2017 Twelfth International Conference on Digital Information Management (ICDIM)最新文献

筛选
英文 中文
Analysis based on Japanese accented English characteristics categories for objective evaluation 基于对日本口音英语特征分类的分析进行客观评价
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244693
H. Tsubaki
{"title":"Analysis based on Japanese accented English characteristics categories for objective evaluation","authors":"H. Tsubaki","doi":"10.1109/ICDIM.2017.8244693","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244693","url":null,"abstract":"Aiming at objective evaluation of L2 (second language) learners' proficiency, mispronunciation characteristics of Japanese learners' English speech were analyzed based on phonetic knowledge. Through automatic forced alignment using a speech recognition tool kit, phone deletion, substitution and insertion were detected by substituting the pronunciation dictionary reflecting learners' phonetic error characteristics. For phonetic knowledge, typical mispronunciations, vowel insertion, vowel substitution and consonant omission and substitution were taken into account. These mispronunciation-pattern statistics were analyzed using correlation and segmented linear regression analysis method. The statistics showed consistent error characteristics along the learners' subjective evaluation scores and correlation relationship to the evaluation scores. Break points from the segmented linear regression analysis illustrated difference in the mispronunciations between vowel and consonant. Differential between the obtained break point and each learner's score in the subjective evaluation scores was thought as measurement of the learner's mispronunciation correctness and non-correctness. The correlation value of 0.511 was obtained between actual and estimated differential value by a multiple linear regression analysis, using the mispronunciation statistics as parameters.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130439608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved algorithm for transmission in heterogeneous cellular networks 异构蜂窝网络中一种改进的传输算法
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244692
Yao-Liang Chung
{"title":"An improved algorithm for transmission in heterogeneous cellular networks","authors":"Yao-Liang Chung","doi":"10.1109/ICDIM.2017.8244692","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244692","url":null,"abstract":"This paper presents improvements to a coverage algorithm that we previously proposed for use in heterogeneous cellular networks, with the improved algorithm being referred to as the modified coverage algorithm. The modified coverage algorithm maintains the coverage advantages provided by the previous coverage algorithm; that is, users can be covered by the network in any scenario and unnecessary power consumption can be avoided through the use of the algorithm. The modified coverage algorithm also mitigates the sole disadvantage of the previous coverage algorithm, that is, its inability to meet users' transmission rate requirements, instead ensuring that the respective transmission rate requirements of all users can be typically met. According to the simulation results, compared with the previous coverage algorithm, the modified coverage algorithm improves the average transmission rate significantly (especially when the traffic volume is low) at the small expense of a slightly increased outage ratio under high traffic volumes; however, based on our design, the users who face an increase in the outage ratio are of lower priority. As a result, the system's overall performance is at an acceptable level.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133157108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination 基于集成分类器和递归特征消去的计算机病毒二进制码分类
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244670
Prasit Usaphapanus, K. Piromsopa
{"title":"Classification of computer viruses from binary code using ensemble classifier and recursive feature elimination","authors":"Prasit Usaphapanus, K. Piromsopa","doi":"10.1109/ICDIM.2017.8244670","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244670","url":null,"abstract":"This paper proposes a supervised machine learning model for detecting (unseen) viruses files. Our main focus is on static analysis approach. To find the best method, we experiment with difference types of feature extraction and three classifier algorithms including extreme gradient boosting, random forest and multilayer perceptron. Our data set contains 6,319 executable files. Each file is extracted with objdump and sorted with TF-IDF score to find best features. The F1 score shows slightly better performance than those of the baselines. Random forest with 20 attributes yields 0.9379758 F1 score which is 0.0316167 more than that of the baseline. The extreme gradient boosting method with 500 attributes achieve 0.9628991 F1 score, 0.0418642 more than that of the baseline. We conclude that our approach can improve the precision and recall of the classification.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117140625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
National servey of Japanese universities on computing education: Analysis of IT education for high school teacher license on IT 日本大学计算机教育的国家服务:对高中教师IT教育的分析
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244669
K. Sumi, T. Kakeshita
