Ji Youlang, Yu Yang, Z. Hongying, Zhu Jun, Gu Jingjing, Hua Lingya
{"title":"Verb Based Conceptual Common Sense Extraction","authors":"Ji Youlang, Yu Yang, Z. Hongying, Zhu Jun, Gu Jingjing, Hua Lingya","doi":"10.1145/3209914.3209941","DOIUrl":"https://doi.org/10.1145/3209914.3209941","url":null,"abstract":"The knowledge in the knowledge bases such as Freebase, Knowledge Vault and so on are all facts which record the relationships between two entities. It may lead to following two problems. First, this form of knowledge limits the scale of the existing knowledge bases. When extracting new facts, no good patterns with a good ability of summarization can be used. Second, when applied in some real tasks, the knowledge may always suffer the problem of data sparsity. To solve these two problems, in this paper, we define the problem of extracting common senses in a concept level. We evaluate our solutions on Google N-Grams data set, and the results shows a great improvement.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116805485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combined Source Code Approach for Test Case Prioritization","authors":"Iyad Alazzam, K. Nahar","doi":"10.1145/3209914.3209936","DOIUrl":"https://doi.org/10.1145/3209914.3209936","url":null,"abstract":"Regression testing is an activity in the software testing process to ensure the software is validated and verified after modification occurred on software. It is costly process procedure which has been expected to reach half cost of the software maintenance cost. Many techniques and approaches have been used in regression testing process to enhance the efficiency and effectiveness of regression testing process. Such as test case reduction, test case selection, test case prioritization and retest all. Test case prioritization has been used in regression testing to increase the effectiveness through selecting the most vital test case that has the ability in finding and uncovering errors in the system under test. This paper has introduced a new algorithm for prioritizing test cases in test suite that is based on method and line of code coverage. Test cases which cover the most methods and line of code are more effective and efficient in finding errors.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128264770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on the Management Model of Smart Tourism Industry under the Era of Big Data","authors":"Zhao Hua","doi":"10.1145/3209914.3234637","DOIUrl":"https://doi.org/10.1145/3209914.3234637","url":null,"abstract":"With the rapid development of Internet and the communication technology, the construction of smart tourism is no longer a slogan that can not be realized. The construction of smart tourism in tourist destinations conforms to the strategic goal of tourism industry development in China. Based on the background of big data, this paper elaborated the connotation of big data and smart tourism, and built a large data platform to realize the forecast and feedback of smart tourism through the analysis of tourism development. The platform could be divided into government tourism platform, tourists platform, tourism enterprises platform and community residents platform relying on big data do their own duty. Eventually this paper put forward a construction model and path to realize the smart tourism platform.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128882267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Loseva, A. Obeid, H. Richter, R. Backes, D. Eichhorn
{"title":"Fixit - A Semi-Automatic Software Deployment Tool for Arbitrary Targets","authors":"E. Loseva, A. Obeid, H. Richter, R. Backes, D. Eichhorn","doi":"10.1145/3209914.3209938","DOIUrl":"https://doi.org/10.1145/3209914.3209938","url":null,"abstract":"The deployment of software packages becomes more and more difficult. Thus Canonical Ltd. has created a framework called \"JuJu\" that serves as a DevOps toolchain. JuJu allows an integrated software development, deployment and operation of software packages. Additionally Canocial provided hundreds of open-source JuJu-maintained software packages in an own online store for download. However, our tests revealed that only 14 % of 35 picked packages from the Canonical's JuJu charm store really be installed as they are. The reason is that many of them are sensitive against mismatches of what is contained in the relevant JuJu files and what exists as target hardware at the customer. Because of that, a new concept and tool called Fixit was created by us for the semi-automatic software-deployment of JuJu software packages onto arbitrary hardware and software environments such as Windows and Linux operating systems. Fixit improves the quota of successful first-try installations from 14 to 69 %. This is accomplished by semi-automatic analysis and transformation of the package source codes.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122730989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Big Data and Intelligent Processing Technology in Modern Chinese Multi-category Words Part of Speech Tagging Corpus","authors":"Zhendong Song","doi":"10.1145/3209914.3234639","DOIUrl":"https://doi.org/10.1145/3209914.3234639","url":null,"abstract":"The application of modern Chinese multi-category words corpus is very wide. With the development of the Internet, data from the corpus is getting bigger and bigger during collection. The data gradually develops so big that the current relational database is difficult to deal with them. This article analyzes the important role of the big data technology in corpu","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132981502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Pornographic Images Recognition Based on Depth Learning","authors":"Ruolin Zhu, Xiaoyu Wu, Beibei Zhu, Li-hua Song","doi":"10.1145/3209914.3209946","DOIUrl":"https://doi.org/10.1145/3209914.3209946","url":null,"abstract":"With the rapid development