{"title":"Using QFD Method to Integrate Artworks and Product A Case Study of Tea Set","authors":"J. Lee, Shuo-fang Liu","doi":"10.1145/3301326.3301329","DOIUrl":"https://doi.org/10.1145/3301326.3301329","url":null,"abstract":"Purpose: With the emerging trend of cultural innovation management, products design and art order allocation have become very important in this competitive world. In this paper, we try to know how to develop beverage products fitting for the customers, especially in relation to joint design, art and beverage products. Due to the importance of environmental concerns, both qualitative and quantitative environmental criteria are taken into account in this research. The proposed model comprises two phases namely a three-stage QFD, and a multi-objective model. In beverages industry, usually each produce step is an independent department. The workers usually like to use their familiar materials and skills in their professional job. Especially, they often focus on production process and traditional cognition, but they hardly work together. Design/methodology/approach: In this study, we used the vocabulary image method to analyze the product's characteristics. We invited an oil painter, a potter, and asked them to provide ten works for analysis. We used the 500 adjectives to match the description of the works. The experts selected some commonly used adjectives to form a screening system which describes the works features. In the system, we divided into 7 levels as a force of the word. In this study, we used the case study method to analyze the artists who have worked in the art field for more than fifteen years and often held exhibitions because the artists had considerable artistic experience. We let the artists taste beverages and decide the score. We recorded the process about the artist idea and feeling trying to describe a special process of beverages taste. Via mapping the style map, we ask artists to create a new work to show their beverages taste feeling. Findings: This study hopes to narrow the idea gap between the artworks and beverage products. We invited two artists to provide their works as a sample and used semantic analysis method to analyze their works. From the semantic to the production processes, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other one's idea, especially the designer and producer. As a reference, this study expected to promote the required study staff to improve their products. The application of the proposed model is shown in beverage industry. Originality/value: This study hopes to narrow the idea gap between the artworks and beverage products. We invited two artists to provide their works as a sample and used semantic analysis method to analyze their works. From the semantic to the production processes, we used the Semantic Differential Scale and the QFD (Quality Function Deployment) method to create a way to let the artist understand other one's idea, especially the designer and producer.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116720393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Machine Learning Techniques in Intrusion Detection","authors":"Praiya Tungjaturasopon, K. Piromsopa","doi":"10.1145/3301326.3301335","DOIUrl":"https://doi.org/10.1145/3301326.3301335","url":null,"abstract":"This paper presents the performance analysis of machine learning techniques in intrusion detection. We analyze time to build (and to retrain) the models used by Intrusion Detection System. Machine Learning is a branch of computer science that allows computer to learn by themselves without programming sequence. These techniques can be applied to detect new threat that has never seen before. Due to the large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing the accuracy of IDS becomes an important open problem that is receiving attentions from the research community. However, the performance (time and space required) is usually ignored. Our study allows administrators work to make better decisions about how to select the proper hardware for intrusion detection in various environments. We proposed the models for estimating the time to build each model and the vector equation of the cut-off point is provided for determining the minimum number of CPU required for building Decision tree model and support vector machine model.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Speech Recognition into Virtual Classroom to Enhance Learning Achievement","authors":"Apichaya Nimkoompai, Chan Jaruvongrangsee, Puwadol Sirikongtham","doi":"10.1145/3301326.3301379","DOIUrl":"https://doi.org/10.1145/3301326.3301379","url":null,"abstract":"This study aims to assist first year undergraduates (aged 17-19 years) at Thai-Nichi Institute of Technology in learning Japanese. Two sample groups are selected by purposive sampling. The first group have 30 students studying Japanese conversation by means of virtual reality-based classroom to create a virtual atmosphere, and voice recognition, while the second group use the traditional learning method. The researcher then compare academic achievement and survey satisfaction of both groups. The data is analyzed using independent t-test. It was found after the experiment that the first group had higher average academic achievement than the traditional group. Japanese conversation learning achievement had performance of 85.32/81.3 and the VR group (x = 17.73, SD = 3.52) had higher achievement than the traditional group (x = 8.95, SD = 1.58) with statistical significance of 0.5.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131884558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fauqia Ilyas, F. Azam, Wasi Haider Butt, Kinza Zahra
