{"title":"A diversity reserved quantum particle swarm optimization algorithm for MMKP","authors":"Hongbin Dong, Xue Yang, Xuyang Teng, Yuhai Sha","doi":"10.1109/ICIS.2016.7550941","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550941","url":null,"abstract":"As a variant of the classical knapsack problem, the multi-dimension multi-choice knapsack problem (MMKP) is widely used in practical applications. It is a NP-complete problem, the exact solution of MMKP cannot be founded in polynomial-time. As one of the heuristic algorithms, quantum particle swarm optimization (QPSO) algorithm provides a sight to get the approximately optimal result for MMKP. However, due to the multiple constraints among dimensions and the dispersing feasible regions, QPSO tends to fall into local convergence. Hence a modified diversity reserved QPSO algorithm for MMKP is proposed in this paper: (i) to measure the availability of a particle by comparing the position between itself and the next alternative during the generation; (ii) import a position disturbance operator to increase the diversity of population. Experiments demonstrate that the proposed evolutionary algorithm could find better near-optimal results. And the analysis of convergence and execution time suggest that the probability of local convergence is declined in our algorithm.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lip reading using a dynamic feature of lip images and convolutional neural networks","authors":"Yiting Li, Yuki Takashima, T. Takiguchi, Y. Ariki","doi":"10.1109/ICIS.2016.7550888","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550888","url":null,"abstract":"In this paper, a lip-reading method using a novel dynamic feature of lip images is proposed. The dynamic feature of lip images is calculated as the first-order regression coefficients using a few neighboring frames (images). It constiutes a better representation of the time derivatives to the basic static image. The dynamic feature is processed by using convolution neural networks (CNNs), which are able to reduce the negative influence caused by shaking of the subject and face alignment blurring at the feature-extraction level. Its effectiveness has been confirmed by word-recognition experiments comparing the proposed method with the conventional static (original) image.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128470035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT/IS strategic development for journalism system implementation on television industry: Study case on NET television station","authors":"Harya Bima Dirgantara","doi":"10.1109/ICIS.2016.7550807","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550807","url":null,"abstract":"NET is a national television in Indonesia. As a technology based company, NET wants to be the main choice television station of Indonesian society. NET takes advantages of the Indonesian people high interest on social media. NET embraces citizens to engage into citizen journalism. This research aims to produce information technology strategic plan. This study used SWOT analysis and IT Balanced Score Card. From this study it can be concluded that social media and smart phones are one of the factors increasing citizen journalism. The events recorded by citizen journalists are sometimes become the headlines of the national televisions in Indonesia.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117191266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The analysis of coordinate-recorded merge-sort based on the divide-and-conquer method","authors":"Menghan Yan, Wenqian Shang, Mengyi Zhang","doi":"10.1109/ICIS.2016.7550931","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550931","url":null,"abstract":"Many available algorithms are structurally recursive and can invoke the typical algorithm itself once or even more times to solve tightly related sub-problems. All of these algorithms follow the major principle called Divided-and-Conquer method, which first divides initial problem into several items same in goals but have a smaller scale. The Merge Sort uses this ideology to compass complexity and accelerate processing time. The coordinate-recorded merge sort algorithm continues the main idea, lets the processing problems get larger gradually, but directly works out solutions of the smallest subproblems at the very start, in other words, the dividing process becomes useless.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115253642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Asma Mejri, Sonia Ayachi Ghannouchi, R. Martinho, Feteh Elhadj
{"title":"Enhancing business process flexibility in an emergency care process","authors":"Asma Mejri, Sonia Ayachi Ghannouchi, R. Martinho, Feteh Elhadj","doi":"10.1109/ICIS.2016.7550814","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550814","url":null,"abstract":"Business Process Management (BPM) is being increasingly adopted to streamline healthcare service delivery and management processes. Emergency departments (ED) are very complex. To operate effectively and create value, EDs must be flexible and have the ability to rapidly adapt to the highly variable needs of patients. In this paper, we provide models for a real-world scenario emergency care (EC) process, and elicit its flexibility needs using interviews with the EC process participants. We then use a guidance tool to help with the choice of the most suitable Business Process Management System (BPMS), regarding the flexibility needs elicited. We validate this choice by modelling the new flexibility enhanced EC process with one of the advised BPMSs, and analyse its support regarding the elicited flexibility needs.