{"title":"Evaluating the Usability and Learnability of the \"Blackboard\" LMS Using SUS and Data Mining","authors":"Khalid Al-Omar","doi":"10.1109/ICCMC.2018.8488038","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8488038","url":null,"abstract":"Learning management systems (LMSs) provide integrated platforms of various technologies to support instructors and students. Usability evaluation is an essential factor to measure how well technology works for users. The aim of this study is to examine the usability of the LMS in King Abdulaziz University by using some pre-defined usability standards, such as a system usability scale (SUS) questionnaire. A further investigation used data mining techniques (sentiment analysis and clustering) in order to find out the details of any usability problems. The results show that distance education students suffer the most, followed by external students. On the other hand, instructors seem to have a less negative attitude than students towards Blackboard. Overall, the usability of LMSs at KAU is inadequate and needs to be enhanced for all types of users by customising blackboard according to each group.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"9 1","pages":"386-390"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80172791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subasish Mohapatra, Ishan Aryendu, Anshuman Panda, A. K. Padhi
{"title":"A Modern Approach for Load Balancing Using Forest Optimization Algorithm","authors":"Subasish Mohapatra, Ishan Aryendu, Anshuman Panda, A. K. Padhi","doi":"10.1109/ICCMC.2018.8487765","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487765","url":null,"abstract":"Load Balancing plays a dynamic role in keeping the tempo of the Cloud Computing framework. This research paper proposes a Forest Optimization Algorithm for load balancing in distributed computing structure. This depends on the conduct of the trees in the forest and uses the seed dispersal strategies for streamlining the makespan, which results in improved average response time and the total execution time. The simulation results prove that the proposed algorithm gives better outcomes than its counterpart load balancing algorithms.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"85-90"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90385415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diksha N. Prabhu Khorjuvenkar, Megha Ainapurkar, S. Chagas
{"title":"PARTS OF SPEECH TAGGING FOR KONKANI LANGUAGE","authors":"Diksha N. Prabhu Khorjuvenkar, Megha Ainapurkar, S. Chagas","doi":"10.1109/iccmc.2018.8487620","DOIUrl":"https://doi.org/10.1109/iccmc.2018.8487620","url":null,"abstract":"It is remarkable to note that the scope of Natural Language Processing (NLP) is developing and increasing in the area of text mining. Natural Language Processing is a field that covers computer understanding and deals with manipulation of human language. Human language is an unstructured source of information, and hence to use it, as an input to a computer program, it has to be, first, converted into a structured format [3]. Parts of Speech (POS) tagging is one of the steps which assigns a particular part of speech to a respective word. POS is difficult because most words tend to have more than one parts of speech in different cases and some parts of speech are complex or unspoken. This paper aims at developing part of speech tagging model for Konkani language, using the Konkani corpus.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"36 1","pages":"605-607"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85209946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Automatic Feature Selection Approach for Health Risk Prediction","authors":"Shreyal Gajare, S. Sonawani","doi":"10.1109/ICCMC.2018.8487695","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487695","url":null,"abstract":"With the recent advances in machines & technology, there is revolution in healthcare industry also. Thus, it gave rise to the concept of Electronic Health Record (EHR) which stores patients demographics, lab tests & results, medical history, habits etc. in electronic form. EHR is voluminous data which is difficult to store, maintain or alter. To provide extended life for people, health risk prediction model using this EHR is formulated in this work. Feature Selection is used to select only associated or relevant data from the dataset. Logistic Regression is used with improved loss functionality parameter which increases the accuracy, response time and performance of the system. Representation Learning enables formation of feature vector of the selected features thus calculating their scores. Further, risk prediction is performed by the neural network model. Deep Neural Network (DNN) is used with many hidden layers containing activation functions. Transfer learning is used to avoid re-training of the whole system every time new data enters the model. Dataset used here is of hypertension. EHR dataset is also synthetically created for analysis.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"10 1","pages":"816-819"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78401649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Devika, S. Revathy, Sai surriya Priyanka U, V. Subramaniya swamy
{"title":"Survey on clustering techniques in Twitter data","authors":"R. Devika, S. Revathy, Sai surriya Priyanka U, V. Subramaniya swamy","doi":"10.1109/ICCMC.2018.8487969","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487969","url":null,"abstract":"Social networks and online news services are used by users to communicate and share messages. One such social network is Twitter. Earlier its messages were restricted to 140 characters, but from November 7, 2017 its limit was extended to 280 characters except Japanese, Korean and Chinese languages. Because of restricted characters used, it is famously called micro blogging. Mining twitter data has become popular, because it provides useful information which is being used in various fields. This paper highlights various clustering techniques that can be used in twitter data mining with advantages and limitation.