2017 Twelfth International Conference on Digital Information Management (ICDIM)最新文献

筛选
英文 中文
Analysing the influence of semantic knowledge in natural language generation 分析语义知识对自然语言生成的影响
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244683
Cristina Barros, Elena Lloret
{"title":"Analysing the influence of semantic knowledge in natural language generation","authors":"Cristina Barros, Elena Lloret","doi":"10.1109/ICDIM.2017.8244683","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244683","url":null,"abstract":"This paper conducts an evaluation of several traditional Language Models for the task of Natural Language Generation, focusing on the surface realisation stage. Specifically, we analyse and compare the n-gram language models and the factored language models through the evaluation of automatically generated sentences. In this manner, factored language models have shown to be better, improving the coherence of the generated sentences compared with the ones generated with n-grams. Furthermore, factored language models were tested with different lexical and semantic knowledge, leading to more suitable generated sentences in the latter case as well as providing a greater expressive richness.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights 基于多空间准则和多专家权重的城市公园面积可行性分析
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244678
Arif Wicaksono, Sunya Sarapirome
{"title":"Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights","authors":"Arif Wicaksono, Sunya Sarapirome","doi":"10.1109/ICDIM.2017.8244678","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244678","url":null,"abstract":"This article delivers result of urban park feasible areas and locations in Bogor Municipality. Six criteria raster maps namely, urban park policy demand, accessibility, population density, distance to school, distance to water body, and distance to electric power line altogether were aggregated using integrated spatial fuzzy DEMATEL (Decision Making Trial and Evaluation Laboratory) and different experts' importance weights. Urban park suitable locations were then superimposed on non-urban area of existing land use map to provide feasible locations. By selecting two classes of urban park suitability, high and very high, the feasible urban park areas and locations were compared. The combined group of experts provide the highest suitable area (19.26 sq km) while government experts and combined all weights provide the most similar areas and locations.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Offline touched cursive script segmentation based on pixel intensity analysis: Character segmentation based on pixel intensity analysis 基于像素强度分析的离线触摸草书分割:基于像素强度分析的字符分割
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244641
A. Rehman
{"title":"Offline touched cursive script segmentation based on pixel intensity analysis: Character segmentation based on pixel intensity analysis","authors":"A. Rehman","doi":"10.1109/ICDIM.2017.8244641","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244641","url":null,"abstract":"Offline cursive character segmentation refers to extracting individual characters from cursive handwriting on scanned documents. The character recognition accuracy is heavily based on accurate character segmentation. In this process, touched cursive characters segmentation is the main bottleneck towards accuracy rate. This paper presents an efficient technique for offline cursive touched character segmentation based on pixel intensity analysis. Initially, scanned cursive handwriting samples containing touched characters are collected and pre-processed. To avoid processing of the entire image, a region of interest is detected in each collected sample. The region of interest consists of core-region and touched pattern. Finally, based on pixel intensity analysis in the region of interest, a non-linear segmentation path is traced to segment touched cursive pattern into individual characters. The proposed touched cursive character segmentation approach is fully automatic and achieved promising results as compared to other approaches reported in the state of art in most cases.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Code style analytics for the automatic setting of formatting rules in IDEs: A solution to the Tabs vs. Spaces Debate ide中自动设置格式规则的代码风格分析:制表符与空格之争的解决方案
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244675
Eric Torunski, M. O. Shafiq, A. Whitehead
{"title":"Code style analytics for the automatic setting of formatting rules in IDEs: A solution to the Tabs vs. Spaces Debate","authors":"Eric Torunski, M. O. Shafiq, A. Whitehead","doi":"10.1109/ICDIM.2017.8244675","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244675","url":null,"abstract":"The use of code style is very important since it conveys meaning as well as intent of source code. Developers are used to reading code according to their preferred style but those guidelines of proper style vary among software teams, and even different companies. Code style decisions are typically made by managers of software developers, but we would like to investigate how common the different variations of code style are. There are also automated tools to convert code style in a file, however the tools must be configured manually. In this paper, we present a tool for the collection and analysis of code style metrics. We demonstrate the feasibility of scanning existing source code to automatically generate the code style rules for existing tools. We also look at the results of our data mining to look at trends in source code. We perform a quantitative analysis on source code for questions like: How many functions are in a class, on average? How many lines of code are in a method, on average? We also present graphs of the distribution of these data, as well look at special cases of outliers.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100:2011 基于ISO/IEC 29100:2011的西非英语国家电子政务系统信息隐私保护合规性评估
