{"title":"Enhanced Gaussian Mixture Model for Indoor Positioning Accuracy","authors":"C. Tseng, Jing-Shyang Yen","doi":"10.1109/ICS.2016.0099","DOIUrl":"https://doi.org/10.1109/ICS.2016.0099","url":null,"abstract":"Received Signal Strength Indicator (RSSI) is used in indoor positioning for measuring object distance to the base station. However, acquiring accurate RSSI values is challenging because wireless interference factors, such as multipath decline interference, make RSSI values of the same object fluctuate over time. Therefore, instead of a single RSSI, RSSI acquisition will collect a set of RSSI values from which the most moderate RSSI is derived. For this purpose, we propose an Enhanced Gaussian Mixture Model (EGMM) to derive a more precise RSSI for improving indoor positioning accuracy. EGMM enhances Gaussian Mixture Model (GMM) by applying Akaike information criterion (AIC) to determine the best K value for GMM to divide RSSI values into K sets representing signals from different paths. Then, EGMM identifies the most appropriate set of RSSI values to derive a more precise RSSI and thus improves the accuracy of indoor positioning. Our EGMM solution performs well in an open indoor space. The experiment is conducted with iBeacon devices, and the average error distance of EGMM is about 64% of those generated by existing Gaussian filtering. The average positioning error of EGMM is about 0.48 meter, which is adequate to indoor positioning accuracy.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132240245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Reinforcement Learning to Achieve Two Wheeled Self Balancing Control","authors":"Ching-Lung Chang, Shih-Yu Chang","doi":"10.1109/ICS.2016.0029","DOIUrl":"https://doi.org/10.1109/ICS.2016.0029","url":null,"abstract":"The non-linear, unstable system of the two wheeled self-balancing robot has made it a popular research subject within the past decade. This paper outlines the design of a two wheeled robot with self balancing control systems using Reinforcement Learning. The BeagleBone Black platform was used to design the two wheeled robot. Along with the motor, the robot was also equipped with an accelerometer and gyroscope. Using the Q-Learning method, adjustments to the motor were made according to the dip angle and the angular velocity at that given time to return the robot to balance. The experimental results show that using this reinforcement learning method, the robot has the ability to quickly return to a balanced state under any dip angle.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Opinion Mining System with Design Pattern","authors":"Nien-Lin Hsueh","doi":"10.1109/ICS.2016.0128","DOIUrl":"https://doi.org/10.1109/ICS.2016.0128","url":null,"abstract":"Due to the sheer volume of opinion rich web resources such as discussion forum, review sites, blogs, and news corpora available in digital form, much of the current research is focusing on the area of sentiment analysis. People are intended to develop a system that can identify and classify opinion or sentiment as represented in an electronic text. An accurate method for predicting sentiments could enable us, to extract opinions from the internet and predict on-line customer's preferences, which could prove valuable for economic or marketing research. In this paper we present a framework for opinion mining in Traditional Chinese-called FOM (Framework of Opinion Mining) to collect unstructured articles in the popular web site and analyse the opinion and sentiment in the semi-automatic way. The framework is developed by objected oriented design patterns, such as to support the flexibility and maintainability. With the FOM framework, new analysis algorithm can be easily replaced and integrated in a new application. A flood predication application based on facebook text in Taiwan will be demonstrated in this paper.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129024759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Inference of Share Stacking Based on Progressive Visual Cryptography","authors":"Y. Zeng, Wen-Tsung Chang","doi":"10.1109/ICS.2016.0054","DOIUrl":"https://doi.org/10.1109/ICS.2016.0054","url":null,"abstract":"The objective of visual cryptography is to hide secret in multiple share images. Then, stacking share images together decrypts hidden secret by human visual system. As the share images are given with different priorities, those share images hide various degrees of secret, which is the objective of progressive visual cryptography. This paper presents a scheme to realize progressive visual cryptography. A 2x2 block is the basic element of share image, and we design block pairs for secret hiding as well as secret encryption. The degrees of hidden secret depend on the priorities of share images. The proposed scheme is capable of decrypting partial secret and inferring the stacked shares. The experiment results will demonstrate that our scheme further achieves applications based on progressive visual cryptography, including self-decryption watermark, and inference of shares stacking.