Journal of Computer Science IJCSIS Decem
Journal of Computer Science IJCSIS Decem
International Journal of
Computer Science
& Information Security
Please consider to contribute to and/or forward to the appropriate groups the following opportunity to submit and publish
original scientific results.
The topics suggested by this issue can be discussed in term of concepts, surveys, state of the art, research,
standards, implementations, running experiments, applications, and industrial case studies. Authors are invited
to submit complete unpublished papers, which are not under review in any other conference or journal in the
following, but not limited to, topic areas.
See authors guide for manuscript preparation and submission guidelines.
Indexed by Google Scholar, DBLP, CiteSeerX, Directory for Open Access Journal (DOAJ), Bielefeld
Academic Search Engine (BASE), SCIRUS, Scopus Database, Cornell University Library, ScientificCommons,
ProQuest, EBSCO and more.
Deadline: see web site
Notification: see web site
Revision: see web site
Publication: see web site
A great journal cannot be made great without a dedicated editorial team of editors and reviewers.
On behalf of IJCSIS community and the sponsors, we congratulate the authors and thank the
reviewers for their outstanding efforts to review and recommend high quality papers for
publication. In particular, we would like to thank the international academia and researchers for
continued support by citing papers published in IJCSIS. Without their sustained and unselfish
commitments, IJCSIS would not have achieved its current premier status, making sure we deliver
high-quality content to our readers in a timely fashion.
“We support researchers to succeed by providing high visibility & impact value, prestige and
excellence in research publication.” We would like to thank you, the authors and readers, the
content providers and consumers, who have made this journal the best possible.
Open Access This Journal is distributed under the terms of the Creative Commons Attribution 4.0 International License
(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium,
provided you give appropriate credit to the original author(s) and the source.
Bibliographic Information
ISSN: 1947-5500
Monthly publication (Regular Special Issues)
Commenced Publication since May 2009
1. PaperID 01122101: A Depression Detection Model using Deep Learning and Textual Entailment (pp. 1-8)
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
2. PaperID 01122102: Performance Evaluation of Random Forest Algorithm in Cluster Environment (pp. 9-
12)
Cinantya Paramita, Catur Supriyanto, Yani Parti Astuti, Lukman Afi Syariffudin, Fauzi Adi Rafrastara
Department of Information Engineering, Faculty of Computer Science, Universitas Dian Nuswantoro, Semarang,
Indonesia
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
3. PaperID 01122103: An Improved Meta-Heuristic Oriented Early Size Estimation Utilizing ABC (pp. 13-18)
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
4. PaperID 01122104: A Critical Analysis of Learning Technologies and Informal Learning in Online Social
Networks Using Learning Analytics (pp. 19-31)
Audu Kafwa Dodo, Department of Computer Science, Taraba State University Jalingo, Nigeria
Ezekiel Uzor Okike, Department of Computer Science, University of Botswana, Gaborone, Botswana
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
5. PaperID 01122105: Design and Development of an Autonomous Car using Object Detection with YOLOv4
(pp. 32-35)
Rishabh Chopda, Department of Computer Engineering, Thakur College of Engineering & Technology, Mumbai,
India
Saket Pradhan, Department of Information Technology, Thakur College Of Engineering & Technology, Mumbai,
India
Anuj Goenka, Department of Computer Engineering, Thakur College of Engineering & Technology, Mumbai, India
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
6. PaperID 01122106: (IoT-based Peat Soil Heat Conduction Parameter Delivery System As Land Fire
Mitigation Effort pp. 36-41)
Ade Agung Harnawan, Physics Study Program, University of Lambung Mangkurat (ULM), Banjarmasin, Indonesia.
Muhammad Itqan Mazdadi, Computer Science Study Program, University of Lambung Mangkurat (ULM),
Banjarmasin, Indonesia.
Nugroho Adi Pramono, Physics Department, State University of Malang, Malang, Indonesia,
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
7. PaperID 01122107: Analyze Cyber Attacks in Cloud Cryptography and Short Comings in Blockchain
Cryptocurrency (pp. 42-49)
Full Text: PDF [Academia.edu | Scopus | Scribd | Archive | DOI | Google Scholar]
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Abstract—Depression detection nowadays is essential to help in additionally, from 2016 to 2017 the suicide rate increased by
supporting depressed people. Detecting emotional disturbance is 3.7% (National Center for Health Statistics, 2019).As divided
currently remarkable in people who suffer from depression, and depression level into three classes as represents in [1]. This
yet for doctors and psychologists to help them in detection. Nowa-
days, social networks can be utilized to determine depressive model also separate depression classes to the same levels but
content and thus depressed people. To accomplish this, twitter is at [1] they decided those levels depending only 100 words they
used to collect the most recent tweets that is related to depression. detected them from users tweets they supposed these words
This is done by PHQ-9 technique that classifies depression into based on Linguistic Inquiry and Word Count (LIWC) but in
9 degrees. Each degree is represented by set of words. Using Our model more than 1000 words based on recent PHQ-9 as
this classification, the model can alert users that need a have a
visit to a psychiatrist or ask a psychologist as soon as possible will be decribed later.
based on their social content. The collected dataset is then trained This paper contributes new dataset of depressed user using
using deep learning and then experimented with different tweets PHQ-9 that were collected during the last year with all
from the collected dataset to validate the model. In addition, nowadays problems and depressed reasons. It also proposes
with textual entailment, the model can determine whether the a high performance classification model using deep learning
tweet is entailed or not from tweets used in the training phase,
and thus will follow the same class. By combining deep learning techniques which facilitate massive data training . Also, the
with textual entailment, our model resulted in an improved and paper contributes a novel textual entailment depression detec-
quicker depression detection. tion process that helps to extract the depression level for new
Index Terms—deep learning ; depression detection ; Textual tweets without re-classifying data.
entailment ; PHQ-9 ; Social Networks The rest of paper was split as the following: Section II
presenting literature review about depression detection models
I. I NTRODUCTION that used deep learning technique. section III explains the
Depression detection is a major public health concern. different parts of the proposed model . Section IV discusses
Depression is the head problem of disability and contributes experimental results and the evaluation of the proposed model.
significantly to a load of disease worldwide. People with Finally, the conclusion and future direction and enhancements
depression may have a lack of interest and happiness in are discussed in section V.
daily activities, weight loss or heavy gain, insomnia or ex-
cessive sleep, lack of energy, inability to concentrate, feelings II. P REVIOUS W ORK
of worthlessness or guilt and recurring thoughts of death In textual entailment deep learning techniques are becom-
(American Psychiatric Association, 2013). As a matter of ing gradually usable, exceeding the complexity of standard
fact, depression can lead to suicide. Over 800.000 suicide models with complex precision and imagination. In a neural
deaths occur every year and it is the second leading cause network, deep learning turn into a widespread technique of
of death in the 15-29 years-old range; that is, every 40 s a machine learning due to the state-of-the-art accommodation
person dies due to suicide somewhere in the world (World of computer vision, speech recognition, and other areas[2].
Health Organization, 2014).In wealthier nations, men are three Training huge datasets are the latest fulfillment, from images
times more likely to commit suicide than women. Globally, classification for object recognition to suitable machine trans-
suicides account for 50% all violent deaths in men and 71% in lation texts. In spite of this information being now is widely
women (World Health Organization, 2014). Suicide accounted available in the public domain,private information collected on
for close to 1.5% of all deaths worldwide, bringing it into the an individual basis not only expands the motivation of current
top 20 leading causes of death in 2015 (World Health Orga- models but also provides new deep learning enhancements.
nization, 2017). In the United States, as well as in other high- Considering deep learning as the leading technology with the
income countries, suicide is among the 10 leading causes of latest applications. Deep learning of successful activities that
death (along with cancer, heart disease, stroke, and diabetes), immediately identify text, image, or sound can be learned with
https://doi.org/10.5281/zenodo.5852684 1 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
computer models. Deep learning models achieved higher accu- have affected the patient’s performance level.Model [11] was
racies that sometimes exceeded human-level performance[3]. used GRU to predict the score of PHQ-9 to detect depression
Bi-directional GRU (Bi-GRU) is an extension to GRU and of pre-collected dataset by DAIC-corpus 2019, where using
is proven suitable for lexical analysis task, in which the more than one of deep learning classification model such as
input is an entire sentence. Thus, it is important to have the CNN and LSTM with development set score 0.696 and testing
future encoded as well as the history. In particular, a reversed set score 0.497 and they aim to use so much complicated
direction GRU is combined with a forward GRU to form techniques to enhance their results in the future. Models
a Bi-GRU layer. These two GRUs take the same input but [12] , [1],and [13]are used lexical similarity techniques to
train in different directions, and concatenate their results as collect words for classification .After researching most papers
output. Deep, hierarchical neural networks can be efficient didn’t entailment concept where our model used it to facilitate
at representing some functions and modeling varying-length classification and detect direct the level of depression. We
dependencies. Therefore, stacking multiple Bi-GRUs to form proposed semantic similarity models to determine form which
a deep network becomes an inevitable choice for improving tweet with which level that the input tweet was .
the representation capability[4].
The repeating bidirectional Gated Recurrent unit is first used
as a word-level encoder to capture the context information of III. P ROPOSED M ODEL
the annotations. GRU is a Recurrent Nural Network (RNN)
that can capture sequence information and sentence depen- We depicted a literature review analysis in [14] and re-
dencies over a long period. Only two reset gate functions searched many related works done in the depression detection
are used and upgrade the gates. The renewal gate monitored using machine learning and deep learning. We concluded
the rate of data of the previous session that is transferred to that using textual entailment with deep learning can enhance
the current session. The higher the value of the update gate, the detection. So, this research a novel model that use deep
the higher the status of the prior build-up. The reset gate learning and textual entailment is proposed. Fig.1. shows
monitored the extent to which previous data of the ignored the framework of our proposed model which begins with
status. When the value of the reset gate is low, the context collecting dataset using PHQ-9, then altering users with high
will be overlooked. Both previous and next texts influence depressive content.Then,the deep learning is used in the clas-
the current word in consecutive texts.Where [5] was used sification of depression levels, and finally textual entailment
GRU and its results exceeded the LSTM model by 0.03% is applied .All of these steps will described briefly in the
and it explained that GRU is more specified than LSTM with following subsections.
true negative rate. And as mentioned in [6] only based RNN
models is suitable for processing data sequence in their dataset
such as GRU and LSTM. So the BiGRU model was used
to exclude contextual features.GRU was used to get text and
classify it in [7].GRU was get high performance with text
with random sample of classification depression tweets by
good accuracy that was 76%. As in [8] they used BI-GRU to
encode pattern of texts and it raised accuracy to +80%.Also
[9] used the Bi-GRU to get users’ tweets, and then use it
for classifying user tweets.Where it got reasonable accuracy
with 76.4%.The same technique is already used in [10] as an
investigation the validity of a claim given based on matters
relating to prior verification.That also significantly increased
the preceding accuracy.
PHQ-9 is a questionnaire that is a multidisciplinary tool for
diagnosing, monitoring, screening, and evaluating the severity
of stress.PHQ-9 incorporates the DSM-IV(Diagnostic and Sta-
tistical Manual of Mental Disorders) diagnosis of depression
and other vital depressive symptoms into a short reporting
tool. The tool measures the frequency of the symbols that
are included in the point size index. Question 9 on PHQ-9
screens of presence and duration of suicidal idea1 .The follow-
up question, which does not score points on PHQ-9 screens
and provides weight to the extent to which stressful issues
1 https://pdf4pro.com/view/the-patient-health-questionnaire-phq-9-
overview-4c0057.html Fig. 1. Depression detection model with entailment
https://doi.org/10.5281/zenodo.5852684 2 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
TABLE I
A. Data Collection S OME PHQ-9 W ORDS T HAT WAS USED IN DATA C OLLECTION
The dataset was collected from twitter using tweepy depend-
Symptoms
ing on depression lexicon represents in Fig 2. This lexicon Depression PHQ
of
Some Words of
was mapped using PHQ-9(the Patient Health Questionnaire- Level Signal each Signal
PHQ-9
9) technology that is a questionnaire about depression and its lack of joy,lost desire,
Lost of no joy,no purpose,
levels. This questionnaire is formulated with words and terms PHQ 0
interest fed up,no motivation,
defined by psychiatry experts. PHQ-9 technique determined Low
hiding sadness,zero passion
the extent of a person’s depression that is divided into 9 being lonely,bad day,
breaking down,cry,
signals. We used more than 1000 words or terms and the model PHQ 1
Hopeless and
day ruined,destroyed,
has collected a massive dataset suitable for deep learning. feeling down
disappointed,feeling blue,
Some lexicon that used in collecting our data are represented I am sad
active at night,awake,
in Table I. Sleep sleep loss,groggy,
PHQ 2
Disturbance night owl,let me sleep,
over slept,hibernate
did nothing, exhausted,
feeling tired, laziness,
PHQ 3 Lost of energy
sedentary, tired,
Medium
weakness,motionless
big tummy, binge eating,
Eating chunky, cut down on fat,
PHQ 4
Disturbance dieting, feeling chubby,
poor appetite, weighty
I am useless,despicable,
Let yourself ignored,I am nobody,
PHQ 5
down feel ashamed,loser,
repulsion,worthless
absent-minded, daydreamer,
Concentrating disturbed, lace focus,
PHQ 6
Trouble mindless, overthinking,
High
unfocused, zone out
anxiety,angry,annoyed,
Laziness or hysteric,stressed out,
PHQ 7
Hyperactivity panic ,poky,restless,
straggler ,unsteady
better be dead,cut my life,
Death Wish or deathly,deserve to die,
PHQ 8
Suicide harm myself, lifeless,
kill myself , suicide
https://doi.org/10.5281/zenodo.5852684 3 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5852684 4 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
text can be translated into another text[18]. The relationship- 2) Entailment using Semantic Similarity: we just use two
connected action, sometimes three connections can occur semantic similarity.
between two sentences, is textual entailment. Entailed is 1) Sentence-Transformers-Bert:It puts a map of the sen-
the meaning of one sentence can be collective with another tences and paragraphs in the 768 density vector and can
sentence, Not Entailed is the meaning of one text that disagrees be used for tasks such as merging or semantic search
with the meaning of another sentence, and the Neutral is [21].BERT uses a cross-encoder.it passed two sentences
the meaning of another text that does not add or contradict to network and then predict value of similarity.
the meaning of another sentence. Or maybe divided into two 2) Spacy:it depends on estimating semantic similarity.
categories (Entailed / Neutral)[19]. Estimated cosine similarity using the word vector
1) Entailment using Lexical Similarity: Lexical similarity measurement[22].
has many famous techniques . We used the following methods
to take entailment decision by calculating distance similarity IV. E XPERIMENTS AND R ESULTS
between T,H in each one , then calculated the sim(T,H) after After collecting the dataset it is saved as csv containing
that depending on their results to take lexical decision [20].. 67161 distinct records , each record has User names, Date
1) Shapira and sorter’s greedy edit distance method has of tweet, Tweet’s content , and level of depression depending
two significant characteristics than other edit distance on PHQ-9 lexicon , Table II represents sample of collected
algorithms. It considers characters blocks if it appears in dataset.
both text and hypothesis strings, so the editing distance
TABLE II
between ’abcab’ and ’abc’ is only 1, as the substring, C OLLECTED DATASET S AMPLE
’ab’ comes from both and can be inserted as ’abc’
blocks. Allows three editing functions: add, delete, and user
date tweet level
move (but not replace). So the distance between ’abcde’ name
You can t tell me that the lack of joy comes
and ’deabc’ is only 1 because the ’abc’ block can be 08/02/21
User1 from a country so divided that half of low
10:32 AM
moved to 1 movement function, rather than removed and the idiotic population
placed in 2 different functions. If the key is set to True at I thought Joy came in the morning
08/02/21
User2 Well it s the morning and there s no joy low
startup, this uses a greedy algorithm, which limits block 10:59 AM
in my life What s all that about huh
switching to two strings with the same LCS matching . 08/04/21 Man I can t never decide what I want to eat
User3 medium
2) BI-SIM similarity:it is based on n-gram, based on mea- 11:51 AM Tired of eating everything really
07/28/21
suring the distance similarity.Where n-gram calculated User4
06:28 PM
anuraax feeling like a loser actually medium
by the following equations. when sequences of words 08/04/21 another dr apt today another day filled
User5 high
are as in the equation 1 Probabilities of these words pre- 11:58 AM with anxiety and ptsd triggers
08/01/21 But I knew what I had to do
sented in equation 2 and bi-gram of these probabilities User6
06:01 PM I have to kill myself
high
from equation 3 ,So n-gram probabilities likes equation
4
w1n = w1 , w2 , .....wn (1) The model is evaluated using Accuracy from Eq.7 which is
mean to number of correct prediction to number of total dataset
p(w1n ) = p(w1 ), p(w2 |w1 ), p(w3 |w12 )....p(wn |w1n−1 ) as described before in [12]. From equation 8 and equation 9
(2) Precision and Recall which is computed to get F1 Score as
n
described in equation 10.Where TP are true positives, TN are
Y
p(w1n ) = p(wk |wk−1 ) (3)
k=1
true negatives, FP is false positives and FN are false negatives
n
Y as mentioned in [23].
k−1
p(w1n ) = p(wk |wk−n+1 ) (4)
TP + TN
k=1 Accuracy = (7)
TP + TN + FP + FN
3) Cosine similarity : Cosine similarity between two text
computed from equation 5 TP
Recall = (8)
|T ∩ H| TP + FN
simcosine(T,H) = p (5) TP
|T | · |H| P recision = (9)
TP + FP
4) normalized eudex hamming :it restores the normal range
of Haming between Eudex hashes for two words or texts. P recision ∗ Recall
F 1 − Score = 2 ∗ (10)
5) SSK : String subsequence kernel (SSK) similarity. All P recision + Recall
that can follow is the vectors of the feature and the kernel when applying GRU , LSTM and Bi-directional models to our
includes their dot product as in the equation 6 dataset, BI-GRU got the best results. We trained, tested, and
validated our dataset with a batch size equals to 500 , no. of
k(T, H) epochs =20 ,drop out size of any network = 0.4 ,vocabulary
kn ormalization(T, H) = p (6)
k(T, T ) ∗ k(H, H) size that we applied our models on it was 5000 , with 32
https://doi.org/10.5281/zenodo.5852684 5 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
TABLE III
M ODELS E VALUATIONS C OMPARISON
semantic similarity. which proved that the semantic similarity
Models Accuracy Precision Recall F1 Score gives reasonable decision near to expert detection.Table IV
GRU 0.8094 0.8492 0.7774 0.8117
BI-GRU 0.8182 0.8294 0.8091 0.8192 contains some of classified collected tweets by deep learning
LSTM 0.8055 0.8101 0.8025 0.8063 as (Text) and the new tweets to be classified as (Hypothesis).
BI-LSTM 0.8132 0.8194 0.8085 0.8139 Table V represents entailment decisions of the sample pairs
in tableIV using lexical techniques. We tried different types
After classification, the entailment process is followed. We of lexical methods, and the results were quite similar, so we
tried two types of textual entailment, lexical similarity and took average of five lexical similarity techniques that was
https://doi.org/10.5281/zenodo.5852684 6 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
mentioned in the proposed model to get the best realistic as proposed in this research.
results. For semantic similarity, we used two famous similarity This work presents a new dataset collected using the latest un-
measure semantic similarity Spacy and sentence-transformer- derwriting words developed using PHQ-9. Four deep learning
BERT separately. models were tested, GRU, Bi-GRU, LSTM, and BI-LSTM.
BI-GRU had the best results and the accuracy rate was above
TABLE IV
T EXT ( CLASSIFIED TWEETS BY DEEP LEARNING ) AND
80%. Finally, the model used the textual entailment process
H YPOTHESIS ( TWEETS TO BE CLASSIFIED BY TEXTUAL ENTAILMENT ) to find out which of the classified tweets are similar to the
EXAMPLES new ones to find out their depression level without the need
of reclassification using deep learning. Also, it helps in online
No. Text Hypothesis
being alone for detection for new tweets without the need of retraining. This is
major play people who
a while is dangerous it s
dislike this song are against
a quite novel combined model that enhance the performance of
addicting once you see depression detection in terms of time. Also, considering textual
1 joy and happiness idc this
how peaceful it is you
such mood lifter helped entailment, the paper concludes that the semantic entailment is
don t want to deal with
much when depression started
people any much better than lexical entailment when dealing with social
Let s not equate a rise the lancet normal anxiety and text content.
in COVID cases with people depression works negatively
2 dying Feeling crappy for your immune system thats why In future work, we aim to increase our dataset and combine
2 days isn t worth they scare for virus equal different deep learning methods for better detection. Also, we
compromising your freedom flue aim to take emojis into consideration in the prepossessing
2am Hearing cries
of the children amp firing like
gavinnewsom can you speed for process. This work can be also extended by working on
teachers and get our kids back different social domains. Finally, working on Arabic content
3 fire crackers in the
school please the depression
background as I talk to is one of our future directions.
surging especially for teens
a friend
toxic relationship the
coldfallout Let me say it plain
lockdown because covid R EFERENCES
pandemic also had devastating
I loved someone and I failed
effect relationships the [1] R. U. Mustafa, N. Ashraf, F. S. Ahmed, J. Ferzund, B. Shahzad, and
4 at it Let me say it another
sudden inactivities and A. Gelbukh, “A multiclass depression detection in social media based
way I like to call myself
depression brought out the beast on sentiment analysis,” in Proceedings of the 17th IEEE International
wound but I will
some people and many found Conference on Information Technology—New Generations. Springer,
themselves toxic relationship 2020, pp. 659–662.
ageingacf older adults are at [2] T. Khot, A. Sabharwal, and P. Clark, “Scitail: A textual entailment
depression keeps from playing
increased risk for loneliness dataset from science question answering,” in Thirty-Second AAAI Con-
guitar and every time come
5 and social isolation because ference on Artificial Intelligence, 2018.
back around like
they are more likely to be [3] S. Gupta, S. Lakra, and M. Kaur, “Sentiment analysis using partial tex-
playing again for the first time
living alone espec tual entailment,” in 2019 International Conference on Machine Learning,
Big Data, Cloud and Parallel Computing (COMITCon). IEEE, 2019,
pp. 51–55.
[4] Z. Jiao, S. Sun, and K. Sun, “Chinese lexical analysis with deep bi-gru-
Entailed if Sim(T, H) ⩾ σ crf network,” arXiv preprint arXiv:1807.01882, 2018.
Entdecision(T, H) = [5] N. Gruber and A. Jockisch, “Are gru cells more specific and lstm cells
N otEntailed Otherwise
more sensitive in motive classification of text?” Frontiers in artificial
(11) intelligence, vol. 3, p. 40, 2020.
