Lan Huang, Congcong Yu, Yang Chi, Xiaohui Qi, Hao Xu
{"title":"Towards Smart Healthcare Management Based on Knowledge Graph Technology","authors":"Lan Huang, Congcong Yu, Yang Chi, Xiaohui Qi, Hao Xu","doi":"10.1145/3316615.3316678","DOIUrl":"https://doi.org/10.1145/3316615.3316678","url":null,"abstract":"With the improvement of people's living standards, people pay more and more attention to healthcare, in which a healthy diet plays an important role. Therefore, a scientific knowledge management method about healthy diet which can integrate heterogeneous information from different sources and formats is urgently needed to reduce the information gaps and increase the utilization ratio of information. In this paper, we propose a healthy diet knowledge graph construction model that promotes the development of healthcare management. The model mainly consists of three modules: named entity recognition, relation recognition and entity relevance computation, which are implemented with conditional random fields, support vector machine and decision tree algorithms respectively. These three modules obtain good performances with 91.7%, 99% and 87% F1 score on the datasets from three different websites. Based on the above results, we build a healthy diet knowledge graph by using ontology which contains food, symptom, population, and nutrient element entities as well as relations between food and entities mentioned above, so that people can use it for diet recommendations and other tasks.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123587422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Efficient Query Strategy on Hibernate","authors":"Shuo Kuai, Yupeng Hu, Xinxiao Zhao, Dong Qin, Wentao Li, Xueqing Li","doi":"10.1145/3316615.3316717","DOIUrl":"https://doi.org/10.1145/3316615.3316717","url":null,"abstract":"Database is an indispensable part of software development. In order to reduce unnecessary and redundant processes of accessing in database, the concept of Object-Relational Mapping (ORM) has been proposed and its corresponding applications have been widely accepted by developers. However, for a certain software system, accessing database systems is often one of the most common bottlenecks in performance improvement. In this paper, we propose the concept of \"reference column(s)\". In the actual business, there are many query operations with \"reference column(s)\" (non-primary) as parameters. Hibernate, as a popular ORM framework, provides excellent support for the above operation. Hibernate also implements a caching mechanism for storing query results. However, columns other than \"reference column(s)\" in these results may be frequently modified. Once any one of the above results has been updated, the corresponding searching could not be permitted to access the previous results storing in the cache. Accordingly, we propose a new hash-code based cache approach to avoid the emergence of the above problem. Extensive experiments on typical E-commerce datasets have been conducted to demonstrate the advantages of our approach.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123829266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-Level Human Action Change Detection Using the Motion History Image","authors":"Yohwan Noh, Dohoon Lee","doi":"10.1145/3316615.3316725","DOIUrl":"https://doi.org/10.1145/3316615.3316725","url":null,"abstract":"Human action recognition is an active topic in computer vision. In recent years, tangible results have been shown through deep learning methods; however, at a very high computational cost. They may be suitable for video retrieval or video summarization of a movie or drama, but they are not suitable for the visual surveillance of human action, which should be analyzed in real time. In this study, we propose an action change detection method to reduce the computational cost. On the surveillance camera screen, anomalous actions such as movies and sports are frequently not observed, and simple actions are often repeated. Thus, it is very inefficient to continue to apply high cost action recognition methods on repeated actions. The proposed action change detection method decides whether the previous action of the person is the same as the current action. The action recognition method is applied only when it has determined that the action has changed. The action change detection process is as follows. First, extract the motion history image from the input video and create one-dimensional time-series data. Second, determine the action change using the change of time-series data trend by the threshold. Experiments on the proposed method were performed on the KTH dataset.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Segmentation of Microscopic Breast Cancer Images for Cancer Detection","authors":"Hamit Altıparmak, Fatih Veysel Nurçin","doi":"10.1145/3316615.3316695","DOIUrl":"https://doi.org/10.1145/3316615.3316695","url":null,"abstract":"Breast cancer is one of serious diseases that affect mainly woman and late diagnosis can lead to death. However early diagnosis increases survivability significantly, therefore making it very important. There are different diagnosis techniques for early detection of breast cancer. Breast tissue samples analyzed under microscope is considered reliable way to diagnose breast cancer. Automated classification techniques are so popular in many areas in order to reduce human dependency considering third world countries. Our purpose is to determine if sample is malignant or benign in automated manner. Many algorithms are studied so far in medical area along with other areas. However, algorithms are generally too complex even for simple tasks. We propose a simple algorithm that can differentiate cancerous and non-cancerous samples from breast tissue in automated manner. The images were taken from Near East University Hospital which is consisted of 50 cancerous and 100 healthy images. Total of 150 images were correctly differentiated through our algorithm.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Privacy Preserving Data Mining Approaches and Techniques","authors":"M. M. Siraj, Nurul Adibah Rahmat, M. Din","doi":"10.1145/3316615.3316632","DOIUrl":"https://doi.org/10.1145/3316615.3316632","url":null,"abstract":"In recent years, the importance of the Internet in our personal as well as our professional lives cannot be overstated as can be observed from the immense increase of its users. It therefore comes as no surprise that a lot of businesses are being carried out over the internet. It brings along privacy threats to the data and information of an organization. Data mining is the processing of analyze larger data in order to discover patterns and analyze hidden data concurring to distinctive sights for categorize into convenient information which is collected and assembled in common areas and other information necessities to eventually cut costs and increase revenue. In fact, the data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, there was been growing concern that use of this technology is violating individual privacy. This tool aims to find useful patterns from large amount of data using by mining algorithms and approaches. The analysis of privacy preserving data mining (PPDM) algorithms should consider the effects of these algorithms in mining the results as well as in preserving privacy. Therefore, the success of privacy preserving data mining algorithms is measured in term of its performances, data utility, level of uncertainty, data anonymization, data randomization and so on based on data mining techniques and approaches are presented in this paper to analyze.