Proceedings of the 1st International Conference on Information Science and Systems最新文献

筛选
英文 中文
Music recommendation model by analysis of listener's musical preference factor of K-pop 基于听众音乐偏好因素分析的K-pop音乐推荐模型
J. Chung, Myoung-Jun Kim
{"title":"Music recommendation model by analysis of listener's musical preference factor of K-pop","authors":"J. Chung, Myoung-Jun Kim","doi":"10.1145/3209914.3209932","DOIUrl":"https://doi.org/10.1145/3209914.3209932","url":null,"abstract":"Recently, the popularity of Korean pop music (or K-pop) has been increasing, due to technological developments in digital devices. According to the IFPI, 59% of Koreans regularly listen to music on their smartphones and other related devices [1]. Thus, the present study proposes a music recommendation model that predicts listeners' music preferences and recommends customized music lists. For this purpose, two pilot tests (with one participant in each test) were conducted and linear regression analysis was performed by using the Tensorflow application. The first test determined the participant's song preferences, based on a sample of 200 K-pop songs, while the second test added a neutral response option when considering a sample of 200 additional K-pop songs. The results indicate that the prediction accuracy of the participant's song preferences in the first test was 71.5%. However, after adding the neutral response option in the second pilot test, the prediction accuracy increased to 84.0%. This model can be used to predict the music preferences of listeners on a wider scale.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122523327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Port Efficiency Measurement Based on Three-stage Cascade Data Envelopment Analysis Control Strategy 基于三级级联数据包络分析控制策略的港口效率测量研究
Xiaoling Huang, Huanping Chen, Yawei Wang, Huishu Piao
{"title":"Research on Port Efficiency Measurement Based on Three-stage Cascade Data Envelopment Analysis Control Strategy","authors":"Xiaoling Huang, Huanping Chen, Yawei Wang, Huishu Piao","doi":"10.1145/3209914.3209915","DOIUrl":"https://doi.org/10.1145/3209914.3209915","url":null,"abstract":"In order to measure the port efficiency, this paper uses the three stage DEA cascade control strategy to measure the relative efficiency of the port.First, the original input-output value is used to measure the port efficiency. Secondly, the stochastic frontier analysis method is used to analyze the influence of random error and environmental variables on the input difference value. Then, the result of the model is used to adjust the input value. Finally, the adjusted input value is used to re-measure the relative efficiency. Compared with the traditional DEA, this method eliminates the influence of random errors in the DEA model and the different external environmental factors in the port so as to make the measured efficiency more objective and accurate. At the same time, it analyzes the influence of different environmental factors on the port efficiency impact.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121787667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach for Information Discovery Using Ontology In Semantic Web Content 基于本体的语义Web内容信息发现方法
Ayhan Akgün, S. Ayvaz
{"title":"An Approach for Information Discovery Using Ontology In Semantic Web Content","authors":"Ayhan Akgün, S. Ayvaz","doi":"10.1145/3209914.3209940","DOIUrl":"https://doi.org/10.1145/3209914.3209940","url":null,"abstract":"Information searching techniques are rapidly developing as the World Wide Web (WWW) evolves. Along with the development of information technologies, the need for acquiring domain knowledge bases, accessing data sources and discovering insights increases. The advancements in knowledge discovery, information management and artificial intelligence require faster data processing, storing more data and developing more intelligent applications. This study provides an information discovery and data integration approach for linked open data in the semantic web. Using semantics embedded in ontologies, data available in knowledge bases can be enhanced to better serve the information needs of users. The entity relationships between resources and resource hierarchies represented as linked open data in semantic web provide semantically rich insights about the data and facilitates knowledge discovery. Graph theory methods can be utilized to enrich the features of data sets in semantic web. In this study, we propose an approach for integrating isolated data sources with semantic web by using ontologies to make them available for information discovery and enhancing the features of semantic data by using graph theory techniques.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115271604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Modular Quality Transfer Effect of Service-oriented Manufacturing Network 服务型制造网络的模块化质量传递效应
Liangqing Feng, Yu Yin, Kunkun Zeng
