In the past, there has been a lot of research in the development of digital watermark technology in image authentication. In this paper, we will propose a Deep Convolutional Generative Adversarial Network (DCGAN) architecture extended by the Generative Adversarial Network (GAN) to conduct training and verification evaluation through three subnets. Try to use a deep learning-based architecture for image authentication. Through the training of the model, the features of the authentication image can be more accurately extracted and the tampered local features can be found too.
{"title":"An Image Authentication Method Based on Deep Convolutional Generative Adversarial Network","authors":"Jau-Ji Shen, Chin-Feng Lee, Chin-Ting Yeh, Somya Agrawal","doi":"10.1145/3404709.3404763","DOIUrl":"https://doi.org/10.1145/3404709.3404763","url":null,"abstract":"In the past, there has been a lot of research in the development of digital watermark technology in image authentication. In this paper, we will propose a Deep Convolutional Generative Adversarial Network (DCGAN) architecture extended by the Generative Adversarial Network (GAN) to conduct training and verification evaluation through three subnets. Try to use a deep learning-based architecture for image authentication. Through the training of the model, the features of the authentication image can be more accurately extracted and the tampered local features can be found too.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123285417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Integrating the advantages of c-learning and e-learning, blended learning (B-Learning) optimizes the teaching process and achieves teaching objectives through mutual complementation and promotion between c-learning and e-learning. Although the concept of B-Learning is one of the research focuses in the educational community, there are few cases applying the concept of blended learning with flipped classroom in higher education teaching. In this paper, the teaching environment for B-Learning in universities is constructed based on the existing research results firstly; secondly, the process of knowledge internalization of B-Learning is analyzed for classroom teaching and network environment teaching under the condition of information, respectively; finally, according to the advantages of B-Learning, the effect evaluation for B-Learning is designed from the evaluation subject, evaluation means and evaluation content.
{"title":"Research on Teaching Mode of Blended Learning Under The Condition of Information","authors":"Kai Wang, Xin Xing, Caihua Yin","doi":"10.1145/3404709.3404752","DOIUrl":"https://doi.org/10.1145/3404709.3404752","url":null,"abstract":"Integrating the advantages of c-learning and e-learning, blended learning (B-Learning) optimizes the teaching process and achieves teaching objectives through mutual complementation and promotion between c-learning and e-learning. Although the concept of B-Learning is one of the research focuses in the educational community, there are few cases applying the concept of blended learning with flipped classroom in higher education teaching. In this paper, the teaching environment for B-Learning in universities is constructed based on the existing research results firstly; secondly, the process of knowledge internalization of B-Learning is analyzed for classroom teaching and network environment teaching under the condition of information, respectively; finally, according to the advantages of B-Learning, the effect evaluation for B-Learning is designed from the evaluation subject, evaluation means and evaluation content.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"512 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127645746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research aims to design a wireframe according to the usability test and the ISO 9241-151 standard. The procedure starts with collecting data from 400 website users with questions under the ISO 9241-151 standard and collecting data from interviews with Design Thinking technique from 20 web designers with evaluation interviews based on the System Usability Scale from 3 websites chosen as the sample space for data collection; namely sanook.com, kapook.com and dex-d.com. After analyzing the data from the sample group, a wireframe and site map is then built. Then, 5 experts will test the wireframe design based on the hypothesis created by the research. The results show that analysis of sample sites usage has a significant statistical relationship with wireframe design at level 0.05. With the System Usability Scale, wireframes and site maps have been designed to be assessed by 5 design specialists. Results appear that Header and Content design have been rated as Good by 3 specialists and Satisfactory by 2. Navigation and Information search was rated as Very Good by 2 and Good by 3. The content display has been rated as Very Good by 2 and Good by 3. Other topics have been rated as Very Good by 3 and Good by 2. Compiling those results conclude that this wireframe design is efficiently operational under the ISO 9241-151 standard, allowing design enthusiasts to collect information from this research to guide their future site designs. In the future, there should be some additional of other types of website design to cover more of the website designers' needs.