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"1073-1077"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78581097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification Of User Preference by Sequential Pattern Mining and Recommendation of Products using Geo-tagged data","authors":"R. Kanmani, V. Uma","doi":"10.1109/ICCMC.2018.8487238","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487238","url":null,"abstract":"Recommendation System provides the user with the interesting materials which are extracted from their preference. For simplifying the information retrieval and in order to provide the user with preferred result with more accuracy, recommendation system is being used. Recommendation based services are also used in social networks such as Facebook, Twitter, Instagram etc. Geo-tagged data plays a major role in case of recommendation systems as they will be providing recommendations with respect to the users locations. The semantic classification of the location is done using Support Vector Machine. By considering the location co-ordinates the nearest possible travel routes are identified by Google Maps and the shorter distance are computed using k-Nearest Neighbour. In this work, recommendation of products is given by means of considering the frequent buying pattern of the user using Prefix span algorithm, similar users ratings computed by Collaborative Filtering and the popular items available on the travel route. The proposed system has been implemented and evaluated.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"108-113"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72870104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Face Recognition System using various Distance Classifiers","authors":"Preeti, Dinesh Kumar","doi":"10.1109/ICCMC.2018.8487835","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487835","url":null,"abstract":"Face recognition applications are gaining popularity day by day. Feature extraction, selection, and recognition are the three main steps of face recognition system. Recognition is done using classifiers as these play a vital role in making the system recognize the faces accurately to the extent possible. This paper evaluates the performance of the system using four different distance classifiers over ORL databases. DCT (Discrete Cosine Transform)-PCA (Principal Component Analysis) and LDA (Linear Discriminate Analysis) methods followed by Cuckoo Search algorithm have been used for extraction and selection of important features respectively. The results demonstrate the efficiency and efficacy of the face recognition system upon using Euclidean distance classifier.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"322-327"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84977551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Sensitive Attributes Based Privacy Preserving Data Publishing","authors":"Jasmina N Vanasiwala, Nirali R. Nanavati","doi":"10.1109/ICCMC.2018.8487483","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487483","url":null,"abstract":"The advances in digital information applications facilitates the collection of huge amount of data about governments, healthcare, other organizations and individuals. To make this data available for researchers, businesses and other users, it needs to be released. This in turn increases the demand of exchanging and publishing this collected data. However, data in its original form, typically contains sensitive information about individuals and/or organizations, and publishing such data will violate individual or organizational privacy. Hence, Privacy Preserving Data Publishing (PPDP) provides methods and tools for publishing useful information while preserving data privacy. Before data is published to the concerned users, it is altered to maintain its privacy without compromising data utility, using various anonymization techniques. Real-time datasets contain different types of Multiple Sensitive Attributes (MSAs) (which could be numerical or categorical). Anonymization for only Single Sensitive Attribute is not suitable for functional usage. Thus, it is important to maintain the association between these MSAs and to preserve the privacy of Mixed (numerical and categorical) MSAs efficiently while working with high dimensional data. The main focus of this paper is to analyse the different schemes proposed in literature for PPDP of MSAs.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"394-400"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85396597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew
{"title":"EAACK - Enhanced Adaptive Acknowledgment","authors":"V. Sanju, G. Venu, Reenu Sara Joseph, M. Stephen, Melvin Mathew","doi":"10.1109/ICCMC.2018.8487752","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487752","url":null,"abstract":"Wireless networks are currently dominating over wired networks in many applications.Mobility and scalability are some of the features that has led to make wireless networks more popular. Out of the many wireless network Mobile Ad-Hoc network (MANET) are the most popular. They have a highly dynamic and random topology. Essentially the ad hoc network is a collection of nodes communicating with each other by forming a multi-hop network. MANET is used in many military applications because of its self configuring nature. However Mobile Ad-Hoc Network (MANET) has much vulnerability towards security attacks due to its features of open medium, limited physical security, dynamic changing topology, lack of centralized monitoring and organization point.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"118 1","pages":"140-148"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87617771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multilayered Risk analysis of Mobile systems and Apps","authors":"R. Katarya, Chhavi Jain","doi":"10.1109/ICCMC.2018.8487535","DOIUrl":"https://doi.org/10.1109/ICCMC.2018.8487535","url":null,"abstract":"Mobile systems and applications face a number of vulnerabilities that can lead to a breach of confidentiality of information. Users these days rely more on mobile systems and various applications for their day to day activities. Different applications can pose different risks to the security of mobile systems and can sometimes become the cause of other vulnerabilities as well. This paper presents and reviews risk analysis done at various levels in mobile systems, namely, the static analysis layer, dynamic analysis layer and the behavioral analysis layer. Risk can propagate through these layers and various techniques and approaches have been proposed to evaluate such potential risks. These strategies can help improve the security of mobile applications as well as the entire mobile applications.","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 1","pages":"64-67"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81888954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}