{"title":"The Modular Quality Transfer Effect of Service-oriented Manufacturing Network","authors":"Liangqing Feng, Yu Yin, Kunkun Zeng","doi":"10.1145/3209914.3209920","DOIUrl":"https://doi.org/10.1145/3209914.3209920","url":null,"abstract":"The goal of this study is to research the relations on quality among the productive service module(PSM), service production module (SPM)and customer effect module(CEM) in service-oriented manufacturing network(SMN). The relationships among the modules are explored according to a structural equation model (SEM) put forward by this paper. The empirical data of the SEM were collected from a service-oriented manufacturing enterprise in China. PSM and SPM both have obvious interaction on quality, PSM and SPM have obvious positive quality transfer effect on service integration module(SIM) and CEM, SIM also has positive quality relationship with CEM. And in the whole, the interaction effect between PSM and SPM is the most obvious. This study contributes a new perspective which will help the service-oriented manufacturing enterprise to better understand the quality influence and the function relationship among the different value quality in a SMN, and find out its advantages and disadvantages to improve competitiveness.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126320282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extended Virtual Network Functions Manager Architecture to Support Container 支持容器的扩展虚拟网络功能管理器体系结构
C. Hoang, N. Dinh, Younghan Kim
{"title":"An Extended Virtual Network Functions Manager Architecture to Support Container","authors":"C. Hoang, N. Dinh, Younghan Kim","doi":"10.1145/3209914.3209934","DOIUrl":"https://doi.org/10.1145/3209914.3209934","url":null,"abstract":"Network function virtualization (NFV) is a network architecture concept that decouples network functions from hardware. With NFV, virtual network functions (VNFs) can easily be instantiated and deployed on standard servers using virtual machines (VMs). To facilitate VNFs' deployment and management, Tacker is developed as a NFV manager (NFVM) and orchestrator (NFVO) in OpenStack environments. Recently, container is proposed as a promising virtualization technology for deploying and running distributed applications without launching an entire VM for each application, which helps increase cloud agility and accelerate the deployments of cloud technologies and VNFs. Unfortunately, the current VNF manager and orchestrator, Tacker, do not support container-based VNFs, thus introduces limitations to integrate container-based VNFs to the current NFV infrastructure (NFVI). In this paper, we design an extended Tacker architecture to support managing and orchestrating container-based VNFs. The Kubernetes cluster is integrated to support launching container-based VNFs and provide high availability for VNFs. Through test-bed results, we show the advantages of container-based VNFs using our architecture compared to VM-based VNFs in terms of instantiation time in Tacker.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Network Traffic Detection Based on Histogram and Self-similarity Matrix 基于直方图和自相似矩阵的网络流量检测
Penglin Yang, Limin Tao, Haitao Wang
{"title":"Network Traffic Detection Based on Histogram and Self-similarity Matrix","authors":"Penglin Yang, Limin Tao, Haitao Wang","doi":"10.1145/3209914.3236336","DOIUrl":"https://doi.org/10.1145/3209914.3236336","url":null,"abstract":"This paper introduces a new network traffic detection method to detect network malicious traffic in different network architectures. In most network traffic data sets, training data and testing data have the same network architecture and traffic features, like the same IP address distribution, the same IP port utilization, etc. But in real network detection, feature differences between training data sets and target network cannot be ignored. In this paper, we use histogram and self-similarity matrix to express these feature differences and keep the traffic features in use at the same time.This method could learn from anomaly network samples and detect real network traffic with feature drift, zoom, and other variants.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125991115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long-Range Traversability Awareness and Low-Lying Obstacle Negotiation with RealSense for the Visually Impaired 视障人士的远距离穿越意识与低洼障碍物协商
Kailun Yang, Kaiwei Wang, Shufei Lin, J. Bai, L. Bergasa, R. Arroyo
{"title":"Long-Range Traversability Awareness and Low-Lying Obstacle Negotiation with RealSense for the Visually Impaired","authors":"Kailun Yang, Kaiwei Wang, Shufei Lin, J. Bai, L. Bergasa, R. Arroyo","doi":"10.1145/3209914.3209943","DOIUrl":"https://doi.org/10.1145/3209914.3209943","url":null,"abstract":"The application of RGB-D sensors provides a revolutionary force in the research field of computer vision, where traversable area detection and obstacle avoidance are the fundamental topics to aid visually impaired people. However, the detection using RGB-D sensors is limited by the sparse depth map and the narrow field of view, which hampers longer traversability awareness and lower obstacle negotiation. This paper proposes an effective approach to combine a pair of wearable smart glasses and a waist-worn pathfinder to assist the visually impaired. Traversable lines are generated to feedback the visually impaired through real-time stereo sound after real-world coordinates adjustment with a RealSense R200 (RGB-D sensor) and an IMU integrated in the pair of smart glasses. Low-lying obstacles are detected by using another RGB-D sensor of RealSense, the RS410, as the waist-worn pathfinder to provide early warning. Indoor and outdoor detection results as well as a field test demonstrate the usefulness and effectiveness of our approach.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126250463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
