{"title":"Analysing the influence of semantic knowledge in natural language generation","authors":"Cristina Barros, Elena Lloret","doi":"10.1109/ICDIM.2017.8244683","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244683","url":null,"abstract":"This paper conducts an evaluation of several traditional Language Models for the task of Natural Language Generation, focusing on the surface realisation stage. Specifically, we analyse and compare the n-gram language models and the factored language models through the evaluation of automatically generated sentences. In this manner, factored language models have shown to be better, improving the coherence of the generated sentences compared with the ones generated with n-grams. Furthermore, factored language models were tested with different lexical and semantic knowledge, leading to more suitable generated sentences in the latter case as well as providing a greater expressive richness.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123986905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weights","authors":"Arif Wicaksono, Sunya Sarapirome","doi":"10.1109/ICDIM.2017.8244678","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244678","url":null,"abstract":"This article delivers result of urban park feasible areas and locations in Bogor Municipality. Six criteria raster maps namely, urban park policy demand, accessibility, population density, distance to school, distance to water body, and distance to electric power line altogether were aggregated using integrated spatial fuzzy DEMATEL (Decision Making Trial and Evaluation Laboratory) and different experts' importance weights. Urban park suitable locations were then superimposed on non-urban area of existing land use map to provide feasible locations. By selecting two classes of urban park suitability, high and very high, the feasible urban park areas and locations were compared. The combined group of experts provide the highest suitable area (19.26 sq km) while government experts and combined all weights provide the most similar areas and locations.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Offline touched cursive script segmentation based on pixel intensity analysis: Character segmentation based on pixel intensity analysis","authors":"A. Rehman","doi":"10.1109/ICDIM.2017.8244641","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244641","url":null,"abstract":"Offline cursive character segmentation refers to extracting individual characters from cursive handwriting on scanned documents. The character recognition accuracy is heavily based on accurate character segmentation. In this process, touched cursive characters segmentation is the main bottleneck towards accuracy rate. This paper presents an efficient technique for offline cursive touched character segmentation based on pixel intensity analysis. Initially, scanned cursive handwriting samples containing touched characters are collected and pre-processed. To avoid processing of the entire image, a region of interest is detected in each collected sample. The region of interest consists of core-region and touched pattern. Finally, based on pixel intensity analysis in the region of interest, a non-linear segmentation path is traced to segment touched cursive pattern into individual characters. The proposed touched cursive character segmentation approach is fully automatic and achieved promising results as compared to other approaches reported in the state of art in most cases.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Code style analytics for the automatic setting of formatting rules in IDEs: A solution to the Tabs vs. Spaces Debate","authors":"Eric Torunski, M. O. Shafiq, A. Whitehead","doi":"10.1109/ICDIM.2017.8244675","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244675","url":null,"abstract":"The use of code style is very important since it conveys meaning as well as intent of source code. Developers are used to reading code according to their preferred style but those guidelines of proper style vary among software teams, and even different companies. Code style decisions are typically made by managers of software developers, but we would like to investigate how common the different variations of code style are. There are also automated tools to convert code style in a file, however the tools must be configured manually. In this paper, we present a tool for the collection and analysis of code style metrics. We demonstrate the feasibility of scanning existing source code to automatically generate the code style rules for existing tools. We also look at the results of our data mining to look at trends in source code. We perform a quantitative analysis on source code for questions like: How many functions are in a class, on average? How many lines of code are in a method, on average? We also present graphs of the distribution of these data, as well look at special cases of outliers.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114820760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100:2011","authors":"A. C. Nwaeze, P. Zavarsky, Ron Ruhl","doi":"10.1109/ICDIM.2017.8244644","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244644","url":null,"abstract":"Due to various reasons, only few researchers focused their investigations on the current status of information security and privacy protection of e-Government services in Africa. This paper attempts to partially fill the gap by reporting on the compliance evaluation of privacy protection in e-Government systems in the countries of Anglophone West Africa, namely in Ghana, Nigeria, Liberia, Sierra Leone and Gambia. In the countries, e-Government services have become one of the most important and efficient means by which government interacts with citizens. The ways to facilitate information privacy protection in e-Government systems of a given country include enactment of a comprehensive information privacy regulation. The regulation serves as a legal framework that considers internationally accepted privacy protection principles, such as those of the ISO/IEC 29100:2011, and applicable guidelines of the U.S. NIST SP 800–53 Rev.4. In this paper, the privacy principles of the ISO/IEC 29100:2011 serve as a baseline for evaluation of the content of privacy protection regulations of the Anglophone West African countries. The paper also reports results of a passive security reconnaissance performed on selected e-Government websites. While the paper acknowledges recent progresses made in the area of privacy protection in the countries of Anglophone West Africa, recommendations are provided to mitigate the identified gaps.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121756415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. D. Oliveira, Peron R. de Sousa, Antonio A. Rocha, P. B. Velloso
