N. Cooharojananone, Thitiporn Wongadoonwit, Viraya Thitivesa
{"title":"Factors Effecting Purchase Intention Using Coverpage Image on Cosmetic E-Commerce Website: A Case Study of Thai Female Customers","authors":"N. Cooharojananone, Thitiporn Wongadoonwit, Viraya Thitivesa","doi":"10.1109/ICISA.2014.6847400","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847400","url":null,"abstract":"In this study, we focus on image that presents product on main page and factors that will effect consumer's purchase intention from the website user interface by focusing on cosmetic website. Factors that we consider toward factor purchase intention are aesthetic response, enjoyment, perceived value, perceived usefulness and perceived ease of use. We also study how different types of image influence the consumer from the main homepage of e-commerce website by considers three types of image representing that are mostly be found in cosmetics websites. The participants, in this study, are students and working people. We apply the regression analysis to explore the factors and the conjoint analysis to compare consumer's satisfaction toward types of image. The result after analysis shows that these proposed factors yielded interesting result which leads to a better understandable of users toward main homepage image on e-commerce website.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126012397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
GiYeong Bae, JeongMok Ha, JeaYoung Jeon, SungYong Jo, Hong Jeong
{"title":"LED Traffic Sign Detection Using Rectangular Hough Transform","authors":"GiYeong Bae, JeongMok Ha, JeaYoung Jeon, SungYong Jo, Hong Jeong","doi":"10.1109/ICISA.2014.6847422","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847422","url":null,"abstract":"In this paper, a new Advanced Driver Assistant System (ADAS) system for LED traffic sign detection algorithm using rectangle shape based on a windowed hough transform and feature based optimization was presented. We used two character to detect the LED traffic sign. One is LED traffic sign have rectangle shape, another is intensity feature of LED traffic sign. After extracting the candidates of LED traffic signs, our proposed system classify the positive and negative rectangle candidate as a LED traffic sign. Under this flow, we can finally obtained LED traffic sign from real road scene that include LED traffic sign. Our proposed technique was tested in 87 number of real road scene that include LED traffic signs. We can find the 368 number of LED traffic signs of existing 430 number of LED traffic signs. The detection ratio is 85.37%. Algorithm proposed in this paper is very meaningful as a first attempt to detect the LED traffic signs.Detection ratio also reasonable to recognize the traffic sign in the next step of Traffic Sign Recognition (TSR).","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khalifa Bashier Housam, S. Lau, Ying-Han Pang, Yee Ping Liew, M. Chiang
{"title":"Face Spoofing Detection Based on Improved Local Graph Structure","authors":"Khalifa Bashier Housam, S. Lau, Ying-Han Pang, Yee Ping Liew, M. Chiang","doi":"10.1109/ICISA.2014.6847399","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847399","url":null,"abstract":"Face spoofing attack is one of the recent security problems that face recognition systems are proven to be vulnerable to. The spoofing occurs when an attacker bypass the authentication scheme by presenting a copy of the face image for a valid user. Therefore, it's very easy to perform a face recognition spoofing attack with compare to other biometrics. This paper, presents a novel and efficient facial image representation for face spoofing called improved local graph structure (ILGS). We divide the input facial image into several regions and then we calculate local graph structure (LGS) codes for each region. On the other hand, the histograms are concatenated into an enhanced feature vector to detect spoofed facial image. Finally, performance of the proposed method is evaluated on the NUAA database.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124121198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying MapReduce Programming Model for Handling Scientific Problems","authors":"Yun-hee Kang, Y. B. Park","doi":"10.1109/ICISA.2014.6847367","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847367","url":null,"abstract":"According to data volumes in scientific applications have grown exponentially, new scientific methods to analyze and organize the data are required. MapReduce programming is driving Internet services and those services operation in a cloud environment. Hence it is required to efficiently provide resources for handling diverse MapReduce applications. In this paper we show the Hadoop application with map and reduce functions for the data transformation.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122739043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integration Testing Coverage Tool for Object-Oriented Software","authors":"Pachawan Augsornsri, T. Suwannasart","doi":"10.1109/ICISA.2014.6847360","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847360","url":null,"abstract":"One of main points of software testing is test coverage analysis because defects may exist in uncovered parts and appear when users use the software. Test coverage analysis is one process which is used for solving the uncovered testing. This process consists of code instrumentation, collecting coverage data during test execution, and analyzing the coverage measure. Test coverage analysis has to be applied with every level of testing. In addition, it has to be performed to conventional software and object-oriented software. Nowadays, object-oriented software is more interesting. However, we cannot use existing integration testing coverage measures with object- oriented software. In our previous paper, we propose the design of a tool for analyzing integration testing coverage for object-oriented software. This paper we continue our work by proposing an integration testing coverage tool for object-oriented software. This tool can analyze the integration testing coverage of object- oriented software. Moreover, it can generate additional test cases in case of there are uncovered methods that have not been tested by existing test cases.