Hyunju Kim, Junwon Hwang, Taewoo Yoo, Yun-Gyung Cheong
{"title":"Improving a Graph-to-Tree Model for Solving Math Word Problems","authors":"Hyunju Kim, Junwon Hwang, Taewoo Yoo, Yun-Gyung Cheong","doi":"10.1109/imcom53663.2022.9721720","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721720","url":null,"abstract":"In the area of Math Word Problem (MWP), various methods based on deep learning technology have been actively researched. Graph-to-Tree (Graph2Tree) is one of those methods which uses a graph-based encoder and a tree-based decoder to understand the word problem and to generate a valid equation. This method is proven to be well-performed by achieving state-of-the-art on several benchmarks. However, on the benchmark of SVAMP, recent methods including Sequence-to-Sequence (Seq2Seq), Goal-driven Tree-Structured MWP Solver (GTS), and Graph2Tree performs poorly, unable to cope with several variation types that requires natural language comprehension capability. In this paper, we propose an improved version of Graph2Tree which considers the characteristics of natural language to understand the word problems. On top of the original Graph2Tree model, we additionally build Dependency Graph and enhance the Quantity Cell Graph to Softly Expanded Quantity Cell Graph. This helps a graph-based encoder to capture the relationship among words. Also, we introduce question embedding for the tree-based decoder to generate equation based on the question given as input. We conduct experiments to evaluate our model against the original Graph2Tree model on three available datasets: MAWPS, ASDiv-A, and SVAMP. We also present case studies to qualitatively examine the effectiveness of the methods and showed that our methods have improved the original Graph2Tree model.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124536269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hira Sajid, Javeria Kanwal, Saeed Ur Rehman Bhatti, Saad Ali Qureshi, A. Basharat, Shujaat Hussain, Kifayat-Ullah Khan
{"title":"Resume Parsing Framework for E-recruitment","authors":"Hira Sajid, Javeria Kanwal, Saeed Ur Rehman Bhatti, Saad Ali Qureshi, A. Basharat, Shujaat Hussain, Kifayat-Ullah Khan","doi":"10.1109/IMCOM53663.2022.9721762","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721762","url":null,"abstract":"Modern approaches to improve networking and communication have given ways to the advancement of recruitment process through the development of e-recruitment recommender systems. The increasing expansion of internet- based recruiting has resulted in a large number of resumes being stored in recruitment systems. Most resumes are prepared in a variety of styles to attract the attention of recruiters, including different font sizes, font colors, and table formats. However, data mining operations such as resume information extraction, automatic profile matching, and applicant ranking are immensely affected by the variety of formats. Rule-based methods, supervised methods and semantics-based methods have been introduced to extract facts from resume accurately, however, these methods heavily depend on large amounts of annotated data that is usually difficult to collect Furthermore, these techniques are time-intensive and bear knowledge incompleteness that strongly affect the accuracy of resume parser. In this paper, we present a resume parsing framework that handles the limitations faced in the previous techniques. At first, the raw text is extracted from resumes and blocks are separated using text block classification. Furthermore, the entities are extracted using named entity recognition and enriched using ontology. The proposed resume parser accurately extracts information from resumes that directly contributes towards the selection of best candidate.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124057344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HELLO: An Android-based Mobile Application for Autism Individuals to Improve Socio-Communicational Learnability in Bangladesh","authors":"Ishrat Jahan Yra, Maksud Hossain Pranto, Amit Das","doi":"10.1109/imcom53663.2022.9721813","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721813","url":null,"abstract":"Autism Spectrum Disorder (ASD) individuals experience many troubles in communication and lag in social improvement. In this significant circumstance, the appearance of smart technologies has kept promising success regarding Autism Spectrum Disorder (ASD). Many socio-developmental mobile applications have been created in developed countries. In contrast, there are no such applications in developing countries like Bangladesh in native content. In this paper, an Android-based mobile application named HELLO is designed with the fundamental thought of Picture Exchange Communication System (PECS) in the Bangla language. This application aims to improve the socio-communicational learnability of autism individuals in Bangladesh. It is expected that our application can be brilliant support to autism individuals, also included the people who endure non-verbal inconveniences. The outcome of this application demonstrates a positive streamline to the improvement in communicating with others.