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115754921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards detecting and predicting fall events in elderly care using bidirectional electromyographic sensor network","authors":"Hao Han, Xiao-juan Ma, K. Oyama","doi":"10.1109/ICIS.2016.7550897","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550897","url":null,"abstract":"Falling is one of the most serious life-threatening events for the elders, and the ICT-based solution plays a key role in addressing this problem prevalently. In this paper, four principles are proposed as fundamental criteria for designing a sensor network for elder-oriented fall detection and prediction. According to these criteria, a bidirectional electromyographic sensor network model is experimentally constructed, and qualitative analysis is conducted to explain that this solution performs more realistically and rationally.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116273823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques to generate UTP-based test cases from sequence diagrams using M2M (Model-to-Model) transformation","authors":"Yongjin Seo, E. Cheon, Jin-A. Kim, H. Kim","doi":"10.1109/ICIS.2016.7550832","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550832","url":null,"abstract":"In order to conduct model based testing of sequence diagrams, test cases should be automatically generated from sequence diagrams. To this end, the scenarios expressed by the sequence diagrams are identified and paths that satisfy the test coverage are extracted to generate test information. However, since sequence diagrams express loop, optional, and alternative information using combined fragments, an automatic generation of test cases from sequence diagram is complicated. To solve this problem, in this paper, a model transformation process that transforms from sequence diagrams into activity diagrams is defined, the scenarios of sequence diagrams are represented in the form of control flows by the transform process. Next, test coverage is applied to generate test cases. The process to generate test cases from sequence diagrams is shown through case studies.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126768786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanwei Lou, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng
{"title":"Visualization research and implementation based on ATM alarm data","authors":"Yanwei Lou, Wenqian Shang, Ligu Zhu, Di Zhang, Dongyu Feng","doi":"10.1109/ICIS.2016.7550950","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550950","url":null,"abstract":"With the development of science and technology, it generates a large amount of data. Data visualization is an important branch to help people get a better understanding of the changing trend of data. Data visualization is a significant method to Big Data Analysis, which shows the importance of data in a visual form. By using data visualization, people can easily find the association between data. According to the requirement of ATM service, this paper designs and implements the information visualization system of ATM alarm data.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124331089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust model based on changeable sampling frequency for wireless sensor network","authors":"Wang Na, DongQian Liu","doi":"10.1109/ICIS.2016.7550727","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550727","url":null,"abstract":"Traditional monitoring sensor has fixed sampling frequency. Whether the frequency is too high or too low, it is easy to cause some problems. This paper firstly puts forward sensor with changeable sampling frequency and its control algorithm. Considering the special circumstance that some nodes of the wireless sensor network are faulty, a trust model based on changeable sampling frequency. It is an improvement on our former models which has higher fault detection rate. Moreover, the model can detect fault in shorter time duration.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124426738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Li-ion battery charger based on remaining capacity with fuzzy temperature control","authors":"B. Peng, S. Wang, Yi-Hua Liu, Huang Yan-Syun","doi":"10.1109/ICIS.2016.7550768","DOIUrl":"https://doi.org/10.1109/ICIS.2016.7550768","url":null,"abstract":"Using high C-rate currents to charge batteries will cause large electrochemical reaction stresses, and thus result in high temperature rise and aggravate battery aging. To alleviate the battery aging and extend the life cycle, a remaining capacity (RC) charge method with fuzzy temperature control is proposed in this paper. According to the derived relationship between the charge C-rate and the state of charge (SOC) of the battery, a corresponding coarse-tuning charge current is determined. To control the temperature rise for subduing the aging effect, a fuzzy temperature controller (FTC) is designed to generate an incremental charging current to fine adjust the charge current. Following the charging progresses, by combining the fine-tune current with the coarse-tuning current, the studied charger can provide the adaptive charge current to charge the battery at any time. The synchronous-rectified buck converter is utilized to implement the charger. The firmware of the adaptive RC charging algorithm is realized by a microcontroller unit. Experimental results are given to verify the correctness and effectiveness of the proposed approach. Comparing to the conventional constant current-constant voltage (CC-CV) method, the proposed charging method reduces 23.2% of average temperature rise and increases 2.06% charge efficiency while maintaining similar charging time.","PeriodicalId":336322,"journal":{"name":"2016 IEEE/ACIS 15th International Conference on Computer and Information Science (ICIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123504150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}