2008 International Symposium on Information Technology最新文献

筛选
英文 中文
Handling imbalance visualized pattern dataset for yield prediction 用于产量预测的不平衡可视化模式数据处理
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631657
M. M. Noor, S. Jusoh
{"title":"Handling imbalance visualized pattern dataset for yield prediction","authors":"M. M. Noor, S. Jusoh","doi":"10.1109/ITSIM.2008.4631657","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631657","url":null,"abstract":"The prediction of the yield outcome in a non close loop manufacturing process can be achieved by visualizing the historical data pattern generated from the inspection machine, transform the data pattern and map it into machine learning algorithm for training, in order to automatically generate a prediction model without the visual interpretation needs to be done by human. Anyhow, the nature of manufacturing process dataset for the bad yield outcome is highly skewed where the majority class of good yield extremely outnumbers the minority class of bad yield. Comparison between the undersampling, over- sampling and SMOTE + VDM sampling technique indicates that the combination of SMOTE + VDM and undersampled dataset produced a robust classifier performance capable of handling better with different batches of prediction test data sets. Furtherance, suitable distance function for SMOTE is needed to improve class recall and minimize overfitting whilst different approach on the majority class sampling is required to improve the class precision due to information loss by the undersampling.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Enhancing low speed network performance for voice over internet protocol 增强互联网协议语音的低速网络性能
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631962
Y. Bandung, C. Machbub, A. Langi, S. Supangkat
{"title":"Enhancing low speed network performance for voice over internet protocol","authors":"Y. Bandung, C. Machbub, A. Langi, S. Supangkat","doi":"10.1109/ITSIM.2008.4631962","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631962","url":null,"abstract":"In this paper, we optimize low speed networks access for designing an efficient Voice over Internet Protocol network, especially in 64 kbps, 128 kbps, and 256 kbps bandwidth capacities. We draw some analytical approach based on Extended E-model to quantify some levels of quality of service. Using the model, those levels are determined by network parameters such as delay, jitter, packet loss level, network utilization, and bandwidth capacity and by implementation configuration such as voice coder, packetization scheme, and size of jitter buffer. Our objective is to find maximum number of calls in some given bandwidth capacities while maintaining a certain level of the quality of service. Using numeric estimation, we found that the optimum solution for some given bandwidth capacities can be achieved by applying G.723.1 5.3 kbps voice coder, packet loss level less than 1%, jitter less than 80 ms, and utilization network less than 80%.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122941547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handwritten Jawi words recognition using Hidden Markov Models 使用隐马尔可夫模型的手写爪哇文字识别
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631723
Remon Redika, K. Omar, Mohammad Faidzul Nasrudin
{"title":"Handwritten Jawi words recognition using Hidden Markov Models","authors":"Remon Redika, K. Omar, Mohammad Faidzul Nasrudin","doi":"10.1109/ITSIM.2008.4631723","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631723","url":null,"abstract":"Handwritten Jawi recognition is a challenging task because of the cursive nature of the writing. In manuscript writings, words are writer-dependent. The recognition task of Jawi Manuscript still opens problem due to the existence of many difficulties, such as the variability of character shape, overlap and presence of ligature in manuscript words. This paper describes a technique of Jawi word recognition using Hidden Markov Model (HMM). The technique of segmentation-free method used to transform word image into sequences of frames. The geometrical features are extracted using sliding window from each observation frame sequence. Besides, baseline parameters of Jawi word are use in the calculation of black pixel density. Vector Quantization clusters these features and assigns them into symbols that will be used as HMM input. Experiments have been conducted on 579 images of 100 words lexicon of Syair Rakis manuscript, and the recognition rate has reached 84 percent recognition.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"438 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114584262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enhancements in query evaluation and page summarization of The Thinking Algorithm The Thinking算法在查询评估和页面汇总方面的改进
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4632050
M. Shoaib, Jameel Amar, Akshat Chingtham, Tejbanta Singh
