2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)最新文献

筛选
英文 中文
Effectiveness of a low-cost VR simulator for emergency management training in dental surgery 低成本虚拟现实模拟器在牙科外科应急管理培训中的有效性
Nat Sararit, P. Haddawy, S. Suebnukarn
{"title":"Effectiveness of a low-cost VR simulator for emergency management training in dental surgery","authors":"Nat Sararit, P. Haddawy, S. Suebnukarn","doi":"10.1109/JCSSE.2018.8457353","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457353","url":null,"abstract":"This paper describes the development and evaluation of a low-cost, portable VR system for training of emergency management decision making in dental surgery. We designed and developed a smart phone based virtual reality system with simulated dental surgery related emergencies during a virtual root canal treatment that records user actions and response time.The evaluation was conducted with 20 dentistry students of the 4th year and 5th year of Thammasat University. Each group went through three sessions of an interactive VR root canal treatment in which the students were tasked with completing the procedure and managing various emergency situations. We measured skin conductance to determine the stress response and during each session. The response time to emergency between two groups from all sessions was analyzed to determine knowledge gain and retention using the system.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ICGdb: An Integrative Cancer Genomic Database ICGdb:一个整合的癌症基因组数据库
Nilubon Kurubanjerdjit
{"title":"ICGdb: An Integrative Cancer Genomic Database","authors":"Nilubon Kurubanjerdjit","doi":"10.1109/JCSSE.2018.8457360","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457360","url":null,"abstract":"The major goals of the ICGdb are 1) to provide a one site of current genomic cancer information gathering from various resources for the future studies on the discovering of cancer biomarker and efficient drugs and 2) to collect findings from our current and future research works. There are two main contributions in this study, firstly, the ICGdb was constructed by integrating essential pieces of genomic data of more than 30 tumors or diseases including genomic and epigenomics information. The input datasets for our current and future research works will be extracted from this database. Secondly, protein complexes as biomarker of the six tumor types were identified by network clustering approach and the target drugs were also investigated.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
JCSSE 2018 Cover Page JCSSE 2018封面
{"title":"JCSSE 2018 Cover Page","authors":"","doi":"10.1109/jcsse.2018.8457344","DOIUrl":"https://doi.org/10.1109/jcsse.2018.8457344","url":null,"abstract":"","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127548454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content-independent steganography and steganalysis of JPEG images JPEG图像的内容独立隐写和隐写分析
Mohammad Rezaei, M. Salahshoor
{"title":"Content-independent steganography and steganalysis of JPEG images","authors":"Mohammad Rezaei, M. Salahshoor","doi":"10.1109/JCSSE.2018.8457337","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457337","url":null,"abstract":"This paper studies the possibilities of hiding data within a JPEG file without making any changes to the image content, and in a way that any JPEG decoder normally opens the file. These possibilities are found by careful studying the JPEG file format. A steganalysis system needs to check these simple embedding techniques before complicated analyses of DCT coefficients. We also present a number of system attacks on JPEG files, which can lead to detection of hidden data. The attacks are based on the fingerprints left in the stego file by JPEG encoders, or the steganography algorithm itself.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127786461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact of Noise and Complexity on Targeted Image Steganalysis 噪声和复杂度对目标图像隐写分析的影响
H. Imani, Mohammad Rezaei
{"title":"Impact of Noise and Complexity on Targeted Image Steganalysis","authors":"H. Imani, Mohammad Rezaei","doi":"10.1109/JCSSE.2018.8457345","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457345","url":null,"abstract":"The changes made by steganography to an image can be considered as noise addition. A fundamental question is how well targeted steganalytic methods distinguish between the stego signal and naturally occurring noise in images. Moreover, several researchers have proposed steganographic methods that hide the message data in the complex regions of images. They argue that those regions are more secure for data hiding. However, no systematic experiments, to the best of our knowledge, have been presented to confirm the claims. This paper provides an experimental study to answer the questions about the impact of noise and complexity on the performance of targeted steganalytic methods. Three well-known targeted steganalytic methods are tested when spatial domain steganography is considered. Three types of noise at different levels are added to images, and two groups of complex and non-complex images are considered. Our experiments show a significant decrease in the detection accuracy of all the selected steganalytic methods for complex images. The methods demonstrate different responses to different noise types. Their performance degrades the most by Gaussian, and the least by salt & pepper noise.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Images Based Classification for Warm Cloud Rainmaking using Convolutional Neural Networks 基于图像的基于卷积神经网络的暖云降雨分类
Sarawut Arthayakun, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn
