This paper presents the result of an empirical study that investigates user involvement and user satisfaction in the context of information-seeking activity. This study adopts the definition of user involvement as the psychological state of the importance and personal relevance that users attach to a given system. Following Celsi and Olson, intrinsic and situational motivators were considered as two antecedents of user involvement. These two types of motivator were treated as formative exogenous variables, while user involvement and user satisfaction were treated as reflective mediating endogenous variable and final endogenous variable, respectively. Five hypotheses were proposed, and all were supported by the data from a laboratory experiment. This paper also reports two other interesting findings. First, intrinsic motivators have a stronger positive effect on user involvement than situational motivators have. Second, situational motivators have a stronger positive effect on user satisfaction than intrinsic motivators have. The discussion part explains these interesting findings.
With the rapid development and popularization of Internet of Things (IoT) devices, an increasing number of cyber-attacks are targeting such devices. It was said that most of the attacks in IoT environments are botnet-based attacks. Many security weaknesses still exist on the IoT devices because most of them have not enough memory and computational resource for robust security mechanisms. Moreover, many existing rule-based detection systems can be circumvented by attackers. In this study, we proposed a machine learning (ML)-based botnet attack detection framework with sequential detection architecture. An efficient feature selection approach is adopted to implement a lightweight detection system with a high performance. The overall detection performance achieves around 99% for the botnet attack detection using three different ML algorithms, including artificial neural network (ANN), J48 decision tree, and Naïve Bayes. The experiment result indicates that the proposed architecture can effectively detect botnet-based attacks, and also can be extended with corresponding sub-engines for new kinds of attacks.
The application of a large number of Internet of Things (IoT) devices makes our life more convenient and industries more efficient. However, it also makes cyber-attacks much easier to occur because so many IoT devices are deployed and most of them do not have enough resources (i.e., computation and storage capacity) to carry out ordinary intrusion detection systems (IDSs). In this study, a lightweight machine learning-based IDS using a new feature selection algorithm is designed and implemented on Raspberry Pi, and its performance is verified using a public dataset collected from an IoT environment. To make the system lightweight, we propose a new algorithm for feature selection, called the correlated-set thresholding on gain-ratio (CST-GR) algorithm, to select really necessary features. Because the feature selection is conducted on three specific kinds of cyber-attacks, the number of selected features can be significantly reduced, which makes the classifiers very small and fast. Thus, our detection system is lightweight enough to be implemented and carried out in a Raspberry Pi system. More importantly, as the really necessary features corresponding to each kind of attack are exploited, good detection performance can be expected. The performance of our proposal is examined in detail with different machine learning algorithms, in order to learn which of them is the best option for our system. The experiment results indicate that the new feature selection algorithm can select only very few features for each kind of attack. Thus, the detection system is lightweight enough to be implemented in the Raspberry Pi environment with almost no sacrifice on detection performance.
Several researches in leaf identification did not include color information as features. The main reason is caused by a fact that they used green colored leaves as samples. However, for foliage plants-plants with colorful leaves, fancy patterns in their leaves, and interesting plants with unique shape-color and also texture could not be neglected. For example, Epipremnum pinnatum 'Aureum' and Epipremnum pinnatum 'Marble Queen' have similar patterns, same shape, but different colors. Combination of shape, color, texture features, and other attribute contained on the leaf is very useful in leaf identification. In this research, Polar Fourier Transform and three kinds of geometric features were used to represent shape features, color moments that consist of mean, standard deviation, skewness were used to represent color features, texture features are extracted from GLCMs, and vein features were added to improve performance of the identification system. The identification system uses Probabilistic Neural Network (PNN) as a classifier. The result shows that the system gives average accuracy of 93.0833% for 60 kinds of foliage plants.
Currently the detection of learning styles from the external aspect has not produced optimal results. This research tries to solve the problem by using an internal approach. The internal approach is one that derives from the personality of the learner. One of the personality traits that each learner possesses is prior knowledge. This research starts with the prior knowledge generation process using the Latent Semantic Indexing (LSI) method. LSI is a technique using Singular Value Decomposition (SVD) to find meaning in a sentence. LSI works to generate the prior knowledge of each learner. After the prior knowledge is raised, then one can predict learning style using the artificial neural network (ANN) method. The results of this study are more accurate than the results of detection conducted with an external approach.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.