In today's modern era of technology, more number of people use internet for the purpose of expressing their opinions, thoughts and ideas through social media as well as articles. This leads to increased informal text available for public access. Such text may also be available in different dialectal forms of the specific language and may attract natives of that region. Moreover, literature, local news, articles, etc. written in a particular dialectal form of language is more expressive. For this purpose, dialect conversion systems plays vital role. This paper describes the dialect conversion system for Punjabi language that converts input text to either of three Punjabi dialects namely Majhi, Malwai and Doabi. A rule based approach is adopted for defining the conversion rules and bilingual dictionary is also used for this purpose.
{"title":"Punjabi Dialects Conversion System for Majhi, Malwai and Doabi Dialects","authors":"A. Kaur, Parminder Singh, K. Kaur","doi":"10.1145/3036331.3036339","DOIUrl":"https://doi.org/10.1145/3036331.3036339","url":null,"abstract":"In today's modern era of technology, more number of people use internet for the purpose of expressing their opinions, thoughts and ideas through social media as well as articles. This leads to increased informal text available for public access. Such text may also be available in different dialectal forms of the specific language and may attract natives of that region. Moreover, literature, local news, articles, etc. written in a particular dialectal form of language is more expressive. For this purpose, dialect conversion systems plays vital role. This paper describes the dialect conversion system for Punjabi language that converts input text to either of three Punjabi dialects namely Majhi, Malwai and Doabi. A rule based approach is adopted for defining the conversion rules and bilingual dictionary is also used for this purpose.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"1 1","pages":"125-128"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79326795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes the complete modelling process for simulation, starting with the identification of agents and ending with a clear and unambiguous description of their behaviour that can be easily translated into each process-oriented simulation platform. It focuses on the definition of agents, a subject which is described rarely. Agents usually "are there", emerging from the things one can see. Defining agents however, determines completely the range and content of a simulation and is not a trivial case. After a deliberate definition of the agents, a natural way to describe their behaviour is presented. These behaviour descriptions match the real process interaction approach. The described method is developed for educational reasons in order to teach discrete event simulation in a non-mathematical way, but is rather complete, coherent and well-defined.
{"title":"Model Design for Agent-based Simulation","authors":"H. Veeke, J. Ottjes, Lodewijks Lodewijks","doi":"10.1145/3036331.3036335","DOIUrl":"https://doi.org/10.1145/3036331.3036335","url":null,"abstract":"This paper describes the complete modelling process for simulation, starting with the identification of agents and ending with a clear and unambiguous description of their behaviour that can be easily translated into each process-oriented simulation platform. It focuses on the definition of agents, a subject which is described rarely. Agents usually \"are there\", emerging from the things one can see. Defining agents however, determines completely the range and content of a simulation and is not a trivial case. After a deliberate definition of the agents, a natural way to describe their behaviour is presented. These behaviour descriptions match the real process interaction approach. The described method is developed for educational reasons in order to teach discrete event simulation in a non-mathematical way, but is rather complete, coherent and well-defined.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"22 1","pages":"42-46"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89442059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NS-2, as an open-source network simulator, is widely used in wireless communication studies and VANET safety applications. In [1], Chen et al. implemented a completely modified architecture about IEEE 802.11 MAC and physical layer modules which depicted the signal transmission and reception process in IEEE 802.11, as well as the method of handling collision. However, in the process of using the latest version of NS2, we found some problems. First, its approach of deciding whether to receive the signal by comparing the SINR and threshold is not flexible in actual simulation. Second, the capture thresholds for collision do not work well. Third, as for the RXThreshold_ property, class WirelessPhyExt doesn't achieve relevant functions. In this paper, we put forward a viable scheme to solve these problems by deeply understanding the signal reception process based on SINR.