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244644
A. C. Nwaeze, P. Zavarsky, Ron Ruhl
{"title":"Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100:2011","authors":"A. C. Nwaeze, P. Zavarsky, Ron Ruhl","doi":"10.1109/ICDIM.2017.8244644","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244644","url":null,"abstract":"Due to various reasons, only few researchers focused their investigations on the current status of information security and privacy protection of e-Government services in Africa. This paper attempts to partially fill the gap by reporting on the compliance evaluation of privacy protection in e-Government systems in the countries of Anglophone West Africa, namely in Ghana, Nigeria, Liberia, Sierra Leone and Gambia. In the countries, e-Government services have become one of the most important and efficient means by which government interacts with citizens. The ways to facilitate information privacy protection in e-Government systems of a given country include enactment of a comprehensive information privacy regulation. The regulation serves as a legal framework that considers internationally accepted privacy protection principles, such as those of the ISO/IEC 29100:2011, and applicable guidelines of the U.S. NIST SP 800–53 Rev.4. In this paper, the privacy principles of the ISO/IEC 29100:2011 serve as a baseline for evaluation of the content of privacy protection regulations of the Anglophone West African countries. The paper also reports results of a passive security reconnaissance performed on selected e-Government websites. While the paper acknowledges recent progresses made in the area of privacy protection in the countries of Anglophone West Africa, recommendations are provided to mitigate the identified gaps.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121756415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transparent mobility or devices on the Internet using OpenFlow 透明移动或设备在互联网上使用OpenFlow
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244686
G. D. Oliveira, Peron R. de Sousa, Antonio A. Rocha, P. B. Velloso
{"title":"Transparent mobility or devices on the Internet using OpenFlow","authors":"G. D. Oliveira, Peron R. de Sousa, Antonio A. Rocha, P. B. Velloso","doi":"10.1109/ICDIM.2017.8244686","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244686","url":null,"abstract":"In the last years the number of mobile devices connected to the Internet has experienced a significant growth. However, efficient mobility management is still a challenge, specially if we consider minimal changes in the core network and in the user's applications. Therefore, in this paper, we propose a mobility management scheme for the Internet, which the key idea consists of bringing to the edge of the network all the complexity related to mobility. Thus, our proposal not only avoid changing the code of existing applications, but we also avoid any change in the core of the network, as required by other solutions based on virtualization or content centric networks. Our scheme uses an Software-Defined Networking (SDN) controller to manage a Global Name Service (GNS) to keep track of the location of nodes. We implement our mobility management scheme and evaluate its performance.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126254182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stock prices fluctuation analysis of food companies after the Great East-Japan Earthquake: Application of random matrix theory 东日本大地震后食品企业股价波动分析:随机矩阵理论的应用
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244659
K. Yamaguchi, Y. Shirota
{"title":"Stock prices fluctuation analysis of food companies after the Great East-Japan Earthquake: Application of random matrix theory","authors":"K. Yamaguchi, Y. Shirota","doi":"10.1109/ICDIM.2017.8244659","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244659","url":null,"abstract":"Just after the Great East-Japan Earthquake in Fukushima on March 11th, 2011, in many Japanese companies, stock prices were declining. However, on the other hand, some companies' stock prices rose owing to the emergency demands of the earthquake. When we have been conducting the stock price fluctuations, we found the special pattern of a growth by the emergency demand of food companies. The companies are Otsuka Holdings, Toyo Suisan, and Nisshin Food Holdings. The companies produce emergency food such as pot noodles and CalorieMate. We infer that the rapid growth of the demand for the emergency food let the stock price risen. We analyze the stock prices using the Random Matrix Theory. The main part of the method is Singular Value Decomposition. We extract eigenvectors which are principle components of the time series data. In our analysis method, first we start at the landmark company and then using the company we in turn find other companies which have similar movement to the start company. In this paper, we shall describe the extracting approach of the special growth companies.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of criminal behaviors for suspect vehicle detection 犯罪行为分析用于嫌疑车辆侦查
