2018 4th International Conference on Computer and Technology Applications (ICCTA)最新文献

筛选
英文 中文
Concepts extraction in ontology learning using language patterns for better accuracy 在本体学习中使用语言模式进行概念抽取,提高准确性
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-06-27 DOI: 10.1109/CATA.2018.8398668
Rohana Ismail, Nurazzah Abd Rahman, Z. Bakar, M. Makhtar
{"title":"Concepts extraction in ontology learning using language patterns for better accuracy","authors":"Rohana Ismail, Nurazzah Abd Rahman, Z. Bakar, M. Makhtar","doi":"10.1109/CATA.2018.8398668","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398668","url":null,"abstract":"The identification of concepts and relations via automatic or semiautomatic are tasks in Ontology Learning. The Ontology Learning is important in minimizing effort of ontology development. It has been used in many disciplines including development of Quran ontology. In the Quran ontology development, there have been efforts to identify concepts and relations for ontology development using various methods. Among the methods employed to discover concepts is a regex pattern. The pattern is based on NLP which use tagging in their rules. This paper proposed a method that used patterns to extract concepts for Hajj Ontology development. It also has been compared against a prominence Ontology Learning system i.e. Text2Onto. The patterns also have been compared with Qterm pattern which is specifically designed for Solah domain in the Quran. Results indicate that the proposed patterns improve the precision with 82.4% and recall with 85.7% as compared to the both approaches.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128472028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classification of pornographic content on Twitter using support vector machine and Naive Bayes 使用支持向量机和朴素贝叶斯分类Twitter上的色情内容
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-06-27 DOI: 10.1109/CATA.2018.8398674
N. Izzah, I. Budi, Samuel Louvan
{"title":"Classification of pornographic content on Twitter using support vector machine and Naive Bayes","authors":"N. Izzah, I. Budi, Samuel Louvan","doi":"10.1109/CATA.2018.8398674","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398674","url":null,"abstract":"The Internet has many benefits, some of them are to gain knowledge and gain the latest information. The internet can be used by anyone and can contain any information, including negative content such as pornographic content, radicalism, racial intolerance, violence, fraud, gambling, security and drugs. Those contents cause the number of children victims of pornography on social media increasing every year. Based on that, it needs a system that detects pornographic content on social media. This study aims to determine the best model to detect the pornographic content. Model selection is determined based on unigram and bigram features, classification algorithm, k-fold cross validation. The classification algorithm used is Support Vector Machine and Naive Bayes. The highest F1-score is yielded by the model with combination of Support Vector Machine, most common words, and combination of unigram and bigram, which returns F1-Score value of 91.14%.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115380074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on personalized referral service and big data mining for e-commerce with machine learning 基于机器学习的电子商务个性化推荐服务及大数据挖掘研究
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398652
Zhi Zeng, Hui-ke Rao, Ai-ping Liu
{"title":"Research on personalized referral service and big data mining for e-commerce with machine learning","authors":"Zhi Zeng, Hui-ke Rao, Ai-ping Liu","doi":"10.1109/CATA.2018.8398652","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398652","url":null,"abstract":"Machine learning (ML) is one of the main methods to address the problem of big data mining. ML can enable the e-commerce system upon self-innovate and improvement by accumulating prior knowledge. The big data produced by transaction, interaction and observation from e-commerce enterprises can greatly provide decision-making service for marketing strategy. In this paper we take the e-commerce data of tea-device enterprise as an example, use the FP-grow algorithm to get the frequent item sets, so as to mining and analyze association rule of user behavior to get feature vector as the basis of user classification, then use Naive Bayesian algorithm on the feature vector to implement clustering learning for precision marketing and personalized online referral services. Finally, we evaluate the feasibility of big data mining with ML through the profit produced by the sale of goods. Experimental results show that ML can not only greatly improve the performance in big data mining, can also achieve precise marketing, and can further increasing about 20% marginal profit for each type of goods.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130220622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Application of vision sensing technology in urban intelligent traffic control system 视觉传感技术在城市智能交通控制系统中的应用
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398659
Xiao Wen-juan, Liu Jian-feng
