2018 Second International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Evaluating the Usability and Learnability of the "Blackboard" LMS Using SUS and Data Mining 利用SUS和数据挖掘评估“黑板”LMS的可用性和可学习性
Khalid Al-Omar
{"title":"Evaluating the Usability and Learnability of the \"Blackboard\" LMS Using SUS and Data Mining","authors":"Khalid Al-Omar","doi":"10.1109/ICCMC.2018.8488038","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488038","url":null,"abstract":"Learning management systems (LMSs) provide integrated platforms of various technologies to support instructors and students. Usability evaluation is an essential factor to measure how well technology works for users. The aim of this study is to examine the usability of the LMS in King Abdulaziz University by using some pre-defined usability standards, such as a system usability scale (SUS) questionnaire. A further investigation used data mining techniques (sentiment analysis and clustering) in order to find out the details of any usability problems. The results show that distance education students suffer the most, followed by external students. On the other hand, instructors seem to have a less negative attitude than students towards Blackboard. Overall, the usability of LMSs at KAU is inadequate and needs to be enhanced for all types of users by customising blackboard according to each group.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"386-390"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80172791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Modern Approach for Load Balancing Using Forest Optimization Algorithm 基于森林优化算法的现代负载平衡方法
Subasish Mohapatra, Ishan Aryendu, Anshuman Panda, A. K. Padhi
{"title":"A Modern Approach for Load Balancing Using Forest Optimization Algorithm","authors":"Subasish Mohapatra, Ishan Aryendu, Anshuman Panda, A. K. Padhi","doi":"10.1109/ICCMC.2018.8487765","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487765","url":null,"abstract":"Load Balancing plays a dynamic role in keeping the tempo of the Cloud Computing framework. This research paper proposes a Forest Optimization Algorithm for load balancing in distributed computing structure. This depends on the conduct of the trees in the forest and uses the seed dispersal strategies for streamlining the makespan, which results in improved average response time and the total execution time. The simulation results prove that the proposed algorithm gives better outcomes than its counterpart load balancing algorithms.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90385415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PARTS OF SPEECH TAGGING FOR KONKANI LANGUAGE konkani语词性标注
Diksha N. Prabhu Khorjuvenkar, Megha Ainapurkar, S. Chagas
{"title":"PARTS OF SPEECH TAGGING FOR KONKANI LANGUAGE","authors":"Diksha N. Prabhu Khorjuvenkar, Megha Ainapurkar, S. Chagas","doi":"10.1109/iccmc.2018.8487620","DOIUrl":"https://doi.org/10.1109/iccmc.2018.8487620","url":null,"abstract":"It is remarkable to note that the scope of Natural Language Processing (NLP) is developing and increasing in the area of text mining. Natural Language Processing is a field that covers computer understanding and deals with manipulation of human language. Human language is an unstructured source of information, and hence to use it, as an input to a computer program, it has to be, first, converted into a structured format [3]. Parts of Speech (POS) tagging is one of the steps which assigns a particular part of speech to a respective word. POS is difficult because most words tend to have more than one parts of speech in different cases and some parts of speech are complex or unspoken. This paper aims at developing part of speech tagging model for Konkani language, using the Konkani corpus.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"36 1","pages":"605-607"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85209946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved Automatic Feature Selection Approach for Health Risk Prediction 一种改进的健康风险预测自动特征选择方法
Shreyal Gajare, S. Sonawani
{"title":"Improved Automatic Feature Selection Approach for Health Risk Prediction","authors":"Shreyal Gajare, S. Sonawani","doi":"10.1109/ICCMC.2018.8487695","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487695","url":null,"abstract":"With the recent advances in machines & technology, there is revolution in healthcare industry also. Thus, it gave rise to the concept of Electronic Health Record (EHR) which stores patients demographics, lab tests & results, medical history, habits etc. in electronic form. EHR is voluminous data which is difficult to store, maintain or alter. To provide extended life for people, health risk prediction model using this EHR is formulated in this work. Feature Selection is used to select only associated or relevant data from the dataset. Logistic Regression is used with improved loss functionality parameter which increases the accuracy, response time and performance of the system. Representation Learning enables formation of feature vector of the selected features thus calculating their scores. Further, risk prediction is performed by the neural network model. Deep Neural Network (DNN) is used with many hidden layers containing activation functions. Transfer learning is used to avoid re-training of the whole system every time new data enters the model. Dataset used here is of hypertension. EHR dataset is also synthetically created for analysis.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"816-819"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78401649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey on clustering techniques in Twitter data Twitter数据聚类技术综述
R. Devika, S. Revathy, Sai surriya Priyanka U, V. Subramaniya swamy
{"title":"Survey on clustering techniques in Twitter data","authors":"R. Devika, S. Revathy, Sai surriya Priyanka U, V. Subramaniya swamy","doi":"10.1109/ICCMC.2018.8487969","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487969","url":null,"abstract":"Social networks and online news services are used by users to communicate and share messages. One such social network is Twitter. Earlier its messages were restricted to 140 characters, but from November 7, 2017 its limit was extended to 280 characters except Japanese, Korean and Chinese languages. Because of restricted characters used, it is famously called micro blogging. Mining twitter data has become popular, because it provides useful information which is being used in various fields. This paper highlights various clustering techniques that can be used in twitter data mining with advantages and limitation.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"1073-1077"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78581097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification Of User Preference by Sequential Pattern Mining and Recommendation of Products using Geo-tagged data 基于顺序模式挖掘的用户偏好识别和使用地理标记数据的产品推荐
R. Kanmani, V. Uma