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244645
Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen
{"title":"Analysis of criminal behaviors for suspect vehicle detection","authors":"Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen","doi":"10.1109/ICDIM.2017.8244645","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244645","url":null,"abstract":"The crime problems become critical issues for national security especially the security of border and intelligent transportation systems (ITSs). These affect the economy, investment, tourism, and society. As a result, the automatic suspect vehicle detection emerges as one of effective tools to tackle the problems. However, the traditional process normally uses criminal vehicle data in blacklist comparing with vehicle data gathering from various sensors. This comparison is not effective and accurate that might be from not up-to-date data in the blacklist. Sometimes the blacklist is not available. This paper proposes the criminal behavior analysis method to detect suspect vehicles that are potentially involved in criminal activity. It must not rely on the blacklist. The analysis is conditional on journey path and the involvement of criminal activities. In additional, public officials believe that the suspect vehicle will choose the journey path without a checkpoint. Therefore, we used the journey path analysis techniques together with the association rule mining to analyze such criminal behavior. From extensive experiments, the results show that the proposed method can increase the suspect detection accuracy rate 17.24% beyond the traditional counterpart.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mining affordance-based substitution rules: A dynamic taxonomy approach 挖掘基于可视性的替代规则:一种动态分类法方法
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244647
Rupal Sethi, B. Shekar
{"title":"Mining affordance-based substitution rules: A dynamic taxonomy approach","authors":"Rupal Sethi, B. Shekar","doi":"10.1109/ICDIM.2017.8244647","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244647","url":null,"abstract":"Association Rule Mining literature has so far focused on generating and pruning positive rules using various metrics of interestingness. However, there are very few studies that explore the mining process of substitution rules. These studies have incorporated limited definition of substitution, either in statistical terms or based on manager's static knowledge. Here we attempt to provide a customer-centric model of substitution rule mining using the lens of affordance. We adopt the approach of a dynamic taxonomy wherein items are positioned based on the affordances they are purchased for. This arrangement contrasts with the traditional static taxonomy approach that highlights manager's static knowledge. We develop an Expected-Actual Substitution Framework to compare relatedness between items in the static and dynamic taxonomies. We also propose the ABS (Affordance Based Substitution) algorithm to mine substitution rules. We come up with a novel interestingness measure to enhance the quality of our substitution rules for effective knowledge discovery. Empirical analyses are performed to show the efficacy of ABS algorithm. This is done with the help of a real-life supermarket dataset. We compare the generated rules with those generated by a classic substitution rule mining algorithm from the literature. Our results show that substitution rules generated through ABS algorithm capture customer perceptions that are generally missed by alternate approaches.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile search engine for medicine information on smartphone 在智能手机上搜索医药信息的移动搜索引擎
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244695
H. Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon
{"title":"Mobile search engine for medicine information on smartphone","authors":"H. Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon","doi":"10.1109/ICDIM.2017.8244695","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244695","url":null,"abstract":"Recently, Most Thai people are experiencing problems with self-medication and they don't know the right information because of in Thailand, the people often the self-medication and buy non-prescription medicines. The manual selection may not be accurate according to the sickness. This paper presents the mobile search engine for medicine information on smartphone. This application has been developed to give about the medicines information for general users. The application function is divided into two searching techniques: searching from type of medicine and searching from sickness. The type of medicine can be divided into four categories: dangerous medicine, special controlled medicine, household medicine and common medicine. This paper presents the design and implementation by using Android Studio. The results show that the application can search medicine name include the name of sickness, property, warning, and using of medicine.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信