{"title":"Application of vision sensing technology in urban intelligent traffic control system","authors":"Xiao Wen-juan, Liu Jian-feng","doi":"10.1109/CATA.2018.8398659","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398659","url":null,"abstract":"With the acceleration of urbanization, the increasingly complicated urban traffic conditions and the continuous expansion of the overall scale have posed great challenges to urban traffic management. It is necessary that Intelligent Transport System is introduced for the future development of urban traffic management. Based on this background, the visual sensing technology is applied to the intelligent traffic control system. The CCD camera with 5 million resolution is designed and used to analyze real-time traffic entering at each intersection of urban road and calculate the traffic volume of each lane and queue, such as the vehicles length, average waiting time and other traffic parameters, which could provide real-time data to the signal light control system for dynamic signal parameter configuration to achieve intelligent single-point light signal control, trunk control and regional control. The system can be popularized and applied in the fields of intelligent signal light control and traffic information collection.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Detection of smurf flooding attacks using Kullback-Leibler-based scheme 基于kullback - leibler的smurf泛洪攻击检测
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398647
Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri
{"title":"Detection of smurf flooding attacks using Kullback-Leibler-based scheme","authors":"Benamar Bouyeddou, F. Harrou, Ying Sun, B. Kadri","doi":"10.1109/CATA.2018.8398647","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398647","url":null,"abstract":"Reliable and timely detection of cyber attacks become indispensable to protect networks and systems. Internet control message protocol (ICMP) flood attacks are still one of the most challenging threats in both IPv4 and IPv6 networks. This paper proposed an approach based on Kullback-Leibler divergence (KLD) to detect ICMP-based Denial Of service (DOS) and Distributed Denial Of Service (DDOS) flooding attacks. This is motivated by the high capacity of KLD to quantitatively discriminate between two distributions. Here, the three-sigma rule is applied to the KLD distances for anomaly detection. We evaluated the effectiveness of this scheme by using the 1999 DARPA Intrusion Detection Evaluation Datasets.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
State of the art of telepresence with a virtual reality headset 用虚拟现实耳机实现远程呈现的最新技术
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398663
Rivosoaniaina Alain Nimbol, Mahatody Thomas, R. J. Paul
{"title":"State of the art of telepresence with a virtual reality headset","authors":"Rivosoaniaina Alain Nimbol, Mahatody Thomas, R. J. Paul","doi":"10.1109/CATA.2018.8398663","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398663","url":null,"abstract":"Today we are forced to collaborate even remotely using collaborative working environment. In such an environment, non-verbal communication is not taken into account. According to Judee K. Burgoon, sixty percent of the communication are non-verbal. To bridge this gap, we suggest the use of virtual reality, namely, telepresence tools that use virtual reality Headsets. In this article we present a state of the art of the telepresence devices for capturing tones, facial expressions and body language, all of which improve the communication and understanding of the message.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121555127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A method of visual measurement based on QR code in navigation and positioning of closed-type orchard 一种基于二维码的封闭式果园导航定位视觉测量方法
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398653
Shuaixian Wang, Chenjiao Tan, Zheng Wang, Fuzeng Yang, Zhijie Liu
{"title":"A method of visual measurement based on QR code in navigation and positioning of closed-type orchard","authors":"Shuaixian Wang, Chenjiao Tan, Zheng Wang, Fuzeng Yang, Zhijie Liu","doi":"10.1109/CATA.2018.8398653","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398653","url":null,"abstract":"To realize the navigation and positioning of agricultural robot in closed-type orchard, this paper presented a method of visual measurement based on QR code. Firstly, we constructed a monocular vision measurement model based on the QR code target, then extracted the structural feature points of the QR code target in the orchard by image processing, and combined camera calibration and vision measurement gaining the relative pose between the camera and the QR code target. According to the results of experiments, this method boasts good real-time performance as the longest consuming time of applying this method to process an image for visual measurement is 0.23ms, in addition, the repeatability accuracy tests show that the maximum translation deviation is less than 3.2cm and the maximum rotation deviation is less than 2.9 ° in the range of measurement.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Conceptualization of an information system governance model dedicated to the governance of scientific research in the Moroccan University 一个信息系统治理模型的概念化,致力于治理摩洛哥大学的科学研究
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398655
Youmna El Hissi, Sara Arezki, A. Haqiq
