2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)最新文献

筛选
英文 中文
Information system of fractional owned virtual hydropower plant 分级所有制虚拟水电厂信息系统
J. Lahti, P. Helo, A. Shamsuzzoha, K. Phusavat
{"title":"Information system of fractional owned virtual hydropower plant","authors":"J. Lahti, P. Helo, A. Shamsuzzoha, K. Phusavat","doi":"10.1109/ICTKE.2015.7368470","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368470","url":null,"abstract":"Open power markets have dramatically changed the way how power producers optimize their capacity from business point of view. Efficient functioning in the power markets and optimizing financial profit has highlighted innovative use of Information and Communication Technology (ICT). Applying advanced ICT to optimize power production has become more common. Several models for Virtual Power Plants (VPP) combining small size electricity production units to a large unit have been presented. Reverse approaches where large units are divided into several small units by means of virtualization are rare. Traditionally hydropower plants are considered as one large power producing unit. This paper describes a model of Fractional Owned virtual Hydropower Plant and design of information system that enables virtualized hydropower plant for several individual partial owners. Model offers independent control and optimization features to each of the fractional owners. Partial owner can store or use its water capacity when needed and optimize the electricity production based on its business needs. The paper approaches the topic from virtualization and information system perspective.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"57 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120999777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization of baseball player's defensive range using a probability ellipse 使用概率椭圆可视化棒球运动员的防守范围
K. Kono, Yoshiro Yamamoto
{"title":"Visualization of baseball player's defensive range using a probability ellipse","authors":"K. Kono, Yoshiro Yamamoto","doi":"10.1109/ICTKE.2015.7368468","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368468","url":null,"abstract":"In this study, we propose a way to evaluate and visualize defensive ability for baseball players. Fielding average is famous for an index of the defense, but thinks about other evaluation methods. We visualize the defensive range of players with the positions of batted ball processing. We will see that player is going to challenge the batted ball which cannot catch by visualizing. We did an ellipse estimate using a variance-covariance matrix for the visualization of the defensive range. The probability ellipse expresses the virtual defensive range of the player. We can assume the area of this defensive range an index. Because we might leave batted ball processing to other players, we established the border between players. We will understand the activity of the player on this border. We can think about the good or bad of the player by thinking about an ellipse estimate and a border.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115521037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time performance analysis of medical treatment processes by using disco 用disco分析医疗过程的时间性能
Phanchaporn Jaisook, W. Premchaiswadi
{"title":"Time performance analysis of medical treatment processes by using disco","authors":"Phanchaporn Jaisook, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368480","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368480","url":null,"abstract":"In this research we applied process mining techniques in order to analyze work processes of a healthcare system. The main objective of the study was to investigate the performance of a private hospital treatment processes in Bangkok based on the event logs. Being aware of the fact that currently healthcare systems of majority of hospitals worldwide are equipped with information systems, provided us a great opportunity to access large amounts of the medical data with the intention of the research and knowledge discovery purposes. In this paper, we emphasized on the “Time Performance” of the process instances of the collected event logs from different wards/sections of a hospital in order to better visualize and study the behavior of patients referring to the following sections/wards (as well as the hospital's administrators/personnel attending to each case) during the entire treatment processes. . The results showed that the treatment process with respect to the waiting time was too long between the wards “Irradiation cystitis” and “Osteoradionecrosi” sections allocating 7.8 waiting time to themselves. Subsequently, the findings of the research can be used in order to help the hospital administrators and managers to better understand the amount of waiting time spent between different treatment processes in such a way that they can improve the performance of handling patients' demands and needs in a more efficient, effective and timely manner, eventually leading to increased customer satisfaction and better performance.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129091320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A hybrid encryption model for secure cloud computing 用于安全云计算的混合加密模型
Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham
{"title":"A hybrid encryption model for secure cloud computing","authors":"Atewologun Olumide, A. Alsadoon, P. Prasad, L. Pham","doi":"10.1109/ICTKE.2015.7368466","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368466","url":null,"abstract":"Cloud computing provides a convenient way of content trading and sharing. In this paper, we proposed a secure encryption scheme using advanced encryption standard and fully homomorphic encryption in cloud computing. Firstly, this paper will provide current solutions that are available using encryption technology scheme such as asymmetric and symmetric encryption schemes in cloud computing. The solutions will be analyzed and scrutinized based on their features and limitations. Secondly, from the limitations that are available in current solutions, new algorithm provides comprehensive detail on how encryption method can protect user's confidentiality, integrity and privacy from hackers, malware attack and unauthorized users has proposed. Lastly, the model will be test in the cloud environment, compare the result with previous solutions and evaluate the findings. The analysis and comparison results indicate that the proposed scheme has high efficiency and security.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114552177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Image processing for detection of dengue virus based on WBC classification and decision tree 基于白细胞分类和决策树的登革病毒检测图像处理
Sarach Tantikitti, Sompong Tumswadi, W. Premchaiswadi
