{"title":"Study on Science and Technology Policy trend using text network analysis in Korea","authors":"Yuntai Kim","doi":"10.1109/ICKEA.2016.7802989","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7802989","url":null,"abstract":"As the social impact of science and technology is increasing day by day, it is increasing the importance of science and technology policy. The Third Science and Technology Basic Plan, which is to be the basis of Korea Science and Technology Policy, will be established in 2013. There is need to investigate the value-oriented and policy priorities of the Science and Technology Basic Plan. The purpose of this study is to find the policy priorities and strategies by utilizing social language network analysis techniques. The data used to demonstrate the social language network analysis were the keywords of the former Science and Technology Basic Plan. The results of this study are as folIows. First, the frequency of following words (S&T, reinforcement, enhancement, R&D) is high. It reflects the policy stance of the Republic of Korea. The word appears more related to the creative economy such as creative, jobs, startups, and commercialization. Secondly, research has shown a high correlation with the investment in a context where the Republic of Korea has continued to expand its research and development budget. This study has the following meanings. First, it is faithfully reflected in the science and technology policy to ensure that the needs of the researchers and policy experts to maximize policy efficiency. Second, the case study that survey research and statistical techniques can be applied to establish policies and practices, or to reflect the Science and Technology Basic Plan in earnest for the establishment of research results in the future to expand when the methodology can be applied.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"31 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using thinking based on contradictions to solve the problem of storing hierarchical data","authors":"S. Petrova, A. Kapitonova","doi":"10.1109/ICKEA.2016.7803022","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803022","url":null,"abstract":"The paper provides an analysis of the problem by using the approach contradictions thinking and proposed several technical solutions for of hierarchical storage systems.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. W. Sihwi, Ferry Andriyanto, Rini Anggrainingsih
{"title":"An expert system for risk assessment of information system security based on ISO 27002","authors":"S. W. Sihwi, Ferry Andriyanto, Rini Anggrainingsih","doi":"10.1109/ICKEA.2016.7802992","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7802992","url":null,"abstract":"Information system security in a company is an important element that every company should pay more attention due to the attacks against the security of the data that may not be inevitable. Probably every company knows how to protect their data even though this paper proposes something new which is more efficient. One of the ways that can be used to determine the security status of the company is by doing a risk assessment. This study proposes an expert system to determine the position or the level of the security system of a company by doing a risk assessment. The standard of risk assessment is based on the ISO 27002. Forward chaining method is used for the determination of rules and scoring in this expert system. The conclusion of this study is that the integration between the risk assessment and expert system helps in determining the position of a company-level security and also determining whether the company needs to do an audit of their information systems security or not.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Vinod, S. Natarajan, S. Keerthana, K. M. Chinmayi, N. Lakshmi
{"title":"Credit Risk Analysis in Peer-to-Peer Lending System","authors":"K. Vinod, S. Natarajan, S. Keerthana, K. M. Chinmayi, N. Lakshmi","doi":"10.1109/ICKEA.2016.7803017","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803017","url":null,"abstract":"This research paper aims to analyze the credit risk involved in peer-to-peer (P2P) lending system of “LendingClub” Company. The P2P system allows investors to get significantly higher return on investment as compared to bank deposit, but it comes with a risk of the loan and interest not being repaid. Ensemble machine learning algorithms and preprocessing techniques are used to explore, analyze and determine the factors which play crucial role in predicting the credit risk involved in “LendingClub” publicly available 2013-2015 loan applications dataset. A loan is considered “good” if it's repaid with interest and on time. The algorithms are optimized to favor the potential good loans whilst identifying defaults or risky credits.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"66 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"People counting base on head and shoulder information","authors":"J. Kuo, Guo Fan, T. Lai","doi":"10.1109/ICKEA.2016.7802991","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7802991","url":null,"abstract":"This paper presents an application for counting the people who pass through the supervised area. Instead of traditional camera, this study used Kinect 2 to get the depth information of image. The processes of our approach includes preprocessing, candidate detection, tracking, identification and people counting. In the preprocessing stage, the foreground object was sliced by depth information to make detection result more robust and to reduce the computation time. In the candidate detection stage, Hough Circle Transform was applied on color image to find candidates and depth image. Calculating pixels by a circle can decide whether candidate is people or not. Finally, the results of secondary stage provide the candidate's center coordinates that was used by nearest point tracking method to track path in 30 fps.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"25 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125605399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Stich, Kerem Oflazgil, M. Schroter, Felix Jordan, G. Fuhs