[6] S. G. Burdisso, M. Errecalde, and M. Montes-y Gómez, “A text classi-
TABLE V fication framework for simple and effective early depression detection
E NTAILED D ECISION over social media streams,” Expert Systems with Applications, vol. 133,
pp. 182–197, 2019.
sentence- [7] T. Gui, L. Zhu, Q. Zhang, M. Peng, X. Zhou, K. Ding, and Z. Chen,
Text Hypothesis Lexical transformers/ Spacy “Cooperative multimodal approach to depression detection in twitter,” in
bert-base Proceedings of the AAAI Conference on Artificial Intelligence, vol. 33,
T ext1 Hypothesis1 Entailed Entailed Entailed no. 01, 2019, pp. 110–117.
T ext2 Hypothesis2 Not Entailed Entailed Entailed [8] D. Chen, Y. Li, M. Yang, H.-T. Zheng, and Y. Shen, “Knowledge-aware
T ext3 Hypothesis3 Not Entailed Entailed Entailed textual entailment with graph attention network,” in Proceedings of the
T ext4 Hypothesis4 Not Entailed Not Entailed Entailed 28th ACM International Conference on Information and Knowledge
T exy5 Hypothesis5 Entailed Entailed Entailed Management, 2019, pp. 2145–2148.
[9] H. Zogan, I. Razzak, X. Wang, S. Jameel, and G. Xu, “Explainable
depression detection with multi-modalities using a hybrid deep learning
V. C ONCLUSION model on social media,” arXiv preprint arXiv:2007.02847, 2020.
[10] A. Bidgoly, H. Amirkhani, and F. Sadeghi, “Fake news detection on
With the current pressures of life, the rate of depression social media using a natural language inference approach,” Research
and anxiety in society was noticeably increasing. Thus, the Square, 2020.
[11] M. Rodrigues Makiuchi, T. Warnita, K. Uto, and K. Shinoda, “Multi-
percentage of posts and tweets on social networking sites modal fusion of bert-cnn and gated cnn representations for depression
with depressive contents increases as well. Therefore, there detection,” in Proceedings of the 9th International on Audio/Visual
is a need for an efficient depression detection from textual Emotion Challenge and Workshop, 2019, pp. 55–63.
[12] M. M. Tadesse, H. Lin, B. Xu, and L. Yang, “Detection of depression-
social content. After researching similar studies, we found that related posts in reddit social media forum,” IEEE Access, vol. 7, pp.
textual entailment is promising when using with deep learning 44 883–44 893, 2019.
https://doi.org/10.5281/zenodo.5852684 7 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852684 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5852684 8 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852758 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Abstract—Cluster computing was introduced to replace the In this paper, we will implement data mining algorithm in a
superiority of super computers. Cluster computing is able to cluster environment to accelerate the mining process. We are
overcome the problems that cannot be effectively dealt with going to analyze the computational performance of cluster
supercomputers. In this paper, we are going to evaluate the computing by comparing with various numbers of nodes and
performance of cluster computing by executing one of data the standalone one as well. We will evaluate the performance
mining techniques in the cluster environment. The experiment one by one so that we can see the significance of cluster
will attempt to predict the flight delay by using random forest computing for data mining processing. Case study of this
algorithm with apache spark as a framework for cluster
research is predicting the flight delay by using random forest
computing. The result shows that, by involving 5 PC’s in cluster
algorithm. All the simulations will be conducted in the virtual
environment with equal specifications can increase the
performance of computation up to 39.76% compared to the environment.
standalone one. Attaching more nodes to the cluster can make the This paper consists of six sections. Rest of this paper is
process become faster significantly. organized as follows. The ideas, terminologies, and related
researches that conducted by other researchers is discussed in
Keywords—Cluster computing, random forest, flight delay section II. The methodology that used in the experiment is
prediction, pyspark, apache spark.
explained in section III. Section IV consists of experiment
I. INTRODUCTION process and result. In this section, random forest algorithm is
executed in the both standalone and cluster environment.
High Performance Computing (HPC) becomes one of hot Conclusion of this research is presented in the section V,
topics in the recent years. Either one of the most popular HPC followed by the future work in section VI.
products in the world is called supercomputer. However,
traditional supercomputer is no longer dominant in the area of
computing and its availability has changed dramatically II. LITERATURE REVIEW
because of its high cost and low accessibility factors [1][2]. Cluster computing is a part of Superior Computing or High
Thus, it is required the HPC system with low cost and high Performance Computing (HPC) [3]. Cluster computing is also
accessibility. Rajak [3] explains that there are 3 types of known as a part of distributed or parallel processing system
modern HPC which has better implementation than the [4]. It consists of some interconnected individual computers,
traditional supercomputer in term of accessibility and cost. through Local Area Network (LAN) [6]. Those interconnected
Those are: grid, cloud, and cluster computing. Grid computing
computers are running together as a single integrated source. It
is good for resource balancing, access to additional storage, and
reliability. Cloud computing has the benefits in super has some benefits, such as in term of performance
computing power, high resource availability, virtualization, improvement, high availability, cost reduction, and
crash recovery, and flexibility. Whereas cluster computing has manageability [4][7][8].
some advantages, especially in term of manageability, single According to [4], there are three types of cluster computing,
system image (SSI), and high availability. Not all computation those are High Performance Computing Cluster (HPC Cluster),
is suitable for all of those 3 solutions, i.e. grid and cloud High Availability Cluster, and Load Balancing Cluster. In this
computing are overkill to solve the simple data mining paper, cluster computing’s type that are going to be
problems. So it is required the smaller scale of HPC to solve implemented is High Performance Computing Cluster (HPC
the simpler problem, and it can be overcome effectively by
Cluster). The goal is to accelerate the prediction on flight
using cluster computing[1][3][4].
delay problem.
Data mining commonly is processed in a standalone Flight delay is defined when a carrier lands or takes off
computer. However, for the large dataset, mining the data in a latter than its scheduled time for arrival or departure. This
standalone PC can take several seconds, minutes, hours, even phenomenon is becoming common and happened frequently in
days, depend on the hardware specifications. A solution is all over the world. Around 20% carriers have more than 15
needed to make mining process become more effective,
minutes delay [9].
especially in term of processing time [4][5].
https://doi.org/10.5281/zenodo.5852758 9 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852758 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
PySpark is built to provide users the python API in Spark ▪ A computer with specification: Intel Xeon E5620
environment. Python is the most popular programming Processor (Cores: 4, Threads: 8), 16 GB RAM, DDR5
language or tool, especially for the analytics, data science, and 1024 MB VGA, 3TB HDD, Windows 10 OS.
machine learning [10][11]. On the other hand, Apache Spark This simulation was performed on top of virtual machine
[12] is a unified analytics engine for large scale data (VirtualBox). All the nodes created here have equal
processing. Spark is also big data framework that widely used specifications, such as: single CPU Core, 2 GB RAM,
by both academia and industry. Spark has at least four Windows 8.1, and PySpark as a cluster computing platform.
advantages for performing data analytics [12][13], those are: The dataset was already preprocessed, so we could use it
directly.
• Speed: spark is 100x faster than Hadoop in memory, or
10x on disk. Apache Spark has an Advanced Directed
Acyclic Graph (DAG) execution engine to support in-
memory computing and acyclic data flow.
• Ease of Use: spark supports many popular
programming languages, such as: java, scala, python,
and R.
• Generality: spark has huge libraries that can be used to
perform many activities, including SQL and
DataFrames, Spark Streaming, GraphX, and MLib for
machine learning.
• Runs Everywhere: spark can run on top of Mesos, Figure 1: 5 Virtual PCs created in Virtual Machine with
Hadoop, and also in the cloud and standalone. Spark equal specifications
also has the ability to access various data sources, such Apache Spark was used in this research, since it is more
as: Cassandra, HBase, S3, and HDFS. powerful than the competitors for the cluster and distributed
On-time flight is important for many parties. Passengers computing. Spark is 10x faster than Hadoop. Spark is platform
want to arrive several hours earlier or on-time to the to do either batch or stream computing with in memory
destination for their business or appointment. Flight delay can computing capability. PySpark is a combination of Python and
bring the uncertainty for the passenger, lost the time, and Spark, so that we can use all python’s library in Spark
sometime it increases the trip cost. On the other hand, the environment. Such combination makes both python and spark
airline companies are also charged for the penalties, fines and become more powerful and very useful, especially in data
science technology.
additional operational costs for the crew and aircraft retention
in airports. As a conclusion, flight delay have some negative IV. EXPERIMENT & RESULT
impacts, especially on economic aspect, for the passengers,
We performed the experiment in 5 environments. Those are:
airline companies, and also airports [14]. ▪ Standalone: it involves a single PC (in virtual machine)
In this research, the flight delay prediction is conducted by with 2GB RAM. No other PCs connected to this
using random forest method, and it is executed in cluster standalone PC.
environment. The result will be compared with the ▪ Cluster_1: it involves two PCs (in virtual machine) in
performance when executed in standalone mode. A lot of which 1 PC works as a master node and another PC
research papers discussed regarding flight delay prediction works as a worker node. In addition, each PC has 2GB
using some data mining techniques, such as decision tree RAM.
[15][16][17], random forest [16][18][17], AdaBoost [16], ▪ Cluster_2: it involves three PCs (in virtual machine),
KNN [16], Naïve Bayes [19], C4.5 [19], Linear Regression each acquires 2GB RAM. 1 PC works as master node
[19][17], Gradient Boosting Classifier [20], Deep Learning and 2 other PCs work as worker nodes.
[21], etc. ▪ Cluster_3: it involves four PCs (in virtual machine),
Random forest is chosen because its popularity to predict each has 2GB RAM. There are 3 workers and 1 master
something and also become one of the most common tools for node on this cluster.
analytical needs. It is a well-known algorithm that theoretically ▪ Cluster_4: it involves five PCs (in virtual machine) in
logic, appropriate in most applications, and easy to implement which 4 PCs have the role of workers and 1 PC for
[22][23][5]. In this paper, random forest is used to predict the master node.
flight delay. As a future work, we will use other methods for For the first experiment, we created the first node (Node_1)
the same case study, and compare it with the performance of and run the algorithm trough Jupyter Notebook. This first
random forest in cluster environment. attempt was conducted in standalone mode. The result was, it
took 137.4 seconds to complete the task (Table 1).
III. METHODOLOGY Regarding the accuracy of the algorithm, we measured the
The experiment that conducted in this research has the error prediction by using Root Mean Squared Error (RMSE).
following details: RMSE is used to calculate the differences between values that
▪ Algorithm: Random forest predicted by the algorithm and the values observed [24]. It
▪ Dataset: Flight (2702218 records, with 70% for training shows that random forest algorithm has error prediction
and 30% or testing) around 13,149 minutes for the flight delay dataset. However,
▪ Number of nodes: 1-5 (using virtual machine) this research is not focusing on this case. The accuracy of this
algorithm remain the same, even when we conduct the
experiment in the cluster environment with more and more
https://doi.org/10.5281/zenodo.5852758 10 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852758 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5852758 11 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5852758 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
[16] S. Choi, Y. J. Kim, S. Briceno, and D. Mavris, “Prediction of weather- [21] Y. J. Kim, S. Choi, S. Briceno, and D. Mavris, “A deep learning
induced airline delays based on machine learning algorithms,” in approach to flight delay prediction,” in AIAA/IEEE Digital Avionics
AIAA/IEEE Digital Avionics Systems Conference - Proceedings, 2016. Systems Conference - Proceedings, 2016.
[17] A. M. Kalliguddi and A. K. Leboulluec, “Predictive Modeling of [22] B. Emir, D. C. Gruben, H. T. Bhattacharyya, A. L. Reisman, and J.
Aircraft Flight Delay,” Univers. J. Manag., 2017. Cabrera, “Predictive Modeling in HEOR,” in Statistical Topics in Health
[18] J. J. Rebollo and H. Balakrishnan, “Characterization and prediction of Economics and Outcomes Research, CRC Press, 2018.
air traffic delays,” Transp. Res. Part C Emerg. Technol., 2014. [23] M. Su, Z. Zhang, Y. Zhu, and D. Zha, “Data-driven natural gas spot
[19] Y. Ding, “Predicting flight delay based on multiple linear regression,” in price forecasting with least squares regression boosting algorithm,”
IOP Conference Series: Earth and Environmental Science, 2017. Energies, vol. 12, no. 6, 2019.
[20] N. Chakrabarty, T. Kundu, S. Dandapat, A. Sarkar, and D. K. Kole, [24] R. Varatharajan, G. Manogaran, and M. K. Priyan, “A big data
“Flight Arrival Delay Prediction Using Gradient Boosting Classifier,” in classification approach using LDA with an enhanced SVM method for
Emerging Technologies in Data Mining and Information Security, no. ECG signals in cloud computing,” Multimed. Tools Appl., 2018.
January, Springer Singapore, 2019, pp. 651–659.
https://doi.org/10.5281/zenodo.5852758 12 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854464 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
AN IMPROVED META-HEURISTIC
ORIENTED EARLY SIZE ESTIMATION
UTILIZING ABC
Manisha1 Dr. Rahul Rishi2
Research Scholar, U.I.E.T (M.D.U), Rohtak, India Professor, U.I.E.T (M.D.U), Rohtak, India
mvmanishavatsa@gmail.com rahulrishi@mdurohtak.in
Abstract: In order to channelize a team’s effort in a The software program is costly to develop and
fruitful direction any software oriented environment, pre- has a high cost due to its large size in the commercial
analysis of software components and the budget has informational systems. The degree of investment in
always been useful practice. Estimation of the size software programs is estimated to be more than $200
becomes a tedious task when the machine is not trained
well enough to provide good classification accuracy. In
billion yearly. Boehm suggested carefully
order to attain significant result when it comes to early considering costs and the benefits before giving the
prediction, the selection of the attribute set plays a vital needed resources for the software project. Generally,
role. Feature set selection has gained popularity in the the precision of the software investment decisions has
last couple of years to make the classification process a direct impact on the quality of the software. Many
more precise. This paper utilizes and enhances the times the costs for the project are underestimated, due
current behaviour architecture of Artificial Bee Colony to which many projects running are abandoned mid-
(ABC), a meta-heuristic inspired algorithm is being used way. This dropping of the project can be due to large
for feature vector selection. The data is further trained costs consumption which was not estimated at an
and classified by multiple multi-class classifiers. The
evaluation of the results has been made on the base of
early stage or due to the wrong estimation of time
quantitative parameter analysis and the co-relation of and the resources needed. On the other hand, when
effort and size has also been presented. The paper utilizes the costs are overestimated, exaggerated project
dataset supported by NASA research frames. estimations may increase the project cost by putting
less pressure on programmers to be creative.
Keywords: Software Size Estimation, Meta- Moreover, in these cases sometimes the potential
Heuristics, Artificial Bee Colony (ABC). projects are rejected because of high cost or time.
I. INTRODUCTION Resulting in the lost opportunity of creating a value-
The significance of software design can be added project in the firm [2].
summarised as a significant mixture of size and So, equally overestimation and under-estimation
quality. A design creates software representations may cause costly errors. Hence, the accurate
that can be evaluated for consistency [1]. The only estimation of the project is purely needed for the
way to correctly convert a customer's specifications reduction of excessive cost and lead to an increase in
into a finished software product is by design. efficiency of the company [3]. The cost of the
Software design is the mechanism by which an agent software projects are increasing day by day due to
establishes a specification for a software artefact that which the result of estimation errors can lead to bad
is intended to achieve goals and uses a collection of consequences, so these estimations are equally
primitive components while adhering to constraints. significant or play an important role in project
A software design involves the estimation of total understanding and selection.
number of manpower needed to complete the work,
total amount of other supplies and if the software Estimating the development of the software has
project is extended or does not get complete on time, always remained a complicated problem.
what would be the extra cost that would be applied to Improvement in these software estimation techniques
the design company. In order to save effort and to leads to the more effective management of cost, time
reduce computation complexity, pre-analysis of the in the management of software. Software
software projects is required. NASA, the well-known development contains numerous interrelated factors
organization of the world has submitted an analysed that affect the effort and productivity of the
data based on the software projects which has been development process.
undertaken by NASA. In order to reduce the human
effort, the system must be trained to deal with real
time existing issues and architecture.
https://doi.org/10.5281/zenodo.5854464 13 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854464 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
The important factors of size estimation which The Neuro-fuzzy algorithm is used for result
are generally considered in all the project estimation optimization as well as training. The performance of
models are as follows: the proposed model is computed with the comparison
of another intelligent system model. The parameters
a) Time to be consumed in creating the project. that are computed such as Magnitude of Relative
b) Total human resources required for Error (MMER), Mean Standard Error (MSE), and
completing the project. Level Prediction. The proposed model represents
c) Output quantity. better results as compared to others [5].
Software size estimation is a very critical issue to Novitasari et al. 2016 examine the use of PSO
both designers and users. They can be used for in conjunction with simulated annealing to improve
producing requests for offers, contract talks, SVM parameter selection. Proposed a local best PSO
planning, and managing. Underestimating the sizes with SVR for software effort estimation with two
may consequence in management easily approving objective functions including fitness and cost
the project and then if the budget exceeds the failure functions to measure the most favorable generated
of the project may occur as it may have solution. The major criteria used for determining an
underdeveloped functions and poor quality [4]. acceptable solution is to have an optimization that
Overestimating may outcome in various resources enhances the fitness value or minimizes the cost
dedicated to the project which can lead to loss of value. The optimization is obtained by a cost-typed
jobs. function, to minimize the error. Desharnais dataset is
Precise estimation of size is vital because: taken into consideration where local best PSO-SVR
gives optimal cost [6].
1. It helps for classifying and ranking/arranging the
development projects in terms of the overall Langsari et al. 2017introduced the use of
business plan. Gaussian Membership Function (GMF) FL and
2. It is used for determining the resources needed Multi-Objective PSO algorithms in calibrating and
for the project and at which interval which optimizing the COCOMO II model parameters. The
particular resource will be committed to which proposed method is applied to the Nasa93 dataset.
task. MOPSO is a calibration and optimization algorithm
3. The impact of changes can be easily viewed and approach to improving the accurate degree of the
assessed and re-planning can be easily done. COCOMO II model by optimizing its parameters.
4. When resources are easi.ly matched to the tasks The proposed method gives significance in reduced
then the project can be easily managed MMRE and evaluation results have shown that the
calibration and optimization with the proposed
Software size estimation includes the calculation of method gives an improved estimation compared to
the following estimates: the basic COCOMO II model [7]. Following this,
Yigit-Sert and Kullu 2018 had also implemented
1. Effort (usually in person-months) ABC for software estimation work on similar dataset
2. Project duration (in calendar time) statistics [8].
3. Cost (in dollars)
Ali et al. 2019 presented a systematic review
For size estimation of any software, there are a based upon recent studies related to software effort
large number of techniques are available. Machine estimation models by applying machine learning
learning (ML) is one of the most important approaches. The literature of the proposed work is
techniques used to measure software cost estimation. based upon the previous studies that were published
There are a large number of shortcomings in previous from January 1991 to December 2017. From the past
methods that are applied for software effort studies, 75 were selected, then perform filtering of
estimation. So, ML is used to improve the inclusion/exclusion and quality assessment. Most of
shortcomings of the existing techniques. The choice the studies applied ANN as a machine learning model
of the learning category is depend upon the task. to compute the better mean magnitude of relative
error (MMRE). Support Vector Machine (SVM) and
II. LITERATURE SURVEY
ANN are mostly used as machine learning models
As the size of the software is dependent upon a
rather than others [9].
lot of factors, this research articles sticks to the co-
relation of effort to software size and hence the Sehra et al. 2019 proposed a hybrid model
literature survey is oriented towards machine learning which combines machine learning algorithms to
and software effort to size estimation only. predict the effort more accurately. The fuzzy analytic
hierarchy process (FAHP) has been used effectively
Nanda et al. 2016 represented a model that is
for feature ranking. Ranks generated from FAHP
integrated neuro-fuzzy optimized with Particle
have been integrated into weighted kernel least
Swarm Optimization (PSO) to improve effort
square SVM for effort estimation. The combination
estimation on software projects of NASA dataset.
https://doi.org/10.5281/zenodo.5854464 14 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854464 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
of weights generated by FAHP and SVM has resulted generic form of model that can be used to estimate
in more accurate effort estimates [10]. software effort for all types of projects. The authors
proposed that NN-based techniques be used to create
Chhabra et al. 2020 designed a FIS to optimize a generic form of model that can be used to estimate
fuzzy logic-based COCOMO using PSO Algorithm software effort for all types of projects.
to calculate the effect of cost parameters used in
Intermediate COCOMO. PSO is used to solve the III. PROPOSED METHODOLOGY
problem of parametric optimization of fuzzy systems. The proposed methodology is divided into three
The magnitude of the relative error and its mean, steps architecture. The first step loads the dataset and
calculated using COCOMO NASA2 and COCOMO applies machine learning based improved k-means
NASA datasets are used as evaluation metrics to algorithm to divide the data into three sizes
validate the proposed model. The model outperforms depending upon the co-relation attained in the
when compared to other optimization techniques. groups. The second part applied Artificial Bee
This fuzzy model handled the vagueness and Colony (ABC) to select attribute sets from each
ambiguity in information resulting in improved divided group and the third step used training and
prediction accuracy of COCOMO. The resultant classification algorithms to classify the test data. The
MMRE showed even more improved results in proposed methodology ends up with summarizing the
comparison to fuzzy-model-based COCOMO [11]. co-relation between the size and the effort. The
overall methodology can be represented by the
Suresh & Behera 2020 presented a comparative following algorithmic pseudo code.
analysis based upon different models like; SVM, NN,
RF, KNN, and back propagation algorithm. The A. Algorithm: CC = Estimation (PR)
orange data mining tool is used in the proposed work. Where, PR Project Records (Input)
Two datasets are used in the proposed work that is CC Classified Class (Output)
COCOMO’81 having 63 projects and the Desharnais
1. Collect all the data records from the repository
dataset consists of 81 projects. The simulation results
show that the back propagation model provides and create a Dataset
efficient results as compared to other approaches 2. Aggregated_Dataset = Aggregate (Dataset) //
[12]. Aggregate the collected dataset
3. Apply Iterative K-means
Rankovic et al. 2021 proposed two different
architectures based upon Artificial Neural Network 4. For each data in range(Dataset)
(ANN) that is used for software effort estimation. 5. New_Data = Iterative K-means
The author applied ANN as a machine learning (Aggregated_Dataset) // According to the
approach due to its high speed of learning that helps improved k-means [15] which consist of different
to obtain better results. The main aim of the proposed similarity measures
work is to minimization of the Magnitude Relative 6. End – For
Error (MRE) in effort estimation with the help of
7. Apply K-means on New_Data
Taguchi’s Orthogonal Arrays. It helps to find out the
simple architecture of ANN for optimized learning. 8. Set an estimated cluster (C)
The proposed work is used to cover up different 9. Calculate size of New_Data in terms of [Row,
values of actual efficiency that belong to a huge Col.]
range of projects. It helps to reduce the risk of error 10. Define initial C-Data = [] // To store clustered
estimation to increase the rate of completed software data
projects [13]. 11. Consider Centroid C = C1, C2, & C3
Rhmann et al. 2021 introduced software effort 12. For X in to range(Row)
estimation depends on the weighted hybrid search- 13. For Y in range(Col)
based algorithm. The weighted ensembles were 14. If Data (X, Y) ε C1
created by using various metaheuristic algorithms 15. C-Data 1 = New_Data (X, Y)
such as; black hole optimization, firefly algorithm,
16. Else if Data (X, Y) ε C2
and genetic algorithm. The author used three datasets
that are collected from the PROMISE repository. The 17. C-Data 2 = New_Data (X, Y)
simulation results were performed in R programming 18. Else Data (i,j) ε C3
language using RKEEL and Metaheuristics Opt r 19. C-Data 3 = New_Data (X, Y)
packages. The results describe that the proposed 20. End – If
metaheuristics based on weighted ensembles of 21. Using the average, adjust the value of
hybrid search-based algorithms provide better results Centroid C
( , , )
of software effort estimation [14]. 22. 𝐶 =
As a result, it is recommended that a Neuro- 23. End – For
based methodology be used to develop a suitable
https://doi.org/10.5281/zenodo.5854464 15 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854464 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
24. [𝐾 , 𝐾 ] = (C, 3) // K_index contains 46. Initialize training algorithm and train the model
the centroid index, it would be either 1, 2 or 3 as 47. Structure = Train (Selected Data)
the entire dataset is to be divided into three 48. CC = Structure (Test Data)
subsequent groups namely {high, moderate and 49. Return: CC as Classified Class
low} 50. End – Algorithm
25. End – For
26. 𝐾 = 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑦 𝑢𝑛𝑖𝑞𝑢𝑒 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑠 𝑖𝑛 𝐾 The proposed algorithm architecture returns the
// Find all the unique classes categorized class value and then the difference of the
actual categorized class and the simulation value is
27. For Z in range(𝑲𝒄𝒍𝒂𝒔𝒔 ) // for each class category
compared to each other. A fuzzy rule set is applied to
in the dataset predict the size in such case as mentioned in table I.
