{"title":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","authors":"","doi":"10.1145/3477911","DOIUrl":"https://doi.org/10.1145/3477911","url":null,"abstract":"","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126985565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Syntactic Analysis for Decision-making Support System in Engineering-Procurement-Construction (EPC) Field","authors":"Sujin Choi, S. Choi, seung-yeab Lee, Eul-Bum Lee","doi":"10.1145/3477911.3477912","DOIUrl":"https://doi.org/10.1145/3477911.3477912","url":null,"abstract":"The Engineering-Procurement-Construction (EPC) field is one of the complex industries that span the entire project cycle from bidding to engineering, construction, operations and maintenance (O&M). However, most EPC companies are exposed to contract-related risks during bidding or project execution period due to lack of data-based systematic decision-making system within limited time. In particular, in the client-supplied bidding document (ITB) in the EPC project, the client tends to pass the risk to the contractor. Therefore, when the client is participating in the bidding phase of a project, to analyze the contract (ITB) within a limited time and detect the presence or severity of risk sentence or clauses is of utmost importance. To analyze and detect the risk clauses of the bidding documents, professional experience and knowledge of the bidding documents is required, and it takes a lot of time and efforts to analyze and respond to the bidding documents that require complex sentences and expertise. In this study, it was performed as a preliminary step toward building an engineering decision support system. When conducting the EPC project, the items that could be risky were conceptualized by converting into a data base, and the main risk syntax and were constructed for algorithm. Text information was extracted from the bidding document (ITB) using syntax matching and named entity recognition technology for risk extraction, allowing users to systematically analyze and make a clear decision. In this study, research team applied to AI technology in EPC risk analysis especially phrase matcher and named-entity recognition (NER). Critical Risk Check Which is rule-based algorithm using phrase matcher method automatically extracts converts toxin clauses into a database. This Module contains 4steps as unstructured data Standardization, Pre-processing, Risk Database, Matching Algorithms. Terms Frequency Module using NER Model and EPC risk data was created in a similar syntax and converted into a JSON file. This package module identifying the frequency and location of the entity in the contract. The NER techniques can extract similar phrases of risky keywords and phrases. Also, can be demonstrated with domain characteristics such as location, general proper nouns as a frequency Image visualization. Through the Modules to be provided on decision-making support system as a cloud service. For the future works, research team improve the decision-making support system to present risk standards and semantic verification package.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"30 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125702209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Construction of Task-Specific Datasets for Object Re-identification","authors":"Petr Pulc, M. Holeňa","doi":"10.1145/3477911.3477922","DOIUrl":"https://doi.org/10.1145/3477911.3477922","url":null,"abstract":"In the last decade, we have seen a significant uprise of deep neural networks in image processing tasks and many other research areas. However, while various neural architectures have successfully solved numerous tasks, they constantly demand more and more processing time and training data. Moreover, the current trend of using existing pre-trained architectures just as backbones and attaching new processing branches on top not only increases this demand but diminishes the explainability of the whole model. Our research focuses on combinations of explainable building blocks for the image processing tasks, such as object tracking. We propose a combination of Mask R-CNN, state-of-the-art object detection and segmentation neural network, with our previously published method of sparse feature tracking [16]. Such a combination allows us to track objects by connecting detected masks using the proposed sparse feature tracklets. However, this method cannot recover from complete object occlusions and has to be assisted by an object re-identification. To this end, this paper uses our feature tracking method for a slightly different task: an unsupervised extraction of object representations that we can directly use to fine-tune an object re-identification algorithm, see Fig. 1 for visualisation. As we have to use objects masks already in the object tracking, our approach utilises the additional information as an alpha channel of the object representations, which further increases the precision of the re-identification. An additional benefit is that our fine-tuning method can be employed even in a fully online scenario.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115983025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Gunchenko, L. Martynovych, V. Mezhuyev, Y. Shugailo, Yurii Bercov
