2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)最新文献

筛选
英文 中文
GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits GenIt-e-MoTo:一代情报人员设想恐怖组织的运作方式
Sumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma
{"title":"GenIt-e-MoTo: Generation of intelligence to envisage modus operandi of terror outfits","authors":"Sumit Singh, Durga Toshniwal, Akhil Gupta, Shreyas Verma","doi":"10.1109/ICIS.2016.7550758","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550758","url":null,"abstract":"Terrorism is on the rise in the Indian Sub-Continent and application of data mining techniques to analyse terrorist attacks is the need of the hour. The Security Forces (SF) in this region still rely on traditional and manual analysis methods. Data mining in this field is in its budding stage and if utilised efficiently will greatly facilitate the SF in preventing any terrorist attacks. SF are constantly searching for latest data mining techniques to augment terror analytics and improve protection of the local civilians and self thereby reducing collateral damage. Predicting terror attacks can push the potential of SF to the beat of terrorist activities. It is significant to recognise the spatial and temporal patterns for a better learning of terror incidents and to conceive their correlation. Clustering and Association rule mining (ARM) thus become strong contenders for efficient terror strikes forecasting. The above techniques can be used for a systematic profiling of outfits thus leading to the discovery of a unique pattern of operations i.e. Modus Operandi (MO) of a particular terror outfit. After gaining knowledge from data mining it is essential to convert it into actionable intelligence in order to be used by foot soldiers. Therefore, the paper provides concrete intelligence about various terror outfits operating in the most active Jammu and Kashmir (J&K) region of the Indian sub-continent.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"469 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116080361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detect the emotions of the public based on cascade neural network model 基于级联神经网络模型的公众情绪检测
Xiao Sun, Xiaoqi Peng, F. Ren
{"title":"Detect the emotions of the public based on cascade neural network model","authors":"Xiao Sun, Xiaoqi Peng, F. Ren","doi":"10.1109/ICIS.2016.7550901","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550901","url":null,"abstract":"Along with the development of social network, more and more people know the world by reading news. The problem about what kind of emotion is inspired when people read news is very worthy of discussion. This paper will mix Deep Belief Networks (DBN) model and Support Vector Machine (SVM) to a hybrid neural network model by using the Contrast Divergence (CD) algorithm to estimate the weights when training a generating model, ensure that each layer of the Restricted Boltzmann Machine (RBM) mapping the features of the inputs to the best. At the same time, we cascade the last layer of DBN and a SVM classifier to adjust judging performance. And a set of tags will be attached to the top (Associative Memory), through a process of parameter tuning, learn the identifying weights to obtain a network for the task of text classification. The experimental results show that the hybrid neural network model works better than the traditional text categorization method based on simple characteristics (such as CHI), and it is more suitable for extracting text semantic characteristics.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116186009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
e-Tegeko: A system that will boost citizens' participation on parliamentary regulations in Rwanda e-Tegeko:一个促进卢旺达公民参与议会法规的系统
Rene Kabalisa, Yves Cyuzuzo, C. Yoshida, Ariane Ingabire
{"title":"e-Tegeko: A system that will boost citizens' participation on parliamentary regulations in Rwanda","authors":"Rene Kabalisa, Yves Cyuzuzo, C. Yoshida, Ariane Ingabire","doi":"10.1109/ICIS.2016.7550804","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550804","url":null,"abstract":"In democratic countries, members of the parliament make draft-laws, bills and amend laws for the country and people to obey. In this paper, with Rwanda taken as a case study, we conducted a research on 61 individuals from rural and urban areas. The findings were that the citizen's participation in the law making is very low; as citizen have to write letters and take them to the parliament in case there is a law change or as a way to give an opinion about any draft-law or a bill. Taking a long time to read those letters and gather data. Another problem is also a lack of information about current laws. Information Communication Technologies (ICT); infrastructures in place, such as, internet penetration rate, mobile phone penetration rate, telecommunication coverage area should be considered when proposing a solution to improve. “e-Tegeko” is the proposed solution to that problem. Its purpose is to boost the citizen's participation in the law making using smartphones and computers. All expected functions and benefits are illustrated.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123295079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parallel online exact sum for Java8 Java8的并行在线精确求和
Naoshi Sakamoto
{"title":"Parallel online exact sum for Java8","authors":"Naoshi Sakamoto","doi":"10.1109/ICIS.2016.7550817","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550817","url":null,"abstract":"Java8 introduced the notion of streams that is a new data structure and supports multi-core processors. When the sum method is called for a stream of floating-point numbers, the summation is calculated at high-speed by applying MapReduce, which distributes computations to cores. However, since floating-point calculation causes an error, simple adaptation of this method can not determine the result uniquely. Then, in this study, we develop a summation program that can be applied to a stream with MapReduce. Our method can calculate at high-speed with keeping correctly rounded.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122446335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating a werewolf game log digest of inferring each player's role 生成狼人游戏日志摘要,推断每个玩家的角色
Youchao Lin, Mizuho Baba, T. Utsuro
