tool which make the process of the development on the distributed easier and simplified.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80644547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mental State Prediction by Deployment of Trained SVM Model on EEG Brain Signal 基于脑电信号的训练支持向量机模型的心理状态预测
Bidur Khanal, S. Pant, Kushal Pokharel, S. Gaire
{"title":"Mental State Prediction by Deployment of Trained SVM Model on EEG Brain Signal","authors":"Bidur Khanal, S. Pant, Kushal Pokharel, S. Gaire","doi":"10.1109/CCCS.2018.8586846","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586846","url":null,"abstract":"Mental States are a function of brain activity; with advancements in Brain Computer Interface (BCI) tools, they can be effectively predicted. Generally, BCI researches are sophisticated requiring multi-channel electrodes, and often carried out in controlled lab environment. This paper illustrates that a simple BCI research, targeting specific region of brain, can be conducted with an elementary setup. A method is demonstrated to predict the level of attentiveness using Electroencephalography (EEG) signal obtained from single-channel, non-invasive, dry-electrode placed on prefrontal cortex region. The acquired raw signal was processed to obtain features which were used to classify the attention state into three classes. As Support Vector Machine (SVM) is more effective in training and classification of high dimensional data, it was implemented and its results were studied.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74857381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non Traditional Proof Mass Arrangement in Cantilever based Piezoelectric Energy Harvester 悬臂式压电能量采集器的非传统验证质量布置
V. Butram, Alok Naugarhiya
{"title":"Non Traditional Proof Mass Arrangement in Cantilever based Piezoelectric Energy Harvester","authors":"V. Butram, Alok Naugarhiya","doi":"10.1109/CCCS.2018.8586838","DOIUrl":"https://doi.org/10.1109/CCCS.2018.8586838","url":null,"abstract":"Piezoelectric Energy harvester provides an alternate source of energy to feed ultra-low power electronic devices as well as WSNs. This paper demonstrates a new idea of covering free end of unimorph PZT-5H cantilever structure with Tungsten proof mass to get higher power with minimum active area. The simulation results an electrical output power and mechanical to electrical conversion efficiency of the piezoelectric generator. The proof mass is arranged in all four sides of the free end of cantilever, resulting in 0.32 V of electric potential at 280 Hz of frequency for input acceleration of 1.0 g. Based on the results obtained, the reported structure harvests $1,mu mathrm {W}$ of power with $5,mathrm {M}Omega $ of resistive load and constitute very less active area of $approx 0.085(mm)^{2}$.","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77621125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Group Signature Scheme Over NTRU Lattice NTRU格上的高效群签名方案
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00012-7_50
Qing Ye, Xiaomeng Yang, Xixi Yan, Zongqu Zhao
{"title":"Efficient Group Signature Scheme Over NTRU Lattice","authors":"Qing Ye, Xiaomeng Yang, Xixi Yan, Zongqu Zhao","doi":"10.1007/978-3-030-00012-7_50","DOIUrl":"https://doi.org/10.1007/978-3-030-00012-7_50","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75643706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Research on B2B Trading Platform Based on Consortium Blockchains 基于联盟区块链的B2B交易平台设计与研究
2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) Pub Date : 2018-06-08 DOI: 10.1007/978-3-030-00006-6_40
X. Xie, Qiangqing Zheng, Zhihong Guo, Qi Wang, Xinrong Li
{"title":"Design and Research on B2B Trading Platform Based on Consortium Blockchains","authors":"X. Xie, Qiangqing Zheng, Zhihong Guo, Qi Wang, Xinrong Li","doi":"10.1007/978-3-030-00006-6_40","DOIUrl":"https://doi.org/10.1007/978-3-030-00006-6_40","url":null,"abstract":"","PeriodicalId":6570,"journal":{"name":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75854593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信