2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)最新文献

筛选
英文 中文
Study on Science and Technology Policy trend using text network analysis in Korea 基于文本网络分析的韩国科技政策走向研究
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7802989
Yuntai Kim
{"title":"Study on Science and Technology Policy trend using text network analysis in Korea","authors":"Yuntai Kim","doi":"10.1109/ICKEA.2016.7802989","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7802989","url":null,"abstract":"As the social impact of science and technology is increasing day by day, it is increasing the importance of science and technology policy. The Third Science and Technology Basic Plan, which is to be the basis of Korea Science and Technology Policy, will be established in 2013. There is need to investigate the value-oriented and policy priorities of the Science and Technology Basic Plan. The purpose of this study is to find the policy priorities and strategies by utilizing social language network analysis techniques. The data used to demonstrate the social language network analysis were the keywords of the former Science and Technology Basic Plan. The results of this study are as folIows. First, the frequency of following words (S&T, reinforcement, enhancement, R&D) is high. It reflects the policy stance of the Republic of Korea. The word appears more related to the creative economy such as creative, jobs, startups, and commercialization. Secondly, research has shown a high correlation with the investment in a context where the Republic of Korea has continued to expand its research and development budget. This study has the following meanings. First, it is faithfully reflected in the science and technology policy to ensure that the needs of the researchers and policy experts to maximize policy efficiency. Second, the case study that survey research and statistical techniques can be applied to establish policies and practices, or to reflect the Science and Technology Basic Plan in earnest for the establishment of research results in the future to expand when the methodology can be applied.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"31 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124688261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using thinking based on contradictions to solve the problem of storing hierarchical data 运用基于矛盾的思维解决分层数据的存储问题
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803022
S. Petrova, A. Kapitonova
{"title":"Using thinking based on contradictions to solve the problem of storing hierarchical data","authors":"S. Petrova, A. Kapitonova","doi":"10.1109/ICKEA.2016.7803022","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803022","url":null,"abstract":"The paper provides an analysis of the problem by using the approach contradictions thinking and proposed several technical solutions for of hierarchical storage systems.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125565428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An expert system for risk assessment of information system security based on ISO 27002 基于ISO 27002的信息系统安全风险评估专家系统
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7802992
S. W. Sihwi, Ferry Andriyanto, Rini Anggrainingsih
{"title":"An expert system for risk assessment of information system security based on ISO 27002","authors":"S. W. Sihwi, Ferry Andriyanto, Rini Anggrainingsih","doi":"10.1109/ICKEA.2016.7802992","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7802992","url":null,"abstract":"Information system security in a company is an important element that every company should pay more attention due to the attacks against the security of the data that may not be inevitable. Probably every company knows how to protect their data even though this paper proposes something new which is more efficient. One of the ways that can be used to determine the security status of the company is by doing a risk assessment. This study proposes an expert system to determine the position or the level of the security system of a company by doing a risk assessment. The standard of risk assessment is based on the ISO 27002. Forward chaining method is used for the determination of rules and scoring in this expert system. The conclusion of this study is that the integration between the risk assessment and expert system helps in determining the position of a company-level security and also determining whether the company needs to do an audit of their information systems security or not.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123760983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Credit Risk Analysis in Peer-to-Peer Lending System p2p借贷系统中的信用风险分析
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803017
K. Vinod, S. Natarajan, S. Keerthana, K. M. Chinmayi, N. Lakshmi
{"title":"Credit Risk Analysis in Peer-to-Peer Lending System","authors":"K. Vinod, S. Natarajan, S. Keerthana, K. M. Chinmayi, N. Lakshmi","doi":"10.1109/ICKEA.2016.7803017","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803017","url":null,"abstract":"This research paper aims to analyze the credit risk involved in peer-to-peer (P2P) lending system of “LendingClub” Company. The P2P system allows investors to get significantly higher return on investment as compared to bank deposit, but it comes with a risk of the loan and interest not being repaid. Ensemble machine learning algorithms and preprocessing techniques are used to explore, analyze and determine the factors which play crucial role in predicting the credit risk involved in “LendingClub” publicly available 2013-2015 loan applications dataset. A loan is considered “good” if it's repaid with interest and on time. The algorithms are optimized to favor the potential good loans whilst identifying defaults or risky credits.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"66 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
People counting base on head and shoulder information 人们根据头和肩的信息来计数
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7802991
J. Kuo, Guo Fan, T. Lai
{"title":"People counting base on head and shoulder information","authors":"J. Kuo, Guo Fan, T. Lai","doi":"10.1109/ICKEA.2016.7802991","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7802991","url":null,"abstract":"This paper presents an application for counting the people who pass through the supervised area. Instead of traditional camera, this study used Kinect 2 to get the depth information of image. The processes of our approach includes preprocessing, candidate detection, tracking, identification and people counting. In the preprocessing stage, the foreground object was sliced by depth information to make detection result more robust and to reduce the computation time. In the candidate detection stage, Hough Circle Transform was applied on color image to find candidates and depth image. Calculating pixels by a circle can decide whether candidate is people or not. Finally, the results of secondary stage provide the candidate's center coordinates that was used by nearest point tracking method to track path in 30 fps.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"25 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125605399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Big Data as an enabler to prevent failures in the production area 大数据是防止生产区域故障的推动者
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803025
V. Stich, Kerem Oflazgil, M. Schroter, Felix Jordan, G. Fuhs