{"title":"National servey of Japanese universities on computing education: Analysis of IT education for high school teacher license on IT","authors":"K. Sumi, T. Kakeshita","doi":"10.1109/ICDIM.2017.8244669","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244669","url":null,"abstract":"We conducted the first national survey of computing education at Japanese universities in 2016. In this paper, we report the survey result of the computing education to obtain high school teacher license on IT. The survey covers various aspects of computing education including program organization, quality and quantity of educational achievement, students, teaching staff and computing environment. We collected 338 answers through the survey which cover 65% of the departments having teacher license course on IT. Many of the responded departments also provide computing education majored in computing discipline. Although 5,006 students are enrolled in the computing education for the license, only 369 students obtain the license since very few are employed at a high school. Most of the teacher license holders on computing subject also obtain high school teacher license of other subject in order to get a job as a high school teacher.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of opinion leader on rumor spreading in online social network Twitter using edge weighting and centrality measure weighting 利用边缘加权和中心性度量加权识别社交网络Twitter谣言传播的意见领袖
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244680
Fatia Kusuma Dewi, S. Yudhoatmojo, I. Budi
{"title":"Identification of opinion leader on rumor spreading in online social network Twitter using edge weighting and centrality measure weighting","authors":"Fatia Kusuma Dewi, S. Yudhoatmojo, I. Budi","doi":"10.1109/ICDIM.2017.8244680","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244680","url":null,"abstract":"Rumor spreading has been an essential issue for society. One of the platforms for rumor spreading is Twitter. Finding the opinion leader of its issue is also important in order to know who are users whom have a high impact of bringing the issue. So we can give the suggestion to the law authority to give the right authorization afterward. Opinion leader can be found using centrality measure metric on social network analysis study. This study has node and edge as its property. For recent years, there are many conducted researches about centrality measure. Some of them are combining some centrality measures together. Aside from defining the centrality measure, defining the edge is also important. Twitter has a different kind of relationships that can be turned into an edge, but not all the relationships have the same impact for spreading the rumor. This study conduct two experiments, first experiment is edge weighting. This experiment is aimed to see the importance of each defined edge type for finding the opinion leader. The second experiment is centrality weighting. This experiment is aimed to see the weight that could give more accurate opinion leader based on other evaluation algorithms. The study found the edge that has the ability to spread to wider audience (quote, retweet, and reply) tend to have a bigger impact for finding opinion leader than mention relationship. The study also finds that a low in-degree weight, high betweenness weight, and low or no PageRank weight could give 100% agreement upon other evaluation algorithms for finding the opinion leader.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126944657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A dynamic identity end-to-end authentication key exchange protocol for IoT environments 面向物联网环境的动态身份端到端认证密钥交换协议
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244673
Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu
{"title":"A dynamic identity end-to-end authentication key exchange protocol for IoT environments","authors":"Chien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu","doi":"10.1109/ICDIM.2017.8244673","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244673","url":null,"abstract":"Wearable devices are the most frequently used personal devices, in ail of wearable devices, the smart phones are the most popular and rapid development. The evolution of wearable devices such as smartphones will accelerate the development of Internet of Things (IoT). Furthermore, user can use the IoT services easily through the smartphone or wearing device. However, if the communication between the wearable device and other devices does not have enough access control and information protect, it may cause some problems, such as the data may be stolen and modified. In this paper, we presented an end-to-end authenticated key exchange agreement for wearable devices in IoT environments. The protocol can satisfy some properties of key exchange agreement and be used with wearable devices in IoT environments.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131403076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SCTP-based service migration for VOD service 基于sctp的VOD业务迁移
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244688
Chin-Shiuh Shieh, Hao-Xiang Gu, J. Yan, M. Horng
