{"title":"Estimating concept embeddings from their child concepts","authors":"Tatsuya Oono, Kanako Komiya, Minoru Sasaki, Hiroyuki Shinnou","doi":"10.1109/ICT-ISPC.2016.7519227","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519227","url":null,"abstract":"We estimate the concept embeddings, which are distributed representations of the concepts, in a concept dictionary from the concept embeddings of their child concepts. The concept dictionaries represent the systematic classification of the concepts of nouns and verbs in a way and the concept embeddings represent the meanings of the concepts. This paper investigates what kind of composition calculation can represent the relation between the concepts and their child concepts in a concept dictionary, which is a hierarchical relationship that humans assume. We examined four methods to estimate the concept embeddings and investigated three size of dimensions. The experiments revealed that the best method was the simple summation of concept embeddings of the child concepts and the similarities increased when the vector size decreased. We also examined that whether the similarities between the actual and estimated concept embeddings will increase when we restricted the concepts to calculate the similarities by the minimum number or percentage of their children's concept embeddings. However, the experiments revealed that they decreased if the concepts were restricted.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129312711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sarawut Busssadee, Sittipong Suwannatria, Arnon Chonrawut, Ek Thamwiwatthana, Kitsuchart Pasupa
{"title":"Inside Me: A proposal for healthcare mobile application","authors":"Sarawut Busssadee, Sittipong Suwannatria, Arnon Chonrawut, Ek Thamwiwatthana, Kitsuchart Pasupa","doi":"10.1109/ICT-ISPC.2016.7519242","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519242","url":null,"abstract":"Smart phone has been widely used as an ideal assistant for health and fitness. In this paper, we proposed a mobile application for health monitoring-Inside Me-which can help users to become more aware of their health. This application aims to track user's workout activities and monitor and analyze user's health condition. It also gives some instructions and suggestions to the user for maintaining and improving his or her health. Moreover, it provides an assessment of the risk that the user may have one of these two diseases: coronary disease and diabetes. Input data are collected from several sources such as questionnaire, medical check-up record, and wearable device. The risk assessment is carried out by machine learning algorithms.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hairstyle recommendation system for women","authors":"Wisuwat Sunhem, Kitsuchart Pasupa, Piyakorn Jansiripitikul","doi":"10.1109/ICT-ISPC.2016.7519262","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519262","url":null,"abstract":"A perfect hairstyle enhanced anyone's self-confidence, especially women. However, in order to choose a good hairstyle, one was limited to rely on knowledge of a beauty expert. This paper presented a hairstyle recommendation system for women based on hairstyle experts' knowledge and a face shape classification scheme that the authors devised in a previous study. The system showed a user's face with a recommended or not recommended hairstyle on a monitor.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127681882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differentiation of motion patterns between Anterior Cruciate Ligament injuries and healthy individuals","authors":"Nantawat Prachasri, Duangkamol Yangchaem, Nattaporn Dirakbussarakom, Worapan Kusakunniran","doi":"10.1109/ICT-ISPC.2016.7519248","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519248","url":null,"abstract":"Detecting the sign of Anterior Cruciate Ligament (ACL) injury in advance is very important because the injury could be prevented to seriously occur, or a patient would be provided with the proper treatment timely. ACL injury, mostly happen with athletes, is the injury that one pair of cruciate ligament are torn because of the sport or daily life activities. Finding the differences of gait data patterns between an ACL injury patient and a healthy controlled person is proposed in this paper. Linear Discriminant Analysis (LDA) is applied to assist in the discrimination. After that, the k-nearest neighbor algorithm which focuses on the subject average is applied as a classification tool. The leave-one-out cross-validation is used for evaluating the performance of the proposed method. In this paper, the friendly user interface is also developed to facilitate the general users for using this program. In the experiment, there are 10 subjects which consist of 5 healthy control subjects and other 5 ACL injury subjects. The 3 gait variables are used to verify the proposed method. The 3 variables are the top 3 most significant variables which are ankle joint moment, hip joint moment and knee joint moment. In the experiment, it is shown that the proposed method can achieve a promising accuracy with the limited number of training data.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129658685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chanya Peuchpanngarm, Pantita Srinitiworawong, Wannisa Samerjai, T. Sunetnanta
{"title":"DIY sensor-based automatic control mobile application for hydroponics","authors":"Chanya Peuchpanngarm, Pantita Srinitiworawong, Wannisa Samerjai, T. Sunetnanta","doi":"10.1109/ICT-ISPC.2016.7519235","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519235","url":null,"abstract":"Hydroponics is a new popular technique of growing plants, especially in urban area, due to its many advantages over traditional soil based gardening. To apply affordable technology for managing and controlling hydroponics gardening, we developed a DIY sensor-based automatic control mobile application for hydroponics. The application enables automatic environmental control for hydroponics via different types of sensors including water temperature sensor, temperature and humidity sensor, and light intensity sensor. It also consists of the functions for planning, managing, as well as harvest data recording, of hydroponic gardening to fulfill the planting demands. The harvest data will be used for hydroponics planning in the next grow. In addition, users can monitor the plant growing progress remotely.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126606037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ROS Extension of Blue-Sky web based development environment for IoT","authors":"Praween Amontamavut, Eiichi Hayakawa","doi":"10.1109/ICT-ISPC.2016.7519232","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519232","url":null,"abstract":"We extended Blue-Sky web-based development environment for distributed embedded systems that we developed to support Robot Operating System (ROS) robotic framework. ROS is built on publish/subscribe messaging model that is different from Blue-Sky. To solve the problem, we extended Blue-Sky in order to handle publish/subscribe message from ROS to Blue-Sky. ROS-Blue-Sky proxy runs as a ROS node to collect the messaging data from roscore in order to monitor and trace the access data of the Blue-sky and ROS mixed environments. As a result of the proxy extension, we can conveniently use the ROS feature from Blue-Sky nodes, trace and monitor the Blue-Sky and ROS nodes, and visualize the status in a web browser with a low overhead of the proxy.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pathompong Tungjitsirisun, Worayoot Pechsuwanrungsee, P. Siripongwutikorn
