{"title":"Analyzing user reviews in Thai language toward aspects in mobile applications","authors":"Boonyarit Deewattananon, Usa Sammapun","doi":"10.1109/JCSSE.2017.8025903","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025903","url":null,"abstract":"As more and more Thais own mobile devices, mobile applications are high in demand. Before installing mobile applications, many users read reviews written by other users to determine whether or not the application is worth using. In addition, mobile application developers also rely on user reviews to get insight information on which aspects of the mobile application users like or do not like and why. They can use the information to market the beloved aspects of their software product and improve on the problematic ones. However, when there are many reviews, it is difficult to comprehend information in the user reviews. Several researches in recent years aim to extract opinions and sentiments from various texts or documents such as Twitter, webboards, and software product reviews. Most of these researches are for English documents. For Thai language, researches usually focus on other contexts such as hotel reviews or general opinions on Twitter. In this paper, we present an approach to analyze user reviews written in Thai based on techniques in natural language processing, topic modeling, and sentiment analysis. The approach aims to help Thai users and developers discover dynamically, instead of pre-determined, various aspects and associated sentiments from a vast amount of user reviews. The result of the approach is a list of aspects with associated opinions and sentiments to help users assess mobile applications and provide summarized user feedbacks for developers.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"101 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77424054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ma. Shiela C. Sapul, T. Aung, Rachsuda Jiamthapthaksin
{"title":"Trending topic discovery of Twitter Tweets using clustering and topic modeling algorithms","authors":"Ma. Shiela C. Sapul, T. Aung, Rachsuda Jiamthapthaksin","doi":"10.1109/JCSSE.2017.8025911","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025911","url":null,"abstract":"There is no previous research that compares the results of k-means, CLOPE clustering and Latent Dirichlet Allocation (LDA) topic modeling algorithms for detecting trending topics on tweets. Since not all tweets contain hashtags, we considered three training data feature sets: hashtags, keywords and keywords + hashtags in this study. Our proposed methodology proved that CLOPE can also be used in a non-transactional database like Twitter data set to answer the trending topic discovery and could provide more topic patterns than k-means and LDA. Using additional feature sets has improved the results of k-means and LDA, thus, keywords + hashtags can identify more meaningful topics.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83430847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One time key Issuing for Verification and Detecting Caller ID Spoofing Attacks","authors":"Narongsak Sukma, R. Chokngamwong","doi":"10.1109/JCSSE.2017.8025898","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025898","url":null,"abstract":"Caller ID has been used to tell the recipient who is calling before answering the call. In fact, nowadays using just Caller ID is not enough to proof the real caller since there are several ways to manipulate the caller identity. There are number of solutions to proof the caller e.g. using Time base, SMS base, or hardware. Even using DSA and CA, it can lead to data leak or inconsistent verification processing. The One-time password practices can mitigate the risk of Man-in-the-middle attacks because SSL has vulnerability assessment that can lead to MITM or man in the middle attack. The attacker can intercept SSL verification process between Server and client for sniffing then spoofing. It would be better if we can find a solution that does not rely on CA, Third party and/or external hardware. In this paper, we propose the solution with self-controlled security and one-time key issue to avoid data leak. The one-time key issuance is a good solution for verification and detecting caller ID Spoofing attacker through this methodology since it does not rely on third-party CA and store certification anywhere. This solution provides the best of key management as the one-time secret key is used. Results from our test lab show effectively verification rates and good performance where resource and power consumption are not impacted.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"77 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2017-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81127723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dilok Pumsuwan, S. Rimcharoen, Nutthanon Leelathakul
{"title":"Front-rear crossover: A new crossover technique for solving a trap problem","authors":"Dilok Pumsuwan, S. Rimcharoen, Nutthanon Leelathakul","doi":"10.1109/JCSSE.2017.8025922","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025922","url":null,"abstract":"Crossover methods are important keys to the success of genetic algorithms. However, traditional crossover methods fail to solve a trap problem, which is a difficult benchmark problem designed to deceive genetic algorithms to favor all-zero bits, while the actual solution is all-one bits. The Bayesian optimization algorithm (BOA) is the most famous algorithm that can solve the trap problem; however, it incurs a large computational cost. This paper, therefore, proposes a novel crossover technique, called a front-rear crossover (FRC), to enhance the simple genetic algorithm. We test the proposed technique with various benchmark problems and compare the results with four other crossover algorithms, including single point crossover (SPC), two point crossover (TPC), uniform crossover (UC) and ring crossover (RC). The FRC outperforms the four techniques in all test problems. It can also solve the trap problem by requiring the 40 times lesser number of fitness evaluations than BOA's.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"5 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79452045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rapid anomaly detection technique for big data curation","authors":"Korn Poonsirivong, C. Jittawiriyanukoon","doi":"10.1109/JCSSE.2017.8025900","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025900","url":null,"abstract":"Anomaly detection (outlier) using simulation helps us analyze the anomaly instances from big data source. As the hasty explosion of today's data stream, outlier detection technique will be an analytical tool to be employed for evaluating massive unstructured datasets. In order to speed-up the processing time to handle enormous datasets, this research will conduct experiments of advanced distant-based outlier detection algorithms to investigate the most effective algorithms using MOA. The algorithms used in this study are Continuous Outlie Detection (COD), Micro-Cluster based COD or MCOD, and STream OutlierR Miner (STORM). The results demonstrate MCOD algorithm can outperform other two algorithms in terms of processing time and accurate anomalies.