{"title":"Design of a ternary RS-trigger","authors":"Y. Gunchenko, L. Martynovych, V. Mezhuyev, Y. Shugailo, Yurii Bercov","doi":"10.1145/3477911.3477927","DOIUrl":"https://doi.org/10.1145/3477911.3477927","url":null,"abstract":"The paper considers the design of ternary elements and the development of computer systems on their basis. Instead of the common binary logic, a ternary computer uses the logic with three possible values in the calculations. Currently, there are no common decisions on the design of the ternary elements. The paper proposes a design of a ternary RS-flip-flop trigger, which is built on the basis of a multi-threshold element of the multi-valued logic. A designed ternary RS-trigger has one input line with three different levels of input signals and three levels of output signals (-1, 0, +1), giving nine different combinations. A proposed RS-trigger does not have any forbidden states or levels of an input signal. A proposed ternary trigger can serve as a base for the future design of the memory, registers, digital automats etc. in ternary computing systems.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125103205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying Ethereum Smart Contracts to Blockchain-Based Crowdfunding System to Increase Trust and Information Symmetry","authors":"N. Ahmad, S. Rahman","doi":"10.1145/3477911.3477920","DOIUrl":"https://doi.org/10.1145/3477911.3477920","url":null,"abstract":"∗Crowdfunding is one of the most popular method to collect capital. However, various concerns and obstacles still need to be overcome in order to entirely gain benefit from crowdfunding. The information asymmetry is one of the crowdfunding problems where stakeholders receive different information. In response to this problem, this study aims to increase contributors’ trust by providing more transparent transactions and reduce the information asymmetry through blockchain implementation in crowdfunding platform. This study reviewed the effects of blockchain implementation in crowdfunding system using Ethereum smart contract. To study the results, a blockchain-based crowdfunding system was developed. The results of this study include comparison between crowdfunding system that implemented blockchain and traditional crowdfunding system in terms of transparency of transactions, immutability of data, CRUD operations, speed of transactions and degree of information symmetry. Trust attributes were also assessed against the developed system. Overall result showed that implementation of blockchain in crowdfunding system provide higher transparency which can reduce the information asymmetry and increase stakeholder’s trust to contribute and raise money via crowdfunding platform.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Analysis Driven Decision Making System Ensuring Energy Security of a Country","authors":"Mahmudul Islam, Mahady Hasan","doi":"10.1145/3477911.3477921","DOIUrl":"https://doi.org/10.1145/3477911.3477921","url":null,"abstract":"Energy is one of the key factors for a country's economic and social growth. Bangladesh is constantly seeking sustainable energy sources for securing its increasing energy demand as energy security is a national concern. Currently, Bangladesh is producing 64% of electricity using natural gas while 25% is coming from petroleum and the rest from coal, renewable sources [1]. To reduce pressure from the natural gas government is trying to diversify the energy sources. To achieve sustainable diversified energy sources, the Sustainable and Renewable Energy Development Authority (SREDA) has taken many initiatives. Energy Master Plan has been created which targets to improve Primary Energy consumption per GDP by 20% in the year 2030. Many software applications have been developed by SREDA to monitor the progress. We propose to develop another system for energy data analysis and generate reports accordingly. Policymakers can use those reports to make strategic decisions to secure the country's energy consumption, distribution and manage the demand side. In this research work, we discussed how a big data-based solution can be developed and used to forecast the energy balance which ensures the energy security of Bangladesh. We also discuss different aspects of the proposed software system in detail including challenges and possible solutions to overcome those challenges.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127779865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Kiarostami, Mohammadreza Daneshvaramoli, Saleh Khalaj Monfared, Aku Visuri, Helia Karisani, S. Hosio, Hamed Khashehchi, Ehsan Futuhi, D. Rahmati, S. Gorgin
