{"title":"Pill image binarization for detecting text imprints","authors":"Siroratt Suntronsuk, S. Ratanotayanon","doi":"10.1109/JCSSE.2016.7748859","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748859","url":null,"abstract":"Identifying pill is a major concern for both patients and pharmacists nowadays. Being able to extract pill information automatically will benefit both pill information retrieval and indexing processes. We aim to extract texts from pill imprints so that they can be used to search existing pill databases. This paper presents approaches for extracting texts from pill images based on i) a technique presented by Kasar[1] and ii) processing edge masks of imprints. We also compared different thresholds for binarizing extracted text area so that it can be used with optical character recognition (OCR). The result showed that the method based on using edge mask performed better, and the Otsu threshold gave the best results for binarization of the imprint area.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114387709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-related vulnerability lookahead extension to the CVE","authors":"Thanapon Bhuddtham, Pirawat Watanapongse","doi":"10.1109/JCSSE.2016.7748927","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748927","url":null,"abstract":"Software scanning against the vulnerability database is one of the regular activities required by all information security management standards. However, the nature of the scanning system itself is reactive; a vulnerability has to be found, then the announcement made, with (and sometimes without) fixes. However, there exist classes of knowledge that are significant, reliable, and can be easily obtained, but are not represented in the vulnerability database. One such knowledge is the time-related vulnerabilities that signify the increasing risk of the system through time. We therefore explore the design and implementation in representing and appending this information, and thus propose an extension to the original Common Vulnerabilities and Exposures (CVE) database, called Time-Related Vulnerability Lookahead Extension to the CVE (T-CVE). This extension would complement the classical CVE in providing a publicly early-warning system so that the information security managers will be able to proactively assess their resources' C-I-A risks through trend analysis and will be able to mitigate them in a timely fashion. This work will initially focus on four proactive time-related information categories, namely the obsolete (software) platform, out-of-date (malware) signature, (hardware) degradation due to wear-and-tear, and (software) expiry. Obviously, other categories can later be similarly appended based on this framework.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A road to student cluster competition for Thailand","authors":"C. Chantrapornchai, P. Uthayopas","doi":"10.1109/JCSSE.2016.7748837","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748837","url":null,"abstract":"This paper addresses the issues of building a student cluster competition team in Thailand. Experiences in team member harvesting and team preparation are discussed. Interviewing with international team advisors, we found that certain supports, basic skills and attitude of Thai computer science and engineering are missing. The successful teams are usually from China, Europe, and US, where lots of budgets are invested in HPC infrastructures, especially in where top 500 supercomputers are located. The discussions in the paper presents the guideline for those who are interested in leading student teams to the cluster competition and will lead to the basic skill and knowledge development for interested students.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129881550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The surgical patient mortality rate prediction by machine learning algorithms","authors":"Piyatida Watcharapasorn, Nilubon Kurubanjerdjit","doi":"10.1109/JCSSE.2016.7748844","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748844","url":null,"abstract":"Malnutrition is a common problem in critical illness patients which is observed in patients who is undergoing for surgery and hospital mortality rate. The study found that patients undergone surgery who have malnutrition problem result in high death risk. In this research, we aim to predict the mortality rate of undergone surgery patient by using Chiang Rai Nutrition Assessment information (CNA) with various data mining models; J48, ADTree and KNN. Results from this study will help doctor to plan for patient health preparation before undergo surgery such as consumption behavior of patient. Besides, the approach developed in this study should be of value for future studies into understanding the effect of malnutrition in patient surgery result.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128181851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synchronous virtual classroom for student with ADHD disorder","authors":"M. Ibrahim, P. Prasad, A. Alsadoon, L. Pham","doi":"10.1109/JCSSE.2016.7748860","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748860","url":null,"abstract":"This paper focuses on the ADHD disorders of students between 6-18 years old; the aim of this study is to find out what has been done with advanced technology for students with ADHD. Providing education for Students with learning disabilities is a significant challenge, as these types of students need special learning tools. Attention-deficit/hyperactivity disorder (ADHD) is a common type of disorder which causes learning difficulty and disability. Students with this kind of disorder usually have a limited span of attention, and they are easily distracted. In addition to the possibility of using advanced learning tools for enhancing teaching processes for students with ADHD, this paper evaluates current learning management systems (LMS) that are used in schools and investigates what should be modified in the current (LMS) to make them more helpful for students with ADHD. Research shows that students with ADHD can significantly benefit from the application of ICT tools for academic purposes. Advanced technologies can be used to improve the teaching process for these students through virtual learning; adding a virtual classroom at schools would be very helpful for these kinds of students especially if this classroom is designed well.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"87 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128948236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Sertsi, Vataya Chunwijitra, Sila Chunwijitra, C. Wutiwiwatchai