{"title":"Wireless door access system with face verification","authors":"Pathompong Tungjitsirisun, Worayoot Pechsuwanrungsee, P. Siripongwutikorn","doi":"10.1109/ICT-ISPC.2016.7519238","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519238","url":null,"abstract":"A traditional door access system using a keycard uses wired cables from many door units to the backend server for authentication. The system installation is thus time consuming and costly in a large floor area with many rooms. Besides, the hardware and software in the system are proprietary to each company offering the product. This prevents the user from extending the system or replacing door access units by using components of another company. In this work, we design and implement a wireless door access system where the door units communicate with the backend server over a wireless network. To achieve better security and performance, the authentication is based on both a student/employee ID card and an image snapshot for face verification. The wireless implementation allows for much easier installation and system extension. The system is built from custom off-the-shelf hardware components and open-source software, which facilitate in-house implementation of the door units to replace broken units or to add new units to the system. The system has functioned successfully as designed.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132525714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FoodForCare: An Android application for self-care with healthy food","authors":"Natnicha Suthumchai, Sirin Thongsukh, Pacharamai Yusuksataporn, Songsri Tangsripairoj","doi":"10.1109/ICT-ISPC.2016.7519243","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519243","url":null,"abstract":"Recently, there are many people who ignore health concerns especially in their eating habits. This has made the number of diseases found in society, especially non-communicable diseases (NCDs) such as diabetes, hypertension, and cancer drastically increase every year. The number of patients having these diseases, could be reduced by paying more attention to the food that they eat and nutrition that they receive. Accordingly, the researchers would like to propose FoodForCare, an Android application for self-care with healthy food. The main purpose is to help users have better eating habits and a healthier lifestyle. FoodForCare provides functions for users to keep their daily personal health and food records of food intake. The users can see an analysis of nutrition and calories per day and whether it is sufficient or not. This application can give an overview on food calories and nutrition so that they can eat wisely. Finally, the development of this application hopes to help Thai people in order to manage their total nutrition and calories taken for a healthier lifestyle and will directly decrease the number of people who are getting diseases caused from a disorder of food and nutrition.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133131399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face and Eyes mouse for ALS Patients","authors":"Woramon Chareonsuk, Supisara Kanhaun, Kattaleeya Khawkam, Damras Wongsawang","doi":"10.1109/ICT-ISPC.2016.7519240","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519240","url":null,"abstract":"The objective of this project is to develop the software to detect the Amyotrophic Lateral Sclerosis (ALS) patient's face and eyes movement, so that the patient is able to use computer as normal people. The developed system is called Face and Eyes mouse for ALS Patients or FEMA. The system is divided into 2 parts, client part and system part. The client part is ALS patients who are able to use mouse and keyboard simulation by using only their head and eyes' movement. Another part is FEMA system which will analyze their actions and return the action result to the patient. In addition, there is the keyboard simulation which provides the similar function as the real keyboard. From the experimental results, the precision rate of all functions except move up and move down is more than 80%. We also found that the important factors of the detection result are brightness and camera quality which are most sensitive to the detection accuracy.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129256497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chanin Tansettanakorn, Supachai Thongprasit, Siritam Thamkongka, V. Visoottiviseth
{"title":"ABIS: A prototype of Android Botnet Identification System","authors":"Chanin Tansettanakorn, Supachai Thongprasit, Siritam Thamkongka, V. Visoottiviseth","doi":"10.1109/ICT-ISPC.2016.7519221","DOIUrl":"https://doi.org/10.1109/ICT-ISPC.2016.7519221","url":null,"abstract":"According to the advanced wireless technology in nowadays, most people mainly use their mobile phones as an essential tool. At the same time, threats of the mobile phones such as virus, botnets, and other malware are also increasing as well. However, most users have the limited of knowledge about mobile threats. Therefore, we would like to reduce the number of botnet-infected mobile phones before the users install an application on their phones. We develop a system called ABIS (Android Botnet Identification System) to check Android applications whether they are possibly be malware or not. In order to identify the Android botnets, our system learns the characteristics of each Android botnet family from the dataset provided by the University of New Brunswick [1]. We analyze the Android APK files, extract important features, and find an appropriate machine learning technique. As the results, we found that our system can classify the Android botnets with about 96.9% of recall.","PeriodicalId":359355,"journal":{"name":"2016 Fifth ICT International Student Project Conference (ICT-ISPC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128136439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}