Md. Saidur Rahman, Md Saifur Rahman, S. Chowdhury, Ashfaq Mahmood, R. Rahman
{"title":"A personalized music recommender service based on Fuzzy Inference System","authors":"Md. Saidur Rahman, Md Saifur Rahman, S. Chowdhury, Ashfaq Mahmood, R. Rahman","doi":"10.1109/ICIS.2016.7550757","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550757","url":null,"abstract":"In this paper, we are proposing a personalized music recommender service based on Mamdani Fuzzy Interference System (M-FIS). Collection of playlist is used for gathering users' choice and mood while listening to songs. Similarity between audio files is calculated based on Mel Frequency Cepstral Coefficients (MFCC). We have developed a recommender model based on M-FIS with the aforementioned similarities and playlists. We were able to gain an acceptable accuracy rate using FIS compared to other method reported in literature.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency-specific alterations of functional hub in generalized tonic-clonic seizure","authors":"Zhe Zhang, Huiyan Cheng, Xuhui Chen, Chaolin Ma","doi":"10.1109/ICIS.2016.7550940","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550940","url":null,"abstract":"Resting-state functional magnetic resonance imaging (fMRI) has revealed aberrant brain functional networks in individuals with generalized tonic-clonic seizure (GTCS). Little is known, however, about these changes in functional hubs across different frequency bands. In this study, we applied a data-driven method named complementary ensemble empirical mode decomposition (CEEMD) to decompose the whole brain BOLD time series into five frequency-specific bands. Then, we compared alterations of frequency-specific functional hub across five different frequency bands in 21 GTCS patients to 22 normal control (NC) subjects. CTCS patients showed aberrant functional hubs predominately at some particular frequency bands and primary in the default mode network (DMN) and the somatomotor network (SMN). Furthermore, we found these hub located in the DMN at a higher frequency band was associated with disease severity. These findings provide an overview of frequency-specific hub, and may be helpful in uncovering abnormal neuronal activity in patients with GTCS at specific frequency bands.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"535 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123578499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method for classifying usability qualities and problems for action games from user reviews using text mining","authors":"Artinat Wattanaburanon, N. Prompoon","doi":"10.1109/ICIS.2016.7550748","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550748","url":null,"abstract":"Game reviewing is one of the method for game users and critics to comment and discuss about a game. Game developers and marketers could use game reviews as insights to assist on designing a better game by specifying quality requirements and providing better game marketing. Usability and problems are major concerns of users and game developers since these quality affects users' satisfaction and opportunity to increase market share respectively. However, manually extracting game usability qualities and problems from a large number of game reviews is challenging since most reviews often use natural language and may not be well-organized. This research presents a method for extracting and classifying game usability qualities and problems from game reviews using text mining technique. This research is composed of 2 main phases. The first phase is specifying game usability qualities and problems categories which also included keyword corpus creation for each category. The second phase is gathering, extracting, analyzing and classifying game reviews. The gathered game reviews will be extracted and classified into each usability qualities and problems category. Game usability qualities classification will also include sentiment classification to further specify positivity and negativity of each sentence. Accuracy metric will be used for classification evaluation. In addition, a game review summary on usability qualities and problems will be created for developers to improve game quality.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127095667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local revitalization model based on soft systems methodology","authors":"M. Iwashita, S. Kato","doi":"10.1109/ICIS.2016.7550894","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550894","url":null,"abstract":"An aging society evidently has had an effect on the recent increase of abandoned farmland in Japan. Therefore, realizing local revitalization is of utmost importance. This study first examines the present situation of abandoned farmland in the Oga area. It then examines the cause-effect relationship and comes up with solutions based on Soft Systems Methodology. In particular, chain management of sightseeing resources by space and time, including experience-based sightseeing are extracted as one of the effective solutions. Moreover, the countermeasures already taken by the committee for the promotion of Oga east coast are also introduced from this perspective.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130880013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supplementing Object-Oriented software change impact analysis with fault-proneness prediction","authors":"Bassey Isong, Ifeoma U. Ohaeri, M. Mbodila","doi":"10.1109/ICIS.2016.7550833","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550833","url":null,"abstract":"Software changes are inevitable during maintenance, Object-oriented software (OOS) in particular. For change not to be performed in the “dark”, software change impact analysis (SCIA) is used. However, due to the exponential growth in the size and complexity of OOS, classes are not without faults and the existing SCIA techniques only predict change impact set. This means that a change implemented on a faulty class could increase the likelihood for software failure. To avoid this issue, maintenance has to incorporate both change impact and fault-proneness (FP) prediction. Therefore, this paper proposes an extended approach for SCIA that integrates both activities. The goal is to assist software engineers with the necessary information of focusing verification and validation activities on the high risk components that would probably cause severe failures which in turn can boost maintenance and testing efficiency. This study built a model for predicting FP using software metrics and faults data from NASA data set in the public domain. The results obtained were analyzed and presented. Additionally, a class change recommender (CCRecommender) tool was developed to assist in computing the risks associated with making change to any component in the impact set.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129000719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ryoma Tabata, Arisa Hayashi, S. Tokunaga, S. Saiki, Masahide Nakamura, S. Matsumoto