{"title":"Offline Thai speech recognition framework on mobile device","authors":"P. Sertsi, Vataya Chunwijitra, Sila Chunwijitra, C. Wutiwiwatchai","doi":"10.1109/JCSSE.2016.7748894","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748894","url":null,"abstract":"In this paper, we presented the offline speech recognition framework on a mobile device. The energy-based speech/silence detection is also implemented to reduce the computational workload and time. We demonstrate the performance in term of computational capability and recognition accuracy on the mobile device. The results show that the proposed offline system achieve the lower RTF by 24% compared with our previous online system on the mobile device. Furthermore, the application's startup time can reduce by using n-gram LM. In term of recognition performance, it is seen that there are no opposing effects of real environment with our proposed offline speech recognition framework.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129264475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kornraphop Kawintiranon, Yanika Buatong, P. Vateekul
{"title":"Online music emotion prediction on multiple sessions of EEG data using SVM","authors":"Kornraphop Kawintiranon, Yanika Buatong, P. Vateekul","doi":"10.1109/JCSSE.2016.7748921","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748921","url":null,"abstract":"Electroencephalogram (EEG) has been used in the domain of emotion recognition, especially during the experience from music stimulus. A number of works have been submitted with promising results in emotion prediction tasks. Unfortunately, the majority of literature did not sufficiently take into account a non-stationary characteristic of EEG signals which could differ in each recording session, and this issue might be underlying reason why such research could not be transferred into real-world application. In this paper, we are proposing a novel solution by introducing a method of normalization across session. In particular, we performed a comparison of several normalization techniques to explore various techniques to address the issue of non-stationary in EEG data. The three proposed techniques in this study are rescaling, z-score standardization, and frequency band percentage. In our experiment, we collected EEG data from ten subjects in two scenarios: consecutive session and time varied session. Our emotion prediction results suggested that z-score technique was superior to other normalization techniques based on using support vector machine (SVM). To encourage other researchers to test the efficiency of their own approach with multiple session data, our dataset is publicly provided.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chonlathorn Kwankajornkiet, A. Suchato, P. Punyabukkana
{"title":"Automatic multiple-choice question generation from Thai text","authors":"Chonlathorn Kwankajornkiet, A. Suchato, P. Punyabukkana","doi":"10.1109/JCSSE.2016.7748891","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748891","url":null,"abstract":"This paper presents a method for generating fill-in-the-blank questions with multiple choices from Thai text for testing reading comprehension. The proposed method starts from segmenting input text into clauses by tagging part-of-speech of all words and identifying sentence-breaking spaces. All question phrases are then generated by selecting every tagged-as-noun word as a possible answer. Then, distractors of a question are retrieved by considering all words having the same category with the answer to be distractors. Finally, all generated question phrases and distractors are scored by linear regression models and then ranked to get the most acceptable question phrases and distractors. Custom dictionary is added as an option of the proposed method. The experiment results showed that 81.32% of question phrases generated when a custom dictionary was utilized was rated as acceptable. However, only 49.32% of questions with acceptable question phrases have at least one acceptable distractor. The results also indicated that the ranking process and a custom dictionary can improve acceptability rate of generated questions and distractors.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GPU-based nonlocal smoothing for alpha matting","authors":"T. Phoka, A. Sudsang","doi":"10.1109/JCSSE.2016.7748887","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748887","url":null,"abstract":"This paper addresses the problem of improving an extracted alpha matte from any matting method. One conventional method is to smooth the alpha matte using Gaussian filter. However, this sometimes induces over smoothing which does not preserve edge features and the background region on the boundary of the alpha matte is turned to semi transparent. The main contribution of this paper is to propose a matte smoothing method based on nonlocal method which is broadly used in image denoising to avoid over smoothing. Another contribution is an implementation of the method on GPU which is plausible to run in real time.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133299532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thanawut Thanavanich, A. Siri, Kamol Boonlom, Anusorn Chaikaew, P. Uthayopas
{"title":"Energy-aware scheduling of multiple workflows application on distributed systems","authors":"Thanawut Thanavanich, A. Siri, Kamol Boonlom, Anusorn Chaikaew, P. Uthayopas","doi":"10.1109/JCSSE.2016.7748853","DOIUrl":"https://doi.org/10.1109/JCSSE.2016.7748853","url":null,"abstract":"In this paper, the important issue of workflow scheduling on a large-scale distributed system, to achieve the scheduling quality and the energy consumption, is addressed. Since the traditional scheduling focused on minimizing the execution time and not takes the energy consumption into account, developing a scheduling for achieving both objectives has become a challenge issue. In addition, the computing resources are shared in the large-scale system, scheduling of multiple workflow application further complicate. The efficient multiple workflows scheduling with energy-aware is called EMuWS is addressed the challenge. The proposed algorithm, to efficiently determine the inefficient processors and shut them down for reducing computing resources, is adopted by the RE and cost function, which is the threshold of resource reduction. After a set of the efficient processors known, the workflow is rescheduled to assign fewer processors to attain more energy efficiency. The performance of the proposed algorithm that is obtained by exhaustive examining the synthesis workflows and real-world data outperforms our previous work, compared from reducing the energy consumption ratio.","PeriodicalId":321571,"journal":{"name":"2016 13th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115067060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}