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"47 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76550378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust video editing detection using Scalable Color and Color Layout Descriptors","authors":"Peerapon Chantharainthron, Sasipa Panthuwadeethorn, Suphakant Phimoltares","doi":"10.1109/JCSSE.2017.8025923","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025923","url":null,"abstract":"Nowadays, recorded videos from surveillance cameras are important evidence for legal investigation in the field of forensic science. Videos may be modified to deviate contents by a person involves in a crime. In this paper, a video editing detection based on Scalable Color Descriptor (SCD) and Color Layout Descriptor (CLD) is proposed. The detection method is composed of two components: (1) generating video identifier and signature and (2) video verification. The experimental results show that applying SCD and CLD to design the detection method outperforms the other descriptors in terms of false acceptance rate and false rejection rate. It is concluded that our method accurately classifies whether or not an incoming video is forged.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"32 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80067315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Speech emotion recognition using derived features from speech segment and kernel principal component analysis","authors":"Matee Charoendee, A. Suchato, P. Punyabukkana","doi":"10.1109/JCSSE.2017.8025936","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025936","url":null,"abstract":"Speech emotion recognition is a challenging problem, with identifying efficient features being of particular concern. This paper has two components. First, it presents an empirical study that evaluated four feature reduction methods, chi-square, gain ratio, RELIEF-F, and kernel principal component analysis (KPCA), on utterance level using a support vector machine (SVM) as a classifier. KPCA had the highest F-score when its F-score was compared with the average F-score of the other methods. Using KPCA is more effective than classifying without using feature reduction methods up to 5.73%. The paper also presents an application of statistical functions to raw features from the segment level to derive global features. The features were then reduced using KPCA and classified with SVM. Subsequently, we conducted a majority vote to determine the emotion for the entire utterance. The results demonstrate that this approach outperformed the baseline approaches, which used features from the utterance level, the utterance level with KPCA, the segment level, the segment level with KPCA, and the segment level with the application of statistical functions without KPCA. This yielded a higher F-score at 13.16%, 7.03%, 5.13%, 4.92% and 11.04%, respectively.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"8 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78032322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arkane Khaminkure, Paramate Horkaew, J. Panyavaraporn
{"title":"Building a brain atlas based on gabor texture features","authors":"Arkane Khaminkure, Paramate Horkaew, J. Panyavaraporn","doi":"10.1109/JCSSE.2017.8025935","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025935","url":null,"abstract":"Brain atlas has become a primary means of computer aided neurological diagnosis. It relies on registering intra/inter-subject brain scans on a common frame of reference, on which statistical variability model is built. This diffeomorphic map of anatomically plausible correspondence could in turn be used for monitoring and identifying progress and manifestation of the disease, respectively. It is accepted that dense image registration is very accurate but computationally expensive. This paper thus presents a feature based image registration by using orientation invariant Gabor responses of texture. The reported results herein demonstrate that it is both anatomically accurate and robust.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"46 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73179708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design computer-assisted learning in an online Augmented Reality environment based on Shneiderman's eight Golden Rules","authors":"Naladtaporn Aottiwerch, Urachart KoKaew","doi":"10.1109/JCSSE.2017.8025926","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025926","url":null,"abstract":"Microbial science is inevitably involved in human daily life because these creatures live around us. They are both useful and punishable. If the people have knowledge about microorganisms, it can control the microbes that cause the wicked things, and it can also be useful to use microorganisms effectively. Currently, the study still use the microscope in the education. There are limitations when exploring various cycles, it will not be able to explore as the time required. As the cycles of nature, it must have time as a variable. Therefore, the microscope helps to see the structure clearer only, but it cannot see all the natural cycles covered by a single microscope. Therefore, this research uses the Augmented Reality technology to be developed as instructional media (A case study of Phylum Basidiomycota, the fungi, which is considered to be the most complex internal structure). This helps to visualize the three-dimensional structure and cycles of nature from electronic devices. But the problem of instructional media created with Augmented Reality technology is that it is inaccessible and difficult to use. The researcher has developed together with online instructional media for easy access, and designed instructional media with the theory of Shneiderman's 8 Golden Rules for ease of use, and measured the performance with real applications by the third-year students of the Faculty of Science, Khon kaen University. It was found that Augmented Reality instructional media in online system was accessible and easy to use. It is also very satisfying for users, with an average score of 4.5 out of 1–5, this means that the criteria is very good.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"45 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82625625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Burmese word segmentation with Character Clustering and CRFs","authors":"M. Phyu, Kiyota Hashimoto","doi":"10.1109/JCSSE.2017.8025934","DOIUrl":"https://doi.org/10.1109/JCSSE.2017.8025934","url":null,"abstract":"Word segmentation is one of the most fundamental processes for most natural language processing tasks. In particular, languages with no word boundary in writing such as Chinese, Japanese, Korean, Thai, and Burmese need it. However, the Burmese language still waits for a technique with good performance. In this paper, we propose a new technique for Burmese word segmentation employing the idea of Character Clustering for Conditional Random Fields. Character clusters are groups of some inseparable characters due to language characteristics. We proposed a set of 29 types of Burmese Character Clusters (BCCs) as rules, and Conditional Random Fields is applied as a sequential labelling machine learning method. We compared our proposed method with CRF without BCC and Syllable-based CRFs. The result shows that our proposed method achieved the highest performance.","PeriodicalId":6460,"journal":{"name":"2017 14th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87374280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}