{"title":"Implementation and evaluation of BLE proximity detection mechanism for Pass-by Framework","authors":"Ryoma Tabata, Arisa Hayashi, S. Tokunaga, S. Saiki, Masahide Nakamura, S. Matsumoto","doi":"10.1109/ICIS.2016.7550872","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550872","url":null,"abstract":"To fix various dependencies of application development using pass-by detection by a mobile device, we propose Pass-by Framework that handles data with standardization. In this study, we evaluate effects of performance of pass-by detection by differences in methods of implementation the sonar of Pass-by Framework. Therefore, we develop pass-by application using Bluetooth Low Energy as a first effort. We then conduct evaluation experiments for confirmation of change pass-by detection behavior depends on the difference of parameters.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125671634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taro Nakano, B. T. Nukala, J. Tsay, S. Zupancic, Amanda Rodriguez, D. Lie, Jerry Lopez, Tam Q. Nguyen
{"title":"Gaits classification of normal vs. patients by wireless gait sensor and Support Vector Machine (SVM) classifier","authors":"Taro Nakano, B. T. Nukala, J. Tsay, S. Zupancic, Amanda Rodriguez, D. Lie, Jerry Lopez, Tam Q. Nguyen","doi":"10.4018/IJSI.2017010102","DOIUrl":"https://doi.org/10.4018/IJSI.2017010102","url":null,"abstract":"Due to the serious concerns of fall risks for patients with balance disorders, it is desirable to be able to objectively identify these patients in real-time dynamic gait testing using inexpensive wearable sensors. In this work, we took a total of 49 gait tests from 7 human subjects (3 normal subjects and 4 patients), where each person performed 7 Dynamic Gait Index (DGI) tests by wearing a wireless gait sensor on the T4 thoracic vertebra. The raw gait data is wirelessly transmitted to a near-by PC for real-time gait data collection. To objectively identify the patients from the gait data, we used 4 different types of Support Vector Machine (SVM) classifiers based on the 6 features extracted from the raw gait data: Linear SVM, Quadratic SVM, Cubic SVM, and Gaussian SVM. The Linear SVM, Quadratic SVM and Cubic SVM all achieved impressive 98% classification accuracy, with 95.2% sensitivity and 100% specificity in this work. However, the Gaussian SVM classifier only achieved 87.8% accuracy, 71.7% sensitivity, and 100% specificity. The results obtained with this small number of human subjects indicates that in the near future, we should be able to objectively identify balance-disorder patients from normal subjects during real-time dynamic gaits testing using intelligent SVM classifiers.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128103584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tousif Osman, Maisha Mahjabeen, Shahreen Shahjahan Psyche, A. Urmi, J. M. S. Ferdous, R. Rahman
{"title":"Adaptive food suggestion engine by fuzzy logic","authors":"Tousif Osman, Maisha Mahjabeen, Shahreen Shahjahan Psyche, A. Urmi, J. M. S. Ferdous, R. Rahman","doi":"10.1109/ICIS.2016.7550755","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550755","url":null,"abstract":"The research proposes an approach for searching and sorting food list according to user preference. The system maintains a fuzzy database to store restaurants and their menus with some specific parameters for each item. System allows the user to specify food tastes that are of their interest, location name where they prefer to eat, approximated budget for each person and few other defined parameters as searching keyword. While searching, the system will fetch the entries from the database according to user defined parameters, convert each item's metadata to fuzzy parameters and pass the list to a fuzzy controller. Then the controller assigns a score as an output to each item. Finally the list is sorted in descending order. System allows the users to provide the feedback about the food which makes the system to be adaptive. System also gets scaled for each individual user as food taste varies significantly for individual users; hence the system provides more precise result and makes it a complete food searching engine.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132590574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Observing the evolution of social network on Weibo by sampled data","authors":"Lu Ma, Gang Lu, Junxia Guo","doi":"10.1109/ICIS.2016.7550800","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550800","url":null,"abstract":"Although there have been many researches on the online social networks (OSNs), observing the evolution of a real OSN is still interesting and instructive for understanding people's behavior in OSNs. In this paper, the actual evolution of the social graph of a real OSN - Weibo, is studied by sampled data. The exact timestamp of creating or removing each following relationship cannot be sampled. However, by the created time of the users' accounts, the evolution of the social network of Weibo is roughly observed. In this way, it is found that the growing pattern of the network scale shows S-shape. Some other properties of the network, such as network density, the number of connected components, the efficiency of the network, clustering coefficient, degree assortativity, and so on, are also observed. As the network grows, the density of the network keeps reducing and eventually reaches a steady state. The change of the number of connected components indicates the users' crowd behavior during the network evolution.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134345409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on software reliability evaluation technology based on BP neural network","authors":"Lu Liu, Zhengtao Jiang","doi":"10.1109/ICIS.2016.7550924","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550924","url":null,"abstract":"This paper introduces the BP neural network briefly, discusses the application of BP neural network algorithm in evaluating the reliability of software, constructs the evaluation index system of software reliability based on the neural network, and finally implements the software reliability evaluation system. This system takes the scores of influence factors of software reliability as input which are marked by user, and then output the evaluation result of software reliability computed by the trained neural network.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133015951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}