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121513953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Chatbot system using Deep Learning based for Universities consultancy","authors":"T. Le-Tien, Tai Nguyen-D.-P, Vy Huynh-Y","doi":"10.1109/imcom53663.2022.9721735","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721735","url":null,"abstract":"Inspired by the recent successes of Deep Learning on Natural Language Processing (NLP), we propose a chatbot system using Deep Learning for Vietnamese Universities consultancy which can be implemented for any university. The system has three important tasks: User’s Intent Recognition, Dialogue Management, and Reply Channels. For the User’s Intent Recognition task, the Pattern Matching method is combined with the Text Classification model using Bidirectional-LSTM which has the Attention mechanism. Besides, we use the Deep Reinforcement Learning architecture to train an Agent for Dialogue Management task. In this paper, we conduct a Proof of Concept to the Ho Chi Minh City University of Technology (HC-MUT). The experimental results achieve an average 89% F1-score of 3 classes of the Text Classification task using Deep Learning, the evaluation result of Dialogue Management that the rate of success achieves by 86%. Our demo version of a production web application is available at https://hcmutbot.herokuapp.com/.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulaziz Aborujilah, J. Adamu, S. Shariff, Zalizah Awang Long
{"title":"Descriptive Analysis of Built-in Security Features in Web Development Frameworks","authors":"Abdulaziz Aborujilah, J. Adamu, S. Shariff, Zalizah Awang Long","doi":"10.1109/imcom53663.2022.9721750","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721750","url":null,"abstract":"Many challenges are facing modern web applications, and security is a major concern for web applications developers especially when today's web applications are interactive and support user collaboration. SQL injections, cross-site scripting, cross-site request forgery, and broken authentication are examples of these common security vulnerabilities. Several web development frameworks (e.g., Laravel, Spring Boot, Django, Ruby on Rails, and ASP.NET Core) provide out-of-the-box security features to protect modern web applications against the above-mentioned vulnerabilities. Developers usually use manual protection mechanisms to secure modern web applications. Although, manual protection increases the probability of web application attacks. This study focuses on reviewing and comparing and analyzing the most common vulnerabilities found in modern web applications and the web development frameworks built-in security features. This study aid software developers and organizations in selecting the most effective protection methods which are provided by web application frameworks.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128313807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulaziz Aborujilah, Abubaker-Eseddig Fathi Mahmoud Elsebaie, S. A. Mokhtar, Zalizah Awang Long, S. Shariff, Nur Syahela Hussien, Mohd Nizam Husen
{"title":"A Conceptual Framework for an Integrated Healthcare Information Systems from an Organizational Perspective","authors":"Abdulaziz Aborujilah, Abubaker-Eseddig Fathi Mahmoud Elsebaie, S. A. Mokhtar, Zalizah Awang Long, S. Shariff, Nur Syahela Hussien, Mohd Nizam Husen","doi":"10.1109/IMCOM53663.2022.9721767","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721767","url":null,"abstract":"Healthcare information technology integration is an essential factor to improve healthcare quality services. During COVID 19 epidemic, there is a high necessity to set up a comprehensive framework for integrating healthcare information systems (IHIS). Most of the existing works address this issue from technical perspectives. This study aims to create a comprehensive understanding and identify the crucial dimensions of the IHIS at an organizational level using the human, organization, and technology model (HOT-fit model). To achieve the study’s goal, the qualitative evaluation method is adopted to explore and analyze the existing studies on IHIS from organizational perspectives. The study investigates the key dimensions that affect the development of IHIS at the organizational level, which do not adequately discuss in the previous studies. The findings indicate that the key IHIS dimensions could be recognized by using the three dimensions of IT infrastructure, and organizational process, as well as the human factor. From the other side, the organization would be able to curb the coronavirus COVID-19 outbreak as the conceptual framework highlighted the relationships among the dimensions by facilitating the information sharing within an organization to attain coordination and cooperation between stakeholders which can improve the monitoring capability in the system. This study contributes to academic research, by producing a conceptual framework for IHIS dimensions. As the framework can be used as a guideline by healthcare decision-makers and healthcare project managers to understand the integration requirements at the organizational level.