2019 International Conference on Advanced Information Technologies (ICAIT)最新文献

筛选
英文 中文
Simulation of Multiple Light Scattering in Intraocular lens with glistenings by T-Matrix 含闪烁的人工晶状体内多次光散射的t矩阵模拟
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920838
Kay Thwe Min Han, Kotani Kazunori, Prarinya Siritanawan, W. Kongprawechnon, C. Sinthanayothin
{"title":"Simulation of Multiple Light Scattering in Intraocular lens with glistenings by T-Matrix","authors":"Kay Thwe Min Han, Kotani Kazunori, Prarinya Siritanawan, W. Kongprawechnon, C. Sinthanayothin","doi":"10.1109/AITC.2019.8920838","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920838","url":null,"abstract":"Glistening is fluid-filled micro vacuoles in intraocular lens (IOL) that cause light scattering and may affect the quality of vision. A cataractous natural lens is replaced with intraocular lens in which light scattering occurs due to temperature changes in human body overtime. The light scatter contribution induced by microvacuoles was calculated and simulated by using T-Matrix (transition matrix) theory. This paper aims to simulate total electric field scattering by spherical glistenings. The simulation can visualize how glistening particles are in IOL depending upon the different grade of glistenings. Moreover, this is the first attempt to apply multiple light scattering by T-Matrix method in glistenings of IOL.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evolution of Games Towards The Discovery of Noble Uncertainty 从游戏进化到发现不确定性
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921061
Wu Yicong, H. Aung, M. Khalid, H. Iida
{"title":"Evolution of Games Towards The Discovery of Noble Uncertainty","authors":"Wu Yicong, H. Aung, M. Khalid, H. Iida","doi":"10.1109/AITC.2019.8921061","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921061","url":null,"abstract":"This paper presents two directions of game evolution using the multiplayer incomplete information game – Mahjong and two-person complete information game – Chess. The directions of these games show the transitions from higher uncertainty to lower uncertainty and vice versa, whereas the game refinement measure (GR) had been employed for the assessment. It indicates that people have been searching for a harmonic balance between deterministic and stochastic aspects when playing games, which in this study, called the noble uncertainty. Currently, this study conjectured that noble uncertainty can be found at GR ∈ [0.07, 0.08] where evolutionary changes of both Mahjong and Chess have converged to it.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131262253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards a fairness solution of Scrabble with Komi system 基于Komi系统的拼字游戏公平性解决方案
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921355
H. Aung, M. Khalid, H. Iida
{"title":"Towards a fairness solution of Scrabble with Komi system","authors":"H. Aung, M. Khalid, H. Iida","doi":"10.1109/AITC.2019.8921355","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921355","url":null,"abstract":"Artificial intelligence (AI) has a long-standing and healthy relationship with games where it becomes a popular application area for AI-driven research such as game playing, game design and so on. With the recent advancement of AI game-playing programs that had exceeded human capabilities, fairness becomes an important issue to be addressed in order to ensure the attractiveness of a game can be retained to the future players. Such an issue may also be compounded when considering the context of turn-based games, where the first player may have a huge advantage over the subsequent player(s) (called the advantage of initiative). As such, this paper proposes an innovative way to make a game attractive while maintaining fairness by adopting the Komi (compensation system). This fairness solution is validated by applying the system onto a word anagram game, Scrabble, where fairness can be maintained based on the skill level of the players.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133108654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flow Path Computing in Software Defined Networking 软件定义网络中的流路径计算
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921370
Ohmmar Min Mon, M. Mon
{"title":"Flow Path Computing in Software Defined Networking","authors":"Ohmmar Min Mon, M. Mon","doi":"10.1109/AITC.2019.8921370","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921370","url":null,"abstract":"With the rapid growth of current network, the demand of resources is growing significantly. Insufficient bandwidth results unstable throughput in a network. Software-defined network (SDN) has been proposed to provide optimal routing decision in the presence of congestion. Equal Cost Multi-path (ECMP) routing cannot guarantee optimal resource utilization. ECMP causes the long flow collision in network because it does not consider the network parameter such as bandwidth. In this paper, the Flow Path Computing Algorithm (FPCA) is proposed to minimize the network congestion by rerouting the flows in SDN. This algorithm mainly focuses on rerouting the traffic flows over the alternative path when the network congestion is detected. If the flow demand is exceeded 10% of link bandwidth, the algorithm computes the light loaded path based on the port statistics and it shifts from the congested path to light loaded path. Simulation results are presented to show the effectiveness of the FPCA algorithm over ECMP.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applying Deep Learning Approach to Targeted Aspect-based Sentiment Analysis for Restaurant Domain 将深度学习方法应用于餐馆领域的基于方面的情感分析
