2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)最新文献

筛选
英文 中文
Integrated usage of different knowledge sources in life science 生命科学中不同知识来源的综合运用
Daisuke Kimoto, T. Hochin, Hiroki Nomiya
{"title":"Integrated usage of different knowledge sources in life science","authors":"Daisuke Kimoto, T. Hochin, Hiroki Nomiya","doi":"10.1109/SNPD.2017.8022784","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022784","url":null,"abstract":"This paper integrates the human database with the drosophila one, and uses the integrated database to acquire new terms about human diseases/traits automatically. This paper uses ortholog to show the relationship in the gene of two kinds, and compares phenotypic terms of the human and these of the drosophila to discover new terms about human diseases/traits. This paper shows the databases used in the study, the method using these databases, the data acquired from databases, and new phenotypic terms can be obtained.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132912926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interactive decoration design support system by fitness evaluation based on design knowledge and subjective evaluation 交互式装饰设计支持系统通过基于设计知识的适应性评价和主观评价
M. Unehara, Yoshiki Ekihiro, Eriko Matsumoto, Koichi Yamada, Izumi Suzuki
{"title":"Interactive decoration design support system by fitness evaluation based on design knowledge and subjective evaluation","authors":"M. Unehara, Yoshiki Ekihiro, Eriko Matsumoto, Koichi Yamada, Izumi Suzuki","doi":"10.1109/SNPD.2017.8022792","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022792","url":null,"abstract":"This paper proposes interactive decoration design support system introducing interactive evolutionary computation. Evaluation problem existing human can be evaluated synthesizing multi objectives. The proposed system made it importance dividing the human evaluation into two part, which is including regular level of design quality and user's subjective evaluation by affective or Kansei image, and assumed to acquire good results by executing in serial order in a certain evaluation phase. From the experimental results, effectiveness of proposed methodology involving evolution by using fitness evaluation of decoration designs for quality and evolution by user evaluation are confirmed.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"46 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133139665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The unpredictable structure of risk chains using association rule mining 利用关联规则挖掘风险链的不可预测结构
Yusuke Makino, Kazuhiko Kato, S. Tanimoto
{"title":"The unpredictable structure of risk chains using association rule mining","authors":"Yusuke Makino, Kazuhiko Kato, S. Tanimoto","doi":"10.1109/SNPD.2017.8022770","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022770","url":null,"abstract":"In order to control risks and facilitate effective decision-making, the relations among risk chains should be systematically analyzed, which is a very difficult process. The aim of this research is to understand the connective generating structure of risk chains and plan problem solving accordingly. Therefore, in order to select the analysis method, association rule mining was applied. From the extracted data, the height of the sources of a risk chain and recurrence nature of a risk could be discovered. It is expected that these results can prevent the occurrence of risk chains caused by human factors.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115014568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sentiment analysis for reviews of restaurants in Myanmar text 情感分析的评论餐馆在缅甸文本
Yu Mon Aye, Sint Sint Aung
{"title":"Sentiment analysis for reviews of restaurants in Myanmar text","authors":"Yu Mon Aye, Sint Sint Aung","doi":"10.1109/SNPD.2017.8022740","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022740","url":null,"abstract":"Sentiment analysis is the analysis of the feeling such as attitude, emotion and opinion. Sentiment analysis on English Language has become large and popular field of research area with many commercial applications. Researchers from different countries want to build sentiment analysis systems in their own language. This paper proposes the creation of Myanmar sentiment lexicon for food and restaurant domain and analyses the Myanmar text reviews of customers using lexicon-based sentiment analysis for the recommendation. To our knowledge, this is the first work for sentiment analysis of Myanmar text comments. The first challenge is the absence of annotated data and sentiment lexicons. In this paper, we address this approach to sentiment analysis for Myanmar Language and generate the context-independent sentiment rules for Myanmar Language.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Clustering search engine suggests by integrating a topic model and word embeddings 聚类搜索引擎建议将主题模型和词嵌入相结合
Tian Nie, Yi Ding, Chen Zhao, Youchao Lin, T. Utsuro, Yasuhide Kawada
{"title":"Clustering search engine suggests by integrating a topic model and word embeddings","authors":"Tian Nie, Yi Ding, Chen Zhao, Youchao Lin, T. Utsuro, Yasuhide Kawada","doi":"10.1109/SNPD.2017.8022782","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022782","url":null,"abstract":"The background of this paper is the issue of how to overview the knowledge of a given query keyword. Especially, we focus on concerns of those who search for Web pages with a given query keyword. The Web search information needs of a given query keyword is collected through search engine suggests. Given a query keyword, we collect up to around 1,000 suggests, while many of them are redundant. We cluster redundant search engine suggests based on a topic model. However, one limitation of the topic model based clustering of search engine suggests is that the granularity of the topics, i.e., the clusters of search engine suggests, is too coarse. In order to overcome the problem of the coarse-grained clusters of search engine suggests, this paper further applies the word embedding technique to the Web pages used during the training of the topic model, in addition to the text data of the whole Japanese version of Wikipedia. Then, we examine the word embedding based similarity between search engines suggests and further classify search engine suggests within a single topic into finer-grained subtopics based on the similarity of word embeddings. Evaluation results prove that the proposed approach performs well in the task of subtopic clustering of search engine suggests.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125842602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Environmental sound classification based on time-frequency representation 基于时频表示的环境声分类
Khine Zar Thwe, Nu War