{"title":"The Development of the Wireframes Design for Usability under the ISO 9241-151 Standard","authors":"Pattama Charoenporn","doi":"10.1145/3404709.3404758","DOIUrl":"https://doi.org/10.1145/3404709.3404758","url":null,"abstract":"This research aims to design a wireframe according to the usability test and the ISO 9241-151 standard. The procedure starts with collecting data from 400 website users with questions under the ISO 9241-151 standard and collecting data from interviews with Design Thinking technique from 20 web designers with evaluation interviews based on the System Usability Scale from 3 websites chosen as the sample space for data collection; namely sanook.com, kapook.com and dex-d.com. After analyzing the data from the sample group, a wireframe and site map is then built. Then, 5 experts will test the wireframe design based on the hypothesis created by the research. The results show that analysis of sample sites usage has a significant statistical relationship with wireframe design at level 0.05. With the System Usability Scale, wireframes and site maps have been designed to be assessed by 5 design specialists. Results appear that Header and Content design have been rated as Good by 3 specialists and Satisfactory by 2. Navigation and Information search was rated as Very Good by 2 and Good by 3. The content display has been rated as Very Good by 2 and Good by 3. Other topics have been rated as Very Good by 3 and Good by 2. Compiling those results conclude that this wireframe design is efficiently operational under the ISO 9241-151 standard, allowing design enthusiasts to collect information from this research to guide their future site designs. In the future, there should be some additional of other types of website design to cover more of the website designers' needs.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Detecting cyber army in manipulating public opinions has been a new issue with the popularity of social media. This paper will take the first social media cyber army case in Taiwan to analyze embedding operation systems. By analyzing suspended accounts' activity by the PTT official relating this case, this group's accounts activity type and how cyber army operates will be presented. The illustrated results would be the foundation on profiling this new type cyber army to benefit future studies in more efficiency.
{"title":"Profiling Operations of Cyber Army in Manipulating Public Opinions","authors":"Chang-Po Chiang, Hung-Yuan Chen, Tyan-muh Tsai, Shih-Hao Chang, Ying-Chin Chen, Shiuh-Jeng Wang","doi":"10.1145/3404709.3404766","DOIUrl":"https://doi.org/10.1145/3404709.3404766","url":null,"abstract":"Detecting cyber army in manipulating public opinions has been a new issue with the popularity of social media. This paper will take the first social media cyber army case in Taiwan to analyze embedding operation systems. By analyzing suspended accounts' activity by the PTT official relating this case, this group's accounts activity type and how cyber army operates will be presented. The illustrated results would be the foundation on profiling this new type cyber army to benefit future studies in more efficiency.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125087486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In addition to the brand and sales channels that can be found everywhere in the shoe industry, the foundry manufacturing industry is also an important part of the industrial chain. The traditional shoe industry has high manpower requirements but a low ratio of information personnel and high-tech equipment. Many testing procedures can only be performed manually. The complexity of footwear products is high, and the entire inspection process depends on a large amount of manpower. Therefore, problems such as consuming too much manpower, lack of efficiency, difficulty in precise inspection, quality requirements that vary from person to person, and incomplete quality management are extended. Through traditional machine learning methods, most of them are supervised learning methods. Under this method, a large number of negative samples should be always collected. It is very difficult to collect these negative samples in actual industrial production. Therefore, this article proposes a defect detection model based on unsupervised learning. As long as there are enough positive samples to be trained, we use the BEGAN model to modify it and combine another Autoencoder. This model is much easier and faster to be trained than the traditional GAN model, better responding to the footwear industry with more product types.