{"title":"A Novel Method for Inferring Person-to-person Relationship Using Wi-Fi","authors":"Fauqia Ilyas, F. Azam, Wasi Haider Butt, Kinza Zahra","doi":"10.1145/3301326.3301372","DOIUrl":"https://doi.org/10.1145/3301326.3301372","url":null,"abstract":"Present communities are encompassed in a consistently developing telecommunication framework. This framework provides significant circumstances for detecting recording on abundance of human actions. Human adaptability patterns are distinguished example of such a conduct which has been considered deliberately grounded on Wi-Fi systems and Bluetooth signals as intermediaries for different areas. While versatility is a significant characteristic of human action, it's very pivotal to research and analyze physical interrelationship among humans. Detecting closeness that empowers social associations on a substantial scale is a practical challenge. Numerous frequently used techniques containing RFID badges and Bluetooth filtering provide only restricted scalability. This research has been conducted based on the idea to deduce the kind of dyadic relationships (friendship) between research candidates from the list of WLAN MAC addresses and detected Bluetooth devices estimated by cellular phones conveyed by the two individuals. We demonstrate our methodologies using MIT's Social Evolution (WLAN + Bluetooth) dataset. The originality of our results is demonstrated by the comparison of outcome of our analysis with the self-investigated surveys subjects issued with regard to their link and connection. Proposed methods for inferring type of dyadic relationships using WLAN dataset gives higher accuracy and F1-Score than using Bluetooth dataset as WLAN can be used for high-resolution mobility tracking of entire populations. Our results exhibit the estimation of WLAN MAC addresses as a tool for social detection and reveal how numbers of Wi-Fi information represent a potential risk to privacy.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116398988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gridaphat Sriharee, Niti Boonyakaite, Wachiraphan Charoeanwet, Pattarakorn Summat, Pimphaka Saikhow
{"title":"Integrating Bluetooth-Low Energy to Support Visitor Recommendation and Space Management","authors":"Gridaphat Sriharee, Niti Boonyakaite, Wachiraphan Charoeanwet, Pattarakorn Summat, Pimphaka Saikhow","doi":"10.1145/3301326.3301339","DOIUrl":"https://doi.org/10.1145/3301326.3301339","url":null,"abstract":"Bluetooth-low energy or beacon is implemented widely in indoor for tracking and location-based service. Beacon is introduced to use in the museum to deliver content regarding a particular location. However, the management of indoor spaces and the system to support such technology are varied by different purposes and contexts. This research shows our experience on applying the beacon into the IT museum to support visitor recommendation and space management. We discussed some advantages and needs of using the beacon technology in the IT museum. We conducted an experiment to evaluate whether installing and managing of the beacon technology is appropriate and sufficient to support the visitor recommendation and the space management. Also, the space management box implemented by Raspberry Pi is presented for tracking RSSI of the beacons and for location-based discovery of the exhibits in the museum. With the proposed technology and management, the curator is able to monitor an entire status of the beacons in the space and to look for the exhibits easily.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130546852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Subjective Quality Assessment of Light Field Images","authors":"Liang Shan, Deyang Liu, P. An, Xinpeng Huang","doi":"10.1145/3301326.3301364","DOIUrl":"https://doi.org/10.1145/3301326.3301364","url":null,"abstract":"Light field (LF) exerts a positive impact on many multimedia applications, due to its variety of the post-processing. For the sheer size of data volume and the huge difference compared to natural 2D images, many processing methods for such particular type of image have been proposed by researchers, for which the image quality assessment (IQA) research for such LF images (LFIs) is urgently needed. However, the development of the IQA of LFIs is restricted for lack of a database that fully reflects characteristics of LFIs. Therefore, in this paper, we build a perceptual quality assessment dataset including 240 distorted images from 8 source images by adding five distortion types with several distortion levels and obtain the mean opinion score (MOS) of each LF image by a developed subjective experiment. Further, we propose a subjective evaluation method to evaluate the perceptual quality of distorted LFIs. In the experiment, some classical full reference IQA metrics were used on the proposed dataset, and the results provide useful insights for the future development of compression solutions and objective IQA for LFIs.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qian Wu, Dandan Zhu, Yi Liu, A. Du, Dong Chen, Zhihui Ye