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920880
Win Lei Kay Khine, Nyein Thwet Thwet Aung
{"title":"Applying Deep Learning Approach to Targeted Aspect-based Sentiment Analysis for Restaurant Domain","authors":"Win Lei Kay Khine, Nyein Thwet Thwet Aung","doi":"10.1109/AITC.2019.8920880","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920880","url":null,"abstract":"Sentiment analysis is a well-studied topic in social media analysis and it becomes an important decision-making tool to classify the opinion of user on the Web. In a few years ago, there are so many research works for sentiment analysis using machine learning. Nowadays, deep learning models are implemented in AI applications to gain better performance. This paper proposes to extend the traditional LSTM approach by adding the external knowledge. LSTM is a kind of recurrent neural network (RNN) and it can learn the past and future information. Unlike traditional RNN, it can capture the long sequence of text. With the LSTM cell, SenticNet is used as an external knowledge, to improve the accuracy in classification. We termed SenticNet multi-attentive LSTM (MA-LSTM). The results from the SenticNet MA-LSTM are classified as positive, negative or neutral and finally, compare the results with other state-of-the-art LSTM methods: standard LSTM, TD-LSTM, TC-LSTM, AE-LSTM, and ATAE-LSTM. To our knowledge, this is the first work for using multi-attention LSTM with external knowledge in targeted aspect-based sentiment analysis task.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Child Face Recognition with Deep Learning 儿童面部识别与深度学习
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921152
Shun Lei Myat Oo, Aung Nway Oo
{"title":"Child Face Recognition with Deep Learning","authors":"Shun Lei Myat Oo, Aung Nway Oo","doi":"10.1109/AITC.2019.8921152","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921152","url":null,"abstract":"Face recognition is a kind of identifying people in image. Face recognition technology play a role for children life. It is used for finding the missing children, school safety and school social network activities. Generally, older ages can recognize easily from each other but children are very hard to recognize. Convolutional Neural Networks (CNNs) is a top performer on face recognition. In this paper, the accuracy and performance of three Convolutional Neural Networks (CNNs) such as VGG Face based on two architectures (VGG16 and ResNet50), and MobileFaceNet on child face dataset is tested. The experiments results are shown and evaluated. According to experiments results, MobileFaceNet on child face dataset provide better accuracy than others. Among three proposed methods, the best recognition accuracy is 99.75% from MobileFaceNet.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124831659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Network Traffic Anomaly Detection based on Apache Spark 基于Apache Spark的网络流量异常检测
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920897
P. H. Pwint, T. Shwe
{"title":"Network Traffic Anomaly Detection based on Apache Spark","authors":"P. H. Pwint, T. Shwe","doi":"10.1109/AITC.2019.8920897","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920897","url":null,"abstract":"With the growing amount of internet and IoT traffic across the network, network anomaly detection system has become a popular and useful strategy to detect anomalies, attacks and intrusions. With machine learning technique, network traffic anomalies can be detected with reasonable prediction accuracy. However, most of the previous work has been focused on detecting anomalies using traditional machine learning environment. Because of ever increasing amount of data and high speed networks, traditional machine learning environment becomes infeasible to cope with the current condition. In this paper, we investigate the feasibility of the applying one of the big data technologies, Apache Spark, to classify different attacks rather than detecting anomalies. We employ traditional machine learning algorithms, namely, Multinomial Logistic Regression, Decision Tree, Random Forest, Multi-layer perceptron and Naïve Bayes using generated dataset of MAWILab gold standard and classify 15 different attack types. In addition, we investigate the efficiency of Apache Spark in terms of accuracy and speed under varied configuration setting of Spark. Our results demonstrate that employing big data technologies adds more benefits to network traffic anomaly detector than traditional machine learning environment in terms of prediction accuracy and execution time.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Inferring User Preferences Using Reviews for Rating Prediction 使用评论推断用户偏好进行评级预测