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient and Secure Public Batch Auditing Protocol for Dynamic Cloud Storage Data","authors":"Liu Yang, Lili Xia","doi":"10.1109/ICS.2016.0138","DOIUrl":"https://doi.org/10.1109/ICS.2016.0138","url":null,"abstract":"Cloud storage supplies enormous convenience for numerous companies and individuals to manage their data. However, data owners lose ultimately physical control of their data, which introduces many potential safety hazards in the cloud storage environment. Many scholars have made studies on the security problem of cloud storage data. To solve the problem, we propose a secure audit scheme supporting dynamic operation and transparent verification. Utilizing BLS short signature as well as the sequence-enforced B+ Hash Tree structure, the audit scheme is more effective. The scheme introduces an organizer in the auditing process to prevent the TPA from getting any information about the data's location. Thus, the scheme is completely transparent for TPA. Meanwhile, the scheme utilizes random mask and bilinear aggregate signature technology to realize privacy protection and batch audit.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125828744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Goal-Driven Attribute Selection Method for Recommendation Systems","authors":"Ching-Jung Lee, Alan Liu, Po-Hsuan Lu, Power Wu","doi":"10.1109/ICS.2016.0118","DOIUrl":"https://doi.org/10.1109/ICS.2016.0118","url":null,"abstract":"This paper reports a requirements engineering approach to attribute selection for enhancing the results of a recommendation system. A recommendation system suffers the sparsity problem and the cold start problem with collaborative filtering which are caused by the lack of data. Our method is to introduce more timely information of user preferences to enhance the recommendation results that meet the current needs of a user. The proposed method uses a goal-driven approach with the support of the Analytic Hierarchy Process in attribute selection. The experiments show that this method derives promising results.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121629418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New Method for Industry 4.0 Machine Status Prediction - A Case Study with the Machine of a Spring Factory","authors":"Tzu-Yu Lin, Yo-Ming Chen, Don-Lin Yang, Yi-Chung Chen","doi":"10.1109/ICS.2016.0071","DOIUrl":"https://doi.org/10.1109/ICS.2016.0071","url":null,"abstract":"In response to the technological development in recent years, many technology giants are making efforts toward Industry 4.0. However, many small-and medium-sized factories cannot even computerize and automate their factories, which is the foundation of Industry 4.0, due to inadequate capital and scale. This is because the majority of these factories are still using conventional machines in which the data cannot be digitized. Consequently, they cannot achieve the goal of Industry 4.0. This work therefore proposes a simple approach that facilitates the transition of these small-and medium-sized factories. The approach uses add-on triaxial sensors to aid in machine monitoring. The data obtained is analyzed for abnormalities using neural networks. Experiment results demonstrate the validity of the proposed approach.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Task Ranking and Allocation Heuristics for Efficient Workflow Schedules","authors":"Kuo-Chan Huang, Meng-Han Tsai","doi":"10.1109/ICS.2016.0108","DOIUrl":"https://doi.org/10.1109/ICS.2016.0108","url":null,"abstract":"Task ranking and allocation are two major steps in list-based workflow scheduling. This paper explores various possibilities, evaluates recent approaches in the literature, and proposes several new task ranking and allocation heuristics. A series of simulation experiments have been conducted to evaluate the proposed heuristics. Experimental results indicate that effectiveness of task ranking and allocation heuristics largely depends on the characteristics of workflows to be scheduled, and our new scheduling heuristics can outperform previous methods when dealing with workflows of high CCR (Communication-to-Computation Ratio) values.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125000198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abnormal Event Detection Using Microsoft Kinect in a Smart Home","authors":"Hsiu-Yu Lin, Yu-Ling Hsueh, W. Lie","doi":"10.1109/ICS.2016.0064","DOIUrl":"https://doi.org/10.1109/ICS.2016.0064","url":null,"abstract":"In this paper, we present a continuous deep learning model for fall detection using Microsoft Kinect. The input include pre-processed high-resolution RGB images, depth images collected by a Kinect and optical flow images. We combine several deep learning structures including convolutional neural networks and long short-term memory networks for continuous human fallen detection. Finally, we present experimental results to demonstrate the performance and utility of our approach.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125018105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expressing Requirements of Spot Services in Problem Frames: Design Domains as Physical-Lexical Domains","authors":"Chin-Yun Hsieh, Yu Chin Cheng, J. Jwo","doi":"10.1109/ICS.2016.0117","DOIUrl":"https://doi.org/10.1109/ICS.2016.0117","url":null,"abstract":"An extension to the design domain of problem frames has been proposed. The proposed extension is intended to cope with the inclusion of lexical design domains that have physical counterparts with the equivalent information. An example of the use of such a physical counterpart is illustrated with a spot service application in patient monitoring.","PeriodicalId":281088,"journal":{"name":"2016 International Computer Symposium (ICS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}