{"title":"Big Data as an enabler to prevent failures in the production area","authors":"V. Stich, Kerem Oflazgil, M. Schroter, Felix Jordan, G. Fuhs","doi":"10.1109/ICKEA.2016.7803025","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803025","url":null,"abstract":"Failure management in the production area has been intensely analyzed in the research community. Although several efficient methods have been developed and partially successfully implemented, producing companies still face a lot of challenges. The resulting main question is how manufacturers can be assisted by a sustainable approach enabling them to proactively detect and prevent failures before they occur. A high-resolution production system based on analyzed real-time data enables manufacturers to find an answer to the main question. In this context, Big Data technologies have gained importance since the critical success factor is not only to collect real-time data in the production but also to structure the data. Therefore, we present in this paper the implementation of Big Data technologies in the production area using the example of an actual research project. After the literature review, we describe a Big Data based approach to prevent failures in the production area. This approach mainly includes a real-time capable platform including complex event processing algorithms to define appropriate improvement measures.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting the gross calorific value of coal based on support vector machine and partial least squares algorithm","authors":"Li Jing","doi":"10.1109/ICKEA.2016.7803023","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803023","url":null,"abstract":"In view of the problem of inaccurately measuring the gross calorific value of coal, this paper analyzed the relationship between industry analysis data and calorific value of fire coal into the furnace, and five kinds of industrial analysis components were selected as the original independent variables, which were moisture, ash, volatile matter, sulphur content and fixed carbon in fire coal. In the process of modelling, the latent variable factors were extracted by the partial least square regression method, and the latent variables were selected as the input vectors and coal-fired calorific value as the output vector, then the power plant coal calorific value forecasting model was built based on support vector machine regression algorithm. The predicted results showed that, the accuracy of the coupled model was higher than that of the single model and the forecasting deviations met engineering requirements. Therefore, the model proposed here has practical engineering application value. At the same time, in the process of modelling, the five-point method was used to determine the optimal combination of penalty coefficient and kernel coefficient in the process of modelling. The method could quickly and accurately determine the optimal combination and avoid the blindness of the traditional method in the process of determining the optimal combination of penalty coefficient and kernel coefficient.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge extraction through etymological networks: Synonym discovery in Sino-Korean words","authors":"E. Pablo, Kyomin Jung","doi":"10.1109/ICKEA.2016.7803019","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803019","url":null,"abstract":"Extracting knowledge from a text is a very active area of research. Techniques such as word embedding and LSA have brought great breakthroughs and have been used in applications such as automatic translation. We propose a novel approach to extract knowledge from text that relies on a graph to express the complex etymological structures formed by the historical roots of words. Our approach is specially fit for the study of Sino-Korean vo- cabulary, where the etymological roots of words are clearly shown in their writing. We use our approach to build a bipartite graph based on the Chinese etymological roots of Sino-Korean words, and then use the network structure to extract features describing pairs of nodes. We used these features in a classification scheme to discover pairs of nodes that represent synonym characters. Our model is simpler than previous work on synonym discovery with Chinese characters, and obtains good results. The code and data for our work are made openly available.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"2004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reflection on the application of the DFSG method","authors":"Mohanad Halaweh","doi":"10.1109/ICKEA.2016.7803011","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803011","url":null,"abstract":"The aim of this paper is to reflect on the application of a new qualitative research method called the Discount Focus Subgroup (DFSG) method, which was originated from Information systems (IS) research. The paper provides a critical evaluation of the method. It highlights the dilemmas/pitfalls that a researcher might encounter when applying this method, and shows how these can be avoided or lessened. It also provides directions for future research work to further develop this method. This method can be effective for gathering qualitative research data, acquiring knowledge or eliciting system requirements.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130188976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The development of a Kinect-based online socio-meter for users with social and communication skill impairments: A computational sensing approach","authors":"Pinata Winoto, C. Chen, T. Tang","doi":"10.1109/ICKEA.2016.7803007","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803007","url":null,"abstract":"Some people have impairments in social skills due to autism, phobia, or physical disabilities such as blindness. The proposed web-based system is intended to measure social interaction and communication among people situated around the target user based on their gestures and behaviors. Such multimodal portraits of behavioral data will be captured using the Kinect sensor (version 2) and provide rich sources to predict their social relationship, which will then be delivered to the target user in both qualitative and quantitative units, either in mobile or desktop applications. Currently, our system is capable of capturing and analyzing the raw data, sending the processed one to Microsoft Azure for data visualization and further behavioral analysis. The visualized data can then be ported to the therapists, doctors, parents, or caregivers for further actions. Unlike previous works which aim to accurately classify the dyadic social interactions between an adult-child pair, and thus characterizing the physiological synchrony between the pair, our study thereby adds richness to the understanding of computational sensing for the diagnosis, assessment and intervention of children with autism.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}