{"title":"Detection of Behavioral Facilitation information in Disaster Situation","authors":"Yoshiki Yoneda, Yumiko Suzuki, Akiyo Nadamoto","doi":"10.1145/3366030.3366129","DOIUrl":"https://doi.org/10.1145/3366030.3366129","url":null,"abstract":"Disasters of many types have occurred in recent years, such as strong earthquakes, heavy rain, and typhoons. In such disaster situations, people often use social network services (SNS) and exchange information of all types to help each other. Especially, people exchange information using Twitter during disasters. Such tweet messages include much information that promotes people's behaviors. We designate such tweets as behavioral facilitation tweets. When psychologically unstable in the aftermath of a disaster, behavioral facilitation tweets can strongly affect people, irrespective of a message's authenticity. We regard the extraction of the behavioral facilitation tweets automatically as important. In this paper, we propose a method that extracts behavioral facilitation tweets in disaster situations. Specifically, we propose and compare three methods to extract behavioral facilitation tweets in disaster situations: rule-based, support vector machine (SVM) and long short-term memory (LSTM). Furthermore, we conducted experiments to assess the benefits of our proposed method.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129217902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Film Genre Prediction Based on Film Content and Screenplay Structure","authors":"Yusuke Nakano, Hiroaki Ohshima, Yusuke Yamamoto","doi":"10.1145/3366030.3366100","DOIUrl":"https://doi.org/10.1145/3366030.3366100","url":null,"abstract":"In this study, we propose a method to classify genre-based films using film screenplays. The proposed method vectorizes films into two aspects, i.e., film content (i.e., what films tell viewers) and screenplay structure (i.e., how the films narrate stories), and classifies film genres using the support vector machine method. We applied the Doc2Vec algorithm to screenplay structure and to handle film content. In film production, for vectorizing films, we used the statistics of the four screenplay elements: scene, action, dialogue, and transition. Compared with baseline methods, the evaluation showed that the proposed method is better for classifying films of specific genres.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129265565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling Social Information Exchange via Dynamically Robust Annotations","authors":"Vishwajeet Pattanaik, Shweta Suran, D. Draheim","doi":"10.1145/3366030.3366060","DOIUrl":"https://doi.org/10.1145/3366030.3366060","url":null,"abstract":"With the emergence of new web paradigms, we currently see a tremendous increase in interest in different applications of the social web. However, this rising interest in social platforms has also led to the rise of numerous new challenges, especially issues like fake-news, filter-bubble, and web-page-decay. Motivated by these issues, we propose a novel DOM-oriented edit distance anchoring approach that enables stable tracking of ephemeral web content. We argue that such a stable anchoring approach could indeed foster the creation of a browser-based crowdsourcing information system that could help us tackle rising issues on the web. Building on this hypothesis, we present a new web annotation tool called Tippanee, that is designed around the proposed anchoring approach; and provides its users with a collaborative environment where web users could help in improving the quality of textual content on the web by annotating, archiving, linking, sharing and semantically describing content on-the-fly.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bea Therese Santos, Jacob Tolentino, Danielle Nicole Aquino, Riel Malibiran, Christine Diane Lim-Ramos, C. Cheng, C. Ngo
{"title":"A Museum Information System for Sustaining and Analyzing National Cultural Expressions","authors":"Bea Therese Santos, Jacob Tolentino, Danielle Nicole Aquino, Riel Malibiran, Christine Diane Lim-Ramos, C. Cheng, C. Ngo","doi":"10.1145/3366030.3366132","DOIUrl":"https://doi.org/10.1145/3366030.3366132","url":null,"abstract":"Culture is an integral part of the social and economic development of a nation. In the Philippines, the National Commission for Culture and the Arts (NCCA) is the overall policy-making body for culture and arts development. NCCA has been experiencing difficulty in collecting and organizing large cultural data sets, which are vital in their decisions concerning culture and arts reforms. We propose a sustainable data collection and analysis method for NCCA, using the museum cultural domain as case study. With the museum-centric information system, valuable information across the museum cultural domain can be obtained, and later translated to information visualization with resulting correlation statistics and reports, showing variables that give context to the performance of a museum, museums in an area, and museums in the country. The museum information system may serve as the information system framework for other cultural domains.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124312964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structural Transition Analysis of Dynamic Network Based on Roles of Adding Edges","authors":"Kazufumi Inafuku, Takayasu Fushimi, T. Satoh","doi":"10.1145/3366030.3366084","DOIUrl":"https://doi.org/10.1145/3366030.3366084","url":null,"abstract":"Many of the actual complex networks are dynamic networks that constantly change their structure by adding edges (and nodes). We hypothesized that the addition of edges (changes in the network) has two roles: \"densification of at the center of network\" and \"expansion of at the periphery of network.\" We proposed a method to analyze the role of the edge based on the location of adding edge and the amount of change of the network feature. We applied the proposed method to artificially changed generated networks and actual data, and compared the roles of edges. As a result, we clarified that the two roles are shown in the hypothesis also exist in the actual data.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121255972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jifang Xing, Ruixi Zhang, Remmy A. M. Zen, D. M. S. Arsa, Ismail Khalil, S. Bressan