{"title":"Enhancements in query evaluation and page summarization of The Thinking Algorithm","authors":"M. Shoaib, Jameel Amar, Akshat Chingtham, Tejbanta Singh","doi":"10.1109/ITSIM.2008.4632050","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632050","url":null,"abstract":"This paper explores a unique way in which the thinking algorithm adds an extra logical substrate to a Web search query using artificial intelligence. Instead of just going after keyword searching, the algorithm tries to assess the motives of the user behind entering a query. The algorithm tries to find the reasons as to why a user has entered a particular query by adding this question with every query: ldquoSitting in a particular region, why has the person entered such a query?rdquo The compounded uniqueness level applies the concept of geo-location searches. The algorithm allots competency level to the user from the query term using topic trees. The query parsers and indexers in the algorithm are more magnetized into extracting meaningful information from queries and web pages than just indexing the words present in a web page. Clustering the search results help to resolve the ambiguity in a userpsilas query.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117038749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The decomposition concept in handling the space allocation problem 分解概念在处理空间分配问题中的应用
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4632019
S. D. Chandrakaisan, A. Khader
{"title":"The decomposition concept in handling the space allocation problem","authors":"S. D. Chandrakaisan, A. Khader","doi":"10.1109/ITSIM.2008.4632019","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632019","url":null,"abstract":"The space allocation problem particularly in academic institutions is well known as a complex, difficult and time consuming task. In this paper, we discuss the application of the decomposition concept in handling the combinatorial optimization problem such as the university space allocation problem. In applying the decomposition, we introduce the bin and tuple concept. This method is found to simplify the entire problem and ease the problem solving process. combined local search memetic algorithm is applied on the simplified problem. Combined local search refers to combination of optimum local searches for genetic operators in Memetic Algorithm. Nevertheless, without any restriction, other algorithms can be used on the simplified problem.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Playability Heuristics Evaluation (PHE) approach for Malaysian educational games 马来西亚教育游戏的可玩性启发式评估方法
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4632053
H. M. Omar, A. Jaafar
{"title":"Playability Heuristics Evaluation (PHE) approach for Malaysian educational games","authors":"H. M. Omar, A. Jaafar","doi":"10.1109/ITSIM.2008.4632053","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632053","url":null,"abstract":"Heuristics evaluation is one of the common techniques being used for usability evaluation. The potential of HE has been explored in games design and development and later playability heuristics evaluation (PHE) is generated. PHE has been used in evaluating games. Issues in games usability covers forms of game usability, game interface, game mechanics, game narrative and game play. This general heuristics has the potential to be further explored in specific domain of games that is educational games. Combination of general heuristics of games (tailored based on specific domain) and education heuristics seems to be an excellent focus in order to evaluate the usability issues in educational games especially educational games produced in Malaysia.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128656222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Decision fusion for frontal face verification 正面人脸验证的决策融合
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631679
Rosmawati Nordin, Md. Jan Nordin
{"title":"Decision fusion for frontal face verification","authors":"Rosmawati Nordin, Md. Jan Nordin","doi":"10.1109/ITSIM.2008.4631679","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631679","url":null,"abstract":"It has been established that the combination of a set of classifiers designed for a given pattern recognition problem may achieve higher recognition/classification rates than any of the classifiers taken individually. One of the contributing factor for the improvement is the rule applied to get a unified decision and the diversity of the classifiers. Principal Components Analysis (PCA) and Linear Discriminant Analysis (LDA) are two popular approaches in face recognition and verification. The authors will demonstrate a verification performance in which the fusion of both methods produces an improved rate compared to individual performance. Tests are carried out on FERET (Facial Recognition Technology) database using a modified protocol. A major drawback in applying LDA is that it requires a large set of individual face images sample to extract the intra-class variation. Performance is presented as the rate of verification when false acceptance rate is zero, in other words, no impostors allowed. Results using fusion of three verification experts show improvement compared with the best individual expert.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infrastructure requirements analysis in developing intelligent system for k-farmer community 开发k-农民社区智能系统的基础设施需求分析
