{"title":"A Multi-task based Bilateral-Branch Network for Imbalanced Citation Intent Classification","authors":"Tianxiang Hu, Jiyi Li, Fumiyo Fukumoto, Renjie Zhou","doi":"10.1109/imcom53663.2022.9721746","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721746","url":null,"abstract":"Identifying the purpose of citations plays an important role in evaluating the impact of the literature. There is a data imbalanced problem on different types of citation intents which harms the performance of the classification model. To alleviate this problem, We adapt the bilateral-branch network proposed in the computer vision domain to our topic in the natural language processing domain by constructing shared and non-shared encoder layers using pre-trained language model and word attention layer respectively. In addition, to learn rich representations by leveraging the auxiliary information, we propose a multi-task based bilateral-branch network. On the issue of how to integrate multi-task model and bilateral-branch network, because one advantage of multi-task learning is using more data or information to learn better representations, we propose a solution of integrating the networks of the auxiliary tasks with the representation learning branch of the bilateral- branch network. The experimental results show that our model outperforms other models used for citation intent classification.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129280107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RECP from the Perspective of Chinese Mainlanders and Taiwanese Netizens: A Comparative Semantic Network Analysis","authors":"ShaoPeng Che, Pim Kamphuis, Shunan Zhang, J. Kim","doi":"10.1109/IMCOM53663.2022.9721777","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721777","url":null,"abstract":"In November 2020, fifteen countries signed the Regional Comprehensive Economic Partnership (RCEP), shaping a new free-trade zone in Asia and the Pacific by joining together some of the largest economies in the world such as South Korea, Japan, and China. Despite being geographically located in the middle of this trade-zone, Taiwan is excluded from this agreement. To understand how it perceives the exclusion and explores the concerns of the Taiwanese people, we have crawled comments from Sina Weibo in China and YouTube in Taiwan that contained the keyword \"RECP.\" Semantic Network Analysis shows that Chinese mainlanders' netizen's comments mainly discuss the economic impact. In contrast, Taiwanese netizens seem to be primarily concerned about China.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116240486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Improving Anomaly Detection Using Multiple Detectors","authors":"Paaras Chand, M. Moh, Teng-Sheng Moh","doi":"10.1109/imcom53663.2022.9721751","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721751","url":null,"abstract":"Anomaly detection performs well in situations where signature (and other rule-based) methods fail; there is no need to identify every threat as long as it is different from the norm. The tradeoff is that anomaly detection often results in a large number of false positives. While previous work has capitalized on the data imbalance problem to train models with only one set of data (one-class classification), few have utilized the limiting set for anything other than testing purposes. This paper seeks to utilize two anomaly detectors: one that is trained on the positive set and one that is trained on the negative set. By utilizing multiple detectors, we can encode more information about each class and ensure that a data point is not only different from one class, but also similar to the other. We present a new approach to anomaly detection and show its effectiveness at reducing false positives with limited effect on detection rates.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Water Level Prediction Model for small-and medium-sized rivers Based on Small Sample Data","authors":"Q. Chen, D. Wan, Yufeng Yu, Ke Li","doi":"10.1109/imcom53663.2022.9721793","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721793","url":null,"abstract":"The small-and medium-sized rivers are affected by the perennial dry flow. The historical water level is scarce, which cannot meet the number of training samples in neural network modeling. The model's accuracy cannot meet the requirements when using traditional machine learning methods to predict the water level. An intelligent water level prediction model for small-and medium-sized rivers based on small sample data is proposed to solve this problem. The primary water level prediction model is established by Bayesian linear regression, and the k-nearest neighbor algorithm is introduced to achieve the first correction of the prediction results. The second correction to the water level sequence is performed using the adjacent algorithm to improve the accuracy of the model predictions. Experiments demonstrate that the method can effectively predict water levels in small samples of small-and medium-sized rivers and improve prediction accuracy.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical Image Segmentation for Skin Lesion Detection via Topological Data Analysis","authors":"N. Jazayeri, Farnaz Jazayeri, H. Sajedi","doi":"10.1109/IMCOM53663.2022.9721758","DOIUrl":"https://doi.org/10.1109/IMCOM53663.2022.9721758","url":null,"abstract":"According to the WHO, two individuals die every hour from skin cancer and about 9500 people get skin cancer every day just in the United States. Various computer vision algorithms have been introduced for skin lesion detection, classification, and segmentation. This paper proposes a new segmentation-based algorithm in order to select target components using the persistence diagram of the input images. The results, in comparison with the existing seven different both clustering- and histogram-based segmentation methods using three metrics, show improved performance. Medical image segmentation is an essential task in computer-aided diagnosis. The main improvement of our method is to detect one lesion component by changing the persistent diagram threshold more cautiously. Sparse matrix implementation by Ripser packages effectively computes 2594 training images in less than an hour. The experimental results on the ISIC dataset suggest that using our framework can improve the accuracy up to 88.57% and achieve advanced performance in the segmentation of skin lesions.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121122653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Baumgart, Claudia Hösel, Manuel Heinzig, M. Vodel, Christian Roschke, M. Ritter