{"title":"Identification Of User Preference by Sequential Pattern Mining and Recommendation of Products using Geo-tagged data","authors":"R. Kanmani, V. Uma","doi":"10.1109/ICCMC.2018.8487238","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487238","url":null,"abstract":"Recommendation System provides the user with the interesting materials which are extracted from their preference. For simplifying the information retrieval and in order to provide the user with preferred result with more accuracy, recommendation system is being used. Recommendation based services are also used in social networks such as Facebook, Twitter, Instagram etc. Geo-tagged data plays a major role in case of recommendation systems as they will be providing recommendations with respect to the users locations. The semantic classification of the location is done using Support Vector Machine. By considering the location co-ordinates the nearest possible travel routes are identified by Google Maps and the shorter distance are computed using k-Nearest Neighbour. In this work, recommendation of products is given by means of considering the frequent buying pattern of the user using Prefix span algorithm, similar users ratings computed by Collaborative Filtering and the popular items available on the travel route. The proposed system has been implemented and evaluated.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"108-113"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72870104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Face Recognition System using various Distance Classifiers 使用不同距离分类器的人脸识别系统性能评价
Preeti, Dinesh Kumar
{"title":"Performance Evaluation of Face Recognition System using various Distance Classifiers","authors":"Preeti, Dinesh Kumar","doi":"10.1109/ICCMC.2018.8487835","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487835","url":null,"abstract":"Face recognition applications are gaining popularity day by day. Feature extraction, selection, and recognition are the three main steps of face recognition system. Recognition is done using classifiers as these play a vital role in making the system recognize the faces accurately to the extent possible. This paper evaluates the performance of the system using four different distance classifiers over ORL databases. DCT (Discrete Cosine Transform)-PCA (Principal Component Analysis) and LDA (Linear Discriminate Analysis) methods followed by Cuckoo Search algorithm have been used for extraction and selection of important features respectively. The results demonstrate the efficiency and efficacy of the face recognition system upon using Euclidean distance classifier.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"322-327"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84977551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple Sensitive Attributes Based Privacy Preserving Data Publishing 基于多敏感属性的隐私保护数据发布
Jasmina N Vanasiwala, Nirali R. Nanavati
{"title":"Multiple Sensitive Attributes Based Privacy Preserving Data Publishing","authors":"Jasmina N Vanasiwala, Nirali R. Nanavati","doi":"10.1109/ICCMC.2018.8487483","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487483","url":null,"abstract":"The advances in digital information applications facilitates the collection of huge amount of data about governments, healthcare, other organizations and individuals. To make this data available for researchers, businesses and other users, it needs to be released. This in turn increases the demand of exchanging and publishing this collected data. However, data in its original form, typically contains sensitive information about individuals and/or organizations, and publishing such data will violate individual or organizational privacy. Hence, Privacy Preserving Data Publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Before data is published to the concerned users, it is altered to maintain its privacy without compromising data utility, using various anonymization techniques. Real-time datasets contain different types of Multiple Sensitive Attributes (MSAs) (which could be numerical or categorical). Anonymization for only Single Sensitive Attribute is not suitable for functional usage. Thus, it is important to maintain the association between these MSAs and to preserve the privacy of Mixed (numerical and categorical) MSAs efficiently while working with high dimensional data. The main focus of this paper is to analyse the different schemes proposed in literature for PPDP of MSAs.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"394-400"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85396597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
EAACK - Enhanced Adaptive Acknowledgment 增强的自适应承认
V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew
{"title":"EAACK - Enhanced Adaptive Acknowledgment","authors":"V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew","doi":"10.1109/ICCMC.2018.8487752","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487752","url":null,"abstract":"Wireless networks are currently dominating over wired networks in many applications.Mobility and scalability are some of the features that has led to make wireless networks more popular. Out of the many wireless network Mobile Ad-Hoc network (MANET) are the most popular. They have a highly dynamic and random topology. Essentially the ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. MANET is used in many military applications because of its self configuring nature. However Mobile Ad-Hoc Network (MANET) has much vulnerability towards security attacks due to its features of open medium, limited physical security, dynamic changing topology, lack of centralized monitoring and organization point.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"118 1","pages":"140-148"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87617771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilayered Risk analysis of Mobile systems and Apps 移动系统和应用程序的多层风险分析
R. Katarya, Chhavi Jain
{"title":"Multilayered Risk analysis of Mobile systems and Apps","authors":"R. Katarya, Chhavi Jain","doi":"10.1109/ICCMC.2018.8487535","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487535","url":null,"abstract":"Mobile systems and applications face a number of vulnerabilities that can lead to a breach of confidentiality of information. Users these days rely more on mobile systems and various applications for their day to day activities. Different applications can pose different risks to the security of mobile systems and can sometimes become the cause of other vulnerabilities as well. This paper presents and reviews risk analysis done at various levels in mobile systems, namely, the static analysis layer, dynamic analysis layer and the behavioral analysis layer. Risk can propagate through these layers and various techniques and approaches have been proposed to evaluate such potential risks. These strategies can help improve the security of mobile applications as well as the entire mobile applications.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81888954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信