2018 International Conference on Information Technology (InCIT)最新文献

筛选
英文 中文
[Copyright notice] (版权)
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/incit.2018.8584859
{"title":"[Copyright notice]","authors":"","doi":"10.23919/incit.2018.8584859","DOIUrl":"https://doi.org/10.23919/incit.2018.8584859","url":null,"abstract":"","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129362158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Product Recommendation using Image and Text Processing 使用图像和文本处理的产品推荐
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584860
Khanabhorn Kawattikul
{"title":"Product Recommendation using Image and Text Processing","authors":"Khanabhorn Kawattikul","doi":"10.23919/INCIT.2018.8584860","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584860","url":null,"abstract":"Production recommendation systems allow users to review other information that are relating to the product that they are interested in. The fundament of this problem in computer and technology perspective is to how extract information from the product that can be used for matching the related products. This work presents a technique that integrates information from production images and the description of the product (text format) to match a set of products collected in a databased. The matching will be used as the product recommendation system. Shape-based representation is extracted from the image. This includes HOG, Shape Context and Hu Moments. The description of the product is embedded by the information presented using LSTM technique. Integration between image and text information is performed using a simple weighting technique. The matching id carried out using cosine similarity measurement. The data is collected from online stores. The experimental results show that the proposed technique gives promising results.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130306013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet 通过重新配置ECU和禁用攻击包来缓解车载网络入侵的机制
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584882
Hyeokchan Kwon, Sokjoon Lee, Jungyong Choi, Byung-ho Chung
{"title":"Mitigation mechanism against in-vehicle network intrusion by reconfiguring ECU and disabling attack packet","authors":"Hyeokchan Kwon, Sokjoon Lee, Jungyong Choi, Byung-ho Chung","doi":"10.23919/INCIT.2018.8584882","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584882","url":null,"abstract":"As the connectivity of vehicles grows and becomes more intelligent, security threats are also increasing. In fact, hacking of vehicles such as Jeep Cherokee (2014), Mitsubishi Outlander (2016) and Tesla model S (2016 and 2017) has been reported. Currently, various intrusion detection solutions are emerging in order to defend the cyber-attacks of vehicles, but up to now, the response to detection has remained at the ex post countermeasure level. In this paper, we propose a mitigation mechanism to cope with an attack on a vehicular internal network. The proposed mechanism reconfigures ECUs and disables attack packets to mitigate damage to network intrusions.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"581 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fair Payoffs Distribution in Linear Production Game by Shapley Value 基于Shapley值的线性生产博弈中的公平收益分配
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584872
Benjawan Intara, Chattrakul Sombattheera
{"title":"Fair Payoffs Distribution in Linear Production Game by Shapley Value","authors":"Benjawan Intara, Chattrakul Sombattheera","doi":"10.23919/INCIT.2018.8584872","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584872","url":null,"abstract":"Shapley value is regarded as a fair payoff distribution concept for cooperative agents. While traditional cooperative game assume superadditivity and non-externalty, real world environments do not hold this assumption. We show that in linear production game, the environment is non-superadditive is with externalties. In such environment, grand coalition does not provide optimal solution to the system. Consequently, applying traditional shapley value does not provide an attractive payoff to agents. In addition, fairness may also be lost because individual payoffs are less than singleton coalition values. We show how this environments may occur and how we can propose a more attractive and, still, fair payoffs to agents.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125779770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Crowd Simulation in Large Space Urban 大空间城市的人群模拟
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584878
Panich Sudkhot, Chattrakul Sombattheera
{"title":"A Crowd Simulation in Large Space Urban","authors":"Panich Sudkhot, Chattrakul Sombattheera","doi":"10.23919/INCIT.2018.8584878","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584878","url":null,"abstract":"We present a multiagent-based framework for crowd simulation in large space urban area on a standalone PC. We use Belief-Desire-Intention (BDI) for modeling individual agent behavior. We use RVO for handling a large number of agents. The simulation engine is Unity3d which also take care of the visualization. We experimented our framework with up to 20,000 agents, navigating them from origins to destinations. We found that we can navigate agents successfully. The execution time increases when the number of agent increase. The visualization becomes slow when the number of agent is higher than 1000 agents. We found that the the simulation steps also increases when the number of agent is not higher than 5005.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"47 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113990412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assembling Relevant Bug Report using the Constraint-based k-means Clustering 使用基于约束的k-means聚类方法汇编相关Bug报告