28. 𝐷𝑎𝑡𝑎𝑠𝑒𝑡 =
TABLE I: FUZZY SET
𝐹𝑖𝑛𝑑(𝐷𝑎𝑡𝑎𝑠𝑒𝑡. 𝑖𝑑𝑒𝑛𝑡𝑖𝑓𝑖𝑒𝑟𝑠 == 𝐾 ) // Find
object of Kclass in dataset identifiers Very high software
29. End – For 𝐼𝑓 𝑐𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑒𝑑 > 30% margin size not beneficial as a
30. Apply ABC for co-relation analysis among the project
class object
31. EmployedBees = Dataset_sub.Record(count) // Find Else if 𝐶𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑒𝑑 >10% Moderate in software
total number of elements in the specific class margin and 𝐶𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑒𝑑 <30% size and manageable
margin if handled carefully
32. 𝐸𝑚𝑝𝑙𝑜𝑦𝑒𝑑 = 𝐷𝑎𝑡𝑎𝑠𝑒𝑡. 𝐸𝑚𝑝𝑙𝑜𝑦𝑒𝑑 //
Find attribute set of employed bees
Low in computation
33. Initiate OnlookerBee = [ ] // Initiatialize an empty If Classified Label< 10% Margin and highly profitable
array of onlooker bees as a project
34. For each emp in EmployedBees // take each bee
food individually
35. N_bee_food = Apply_Fuzzy_Normalization According to the fuzzy set, if the classified label
(EmployedFood) // Normalize the food behaviour by the neural classifier, has a difference of more than
by applying fuzzy logic 30% either in upward direction or in the downward
36. OnlookerBee = direction, the estimated size would be high and that
. . would result into higher computation complexity.
(∯ ∑ 𝑁_𝑏𝑒𝑒 ,
× Such projects will not be beneficial for the company
and should be avoided in future. On the other hand, if
𝐹𝑙𝑦 )/ ∯ ∑ 𝑁_𝑏𝑒𝑒 ,
× the difference lies between 10-30%, the project is
𝐹𝑙𝑦 ) // The onlooker bee evaluates the said to be moderately complex in terms of size and
employed bee based on the behaviours attained in computation, and can be considered to hire. The third
case is the most profitable case and has least
the current cluster and average change occurred in
computation complexity and size as compared to
the behaviour of the other hive nest bees other existing projects. The evaluation of the
according to the fitness quantitative parameters is illustrated in the result
37. Define bee fitness section.
𝐹𝑖𝑡𝑛𝑒𝑠𝑠 𝐹𝑢𝑛𝑐𝑡𝑖𝑜𝑛 =
IV. RESULTS AND DISCUSSION
1 𝑖𝑓 𝐸𝑚𝑝𝑙𝑜𝑦𝑒𝑑 < 𝑂𝑛𝑙𝑜𝑜𝑘𝑒𝑟_𝑏𝑒𝑒
// The evaluation of the results has been made on the
0 𝑂𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 base of following parameters:
Bee fitness function
38. If Fitness Function == 1 a) Classification Accuracy
39. Select the record from New_Data b) Classification Cost Ratio
40. Else The classification cost ratio is the ratio of the
41. Reject the record from New_Data classification accuracy attained by the proposed
42. End – If method to the classification accuracy attained by
43. Select record if the fitness value is 1, else reject other algorithm in percentage. To justify the
the value effectiveness of the proposed work the achieved
classification accuracy is compared against two
44. End – For
existing work based on ABC and CS. The
45. If the Bee food is accepted, the attribute set will classification accuracy of the three works is listed in
be selected to subsequent category and pass table II.
categorized set to training
https://doi.org/10.5281/zenodo.5854464 16 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854464 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
TABLE II. CLASSIFICATION ACCURACY As the utilized dataset was limited to 92 projects
Total Accuracy Accuracy normal
only the proposed algorithm simulated some more
Accuracy records for reference. A total of 5000 simulations
Number normal ABC cuckoo[Kaushik
enhanced
of
ABC
[Venkata et al. et al. (2017)] were performed on the later stage and it is identified
Projects (2020)] [16] [15] as the overall accuracy attained after 5000 simulation
25 0.642 0.543 0.521 is 15% more efficient as compared to existing
average accuracy. The average classification
30 0.660 0.545 0.523
accuracy of 0.79 was exhibited by the proposed
35 0.689 0.554 0.523 work, 0.64 by Venkata et al. and 0.54 by Kaushik et
al. The CCR is further computed using by evaluating
40 0.706 0.561 0.525 the proposed classification accuracy over the
45 0.709 0.569 0.530
classification accuracy of the existing work. The
CCR of the proposed work in comparison to the two
50 0.714 0.593 0.532 existing works is depicted in Fig. 1.
55 0.725 0.613 0.534 The average CCR of the proposed work over the
Venkata et al. who had implemented ABC based
60 0.735 0.627 0.537
architecture is observed to be 1.236. However, CCR
65 0.791 0.634 0.538 of proposed work for the Kaushik et al. work who
had taken advantage of CS is observed to be 1.466.
70 0.825 0.662 0.540 The figure depicts that on an average, if the proposed
75 0.902 0.694 0.547
algorithm architecture is not used, the major loss
could be upto 87% if the number of projects are small
80 0.921 0.725 0.552 in count. It is obvious that, if the learning algorithm
will get more data, it will produce much precise
85 0.932 0.741 0.559
classification value. The outcome of the paper can be
90 0.956 0.771 0.568 extended by hybridizing the model value with other
meta-heuristics algorithms.
92 0.967 0.8008 0.571
1.7
CLASSIFICATION COST RATIO
1.6
1.5
1.4
1.3
1.2
1.1
1
25 30 35 40 45 50 55 60 65 70 75 80 85 90 92
CCR against Venkata et al.
1.19 1.22 1.25 1.26 1.25 1.21 1.19 1.18 1.25 1.25 1.3 1.28 1.26 1.24 1.21
(2020)
CCR against Kaushik et al.
1.24 1.27 1.32 1.35 1.34 1.35 1.36 1.37 1.48 1.53 1.65 1.67 1.67 1.69 1.7
(2017)
https://doi.org/10.5281/zenodo.5854464 17 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854464 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5854464 18 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Abstract— This paper presents a critical analysis of the current important role in facilitating these encounters. Although
application of big data in higher education and how Learning informal learning is not a new concept, social media
Analytics (LA), and Educational Data Mining (EDM) are helping to technologies have opened new possibilities that were
shape learning in higher education institutions that have applied the previously unavailable and have even "blurred the line
concepts successfully. An extensive literature review of Learning between formal and informal learning" [22]. Many researchers
Analytics, Educational Data Mining, Learning Management Systems,
Informal Learning and Online Social Networks are presented to
[75], [43], [47] stress the social character of informal learning
understand their usage and trends in higher education pedagogy in the digital age since social media technologies have a
taking advantage of 21st century educational technologies and significant impact on student experiences. For example, as a
platforms. The roles of and benefits of these technologies in teaching type of informal learning, today's students utilize instant
and learning are critically examined. Imperatively, this study messaging, browse websites, use Facebook for chatting,
provides vital information for education stakeholders on the Twitter, Instagram, listen to music, play games, and download
significance of establishing a teaching and learning agenda that takes materials [100], and all these practices are important for social
advantage of today’s educational relevant technologies to promote interaction. As a result, there has been an increase in the
teaching and learning while also acknowledging the difficulties of amount of data created from various sources of online social
21st-century learning. Aside from the roles and benefits of these
technologies, the review highlights major challenges and research
networking sites.
needs apparent in the use and application of these technologies. It
appears that there is lack of research understanding in the challenges In retrospect between 2014 and 2020, the rate of data growth
and utilization of data effectively for learning analytics, despite the was anticipated to double every month, according to [102].
massive educational data generated by high institutions. Also due to Higher education has not been spared from the "data flood"
the growing importance of LA, there appears to be a serious lack of age, as it has witnessed a massive increase in data input as
academic research that explore the application and impact of LA in well as the introduction and acceptance of new technologies
high institution, especially in the context of informal online social for teaching and learning. However, as compared to other
network learning. In addition, high institution managers seem not to sectors like marketing, finance, health, security, and sport, the
understand the emerging trends of LA which could be useful in the
running of higher education. Though LA is viewed as a complex and
primary challenge in the sector has been the inefficient use of
expensive technology that will culturally change the future of high this data to create value in a way that satisfies the educational
institution, the question that comes to mind is whether the use of LA market demand. Furthermore, the popularity of Online Social
in relation to informal learning in online social network is really what Networks (OSN) for personal communication and
is expected? A study to analyze and evaluate the elements that entertainment is driving up demand for OSN-integrated apps.
influence high usage of OSN is also needed in the African context. It People tend to exchange personal information with linked
is high time African Universities paid attention to the application and colleagues in the OSN, whether through games or programs
use of these technologies to create a simplified learning approach that track one's sports activity. Over the last few years,
occasioned by the use of these technologies. educational hypermedia has progressed from static systems to
dynamic content display and delivery platforms [26]. A shift
Keywords: Learning Analytics, Educational Data Mining,
in personal learning is driving the demand for collaborative
Informal Learning, Online Social Network.
learning in OSNs. Additional services have recently been
incorporated into OSNs, allowing users to search up and
debate subjects of interest with other users. Typically, there is
I. INTRODUCTION no moderator or facilitator to steer the debate. Active and
Learning is essential for obtaining new information and skills passive triggers can be used to start conversations. The more
in today's ever-changing world, and it does not always take active option is to start a text-voice or video chat and ask other
place in traditional educational settings. Most of the student users to join. Posting messages on one's page and waiting for
learning, take place informally [34] and technology plays an a response from someone who happens to be looking at it by
https://doi.org/10.5281/zenodo.5854482 19 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
chance is a passive form of communication. Any user who has enhancing education. LA heightens learners' and instructors'
been granted access to a post may respond on the person's awareness of their current conditions, allowing them to make
profile. better informed decisions and execute their duties more
efficiently [41]. One of the most common uses of learning
The quantity of social media data allows us to better analytics is to track and forecast student performance, as well
comprehend students' experiences, but it also creates as to detect possible problems and at-risk individuals [20].
methodological challenges in interpreting social media data Some institutions have already used LA in a variety of courses
for educational purposes. Consider the enormous volume of to help students study more effectively. Purdue University, for
data, the diversity of Internet slang, the unpredictability of example, utilized predictive modeling based on data from its
student posting locations and timing, as well as the complexity course management system to identify students at danger and
of students' experiences. Pure manual analysis is unable to intervene. The University of Alabama enhanced student
cope with the ever-increasing volume of data, while pure retention by developing a prediction model for at-risk students
automatic algorithms are unable to grasp the data's in-depth based on a huge dataset of demographic information. Northern
significance [36]. Traditionally, educational researchers have Arizona University, for example, linked resource utilization,
collected data about students' learning experiences using risk level, and student success by developing a prediction
methods such as surveys, interviews, focus groups, and model to determine which students would benefit from which
classroom activities [111], [78]. Because these procedures are resource [112]. These are among the first institutions of higher
often time-consuming, they cannot be replicated or repeated learning to use LA. Equally, in the UK, the Open University
frequently. The scope of such research is generally of UK linked the strategic priorities to continues students’
constrained as well. Furthermore, when asked about their enhancement and experience to retention and progression.
experiences, students must reflect on what they were thinking Nottingham Trent University UK also linked the area of
and doing in the past, which may have faded with time. student’s retention-less quarter with low average engagement
progress of second year students. In the same vein. The Open
Learning analytics and educational data mining (EDM) are university of Austria mention that learning analytics is used to
new areas that focus on analyzing structured data from course drive personalization and adoption of content recommended to
management systems (CMS), classroom technology usage, or individual students as well as provide input and evidence for
regulated online learning environments to help educators curriculum redesign. In Edith Cowen University in Austria,
make better decisions [44], [12], [54]. Learning analytics is they created a probability of retention scores for each
defined as "the use, assessment, elicitation, and analysis of undergraduate students to identify most likely students to need
static and dynamic information about learners and learning support [60]. While some Higher Education Institutes have
environments, for the near real-time modeling, prediction, and had great success in exploiting the benefits of Learning
optimization of learning processes and learning environments, Analytics, many others especially in the African context have
as well as for educational decision-making" in this study [6]. yet to do so. This calls for research in LA among African
Since early 2010, the study of learning analytics has grown Universities.
tremendously in the fields of education and psychology, as
well as computers and data science [80]. As a result, while There is a knowledge gap in terms of how Learning Analytics
learning analytics is a broad concept, it has many conceptual is utilized and what the consequences are in higher education.
variations, such as school analytics [64], teacher or teaching This paper calls for research to fill this gap. The authors of
analytics [23], academic analytics [44], assessment analytics this paper are currently engaged in research to examine and
[113], social learning analytics [32], or multimodal [53]. identify the key factors influencing the use and impact of
Predictive models are used in learning analytics to offer Learning Analytics and provide a systematic overview of the
actionable data. Data processing, technology-enhanced use and impact of informal online social network learning in
learning, educational data mining, and visualization are all higher education institutions. More specifically, this research
part of this interdisciplinary approach [41]. The goal of LA is aims to determine how informal online social networks can
to customize educational opportunities to the needs and effectively use data in the era of Big Data and Learning
abilities of each individual learner by intervening with at-risk Analytics as learning tools to influence learning outcomes.
pupils and giving feedback and instructional content. While This paper therefore serves as input from the various literature
LA focuses on the use of established methods and models to reviewed. Although research on the use of LA in higher
address challenges impacting student learning and the education institutions has been published in recent years, LA
organizational learning system, educational data mining is still a new topic of study. Higher education stakeholders,
focuses on the creation of new computational data analysis leaders, administrators, teachers, and course designers must
approaches [77]. get familiar with LA methodologies and applications [41].
The difficulty is that few studies have integrated prior
There has been considerable criticism that the process of big research or offered a comprehensive review of concerns
data mining is driven by higher education management and related to the use of LA in higher education.
the economic framework of education [109], nonetheless,
empirical studies have shown that LA may be beneficial for A. Statement of Research Problem
https://doi.org/10.5281/zenodo.5854482 20 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
A. Big Data
Data is pervasive and has always been important in making
decisions. As a result of todays advanced technologies,
massive data can be collected quickly, mined, processed and
interpreted as explained in [120]. Digital networks, social
networking, cellphones, and the World Wide Web are just a
handful of the methods used to generate this massive amount
of data. These massive datasets are referred to as "Big Data"
because they are beyond the capacity of conventional database
tools to collect, search, store, transfer, manage, visualize,
share, query, analyze, and update them. Nevertheless,
depending on the technologies employed and the average Fig. 2. Data generated every minute by OSNs Source [88]
amount of datasets connected with the industry, the definition
of Big Data may vary from sector to sector, and the present As of July 2021, the internet reaches 65% of the world's
pace of data collection is staggering. Effective data handling population and now represents 5.17 billion people – a 10%
and analysis is a significant issue. Formally, Big Data may be increase from January 2021. Of this total, 92.6% access the
defined as collections of datasets whose volume, velocity, or internet via mobile devices. According to Statista, the total
variety is so large that it is difficult to store, manage, process amount of data consumed globally in 2021 is 79 zettabytes, an
and analyze the data using traditional databases and data annual number projected to grow to over 180 Zettabytes by
processing tools [106]. Figure 1 shows the main 2025.
characteristics of Big Data in terms of volume, velocity and Essentially, Big data is generated from heterogeneous data
variety. sources such as email, social media, medical instruments,
commercial and scientific sensors, financial transactions,
satellite, and traditional databases, etc. in the form of text,
https://doi.org/10.5281/zenodo.5854482 21 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
image, audio, video, or any combinations of any form of learners’ knowledge and related states and by promoting
these. Expectedly, organizations will be able to make educated learning through targeted feedback. Data-enhanced
decisions as a result of the massive volume of data being assessment can provide feedback to instructors in designing
generated [105]. However, because of the diverse nature and teaching and assessment strategies in online and offline
scale of big data, managing it is a difficult undertaking. learning environments. The influence of technology can be
seen in many aspects of education from student engagement in
learning and content creation to helping teachers provide
B. Big Data Analytics and Educational Data personalized content and improving student outcomes [19].
Recently, Data Mining (DM), Educational Data Mining One may argue that educational data is not Big Data when
(EDM), and Learning Analytics (LA) have been employed to studying big data in education. Is educational data
handle big homogenous datasets. Traditional data mining characterized by the three Big Data characteristics of volume,
approaches, on the other hand, must be updated to process velocity and variety? Data collected within a MOOC is high in
diverse types of data in parallel to handle the heterogeneity of velocity and volume but low in variety unless deliberate
big data. For this reason, some researchers refer to "data efforts are made to increase variety. Demographic information
mining" as "old big data" and "big data" as "new data mining" such as (gender, ethnicity, etc.) and previous knowledge
[103], [114]. Big data analytics is a technique for analyzing assessments can be included in educational data (prior college
big datasets comprising a range of datasets to find hidden enrolments, high school grades, standardized test scores, etc.).
patterns, unknown connections, market trends, consumer However, these variables are not collected automatically in
preferences, and other relevant business data. Although big MOOCs [85]. Also, when comparing the volume of
data analytics is frequently employed in business to anticipate educational data to other industry data such as web data, retail,
future trends and consumer behaviors, it is shockingly and health care data, learning analytics may fall short on
underused in education. Learners, educators, educational volume. Volume, speed, and variety are the major distinctions
researchers, course developers, learning institutions, and between Big Data and Analytics [100]. Despite these
education administrators are the six stakeholders in education. variations, many research projects are looking into the use of
Through learning systems based on big data analytics, learners learning analytics and educational data, as significant
may receive immediate and thorough feedback on their quantities of data are generated every day via eLearning tools
interactions with the information they are learning. Big data that might provide valuable insight into students' performance,
may be utilized to teach pupils about what they have correctly attentiveness, and habits [70].
learned and what they have not. Similarly, high-performing
students' practices can be shared with other students so that
they can adapt their learning by the system. Educators may C. Big Data and Learning Analytics
use big data to assess the overall performance of the class at a Big Data is at the heart of both learning analytics and business
macro level, allowing them to plan broad tactics for the class. analytics and provides data sources for generating insights
They can also examine an individual student's performance at through analytics. Big Data has a lot of value and may have a
a microscopic level to determine his or her strengths and lot of influence, but it's all predicated on Learning Analytics
shortcomings. As a result, educators can concentrate on the and Business Analytics. Big Data may be extremely valuable
learner's weak spots to enhance their total performance. and impactful, but companies must utilize analytics to make
Educational researchers may utilize a vast quantity of learner sense of it [96]. Some individuals use the terms "Big Data
datasets to suggest new learning theories and practices, as well Analytics" and "Business Analytics" interchangeably.
as assess the efficacy of the theories and models offered. Analytics in business is referred to as Business Analytics,
Course creators can leverage the rapid availability of while Analytics in high education is referred to as Learning
numerous online participants, as well as their comments, to Analytics. According to [44], Big Data encompasses the
create new course materials or alter existing course materials. emerging field of Learning Analytics, which is now an
emerging field in education. Reports in [89] have highlighted
Analysis of large educational datasets can be done by using the use of Big Data in Higher Education, claiming that
the combination of two techniques, namely, educational data technical advancements have facilitated the shift to greater use
mining (EDM) and learning analytics (LA). These techniques of analytics in high education.
develop a capacity for quantitative research in response to the In addition, Big Data in higher education implies an
growing need for evidence-based analysis related to education understanding of a wide range of administrative and
policy and practice [94]. As Big data is being used to evaluate operational data collected procedures aimed at examining
the rationality and effectiveness of training programs at institutional performance and improvement to predict future
universities [7], evidence from [17] which studied three performance and identify potential challenges related to
different online learning environments: Open Learning research, academic programming, teaching, and learning [18],
Initiative (OLI) at Stanford University and Carnegie Mellon [99]. In a similar vein, [104] claims that most of the current
University, Code Webs Project, and massive open online work on analytics in higher education comes from
courses (MOOC), suggest that learners and instructors both interdisciplinary research, which includes educational
can benefit from big data. Big data assists instructors in the technology, statistics, math, computer and information
assessment process by enabling the continuous diagnosis of
https://doi.org/10.5281/zenodo.5854482 22 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
science, and data mining is a key component of the current purposes, such as improving our knowledge of how people
work on analytics in education. learn [81]. EDM provides a variety of options for analyzing
and directing learning in a multidimensional environment
Big Data is now well-positioned to begin tackling some of the where data comes from many sources and in various formats
major problems now confronting high education using today's [118]. These methods are eclectic in character, combining
technologies. With these technologies, organizations qualitative and quantitative approaches. They also let
(including educational institutions) get superior perspectives researchers examine large amounts of data that are influenced
from data at previously unattainable levels of complexity, by a variety of unknown factors. Hence, analysis of
speed, and accuracy. Students, systems, and computer observational datasets to find unsuspected relationships and to
applications [37, 45]. Learning Analytics (LA) therefore, is a summarize the data in novel ways that are both
fundamental instrument for learning change in education that understandable and useful to the data owners is a critical [92].
provides evidence on which to build a better perspective and Data mining as a multidisciplinary field also involves methods
make learned rather than inherent choices [72]. Formally at the intersection of artificial intelligence, machine learning,
defined, Learning Analytics is the process of gathering, statistics, and database systems as shown in fig. 3.
analyzing, and reporting educational Big Data because of
business intelligence and data mining [13]. As a growing field
of study, it provides students, instructors, and other
stakeholders with a better knowledge of how they learn [32],
[42]. Other key benefits of Big data and LA include student
course performance prediction, identifying risk of abrasion,
interactive visualization and reporting of data, smart feedback,
course commendations, approximation of skill development,
identification of group-based collaborative feedback, and
schedule management [39]. The idea is extended to smart
learning environments and interactive educational systems in
order to sustain active learning and therefore a general
development for learning and engagement [11,59]. With the
current shift in educational settings to blended and online
learning, as well as the introduction of Learning Management
Systems (LMSs) like Moodle and Blackboard, it is
unsurprising that Big Data has made its way into education
and is expected to be widely used in high institutions as these
platforms generate massive educational data sets over a period
of time.