{"title":"Comprehensive Control System for Gathering Pipe Network Operation Based on Reinforcement Learning","authors":"Qian Wu, Dandan Zhu, Yi Liu, A. Du, Dong Chen, Zhihui Ye","doi":"10.1145/3301326.3301375","DOIUrl":"https://doi.org/10.1145/3301326.3301375","url":null,"abstract":"In the transmission process of crude oil gathering system, water-assisted heat transfer is often used to avoid wax formation, and pipeline temperature and pressure control are often controlled manually. In order to improve control efficiency and save labor cost. In this paper, we propose a DQN-based algorithm. The intensive learning model completes the temperature and pressure control in the pipeline. At the same time, because these two parameters have strong coupling, which affects the global control, this paper focuses on the joint optimization of valve opening and heating furnace and pressure pump. Finally, in order to verify the effectiveness of the system, the simulation control experiment is adopted. The test results show that the system control effect is excellent and the robustness is good.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129988299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Dynamic Load-Balancing Large Scale Graph-Processing System","authors":"Ming-Chia Kuo, Pangfeng Liu, Jan-Jan Wu","doi":"10.1145/3301326.3301343","DOIUrl":"https://doi.org/10.1145/3301326.3301343","url":null,"abstract":"Since the introduction of pregel by Google, several large-scale graph-processing systems have been introduced. These systems are based on the bulk synchronous parallel model or other similar models and use various strategies to optimize system performance. For example, Mizan monitors the workload of each worker to determine whether the workload between the workers is balanced with respect to the execution time. If the workload is unbalanced among workers, Mizan migrates nodes from overloaded workers to under-loaded workers to balance the load among workers and minimize the total execution time. On the basis of Mizan's migration plan, we implement a graph-processing system called GPSer with an efficient re-partitioning graph scheme. Our system uses statistical tools, e.g., coefficient of variation and correlation coefficient, to modify the migration plan and determine whether the workloads are balanced among all workers. Our system can accurately monitor current work-loads and decide whether to migrate nodes among workers to balance the load. When imbalance arises, the work-load of all workers can quickly converge to a balanced state, thereby enhancing the system performance. In experiment our system outperforms the state-of-the-art dynamic load-balancing graph processing-system, such as Mizan.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124982872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Campus-Level View of Outlook Email Traffic","authors":"Zhengping Zhang, C. Williamson","doi":"10.1145/3301326.3301371","DOIUrl":"https://doi.org/10.1145/3301326.3301371","url":null,"abstract":"This paper presents a workload characterization study of Outlook email traffic, as viewed at a campus scale. Using a combination of passive and active approaches to network traffic measurement, we identify the key components in the email delivery infrastructure, and then characterize the email traffic on our campus network, using a month of empirical network measurement data. The main observations from our study include the complexity of modern email services, the strong diurnal patterns for human-driven email activities, and the low throughput achieved for large email attachments.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Usage Optimization of Gradient Sparsification with Aggregation in Deep Learning","authors":"Sheng Wang, Pangfeng Liu, Jan-Jan Wu","doi":"10.1145/3301326.3301347","DOIUrl":"https://doi.org/10.1145/3301326.3301347","url":null,"abstract":"Communication usage is a bottleneck of scaling workers for distributed deep learning. One solution is to compress the exchanged gradients into sparse format with gradient sparsification. We found that the send cost of server, which is the aggregated size of sparse gradient, can be reduced by the gradient selection from workers. Following an observation that only a few gradients are significantly large and in a short period of time, we proposed several gradient selection algorithms based on different metrics. Experiment showed that our proposed method can reduce the aggregated size for server, and the reduction in time per iteration can make the convergence rate faster than traditional sparsification.","PeriodicalId":294040,"journal":{"name":"Proceedings of the 2018 VII International Conference on Network, Communication and Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}