{"title":"Big Data as an enabler to prevent failures in the production area","authors":"V. Stich, Kerem Oflazgil, M. Schroter, Felix Jordan, G. Fuhs","doi":"10.1109/ICKEA.2016.7803025","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803025","url":null,"abstract":"Failure management in the production area has been intensely analyzed in the research community. Although several efficient methods have been developed and partially successfully implemented, producing companies still face a lot of challenges. The resulting main question is how manufacturers can be assisted by a sustainable approach enabling them to proactively detect and prevent failures before they occur. A high-resolution production system based on analyzed real-time data enables manufacturers to find an answer to the main question. In this context, Big Data technologies have gained importance since the critical success factor is not only to collect real-time data in the production but also to structure the data. Therefore, we present in this paper the implementation of Big Data technologies in the production area using the example of an actual research project. After the literature review, we describe a Big Data based approach to prevent failures in the production area. This approach mainly includes a real-time capable platform including complex event processing algorithms to define appropriate improvement measures.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126610399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting the gross calorific value of coal based on support vector machine and partial least squares algorithm 基于支持向量机和偏最小二乘算法的煤总发热量预测
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803023
Li Jing
{"title":"Predicting the gross calorific value of coal based on support vector machine and partial least squares algorithm","authors":"Li Jing","doi":"10.1109/ICKEA.2016.7803023","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803023","url":null,"abstract":"In view of the problem of inaccurately measuring the gross calorific value of coal, this paper analyzed the relationship between industry analysis data and calorific value of fire coal into the furnace, and five kinds of industrial analysis components were selected as the original independent variables, which were moisture, ash, volatile matter, sulphur content and fixed carbon in fire coal. In the process of modelling, the latent variable factors were extracted by the partial least square regression method, and the latent variables were selected as the input vectors and coal-fired calorific value as the output vector, then the power plant coal calorific value forecasting model was built based on support vector machine regression algorithm. The predicted results showed that, the accuracy of the coupled model was higher than that of the single model and the forecasting deviations met engineering requirements. Therefore, the model proposed here has practical engineering application value. At the same time, in the process of modelling, the five-point method was used to determine the optimal combination of penalty coefficient and kernel coefficient in the process of modelling. The method could quickly and accurately determine the optimal combination and avoid the blindness of the traditional method in the process of determining the optimal combination of penalty coefficient and kernel coefficient.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Knowledge extraction through etymological networks: Synonym discovery in Sino-Korean words 基于词源网络的知识提取:汉朝词语的同义词发现
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803019
E. Pablo, Kyomin Jung
{"title":"Knowledge extraction through etymological networks: Synonym discovery in Sino-Korean words","authors":"E. Pablo, Kyomin Jung","doi":"10.1109/ICKEA.2016.7803019","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803019","url":null,"abstract":"Extracting knowledge from a text is a very active area of research. Techniques such as word embedding and LSA have brought great breakthroughs and have been used in applications such as automatic translation. We propose a novel approach to extract knowledge from text that relies on a graph to express the complex etymological structures formed by the historical roots of words. Our approach is specially fit for the study of Sino-Korean vo- cabulary, where the etymological roots of words are clearly shown in their writing. We use our approach to build a bipartite graph based on the Chinese etymological roots of Sino-Korean words, and then use the network structure to extract features describing pairs of nodes. We used these features in a classification scheme to discover pairs of nodes that represent synonym characters. Our model is simpler than previous work on synonym discovery with Chinese characters, and obtains good results. The code and data for our work are made openly available.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"2004 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125830553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reflection on the application of the DFSG method 对DFSG方法应用的思考
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803011
Mohanad Halaweh
{"title":"Reflection on the application of the DFSG method","authors":"Mohanad Halaweh","doi":"10.1109/ICKEA.2016.7803011","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803011","url":null,"abstract":"The aim of this paper is to reflect on the application of a new qualitative research method called the Discount Focus Subgroup (DFSG) method, which was originated from Information systems (IS) research. The paper provides a critical evaluation of the method. It highlights the dilemmas/pitfalls that a researcher might encounter when applying this method, and shows how these can be avoided or lessened. It also provides directions for future research work to further develop this method. This method can be effective for gathering qualitative research data, acquiring knowledge or eliciting system requirements.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130188976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The development of a Kinect-based online socio-meter for users with social and communication skill impairments: A computational sensing approach 为社交和沟通技能障碍的用户开发基于kinect的在线社会测量仪:一种计算传感方法
2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA) Pub Date : 2016-09-01 DOI: 10.1109/ICKEA.2016.7803007
Pinata Winoto, C. Chen, T. Tang
{"title":"The development of a Kinect-based online socio-meter for users with social and communication skill impairments: A computational sensing approach","authors":"Pinata Winoto, C. Chen, T. Tang","doi":"10.1109/ICKEA.2016.7803007","DOIUrl":"https://doi.org/10.1109/ICKEA.2016.7803007","url":null,"abstract":"Some people have impairments in social skills due to autism, phobia, or physical disabilities such as blindness. The proposed web-based system is intended to measure social interaction and communication among people situated around the target user based on their gestures and behaviors. Such multimodal portraits of behavioral data will be captured using the Kinect sensor (version 2) and provide rich sources to predict their social relationship, which will then be delivered to the target user in both qualitative and quantitative units, either in mobile or desktop applications. Currently, our system is capable of capturing and analyzing the raw data, sending the processed one to Microsoft Azure for data visualization and further behavioral analysis. The visualized data can then be ported to the therapists, doctors, parents, or caregivers for further actions. Unlike previous works which aim to accurately classify the dyadic social interactions between an adult-child pair, and thus characterizing the physiological synchrony between the pair, our study thereby adds richness to the understanding of computational sensing for the diagnosis, assessment and intervention of children with autism.","PeriodicalId":241850,"journal":{"name":"2016 IEEE International Conference on Knowledge Engineering and Applications (ICKEA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信