{"title":"SCTP-based service migration for VOD service","authors":"Chin-Shiuh Shieh, Hao-Xiang Gu, J. Yan, M. Horng","doi":"10.1109/ICDIM.2017.8244688","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244688","url":null,"abstract":"Numerous services have been proposed, developed and deployed as the Internet got popularized. Among others, Video-On-Demand (VOD) service has received considerable attention due to its role as a new media. As mobile IP technology getting mature, users can have access to the Internet anywhere, anytime, and on the move. However, the Quality of Service (QoS) will degrade as a mobile client moves farther away from its server. This article pioneers the concept of Service Migration, with which an ongoing service will be migrated from a distant server to a new proximity server. Both individual user and the whole network environment will benefit from service migration. Service migration can be implemented at different protocol layers. This paper reports our experience in the design and implement of SCTP-based service migration. Featuring multistreaming and multi-homing, Stream Control Transmission Protocol (SCTP) is an excellent candidate for the implement of service migration. With SCTP, seamless service migration can be achieved as reported in this study.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114634847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On cleaning and organizing context logs for mobile user profiling 关于清理和组织移动用户分析的上下文日志
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244687
Ming-Yi Zheng, Hung-Yuan Chen, Huan Chen, Yao-Chung Fan
{"title":"On cleaning and organizing context logs for mobile user profiling","authors":"Ming-Yi Zheng, Hung-Yuan Chen, Huan Chen, Yao-Chung Fan","doi":"10.1109/ICDIM.2017.8244687","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244687","url":null,"abstract":"Mining data generated by mobile devices has drawn significant research attention in recent years. In this study, we investigate using text viewed, clicked, or entered into a mobile device to discover user preferences. We refer such I/O text as context text data, which will be a rich data source for bringing new opportunities for future mobile applications, such as understanding mobile users' preference and intention. However, unstructured context text data from various apps is with various information types and with noises. Aiming at this issue, in this study, we propose to organize the raw logs into behavior units based on text content similarity to address the issue of processing noisy, unstructured context logs. Experiments with data collected from real users are conducted to evaluate the performance of the proposed framework and the experiment results demonstrate the effectiveness of our framework.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"730 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133568164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Syntactic role identification of mathematical expressions 数学表达式的句法角色识别
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244676
Xing Wang, Jason Lin, Ryan Vrecenar, Jyh-Charn S. Liu
{"title":"Syntactic role identification of mathematical expressions","authors":"Xing Wang, Jason Lin, Ryan Vrecenar, Jyh-Charn S. Liu","doi":"10.1109/ICDIM.2017.8244676","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244676","url":null,"abstract":"This paper presents a prediction algorithm to infer the syntactic role (SR) of mathematical expressions (ME), or SRme, in ME-plaintext mixed sentences. SRme is a predicted syntax label of ME, which could be integrated into any constituent parser to improve their accuracy in sentence parsing. SRME is based upon three features of ME placement in a sentence: properness of Sentence structure (feature F3), properties of ME (feature F2), and PoS of the Local neighbor plain text (feature F1). An inside-outside inspired algorithm is proposed for SRME by maximizing the probability of a relaxed parsing tree. Features in F2 was found to fit into both exponential and Poisson distributions, which could fuse with other features to re-weight the prediction rule that improves the prediction precision for SRme as a noun phrase (noun modifier) by 3.6% (18.7%). F1, F2, and F3 were found to complement each other. Significant discriminative patterns on the part-of-speech (PoS) of the neighbor plaintext are adopted to build a Naïve Bayesian classifier, which is fused with the F3 baseline that improved the precision of the prediction of SRme as a sentence by 10%. The overall error rate of the SRME prediction algorithm was found to be 15.1% based on an experiment using a public ME-plaintext mixed parsing tree data set provided by Elsevier.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Toward plagiarism detection using citation networks 基于引文网络的抄袭检测
2017 Twelfth International Conference on Digital Information Management (ICDIM) Pub Date : 2017-09-01 DOI: 10.1109/ICDIM.2017.8244682
S. Soleman, Atsushi Fujii
{"title":"Toward plagiarism detection using citation networks","authors":"S. Soleman, Atsushi Fujii","doi":"10.1109/ICDIM.2017.8244682","DOIUrl":"https://doi.org/10.1109/ICDIM.2017.8244682","url":null,"abstract":"Plagiarism makes people lose trust and discourages innovation in the research community. In this paper, we proposed a model for plagiarism using citation networks. More precisely, we used fragments of texts citing a document as surrogates for that document. Furthermore, we applied the model to a plagiarism detection system, and evaluated its effectiveness. Our experiment results suggest that our method may be able to detect plagiarism although the source documents of a plagiarized one are not included in a collection of documents. Moreover, our method improves the existing method when they are combined.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124908161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信