Fig. 3. Areas related to EDM and LA: Source:[82]
D. Learning Analytics and Educational Data Mining
Data produced by and accessible in higher education (HE) Data analytics in the context of learning and education
provide the basis for conducting research and analysis in (Learning Analytics) entails gathering information on student
understanding and improving teaching and learning. The actions and behaviors, as well as educational settings and
sources of these data are not only from teaching and learning situations, and then utilizing statistics and data mining
but also include all data units of a university such as finance, methods to uncover important patterns that show how learning
human resources, the registrar’s office, maintenance and occurs. LA may be used to report learning activity
faculties, internet usage, admission, program development, measurements and patterns or optimize learning methods and
libraries, and research. As a result, HE has been paying settings.
careful attention to utilizing technologies made accessible by Because of the enormous quantities of data becoming
advancements in big data analysis, with employability and accessible from the increasing number of courses offered in e-
graduate skills at the forefront of many institutional initiatives learning and hybrid settings, the educational applications of
to harness the usefulness of educational data. For teaching, EDM and LA in higher education are new and developing
learning and services provided to students, it seems that both trends. They are a great tool for methodically analyzing the
Educational Data Mining (EDM) and Learning Analytics massive amounts of data generated by higher institutions.
(LA) can become optimal tools to guide universities in
E. Benefits of LA and EDM
adapting to changes and addressing specific needs for the
future. EDM has grown into its own discipline, using data Papamitsiou and Economides performed a comprehensive
mining methods in educational settings. EDM includes a wide systematic literature evaluation of empirical evidence on the
range of techniques and applications that may be divided into advantages of LA as well as the related area of educational
two groups. On the one hand, EDM may be utilized to achieve data mining (EDM). They categorized the approaches into
practical research goals like improving learning quality. On case studies that focused on student behavior modeling,
the other hand, it may be utilized as a tool for pure research performance prediction, increased self-reflection and self-
https://doi.org/10.5281/zenodo.5854482 23 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
awareness, dropout prediction, and retention. Their results conceptual models of learning analytics adoption in higher
indicate that vast amounts of educational data as well as the education, as recently pointed out by [33], fail to
use of pre-existing algorithmic techniques were accessible. operationalize how key dimensions interact to inform the
Furthermore, LA allows for the creation of accurate learner realities of the implementation process, necessitating a need to
models that may be used to guide adaptive and customized rethink learning analytics adoption through complexity
treatments. Other advantages of LA include the detection of leadership theory and to develop systems understanding at
key learning moments, learning methods, navigation leadership levels to enable the movement of boutique
behaviors, and learning patterns [61]. A separate systematic analytics projects into the enterprise. Learning analytics
review on LA. Was done in [76]. The authors suggest that, in adoption is frequently hampered by a lack of resources,
order to effectively assist learning processes, logs of students’ obstacles requiring many stakeholders' buy-in, and worries
data activity should be supplemented with extra information and anxiety about big data ethics as well as privacy concerns
(e.g. actual time spent learning, semantic-rich information). in higher education [87], [24]. To meet these difficulties,
As a result, extensive data on students' attempts and leaders must be flexible, sensitive to environmental forces,
performance, as well as precise information about adept at handling disputes, and able to harness complex social
psychological, behavioral, and emotional states, are required networks for change [15].
for LA to promote study success. There is a lot of overlap
between these two areas of study. Despite this, there are One of the most promising techniques for investigating the
several divergences view in the literature. Notwithstanding, complexity of social impact, multilayer hierarchies, and
the aim of EDM and LA is the same: to improve education relationship development is network analysis. In [66] network
quality by analyzing massive quantities of data and extracting techniques were used to describe the spread and diversity of
valuable information for stakeholders. Companies in other behaviors, forecast the pattern of dissemination of
industries, such as finance, and healthcare, have already used innovations, analyze educational phenomena, and identify
statistical, machine-learning, and data-mining methods to opinion leaders and followers in order to better comprehend
improve performance via data-driven choices. Figure 4 shows information flows [39]. Epistemic network analysis is
the evolution of EDM and LA noteworthy in the context of learning analytics.
G. Conceptualizing Informal Learning and Online Social
Network
The study of asynchronous discussion forums dominated
previous work on online informal learning analysis, with an
emphasis on finding successful learning and knowledge-
building processes through content analysis [91] [116]. In
social contexts, learning is defined as a collection of processes
through which a learner builds meaning, and new ideas based
on prior experiences. This implies that evidence of learners'
online interactions, like chats, may be used to identify
cognitive and social processes that learners participate in to
give meaning to their new concepts.
a) Informal Learning
Informal learning is more difficult to describe due to many
conceptual and methodological problems [97] [35]. In terms
of learning context location, informal learning refers only to
Fig. 4. Evolution of EDM and LA Source [82] learning that occurs outside of the classroom [68], [57]. Other
research, such as [98], examines informal learning in terms of
Although EDM research began a few years earlier, the structure and technique, as well as teacher-student interaction.
popularity of EDM and LA areas of study has been on the It is viewed as a self-directed, purposeful activity from this
increase since the early 2010s (Figure 4). Due to the potential perspective. Another perspective emphasizes the goal of
advantages (for students, instructors, administrators, learning, describing informal learning as learning that occurs
researchers, and society in general) and the relevance of inadvertently, spontaneously, and without attention, and is
current Big Data research, these areas are anticipated to typically associated with leisure activities [69]. Learning is a
continue to grow [21]. continuous process in which the learner's capacity to arrange,
classify, and evaluate knowledge determines the degree of
formality or informality. As described in [1], it is about "the
F. Incorporating Social Systems into Learning Analytics degree of control teachers and learners have over the
The complex social networks that facilitate the flow of selection, organization, and timing of knowledge transmitted
adoption processes are part of the broad social system settings and absorbed." When a student has more control over
that are engaged in higher education [10]. The existing learning possibilities, as well as the flexibility to select what
https://doi.org/10.5281/zenodo.5854482 24 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
to study and how learning is assessed, learning becomes more out in [52] has a long history and a strong empirical and
informal. As stated in [14] informal learning gives the learner theoretical foundation. Figure 5 illustrates the basics of social
the focal point of control. Laurillard [110] argues that there network.
is no instructor, no specified curriculum topic or concept, and
no external evaluation. The informal learner chooses their
own 'teacher,' who may or may not be a person; they
determine their curriculum, or what they wish to learn about,
and they choose whether to submit to external evaluation. If
informal learning experiences are beneficial, how can these
experiences be transferred from one context to another to
create "seamless learning” informal learning settings?
Furthermore, there is a growing understanding that formal and
informal learning have a pragmatic connection. While
students learn differently in school and out of school contexts,
learning may occur across boundaries, and what is acquired
outside of school can help shape what is taught in school [65].
What children learn in school, on the other hand, might
encourage them to learn outside of school [67]. Students'
informal learning has been demonstrated to be prompted by
their schoolwork in [58]. While learners will utilize the kinds
of learning that they have already mastered in formal settings,
in informal learning circumstances, they will also use Fig 5. Social network basic; Source: [28]
techniques that are not often used in schools identified as
“informal learning methods" [1] The nodes or actors in the network, as well as the connections
It appears there is a gap in how learners utilize technology in between them are the building elements of social networks.
formal and informal learning. In school, technology is utilized Students, instructors, informal learners in an online forum,
to accomplish curricular work in public areas in an organized, coworkers in a company, colleagues on a research team,
supervised, guided, and most individual way. Learners, on the industries or regions, and academic disciplines are all
other hand, use technology in chaotic, unsupervised ways at examples. Individuals, organizations, communities, and other
home and in other informal settings, socially and types of collectives can all be actors. However, there is little
cooperatively, to pursue interests in private places. Learners research using social network analysis to incorporate objects
have established habits and expectations of how electronic at this point and interpreting the social elements of networks
devices should be used in informal contexts, and because that contain mixed and/or inanimate items. Our current study
schools do not encourage these practices, it has resulted in focuses on person-to-person contact and the application of
what some observers have dubbed "digital dissonance" [108]. contemporary network theory to learning networks.
As a result, teachers and institutions are frightened of the Relations in the network refer to the relationships that exist
disruptive social potentials of the disputed technologies, and between actors. Actors may have one or more ties, which can
do not identify or comprehend the expanded repertory of range from impersonal to intimate, rare or regular, and
practices available to learners in their interaction with them. elective or mandatory. Actors are linked when they retain at
At the same time, most students are ignorant of these least one type of relationship. Such relationships might be
materials' broader educational potential. Leveraging in online weak when contacts are few, insignificant, or incidental, or
social networks could turn learning into a seamless aspect of strong when interactions are based on numerous types of
daily life to the point that it is no longer recognized as exchanges, reciprocity in the relationship, and self-disclosure.
learning challenge [56] The actors and the relationships that bind them together
constitute networks, which are patterns of connections
b) Online Social Network between members of a certain group of people, such as
Through interactions people establish networks of connections students in a class, project team members, or instructors in a
that allow them to access resources like jobs, information, and school. Networks can be drawn based on any relationship
materials, goods, and services. The concepts and cross- between individuals, such as by asking each member of a
disciplinary potential of network principles derived from group of people a broad question such as "who do you talk
graph theory are currently gaining significant attention across to?" Networks can also be created using more specific
fields, for example, in bringing together ideas small-world inquiries, such as "with whom do you discuss significant
structures from physics to bear on the social results embodied issues?" "Who have you worked with this week?" [115].
in the idea of "six degrees of separation" [27]. Thus, a more
cross-disciplinary approach that is becoming known as To investigate changing network dynamics, [51] proposed an
"network science” has been born. Our focus here is on integrated multi-method and temporal methodology. By
maintaining the social network viewpoint, which, as pointed integrating questions like "who talks to whom?" with "what
https://doi.org/10.5281/zenodo.5854482 25 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
are they talking about?" and "why are they talking the way How might these understandings help us to design
they do?" this technique seeks to provide a more for wider civic participation, increasingly
comprehensive view of the processes and behaviors involved sophisticated interactions, and accomplishments, and
in networked learning. Learners now have more choices over deal with potential dangers?
what, how, and with whom they learn in a wide range of Are existing social networking technologies and
settings: classrooms, after-school programs, home-school, attendant practices appropriated and/or re-envisioned
formal online learning, and so on. These changes impact and re-worked to produce improvements in areas of
constructs for learning, teaching, and future research [58]. educational priority such as educational attainment,
Increasing learners' educational attainment, science and math the development of science, math, and technology
learning, technological fluencies, communication skills, civic literacies, communication and twenty-first-century
engagement, and preparation for the twenty-first-century skills, and preparation for future work lives?
workplace are some of the most pressing issues facing
education today [9], [50]. Two insights related to these questions are generated from a
Learners prefer to use the online social network while they are review of the educational literature [58], from explorations of
not in school, during their free time, and among peers of all learners (ages 16-24) use of the social network sites MySpace
ages, ethnicities, and socioeconomic levels [74]. Essentially, and Facebook [67], [73], [58] and an ongoing investigation of
we provide some basic definitions. Formally, social network learners use of an open-source social networking application,
sites are collections of Web-based services that allow implemented within Facebook, and designed for informal
individuals to establish a public or semi-public profile inside science learning and civic action. At the end of the
the system's limits, to give a list of other users with whom investigation, it was found that learners would adapt the
they are connecting, and to monitor and roll over the list of spaces they frequent for their educational-related purposes, as
connections [30]. Hence, social network websites are online well as school-related activities. What is surprising is the
communication platforms for individuals who have common presence of these behaviors and beliefs even among most of
interests and activities [49]. Users may interact with one our students, a group understudied in the educational
another via several means on websites, including chat, technology literature and presumably experiencing more
messaging, and e-mail. Online social network software are barriers to (but potentially more to gain from) participating in
Internet-based programs that enable users to build and manage social network sites where such social media are typically
virtual social networks. blocked-in schools and public libraries [58].
In [2], a study of trends among non-profits, foundations, and Furthermore, where such informal sharing, peer validation and
socially responsible businesses was conducted. The result feedback, alumni support, and spontaneous help with school-
suggests that facilitation of human relationships and related tasks has typically occurred offline, pre-dating the
connections via social media has the potential to gather internet, these social processes, moved online into social
significant organizational advantages, such as weaving network sites, can now be archived and tracked with social
community; encouraging greater openness and transparency; graphing software. In theory, we should be able to begin to
accelerating information-sharing; accessing more diverse identify what learning resources exactly are moving through
perspectives; and mobilizing a workforce. There are also the network, to and from whom, and with what impacts over
disadvantages of using social media to facilitate relational time [119]. Moreover, educational designers might think
practices. These include the fact that "half-baked" ideas are about how some of the socio-technical features most utilized
made public, and those trying to manage workflows and in naturally occurring, learners social network sites, like
processes must deal with concerns about brand and message MySpace (e.g., multimedia identity-posting capabilities,
control, privacy concerns, dealing with information overload, frequent updating, and sharing of microcontent, social search,
and learning the language. range of technology options and linking users with content contributions, annotation, ranking,
leveraging the right social media for one’s purposes [2]. Some recommendation systems) could be incorporated into the
important questions are: personalized learning systems touted in the Educational
How should we think about these broader trends with Technology Plan of the institution.
thinking about learning, teaching, and the
incorporation of social media into education? To H. Empirical Study of Online Social
advance this conversation, it is good to synthesize Networks
what the educational research currently says about In everyday life, we make informal observations of the
learning and social network, the dominant form of people and things around us, and use these observations as
social media used by learners. The goal is to inform basis for making decisions [40]. In educational institutions for
educational leaders, apprehensive or cautiously example, a teacher might observe that his or her students seem
optimistic about learners’ media-using practices. bored and decide to switch to a livelier instructional activity.
What are learners' purposes and practices with social A study in [5] on informal learning networks in the
network sites, and are they doing anything of workplace and their impact on professional growth was done.
educational value? In this study, it was noted that most of the participants (school
leaders) in the study had limited knowledge of what
https://doi.org/10.5281/zenodo.5854482 26 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
instructors daily study entail. This implies the need for raising
awareness about the value of informal learning. Another study
in [3] also underscores the need for n facilitating informal
professional development networks and the need for creating
a framework on it. The study noted that informal
organizations support and activities are critical to effective
organizational transformation and innovation. An innovative
approach in [3] created the change mirror research technique
to identify informal networks and reflect their voices and
views of the company. Using social networks analysis (SNA)
the approach first raises awareness of the presence of the
informal networks. Second, utilizing group discussion
software, the technique elicits information about what the
networks are all about, and by combining the two stages it
significantly simplifies the understanding of change process in
companies.
https://doi.org/10.5281/zenodo.5854482 27 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
with the input from the research teams. Such findings suggest 2 D. Scearce, G. Kasper, and H. M. Grant, ‘Working wikily’,
that after identifying informal networks (Step 1), there may be Standford Social Innovation Review, vol. 8, no. 3, pp.
a desire to link the networks (Steps 2 and 3). The important 30–37, 2010.
characters in these networks may be seen as latent connections 3 T. H. Homan, Wolkenridders: over de binnenkant van
organisatieverandering. Open Universiteit Nederland, 2006.
[25], bridging the gap between the organization's presently 4 L. Hamilton, What Facebook users share: Lower grandes.
disconnected networks. The ability to link these spontaneous Time. 2009.
informal learning networks will improve knowledge sharing 5 M. De Laat and B. Schreurs, ‘Visualizing informal
and productive learning across the business. Despite believing professional development networks: Building a case for
in the potential of informal professional development learning analytics in the workplace’, American Behavioral
networks, the study team observed that the visualization Scientist, vol. 57, no. 10, pp. 1421–1438, 2013.
process and attempts to bring these networks closer together 6 D. Ifenthaler and J. Y.-K. Yau, ‘Utilising learning analytics
were time-consuming. They also discovered that local to support study success in higher education: a systematic
management at the participating schools misinterpreted their review’, Educational Technology Research and
Development, vol. 68, no. 4, pp. 1961–1990, 2020.
job as a member of the study team, as well as their 7 Y. Yang, Q. Wang, H. L. Woo, and C. L. Quek, ‘Using
motivations for doing so. They discovered that school leaders Facebook for teaching and learning: a review of the
struggled to grasp what informal networks are and how they literature’, International Journal of Continuing Engineering
support professional growth in discussions with local Education and Life Long Learning, vol. 21, no. 1, pp. 72–86,
management. 2011.
8 P. Mahajan, ‘Use of social networking in a linguistically and
culturally rich India’, The International Information &
III. CONCLUSION Library Review, vol. 41, no. 3, pp. 129–136, 2009.
9 O. L. S. BUREAU, ‘US department of Labor’, College
Enrollment and Work Activity of 2013 High School
This paper provided a comprehensive review of Learning Graduates, 2007.
Analytics (LA), Educational Data Mining (EDM) and Online 10 E. B. Kozleski, D. Gibson, and A. Hynds, ‘Transforming
Social Networks (OSN) and some interesting current best complex educational systems: Grounding systems issues in
practices. Imperatively, this kind of study goes a long way in equity and social justice’, Defining social justice leadership
informing education stakeholders on the significance of in a global context, pp. 263–286, 2012.
establishing a teaching and learning agenda that takes 11 R. Hammad and D. Ludlow, ‘Towards a smart learning
advantage of today’s educational relevant technologies to environment for smart city governance’, in Proceedings of
promote learning while also acknowledging the difficulties of the 9th international conference on utility and cloud
computing, 2016, pp. 185–190.
21st-century learning. From the extensive reviews, it appears
12 R. S. Baker and K. Yacef, ‘The state of educational data
that there is lack of research understanding in the challenges mining in 2009: A review and future visions’, Journal of
and utilization of data effectively for learning analytics, educational data mining, vol. 1, no. 1, pp. 3–17, 2009.
despite the massive educational data generated by high 13 J. A. Reyes, ‘The skinny on big data in education: Learning
institutions. Also due to the growing importance of LA, there analytics simplified’, TechTrends, vol. 59, no. 2, pp. 75–80,
appears to be a serious lack of academic research that explore 2015.
the application and impact of LA in high institution, especially 14 D. Laurillard, ‘The pedagogical challenges to collaborative
in the context of informal online social network learning. In technologies’, International Journal of Computer-Supported
addition, high institution managers seem not to understand the Collaborative Learning, vol. 4, no. 1, pp. 5–20, 2009.
15 K. Gibson, ‘The moral basis of stakeholder theory’, Journal
emerging trends of LA which could be useful in the running
of business ethics, pp. 245–257, 2000.
of higher education. Though LA is viewed as a complex and 16 R. L. Cross, R. L. Cross, and A. Parker, The hidden power of
expensive technology that will culturally change the future of social networks: Understanding how work really gets done
high institution, the question that comes to mind is whether in organizations. Harvard Business Press, 2004.
the use of LA in relation to informal learning in online social 17 C. Thille, E. Schneider, R. F. Kizilcec, C. Piech, S. A.
network is really what is expected? A study to analyze and Halawa, and D. K. Greene, The future of data-enriched
evaluate the elements that influence high usage of OSN is also assessment. Research & Practice in Assessment, 9 (2), 5–16.
needed in the African context. It is high time African 2014.
Universities paid attention to the application and use of these 18 A. G. Picciano, ‘The evolution of big data and learning
analytics in American higher education.’, Journal of
technologies to create a simplified learning approach
asynchronous learning networks, vol. 16, no. 3, pp. 9–20,
occasioned by the use of these technologies. 2012.
ACKNOWLEDGMENT 19 J. Wellings and M. H. Levine, ‘The digital promise:
Transforming learning with innovative uses of technology’,
The authors acknowledge all sources used in this paper. 2009.
21 L. Johnson, S. Adams, and M. Cummins, Technology
REFERENCES outlook for Australian tertiary education 2012-2017: An
1 J. Furlong and C. Davies, ‘Young people, new technologies NMC Horizon Report regional analysis. The New Media
and learning at home: Taking context seriously’, Oxford Consortium, 2012.
Review of Education, vol. 38, no. 1, pp. 45–62, 2012. 22 J. Dron and T. Anderson, Teaching crowds: Learning and
https://doi.org/10.5281/zenodo.5854482 28 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
social media. Athabasca University Press, 2014. Revue française de sociologie, vol. 44, no. 2, pp. 305–329,
23 S. Sergis and D. G. Sampson, ‘Teaching and learning 2003.
analytics to support teacher inquiry: A systematic literature 40 M. Patten, Questionnaire research: A practical guide.
review’, Learning analytics: Fundaments, applications, and Routledge, 2016.
trends, pp. 25–63, 2017. 41 M. Scheffel, H. Drachsler, S. Stoyanov, and M. Specht,
24 D. Ifenthaler and C. Schumacher, ‘Student perceptions of ‘Quality indicators for learning analytics’, Journal of
privacy principles for learning analytics’, Educational Educational Technology & Society, vol. 17, no. 4, pp.
Technology Research and Development, vol. 64, no. 5, pp. 117–132, 2014.
923–938, 2016. 42 J. Clarke and K. Nelson, ‘Perspectives on learning analytics:
25 C. Haythornthwaite, ‘Strong, weak, and latent ties and the issues and challenges. Observations from Shane Dawson
impact of new media’, The information society, vol. 18, no. and Phil Long’, The International Journal of the First Year
5, pp. 385–401, 2002. in Higher Education, vol. 4, no. 1, pp. 1–8, 2013.
26 H. Roreger and T. C. Schmidt, ‘Socialize online learning: 43 N. Dabbagh and A. Kitsantas, ‘Personal Learning
Why we should integrate learning content management with Environments, social media, and self-regulated learning: A
Online Social Networks’, in 2012 IEEE International natural formula for connecting formal and informal
Conference on Pervasive Computing and Communications learning’, The Internet and higher education, vol. 15, no. 1,
Workshops, 2012, pp. 685–690. pp. 3–8, 2012.