{"title":"Images Based Classification for Warm Cloud Rainmaking using Convolutional Neural Networks","authors":"Sarawut Arthayakun, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn","doi":"10.1109/JCSSE.2018.8457398","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457398","url":null,"abstract":"This paper is an experiment conducted on deep learning technique, which is currently popular and efficient in the field of image classification. The Convolutional Neural Networks (CNNs) has been achieved in many tasks of image classification and used to classify cloud images for meteorology task. The CNNs can be applied to classify rainmaking cloud images. There are three steps of warm clouds: fattening, attacking, and enhancing. The challenge in this work is the images required for classification are very similar. That means the sampling images are the images of cloud in the same type but difference at the formation stage, while the image shooting format and equipment is not fixed. The images are taken with varying degrees of angle, height, lightness and resolution. From the experimental results, it was found that CNNs had prominent characteristics for learning to extract the necessary attributes used in solving problem along with self-classification, leading to the developed model had higher accurate classification than traditional method around 5–8%.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131356591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AR Development For Room Design 房间设计的AR开发
Peeranut Reuksupasompon, Maytichai Aruncharathorn, Sirion Vittayakorn
{"title":"AR Development For Room Design","authors":"Peeranut Reuksupasompon, Maytichai Aruncharathorn, Sirion Vittayakorn","doi":"10.1109/JCSSE.2018.8457343","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457343","url":null,"abstract":"Arranging your furniture correctly can be the difference between having a cramped, gloomy, impractical space and a cozy, elegant and functional room. Although everyone wants their place to be functional and stylish, room design demands time and expertise. While there are extensive systems for room and layout design, most of them require users to drag and drop the 3D furniture models into their 3D room, modify the furniture size/color/texture or change the camera viewpoint around to see their newly designed room from different perspectives by means of the mobile phones or tablets screen. These complications diminish the user satisfaction as well as restrict synchronous collaboration among multiple users. In this work, we propose a system for designing a furniture layout based on the augmented reality technology. Given the room floor plan and multiple QR markers, users are able to physically move their furniture (each QR marker corresponds to a 3D furniture model) around the limited space (inside the specific area defined by the room plan) to design their own functional and stylish room layout. Finally, We demonstrate that our system can not only alleviate the difficulties of existing room design systems, but also amplify the users satisfaction of room design application. Moreover, we posit that it will encourage co-design from simultaneous multiple users.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134153149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
JCSSE 2018 Copyright Page JCSSE 2018版权页面
{"title":"JCSSE 2018 Copyright Page","authors":"","doi":"10.1109/jcsse.2018.8457379","DOIUrl":"https://doi.org/10.1109/jcsse.2018.8457379","url":null,"abstract":"","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic Link-Fault-Tolerant Routing In A Torus 环面的随机链路容错路由
S. Kuramochi, Yu-on Chatchakan, Kousuke Mouri, K. Kaneko
{"title":"Stochastic Link-Fault-Tolerant Routing In A Torus","authors":"S. Kuramochi, Yu-on Chatchakan, Kousuke Mouri, K. Kaneko","doi":"10.1109/JCSSE.2018.8457367","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457367","url":null,"abstract":"It is impossible to operate a parallel system that contains a large number of elements ignoring the existence of faulty elements. In fault-tolerant routing in a parallel system, the method to make each non-faulty vertex store the compressed fault information (limited global information) is effective. The torus is the most popular topology adopted for interconnection networks of parallel systems. However, because of its complexity, any effective method that utilizes the limited global information has not been proposed. In this paper, we propose a stochastic fault-tolerant routing method in tori, which can tolerate the link and/or vertex faults. We can expect that our result achieves drastic improvement regarding fault-tolerant routing in many parallel systems.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Analysis of High-Value Datasets: A Case Study of Thailand’s Open Government Data 高价值数据集分析:以泰国政府开放数据为例
Piriya Utamachant, Chutiporn Anutariya
{"title":"An Analysis of High-Value Datasets: A Case Study of Thailand’s Open Government Data","authors":"Piriya Utamachant, Chutiporn Anutariya","doi":"10.1109/JCSSE.2018.8457350","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457350","url":null,"abstract":"Thailand’s national open data portal (data.go.th) has been launched since 2013, having over 1,000 datasets publicly available andprovided by 107 data providers. However, there exists very limited study about these datasets which is vital to the improvement of Thailand’s Open Government Data (TOGD). Hence, this paper aims to fill this needt Specifically, its objectives are threefold: 1) to evaluate domain coverage of high-value datasets with respect to the global standards, 2) to analyze TOGD datasets with respect to their available data fields and categorization, and 3) to evaluate the datasets’ qualities, and thus provide process and policy guidelines to overcome the quality weaknesses. In our in-depth study, the high-value datasets announced by Electronic Government Agency of Thailand (EGA) were comprehensively and thoroughly analyzed.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书