{"title":"Environmental sound classification based on time-frequency representation","authors":"Khine Zar Thwe, Nu War","doi":"10.1109/SNPD.2017.8022729","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022729","url":null,"abstract":"This paper proposes a feature extraction method for environmental sound event classification based on time-frequency representation such as spectrogram. There are three portions to perform environmental classification. Firstly, the input signal is converted into spectrogram image with time-frequency representation using short time Fourier transforms. Secondly, this spectrogram is used to extract features with local binary pattern of three different radius and neighborhood sizes. The three distinct features resulted from local binary pattern based on spectrogram are concatenated and used as one feature vector. Finally, multi support vector machine is used for classification of environmental sound event. Evaluation is tested on ESC-10 dataset.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125548775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A software implementation of speculative memory 推测存储器的一个软件实现
K. Fujisawa, Atsushi Nunome, Kiyoshi Shibayama, Hiroaki Hirata
{"title":"A software implementation of speculative memory","authors":"K. Fujisawa, Atsushi Nunome, Kiyoshi Shibayama, Hiroaki Hirata","doi":"10.1109/SNPD.2017.8022759","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022759","url":null,"abstract":"Many techniques for parallelizing a sequentially coded program have been developed and put to practical use, but there are many cases in which program codes cannot be parallelized because it is impossible to assure that their parallel execution does not violate the data dependencies in the program. To parallelize such programs, we have previously proposed speculative memory (SM). With SM, programmers can specify the parallel and speculative execution of threads explicitly in their programs. The SM system manages the memory data that are speculatively read or written by the threads running in parallel. When the system detects inconsistent memory accesses, it recovers the computational state of the program and restarts the execution. If such inconsistencies are not encountered often, we can expect the total execution time of the program to be shorter. In this paper we present a software implementation of SM (SSM). We have developed an SM library by using POSIX threads. In spite of large overheads that are essentially unavoidable in a software implementation, our SSM system can shorten the execution time of a program that compilers cannot parallelize automatically.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125714574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A centralized HIDS framework for private cloud 用于私有云的集中式HIDS框架
Zhijian Wang, Yanqin Zhu
{"title":"A centralized HIDS framework for private cloud","authors":"Zhijian Wang, Yanqin Zhu","doi":"10.1109/SNPD.2017.8022709","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022709","url":null,"abstract":"Cloud computing is more convenient and efficient than traditional on-premise computing for users, as it provides large scale resources, software, and information to each customer. However, cloud computing systems can be easily threatened by various cyber attacks. Therefore, an Intrusion Detection System (IDS) is very necessary for cloud computing system. There is a serious problem which traditional host-based IDS for cloud computing consumes a large amount of system resources. In this paper, we propose a centralized host-based IDS framework to reduce the use of the resources. Using logstash tool to collect the system logs from each virtual machine, and storing them into elasticsearch cluster centrally. After that, we analyze all these logs in the detection center and send the results to each virtual machine. We have validated our framework in the openstack platform. The results show a good performance in reducing the CPU and memory usage.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
A scheme of criminal law knowledge acquisition using ontology 基于本体的刑法知识获取方案
Pongpanut Osathitporn, N. Soonthornphisaj, W. Vatanawood
{"title":"A scheme of criminal law knowledge acquisition using ontology","authors":"Pongpanut Osathitporn, N. Soonthornphisaj, W. Vatanawood","doi":"10.1109/SNPD.2017.8022696","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022696","url":null,"abstract":"This paper proposes an acquisition schema of Thai criminal code. Since the application of criminal law concerns many legal elements in the written code, it causes the misinterpretation and the wrong conclusion for the legal case. Our acquisition scheme attached with a knowledge base is designed and developed in order to facilitate users and make better understanding. The legal domain expertise is extracted using the law interpretation technique and represented by ontology written in RDF/OWL elements. The acquisition rules are defined using SWRL in order to map a knowledge base with the related criminal code.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance evaluation of delayed-committing transactional memory 延迟提交事务性内存的性能评估
Sekai Ichii, Shohei Hayashi, Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama
{"title":"Performance evaluation of delayed-committing transactional memory","authors":"Sekai Ichii, Shohei Hayashi, Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama","doi":"10.1109/SNPD.2017.8022760","DOIUrl":"https://doi.org/10.1109/SNPD.2017.8022760","url":null,"abstract":"Transactional memory (TM) is promising to make parallel programming easier. Many hardware implementations of transactional memory (HTM) have been proposed to improve the performance, but they still suffer from some overheads when a transaction either commits or aborts. So we have been developing a novel new HTM design, called Delayed-Committing TM (DCTM), which enables transactions of arbitrary size to commit or abort in a fixed number of cycles — typically, one. In this paper, we analyze the performance of our DCTM system in detail. Simulation results show that the performance of our DCTM system is as much as 35.7% better than the performance of a conventional HTM system, which has almost no overhead when a transaction aborts but detects conflict and publishes speculatively modified data when a transaction commits. Furthermore, we can expect to improve performance more by increasing the bandwidth of the common bus connecting processing nodes with each other.","PeriodicalId":186094,"journal":{"name":"2017 18th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","volume":"313 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133758048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信