159 research outputs found

    Unsupervised clustering approach for network anomaly detection

    No full text
    This paper describes the advantages of using the anomaly detection approach over the misuse detection technique in detecting unknown network intrusions or attacks. It also investigates the performance of various clustering algorithms when applied to anomaly detection. Five different clustering algorithms: k-Means, improved k-Means, k-Medoids, EM clustering and distance-based outlier detection algorithms are used. Our experiment shows that misuse detection techniques, which implemented four different classifiers (naïve Bayes, rule induction, decision tree and nearest neighbour) failed to detect network traffic, which contained a large number of unknown intrusions; where the highest accuracy was only 63.97% and the lowest false positive rate was 17.90%. On the other hand, the anomaly detection module showed promising results where the distance-based outlier detection algorithm outperformed other algorithms with an accuracy of 80.15%. The accuracy for EM clustering was 78.06%, for k-Medoids it was 76.71%, for improved k-Means it was 65.40% and for k-Means it was 57.81%. Unfortunately, our anomaly detection module produces high false positive rate (more than 20%) for all four clustering algorithms. Therefore, our future work will be more focus in reducing the false positive rate and improving the accuracy using more advance machine learning technique

    Towards an integrated model for citizen adoption of E-government services in developing countries: A Saudi Arabia case study

    No full text
    This paper considers the challenges that face the widespread adoption of E-government in developing countries, using Saudi Arabian our case study. E-government can be defined based on an existing set of requirements. In this paper we define E-government as a matrix of stakeholders; governments to governments, governments to business and governments to citizens using information and communications technology to deliver and consume services. E-government has been implemented for a considerable time in developed countries. However E-government services still faces many challenges their implemented and general adoption in developing countries. Therefore, this paper presents an integrated model for ascertaining the intention to adopt E-government services and thereby aid governments in accessing what is required to increase adoption

    On a Service-Oriented Approach for an Engineering Knowledge Desktop

    No full text
    Increasingly, manufacturing companies are shifting their focus from selling products to providing services. As a result, when designing new products, engineers must increasingly consider the life cycle costs in addition to any design requirements. To identify possible areas of concern, designers are required to consult existing maintenance information from identical products. However, in a large engineering company, the amount of information available is significant and in wide range of formats. This paper presents a prototype knowledge desktop suitable for the design engineer. The Engineering Knowledge Desktop analyses and suggests relevant information from ontologically marked-up heterogeneous web resources. It is designed using a Service-Oriented Architecture, with an ontology to mediate between Web Services. It has been delivered to the user community for evaluation

    Transparent authentication methodology in electronic education

    No full text
    In the context of on-line assessment in e-learning, a problem arises when a student taking an exam may wish to cheat by handing over personal credentials to someone else to take their place in an exam, Another problem is that there is no method for signing digital content as it is being produced in a computerized environment. Our proposed solution is to digitally sign the participant’s work by embedding voice samples in the transcript paper at regular intervals. In this investigation, we have demonstrated that a transparent stenographic methodology will provide an innovative and practical solution for achieving continuous authentication in an online educational environment by successful insertion and extraction of audio digital signatures

    Making training more cognitively effective: making videos interactive

    No full text
    The cost of health and safety (H&S) failures to the UK industry is currently estimated at up to £6.5 billion per annum, with the construction sector suffering unacceptably high levels of work-related incidents. Better H&S education across all skill levels in the industry is seen as an integral part of any solution. Traditional lecture-based courses often fail to recreate the dynamic realities of managing H&S on site and therefore do not sufficiently create deeper cognitive learning (which results in remembering and using what was learned). The use of videos is a move forward, but passively observing a video is not cognitively engaging and challenging, and therefore learning is not as effective as it can be. This paper describes the development of an interactive video in which learners take an active role. While observing the video, they are required to engage, participate, respond and be actively involved. The potential for this approach to be used in conjunction with more traditional approaches to H&S was explored using a group of 2nd-year undergraduate civil engineering students. The formative results suggested that the learning experience could be enhanced using interactive videos. Nevertheless, most of the learners believed that a blended approach would be most effective

    Measuring the Application of Anthropomorphic Gamification for Transitional Care; A Goal-Question Metric Approach