27 J. Bruggeman, Social networks: An introduction. Routledge, 44 G. Siemens and P. Long, ‘Penetrating the fog: Analytics in
2013. learning and education.’, EDUCAUSE review, vol. 46, no. 5,
28 C. Haythornthwaite and M. De Laat, ‘Social networks and p. 30, 2011.
learning networks: Using social network perspectives to 45 L. P. Macfadyen, ‘Overcoming barriers to educational
understand social learning’, in Proceedings of the 7th analytics: How systems thinking and pragmatism can help’,
international conference on networked learning, 2010, pp. Educational Technology, pp. 31–39, 2017.
183–190. 46 M. De Laat, V. Lally, L. Lipponen, and R.-J. Simons,
29 J. Williams, ‘Social networking applications in health care: ‘Online teaching in networked learning communities: A
threats to the privacy and security of health information’, in multi-method approach to studying the role of the teacher’,
Proceedings of the 2010 ICSE workshop on software Instructional Science, vol. 35, no. 3, pp. 257–286, 2007.
engineering in health care, 2010, pp. 39–49. 47 G. Veletsianos and C. Navarrete, ‘Online social networks as
30 D. M. Boyd and N. B. Ellison, ‘Social network sites: formal learning environments: Learner experiences and
Definition, history, and scholarship’, Journal of activities’, The International Review of Research in Open
computer mediated Communication, vol. 13, no. 1, pp. and Distributed Learning, vol. 13, no. 1, pp. 144–166, 2012.
210–230, 2007. 48 L. M. Miller and D. D. Prior, ‘Online social networks and
31 H. Tankovska, Social media-Statistics & Facts. Statista. friending behaviour: A self-determination theory
Com. https://www. statista. com/topics/1164/social- perspective’, in Proceedings of the Australia and New
networks, 2021. Last Accessed 2021/09/15 Zealand Marketing Academy Annual Conference,
32 S. B. Shum and R. Ferguson, ‘Social learning analytics’, Christchurch, New Zealand, 2010, pp. 1–9.
Journal of educational technology & society, vol. 15, no. 3, 49 C. Steinfield, N. B. Ellison, C. Lampe, and J. Vitak, ‘Online
pp. 3–26, 2012. social network sites and the concept of social capital’, in
33 S. Dawson, O. Poquet, C. Colvin, T. Rogers, A. Pardo, and Frontiers in new media research, Routledge, 2013, pp.
D. Gasevic, ‘Rethinking learning analytics adoption through 122–138.
complexity leadership theory’, in Proceedings of the 8th 50 M. Warschauer and T. Matuchniak, ‘New technology and
international conference on learning analytics and digital worlds: Analyzing evidence of equity in access, use,
knowledge, 2018, pp. 236–244. and outcomes’, Review of research in education, vol. 34, no.
34 D. W. Livingstone, ‘Researching expanded notions of 1, pp. 179–225, 2010.
learning and work and underemployment: Findings of the 51 M. De Laat, ‘Networked learning’, 2006.
first Canadian survey of informal learning practices’, 52 S. P. Borgatti, A. Mehra, D. J. Brass, and G. Labianca,
International Review of Education, vol. 46, no. 6, pp. ‘Network analysis in the social sciences’, science, vol. 323,
491–514, 2000. no. 5916, pp. 892–895, 2009.
35 J. Osborne and J. Dillon, Research on learning in informal 53 P. Blikstein and M. Worsley, ‘Multimodal learning analytics
contexts: Advancing the field? Taylor & Francis, 2007. and education data mining: Using computational
36 M. Rost, L. Barkhuus, H. Cramer, and B. Brown, technologies to measure complex learning tasks’, Journal of
‘Representation and communication: Challenges in Learning Analytics, vol. 3, no. 2, pp. 220–238, 2016.
interpreting large social media datasets’, in Proceedings of 54 S. Cetintas, L. Si, H. P. Aagard, K. Bowen, and M. Cordova-
the 2013 conference on Computer supported cooperative Sanchez, ‘Microblogging in a classroom: Classifying
work, 2013, pp. 357–362. students’ relevant and irrelevant questions in a
37 F. A. Hrabowski III and J. Suess, ‘Reclaiming the lead: microblogging-supported classroom’, IEEE Transactions on
higher education’s future and implications for technology’, Learning Technologies, vol. 4, no. 4, pp. 292–300, 2011.
UMBC Office of the Vice President of Information 55 A. Karpinski, ‘Media sensationalization of social science
Technology, 2010. research: Social networking insites’, Teachers College
38 D. Boud and P. Hager, ‘Re-thinking continuing professional Record, 2009.
development through changing metaphors and location in 56 L. Naismith, P. Lonsdale, G. Vavoula, and M. Sharples,
professional practices’, Studies in continuing education, vol. ‘Literature Review in Mobile. 5’, RESULTADOS
34, no. 1, pp. 17–30, 2012. Technologies and Learning, 2004.
39 E. Lazega, ‘Rationalité, discipline sociale et structure’, 57 J. Sefton-Green, ‘Literature review in informal learning with
https://doi.org/10.5281/zenodo.5854482 29 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
technology outside school’, 2004. Teaching and Learning through Educational Data Mining
58 C. Greenhow, B. Robelia, and J. E. Hughes, ‘Learning, and Learning Analytics: An Issue Brief.’, Office of
teaching, and scholarship in a digital age: Web 2.0 and Educational Technology, US Department of Education,
classroom research: What path should we take now?’, 2012.
Educational researcher, vol. 38, no. 4, pp. 246–259, 2009. 78 C. J. Atman et al., ‘Enabling engineering student success:
59 A. Merceron, P. Blikstein, and G. Siemens, ‘Learning The final report for the Center for the Advancement of
analytics: From big data to meaningful data’, Journal of Engineering Education’, San Rafael, CA: Morgan &
Learning Analytics, vol. 2, no. 3, pp. 4–8, 2015. Claypool Publishers, 2010.
60 N. Sclater, A. Peasgood, and J. Mullan, Learning analytics 79 L. C. Giles, G. F. Glonek, M. A. Luszcz, and G. R.
in higher education: A review of UK and international Andrews, ‘Effect of social networks on 10 year survival in
practice Full report, Educause 39 (2016). very old Australians: the Australian longitudinal study of
61 Z. K. Papamitsiou and A. A. Economides, ‘Learning aging’, Journal of Epidemiology & Community Health, vol.
analytics and educational data mining in practice: A 59, no. 7, pp. 574–579, 2005.
systematic literature review of empirical evidence.’, J. Educ. 80 P. J. Piety, D. T. Hickey, and M. J. Bishop, ‘Educational
Technol. Soc., vol. 17, no. 4, pp. 49–64, 2014. data sciences: Framing emergent practices for analytics of
62 G. Cormode and B. Krishnamurthy, ‘Key differences learning, organizations, and systems’, in Proceedings of the
between Web 1.0 and Web 2.0’, First Monday, 2008. fourth international conference on learning analytics and
63 N. Carr, ‘Is Google making us stupid: What the Internet is knowledge, 2014, pp. 193–202.
doing to our brains’, 2008. 81 B. Bakhshinategh, O. R. Zaiane, S. ElAtia, and D. Ipperciel,
64 S. Sergis, D. G. Sampson, and L. Pelliccione, ‘Investigating ‘Educational data mining applications and tasks: A survey of
the impact of Flipped Classroom on students’ learning the last 10 years’, Education and Information Technologies,
experiences: A Self-Determination Theory approach’, vol. 23, no. 1, pp. 537–553, 2018.
Computers in Human Behavior, vol. 78, pp. 368–378, 2018. 82 C. Romero and S. Ventura, ‘Educational data mining and
65 B. Barron, ‘Interest and self-sustained learning as catalysts learning analytics: An updated survey’, Wiley
of development: A learning ecology perspective’, Human Interdisciplinary Reviews: Data Mining and Knowledge
development, vol. 49, no. 4, pp. 193–224, 2006. Discovery, vol. 10, no. 3, p. e1355, 2020.
66 D. Ifenthaler, D. Gibson, and E. Dobozy, ‘Informing 83 R. Zhou, ‘Education web information retrieval and
learning design through analytics: Applying network graph classification with big data analysis’, Creative Education,
analysis’, Australasian Journal of Educational Technology, vol. 7, no. 18, p. 2868, 2016.
vol. 34, no. 2, 2018. 84 D. A. Erlandson, E. L. Harris, B. L. Skipper, and S. D.
67 C. Greenhow and B. Robelia, ‘Informal learning and identity Allen, Doing naturalistic inquiry: A guide to methods. Sage,
formation in online social networks’, Learning, media and 1993.
technology, vol. 34, no. 2, pp. 119–140, 2009. 85 R. F. Kizilcec and C. Brooks, ‘Diverse big data and
68 M. Callanan, C. Cervantes, and M. Loomis, ‘Informal randomized field experiments in massive open online
learning’, Wiley Interdisciplinary Reviews: Cognitive courses: Opportunities for advancing learning research’, G.
Science, vol. 2, no. 6, pp. 646–655, 2011. siemens & c. lang (eds.), handbook on learning analytics &
69 S. Kerka, ‘Incidental Learning. Trends and Issues Alert No. educational data mining, 2017.
18.’, 2000. 86 K.-W. Lai, ‘Digital technology and the culture of teaching
70 N. Kvartalnyi, Impact of big data on education: history, and learning in higher education’, Australasian Journal of
benefits and examples. 2020. Educational Technology, vol. 27, no. 8, 2011.
71 K.-W. Lai, ‘ICT supporting the learning process: The 87 D. Ifenthaler, Designing effective digital learning
premise, reality, and promise’, in International handbook of environments: toward learning analytics design. Springer,
information technology in primary and secondary education, 2017.
Springer, 2008, pp. 215–230. 88 R. centre Domo, ‘Data Never Sleeps 9.0’, Domo, 2021.
72 G. Siemens, ‘How data and analytics can improve education, https://www.domo.com/learn/infographic/data-never-sleeps-
July 2011’, Retrieved on August, vol. 8, 2011. 9 (accessed Oct. 19, 2021).
73 C. Greenhow and L. Burton, ‘Help from my “friends”: K. J. Cios, W. Pedrycz, R. W. Swiniarski, and L. A. Kurgan,
Social capital in the social network sites of low-income Data mining: a knowledge discovery approach. Springer
students’, Journal of Educational Computing Research, vol. Science & Business Media, 2007.
45, no. 2, pp. 223–245, 2011. 89 E. Wagner and P. Ice, ‘Data changes everything: Delivering
74 V. J. Rideout, U. G. Foehr, and D. F. Roberts, ‘Generation on the promise of learning analytics in higher education.’,
m 2: Media in the lives of 8-to 18-year-olds.’, Henry J. Educause Review, vol. 47, no. 4, p. 32, 2012.
Kaiser Family Foundation, 2010. 90 S. Dawson, D. Gašević, G. Siemens, and S. Joksimovic,
75 B. Czerkawski and J. N. Hernández, ‘Formal, non-formal, ‘Current state and future trends: A citation network analysis
and informal e-learning experiences with emerging of the learning analytics field’, in Proceedings of the fourth
technologies: a case study of a Graduate Educational international conference on learning analytics and
Technology Program’, in Cases on formal and informal e- knowledge, 2014, pp. 231–240.
learning environments: Opportunities and practices, IGI 91 D. R. Garrison, T. Anderson, and W. Archer, ‘Critical
Global, 2013, pp. 337–355. thinking, cognitive presence, and computer conferencing in
76 S. Kilis, Y. Gülbahar, and C. Rapp, ‘Exploration of teaching distance education’, American Journal of distance
preferences of instructors’ use of social media’, European education, vol. 15, no. 1, pp. 7–23, 2001.
Journal of Open, Distance and E-learning, vol. 19, no. 1, 92 J. Han, M. Kamber, and D. Mining, ‘Concepts and
2016. techniques’, Morgan Kaufmann, vol. 340, pp. 94104–3205,
77 M. Bienkowski, M. Feng, and B. Means, ‘Enhancing 2006.
https://doi.org/10.5281/zenodo.5854482 30 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854482 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
93 C. Shirky, Cognitive surplus: Creativity and generosity in a 113 A. Nouira, L. Cheniti Belcadhi, and R. Braham, ‘An
connected age. Penguin UK, 2010. ontology based framework of assessment analytics for
94 R. Besbes and S. Besbes, ‘Cognitive dashboard for teachers massive learning’, Computer Applications in Engineering
professional development’, in Qatar Foundation Annual Education, vol. 27, no. 6, pp. 1343–1360, 2019
Research Conference Proceedings Volume 2016 Issue 1, 114 Z.-H. Zhou, ‘Learnware: on the future of machine learning.’,
2016, vol. 2016, no. 1, p. ICTPP2984. Frontiers Comput. Sci., vol. 10, no. 4, pp. 589–590, 2016.
95 J. Voogt, O. Erstad, C. Dede, and P. Mishra, ‘Challenges to 115 R. S. Burt, ‘Network items and the general social survey’,
learning and schooling in the digital networked world of the Social networks, vol. 6, no. 4, pp. 293–339, 1984.
21st century’, Journal of computer assisted learning, vol. 116 F. Henri, ‘Computer conferencing and content analysis’, in
29, no. 5, pp. 403–413, 2013. Collaborative learning through computer conferencing,
96 H. Chen, R. H. Chiang, and V. C. Storey, ‘Business Springer, 1992, pp. 117–136.
intelligence and analytics: From big data to big impact’, MIS 117 A. I. Kiser and T. Porter, ‘Social networking: Integrating
quarterly, pp. 1165–1188, 2012. students and university professor utilization’, in Global
97 A. Hofstein and S. Rosenfeld, ‘Bridging the gap between Conference on Business and Finance Proceedings, 2011,
formal and informal science learning’, 1996. vol. 6, no. 6, pp. 191–196.
98 H. Eshach, ‘Bridging in-school and out-of-school learning: 118 S. ElAtia and D. Ipperciel, ‘Learning Analytics and
Formal, non-formal, and informal education’, Journal of Education Data Mining in Higher Education’, in Advancing
science education and technology, vol. 16, no. 2, pp. the Power of Learning Analytics and Big Data in Education,
171–190, 2007. IGI Global, 2021, pp. 108–126.
99 F. A. Hrabowski III, Boosting minorities in science. 119 D. Lazer et al., ‘Social science. Computational social
American Association for the Advancement of Science, science.’, Science (New York, NY), vol. 323, no. 5915, pp.
2011. 721–723, 2009.
100 K.-W. Lai, F. Khaddage, and G. Knezek, ‘Blending student
technology experiences in formal and informal learning’, 120 Okike, E. U., & Mogorosi, M. (n.d.). Educational Data
Journal of computer assisted learning, vol. 29, no. 5, pp. Mining for Monitoring and Improving Academic
414–425, 2013. Performance at University Levels. Environments, 4, 5.
101 A. McAfee, E. Brynjolfsson, T. H. Davenport, D. J. Patil,
and D. Barton, ‘Big data: the management revolution’,
Harvard business review, vol. 90, no. 10, pp. 60–68, 2012.
102 N. Khan et al., ‘Big data: survey, technologies,
opportunities, and challenges’, The scientific world journal,
vol. 2014, 2014.
103 M. Giacalone and S. Scippacercola, ‘BIG DATA: ISSUES
AND AN OVERVIEW IN SOME STRATEGIC
SECTORS.’, Journal of Applied Quantitative Methods, vol.
11, no. 3, 2016.
104 B. K. Daniel, ‘Big data in higher education: The big picture’,
in Big data and learning analytics in higher education,
Springer, 2017, pp. 19–28.
105 S. Erevelles, N. Fukawa, and L. Swayne, ‘Big Data
consumer analytics and the transformation of marketing’,
Journal of business research, vol. 69, no. 2, pp. 897–904,
2016.
106 A. BAGHA and V. Madisetti, Big Data Analytics: A Hands-
On Approach. USA: Arshdeep Bahga & Vijay Madisetti,
2019.
107 A. IBM, ‘Big data analytics’, IBM, 2021.
https://www.ibm.com/analytics/hadoop/big-data-analytics
(accessed Oct. 19, 2021).
108 W. Clark, K. Logan, R. Luckin, A. Mee, and M. Oliver,
‘Beyond Web 2.0: Mapping the technology landscapes of
young learners’, Journal of computer assisted learning, vol.
25, no. 1, pp. 56–69, 2009.
109 D. Clow, ‘An overview of learning analytics’, Teaching in
Higher Education, vol. 18, no. 6, pp. 683–695, 2013.
110 N. Rushby, ‘An agenda for mobile learning.’, British
Journal of Educational Technology, vol. 43, no. 3, pp.
355–356, 2012.
111 M. Clark et al., ‘Academic pathways study: Processes and
realities’, in 2008 Annual Conference & Exposition, 2008, p.
13.137. 1-13.137. 23.
112 J. P. Campbell, P. B. DeBlois, and D. G. Oblinger,
‘Academic analytics: A new tool for a new era’,
EDUCAUSE review, vol. 42, no. 4, p. 40, 2007.
https://doi.org/10.5281/zenodo.5854482 31 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854559 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Abstract—Future cars are anticipated to be driverless; (DL) methods and frameworks, have made possible the
point-to-point transportation services capable of avoiding development of such autonomous vehicles by many venture
fatalities. To achieve this goal, auto-manufacturers have been companies at the same time.
investing to realize the potential autonomous driving. In this
regard, we present a self-driving model car capable of
autonomous driving using object-detection as a primary means II. SOFTWARE DEVELOPMENT
of steering, on a track made of colored cones. This paper goes
through the process of fabricating a model vehicle, from its A. Data Collection & Labelling
embedded hardware platform, to the end-to-end ML pipeline Around 2,000 images were collected for two types of
necessary for automated data acquisition and model-training, coloured cones, namely: Orange and Blue. The cones were
thereby allowing a Deep Learning model to derive input from made from craft paper and were 4.5 centimetres tall with a
the hardware platform to control the car’s movements. This base diameter of 3cm. The pictures included the cones laid
guides the car autonomously and adapts well to real-time out as track, single colour cones, multiple same-coloured
tracks without manual feature-extraction. This paper presents cones and a mix of the two cones. A total of 16,382 cones
a Computer Vision model that learns from video data and were observed in the collected images with LabelImg being
involves Image Processing, Augmentation, Behavioral Cloning later used to label these cones from the images. ‘LabelImg’ is
and a Convolutional Neural Network model. The Darknet
a graphical image annotation tool [6]. It is written in Python
architecture is used to detect objects through a video segment
and convert it into a 3D navigable path. Finally, the paper
and uses Qt for its graphical interface. The LabelImg tool
touches upon the conclusion, results and scope of future was used to label the photographed images in the YOLO
improvement in the technique used. format by drawing bounding boxes around the cones and
naming each cone with their respective class i.e., colour
Keywords—autonomous, self-driving, computer vision, (orange or blue). After labelling via LabelImg, a common
YOLO, object detection, embedded hardware class file was created to all images which contained the two
classes “Orange” and “Blue”. Another file was created
I. INTRODUCTION unique to each image which contained the coordinates of
each cone present in that image. For example, 1 0.490809
A ‘Self-Driving Car’ is one that is able to sense its 0.647894 0.235628 0.342580 is an entry from the class file
immediate surroundings and operate independently without created where the first parameter determines the class of the
human intervention. The main motivation behind the topic at cones, the second and third parameters determine the
hand is the expeditious progress of applied Artificial midpoint of the bounding box while the fourth and fifth
Intelligence and the foreseeable significance of autonomous parameters determine the height and width of the bounding
driving ventures in the future of humanity, from independent box. For the randomization and renaming of the images, a
mobility for non-drivers to cheap transportation services to software tool called ‘Rename Expert’ was used. It
low-income individuals. The emergence of driverless cars randomized the images and then named them from 0-1681.
and their amalgamation with electric cars promises to help Data augmentation was used to increase the amount of data
minimize road fatalities, air and small-particle pollution, by adding slightly modified copies of already existing data. It
being able to better manage parking spaces, and free people involves injecting some noise, rotation and flipping of the
from the mundane and monotonous task of having to sit images to increase the number of images used for training. It
behind the wheel. Autonomous navigation holds quite a lot usually helps in preventing overfitting the model and acts as
of promise as it offers a range of applications going far a regularizer [7].
beyond a car driven autonomously. The main effort here is to
keep the humans out of the vehicle control loop and to B. Model Training
relieve them from the task of driving. The prime requisite of
self-driving vehicles are the visual sensors (for acquiring YOLOv4 Tiny, a version of YOLOv4 developed for edge
traffic insight of vehicle surroundings), microprocessors or and lower-power devices, is a real-time object detection
computers (for processing the sensor information and algorithm capable of detecting and providing bounding
transmitting vehicle control instructions) and actuators (to boxes for many different objects in a single image [8-11].
receive said instructions and be responsible for the The model achieves this by dividing an image into regions
longitudinal and lateral control of the car) [1-4]. Autonomous and then predicting bounding boxes in addition to the
vehicles are also expected to be manoeuvred in many of the probabilities for each region. Relative to inference speed,
most complex human planned endeavours, such as asteroid YOLOv4 outperforms other object detection models by a
mining [5]. The meteoric rise of AI along with deep learning significant margin. We needed a model that prioritizes real-
https://doi.org/10.5281/zenodo.5854559 32 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854559 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
C. Deployment
Deployment includes reading the coordinate text data
generated from the YOlO4 model into a NumPy framework
and labelling the coordinate points according to the two
classes, blue and orange. This is done by iterating through Fig. 1 Video capture and path mapping process
the text data line by line, and appending the required point
objects into a python array, and finally converting the array
III. HARDWARE DESIGN
into a NumPy format. Matplotlib is used to visualize the set
of data points from the camera’s perspective, on a 10 x 10 Before The car was designed and built with the proper
cm2 adjusted screen. Using the Scikit-Learn Library, a placement and positioning of electronic components, such as
Linear Regression model is trained using the NumPy data. the camera, in mind. It consists of three main parts, the
Two different models are to be trained; one for the blue set steering assembly, the spur gear gearbox and the wheels. The
of cones, and one for the orange. Using the steering system has a rack and pinion type design, chosen for
‘LinearRegression()’ predefined method in the Scikit-Learn its simple assembly and for providing easier and more
library, we could easily create a simple regression model compact control over the car. A 3-sided gear box ensures the
without having to build the entire code for the model effortless placement and positioning of the axles and larger
ourselves. The data is zipped and iterated through using a for gears. Given the opposing forces caused by the axles and
loop. The output generated is explicitly converted into a list front chassis, it also stays strong and sturdy. Spur gears are
format. Two lines are created that pass through the orange used in the gear box as they have high power transmission
cones and the blue cones. Again, a graph is plotted of efficiencies (95% to 99%) and are simple to design and
Matplotlib for visual aid of the lines. Next, the equations of install. The wheels are designed and entirely 3D printed to
the previously formed lines are derived using simple have built-in suspension providing additional steering
geometric calculations. Straight line equations of the type: ax stability. Because the wheels must be flexible, TPU
+ by + c = 0 are obtained for both blue and orange lines. (Thermoplastic Polyurethane) is used to produce them. All
Next, the point of intersection of the two lines is calculated other 3D printed components were produced using PLA
using the formula of point of intersection. The offset of this (Polylactic acid) as it’s easy to use, has a remarkably low
line is calculated from the centre of the screen and the x- printing temperature compared to other thermoplastics and
coordinate of each point is subtracted by the corresponding produces better surface details and sharper features. A list of
point on the centre of the screen. This value is the mean all materials is given below:
deviation and will be used further to calculate the angle by List Of Materials: All components required for the
which servo attached on the assembly is to be turned. Fig. 1 prototype, including sensors, actuators, power supply, and
shows the outcome of the entire video capture and path hardware, are listed here. Fig. 2 and Fig. 3 show all the 3D
mapping process. printed parts and their assembly in SoildWorks Simscape
respectively.