{"title":"A Framework for an IT-based risk management for the third-party funding process in universities (TRINITY)","authors":"M. Baumgart, Claudia Hösel, Manuel Heinzig, M. Vodel, Christian Roschke, M. Ritter","doi":"10.1109/imcom53663.2022.9721792","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721792","url":null,"abstract":"For the current needs in research management at universities with a high volume of third-party funding, current systems offer solutions that focus exclusively on specific areas and no longer do justice to the current complexity. For example, ERP systems provide functions for budget and personnel, research information systems for marketing, and document management systems provide functions for administration. What all systems have in common is that they do not holistically map the third-party funding process and do not take into account the multitude of risks associated with soliciting and implementing projects. This paper focuses on the design of a framework for IT-based support of risk management in the third-party funding process (TRINITY). We model the generic workflow and identify relevant risks, from which we derive requirements for an IT-based risk management system to be created. Based on this, we design a framework that maps the generic process of risk management in the third-party funding area.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129838145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kenji Matsuura, Hiroki Tanioka, Naka Gotoda, T. Wada
{"title":"Self-studying environment with imagery rehearsal for a ball-carrier in basketball","authors":"Kenji Matsuura, Hiroki Tanioka, Naka Gotoda, T. Wada","doi":"10.1109/imcom53663.2022.9721766","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721766","url":null,"abstract":"This study focuses on a player who carries a ball in basketball and develops a learning support environment for the player’s selecting action. In this study, the targeting actions for next time are passing, dribbling, and shooting as the basic actions for the selection. In order for learners to select an action according to the situation, we apply the Delaunay diagram, which is defined from a two-dimensional overhead view of the court, to automatically extract possible options of the next actions. The system applies an estimation indicator in respect to shooting possibility to the extracted options. The indicator is estimated based on the positions of the ball carrier, other players, and the goal represented in the game data. This indexed value is called \"My Recommendation\" indicating the degree of potential success. We developed a system to present the extracted action options and the degree of recommendation to a learner. When a 2D-animation is shown in this system, the action options are suggested by colored arrows starting from the ball carrier to the target option. Through the prototype use, learners could learn typical behavior patterns.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128539228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Ensemble Deep Learning Intrusion Detection System for DDoS attacks in Software Defined Networks","authors":"Uakomba Mbasuva, G. Lusilao-Zodi","doi":"10.1109/imcom53663.2022.9721785","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721785","url":null,"abstract":"Software Defined Networks (SDN) is gaining popularity in academia and the industry. This is due to SDNs ease of programmability, flexibility and centralized management. These networking features allow network administrators and programmers to easily monitor and control the entire network, at a limited cost. However, because of its centralized architecture, the controller becomes a single point of failure. This vulnerability makes it a target to cyber-attacks, but more specifically to Distributed Denial of Service (DDoS) attacks. The DDoS attack may target the SDN network controller in order to disrupt the entire network, causing network resources unavailable to legitimate users. Hence, in this work, we propose an ensemble Deep Learning (DL) Intrusion Detection System (IDS) to detect DDoS attack traffic in SDNs. Our proposed approach build an ensemble of Convolutional Neural Network (CNN), Deep Neural Network (DNN) and Recurrent Neural Network (RNN) model. To train the model, we use feature selection techniques from the literature and utilized the Canadian Institute for Cybersecurity Intrusion Detection System (CIC-IDS2017) as the evaluation dataset. The performance of the proposed model is compared with existing models, and from the results, it is observed that our proposed ensemble deep learning model performs better than ensemble CNN, ensemble RNN and ensemble voting.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130410695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Preliminary Study of Cashless Payment Face Recognition System Development in Malaysia","authors":"S. Ismail, S. Ismail","doi":"10.1109/imcom53663.2022.9721723","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721723","url":null,"abstract":"This research purposes are to develop a cashless payment using face recognition system and to evaluate the proposed system in term of efficiency. Currently, payment frameworks have been changing into paperless can cashless society. Cashless transaction payment is widely adopting in many countries including Malaysia. However, the method of using face recognition system is not yet be implement in Malaysia. This research focuses on cashless payment method by using face recognition approach that proposed to be implemented the LBPH algorithm where it has been widely used previously in a similar study. Besides, this research is going to follow the Prototype model for software development life cycle in creation of dashboard. Some limitations have been stated in conclusion. This preliminary study helped on the development of prototype for the next phase, and the evaluation of system.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A More Effective Book Search System Utilizing Colors Reflecting Reader Impressions","authors":"Shota Nakamura, T. Kajiyama","doi":"10.1109/imcom53663.2022.9721633","DOIUrl":"https://doi.org/10.1109/imcom53663.2022.9721633","url":null,"abstract":"A search system is presented that supports hook search by users with ambiguous information needs. Readers' impressions and feelings about a book are extracted from reviews of the book, colors are extracted using relationships between feelings and colors, and the extracted colors are applied to the spine and cover images. The system is designed for multi-faceted search, and the retrieved results are displayed on a virtual bookshelf. It was evaluated using a database of 500 books. The books were categorized, the colors of their spines were decided on the basis of the extracted colors, units of 100 books in database registration order as the search facets. Testing with 12 participants revealed that the system facilitates searching for and finding books on the basis of ambiguous information needs quickly and accurately and thereby provide users with higher search satisfaction.","PeriodicalId":367038,"journal":{"name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133471542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}