{"title":"Generating a werewolf game log digest of inferring each player's role","authors":"Youchao Lin, Mizuho Baba, T. Utsuro","doi":"10.1109/ICIS.2016.7550858","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550858","url":null,"abstract":"While playing the communication game “Are You a Werewolf”, a player always guesses other players' roles through discussions, based on one's own role and other players' crucial utterances. The underlying goal of this paper is to construct an agent that can analyze the participating players' utterances and play the werewolf game as if it is a human. For the first step of this underlying goal, given a specific player participating in the wolf game, this paper studies how to generate a digest of inferring other players' roles from the viewpoint of the given specific player. In this inference process, we regard the werewolf game rules as well as certain common sense as inference rules. Then, we develop a set of inference rules and apply them to infer the participating players' roles from a real werewolf game log.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125069770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A bi-directional sampling based on K-means method for imbalance text classification 基于k均值的双向抽样失衡文本分类方法
Jiapeng Song, Xianglin Huang, Sijun Qin, Qing Song
{"title":"A bi-directional sampling based on K-means method for imbalance text classification","authors":"Jiapeng Song, Xianglin Huang, Sijun Qin, Qing Song","doi":"10.1109/ICIS.2016.7550920","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550920","url":null,"abstract":"This paper studies the imbalanced data classify-cation problem and proposes bi-directional sampling based on clustering (BDSK) for the imbalanced data classification. This algorithm combines SMOTE over-sampling algorithm and under-sampling algorithm based on K-Means to solve the within-class imbalance problem and the between-class imbalance problem. It not only avoid induce too much noise but also resolve the problem of shortage of sample. Experimental results on Tan corpus dataset show that the algorithm can effectively improve the classification performance on imbalanced data sets, especially in the cases when classification performance is heavily affected by class imbalance.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125971704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
The research of retrieval keyword analysis on stage's design knowledge base 舞台设计知识库检索关键词分析的研究
W. Fu, L. Jin, Wei Gong, Kemin Wang
{"title":"The research of retrieval keyword analysis on stage's design knowledge base","authors":"W. Fu, L. Jin, Wei Gong, Kemin Wang","doi":"10.1109/ICIS.2016.7550939","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550939","url":null,"abstract":"The source of retrieval about stage's design knowledge base is text script, and text processing has become the key technologies about obtaining related information from script. This paper proposes a method of extracting from the script in the keyword categories by analyzing the characteristics of the script, furthermore, develop technical solutions for analysis of script's emotion by experiment.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACRO: Assignment of channels in reverse order to make arbitrary routing deadlock-free ACRO:按相反顺序分配通道,使任意路由无死锁
Ryuta Kawano, Hiroshige Nakahara, S. Tade, I. Fujiwara, Hiroki Matsutani, M. Koibuchi, H. Amano
{"title":"ACRO: Assignment of channels in reverse order to make arbitrary routing deadlock-free","authors":"Ryuta Kawano, Hiroshige Nakahara, S. Tade, I. Fujiwara, Hiroki Matsutani, M. Koibuchi, H. Amano","doi":"10.1109/ICIS.2016.7550818","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550818","url":null,"abstract":"Distributed routing methods with small routing tables are scalable design on irregular networks for large-scale High Performance Computing (HPC) systems. Recently proposed compact routing methods, however, do not guarantee deadlock-freedom. Cyclic channel dependencies on arbitrary routing are typically removed with multiple Virtual Channels (VCs). However, challenges still remain to provide good trade-offs between a number of required VCs and a time complexity of an algorithm for assignment of VCs to paths. In this work, a novel algorithm ACRO is proposed for enriching arbitrary routing functions with deadlock-freedom with a reasonable number of VCs and a time complexity. Experimental results show that ACRO can reduce the average number of required VCs by up to 63% compared with the conventional algorithm that has the same time complexity. Furthermore, ACRO reduces a time complexity by a factor of O(|N| · log|N|) compared with that of the other conventional algorithm that needs almost the same number of VCs.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A diversity sensor connection capability WSN for disaster information gathering system 一种用于灾害信息采集系统的分集传感器连接能力WSN
Yoshitaka Torii, T. Otsuka, Takayuki Ito
{"title":"A diversity sensor connection capability WSN for disaster information gathering system","authors":"Yoshitaka Torii, T. Otsuka, Takayuki Ito","doi":"10.1109/ICIS.2016.7550895","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550895","url":null,"abstract":"In recent years, and landslides caused by flooding of the river due to heavy rain, the number of such flooding of houses has increased. For this reason, the number of casualties has increased due to flooding of rivers and canals. Therefore, the situational awareness of the rivers and canals in the event of a disaster is important. We are research on wireless sensor networks (WSNs) for the purpose of collecting information in a disaster situation. Also we have developed a ad-hoc water gauge system based on WSN. However, dedicated WSN can not be used for general purposes for the purpose of collecting the disaster information. Therefore, WSN aimed only use of disaster is not practical considering cost-effectiveness. We implemented a general-purpose WSN system for can be connected to the required sensors in the event of a disaster. In this paper, we describe challenges and implementation of WSN system that allows a diversity sensor connection.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design and implementation of ATM alarm data analysis system ATM报警数据分析系统的设计与实现
Yufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang
{"title":"Design and implementation of ATM alarm data analysis system","authors":"Yufen Cheng, Wenqian Shang, Ligu Zhu, Di Zhang","doi":"10.1109/ICIS.2016.7550948","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550948","url":null,"abstract":"Nowadays, people pursuit of fast and convenient way of life, fast and convenient service of ATM is made for people to avoid waiting in line at the bank for a long time. In order to serve people conveniently, it is need to monitor the ATM equipment to guarantee its normal operation, and deal with the unexpected problems in time. Therefore, this paper builds a cloud platform for alarm service, does some alarm analysis, which appears at different times in different locations of the ATM machine. This can provide better service for ATM users. This system is called ATM Alarm Data Analysis System.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129464489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信