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116874056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart City Bus Application with Quick Response (QR) Code Payment","authors":"Sim Liew Fong, D. Yung, F. Y. Ahmed, A. Jamal","doi":"10.1145/3316615.3316718","DOIUrl":"https://doi.org/10.1145/3316615.3316718","url":null,"abstract":"Mobile application that is available in Android operating system can do many functions such as access to the internet wirelessly, take digital photos, or even locate itself using Global Positioning System. Smart City Bus Application is an application that assist users in providing public buses' information such as bus route view on map, quick response (QR) code payment, etc. This paper however will discuss about the results from system testing and passengers' satisfaction view of each of the system's functions. System testing was performed using black-box method by sorting to project's objectives. The result from system testing is all positive meaning it is performed as expected from given input. In the other hand, acceptance testing was conducted by giving out the application to get evaluated by selected people that uses bus frequently. After testing, questionnaire where given to score each system's feature scaling from 1 to 5 as \"Not Satisfy\" and \"Very Satisfy\" respectively. In the end of the questionnaire, system's overall score was asked and the result is mostly positive.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121903824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xinni Liu, Fengrong Han, K. Ghazali, I. Mohamed, Yue Zhao
{"title":"A review of Convolutional Neural Networks in Remote Sensing Image","authors":"Xinni Liu, Fengrong Han, K. Ghazali, I. Mohamed, Yue Zhao","doi":"10.1145/3316615.3316712","DOIUrl":"https://doi.org/10.1145/3316615.3316712","url":null,"abstract":"Effectively analysis of remote-sensing images is very important in many practical applications, such as urban planning, geospatial object detection, military monitoring, vegetation mapping and precision agriculture. Recently, convolutional neural network based deep learning algorithm has achieved a series of breakthrough research results in the fields of objective detection, image semantic segmentation and image classification, etc. Their powerful feature learning capabilities have attracted more attention and have important research value. In this article, firstly we have summarized the basic structure and several classical convolutional neural network architectures. Secondly, the recent research problems on convolutional neural network are discussed. Later, we summarized the latest research results in convolutional neural network based remote sensing fields. Finally, the conclusion has made on the basis of current issue on convolutional neural networks and the future development direction.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129635892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, F. Y. Ahmed, A. Jamal
{"title":"Smart Transportation System Using RFID","authors":"Sim Liew Fong, Amir Ariff Azham bin Abu Bakar, F. Y. Ahmed, A. Jamal","doi":"10.1145/3316615.3316719","DOIUrl":"https://doi.org/10.1145/3316615.3316719","url":null,"abstract":"The toll collection system in Malaysia has been one of the causes of traffic jams throughout major highways. One of the reasons for this is due to the fact that users need to either stop their car or slow down to pay for their toll fees. With the advancement of technology over the years, in particular, Radio-Frequency Identification (RFID), we can expect a faster reading time / response time by the device. By adapting RFID into toll collection system, there will be no need for boom barriers. While it is true that boom barriers avoid defaulters from using the toll, boom barriers also slow down the flow of traffic during peak hours. This project will provide a proof of concept by using a much weaker form of RFID to show that it is viable. The methodology that will be used for this particular project is Agile Unified Process (AUP).","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126748696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System","authors":"Yee Jian Chew, S. Ooi, Kok-Seng Wong, Y. Pang","doi":"10.1145/3316615.3316626","DOIUrl":"https://doi.org/10.1145/3316615.3316626","url":null,"abstract":"Network-based Intrusion Detection System (IDS) is gaining wide attention from the research community since the past decades. While having a precise classification model in separating the normal and malicious network traffics is still remain as the ultimate goal, the privacy protection for network traffic database cannot be ignore as well. The impetuous ignorance of database privacy will continue to restrain governments, organisations and individuals in releasing the real and ontological network traces. The common solution to tackle this matter is anonymising the database through the statistical approach. Anonymising can be referred to masking, hiding or removing certain sensitive information from the database. Thus, this will be subsequently resulting in information loss. In this paper, a truncation method is explored to preserve the sensitive information of the network traffic database (i.e. IP addresses). The truncated database is then tested with 10 machine learning classifiers from Weka. We tested four different options of IP address truncation against the 6 percent of GureKDDCup dataset.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, M. Husin
{"title":"Managing Quality Assurance Challenges of DevOps through Analytics","authors":"Mahmoud Mohammad Ahmad Ibrahim, Sharifah Mashita Syed-Mohamad, M. Husin","doi":"10.1145/3316615.3316670","DOIUrl":"https://doi.org/10.1145/3316615.3316670","url":null,"abstract":"DevOps is an intermarriage between developmental practices and operational modalities. The methodology employs the practices of continuous integration and delivery and places the deployment pipeline as the main requirement to automate, deliver and operate software in a robust way, without compromising on the quality in the software development process. Over time, many systems and tools have been developed to implement the deployment pipeline and support the continuous delivery process. A pipeline splits the process of software delivery into various stages. Each stage is designed to verify the quality of new features from a new perspective to attest to the functionality and prevent either small or big errors from impacting the end users. The pipeline must provide a response and feedback loop to the concerned team and provide a window into the flow of changes that takes place. However, there is no clear rule to define what goes into a pipeline. This paper reviews the challenges of quality assurance of DevOps and provides tentative recommendations to deal with quality issues. Our proposed pipeline with analytic features is expected to provide accurate metrics on a real-time basis.","PeriodicalId":268392,"journal":{"name":"Proceedings of the 2019 8th International Conference on Software and Computer Applications","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}