{"title":"NS-2 Simulation of VANET for Safety Applications: Issues and Solutions","authors":"Jingyu Li, Yunan Zhang, Jing Zhao, Yanbin Wang, Xiaomin Ma, Wei Wu","doi":"10.1145/3036331.3036349","DOIUrl":"https://doi.org/10.1145/3036331.3036349","url":null,"abstract":"NS-2, as an open-source network simulator, is widely used in wireless communication studies and VANET safety applications. In [1], Chen et al. implemented a completely modified architecture about IEEE 802.11 MAC and physical layer modules which depicted the signal transmission and reception process in IEEE 802.11, as well as the method of handling collision. However, in the process of using the latest version of NS2, we found some problems. First, its approach of deciding whether to receive the signal by comparing the SINR and threshold is not flexible in actual simulation. Second, the capture thresholds for collision do not work well. Third, as for the RXThreshold_ property, class WirelessPhyExt doesn't achieve relevant functions. In this paper, we put forward a viable scheme to solve these problems by deeply understanding the signal reception process based on SINR.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"29 1","pages":"67-72"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89429840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, several solutions have been designed to detect and identify the wandering patterns for Person with Dementia (PwD). Thus, many applications have been developed which collects Spatio-temporal and contextual information from the environment. These data have not been fully utilized to its potential. The data were mainly used for the simple pattern recognition. The long-time benefit which can arise by properly managing, storing and analyzing these data has not been realized. We propose a framework for wandering data management and analytics tool which can be beneficial to the patients, caregivers as well as researchers. In this paper, we first present a novel system architecture and then discuss its key components with the integration into the system. We use web API standard for the implementation of the services. Security also forms an integral part of our design in dealing with sensitive medical data. We also demonstrate the feasibility of the system with sample analytics such as "trend in the wandering pattern" which has been done on the real-world dataset. We have done the analysis on the daytime movement data of a patient residing in Assisted Living Facility (ALF).
{"title":"A Framework of Real-time Wandering Management for Person with Dementia","authors":"Ashish Kumar, M. Ma, C. Lau, Syin Chan","doi":"10.1145/3036331.3050424","DOIUrl":"https://doi.org/10.1145/3036331.3050424","url":null,"abstract":"Recently, several solutions have been designed to detect and identify the wandering patterns for Person with Dementia (PwD). Thus, many applications have been developed which collects Spatio-temporal and contextual information from the environment. These data have not been fully utilized to its potential. The data were mainly used for the simple pattern recognition. The long-time benefit which can arise by properly managing, storing and analyzing these data has not been realized. We propose a framework for wandering data management and analytics tool which can be beneficial to the patients, caregivers as well as researchers. In this paper, we first present a novel system architecture and then discuss its key components with the integration into the system. We use web API standard for the implementation of the services. Security also forms an integral part of our design in dealing with sensitive medical data. We also demonstrate the feasibility of the system with sample analytics such as \"trend in the wandering pattern\" which has been done on the real-world dataset. We have done the analysis on the daytime movement data of a patient residing in Assisted Living Facility (ALF).","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"181 1","pages":"146-150"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86517764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ali Marstawi, N. Sharef, T. N. M. Aris, A. Mustapha
Current approaches in aspect-based sentiment analysis ignore or neutralize unhandled issues emerging from the lexicon-based scoring (i.e., SentiWordNet), whereby lexical sentiment analysis only classifies text based on affect word presence and word count are limited to these surface features. This is coupled with considerably low detection rate among implicit concepts in the text. To address this issues, this paper proposed the use of ontology to i) enhance aspect extraction process by identifying features pertaining to implicit entities, and ii) eliminate lexicon-based sentiment scoring issues which, in turn, improve sentiment analysis and summarization accuracy. Concept-level sentiment analysis aims to go beyond word-level analysis by employing ontologies which act as a semantic knowledge base rather than the lexicon. The outcome is an Ontology-Based Product Sentiment Summarization (OBPSS) framework which outperformed other existing summarization systems in terms of aspect extraction and sentiment scoring. The improved performance is supported by the sentence-level linguistic rules applied by OBPSS in providing a more accurate sentiment analysis.