{"title":"On Using Monte-Carlo Tree Search to Solve Puzzles","authors":"M. Kiarostami, Mohammadreza Daneshvaramoli, Saleh Khalaj Monfared, Aku Visuri, Helia Karisani, S. Hosio, Hamed Khashehchi, Ehsan Futuhi, D. Rahmati, S. Gorgin","doi":"10.1145/3477911.3477915","DOIUrl":"https://doi.org/10.1145/3477911.3477915","url":null,"abstract":"Solving puzzles has become increasingly important in artificial intelligence research since the solutions could be directly applied to real-world or general problems such as pathfinding, path planning, and exploration problems. Selecting the best approach to solve puzzles has always been an essential issue. Monte-Carlo Tree Search (MCTS) has surged into popularity as a promising approach due to its low run-time and memory complexity. Thus, it is required to know how to employ this method to solve the puzzles. In this work, we study the applicability of MCTS in solving puzzles or solving a puzzle with MCTS, not comparing many MCTS approaches. We propose a general classification of puzzles based on their features. This classification consists of four primary classes that provide a mathematical formula for each and their satisfactory criteria. This classification let us know how to utilize MCTS based on the puzzle’s features. We pass each puzzle to an MCTS algorithm as a series of satisfaction functions based on this mathematical formulation. The classification can perform general pathfinding or path-planning if the outlining problem is defined within the described mathematical constraints. MCTS progressively solves a puzzle until the functions are completely satisfied in our proposed classification. We examine different puzzles for each class using our proposed methodology. Furthermore, to evaluate the proposed method’s performance, each of these puzzles is compared with their available SAT solvers using the Z3 implementation and different variations of MCTS that are generally used.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130449917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic generation of graphical game assets using GAN","authors":"Rafal Karp, Zaneta Swiderska-Chadaj","doi":"10.1145/3477911.3477913","DOIUrl":"https://doi.org/10.1145/3477911.3477913","url":null,"abstract":"This paper presents an application of the Generative Adversarial Networks (GAN) approach to automatically generate realistic-looking fantasy and science fiction game icons. In this study, we explored ways to avoid the manual drawing of graphics, instead producing synthetic images indistinguishable from artist-made ones. We developed the method based on multiple experiments and commonly known GAN improvement techniques. To enhance the training process an altered version of the Adaptive Discriminator Augmentation was used. Achieved results were measured by Fretchet Inception Distance (FID) metric. As realism is a subjective metric, a visual evaluation was performed, where a group of 50 observers assessed a mix of generated and original (drawn) images in order to recognize how many of the generated images are indistinguishable from the human-created ones. As a result 69% of generated icons were perceived as ‘real' ones, in comparison to 70% for drawn images. These outcomes clearly indicate that generated illustrations can be of high quality and be indistinguishable from drawn graphics. The developed solution enables users to significantly decrease costs of asset creation in commercial projects, and could even potentially empower designers to produce more distinguished and unique experiences for each player thanks to a vast amount of generated graphics.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yan-guo Wang, Qingling Qian, Qianhui Wu, Wei Zhang, Song Tan, Yongtao Gui, Zhipeng Yang, Qiang Wang
{"title":"Electrical State Detection of Railway Insulators based on Ultraviolet Imaging","authors":"Yan-guo Wang, Qingling Qian, Qianhui Wu, Wei Zhang, Song Tan, Yongtao Gui, Zhipeng Yang, Qiang Wang","doi":"10.1145/3477911.3477925","DOIUrl":"https://doi.org/10.1145/3477911.3477925","url":null,"abstract":"∗Catenary insulator is an important component of overhead contact lines on high-speed railways. The detection for the electrical state of catenary insulators is useful for the maintenance of railway infrastructures. Based on recent progress of the ultraviolet detection technology in the power industry, an electrical state detection method of railway insulators is proposed in the paper. An inspection system is developed and mounted on the catenary inspection car, and the availability of the proposed method has been validated on the system test on high-speed railways.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124323404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business process modeling with UKoSim","authors":"I. Savchenko, P. Novotny, Herbert Fleck","doi":"10.1145/3477911.3477914","DOIUrl":"https://doi.org/10.1145/3477911.3477914","url":null,"abstract":"Quick and accurate simulation of business processes is a key element of enterprise resource planning, costs calculation and overall decision making in business. In the article, a new tool for such simulations is presented and described. UKoSim (Unternehmen-Kosten-Simulation), based on Excel tables and VBA macros, provides users with an effective way to build supply and production chains (from purchasing materials to selling goods), as well as the possibility to evaluate, compare and adjust costs and revenues. A special emphasis is put on the assembling process, including resources allocation, the 3-stage \"production tree\" and working time optimization. Concurrently and in connection with the production process, warehouse activities are simulated, allowing users to model various internal delays and failures. Simple examples of enterprise models in UKoSim are provided.","PeriodicalId":174824,"journal":{"name":"Proceedings of the 2021 7th International Conference on Computer Technology Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122442723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}