• 3D Printed Parts
• 608zz Bearings (4x)
• Nvidia Jetson Nano
• 1200KV Brushless DC Motor
• 20A ESC (Electronic Speed Controller)
• 5000mAh Power Bank
• 11.1V - 2200mAH (Lithium Polymer) LiPo
Rechargeable Battery
https://doi.org/10.5281/zenodo.5854559 33 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854559 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
IV. FUNCTIONALITY
A Nvidia Jetson Nano single-board computer (SBC)
serves as both the brain and the communication node in the
Fig. 6 Assembled Car
prototype control system. This SBC receives data from the
camera, analyses them, and integrates them into the
navigation system to determine the steering angle. A 11.1V - V. CONCLUSION
2200mAH LiPo battery is used solely to power the vehicle’s Through this paper, we present an approach for
propulsion system, that is, the 1200KV Brushless DC Motor designing and building a model self-driving car based on the
with a 20A ESC. A 180° rotation servo motor with a torque concept of Behavioural Cloning. This approach being an
of 1.2KgCm, controlled by the PCA9685 16 Channel Servo end-to-end one does not require any of the conventional tasks
Driver, is used to steer the car. Fig. 4 and Fig. 5 show a of feature extraction or connection of various modules,
flowchart of the instruction feedback loop and a schematic which are often monotonous, manual in nature and necessary
diagram of the hardware connections respectively. Fig. 6 for efficient working. Our model car is tried and tested in
shows the entire assembled car. real life against various standard models such as DenseNet-
201, Resnet-50, and VGG19 for the comparison and
performance. The final proposed model is a convolution-
based, ten 2D-Convolutional Layers, one Flat Layer and four
Dense Layers model. When compared with other Deep
Learning based models, our model seems to have
outperformed all of the aforementioned standard models by a
substantial margin. The work presented through this paper
can be realized to build vehicles capable of autonomous
https://doi.org/10.5281/zenodo.5854559 34 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854559 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
steering and driving. Additional training data of real-world [4] K. Kritayakirana and J. C. Gerdes, “Using the centre of percussion to
obstacles with different track situations and conditions may design a steering controller for an autonomous race car,” Vehicle
System Dynamics, vol. 50, no. sup1, pp. 33–51, 2012.
be required to increase the agility and robustness of the
[5] H. Fujiyoshi, T. Hirakawa, and T. Yamashita, “Deep learning-based
system. image recognition for autonomous driving,” IATSS Research.
Elsevier B.V., Dec. 2019, doi: 10.1016/j.iatssr.2019.11.008.
VI. FUTURE SCOPE [6] darrenl, (2015) LabelImg (Version Window_v1.8.0) [Source code].
https://github.com/tzutalin/labelImg
Through this project, we aimed to provide proof of [7] C. Nwankpa, W. Ijomah, A. Gachagan, and S. Marshall, “Activation
concept for self-driving cars that can solely rely on vision- Functions: Comparison of trends in Practice and Research for Deep
based object detection techniques for navigation, rather than Learning,” Nov. 2018.
the conventional feature extraction-based lane detection [8] S. Ren, K. He, R. Girshick, and J. Sun, “Faster R-CNN: Towards Real-
techniques. Results obtained on our model car made it clear Time Object Detection with Region Proposal Networks,” IEEE Trans.
that our approach towards object detection as a means of Pattern Anal. Mach. Intell., vol. 39, no. 6, pp. 1137–1149, Jun. 2017,
doi: 10.1109/TPAMI.2016.2577031.
steering has either outclassed or is at-par with humans in the
parameters being tested for. Reinforcement learning methods [9] R. Kulkarni, S. Dhavalikar, and S. Bangar, “Traffic Light Detection and
Recognition for Self Driving Cars Using Deep Learning,” Proc. -
can be introduced in addition to this method to better 2018 4th Int. Conf. Comput. Commun. Control Autom. ICCUBEA
performance. This method can be used as a prototype for 2018, pp. 1–4, 2019, doi: 10.1109/ICCUBEA.2018.8697819.
future citywide self-driving cars projects. It can also be used [10] A. K. Jain, “Working model of Self-driving car using Convolutional
exclusively, or in addition to conventional lane detection, to Neural Network, Raspberry Pi and Arduino,” in Proceedings of the
further improve on accuracy of self-driving cars. Via these 2nd International Conference on Electronics, Communication and
techniques, automobiles might truly serve as end-to-end Aerospace Technology, ICECA 2018, Sep. 2018, pp. 1630–1635, doi:
10.1109/ICECA.2018.8474620.
personal transportation devices and may give rise to an entire
[11] J. Kim, G. Lim, Y. Kim, B. Kim, and C. Bae, “Deep Learning
ecosystem of car-pooling or car sharing services as well as Algorithm using Virtual Environment Data for Self-driving Car,” in
numerous start-ups thereby making personal transport 1st International Conference on Artificial Intelligence in Information
cheaper, faster and safer. However, when implementing in and Communication, ICAIIC 2019, Mar. 2019, pp. 444–448, doi:
the real world, many more parameters might be introduced 10.1109/ICAIIC.2019.8669037.
which may increase the complexity of such a system while [12] Y. Kang, H. Yin, and C. Berger, “Test Your Self-Driving Algorithm:
affecting the performance of the car. An Overview of Publicly Available Driving Datasets and Virtual
Testing Environments,” IEEE Trans. Intell. Veh., vol. 4, no. 2, pp.
171–185, Mar. 2019, doi: 10.1109/tiv.2018.2886678.
REFERENCES [13] S. Shah, D. Dey, C. Lovett, and A. Kapoor, “AirSim: High-Fidelity
[1] F. Endres, J. Hess, J. Sturm, D. Cremers, and W. Burgard, “3-d Visual and Physical Simulation for Autonomous Vehicles,” 2018, pp.
mapping with an rgb-d camera,” IEEE Transactions on Robotics, vol. 621–635.
30, no. 1, pp. 177–187, 2014. [14] A. Dosovitskiy, G. Ros, F. Codevilla, A. Lopez, and V. Koltun,
[2] M. Tipping, M. Hatton, and R. Herbrich, “Racing line optimization,” in “CARLA: An Open Urban Driving Simulator,” Nov. 2017.
US Patent, March 2013. [15] B. Wymann, C. Dimitrakakis, A. Sumner, E. Espié, and C. Guionneau,
[3] L. Cardamone, D. Loiacono, P. Lanzi, and A. Bardelli, “Searching for “TORCS: The open racing car simulator,” 2015.
the optimal racing line using genetic algorithms,” in Computational
Intelligence and Games (CIG), August 2010.
https://doi.org/10.5281/zenodo.5854559 35 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854670 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Abstract— Mitigating peatland fires needs to be done because the content of peat soil by a multisensory system, then proceed
handling is more complex than ordinary land fires because of the with further data processing.
fire spread in the layers below its surface. One of the efforts is to
create an IoT-based data parameter of peat heat conduction Peatland fire mitigation efforts are carried out by
sending system that integrates with information systems using monitoring the main indicators of peat fire triggers, namely
web technology. Some conduction parameter data is generated by peat temperature below the surface and surface of the land,
a multisensory system delivered on IoT devices that use the groundwater content, air temperature, and surface air humidity,
raspberry pi as client-side. The data is transmitted to cloud and can be observed in real-time. This article is discussed one
hosting to be displayed in real-time on the Web as server-side. of the systems to deliver data parameters of peat soil heat
The interface software on both sides used PHP and MySql conduction based on IoT integrated with the information
scripts. This system can send 14 data on the conduction system on the website.
parameters of peat soil samples, consisting of seven sample
temperature points, one heater temperature, four sample water A. The Multisensor System
content points, air temperature, and surface air humidity of
samples. Then all these parameters are saved and displayed on In situ measurement of thermal properties of a northern
the Web in real-time. peatland had been done to make a temperature model with
dual-probe heat pulse sensors and triple-probe heat pulse
Keywords-component; delivery; IoT; mitigation; peatland fires; sensors [2]. This measurement gives the idea of making a
Raspberry Pi; multisensory system. It shown in Fig. 1 has been developed to
measure in situ several parameters of peat soil samples placed
I. INTRODUCTION in a chamber with a height of 0.5 m. The first parameter is peat
soil moisture content, consisting of 4 soil moisture sensors
Peat soil has good potential in agriculture, but several arranged vertically in the chamber[3]. Then the next parameter
obstacles cause low productivity. The characteristics of peat is the temperature of the peat soil, which is measured by eight
soils are very distinctive. Namely, they are easy to dry, do not sensors in total. Seven of which are used to measure the
turn over, and experience subsidence under aerobic conditions. temperature of 7 depth points of the peat soil sample arranged
Irreversible dry conditions make peat soil repel water on its vertically in the chamber and a temperature sensor to measure
surface, so water cannot enter the lower layer of peat[1]. the temperature of the heater placed at the bottom of the room.
The observation system that has been done only on In addition, the system is also equipped with measuring
vegetation above the surface using GIS (Geographic environmental conditions around the sample, which consists of
Information System) has not reached the peat layer below the air temperature and humidity. The explanation of code sensors
surface. To determine the temperature of peat when and chamber in Fig. 1 is written in Table 1.
approaching burning in the soil from the surface required the
value of peat heat conductance so that the characterization of B. Raspberry Pi
peat soil heat conductance is expected to provide data on the Raspberry Pi, shortened to RPi, is like a computer system
relationship between the heat temperature in the peat soil and with a complete I/O for computer support equipment, such as
the heat temperature at the peat soil surface. In the first stage in USB port, HDMI port, ethernet, wifi, and so on [4]. A very
determining the heat conduction of peat soil, it is necessary to useful feature of the RPi that strongly supports this research is
measure several parameters, including temperature and water General Purpose Input Output (GPIO). The GPIO supports
doing the interface with other equipment connected with RPi.
Identify applicable sponsor/s here. (sponsors)
https://doi.org/10.5281/zenodo.5854670 36 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854670 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
C. IoT
The Internet of Things (IoT) is a set of heterogeneous
connected devices that collaborate with the internet of services
via the global network infrastructure [9]. IoT Application
domains focus on nine domains: smart manufacturing or
industrial, smart transportation/mobility, smart grid/energy,
smart retail, smart cities, smart healthcare, smart supply chain,
smart agriculture, and smart building/home[10], and IoT
security issues emphasis on availability, authenticity,
confidentiality, integrity, non-repudiation, and privacy[9]. The
IoT applied here prefers smart agriculture, especially in disaster
(a) Hardware (b) Sensors and chamber
management.
Fig. 1 System multisensory
D. Information System based on Web
Table 1 SENSOR CODE Web-based technology is one of information and
communication technology applications. The development of
No. Code Sensor Type web technology is very fast, with both related devices and
1 St1 Heater temperature1 software-hardware devices associated with it.[11]
2 St2 Soil temperature2
3 St3 Soil temperature3 Web data framework, or web-based data framework,
4 St4 Soil temperature4 employs Web innovations to provide data and administrations
5 St5 Soil temperature5 to clients or other data systems/applications. It may be a code
6 St6 Soil temperature6
7 St7 Soil temperature7
whose fundamental reason is to distribute and keep up
8 St8 Soil temperature8 information by utilizing hypertext-based standards [12]. A web
9 Su9 Air temperature data system usually comprises one or more web applications,
10 Ku10 Air humidity particular functionality-oriented components, besides data
11 Kt11 Soil moisture 1 components and other non-web components. The web browser
12 Kt12 Soil moisture 2 is regularly utilized as front-end while the database is back-end.
13 Kt13 Soil moisture 3
14 Kt14 Soil moisture 4 The development of WBIS (web-based information system)
is required a server with services like Web Server, Database
Services, Messaging Services, Mailing Services, and
Collaboration Services [13].
https://doi.org/10.5281/zenodo.5854670 37 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854670 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
The IoT device is developed with RPi 3, module wireless Name is http://sensorkebakaranlahan.id/. It is hosted on Cloud
nRF24l01, and modem. It is shown in Fig. 4. Hosting by Rumahweb Indonesia. In general, an outline of how
this software works is presented in Fig. 6:
https://doi.org/10.5281/zenodo.5854670 38 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854670 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5854670 39 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854670 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5854670 40 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854670 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
V. CONCLUSION Berbasis Web,” J. Tek. Elektro dan Komput., vol. 7, no. 3, pp.
The delivery system parameter of heat conduction peat soil 331–338, 2018, doi: 10.35793/jtek.7.3.2018.23638.
based on IoT can work well. The system consists of two main [9] P. Pukkasenung, “Internet of Things ( IoT ): A Basic Concept
parts: IoT devices and web-based information systems. In its and Analysis Security Issues,” vol. 18, no. 11, pp. 1–10, 2020.
implementation, the system can run for approximately 8,500 [10] M. ichsan Kamil, R. Ardianto, and ig prasetya dwi Wibawa,
minutes without stopping, and data can be displayed and stored
“Prototipe Sistem Monitoring Dan Kontrol Lampu Rumah
on the server properly.
Berbasis Iot (Internet of Things),” e-Proceeding Eng., vol. 6,
no. 2, p. 2974, 2019.
ACKNOWLEDGMENT
[11] I. Soesanti, “Design and development of Web-Based
This work was supported by Lambung Mangkurat Information System for The Batik Industry,” IPTEK J. Proc.
University with a PNBP financing scheme on a PDWM
Ser., vol. 1, no. 1, pp. 2354–6026, Jul. 2015, doi:
number 009.80/UN8.2/PL/2021. We thank Yoga Pambudi for
10.12962/j23546026.y2014i1.388.
providing wireless communication with the nRF24l01 module;
we thank Satrio Yudha Prakoso for convenient access to the [12] K.-C. Kao, W.-H. Chieng, and S.-L. Jeng, “Design and
hosting Web. We thank Wahyu Ansari for the convenient development of an IoT-based web application for an intelligent
access interface GPIO Raspberry Pi. remote SCADA system,” IOP Conf. Ser. Mater. Sci. Eng., vol.
323, p. 012025, Mar. 2018, doi: 10.1088/1757-
REFERENCES 899X/323/1/012025.
[13] A. Oluwatofunmi, I. S., and I. A., “Web-based Information
[1] W. C. Adinugroho, I. N. N. Suryadiputra, B. H. Saharjo, and L. System (WBIS) Framework: Facilitating Interoperability within
Siboro, Panduan Pengendalian Hutan dan Lahan Gambut, I. Business Ventures,” Int. J. Comput. Appl., vol. 180, no. 26, pp.
Bogor: Wetlands International, 2004. 7–12, Mar. 2018, doi: 10.5120/ijca2018916595.
[2] N. Kettridge and A. Baird, “In situ measurements of the [14] Cybernetica, “Thonny,” 2018. https://thonny.org/ (accessed
thermal properties of a northern peatland: Implications for Dec. 18, 2021).
peatland temperature models,” J. Geophys. Res., vol. 112, no. [15] S. HYMEL, “Python Programming Tutorial: Getting Started
F2, p. F02019, May 2007, doi: 10.1029/2006JF000655. with the Raspberry Pi,” [Online]. Available:
[3] A. A. Harnawan, N. S. Mulyana, I. Ridwan, and M. I. Mazdadi, https://learn.sparkfun.com/tutorials/python-programming-
“Rancang bangun sistem multisensor pengukur kelembaban tutorial-getting-started-with-the-raspberry-pi/hello-
tanah gambut berdasar variasi kedalaman sebagai upaya world#:~:text=Start Thonny by clicking on,in the bottom
mitigasi kebakaran lahan,” in Seminar Nasional Lingkungan interpreter pane.
Lahan Basah, 2021, vol. 6, no. 2. [16] T. P. Group, “PHP.” https://www.php.net/ (accessed Dec. 18,
[4] M. Schmidt, Raspberry Pi, A quick-start guide. The Pragmatic 2021).
Programmers, LLC., 2012. [17] EllisLab, “CodeIgniter User Guide,” 2019.
[5] T. R. P. Foundation, “Raspberry Pi 3 Model B+.” https://www.codeigniter.com/userguide3/index.html (accessed
https://www.raspberrypi.com/products/raspberry-pi-3-model-b- Oct. 21, 2020).
plus/ (accessed Dec. 11, 2021). [18] A. Orestis, A. Dimitrios, and C. Ioannis, “Towards integrating
[6] V. V, V. S. R. R, A. K. P, and P. kumar S, “Internet of IoT devices with the Web,” in Proceedings of 2012 IEEE 17th
Things(IoT) Based Multilevel Drunken Driving Detection and International Conference on Emerging Technologies & Factory
Prevention System Using Raspberry Pi 3,” CoRR, vol. 18, no. Automation (ETFA 2012), Sep. 2012, pp. 1–4, doi:
3, pp. 131–137, 2020, doi: 10.31227/osf.io/bycjn. 10.1109/ETFA.2012.6489729.
[7] M. E. E. Ezema, Francis .A. Okoye, Anthony .O. Okwori, and [19] I. P. Sudharma Yoga, G. Sukadarmika, and . L., “Dynamic
Christopher . C., “The Sharp Increase in Unmasking of Bandwidth Allocation for Internet of Things System Using
Obtrusion into Internet of Things (IoT) IPV6 and IPV6 Low – Elastic Wireless Local Area Network,” J. Rekayasa Elektr., vol.
power Wireless Personal Area Network (6LoWPAN), a Lead 17, no. 3, Sep. 2021, doi: 10.17529/jre.v17i3.21087.
Way to Secure Internet of Things Services,” Int. J. Comput. Sci. [20] C.-Y. Chen, M. Hasan, and S. Mohan, “Securing Real-Time
Inf. Secur., vol. 16, no. 3, pp. 161–167, 2018. Internet-of-Things,” Sensors, vol. 18, no. 12, p. 4356, Dec.
[8] F. Y. Q. Ontowirjo, V. C. Poekoel, P. D. K. Manembu, and R. 2018, doi: 10.3390/s18124356.
F. Robot, “Implementasi Internet of Things Pada Sistem
Monitoring Suhu dan Kelembaban Pada Ruangan Pengering
https://doi.org/10.5281/zenodo.5854670 41 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5854691 42 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
and security were a challenging task. Second, it has been described that miner may want to create sales above
their fair share through a self-centred mining method. Miners cover their mined blocks to get more sales within
the destination. In this way, the branches must be regularly closed, which makes blockchain development
difficult. Therefore, should recommend some answers to solve this problem.
BLOCKCHAIN ARCHITECTURE
We customize a genetic algorithm to determine the file block replica situation problem among various
users and data centres in the distributed cloud storage conditions.
II. REVIEW OF LITERATURE
Cloud storage is a network generation method for sharing assets with associated IT skills, critical for business or
personal users. In particular, traditional cloud storage protection strategies include knowledge about log
encryption, access management, and many more. Recently, Software-Defined Storage (SDS) integrated several
cloud storage services that are dispensed to address the issue that a separate cloud cannot meet user needs.
Nguyen et al. [2020] Blockchain technology has become what is moving the world through a hurricane, and
Blockchain emerged as a disruptive technology for the subsequent generation of various commercial software.
In this paper, a new model for integrating Blockchain and Cloud of Things, known as BCoT, is widely emerging
as a promising enabler for various public service situations. This article provided an up-to-date overview of
BCoT integration to give regular readers an overview of BCoT in many aspects: experience, motivation, and
embedded architecture. They also provided an in-depth survey of BCoT packages across different use case
areas: smart healthcare, smart cities, smart transportation, and smart industry.
https://doi.org/10.5281/zenodo.5854691 43 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
WissamZaki et al. [2020] Cloud computing has become a completely useful generation in our daily existence;
this computing uses the internet to provide software and transmit and keep facts. It becomes necessary to
provide an environment that protects applications and records inside this cloud; networks should be protocols.
That used powerful algorithms to protect it. This article mentioned some of them, and compared to others,
factual security and encryption became among the most important discoveries. Although improved in the days
of wine completely separately, this fact confirmed a close connection between them.
Mohamed MounirMoussa et al.[2020] It was looked at the implementation and organization techniques
associated with dew computing, where processing was added even towards the user compared to the different
IoT computing paradigms. This document aims to assess IoT threats and the use of deep field technology to
counter cyber anomalies and then validate them by analyzing their metrics. They evaluated the state of the
variable stats between the cloud and the relevant vehicle-embedded dew stop devices. They used a modified
version of Stacked Autoencoder that improved detection accuracy for specific attacks, using school information
loss as a threshold.
Aditi Patel et al. [2020] An emerging era has been suggested offering computer services along with online
business software and online data storage. Deployed cloud enables an unauthorized operating environment
where business expenses are reduced, data is provided, real security, etc. As many companies embrace cloud
computing, attackers exploit the cloud to achieve unauthorized manipulation of valuable records stored in it. The
evolution from traditional computing to the cloud has brought many security challenges for every customer and
vendor. Online cloud service providers have made various offers using various technologies, which generate
distinct security threats.
Chengpeng Xia et al. [2018] An incentive is provided to encourage nearby servers to serve cellular clients for
the mobile blockchain software. They formulated the problem as a useful and useful resource allocation
problem, then proposed a public sale of three levels of beneficial implementation of resource allocation tailored
to the cellular blockchain, and brought in a specific purchasing mechanism to encourage customers
smartphones. It also showed that his auction scheme turned out to be honest, personal sanity and athletic
performance. The proposed scheme was compared with the mechanisms of TACD and HAF, and the simulation
results showed that appropriate social status with the help of its scheme was better than the mechanisms of
TACD and HAF.
Aydogan et al. [2017] Mobile attack techniques can be categorized as primarily software-based attacks and
frequency-based attacks. Utility-based assaults have been radically reviewed in the literature. However,
frequency-based attacks on mobile phones have not been thoroughly tested. This panel experimentally attacks
an Android cell phone using a radio circuit based primarily on a simple application. They have developed a
"Mobile Hack Master Builder" to control your Android smartphone remotely. SMS information and photos may
be received within the cell phone using this device. On the contrary, after going out for a walk with a cellular
smartphone application, it can control the virtual camera of the mobile phones to take pictures and download
them to the chassis of our laptop.
Jiaxing et al. [2017] suggested Blockchain-based security architecture for distributed cloud storage. With the
improvement of the ICT industry, the number of events produced has grown exponentially, which has increased
the demand for storage capacity. Due to the limited garage capacity of customer terminals, more and more
software prefers to upload statistics to cloud platforms. However, it is known that you cannot forget about
security in current cloud garage architectures. Driven by the growing popularity of the emerging blockchain age,
they have proposed Blockchain-based security architecture for out-of-pocket cloud storage.