{"title":"Image processing for detection of dengue virus based on WBC classification and decision tree","authors":"Sarach Tantikitti, Sompong Tumswadi, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368476","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368476","url":null,"abstract":"Dengue is a major health problem in tropical and Asia-Pacific regions which typically spreads rapidly in number of infection patients. Knowing that most of the world's population living in risk areas, in order to diagnose and treat the disease, high skilled experts and human resources are needed. However, in some cases human error potentially may occur. Therefore, in this research we developed a model which can diagnose dengue fever disease. This study used blood smear images that were taken under a digital microscope with 400 × magnification specifications by means of image processing techniques such as color transformation, image segmentation, edge detection feature extraction and white blood cells classification. In this study we used white blood cell counting of the role of cell differentiation as a new feature that can classify dengue viral infections of patients via decision tree methods. The results showed that, the white blood cells classification modeling technique of 167 cell images resulted in 92.2% accuracy while dengue classification modeling technique of 264 blood cell images resulted in 72.3% accuracy.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129406560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Analysis of surgical event logs in a hospital by using heuristics miner technique 应用启发式挖掘技术分析某医院手术事件日志
Wilaiwan Neamsirorat, W. Premchaiswadi
{"title":"Analysis of surgical event logs in a hospital by using heuristics miner technique","authors":"Wilaiwan Neamsirorat, W. Premchaiswadi","doi":"10.1109/ICTKE.2015.7368479","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368479","url":null,"abstract":"The main objective of the research was to analyze and investigate the behavior of the patients and surgeons based on an event log previously collected from a private hospital in Bangkok, Thailand. We applied Heuristics Mining algorithm supported by ProM (as a process mining tool) to discover the extent of the significance metric (i.e., with respect to the relative importance of behaviors) as well as the correlation metric (i.e., with respect to how closely the behaviors are related with each other) amongst of the process instances within the MXML-formatted event log. The results showed that the activity named “Implantation of diaphragmatic pacemaker” was the most significant activity within the event log with a total of 2,903 cased frequency of repetition as a significance metric of 0.999 (i.e., the highest) and a correlation metric of 1358 (i.e., very firm and robust). The findings of the study can be used by hospitals administrators, managers, surgeons and staff in order to benchmark the patients' treatment processes in a more efficient, effective and timely manner.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MXML: Implementation of a web-based application for merging XML documents using XML-SIM MXML:使用XML- sim合并XML文档的基于web的应用程序的实现
Waraporn Viyanon
{"title":"MXML: Implementation of a web-based application for merging XML documents using XML-SIM","authors":"Waraporn Viyanon","doi":"10.1109/ICTKE.2015.7368462","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368462","url":null,"abstract":"This paper presents a design, implementation and evaluation of a web-based application called MergeXML (MXML). MXML was developed to integrate XML documents that are similar in terms of structure and content to complete information which can be used for information retrieval. XML documents are clustered into subtrees representing as instances using leaf-node parents as clustering points. The system finds subtree keys from unique values at leaf-node levels. Subtree keys play an important role for mapping subtrees between two documents. Matched subtrees are merged to complete the information on the base XML document. The result shows that MXML is able to cluster subtrees as proper instances. It can merge additional (different) information to the base XML document. MXML is recommended to run with not too large size of XML documents due to time-out settings on the web server.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130859473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multiscale analysis of heart sound for segmentation using multiscale Hilbert envelope 基于多尺度希尔伯特包络的心音分割多尺度分析
L. Sharma
{"title":"Multiscale analysis of heart sound for segmentation using multiscale Hilbert envelope","authors":"L. Sharma","doi":"10.1109/ICTKE.2015.7368467","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368467","url":null,"abstract":"In this paper a heart sound segmentation algorithm in multiresolution domain is proposed. Wavelet decomposition of heart sound signal grossly segments its components into different subbands. If multiscale Hilbert envelope is computed on reconstructed signals at different scales, it provides suitable markers for first and second heart sound boundaries. The selection of wavelet subband for marker generation is based on analysis of heart sound spectra and energy contribution of wavelet subbands. The heart sound boundaries for S1 and S2 are decided by markers derived from second derivative of Hilbert envelope of the reconstructed subband signal. The proposed method is evaluated using heart sound signal available in the web site of the Department of Medicine, Washington University. The performance of the proposed method is found satisfactory.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123319464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Customer segmentation and visualization by combination of self-organizing map and cluster analysis 结合自组织图和聚类分析的客户细分和可视化
Yohji Kameoka, Keita Yagi, Shohei Munakata, Yoshiro Yamamoto
{"title":"Customer segmentation and visualization by combination of self-organizing map and cluster analysis","authors":"Yohji Kameoka, Keita Yagi, Shohei Munakata, Yoshiro Yamamoto","doi":"10.1109/ICTKE.2015.7368465","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368465","url":null,"abstract":"To perceive the characteristics of customers from market information, it is necessary to aggregate the market information. So, we used a self-organizing map (SOM), arecency, frequency and monetary (RFM) analysis, and other methods to propose the classification of customers. In addition, we propose a visualization of the analysis results. In this study, we consider the combination of cluster analysis and the SOM for further consolidation of small clusters and visualization.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121682535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Visualization of attack and analysis of play affect goal in soccer game 足球比赛中进攻可视化和比赛分析对进球的影响
Hayate Hibi, Yohji Kameoka, Shuichi Uchiyama, Yoshiro Yamamoto
{"title":"Visualization of attack and analysis of play affect goal in soccer game","authors":"Hayate Hibi, Yohji Kameoka, Shuichi Uchiyama, Yoshiro Yamamoto","doi":"10.1109/ICTKE.2015.7368464","DOIUrl":"https://doi.org/10.1109/ICTKE.2015.7368464","url":null,"abstract":"We focus on a visualization of soccer games to show a play leaded a shoot. To visualize attack patterns, it is necessary to reduce paths of attack. The plot is displayed by arrows what show action of ball (pass, shoot and dribbling etc.). And, the plot is separate each attack for that show the track of attack. To show long pass on the summary plot, it become more intuitive. As factorial analysis of goal, we analyze effects of some kind of play. When we analyze effects of the play, factorial analysis can't use all variables. So, we use only especially helpful variables in all variables. Thereby, we make the generalized linear model what use number of the goal as objective variable. In addition, we consider about uniform of attack for each team by the generalized linear model. Moreover, we consider about uniform of higher team and lower team at J. League. In this regard, we consult level of importance for each variable.","PeriodicalId":128925,"journal":{"name":"2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信