{"title":"Unsupervised Defect Detection based on Boundary Equilibrium Generative Adversarial Network","authors":"Jau-Ji Shen, Chin-Feng Lee, Yu-Chuan Chen, Somya Agrawal","doi":"10.1145/3404709.3404765","DOIUrl":"https://doi.org/10.1145/3404709.3404765","url":null,"abstract":"In addition to the brand and sales channels that can be found everywhere in the shoe industry, the foundry manufacturing industry is also an important part of the industrial chain. The traditional shoe industry has high manpower requirements but a low ratio of information personnel and high-tech equipment. Many testing procedures can only be performed manually. The complexity of footwear products is high, and the entire inspection process depends on a large amount of manpower. Therefore, problems such as consuming too much manpower, lack of efficiency, difficulty in precise inspection, quality requirements that vary from person to person, and incomplete quality management are extended. Through traditional machine learning methods, most of them are supervised learning methods. Under this method, a large number of negative samples should be always collected. It is very difficult to collect these negative samples in actual industrial production. Therefore, this article proposes a defect detection model based on unsupervised learning. As long as there are enough positive samples to be trained, we use the BEGAN model to modify it and combine another Autoencoder. This model is much easier and faster to be trained than the traditional GAN model, better responding to the footwear industry with more product types.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121376963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hsing-Chung Chen, Cahya Damarjati, Eko Prasetyo, F. Arofiati, Dianita Sugiyo
Online shopping interoperability is focused a long-time ago in data exchange between the shop and the logistics companies. For the payment system, it also communicates well with the banking system. However, revocation transaction issue is still difficult to be handled while enabling interoperability because it involves fairness of related parties and difficulty in maintaining the transaction process till the end. In this paper, we present how blockchain technology might help solving the problem through four aspects: (1) digital access rules, (2) data immutability, (3) package tracking and update, and (4) easy payment management. We then propose payment distribution formulas to address the revocation issue.
{"title":"Blockchain Technology Benefit in Tackling Online Shopping Transaction Revocation Issue","authors":"Hsing-Chung Chen, Cahya Damarjati, Eko Prasetyo, F. Arofiati, Dianita Sugiyo","doi":"10.1145/3404709.3404757","DOIUrl":"https://doi.org/10.1145/3404709.3404757","url":null,"abstract":"Online shopping interoperability is focused a long-time ago in data exchange between the shop and the logistics companies. For the payment system, it also communicates well with the banking system. However, revocation transaction issue is still difficult to be handled while enabling interoperability because it involves fairness of related parties and difficulty in maintaining the transaction process till the end. In this paper, we present how blockchain technology might help solving the problem through four aspects: (1) digital access rules, (2) data immutability, (3) package tracking and update, and (4) easy payment management. We then propose payment distribution formulas to address the revocation issue.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ontology is widely used in the areas of knowledge engineering, web-based data mining, and others. The process of developing and evolving inter-organizational domain ontologies is easy to get much redundant information. PowerSets can be used to reduce the attributes of ontologies. In this paper, "Rule Finding Uniqueness," RFU is proposed for learning a set of rules in order to refine an ontology. The algorithm's primary goal is to generate unique rules that not only cover the initial set but also enhance reasoning. The claimed technique compresses Ontologies after it is already built or during the evolving process of the inter-organizational cooperative domain ontology. The proposed method can also be used to strengthen automatic and semi-automatic operations to develop and evolve ontologies. We can consider this approach as a maintenance operation that could be done periodically based on the ontology evolution frequency rate.