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631685
Hanim Risidi, R. Abdullah
{"title":"Infrastructure requirements analysis in developing intelligent system for k-farmer community","authors":"Hanim Risidi, R. Abdullah","doi":"10.1109/ITSIM.2008.4631685","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631685","url":null,"abstract":"Agriculture is a knowledge-intensive business, which offers farmers with a large volume of knowledge. However, often farmer do not use this facility to manage their knowledge. Knowledge management (KM) in agriculture promotes an integrated approach to the creation, capture, accessing and use of farmer domain knowledge of product, services and processes. New technologies expected can help farmers to achieve better knowledge management. In this paper, we have proposed the infrastructure requirement analysis in developing intelligent system for knowledge farmer community. Knowledge management initiative among farmers expected to produce more gain in their farm productions as well as return on investment (ROI). Thus, helps the community to become more productive and knowledgeable.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of NNARX structure as a global model for self-refilling steam distillation essential oil extraction system NNARX结构作为自充注蒸汽蒸馏精油提取系统全局模型的评估
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4632020
M. Rahiman, M. Taib, Y.M. Salleh
{"title":"Assessment of NNARX structure as a global model for self-refilling steam distillation essential oil extraction system","authors":"M. Rahiman, M. Taib, Y.M. Salleh","doi":"10.1109/ITSIM.2008.4632020","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4632020","url":null,"abstract":"This paper investigates the performance of neural network autoregressive with exogenous input (NNARX) model structure and evaluates the training data that provide robust model on fresh data set. The system under test is a self-refilling steam distillation essential oil extraction system. Two PRBS signals with different probability band were tested at different operating points and conditions. A total of three data sets will be used to evaluate the model. NNARX model was estimated by means of prediction error method with Levenberg-Marquardt algorithm. It is expected that the training data that covers the full operating condition will be the optimum training data. All data are separated into training and testing data by interlacing technique. For each data, the model order selection is based on ARX structure and MDL information criterion. These data are cross-validated between each other and the validation results are presented and concluded. The model performance is based on the R2, adjusted-R2, RMSE and NMSE. The histogram is also used to evaluate the distribution of the one-step-ahead residuals. Overall results have shown that the NNARX model trained with data of full operating condition is the most robust when it is validated on a fresh data set.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
GSM-based notification speed detection for monitoring purposes 基于gsm的通知速度检测,用于监控目的
2008 International Symposium on Information Technology Pub Date : 2008-09-26 DOI: 10.1109/ITSIM.2008.4631934
Elia Nadira Sabudin, Siti Zarina Mohd Muji, Mohd Helmy Abd Wahab, A. Johari, Norazman Bin Ghani
{"title":"GSM-based notification speed detection for monitoring purposes","authors":"Elia Nadira Sabudin, Siti Zarina Mohd Muji, Mohd Helmy Abd Wahab, A. Johari, Norazman Bin Ghani","doi":"10.1109/ITSIM.2008.4631934","DOIUrl":"https://doi.org/10.1109/ITSIM.2008.4631934","url":null,"abstract":"This paper presents the design of GSM-based black box system for speed detection. The idea is clear that the current existing black box system only notify the driver through alarm systems and information is recorded in the black box. However, this could be impractical for the authorized personnel to check every public transports. With the rapid development of GSM application in monitoring purposes, the current system can be integrated to facilitate the authorized personnel and to ease the monitoring process as well. The purpose of this research is to design and integrate a new black-box system integrated with GSM notification system to send alert information to traffic authorized personnel or Transport Department through Short Message Services (SMS). The scope of this research is primarily concerned on express buses which prone to accident.","PeriodicalId":314159,"journal":{"name":"2008 International Symposium on Information Technology","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116361287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信