    Get PDF
    The gamification of anthropomorphic interfaces is one of technology interventions in health. Applying them into transitional care may encourage a patient to learn about their condition, so that they are able to self-manage. This research is based on the researcher’s previous developed framework to develop a rigorous scale that assesses the applicability of anthropomorphic interfaces gamification for transitional care in an application. By measuring, it may inform the software developer or designer of the design requirement for the application. We adopt a Goal-Question-Metric (GQM) approach to develop a new measurement instrument. The GQM offered a stepwise approach to refine a theoretical perspective of anthropomorphic gamification for transition care into measurable values. Thus, this research presents how the measurement items can be created using GQM. Later, these items will be grouped together as an instrument called Transitional Anthropomorphs Gamification Scale (TAGS). This instrument needs for further validation, ensuring they measured the right construct

    Data Mining to Support Engineering Design Decision

    No full text
    The design and maintenance of an aero-engine generates a significant amount of documentation. When designing new engines, engineers must obtain knowledge gained from maintenance of existing engines to identify possible areas of concern. Firstly, this paper investigate the use of advanced business intelligence tenchniques to solve the problem of knowledge transfer from maintenance to design of aeroengines. Based on data availability and quality, various models were deployed. An association model was used to uncover hidden trends among parts involved in maintenance events. Classification techniques comprising of various algorithms was employed to determine severity of events. Causes of high severity events that lead to major financial loss was traced with the help of summarization techniques. Secondly this paper compares and evaluates the business intelligence approach to solve the problem of knowledge transfer with solutions available from the Semantic Web. The results obtained provide a compelling need to have data mining support on RDF/OWL-based warehoused data

    Introductory Editorial

    Get PDF
    The Open Journal of Big Data is a new open access journal published by RonPub, and RonPub is an academic publisher of online, open access, peer-reviewed journals. OJBD addresses aspects of Big Data, including new methodologies, processes, case studies, poofs-of-concept, scientific demonstrations, industrial applications and adoption. This editorial presents the two articles in this first issue. The first paper is on An Efficient Approach for Cost Optimization of the Movement of Big Data, which mainly focuses on the challenge of moving big data from one data center to other.The second paper is on Cognitive Spam Recognition Using Hadoop and Multicast-Update, which describes a method to make machines cognitively label spam using Machine Learning and the Naive Bayesian approach. OJBD has a rising reputation thanks to the support of research communities, which help us set up the First International Conference on Internet of Things and Big Data 2016 (IoTBD 2016), in Rome, Italy, between 23 and 25 April 2016

    A FRAMEWORK FOR EVALUATING THE EFFECTIVENESS OF BLENDED E-LEARNING WITHIN UNIVERSITIES

    Get PDF
    Abstract: Since the inception of e-learning technologies, there has been an increase in the use of e-learning systems to support blended learning in Universities by providing a mix of face-to-face classroom teaching, live e-learning, self-paced e-learning and distance learning. Despite the existing benefits of using e-learning, some higher education institutions have not utilised e-learning to its full potential and yet there are limited studies that offer a comprehensive framework for effectively using e-learning systems. It is therefore imperative that learning technologists understand the factors that influence the effectiveness of blended e-learning. An expert survey was conducted to establish which factors are important for evaluating the effectiveness of e-learning systems. This paper describes a methodological framework for assessing the effectiveness of e-learning within Universities. The framework will act as a guiding tool for further research into ways of effectively planning, implementing and improving blended e-learning within Universities

    An exploratory study of proposed factors to adopt e-government services

    No full text
    Abstract—this paper discusses e-government, in particular the challenges that face adoption of e-government in Saudi Arabia. In this research we define e-government as a matrix of stakeholders: governments to governments, governments to business and governments to citizens, using information and communications technology to deliver and consume services. e-government services still face many challenges in their implementation and general adoption in many countries including Saudi Arabia. In addition, the background and the discussion identify the influential factors that affect the citizens’ intention to adopt e-government services in Saudi Arabia. Consequently, these factors have been defined and categorized followed by an exploratory study to examine the importance of these factors. Therefore, this research has identified factors that determine if the citizen will adopt e-government services and thereby aiding governments in accessing what is required to increase adoption
    corecore