of the Internet, the images become the main medium of information dissemination, while the spread of pornographic images are getting more serious. Therefore, we propose a detection method of pornographic images based on a combination of global and local features. Considering the NPDI database's defective both in quality and quantity, so this paper constructs new database CUC_NSFW (Not Suitable for Work) applying data augmentation methods to improve the classification performance. Pornographic images with only exposed sensitive organs become the bottleneck of improving model recall ratio. We design a sensitive organs detection module, cascaded behind the residual network assisting the recognition of pornography images. And our method makes a good performance based on the research work of pornographic image detection","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signal Recovering Based on Fourier Analysis from Nonuniform Samples","authors":"Yukai Gao","doi":"10.1145/3209914.3234641","DOIUrl":"https://doi.org/10.1145/3209914.3234641","url":null,"abstract":"This paper describes a new approach that can process nonuniformly sampled signals efficiently, in the sense the digital spectrum and signal recovering from nonuniformly sampled signal can be derived precisely. The results of research on estimation spectra of signals whose samples were taken at randomly distributed sampling instants are presented. The paper determines the conditions under which a discrete Fourier transformation spectrum estimator provides an unbiased approximation of the spectrum of the original continuous-time signal in an unlimited range of frequencies. In the research nonuniformly sampled signals is represented as the algebraic addition of impulse function. Based on the random theory, the expected value is obtained. The signal is recovered by the inverse Fourier transformation.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116741415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving RealSense by Fusing Color Stereo Vision and Infrared Stereo Vision for the Visually Impaired","authors":"Hao Chen, Kaiwei Wang, Kailun Yang","doi":"10.1145/3209914.3209944","DOIUrl":"https://doi.org/10.1145/3209914.3209944","url":null,"abstract":"The introduction of RGB-D sensor has attracted attention from researchers majored in computer vision. With real-time depth measurement provided by RGB-D sensor, a better navigational assistance than traditional aiding tools can be offered for visually impaired people. However, nowadays RGB-D sensor usually has a limited detecting range, and fails in performing depth measurement on objects with special surfaces, such as absorbing, specular, and transparent surfaces. In this paper, a novel algorithm using two RealSense R200 simultaneously to build a short-baseline color stereo vision system is developed. This algorithm enhances depth estimation by fusing color stereo depth map and original RealSense depth map, which is obtained by infrared stereo vision. Moreover, the minimum range is decreased by up to 84.6%, from 650mm to 100mm. We anticipate out algorithm to provide better assistance for visually impaired individuals.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"83 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114087672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Scheduling Algorithm for Multi-Priority Traffic in Load-Balanced Switch","authors":"Ya Gao","doi":"10.1145/3209914.3226167","DOIUrl":"https://doi.org/10.1145/3209914.3226167","url":null,"abstract":"In this paper, a hierarchical weighted round-robin scheduling (HWRR) algorithm is proposed in Load-Balanced two-stage switches. Following the change of traffic load, the proposed algorithm can adjust scheduling weights and allocate bandwidth flexibility. Intensive dispatching will be performed when heavy load is detected. It can reduce the packet drop probability and meet the requirements of different priority traffic. The simulation results show that HWRR achieves stable performance on delay and cell drop probability, and performs well under several types of traffic.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124673821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan
{"title":"'Pandora': A multi-encryption software","authors":"Jayson J. Cruz, R. D. Fernandez, Carlo M. Palicpic, Dominick L. Uyehara, Ronina C. Tayuan","doi":"10.1145/3209914.3209919","DOIUrl":"https://doi.org/10.1145/3209914.3209919","url":null,"abstract":"Privacy and security have never been more important. The need for these things are on the rise considering that more and more reports of digital theft and massive unsolicited government surveillance are surfacing. The project, Pandora, is a solution created by the proponents to provide an encryption scheme that is a combination of the new and the old. Pandora is an integration of AES-256 and modified ciphers. You can use it to encrypt and decrypt files, just like typical AES encryption, but with the added complexity offered by the ciphers. The system is primarily developed using Java programming language using NetBeans IDE. The program will ask for a file input which will then be processed through multi-level encryption. Running parallel with this, the system will ask for a key which will be used for decryption. The final output will be a \".pxt file\". All of these are presented to a user with a graphical user interface (GUI). Added security elements were also implemented to ensure the confidentiality of the files. The key is required to be between eight to thirty-two mixed alphanumeric characters which will then be processed through separate hashing algorithm. This scheme ensures that it would take at least 3 to 3.914349685892112e+43 years to brute force or to perform dictionary attack on the key.","PeriodicalId":174382,"journal":{"name":"Proceedings of the 1st International Conference on Information Science and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}