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131434690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiagent Web for the Internet of Things","authors":"P. Leong, Liming Lu","doi":"10.1109/ICISA.2014.6847432","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847432","url":null,"abstract":"The Internet of Things (IOT) is a network of networks where massively large numbers of objects or things are interconnected to each other through the network. The Internet of Things brings along many new possibilities of applications to improve human comfort and quality of life. Complex systems such as the Internet of Things are difficult to manage because of the emergent behaviours that arise from the complex interactions between its constituent parts. Our key contribution in the paper is a proposed multiagent web for the Internet of Things. Corresponding data management architecture is also proposed. The multiagent architecture provides autonomic characteristics for IOT making the IOT manageable. In addition, the multiagent web allows for flexible processing on heterogeneous platforms as we leverage off web protocols such as HTTP and language independent data formats such as JSON for communications between agents. The architecture we proposed enables a scalable architecture and infrastructure for a web-scale multiagent Internet of Things.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116563615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yunli Lee, Leslie Tiong Ching Ow, David Ngo Chek Ling
{"title":"Hidden Markov Models for Forex Trends Prediction","authors":"Yunli Lee, Leslie Tiong Ching Ow, David Ngo Chek Ling","doi":"10.1109/ICISA.2014.6847408","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847408","url":null,"abstract":"Foreign Exchange (Forex) market is a complex and challenging task for prediction due to uncertainty movement of exchange rate. However, these movements over timeframe also known as historical Forex data that offered a generic repeated trend patterns. This paper uses the features extracted from trend patterns to model and predict the next day trend. Hidden Markov Models (HMMs) is applied to learn the historical trend patterns, and use to predict the next day movement trends. We use the 2011 Forex historical data of Australian Dollar (AUS) and European Union Dollar (EUD) against the United State Dollar (USD) for modeling, and the 2012 and 2013 Forex historical data for validating the proposed model. The experimental results show outperforms prediction result for both years.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130983435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Visualisation Technique for View Constrained Tele-Operation in Nuclear Industry","authors":"J. K. Mukherjee","doi":"10.1109/ICISA.2014.6847401","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847401","url":null,"abstract":"A machine hosted intelligent operator interface for 'man in loop' type tele-operated systems with slave located in view constrained work scenarios is required to provide visual perception of remote scene. General virtual viewer is partially effective for large robot arms. A new modality 'See Pertinent Zone' SPZ has been developed for showing hit prone part of robot. The new method employs virtual sensor and modeled work- space activation method for detecting approaching object surfaces and also forms synthesized view to support an autonomous SPZ .","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mido Chang, M. Evans, Sunha Kim, K. Deater-Deckard, A. Norton
{"title":"Educational Video Games and Students' Game Engagement","authors":"Mido Chang, M. Evans, Sunha Kim, K. Deater-Deckard, A. Norton","doi":"10.1109/ICISA.2014.6847390","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847390","url":null,"abstract":"The [Math App], developed for the iOS platform (primarily targeting iPads), is an educational video game (EVG) intended to support students' understanding of fractions and thus promote algebra-readiness. In working with fractions, most fifth grade students in the U.S. rely on part-whole conceptions alone, inhibiting development toward algebra in higher grades. Using a quasi-experimental design, investigators document the theoretical and evidence-based approach to designing, developing, and piloting an EVG for algebra readiness. Our research and development of EVGs is grounded in theories of engagement - cognitive, behavioral, and affective domains - known to facilitate learning. In this research, we report the game engagement levels differed by learner's gender and prior ability in mathematics performance, and the amount of gameplay.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-Class Support Vector Machines Revisited","authors":"Abdenour Bounsiar, M. G. Madden","doi":"10.1109/ICISA.2014.6847442","DOIUrl":"https://doi.org/10.1109/ICISA.2014.6847442","url":null,"abstract":"The task of One-Class Classification (OCC) is to characterise a single class that is well described by the training data and distinguish it from all others; this is in contrast to the more common approach of binary classification or multi-class classification, in which all classes are well described by the training data. One-class support vector machine algorithms such as OCSVM and SVDD have been shown to be successful in many applications. From our review of the literature, it has emerged that the Gaussian kernel consistently works well in practical applications. Other researchers have shown that OSCVM and SVDD are equivalent under the transformation implied by the Gaussian kernel. A major source of confusion for OCSVM is in how it separates the target data from the origin where the outliers are supposed to lie. In this paper, we review the OCSVM algorithm and we alleviate this source of confusion by proposing a geometric motivation for the OCSVM principle based on separating the target data from the rest of the space, when a Gaussian kernel is used.","PeriodicalId":117185,"journal":{"name":"2014 International Conference on Information Science & Applications (ICISA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}