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921179
Nyein Ei Ei Kyaw, T. T. Wai
{"title":"Inferring User Preferences Using Reviews for Rating Prediction","authors":"Nyein Ei Ei Kyaw, T. T. Wai","doi":"10.1109/AITC.2019.8921179","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921179","url":null,"abstract":"Nowadays, E-commerce websites have been developed and are very popular among online users. Users deal with the problems to choose the right items that meet with their needs. Recommender systems try to suggest the right items to the user by applying different recommendation approaches. Collaborative Filtering recommendation (CF) approach makes recommendations to users using the user-item matrix which has the ratings on each item given by users. Data sparsity problems may occur when a user-item matrix is built based on the ratings of users (one to five stars). User reviews on the products contain more information and opinions than user ratings. This paper proposes the rating prediction approach that infers the user preferences from textual reviews of hotels by performing sentiment analysis. The preference scores obtained from the sentiment analysis are integrated into the rating prediction process which applies two approaches named memory-based CF and model-based CF. The performance of the proposed system is tested on the Myanmar hotel reviews which are crawled from TripAdvisor site and hotel reviews which are downloaded from the Kaggle site. The resulted rating prediction accuracy of two approaches on two data sets is compared by using Root Mean Square Error (RMSE).","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Electricity Billing System using Ethereum and Firebase 使用以太坊和Firebase的电费计费系统
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8920931
Kyawt May Hlaing, Dim En Nyaung
{"title":"Electricity Billing System using Ethereum and Firebase","authors":"Kyawt May Hlaing, Dim En Nyaung","doi":"10.1109/AITC.2019.8920931","DOIUrl":"https://doi.org/10.1109/AITC.2019.8920931","url":null,"abstract":"Ethereum, a blockchain-based distributed computing platform, provides smart contract functionality. It also provides Ethereum virtual machine (EVM) that can execute peer-to-peer contracts across decentralized network. However, the gas consumption of smart contract is so costly that it becomes one of the important problems to be solved. The purpose of this paper is to provide a conceptual overview of blockchain based electricity billing system with the aim of lessening gas consumption of the smart contract. In this system, Firebase is employed as a data storage while Ethereum blockchain acts as both a cryptocurrency payment system and an authentication channel. Moreover, this paper illustrates two-factor authentication by utilizing Ethereum account and Firebase Authentication as an authentication channel. Results show that by utilizing Firebase with blockchain, the transaction cost of each transaction made on Ethereum is decreased by approximately 73%.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125263969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coordinate Checkpoint Mechanism on Real-Time Messaging System in Kafka Pipeline Architecture Kafka管道架构中实时消息系统的坐标检查点机制
2019 International Conference on Advanced Information Technologies (ICAIT) Pub Date : 2019-11-01 DOI: 10.1109/AITC.2019.8921392
Thandar Aung, Hla Yin Min, A. Maw
{"title":"Coordinate Checkpoint Mechanism on Real-Time Messaging System in Kafka Pipeline Architecture","authors":"Thandar Aung, Hla Yin Min, A. Maw","doi":"10.1109/AITC.2019.8921392","DOIUrl":"https://doi.org/10.1109/AITC.2019.8921392","url":null,"abstract":"The real-time messaging system is the critical thing in computing based on time-critical decision making in many organizations. In the real-time messaging system, fault tolerance is the key challenge of developing reliability requirements. Apache Kafka is a popular framework for consuming data stream into the processing platforms. However, there are many challenges in the replication process because of a server failure in Apache Kafka. To develop fault tolerance in Apache Kafka, this paper focuses on defining a fixed checkpoint interval to reduce the recovery time and lost messages in server failure. Then, we measure the cost of checkpointing, cost of rollback and total time cost of overheads due to the fixed checkpointing intervals. The system shows the drawback of real-time processing depend on the number of lost messages on various partitions and server failure processes. The experimental results emphasize the checkpoint interval method to reduce recovery time and lost messages. Conforming to the experimental results, the performance of the total time cost with checkpoint interval saves time approximately 30% than without checkpoint interval.","PeriodicalId":388642,"journal":{"name":"2019 International Conference on Advanced Information Technologies (ICAIT)","volume":"37 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126100944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信