New Location Recommendation Technique on Social Network 基于社交网络的新位置推荐技术
Sutarat Choenaksorn, Saranya Maneeroj
{"title":"New Location Recommendation Technique on Social Network","authors":"Sutarat Choenaksorn, Saranya Maneeroj","doi":"10.1145/3209914.3209933","DOIUrl":"https://doi.org/10.1145/3209914.3209933","url":null,"abstract":"With the availability of current modern technologies, decisions making in an everyday life can be assist in many different ways. Many researches in the past decade has studied about recommendation systems. Recommendation systems can base on different variables with location-based services is one of the more interesting factor to a recommendation system. Recommendations on Location based Network is a service for assisting people to locate locations of their interests. A large number of recorded checked-in histories was gathered to make the prediction according to the desired preferences of each user. Furthermore, determinations have shown a social relationship leading to availability of information will assist in making better recommendations based on the locations. Recently, the recommendation system on location-based domain usually combines either content-based technique and collaborative technique, or collaborative technique and social-based techniques. It is difficult to find the way to combine those three techniques. So there is no research that combine those techniques on location-based recommendation system. This study proposes a new method that combines content-based technique, collaborative technique, and social-based techniques; to produce more efficient result results than location-based RS methods. The evaluation results show that the proposed method provide higher accuracy and coverage than two current location methods by measuring with the Normalized Discounted Cumulative Gain (NDCG) and coverage matrix.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127510673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Parallel Dynamic Encryption Transmission Algorithm on VoIP 基于VoIP的并行动态加密传输算法研究
Aidong Fang, Zhiwei Zhang
{"title":"Research on Parallel Dynamic Encryption Transmission Algorithm on VoIP","authors":"Aidong Fang, Zhiwei Zhang","doi":"10.1145/3209914.3226169","DOIUrl":"https://doi.org/10.1145/3209914.3226169","url":null,"abstract":"Aiming to the current lack of VoIP voice encryption, a dynamic encryption method on grouping voice encryption and parallel encrypted is proposed in this paper. Though dynamic selection of encryption algorithms and dynamic distribution of key to increase the complexity of the encryption, at the same time reduce the time complexity of asymmetric encryption algorithm by using parallel encryption to ensure the real-time of the voice and improve call security.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm BlockSight:一种使用高级加密标准和最低有效位算法的移动图像加密
Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton
{"title":"BlockSight: A Mobile Image Encryption Using Advanced Encryption Standard and Least Significant Bit Algorithm","authors":"Reynaldo E. Castillo, G. Cayabyab, Paula Jean M. Castro, M. Aton","doi":"10.1145/3209914.3209922","DOIUrl":"https://doi.org/10.1145/3209914.3209922","url":null,"abstract":"In this paper, we developed a new mobile application designed to protect your images stored on your mobile phone using Advanced Encryption Standard algorithm to secure images by encrypting it and Least Significant Bit algorithm to process the encrypted image and embed it into another image. To achieve high level of encryption, a 256 bit length key of Advance Encryption Standard is used to maximize protection and Diffie-Hellman algorithm to secure the processed key to both parties without interference from outside. In steganography, the encrypted image will be invisible into the cover image in which potential hackers do not have any idea about the original image embedded inside of the cover image, and with this even if the hacker got the image it will still need the correct key to decrypt it or else the image will be deleted The study used Rapid Application Development Model as the project development methodology, which allows the preceding phase to iterate until the application is refined, requirements are gathered and allows early testing of the prototypes during every iteration to reduce the risk of any major issues in the final deployment of the application. With the use of ISO/IEC/IEEE 29119 Testing Standards, the application was evaluated in terms of its security, usability and reliability. Based on the evaluation results, the application satisfied the respondents and possible users with an overall mean rating 4.17 or acceptable.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信