{"title":"Ontology-based Aspect Extraction for an Improved Sentiment Analysis in Summarization of Product Reviews","authors":"Ali Marstawi, N. Sharef, T. N. M. Aris, A. Mustapha","doi":"10.1145/3036331.3036362","DOIUrl":"https://doi.org/10.1145/3036331.3036362","url":null,"abstract":"Current approaches in aspect-based sentiment analysis ignore or neutralize unhandled issues emerging from the lexicon-based scoring (i.e., SentiWordNet), whereby lexical sentiment analysis only classifies text based on affect word presence and word count are limited to these surface features. This is coupled with considerably low detection rate among implicit concepts in the text. To address this issues, this paper proposed the use of ontology to i) enhance aspect extraction process by identifying features pertaining to implicit entities, and ii) eliminate lexicon-based sentiment scoring issues which, in turn, improve sentiment analysis and summarization accuracy. Concept-level sentiment analysis aims to go beyond word-level analysis by employing ontologies which act as a semantic knowledge base rather than the lexicon. The outcome is an Ontology-Based Product Sentiment Summarization (OBPSS) framework which outperformed other existing summarization systems in terms of aspect extraction and sentiment scoring. The improved performance is supported by the sentence-level linguistic rules applied by OBPSS in providing a more accurate sentiment analysis.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"58 1","pages":"100-104"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87644083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhuo Shi, Y. An, Songhua Xu, Zhongshuai Wang, K. Yu, Xiaonan Luo
In this paper, a mesh simplification method based on a reverse interpolation loop subdivision is proposed. Combined with the treatment of extraordinary vertex in the improved butterfly subdivision, the loop subdivision mask is expanded, thereby improving the traditional loop subdivision algorithm into interpolation subdivision. The reverse operation of the interpolation loop subdivision is used to simplify the complex 3D mesh; a progressive mesh is generated by an initial mesh and a series of vertex offsets. The algorithm reduces the regular point relative reverse butterfly subdivision of compensation operation and greatly reduces simplification and reconstruction. Likewise, the reverse butterfly subdivision algorithm reduces the regular point compensation operation and greatly reduces simplification and reconstruction compared with the existing reverse loop subdivision by considering more control vertices. Furthermore, the edge point with respect to the center point is compensated by sacrificing a small amount of time to calculate the smaller vertex offset, this method gives high transmission speed and low offset. In addition, in future, it can be applied to the large-scale point cloud model simplification and other fields.
{"title":"Mesh Simplification Method Based on Reverse Interpolation Loop Subdivision","authors":"Zhuo Shi, Y. An, Songhua Xu, Zhongshuai Wang, K. Yu, Xiaonan Luo","doi":"10.1145/3036331.3036356","DOIUrl":"https://doi.org/10.1145/3036331.3036356","url":null,"abstract":"In this paper, a mesh simplification method based on a reverse interpolation loop subdivision is proposed. Combined with the treatment of extraordinary vertex in the improved butterfly subdivision, the loop subdivision mask is expanded, thereby improving the traditional loop subdivision algorithm into interpolation subdivision. The reverse operation of the interpolation loop subdivision is used to simplify the complex 3D mesh; a progressive mesh is generated by an initial mesh and a series of vertex offsets. The algorithm reduces the regular point relative reverse butterfly subdivision of compensation operation and greatly reduces simplification and reconstruction. Likewise, the reverse butterfly subdivision algorithm reduces the regular point compensation operation and greatly reduces simplification and reconstruction compared with the existing reverse loop subdivision by considering more control vertices. Furthermore, the edge point with respect to the center point is compensated by sacrificing a small amount of time to calculate the smaller vertex offset, this method gives high transmission speed and low offset. In addition, in future, it can be applied to the large-scale point cloud model simplification and other fields.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"24 1","pages":"141-145"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74059990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we introduce a backward simulation of machine code program and report results of reduction methods of its processing time. It may be efficient to analyze a program by tracing back from the final result for detecting all the bugs caused by some codes in the program. We describe the backward simulator of Java bytecode program and methods of processing time reduction such as range division, stepwise resolution improvement, setting of search path, and exponential range division. Results of two short programs and effects of reduction methods are shown.