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584866
B. Luaphol, Boonchoo Srikudkao, J. Polpinij, M. Kaenampornpan
{"title":"Assembling Relevant Bug Report using the Constraint-based k-means Clustering","authors":"B. Luaphol, Boonchoo Srikudkao, J. Polpinij, M. Kaenampornpan","doi":"10.23919/INCIT.2018.8584866","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584866","url":null,"abstract":"Bug reports provide an important information for improving software quality. Today, many bug tracking systems (BTS) such as Bugzilla, Jira, Mantis, and Trac are developed for collecting bug reports from users around the world. Unfortunately, many tasks on the BTS are still performed manually by bug triagers. The process is time consuming and errors prone. Although many studies on bug reports have been proposed, the problems may have never been truly investigated. It is the problem of bug dependency which is when an unfixed bug‘a’ affects bug ‘b’. As a result, bug‘b cannot be fixed if bug ‘a’ is not fixed. To address this problem, the relevant bug reports must be assigned to the same specific category in order to help the developers recognize all bugs that are indicating to the same problem domain. Bug dependency is a time-consuming and labor-intensive process. This is a challenge issue. Therefore, this work aims to present a method for assembling the relevant bug reports into specific clusters by the modifiedk-mean clustering algorithm, called the constraint-based k-means clustering. Furthermore, three weighting methods oftf, tf-idf, and BM25 are compared. After testing by recall, precision, andF-measure, the results reveal good score in precision but the recall score should be improved. The method withtf returns the better results than tf-idf and BM25 methods because tf method is based on the local weight that has paid towards a specific cluster-oriented.ster-oriented.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130596304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Stroke by Combination of Sequence Pattern Mining and Associative Classification 结合序列模式挖掘和关联分类预测中风
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584879
Sujitra Nasingkhun, P. Songram
{"title":"Predicting Stroke by Combination of Sequence Pattern Mining and Associative Classification","authors":"Sujitra Nasingkhun, P. Songram","doi":"10.23919/INCIT.2018.8584879","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584879","url":null,"abstract":"Stroke is a medical emergency that needs immediate medical attention. It is the third cause of death in the world and is the first cause of death of elderly women in Thailand. Stroke needs to be predicted in order to prevent people from the disease and to prepare proper medical treatments for the patients. A number of research works tried to study factors, such as blood pressure, smoking, and cholesterol, for predicting stroke. Unlike the previous works, the association of disease sequence is combined with factors for predicting stroke in this paper. The association is represented in the form of class sequential rules which demonstrate the association of diseases and factors leading to stroke. The combination of sequential pattern mining and associative classification is proposed as a method for generating class sequential rules. The experimental results show that the proposed technique gives high performance for the prediction. In addition, this paper shows top ten association of the disease and factors leading to stroke.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132304025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Input Pattern of Color Distribution Information for Reduced-Reference Image Quality Assessment via Circular Extreme Learning Machine 一种基于圆形极限学习机的彩色分布信息输入模式用于减少参考图像质量评估
2018 International Conference on Information Technology (InCIT) Pub Date : 2018-10-01 DOI: 10.23919/INCIT.2018.8584862
Sarutte Atsawaraungsuk
{"title":"A New Input Pattern of Color Distribution Information for Reduced-Reference Image Quality Assessment via Circular Extreme Learning Machine","authors":"Sarutte Atsawaraungsuk","doi":"10.23919/INCIT.2018.8584862","DOIUrl":"https://doi.org/10.23919/INCIT.2018.8584862","url":null,"abstract":"The Image Quality Assessment system based on Color Distribution Information (IQA-CDI) uses descriptors based on the color correlogram in analyzing the distortion types and quality score, for Reduced-Reference (RR) data. IQA-CDI with RR data can predict the perceived image quality scores for real-time digital broadcasting. IQA-CDI is supported image quality prediction by the ensemble of learning machines. However, using the ensemble of learning machine in IQA-CDI may spend much time to data training process that do not suitable for real-time situations. Therefore, our research aims to decrease data training time of IQA-CDI by adapting the input features pattern for reducing the ensemble size. The experimental result shows that a new input features pattern and the reducing ensemble size can reduce processing time, while has the performance comparable to original IQA-CDI.","PeriodicalId":144271,"journal":{"name":"2018 International Conference on Information Technology (InCIT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128852226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信