{"title":"Transparent mobility or devices on the Internet using OpenFlow","authors":"G. D. Oliveira, Peron R. de Sousa, Antonio A. Rocha, P. B. Velloso","doi":"10.1109/ICDIM.2017.8244686","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244686","url":null,"abstract":"In the last years the number of mobile devices connected to the Internet has experienced a significant growth. However, efficient mobility management is still a challenge, specially if we consider minimal changes in the core network and in the user's applications. Therefore, in this paper, we propose a mobility management scheme for the Internet, which the key idea consists of bringing to the edge of the network all the complexity related to mobility. Thus, our proposal not only avoid changing the code of existing applications, but we also avoid any change in the core of the network, as required by other solutions based on virtualization or content centric networks. Our scheme uses an Software-Defined Networking (SDN) controller to manage a Global Name Service (GNS) to keep track of the location of nodes. We implement our mobility management scheme and evaluate its performance.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126254182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stock prices fluctuation analysis of food companies after the Great East-Japan Earthquake: Application of random matrix theory","authors":"K. Yamaguchi, Y. Shirota","doi":"10.1109/ICDIM.2017.8244659","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244659","url":null,"abstract":"Just after the Great East-Japan Earthquake in Fukushima on March 11th, 2011, in many Japanese companies, stock prices were declining. However, on the other hand, some companies' stock prices rose owing to the emergency demands of the earthquake. When we have been conducting the stock price fluctuations, we found the special pattern of a growth by the emergency demand of food companies. The companies are Otsuka Holdings, Toyo Suisan, and Nisshin Food Holdings. The companies produce emergency food such as pot noodles and CalorieMate. We infer that the rapid growth of the demand for the emergency food let the stock price risen. We analyze the stock prices using the Random Matrix Theory. The main part of the method is Singular Value Decomposition. We extract eigenvectors which are principle components of the time series data. In our analysis method, first we start at the landmark company and then using the company we in turn find other companies which have similar movement to the start company. In this paper, we shall describe the extracting approach of the special growth companies.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125635885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen
{"title":"Analysis of criminal behaviors for suspect vehicle detection","authors":"Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen","doi":"10.1109/ICDIM.2017.8244645","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244645","url":null,"abstract":"The crime problems become critical issues for national security especially the security of border and intelligent transportation systems (ITSs). These affect the economy, investment, tourism, and society. As a result, the automatic suspect vehicle detection emerges as one of effective tools to tackle the problems. However, the traditional process normally uses criminal vehicle data in blacklist comparing with vehicle data gathering from various sensors. This comparison is not effective and accurate that might be from not up-to-date data in the blacklist. Sometimes the blacklist is not available. This paper proposes the criminal behavior analysis method to detect suspect vehicles that are potentially involved in criminal activity. It must not rely on the blacklist. The analysis is conditional on journey path and the involvement of criminal activities. In additional, public officials believe that the suspect vehicle will choose the journey path without a checkpoint. Therefore, we used the journey path analysis techniques together with the association rule mining to analyze such criminal behavior. From extensive experiments, the results show that the proposed method can increase the suspect detection accuracy rate 17.24% beyond the traditional counterpart.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127926598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining affordance-based substitution rules: A dynamic taxonomy approach","authors":"Rupal Sethi, B. Shekar","doi":"10.1109/ICDIM.2017.8244647","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244647","url":null,"abstract":"Association Rule Mining literature has so far focused on generating and pruning positive rules using various metrics of interestingness. However, there are very few studies that explore the mining process of substitution rules. These studies have incorporated limited definition of substitution, either in statistical terms or based on manager's static knowledge. Here we attempt to provide a customer-centric model of substitution rule mining using the lens of affordance. We adopt the approach of a dynamic taxonomy wherein items are positioned based on the affordances they are purchased for. This arrangement contrasts with the traditional static taxonomy approach that highlights manager's static knowledge. We develop an Expected-Actual Substitution Framework to compare relatedness between items in the static and dynamic taxonomies. We also propose the ABS (Affordance Based Substitution) algorithm to mine substitution rules. We come up with a novel interestingness measure to enhance the quality of our substitution rules for effective knowledge discovery. Empirical analyses are performed to show the efficacy of ABS algorithm. This is done with the help of a real-life supermarket dataset. We compare the generated rules with those generated by a classic substitution rule mining algorithm from the literature. Our results show that substitution rules generated through ABS algorithm capture customer perceptions that are generally missed by alternate approaches.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114826572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon
{"title":"Mobile search engine for medicine information on smartphone","authors":"H. Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon","doi":"10.1109/ICDIM.2017.8244695","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244695","url":null,"abstract":"Recently, Most Thai people are experiencing problems with self-medication and they don't know the right information because of in Thailand, the people often the self-medication and buy non-prescription medicines. The manual selection may not be accurate according to the sickness. This paper presents the mobile search engine for medicine information on smartphone. This application has been developed to give about the medicines information for general users. The application function is divided into two searching techniques: searching from type of medicine and searching from sickness. The type of medicine can be divided into four categories: dangerous medicine, special controlled medicine, household medicine and common medicine. This paper presents the design and implementation by using Android Studio. The results show that the application can search medicine name include the name of sickness, property, warning, and using of medicine.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}