Garay et al. [2017] presented the first formal analysis of the functionality of (re)calculating the Bitcoin target in
a crypto site, that is, against all potential adversaries who seek to subvert the properties of the protocol. They
extend the q-delimited synchronous model of the Bitcoin Pillar Protocol (Eurocrypt 2015), which rolls out the
simple houses of Bitcoin's underlying Blockchain data structure and demonstrates how a robust public
transaction ledger can be built at its peak to environments that can enter or suspend matches each round.
III. TYPES OF CYBER ATTACKS IN CLOUD CRYPTOGRAPHY
Cyber attacks in cloud computing tend to generate most of the vulnerabilities found in the cloud's core structural
additions. These weaknesses and vulnerabilities have attracted hobbies from various attack profiles ranging
from children of scripts to APT. Several cyberattacks are seen in many cloud environments that exploit
vulnerabilities in cloud extensions or misconfigurations based on the design sample. All of these attacks violate
at least one of the principles of the CIA's Trinity. Most attacks are directed at cloud components within a
particular layer or across different layers. Therefore, the attacks considered from now on represent both multi-
https://doi.org/10.5281/zenodo.5854691 44 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
stage attacks within a layer and between layers. Bye, they use some form of pivot nodes to boost the attack. The
intent of a specific attack is different from the alternative.
There are various cyber-attacks involved in cloud cryptographylisted below
1. Hyperjacking
2. Honest but Curious Server
3. Link Aggregation Attack (DoS type attack)
4. Side Channel Attack
5. VM Migration Attack:
6. VM Escape Attack
7. MITC Attack
8. XML - HTTP DOS
https://doi.org/10.5281/zenodo.5854691 45 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
When converted into a base currency for an individual, the cost of cryptocurrencies will vary significantly, even
during the day.
g) Unregulated and unbacked
Cryptocurrency is a private sector build with no approved supervision or regulation. This approach is that
cryptocurrencies are widely open to being exploited by criminals to deceive unsuspecting investors. A 2019
educational study found that 25% of bitcoin customers are concerned about illegal interests, and 46% of bitcoin
transactions are related to illegal activities.
V. PROPOSED METHODOLOGY
Proof of Authority (PoA) consensus algorithm
Proof of Authority (PoA) is a type of consensus algorithm primarily based on the popularity of affiliate parties
in a blockchain network. It is a completely new consensus algorithm organization that offers high performance
and fault tolerance. In PoA, the advantages of creating new blocks are given to nodes that have proven their
authority. A node must provide pre-authentication to gain this authority and sufficient authentication to create
new blocks.
PoA is a set of rules for consensus within the blockchain that proposes a robust and effective answer to the
privacy of facts in blockchain networks. The PoA algorithm uses the value of identities to enforce security by
personally validating nodes set to be trusted. The Proof of Authority set of rules relies on various block
validators, making it a remarkably scalable device. Blocks and transactions are viewed with the help of pre-
approved peers who act as device admins. The proof of authority model allows organizations to maintain their
privacy while taking advantage of blockchain technology. Microsoft Azure is an instance in which PoA is
implemented. The Azure platform offers answers to non-public blockchain networks without the local currency
“fuel” of ether, as there is no need for mining. Smart contracts are pieces of software or code on the blockchain
managed by a P2P network of computer systems. Smart contracts are human rights monitoring teams that
provide a framework for coordinating and enforcing agreements between individuals in a community without
the need for traditional criminal contracts. They can be used to implement simple agreements between parties,
company bylaws, or to create tokens. In the context of a blockchain, smart contracts are a public, private
boundary built into the blockchain, which can receive or execute transactions as multiple parameters
(transactions can be rejected or require unique arguments for a function), which can act as an immutable
element. The purpose of smart contracts is to act like a “computerized transaction protocol that implements the
agreement's provisions”.
The PoA protocol is that there is a decentralized network of cryptocurrencies whose security mainly depends on
a combination of Proof of Work and Proof of Stake. In terms of fashion, fully Proof of Work-based protocols
provide decision-making power to entities that perform computational responsibilities, even as fully Proof-of-
stake-based protocols provide decision-making power to entities that maintain participation in the device.
PoA algorithms are based on a set of N trusted nodes called governance. Each authority is diagnosed with the
help of unique identification, and most of them are considered to be honest, particularly at least N = 2 + 1.
Authorities come to a consensus to order outgoing transactions through customers. The consensus on activity
program algorithms is based on the mining rotation scheme, a widely used approach to equitably allocating
responsibility for the emergence of blocks between authorities. The time is divided into steps, each of which has
an expert chosen to be the mining leader.
It is an eco-friendly mechanism for personal blockchains and was developed with the help of Ethereum co-
founder and former CTO Gavin Wood in 2017. The PoA consensus algorithm is primarily based on the cost of
identities within the community and various devices; Auditors are not betting on assets but their identities and
reputation. Therefore, PoA Blockchain networks are protected by validation nodes that can be arbitrarily
selected as honest events.
The Proof of Authority model runs on a powerful and fast set of block validation tools, making it an easily
scalable blockchain device because transactions are verified with the help of already accepted community
contributors. The PoA consensus rule set can be used in packets that include delivery chains or exchange
networks because the actual identities of the nodes are considered trusted.
PoA consensus algorithm
Step 1: Each miner uses her hash power to try to generate an empty block header.
https://doi.org/10.5281/zenodo.5854691 46 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Step 2: When a miner succeeds in generating an empty block header, meaning that the hash of her block header
data is smaller than the current difficulty target.
Step 3: All the network nodes regard the hash of this block header as data that deterministically derives N
pseudorandom stakeholders.
Step 4: Every stakeholder who is online checks whether the empty block header that the miner broadcasted is
valid, meaning that it contains the hash of the previous block and meets the current difficulty.
Step 5: The Nth stakeholder broadcasts the wrapped block to the network, and when the other nodes see that this
wrapped block is valid according to the above, they consider it a legitimate extension of the blockchain.
Step 6: The fees from the transactions that the Nth stake holder collected are shared between the miner and the N
lucky stakeholders.
PoA mechanism makes it possible to defend against this attack because network nodes are pre-authenticated,
block generation rights can be granted only to nodes that can withstand DoS attacks.
Use of Cryptography in Blockchain
Blockchain uses types of encryption algorithms, asymmetric key algorithms, and hash functions. The hash
functions are used to provide the ability to view one blockchain per player, and Blockchains generally use the
SHA-256 hash rule set as the hash function.
Basic architecture for Cryptocurrency:
Fig.4 Identifying the cyber attacks on block chain intrusion for previous RNN method
https://doi.org/10.5281/zenodo.5854691 47 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
Fig.4 indicates the data set with the features for identifying the cyber-attacks on block chain intrusion.
Fig.6 label encoder which works on encoding the classified label for the process of intrusion
https://doi.org/10.5281/zenodo.5854691 48 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
https://doi.org/10.5281/zenodo.5854691 International Journal of Computer Science and Information Security (IJCSIS),
Vol. 19, No. 12, December 2021
https://doi.org/10.5281/zenodo.5854691 49 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Assist. Prof, Kanwalvir Singh Dhindsa, B.B.S.B.Engg.College, Fatehgarh Sahib (Punjab), India
Dr. Jamal Ahmad Dargham, School of Engineering and Information Technology, Universiti Malaysia Sabah
Mr. Nitin Bhatia, DAV College, India
Dr. Dhavachelvan Ponnurangam, Pondicherry Central University, India
Dr. Mohd Faizal Abdollah, University of Technical Malaysia, Malaysia
Assist. Prof. Sonal Chawla, Panjab University, India
Dr. Abdul Wahid, AKG Engg. College, Ghaziabad, India
Mr. Arash Habibi Lashkari, University of Malaya (UM), Malaysia
Mr. Md. Rajibul Islam, Ibnu Sina Institute, University Technology Malaysia
Professor Dr. Sabu M. Thampi, .B.S Institute of Technology for Women, Kerala University, India
Mr. Noor Muhammed Nayeem, Université Lumière Lyon 2, 69007 Lyon, France
Dr. Himanshu Aggarwal, Department of Computer Engineering, Punjabi University, India
Prof R. Naidoo, Dept of Mathematics/Center for Advanced Computer Modelling, Durban University of Technology,
Durban,South Africa
Prof. Mydhili K Nair, Visweswaraiah Technological University, Bangalore, India
M. Prabu, Adhiyamaan College of Engineering/Anna University, India
Mr. Swakkhar Shatabda, United International University, Bangladesh
Dr. Abdur Rashid Khan, ICIT, Gomal University, Dera Ismail Khan, Pakistan
Mr. H. Abdul Shabeer, I-Nautix Technologies,Chennai, India
Dr. M. Aramudhan, Perunthalaivar Kamarajar Institute of Engineering and Technology, India
Dr. M. P. Thapliyal, Department of Computer Science, HNB Garhwal University (Central University), India
Dr. Shahaboddin Shamshirband, Islamic Azad University, Iran
Mr. Zeashan Hameed Khan, Université de Grenoble, France
Prof. Anil K Ahlawat, Ajay Kumar Garg Engineering College, Ghaziabad, UP Technical University, Lucknow
Mr. Longe Olumide Babatope, University Of Ibadan, Nigeria
Associate Prof. Raman Maini, University College of Engineering, Punjabi University, India
Dr. Maslin Masrom, University Technology Malaysia, Malaysia
Sudipta Chattopadhyay, Jadavpur University, Kolkata, India
Dr. Dang Tuan NGUYEN, University of Information Technology, Vietnam National University - Ho Chi Minh City
Dr. Mary Lourde R., BITS-PILANI Dubai , UAE
Dr. Abdul Aziz, University of Central Punjab, Pakistan
Mr. Karan Singh, Gautam Budtha University, India
Mr. Avinash Pokhriyal, Uttar Pradesh Technical University, Lucknow, India
Associate Prof Dr Zuraini Ismail, University Technology Malaysia, Malaysia
Assistant Prof. Yasser M. Alginahi, Taibah University, Madinah Munawwarrah, KSA
Mr. Dakshina Ranjan Kisku, West Bengal University of Technology, India
Mr. Raman Kumar, Dr B R Ambedkar National Institute of Technology, Jalandhar, Punjab, India
Associate Prof. Samir B. Patel, Institute of Technology, Nirma University, India
Dr. M.Munir Ahamed Rabbani, B. S. Abdur Rahman University, India
Asst. Prof. Koushik Majumder, West Bengal University of Technology, India
Dr. Alex Pappachen James, Queensland Micro-nanotechnology center, Griffith University, Australia
Assistant Prof. S. Hariharan, B.S. Abdur Rahman University, India
Asst Prof. Jasmine. K. S, R.V.College of Engineering, India
Mr Naushad Ali Mamode Khan, Ministry of Education and Human Resources, Mauritius
Prof. Mahesh Goyani, G H Patel Collge of Engg. & Tech, V.V.N, Anand, Gujarat, India
Dr. Mana Mohammed, University of Tlemcen, Algeria
Prof. Jatinder Singh, Universal Institutiion of Engg. & Tech. CHD, India
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Mrs. M. Anandhavalli Gauthaman, Sikkim Manipal Institute of Technology, Majitar, East Sikkim
Dr. Bin Guo, Institute Telecom SudParis, France
Mrs. Maleika Mehr Nigar Mohamed Heenaye-Mamode Khan, University of Mauritius
Prof. Pijush Biswas, RCC Institute of Information Technology, India
Mr. V. Bala Dhandayuthapani, Mekelle University, Ethiopia
Dr. Irfan Syamsuddin, State Polytechnic of Ujung Pandang, Indonesia
Mr. Kavi Kumar Khedo, University of Mauritius, Mauritius
Mr. Ravi Chandiran, Zagro Singapore Pte Ltd. Singapore
Mr. Milindkumar V. Sarode, Jawaharlal Darda Institute of Engineering and Technology, India
Dr. Shamimul Qamar, KSJ Institute of Engineering & Technology, India
Dr. C. Arun, Anna University, India
Assist. Prof. M.N.Birje, Basaveshwar Engineering College, India
Prof. Hamid Reza Naji, Department of Computer Enigneering, Shahid Beheshti University, Tehran, Iran
Assist. Prof. Debasis Giri, Department of Computer Science and Engineering, Haldia Institute of Technology
Subhabrata Barman, Haldia Institute of Technology, West Bengal
Mr. M. I. Lali, COMSATS Institute of Information Technology, Islamabad, Pakistan
Dr. Feroz Khan, Central Institute of Medicinal and Aromatic Plants, Lucknow, India
Mr. R. Nagendran, Institute of Technology, Coimbatore, Tamilnadu, India
Mr. Amnach Khawne, King Mongkut’s Institute of Technology Ladkrabang, Ladkrabang, Bangkok, Thailand
Dr. P. Chakrabarti, Sir Padampat Singhania University, Udaipur, India
Mr. Nafiz Imtiaz Bin Hamid, Islamic University of Technology (IUT), Bangladesh.
Shahab-A. Shamshirband, Islamic Azad University, Chalous, Iran
Prof. B. Priestly Shan, Anna Univeristy, Tamilnadu, India
Venkatramreddy Velma, Dept. of Bioinformatics, University of Mississippi Medical Center, Jackson MS USA
Akshi Kumar, Dept. of Computer Engineering, Delhi Technological University, India
Dr. Umesh Kumar Singh, Vikram University, Ujjain, India
Mr. Serguei A. Mokhov, Concordia University, Canada
Mr. Lai Khin Wee, Universiti Teknologi Malaysia, Malaysia
Dr. Awadhesh Kumar Sharma, Madan Mohan Malviya Engineering College, India
Mr. Syed R. Rizvi, Analytical Services & Materials, Inc., USA
Dr. S. Karthik, SNS Collegeof Technology, India
Mr. Syed Qasim Bukhari, CIMET (Universidad de Granada), Spain
Mr. A.D.Potgantwar, Pune University, India
Dr. Himanshu Aggarwal, Punjabi University, India
Mr. Rajesh Ramachandran, Naipunya Institute of Management and Information Technology, India
Dr. K.L. Shunmuganathan, R.M.K Engg College , Kavaraipettai ,Chennai
Dr. Prasant Kumar Pattnaik, KIST, India.
Dr. Ch. Aswani Kumar, VIT University, India
Mr. Ijaz Ali Shoukat, King Saud University, Riyadh KSA
Mr. Arun Kumar, Sir Padam Pat Singhania University, Udaipur, Rajasthan
Mr. Muhammad Imran Khan, Universiti Teknologi PETRONAS, Malaysia
Dr. Natarajan Meghanathan, Jackson State University, Jackson, MS, USA
Mr. Mohd Zaki Bin Mas'ud, Universiti Teknikal Malaysia Melaka (UTeM), Malaysia
Prof. Dr. R. Geetharamani, Dept. of Computer Science and Eng., Rajalakshmi Engineering College, India
Dr. Smita Rajpal, Institute of Technology and Management, Gurgaon, India
Dr. S. Abdul Khader Jilani, University of Tabuk, Tabuk, Saudi Arabia
Mr. Syed Jamal Haider Zaidi, Bahria University, Pakistan
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Assist. Prof. Nisheeth Joshi, Apaji Institute, Banasthali University, Rajasthan, India
Associate Prof. Kunwar S. Vaisla, VCT Kumaon Engineering College, India
Prof Anupam Choudhary, Bhilai School Of Engg.,Bhilai (C.G.),India
Mr. Divya Prakash Shrivastava, Al Jabal Al garbi University, Zawya, Libya
Associate Prof. Dr. V. Radha, Avinashilingam Deemed university for women, Coimbatore.
Dr. Kasarapu Ramani, JNT University, Anantapur, India
Dr. Anuraag Awasthi, Jayoti Vidyapeeth Womens University, India
Dr. C G Ravichandran, R V S College of Engineering and Technology, India
Dr. Mohamed A. Deriche, King Fahd University of Petroleum and Minerals, Saudi Arabia
Mr. Abbas Karimi, Universiti Putra Malaysia, Malaysia
Mr. Amit Kumar, Jaypee University of Engg. and Tech., India
Dr. Nikolai Stoianov, Defense Institute, Bulgaria
Assist. Prof. S. Ranichandra, KSR College of Arts and Science, Tiruchencode
Mr. T.K.P. Rajagopal, Diamond Horse International Pvt Ltd, India
Dr. Md. Ekramul Hamid, Rajshahi University, Bangladesh
Mr. Hemanta Kumar Kalita , TATA Consultancy Services (TCS), India
Dr. Messaouda Azzouzi, Ziane Achour University of Djelfa, Algeria
Prof. (Dr.) Juan Jose Martinez Castillo, "Gran Mariscal de Ayacucho" University and Acantelys research Group,
Venezuela
Dr. Jatinderkumar R. Saini, Narmada College of Computer Application, India
Dr. Babak Bashari Rad, University Technology of Malaysia, Malaysia
Dr. Nighat Mir, Effat University, Saudi Arabia
Prof. (Dr.) G.M.Nasira, Sasurie College of Engineering, India
Mr. Varun Mittal, Gemalto Pte Ltd, Singapore
Assist. Prof. Mrs P. Banumathi, Kathir College Of Engineering, Coimbatore
Assist. Prof. Quan Yuan, University of Wisconsin-Stevens Point, US
Dr. Pranam Paul, Narula Institute of Technology, Agarpara, West Bengal, India
Assist. Prof. J. Ramkumar, V.L.B Janakiammal college of Arts & Science, India
Mr. P. Sivakumar, Anna university, Chennai, India
Mr. Md. Humayun Kabir Biswas, King Khalid University, Kingdom of Saudi Arabia
Mr. Mayank Singh, J.P. Institute of Engg & Technology, Meerut, India
HJ. Kamaruzaman Jusoff, Universiti Putra Malaysia
Mr. Nikhil Patrick Lobo, CADES, India
Dr. Amit Wason, Rayat-Bahra Institute of Engineering & Boi-Technology, India
Dr. Rajesh Shrivastava, Govt. Benazir Science & Commerce College, Bhopal, India
Assist. Prof. Vishal Bharti, DCE, Gurgaon
Mrs. Sunita Bansal, Birla Institute of Technology & Science, India
Dr. R. Sudhakar, Dr.Mahalingam college of Engineering and Technology, India
Dr. Amit Kumar Garg, Shri Mata Vaishno Devi University, Katra(J&K), India
Assist. Prof. Raj Gaurang Tiwari, AZAD Institute of Engineering and Technology, India
Mr. Hamed Taherdoost, Tehran, Iran
Mr. Amin Daneshmand Malayeri, YRC, IAU, Malayer Branch, Iran
Mr. Shantanu Pal, University of Calcutta, India
Dr. Terry H. Walcott, E-Promag Consultancy Group, United Kingdom
Dr. Ezekiel U OKIKE, University of Ibadan, Nigeria
Mr. P. Mahalingam, Caledonian College of Engineering, Oman
Dr. Mahmoud M. A. Abd Ellatif, Mansoura University, Egypt
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Mr. Souleymane Balla-Arabé, Xi’an University of Electronic Science and Technology, China
Mr. Mahabub Alam, Rajshahi University of Engineering and Technology, Bangladesh
Mr. Sathyapraksh P., S.K.P Engineering College, India
Dr. N. Karthikeyan, SNS College of Engineering, Anna University, India
Dr. Binod Kumar, JSPM's, Jayawant Technical Campus, Pune, India
Assoc. Prof. Dinesh Goyal, Suresh Gyan Vihar University, India
Mr. Md. Abdul Ahad, K L University, India
Mr. Vikas Bajpai, The LNM IIT, India
Dr. Manish Kumar Anand, Salesforce (R & D Analytics), San Francisco, USA
Assist. Prof. Dheeraj Murari, Kumaon Engineering College, India
Assoc. Prof. Dr. A. Muthukumaravel, VELS University, Chennai
Mr. A. Siles Balasingh, St.Joseph University in Tanzania, Tanzania
Mr. Ravindra Daga Badgujar, R C Patel Institute of Technology, India
Dr. Preeti Khanna, SVKM’s NMIMS, School of Business Management, India
Mr. Kumar Dayanand, Cambridge Institute of Technology, India
Dr. Syed Asif Ali, SMI University Karachi, Pakistan
Prof. Pallvi Pandit, Himachal Pradeh University, India
Mr. Ricardo Verschueren, University of Gloucestershire, UK
Assist. Prof. Mamta Juneja, University Institute of Engineering and Technology, Panjab University, India
Assoc. Prof. P. Surendra Varma, NRI Institute of Technology, JNTU Kakinada, India
Assist. Prof. Gaurav Shrivastava, RGPV / SVITS Indore, India
Dr. S. Sumathi, Anna University, India
Assist. Prof. Ankita M. Kapadia, Charotar University of Science and Technology, India
Mr. Deepak Kumar, Indian Institute of Technology (BHU), India
Dr. Dr. Rajan Gupta, GGSIP University, New Delhi, India
Assist. Prof M. Anand Kumar, Karpagam University, Coimbatore, India
Mr. Mr Arshad Mansoor, Pakistan Aeronautical Complex
Mr. Kapil Kumar Gupta, Ansal Institute of Technology and Management, India
Dr. Neeraj Tomer, SINE International Institute of Technology, Jaipur, India
Assist. Prof. Trunal J. Patel, C.G.Patel Institute of Technology, Uka Tarsadia University, Bardoli, Surat
Mr. Sivakumar, Codework solutions, India
Mr. Mohammad Sadegh Mirzaei, PGNR Company, Iran
Dr. Gerard G. Dumancas, Oklahoma Medical Research Foundation, USA
Mr. Varadala Sridhar, Varadhaman College Engineering College, Affiliated To JNTU, Hyderabad
Assist. Prof. Manoj Dhawan, SVITS, Indore
Assoc. Prof. Chitreshh Banerjee, Suresh Gyan Vihar University, Jaipur, India
Dr. S. Santhi, SCSVMV University, India
Mr. Davood Mohammadi Souran, Ministry of Energy of Iran, Iran
Mr. Shamim Ahmed, Bangladesh University of Business and Technology, Bangladesh
Mr. Sandeep Reddivari, Mississippi State University, USA
Assoc. Prof. Ousmane Thiare, Gaston Berger University, Senegal
Dr. Hazra Imran, Athabasca University, Canada
Dr. Setu Kumar Chaturvedi, Technocrats Institute of Technology, Bhopal, India
Mr. Mohd Dilshad Ansari, Jaypee University of Information Technology, India
Ms. Jaspreet Kaur, Distance Education LPU, India
Dr. D. Nagarajan, Salalah College of Technology, Sultanate of Oman
Dr. K.V.N.R.Sai Krishna, S.V.R.M. College, India
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Mr. Himanshu Pareek, Center for Development of Advanced Computing (CDAC), India
Mr. Khaldi Amine, Badji Mokhtar University, Algeria
Mr. Mohammad Sadegh Mirzaei, Scientific Applied University, Iran
Assist. Prof. Khyati Chaudhary, Ram-eesh Institute of Engg. & Technology, India
Mr. Sanjay Agal, Pacific College of Engineering Udaipur, India
Mr. Abdul Mateen Ansari, King Khalid University, Saudi Arabia
Dr. H.S. Behera, Veer Surendra Sai University of Technology (VSSUT), India
Dr. Shrikant Tiwari, Shri Shankaracharya Group of Institutions (SSGI), India
Prof. Ganesh B. Regulwar, Shri Shankarprasad Agnihotri College of Engg, India
Prof. Pinnamaneni Bhanu Prasad, Matrix vision GmbH, Germany
Dr. Shrikant Tiwari, Shri Shankaracharya Technical Campus (SSTC), India
Dr. Siddesh G.K., : Dayananada Sagar College of Engineering, Bangalore, India
Dr. Nadir Bouchama, CERIST Research Center, Algeria
Dr. R. Sathishkumar, Sri Venkateswara College of Engineering, India
Assistant Prof (Dr.) Mohamed Moussaoui, Abdelmalek Essaadi University, Morocco
Dr. S. Malathi, Panimalar Engineering College, Chennai, India
Dr. V. Subedha, Panimalar Institute of Technology, Chennai, India
Dr. Prashant Panse, Swami Vivekanand College of Engineering, Indore, India