{"title":"Cooperative Domain Ontology Reduction Based on Power Sets","authors":"W. Mohsen, M. Aref, Khaled ElBahnasy","doi":"10.1145/3404709.3404771","DOIUrl":"https://doi.org/10.1145/3404709.3404771","url":null,"abstract":"Ontology is widely used in the areas of knowledge engineering, web-based data mining, and others. The process of developing and evolving inter-organizational domain ontologies is easy to get much redundant information. PowerSets can be used to reduce the attributes of ontologies. In this paper, \"Rule Finding Uniqueness,\" RFU is proposed for learning a set of rules in order to refine an ontology. The algorithm's primary goal is to generate unique rules that not only cover the initial set but also enhance reasoning. The claimed technique compresses Ontologies after it is already built or during the evolving process of the inter-organizational cooperative domain ontology. The proposed method can also be used to strengthen automatic and semi-automatic operations to develop and evolve ontologies. We can consider this approach as a maintenance operation that could be done periodically based on the ontology evolution frequency rate.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130570401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, the issue of person re-identification has become more and more popular, which is an important research subject in the field of computer vision, and many models or methods for different predicaments have been proposed successively. However, there are often differences between theory and practice. As a matter of fact, while collecting a large number of pedestrian images, retrieval efficiency becomes one of the significant evaluation indicators. Therefore, how to maintain high precision and quickly respond to retrieval requirements is a very important issue. This thesis explores many proposed person re-identification methods and improves retrieval time under the premise of maintaining a high precision rate. In this paper, we select Resnet50 as the feature output model, and use not only K-means Clustering to filter out the preliminary candidates but also Hierarchical Comparison to reduce the number of feature comparisons. The final experimental result shows the average retrieval time is improved dramatically with a speed-up ratio closed to 8, whereas the precision loss is under 3%.
{"title":"Improving Retrieval Efficiency of Person Re-Identification Based on Resnet50","authors":"Jun Yang Chang, Jen Chun Chang","doi":"10.1145/3404709.3404773","DOIUrl":"https://doi.org/10.1145/3404709.3404773","url":null,"abstract":"In recent years, the issue of person re-identification has become more and more popular, which is an important research subject in the field of computer vision, and many models or methods for different predicaments have been proposed successively. However, there are often differences between theory and practice. As a matter of fact, while collecting a large number of pedestrian images, retrieval efficiency becomes one of the significant evaluation indicators. Therefore, how to maintain high precision and quickly respond to retrieval requirements is a very important issue. This thesis explores many proposed person re-identification methods and improves retrieval time under the premise of maintaining a high precision rate. In this paper, we select Resnet50 as the feature output model, and use not only K-means Clustering to filter out the preliminary candidates but also Hierarchical Comparison to reduce the number of feature comparisons. The final experimental result shows the average retrieval time is improved dramatically with a speed-up ratio closed to 8, whereas the precision loss is under 3%.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130610157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Health is one of the most important aspects of human life. Hospital support in health maintenance in several areas. There is a public and private hospital in Indonesia to fulfill the health services for society. XYZ hospital is one of the government hospitals that operated in Bandung District. Currently, XYZ hospital still has no good information systems in performing hospital business processes. There is no integrated system that supports the hospital in data exchange within another business function. In caused by a lack of information systems, XYZ hospitals not effective enough in monitoring hospital daily activity and manage the hospital activity. This research focused on designing ERP systems in XYZ hospital financial management using Odoo software with a financial accounting module and used the Quickstart method. The result of this research is the model design of ERP systems regarding financial management that integrated with another module. The systems can support the financial department to manage financial activity automatically and integrated with another module to pursuing XYZ hospital as a smart hospital.
{"title":"Automation Financial Processing in Account Receivable for Integrated Hospital System using ERP and Quickstart Approach","authors":"F. Nasution, Warih Puspitasari, M. Saputra","doi":"10.1145/3404709.3404759","DOIUrl":"https://doi.org/10.1145/3404709.3404759","url":null,"abstract":"Health is one of the most important aspects of human life. Hospital support in health maintenance in several areas. There is a public and private hospital in Indonesia to fulfill the health services for society. XYZ hospital is one of the government hospitals that operated in Bandung District. Currently, XYZ hospital still has no good information systems in performing hospital business processes. There is no integrated system that supports the hospital in data exchange within another business function. In caused by a lack of information systems, XYZ hospitals not effective enough in monitoring hospital daily activity and manage the hospital activity. This research focused on designing ERP systems in XYZ hospital financial management using Odoo software with a financial accounting module and used the Quickstart method. The result of this research is the model design of ERP systems regarding financial management that integrated with another module. The systems can support the financial department to manage financial activity automatically and integrated with another module to pursuing XYZ hospital as a smart hospital.","PeriodicalId":149643,"journal":{"name":"Proceedings of the 6th International Conference on Frontiers of Educational Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116701562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}