{"title":"Conceptualization of an information system governance model dedicated to the governance of scientific research in the Moroccan University","authors":"Youmna El Hissi, Sara Arezki, A. Haqiq","doi":"10.1109/CATA.2018.8398655","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398655","url":null,"abstract":"Faced with many challenges, the concept of the governance of scientific research has emerged to answer questions of organization, structuring and regulation of this important section in higher education in Morocco. On the other hand, the technological revolution offers us several tools to support different fields and different activities, hence the establishment of an information system to ensure good governance of scientific research in the Moroccan university. This information system put in place, should demonstrate efficiency, performance and systematic alignment with the objectives of scientific research. Thus information system governance is a necessary step to ensure the governance of scientific research. The objective of this paper is to design a governance model of scientific research in the Moroccan university through the governance of its information system. This model is based on the use of recognized standards as: Cobit.5, ISO 38500, and ISO 27001, dedicated to the governance of information systems and taking into account the national context of the university.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124522262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic music generation by true random numbers for Turkish makams 土耳其makams的真随机数自动音乐生成
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398657
İsmail Hakkı Parlak, Cem Kösemen
{"title":"Automatic music generation by true random numbers for Turkish makams","authors":"İsmail Hakkı Parlak, Cem Kösemen","doi":"10.1109/CATA.2018.8398657","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398657","url":null,"abstract":"In this paper, we describe a cloud hosted — mobile first system which generates music for Turkish makams, driven by hardware generated true random numbers. Random numbers are fed into system for determining the notes and note lengths of the song in chosen makam and tempo with chosen instruments and percussion. This system can generate completely random or musical compositions according to user preferences, even though its aim is not imitating the past genius composers and compose perfectly musical pieces. The experimental results show that this composition model can produce completely random or slightly artistic music having characteristics of Turkish makam music, hence introduce inspiration and entertainment to Turkish makam music enthusiasts.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123478189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An efficient two-stage B1C signal acquisition technique for engineering implementation of the modern beidou receiver 一种有效的两级B1C信号采集技术,用于现代北斗接收机的工程实现
2018 4th International Conference on Computer and Technology Applications (ICCTA) Pub Date : 2018-05-03 DOI: 10.1109/CATA.2018.8398654
Shulin Yan, S. Zhou, Yuguo Zhang
{"title":"An efficient two-stage B1C signal acquisition technique for engineering implementation of the modern beidou receiver","authors":"Shulin Yan, S. Zhou, Yuguo Zhang","doi":"10.1109/CATA.2018.8398654","DOIUrl":"https://doi.org/10.1109/CATA.2018.8398654","url":null,"abstract":"The modern signals of the Chinese Beidou III navigation system bring new features compared to the previous civilian signals, such as longer spreading code, involving secondary code, new modulation technique (i.e. Binary Offset Carrier BOC), data/pilot channels and so on. These innovations are able to enhance the signal acquisition robustness, but they also require specific acquisition techniques to handle the large data stream, deal with the problem of sign transition and side peaks caused by the secondary code and the BOC modulation respectively. This paper proposes a novel two-stage acquisition technique for realizing efficient acquisition of the B1C signal in the engineering implementation of the modern receiver. The first stage employs an extended parallelized Averaging Correlation (AC) search structure, which can cope with the sign transition problem, to coarsely capture the signal with high efficiency. At the second stage, a fine-search process is completed within a reduced searching range to provide high precision result. The involving of the later stage aims to avoid the side peaks effect in the tracking stage that can easily cause a false lock. In addition, both of the single and channel combining acquisition techniques are introduced, which give designers an option of implementing the acquisition with higher sensitivity but more resources. The experiment results demonstrate that the proposed method allows to use much cheaper FFT blocks and enables fast acquisition by parallel process. The proposed method can reduce the number of multiplications by at least 61% when the sampling frequency is over 50MHz while providing quite similar acquisition precisions with the conventional method.","PeriodicalId":231024,"journal":{"name":"2018 4th International Conference on Computer and Technology Applications (ICCTA)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125856641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信