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121398120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collection Tree for Wireless Coverage Problem in Mobile Crowdsensing","authors":"Dejun Kong, Xiaofeng Gao, Guihai Chen","doi":"10.1109/imcom53663.2022.9721737","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721737","url":null,"abstract":"Mobile devices play an important role in crowdsensing with the help of storage infrastructure. In the event of emergencies, a wireless sensor network can he constructed for people to sense the environment. When devices’ mobility is out of control, collection trees are considered to route all the data to the sink. We propose a new wireless coverage problem in mobile crowd-sensing when the core network is corrupted, and our aim is constructing collection trees to minimize the average delay of information. We propose two kinds of algorithms to construct the collection trees. We first propose Greedy Collection Tree (GCT) and Dynamic Greedy Collection Tree (DGCT) with two different objective functions, transferring probability and entropy increment. Then we propose Improved Greedy Collection Tree (IGCT) based on the assumption of low population fluidity. The effectiveness of our algorithms is testified in aspects of transmission average delay, delay’s standard deviation and entropy evolution.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu Rong, Jinglong Jiang, Husna Mutahira, S. M. Mannan
{"title":"Monocular Intra-vehicular Distance Estimation using Front Vehicle License Plate","authors":"Yu Rong, Jinglong Jiang, Husna Mutahira, S. M. Mannan","doi":"10.1109/imcom53663.2022.9721763","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721763","url":null,"abstract":"Intra-vehicular distance estimation is crucial for advanced driver assistance systems (ADAS), since it is capable of efficiently avoiding the dangers while driving. Most methods for distance estimation use the height of the camera above the road level, which is difficult to obtain. In this paper, a measurement method for license plate detection based on monocular distance estimation is proposed. The method consists of license plate localization, digital segmentation, and distance measurement modules. At first, license plate is detected using traditional method. To reduce the interference, a trapezoid area in front of the vehicle is chosen as the region of interest (ROI), and Sobel operator is employed to perform edge detection. Later, segmentation is performed followed by distance calculation using the heights of the digits on the license plate. The actual distance is then estimated by comparing the real height and the pixel height of the license plate digits that are obtained with a single camera. The experimental results show improved performance than the previous methods.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"6 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123644253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A gain boosted single stage wideband InP HBT amplifier for terahertz applications","authors":"Waseem Abbas, M. Seo","doi":"10.1109/IMCOM53663.2022.9721734","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721734","url":null,"abstract":"A 250 nm indium phosphide (InP) heterojunction bipolar transistor (HBT) based wideband and novel gain- boosted single-ended power amplifier is presented for millimeter-wave frequency range. A common-emitter configuration is used with feedback embedding network to boost the gain upto Gmax (Maximum Achievable Gain) from Gma (Maximum Available Gain) of HBT. We achieved the Gma up to U (Mason’s Gain) due to the instability of HBT. The achieved power gain is 7.2-dB with 61 GHz bandwidth (285- 346 GHz), and the power consumption is 114 mW. The ultrawideband and high gain characteristic of the proposed amplifier makes it an attractive choice for the wide range of terahertz and next-generation 6G communication circuits.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"435 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122475889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation on Partially Verifiable Multi-signature Scheme in Electronic Contract Systems","authors":"Dongwoo Kang, Hoil Ryu, Dongho Won","doi":"10.1109/imcom53663.2022.9721802","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721802","url":null,"abstract":"With the rapid development of mobile devices and information technology in recent years, electronic contract systems, by which mutually agreed contracts can be easily and conveniently signed and stored, have steadily advanced. In addition, as the concept of self-sovereign identity has emerged, it is recommended to select and submit only the data an individual wants to prove, out of all data related to the individual, when using data that contains personal information. Although several multi-signature schemes have been proposed, they have limitations such as sequential signing or disclosure of the original data. Thus, in this paper we developed and implemented a Multi-signature scheme, in which only the data to be verified are disclosed and verified. We analyzed the security of the scheme to demonstrate its usability in electronic contract system environments.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131573865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}