{"title":"Grid-based Spatial Index Method for Location-based Nearest Neighbour Search","authors":"A. Myint, Khin Mo Mo Tun","doi":"10.18178/wcse.2019.03.030","DOIUrl":"https://doi.org/10.18178/wcse.2019.03.030","url":null,"abstract":"Geo-spatial data becomes more and more large amount of data on the Web. On the other hand, managing massive spatial data is one of challenges for supporting spatial queries and high performance computational is also needed to support spatial queries. Thus there is needed to solve this criteria is to create a better spatial indexing method. The proposed method is to create Grid-based R-tree index structure for k nearest neighbour query and range query. R-tree is constructed with Minimum Bounding Rectangle (MBR) that contains a group of objects. The proposed system is combined R-tree with grid index that is reduced overlapping and covering area. The proposed system is to support spatial queries efficiently and also supports speed up computational performance.","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128106254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of an Ensemble Learning based Classifier in Crime Prediction","authors":"","doi":"10.18178/wcse.2019.06.019","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.019","url":null,"abstract":"","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115442813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ren Wei, Z. Minghua, Zhang Sheng, Qiao Jihua, Huang Jinming
{"title":"Identifying Rock Thin Section Based on Convolutional Neural Networks","authors":"Ren Wei, Z. Minghua, Zhang Sheng, Qiao Jihua, Huang Jinming","doi":"10.18178/wcse.2019.06.052","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.052","url":null,"abstract":"This paper uses the convolutional neural networks to train and identify rock thin sections. There are three innovations in this method. Firstly the convolutional neural network is used in the field of geological experiment testing and it can automatically identify and classify the rock thin sections. Secondly the original image of rock thin sections are sliced and segmented, so that the convolutional neural network could learn more details of the rock mineral texture without damaging the original resolution of the image. Thirdly using other image enhancement techniques, such as random flipping and standardization, can expand the sample data set and enhance the robustness of the model. Finally the training model achieves the desired results.","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of Two-Wheeled Robotic Self-Balancing Walking Control System","authors":"","doi":"10.18178/wcse.2019.06.131","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.131","url":null,"abstract":"","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125056735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dataset for Depression Detection from Speech Emotion Recognition","authors":"Lwin Lwin Mar, Win Pa Pa, T. Nwe","doi":"10.18178/wcse.2019.03.018","DOIUrl":"https://doi.org/10.18178/wcse.2019.03.018","url":null,"abstract":"Lwin Lwin Mar , Win Pa Pa and Tin Lay Nwe 1, 2, 3 UCSY, Myanmar Abstract. The recognition of internal emotional state of a person plays an important role in several human related fields. Emotions constitute an essential part of our existence as it exerts great influence on the physical and mental health of people. Depression is a common mental d isorder. Developments in affect ive sensing technology with focus on acoustic features will potentially bring a change due to depressed patients’ slow, hesitating, monotonous voice as remarkable characteristics. The system is intended for classification of emotions and depression by using speech signals. Both time and frequency domain features will be used in feature vector extraction. In feature extraction, the system will use wavelet transform and MFCC. DenseNet will be used to detect the emotion, classify the type of emotion and then depression. This paper will present about the datasets collected for the system and the experimental results on the dataset using Support Vector Machine.","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126716028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Income and Risk of Overseas Investment of China's Power Grid in New Energy","authors":"","doi":"10.18178/wcse.2019.06.083","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.083","url":null,"abstract":"","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SYN Flooding Attack Detection and Mitigation in SDN","authors":"Nan Haymarn Oo, A. Maw","doi":"10.18178/wcse.2019.03.022","DOIUrl":"https://doi.org/10.18178/wcse.2019.03.022","url":null,"abstract":". Software-defined networking separates network architecture into logical control layer and data forwarding layer with the aim of providing high flexibility, agility, and security. Although it manages the whole network from the controller with the ease of programmability, many security issues still exist in SDN architecture. Attacker's target can be at the various layers of SDN by DDoS attack. Defining threshold in detection and mitigation of the attack is one of the most important issues. Existing researches emphasize the detection of DDoS attack with various mechanisms in SDN infrastructure. This paper provides a simple mechanism for both detection and mitigation of common type of DDoS attack, SYN flooding attack via sFlow analyzer with dynamic threshold calculated by using adaptive threshold algorithm. It uses own generated network traffic consisting both normal and attack traffic and shows that how the calculated dynamic threshold adapts the incoming traffic. It also evaluates the performance of the detection and mitigation mechanism by detection rate, false alarm rate, false negative rate, and accuracy in order to prove our proposed system can timely detect and reasonably mitigate DDoS attack.","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of an XML Schema Based XML Data Editor","authors":"Dongyang Liang, Shasha Li, Jie Yu, Bing Ji","doi":"10.18178/wcse.2019.06.099","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.099","url":null,"abstract":"China Abstract. The collection, editing and processing of all kinds of equipment data is the core of all kinds of weapon equipment integrated support business information system. The scalability, stability and reliability of traditional systems are poor. This paper designs and implements an XML Schema based XML data editor. The editor takes a loosely coupled design, which is structurally divided into transformation from XML Schema into Java codes, profile generation tools, data editing interface, and data validation four modules, and the function of each module is defined. Finally, implement each function module and integrate them into the XML data editor. The validation results of the XML data editor shows that the XML data editor is available, reliable and","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124624393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Method for Electromagnetic Streaming Data Anomaly Detection","authors":"","doi":"10.18178/wcse.2019.06.037","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.037","url":null,"abstract":"","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129905035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of the Modified Vigenere Algorithm to Secure Data","authors":"","doi":"10.18178/wcse.2019.06.117","DOIUrl":"https://doi.org/10.18178/wcse.2019.06.117","url":null,"abstract":"","PeriodicalId":342228,"journal":{"name":"Proceedings of 2019 the 9th International Workshop on Computer Science and Engineering","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129915659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}