Dr. Hamza Aldabbas, Al-Balqa’a Applied University, Jordan
Dr. G. Rasitha Banu, Vel's University, Chennai
Dr. V. D. Ambeth Kumar, Panimalar Engineering College, Chennai
Prof. Anuranjan Misra, Bhagwant Institute of Technology, Ghaziabad, India
Ms. U. Sinthuja, PSG college of arts &science, India
Dr. Ehsan Saradar Torshizi, Urmia University, Iran
Dr. Shamneesh Sharma, APG Shimla University, Shimla (H.P.), India
Assistant Prof. A. S. Syed Navaz, Muthayammal College of Arts & Science, India
Assistant Prof. Ranjit Panigrahi, Sikkim Manipal Institute of Technology, Majitar, Sikkim
Dr. Khaled Eskaf, Arab Academy for Science ,Technology & Maritime Transportation, Egypt
Dr. Nishant Gupta, University of Jammu, India
Assistant Prof. Nagarajan Sankaran, Annamalai University, Chidambaram, Tamilnadu, India
Assistant Prof.Tribikram Pradhan, Manipal Institute of Technology, India
Dr. Nasser Lotfi, Eastern Mediterranean University, Northern Cyprus
Dr. R. Manavalan, K S Rangasamy college of Arts and Science, Tamilnadu, India
Assistant Prof. P. Krishna Sankar, K S Rangasamy college of Arts and Science, Tamilnadu, India
Dr. Rahul Malik, Cisco Systems, USA
Dr. S. C. Lingareddy, ALPHA College of Engineering, India
Assistant Prof. Mohammed Shuaib, Interal University, Lucknow, India
Dr. Sachin Yele, Sanghvi Institute of Management & Science, India
Dr. T. Thambidurai, Sun Univercell, Singapore
Prof. Anandkumar Telang, BKIT, India
Assistant Prof. R. Poorvadevi, SCSVMV University, India
Dr Uttam Mande, Gitam University, India
Dr. Poornima Girish Naik, Shahu Institute of Business Education and Research (SIBER), India
Prof. Md. Abu Kausar, Jaipur National University, Jaipur, India
Dr. Mohammed Zuber, AISECT University, India
Prof. Kalum Priyanath Udagepola, King Abdulaziz University, Saudi Arabia
Dr. K. R. Ananth, Velalar College of Engineering and Technology, India
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Assistant Prof. Sanjay Sharma, Roorkee Engineering & Management Institute Shamli (U.P), India
Assistant Prof. Panem Charan Arur, Priyadarshini Institute of Technology, India
Dr. Ashwak Mahmood muhsen alabaichi, Karbala University / College of Science, Iraq
Dr. Urmila Shrawankar, G H Raisoni College of Engineering, Nagpur (MS), India
Dr. Krishan Kumar Paliwal, Panipat Institute of Engineering & Technology, India
Dr. Mukesh Negi, Tech Mahindra, India
Dr. Anuj Kumar Singh, Amity University Gurgaon, India
Dr. Babar Shah, Gyeongsang National University, South Korea
Assistant Prof. Jayprakash Upadhyay, SRI-TECH Jabalpur, India
Assistant Prof. Varadala Sridhar, Vidya Jyothi Institute of Technology, India
Assistant Prof. Parameshachari B D, KSIT, Bangalore, India
Assistant Prof. Ankit Garg, Amity University, Haryana, India
Assistant Prof. Rajashe Karappa, SDMCET, Karnataka, India
Assistant Prof. Varun Jasuja, GNIT, India
Assistant Prof. Sonal Honale, Abha Gaikwad Patil College of Engineering Nagpur, India
Dr. Pooja Choudhary, CT Group of Institutions, NIT Jalandhar, India
Dr. Faouzi Hidoussi, UHL Batna, Algeria
Dr. Naseer Ali Husieen, Wasit University, Iraq
Assistant Prof. Vinod Kumar Shukla, Amity University, Dubai
Dr. Ahmed Farouk Metwaly, K L University
Mr. Mohammed Noaman Murad, Cihan University, Iraq
Dr. Suxing Liu, Arkansas State University, USA
Dr. M. Gomathi, Velalar College of Engineering and Technology, India
Assistant Prof. Sumardiono, College PGRI Blitar, Indonesia
Dr. Latika Kharb, Jagan Institute of Management Studies (JIMS), Delhi, India
Associate Prof. S. Raja, Pauls College of Engineering and Technology, Tamilnadu, India
Assistant Prof. Seyed Reza Pakize, Shahid Sani High School, Iran
Dr. Thiyagu Nagaraj, University-INOU, India
Assistant Prof. Noreen Sarai, Harare Institute of Technology, Zimbabwe
Assistant Prof. Gajanand Sharma, Suresh Gyan Vihar University Jaipur, Rajasthan, India
Assistant Prof. Mapari Vikas Prakash, Siddhant COE, Sudumbare, Pune, India
Dr. Devesh Katiyar, Shri Ramswaroop Memorial University, India
Dr. Shenshen Liang, University of California, Santa Cruz, US
Assistant Prof. Mohammad Abu Omar, Limkokwing University of Creative Technology- Malaysia
Mr. Snehasis Banerjee, Tata Consultancy Services, India
Assistant Prof. Kibona Lusekelo, Ruaha Catholic University (RUCU), Tanzania
Assistant Prof. Adib Kabir Chowdhury, University College Technology Sarawak, Malaysia
Dr. Ying Yang, Computer Science Department, Yale University, USA
Dr. Vinay Shukla, Institute Of Technology & Management, India
Dr. Liviu Octavian Mafteiu-Scai, West University of Timisoara, Romania
Assistant Prof. Rana Khudhair Abbas Ahmed, Al-Rafidain University College, Iraq
Assistant Prof. Nitin A. Naik, S.R.T.M. University, India
Dr. Timothy Powers, University of Hertfordshire, UK
Dr. S. Prasath, Bharathiar University, Erode, India
Dr. Ritu Shrivastava, SIRTS Bhopal, India
Prof. Rohit Shrivastava, Mittal Institute of Technology, Bhopal, India
Dr. Gianina Mihai, Dunarea de Jos" University of Galati, Romania
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
Assistant Prof. Ms. T. Kalai Selvi, Erode Sengunthar Engineering College, India
Assistant Prof. Ms. C. Kavitha, Erode Sengunthar Engineering College, India
Assistant Prof. K. Sinivasamoorthi, Erode Sengunthar Engineering College, India
Assistant Prof. Mallikarjun C Sarsamba Bheemnna Khandre Institute Technology, Bhalki, India
Assistant Prof. Vishwanath Chikaraddi, Veermata Jijabai technological Institute (Central Technological Institute), India
Assistant Prof. Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, India
Assistant Prof. Mohammed Noaman Murad, Cihan University, Iraq
Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco
Dr. Parul Verma, Amity University, India
Professor Yousef Farhaoui, Moulay Ismail University, Errachidia, Morocco
Assistant Prof. Madhavi Dhingra, Amity University, Madhya Pradesh, India
Assistant Prof.. G. Selvavinayagam, SNS College of Technology, Coimbatore, India
Assistant Prof. Madhavi Dhingra, Amity University, MP, India
Professor Kartheesan Log, Anna University, Chennai
Professor Vasudeva Acharya, Shri Madhwa vadiraja Institute of Technology, India
Dr. Asif Iqbal Hajamydeen, Management & Science University, Malaysia
Assistant Prof., Mahendra Singh Meena, Amity University Haryana
Assistant Professor Manjeet Kaur, Amity University Haryana
Dr. Mohamed Abd El-Basset Matwalli, Zagazig University, Egypt
Dr. Ramani Kannan, Universiti Teknologi PETRONAS, Malaysia
Assistant Prof. S. Jagadeesan Subramaniam, Anna University, India
Assistant Prof. Dharmendra Choudhary, Tripura University, India
Assistant Prof. Deepika Vodnala, SR Engineering College, India
Dr. Kai Cong, Intel Corporation & Computer Science Department, Portland State University, USA
Dr. Kailas R Patil, Vishwakarma Institute of Information Technology (VIIT), India
Dr. Omar A. Alzubi, Faculty of IT / Al-Balqa Applied University, Jordan
Assistant Prof. Kareemullah Shaik, Nimra Institute of Science and Technology, India
Assistant Prof. Chirag Modi, NIT Goa
Dr. R. Ramkumar, Nandha Arts And Science College, India
Dr. Priyadharshini Vydhialingam, Harathiar University, India
Dr. P. S. Jagadeesh Kumar, DBIT, Bangalore, Karnataka
Dr. Vikas Thada, AMITY University, Pachgaon
Dr. T. A. Ashok Kumar, Institute of Management, Christ University, Bangalore
Dr. Shaheera Rashwan, Informatics Research Institute
Dr. S. Preetha Gunasekar, Bharathiyar University, India
Asst Professor Sameer Dev Sharma, Uttaranchal University, Dehradun
Dr. Zhihan lv, Chinese Academy of Science, China
Dr. Ikvinderpal Singh, Trai Shatabdi GGS Khalsa College, Amritsar
Dr. Umar Ruhi, University of Ottawa, Canada
Dr. Jasmin Cosic, University of Bihac, Bosnia and Herzegovina
Dr. Homam Reda El-Taj, University of Tabuk, Kingdom of Saudi Arabia
Dr. Mostafa Ghobaei Arani, Islamic Azad University, Iran
Dr. Ayyasamy Ayyanar, Annamalai University, India
Dr. Selvakumar Manickam, Universiti Sains Malaysia, Malaysia
Dr. Murali Krishna Namana, GITAM University, India
Dr. Smriti Agrawal, Chaitanya Bharathi Institute of Technology, Hyderabad, India
Professor Vimalathithan Rathinasabapathy, Karpagam College Of Engineering, India
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 19 No. 12, December 2021
IJCSIS 2022-2023
ISSN: 1947-5500
http://sites.google.com/site/ijcsis/
International Journal Computer Science and Information Security, IJCSIS, is the premier
scholarly venue in the areas of computer science and security issues. IJCSIS 2011 will provide a high
profile, leading edge platform for researchers and engineers alike to publish state-of-the-art research in the
respective fields of information technology and communication security. The journal will feature a diverse
mixture of publication articles including core and applied computer science related topics.
Authors are solicited to contribute to the special issue by submitting articles that illustrate research results,
projects, surveying works and industrial experiences that describe significant advances in the following
areas, but are not limited to. Submissions may span a broad range of topics, e.g.:
Track A: Security
Access control, Anonymity, Audit and audit reduction & Authentication and authorization, Applied
cryptography, Cryptanalysis, Digital Signatures, Biometric security, Boundary control devices,
Certification and accreditation, Cross-layer design for security, Security & Network Management, Data and
system integrity, Database security, Defensive information warfare, Denial of service protection, Intrusion
Detection, Anti-malware, Distributed systems security, Electronic commerce, E-mail security, Spam,
Phishing, E-mail fraud, Virus, worms, Trojan Protection, Grid security, Information hiding and
watermarking & Information survivability, Insider threat protection, Integrity
Intellectual property protection, Internet/Intranet Security, Key management and key recovery, Language-
based security, Mobile and wireless security, Mobile, Ad Hoc and Sensor Network Security, Monitoring
and surveillance, Multimedia security ,Operating system security, Peer-to-peer security, Performance
Evaluations of Protocols & Security Application, Privacy and data protection, Product evaluation criteria
and compliance, Risk evaluation and security certification, Risk/vulnerability assessment, Security &
Network Management, Security Models & protocols, Security threats & countermeasures (DDoS, MiM,
Session Hijacking, Replay attack etc,), Trusted computing, Ubiquitous Computing Security, Virtualization
security, VoIP security, Web 2.0 security, Submission Procedures, Active Defense Systems, Adaptive
Defense Systems, Benchmark, Analysis and Evaluation of Security Systems, Distributed Access Control
and Trust Management, Distributed Attack Systems and Mechanisms, Distributed Intrusion
Detection/Prevention Systems, Denial-of-Service Attacks and Countermeasures, High Performance
Security Systems, Identity Management and Authentication, Implementation, Deployment and
Management of Security Systems, Intelligent Defense Systems, Internet and Network Forensics, Large-
scale Attacks and Defense, RFID Security and Privacy, Security Architectures in Distributed Network
Systems, Security for Critical Infrastructures, Security for P2P systems and Grid Systems, Security in E-
Commerce, Security and Privacy in Wireless Networks, Secure Mobile Agents and Mobile Code, Security
Protocols, Security Simulation and Tools, Security Theory and Tools, Standards and Assurance Methods,
Trusted Computing, Viruses, Worms, and Other Malicious Code, World Wide Web Security, Novel and
emerging secure architecture, Study of attack strategies, attack modeling, Case studies and analysis of
actual attacks, Continuity of Operations during an attack, Key management, Trust management, Intrusion
detection techniques, Intrusion response, alarm management, and correlation analysis, Study of tradeoffs
between security and system performance, Intrusion tolerance systems, Secure protocols, Security in
wireless networks (e.g. mesh networks, sensor networks, etc.), Cryptography and Secure Communications,
Computer Forensics, Recovery and Healing, Security Visualization, Formal Methods in Security, Principles
for Designing a Secure Computing System, Autonomic Security, Internet Security, Security in Health Care
Systems, Security Solutions Using Reconfigurable Computing, Adaptive and Intelligent Defense Systems,
Authentication and Access control, Denial of service attacks and countermeasures, Identity, Route and
Location Anonymity schemes, Intrusion detection and prevention techniques, Cryptography, encryption
algorithms and Key management schemes, Secure routing schemes, Secure neighbor discovery and
localization, Trust establishment and maintenance, Confidentiality and data integrity, Security architectures,
deployments and solutions, Emerging threats to cloud-based services, Security model for new services,
Cloud-aware web service security, Information hiding in Cloud Computing, Securing distributed data
storage in cloud, Security, privacy and trust in mobile computing systems and applications, Middleware
security & Security features: middleware software is an asset on
its own and has to be protected, interaction between security-specific and other middleware features, e.g.,
context-awareness, Middleware-level security monitoring and measurement: metrics and mechanisms
for quantification and evaluation of security enforced by the middleware, Security co-design: trade-off and
co-design between application-based and middleware-based security, Policy-based management:
innovative support for policy-based definition and enforcement of security concerns, Identification and
authentication mechanisms: Means to capture application specific constraints in defining and enforcing
access control rules, Middleware-oriented security patterns: identification of patterns for sound, reusable
security, Security in aspect-based middleware: mechanisms for isolating and enforcing security aspects,
Security in agent-based platforms: protection for mobile code and platforms, Smart Devices: Biometrics,
National ID cards, Embedded Systems Security and TPMs, RFID Systems Security, Smart Card Security,
Pervasive Systems: Digital Rights Management (DRM) in pervasive environments, Intrusion Detection and
Information Filtering, Localization Systems Security (Tracking of People and Goods), Mobile Commerce
Security, Privacy Enhancing Technologies, Security Protocols (for Identification and Authentication,
Confidentiality and Privacy, and Integrity), Ubiquitous Networks: Ad Hoc Networks Security, Delay-
Tolerant Network Security, Domestic Network Security, Peer-to-Peer Networks Security, Security Issues
in Mobile and Ubiquitous Networks, Security of GSM/GPRS/UMTS Systems, Sensor Networks Security,
Vehicular Network Security, Wireless Communication Security: Bluetooth, NFC, WiFi, WiMAX,
WiMedia, others
This Track will emphasize the design, implementation, management and applications of computer
communications, networks and services. Topics of mostly theoretical nature are also welcome, provided
there is clear practical potential in applying the results of such work.
Broadband wireless technologies: LTE, WiMAX, WiRAN, HSDPA, HSUPA, Resource allocation and
interference management, Quality of service and scheduling methods, Capacity planning and dimensioning,
Cross-layer design and Physical layer based issue, Interworking architecture and interoperability, Relay
assisted and cooperative communications, Location and provisioning and mobility management, Call
admission and flow/congestion control, Performance optimization, Channel capacity modeling and analysis,
Middleware Issues: Event-based, publish/subscribe, and message-oriented middleware, Reconfigurable,
adaptable, and reflective middleware approaches, Middleware solutions for reliability, fault tolerance, and
quality-of-service, Scalability of middleware, Context-aware middleware, Autonomic and self-managing
middleware, Evaluation techniques for middleware solutions, Formal methods and tools for designing,
verifying, and evaluating, middleware, Software engineering techniques for middleware, Service oriented
middleware, Agent-based middleware, Security middleware, Network Applications: Network-based
automation, Cloud applications, Ubiquitous and pervasive applications, Collaborative applications, RFID
and sensor network applications, Mobile applications, Smart home applications, Infrastructure monitoring
and control applications, Remote health monitoring, GPS and location-based applications, Networked
vehicles applications, Alert applications, Embeded Computer System, Advanced Control Systems, and
Intelligent Control : Advanced control and measurement, computer and microprocessor-based control,
signal processing, estimation and identification techniques, application specific IC’s, nonlinear and
adaptive control, optimal and robot control, intelligent control, evolutionary computing, and intelligent
systems, instrumentation subject to critical conditions, automotive, marine and aero-space control and all
other control applications, Intelligent Control System, Wiring/Wireless Sensor, Signal Control System.
Sensors, Actuators and Systems Integration : Intelligent sensors and actuators, multisensor fusion, sensor
array and multi-channel processing, micro/nano technology, microsensors and microactuators,
instrumentation electronics, MEMS and system integration, wireless sensor, Network Sensor, Hybrid
Sensor, Distributed Sensor Networks. Signal and Image Processing : Digital signal processing theory,
methods, DSP implementation, speech processing, image and multidimensional signal processing, Image
analysis and processing, Image and Multimedia applications, Real-time multimedia signal processing,
Computer vision, Emerging signal processing areas, Remote Sensing, Signal processing in education.
Industrial Informatics: Industrial applications of neural networks, fuzzy algorithms, Neuro-Fuzzy
application, bioInformatics, real-time computer control, real-time information systems, human-machine
interfaces, CAD/CAM/CAT/CIM, virtual reality, industrial communications, flexible manufacturing
systems, industrial automated process, Data Storage Management, Harddisk control, Supply Chain
Management, Logistics applications, Power plant automation, Drives automation. Information Technology,
Management of Information System : Management information systems, Information Management,
Nursing information management, Information System, Information Technology and their application, Data
retrieval, Data Base Management, Decision analysis methods, Information processing, Operations research,
E-Business, E-Commerce, E-Government, Computer Business, Security and risk management, Medical
imaging, Biotechnology, Bio-Medicine, Computer-based information systems in health care, Changing
Access to Patient Information, Healthcare Management Information Technology.
Communication/Computer Network, Transportation Application : On-board diagnostics, Active safety
systems, Communication systems, Wireless technology, Communication application, Navigation and
Guidance, Vision-based applications, Speech interface, Sensor fusion, Networking theory and technologies,
Transportation information, Autonomous vehicle, Vehicle application of affective computing, Advance
Computing technology and their application : Broadband and intelligent networks, Data Mining, Data
fusion, Computational intelligence, Information and data security, Information indexing and retrieval,
Information processing, Information systems and applications, Internet applications and performances,
Knowledge based systems, Knowledge management, Software Engineering, Decision making, Mobile
networks and services, Network management and services, Neural Network, Fuzzy logics, Neuro-Fuzzy,
Expert approaches, Innovation Technology and Management : Innovation and product development,
Emerging advances in business and its applications, Creativity in Internet management and retailing, B2B
and B2C management, Electronic transceiver device for Retail Marketing Industries, Facilities planning
and management, Innovative pervasive computing applications, Programming paradigms for pervasive
systems, Software evolution and maintenance in pervasive systems, Middleware services and agent
technologies, Adaptive, autonomic and context-aware computing, Mobile/Wireless computing systems and
services in pervasive computing, Energy-efficient and green pervasive computing, Communication
architectures for pervasive computing, Ad hoc networks for pervasive communications, Pervasive
opportunistic communications and applications, Enabling technologies for pervasive systems (e.g., wireless
BAN, PAN), Positioning and tracking technologies, Sensors and RFID in pervasive systems, Multimodal
sensing and context for pervasive applications, Pervasive sensing, perception and semantic interpretation,
Smart devices and intelligent environments, Trust, security and privacy issues in pervasive systems, User
interfaces and interaction models, Virtual immersive communications, Wearable computers, Standards and
interfaces for pervasive computing environments, Social and economic models for pervasive systems,
Active and Programmable Networks, Ad Hoc & Sensor Network, Congestion and/or Flow Control, Content
Distribution, Grid Networking, High-speed Network Architectures, Internet Services and Applications,
Optical Networks, Mobile and Wireless Networks, Network Modeling and Simulation, Multicast,
Multimedia Communications, Network Control and Management, Network Protocols, Network
Performance, Network Measurement, Peer to Peer and Overlay Networks, Quality of Service and Quality
of Experience, Ubiquitous Networks, Crosscutting Themes – Internet Technologies, Infrastructure,
Services and Applications; Open Source Tools, Open Models and Architectures; Security, Privacy and
Trust; Navigation Systems, Location Based Services; Social Networks and Online Communities; ICT
Convergence, Digital Economy and Digital Divide, Neural Networks, Pattern Recognition, Computer
Vision, Advanced Computing Architectures and New Programming Models, Visualization and Virtual
Reality as Applied to Computational Science, Computer Architecture and Embedded Systems, Technology
in Education, Theoretical Computer Science, Computing Ethics, Computing Practices & Applications
Authors are invited to submit papers through e-mail ijcsiseditor@gmail.com. Submissions must be original
and should not have been published previously or be under consideration for publication while being
evaluated by IJCSIS. Before submission authors should carefully read over the journal's Author Guidelines,
which are located at http://sites.google.com/site/ijcsis/authors-notes .
© IJCSIS PUBLICATION 2021
ISSN 1947 5500
http://sites.google.com/site/ijcsis/