{"title":"Building Extraction from Google Earth Images","authors":"Jifang Xing, Ruixi Zhang, Remmy A. M. Zen, D. M. S. Arsa, Ismail Khalil, S. Bressan","doi":"10.1145/3366030.3368456","DOIUrl":"https://doi.org/10.1145/3366030.3368456","url":null,"abstract":"Building extraction is a component of many environmental modelling and data analysis applications. It is however data and knowledge intensive. We investigate the use of publicly available data from Google Earth and OpenStreetMap and of neural networks for this task. We evaluate different candidate algorithms for the case of building extraction on the island of Bali.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123133233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing Ranges for Temporal Parameters of Composed Web Services","authors":"M. Franceschetti, Johann Eder","doi":"10.1145/3366030.3366068","DOIUrl":"https://doi.org/10.1145/3366030.3366068","url":null,"abstract":"Temporal Service Level Agreements (SLAs) are a distinguishing characteristics for offered (composed) services: the weaker the restrictions, the broader the ranges of input parameters, the wider the applicability of an offered service. We propose a technique for the providers of composed services with temporal parameters to compute the broadest ranges for the temporal input parameters such that all service invocations where the parameters are within these ranges are dynamically controllable, i.e. that the adherence to temporal constraints can be guaranteed.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114606333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings","authors":"Daisuke Aritomo, Chiemi Watanabe, Masaki Matsubara, Atsuyuki Morishima","doi":"10.1145/3366030.3366081","DOIUrl":"https://doi.org/10.1145/3366030.3366081","url":null,"abstract":"Recent evolution in cloud computing platforms have attracted the largest amount of data than ever before. Today, even the most sensitive data are being outsourced, thus, protection is essential to ensure that privacy is not traded for the convenience provided by cloud platforms. Traditional symmetric encryption schemes provide good protection; however, they ruin the merits of cloud computing. Attempts have been made to obtain a scheme where both functionality and protection can be achieved. However, features provided in existing searchable encryption schemes tend to be left behind the latest findings in the information retrieval (IR) area. In this study, we propose a privacy-preserving similar document search system based on Simhash. Our scheme is open to the latest machine-learning based IR schemes, and performance has been tuned utilizing a VP-tree based index, which is optimized for security. Analysis and various tests on real-world datasets demonstrate the scheme's security and efficiency on real-world datasets.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"381 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Zia, S. A. Maskari, Dinesh Kumar Saini, Arshad Muhammad, U. Farooq
{"title":"A Simulation Model Demonstrating the Impact of Social Aspects on Social Internet of Things","authors":"K. Zia, S. A. Maskari, Dinesh Kumar Saini, Arshad Muhammad, U. Farooq","doi":"10.1145/3366030.3366076","DOIUrl":"https://doi.org/10.1145/3366030.3366076","url":null,"abstract":"In addition to seamless connectivity and smartness, the objects in the Internet of Things (IoT) are expected to have the social capabilities - these objects are termed as \"social objects\". In this paper, an intuitive paradigm of social interactions between these objects are argued and modeled. The impact of social behavior on the interaction pattern of social objects is studied taking Peer-to-Peer (P2P) resource sharing as an example application. The model proposed in this paper studies the implications of competitive vs. cooperative social paradigm, while peers attempt to attain the shared resources / services. The simulation results divulge that the social capabilities of the peers impart a significant increase in the quality of interactions between social objects. Through an agent-based simulation study, it is proved that cooperative strategy is more efficient than competitive strategy. Moreover, cooperation with an underpinning on real-life networking structure and mobility does not negatively impact the efficiency of the system at all; rather it helps.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117170687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Used Car Trading System based on Blockchain Technology","authors":"Cho Cho Htet, May Htet","doi":"10.1145/3366030.3366112","DOIUrl":"https://doi.org/10.1145/3366030.3366112","url":null,"abstract":"Although Myanmar's car import policy led shocks in the automotive market due to the Policy changes to import left-hand drive (new car), many consumers in Myanmar still more desire using second-hand cars. Car history is essential in the used car market which is a popular business in Myanmar. Online car trading requires a reliable supplier which may grantee the integrity of car grading. This problem can be solved by using a pure decentralized mechanism called blockchain which has become a hot research area to achieve an open and safe environment. In this paper, the system is aimed to develop a blockchain-based car trading system that can speed up the verification of car information and currency transfers. Besides the proposed car trading system is not only reliable but also protects from the 51% attacks even if 51% of car owners, insurance companies and repair services in this cooperation are simultaneously compromised.","PeriodicalId":446280,"journal":{"name":"Proceedings of the 21st International Conference on Information Integration and Web-based Applications & Services","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122930058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}