ebook img

Applied Computing and Information Technology PDF

183 Pages·2020·8.286 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Applied Computing and Information Technology

Studies in Computational Intelligence 847 Roger Lee Editor Applied Computing and Information Technology Studies in Computational Intelligence Volume 847 Series Editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. The books of this series are submitted to indexing to Web of Science, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink. More information about this series at http://www.springer.com/series/7092 Roger Lee Editor Applied Computing and Information Technology 123 Editor RogerLee Software Engineering andInformation Technology Institute Central Michigan University Mount Pleasant,MI, USA ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN978-3-030-25216-8 ISBN978-3-030-25217-5 (eBook) https://doi.org/10.1007/978-3-030-25217-5 ©SpringerNatureSwitzerlandAG2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Foreword The purpose of the 7th International Conference on Applied Computing and Information Technology (ACIT 2019) held on May 29–31 in Honolulu, Hawaii, was to together researchers, scientists, engineers, industry practitioners, and stu- dents to discuss, encourage, and exchange new ideas, research results, and expe- riences on all aspects of Applied Computing and Information Technology, and to discuss the practical challenges encountered along the way and the solutions adoptedtosolve them. Theconferenceorganizers haveselectedthebest 12papers from those papers accepted for presentation at the conference in order to publish theminthisvolume.Thepaperswerechosenbasedonreviewscoressubmittedby members of the program committee and underwent further rigorous rounds of review. In chapter “An Algorithm Integrating and Updating Rights Management Information on Public Domain Images,” Youngmo Kim, Il-Hwan Kim, Deok-Gi Hong, and Seok-Yoon Kim proposed an algorithm that extracts and analyzes the informationneededtoupdatethelatestRightsManagementInformation(RMI)and correct the wrong or duplicate RMI information in various public domain sites. In chapter “Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendation Systems,” Ji-Won Choi, Sang-Kweon Yun, and Jong-Bae Kim proposed a collaborative filtering technique that improves the limits of the collaborative filtering recommendation technique’s data sparsity and scalability through two-stage clustering. In chapter “A Study on the Methods for Establishing Security Information & Event Management,” Geyong-Sik Jeon, Sam-Hyun Chun, and Jong-Bae Kim presented a security log analysis system utilizing security information and event management(SIEM)systemtocopewithanadvancedattackthattheexistingESM canhardlydetect.SIEMwillanalyzeanassociationbetweendataandsecurityevent occurringinmajorITinfrastructurefacilitynetwork,system,appliedservices,anda great deal of information security systems, and then to present the methods for identifying, in advance, potential security threat. v vi Foreword In chapter “Multi-TSV (Through Silicon Via) Error Detection Using the Non- contact Probing Method,” Sang-Min Han, Youngkyu Kim, and Jin-Ho Ahn pro- posed a simple and fast through-silicon via (TSV) fabrication error detection methodfor3-DICapplications.Fromthepost-processingofthemeasureddata,the capabilityoferrordetectionisverifiedforerrorcognition,thesize,andthenumber of errors. In chapter “Real-Time Ultra-Wide Viewing Player for Spatial and Temporal RandomAccess,”GicheolKimandHaechulChoiintroducedaspatialandtemporal random-access method that uses NVIDIA’s NvCodec library. Furthermore, they proposed a transrating method to lower the bit rate of the region of non-interest. Using the proposed methods, customized service can be implemented. In chapter “A Study on the Faith Score of Telephone Voices Using Machine Learning,”HyungwooParkpresentedastudytoevaluatewhetheratelephonevoice is human or a machine. In this study, they proposed a judge to judge whether a voice is real by using a support vector machine. They proposed a personal tele- phone truth discriminator. Inchapter“AComparativeStudyofUsingBag-of-WordsandWord-Embedding Attributes in the Spoiler Classification of English and Thai Text,” Rangsipan Marukatat compared the effectiveness of using traditional bag-of-words and word-embeddingattributes toclassifymoviecommentsintospoilerornon-spoiler. Both approaches were applied to comments in English, an inflectional language, and in Thai, a non-inflectional language. Inchapter“FallDetectionofElderlyPersonsbyActionRecognitionUsingData Augmentation and State Transition Diagram,” Ayaka Takebayashi, Yuji Iwahori, Shinji Fukui, James J. Little, Lin Meng, Aili Wang, and Boonserm Kijsirikul proposed a method to acquire posture information of a person from a camera watchingoverelderlypeopleandtorecognizethebehaviorofthepersonusinglong short-term memory. The proposed method detects falls of elderly people auto- matically using the result of action recognition. In chapter “Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data,” Christofer Derian Budianto, Arya Wicaksana, and Seng Hansun proposed a method of using elliptic curve cryptography (ECC) to secure the Indonesia identity card data. Least significant bit steganography is used after the ECC to embed the information (ciphertext) into the person picture. Thus, the only stored information in the application is a collection of photos. In chapter “Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition System,” Kevin Alexander, Arya Wicaksana, and Ni Made Satvika Iswari proposed a method for using a labeling algorithm and a fully connected neural network that are used to create an ANPR system for vehicle parking management in Universitas Multimedia Nusantara, Indonesia.ThesystemwasbuiltusingJavaandtheAndroidSDKfortheclientand PHP for the server. In chapter “Implementation of Creation and Distribution Processes of DACS Rules for the Cloud Type Virtual Policy Based Network Management Scheme for theSpecificDomain,”KazuyaOdagiri,ShogoShimizu,andNaohiroIshiiproposed Foreword vii amethodtosolvetheproblemofanonymityofthenetworkcommunicationsuchas personal information leaks and crimes using the Internet system. To solve this problem,theyappliedaDestinationAddressingControlSystem(DACS)schemeto Internet system management. In chapter “Transforming YAWL Workflows into Petri Nets,” Wanwisa Paakbua and Wiwat Vatanawood proposed an alternative to transform a YAWL workflow into a corresponding Petri nets model. A set of mapping rules would be proposed to cope with the non-well-formed model of YAWL. The resulting Petri nets model of the YAWL workflows is correct and ready for model checking. It is our sincere hope that this volume will provide stimulation and inspiration and that it will be used as a foundation for works to come. May 2019 Takaaki Goto Toyo University Kawagoe, Japan Contents An Algorithm Integrating and Updating Rights Management Information on Public Domain Images. . . . . . . . . . . . . . . . . . . . . . . . . . 1 Youngmo Kim, Il-Hwan Kim, Deok-Gi Hong and Seok-Yoon Kim Improvement of Data Sparsity and Scalability Problems in Collaborative Filtering Based Recommendation Systems . . . . . . . . . . 17 Ji-Won Choi, Sang-Kweon Yun and Jong-Bae Kim A Study on the Methods for Establishing Security Information & Event Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Geyong-Sik Jeon, Sam-Hyun Chun and Jong-Bae Kim Multi-TSV (Through Silicon Via) Error Detection Using the Non-contact Probing Method . . . . . . . . . . . . . . . . . . . . . . . . . 47 Sang-Min Han, Youngkyu Kim and Jin-Ho Ahn Real-Time Ultra-Wide Viewing Player for Spatial and Temporal Random Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Gicheol Kim and Haechul Choi A Study on the Faith Score of Telephone Voices Using Machine Learning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Hyungwoo Park A Comparative Study of Using Bag-of-Words and Word-Embedding Attributes in the Spoiler Classification of English and Thai Text. . . . . . 81 Rangsipan Marukatat Fall Detection of Elderly Persons by Action Recognition Using Data Augmentation and State Transition Diagram. . . . . . . . . . . . . . . . . . . . . 95 AyakaTakebayashi,YujiIwahori,ShinjiFukui,JamesJ.Little,LinMeng, Aili Wang and Boonserm Kijsirikul ix x Contents Elliptic Curve Cryptography and LSB Steganography for Securing Identity Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Christofer Derian Budianto, Arya Wicaksana and Seng Hansun Labeling Algorithm and Fully Connected Neural Network for Automated Number Plate Recognition System . . . . . . . . . . . . . . . . . 129 Kevin Alexander, Arya Wicaksana and Ni Made Satvika Iswari Implementation of Creation and Distribution Processes of DACS Rules for the Cloud Type Virtual Policy Based Network Management Scheme for the Specific Domain . . . . . . . . . . . . . . . . . . . . 147 Kazuya Odagiri, Shogo Shimizu and Naohiro Ishii Transforming YAWL Workflows into Petri Nets. . . . . . . . . . . . . . . . . . 165 Wanwisa Paakbua and Wiwat Vatanawood Author Index.. .... .... .... ..... .... .... .... .... .... ..... .... 179

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.