{"title":"Backward range simulation of Java bytecodes and reduction of its processing time","authors":"Y. Hiranaka, Tetsuya Inafune, S. Miura, T. Taketa","doi":"10.1145/3036331.3036340","DOIUrl":"https://doi.org/10.1145/3036331.3036340","url":null,"abstract":"In this paper we introduce a backward simulation of machine code program and report results of reduction methods of its processing time. It may be efficient to analyze a program by tracing back from the final result for detecting all the bugs caused by some codes in the program. We describe the backward simulator of Java bytecode program and methods of processing time reduction such as range division, stepwise resolution improvement, setting of search path, and exponential range division. Results of two short programs and effects of reduction methods are shown.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"13 1","pages":"129-133"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79184571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents integer linear programming formulations of four variants of the participant selection problem (PSP) that we may encounter in likely disaster scenarios. An evaluation study was carried out to get data on the relative performance of popular optimization solvers and a greedy heuristic algorithm when used to solve the PSP. The paper presents the parameters used by the study to characterize PSP problem instances and figures of merits used for comparing the performances of evaluated methods, as well as performance data obtained from the study.
{"title":"Participant Selection Problem: Relative Performance of Five Optimization Solvers","authors":"C. Y. Lin, J. W. Liu, K. Yeh, E. Chu","doi":"10.1145/3036331.3036334","DOIUrl":"https://doi.org/10.1145/3036331.3036334","url":null,"abstract":"This paper presents integer linear programming formulations of four variants of the participant selection problem (PSP) that we may encounter in likely disaster scenarios. An evaluation study was carried out to get data on the relative performance of popular optimization solvers and a greedy heuristic algorithm when used to solve the PSP. The paper presents the parameters used by the study to characterize PSP problem instances and figures of merits used for comparing the performances of evaluated methods, as well as performance data obtained from the study.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"12 1","pages":"24-31"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73248292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Security in wireless computer networks is of great importance because wireless networks are always thought to be as more vulnerable to various types of attacks than ordinary wired networks. This vulnerability is due to the nature of wireless networks that rely on using a wireless shared medium. Video is becoming a more popular type of data being transported in contemporary networks, especially with the advent of many emergent Internet and Mobile applications. To achieve user satisfaction, the transmission of video must comply with a number of quality of service (QoS) requirements. However, network attacks affect in some way or another these requirements. In this paper, we study the benefits of a selected solution to the denial of service (DOS)attackto provide betterQoS of video, which leads to improved performance of various wireless networks.
{"title":"Mitigation of DOS Attacks on Video Trafficin Wireless Networks for better QoS","authors":"Ekbal M. Al-Hurani, Hussein R. Al-Zoubi","doi":"10.1145/3036331.3050416","DOIUrl":"https://doi.org/10.1145/3036331.3050416","url":null,"abstract":"Security in wireless computer networks is of great importance because wireless networks are always thought to be as more vulnerable to various types of attacks than ordinary wired networks. This vulnerability is due to the nature of wireless networks that rely on using a wireless shared medium. Video is becoming a more popular type of data being transported in contemporary networks, especially with the advent of many emergent Internet and Mobile applications. To achieve user satisfaction, the transmission of video must comply with a number of quality of service (QoS) requirements. However, network attacks affect in some way or another these requirements. In this paper, we study the benefits of a selected solution to the denial of service (DOS)attackto provide betterQoS of video, which leads to improved performance of various wireless networks.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"4 1","pages":"166-169"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86215148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper aims to explore an analytical methodology to identify, quantify, and assess the interdependencies across Defence capability development projects, products and programs. To represent the service complexities of project/product interdependencies, a graph theory method is applied. With a network analysis approach, the relative importance and criticality of each project/product are computed according to the graph structure using several models, including a modified Page Ranking algorithm, a node weight balance model, and a degree based algorithm. The preliminary results have shown that the proposed modelling method has the potential to provide a structure and methodology for quantitatively evaluating Defence program interdependencies. The use of the analysis and supporting visualisation tools will enhance the awareness of program interdependencies and provide a decision-aid for identifying program/project/product development priorities, gaps, risks and issues in the interdependency context.
{"title":"Interdependency Analysis for the SUDEMIL Framework","authors":"J. Jagiello, Yue-Jin Wang, Richard Taylor","doi":"10.1145/3036331.3036337","DOIUrl":"https://doi.org/10.1145/3036331.3036337","url":null,"abstract":"This paper aims to explore an analytical methodology to identify, quantify, and assess the interdependencies across Defence capability development projects, products and programs. To represent the service complexities of project/product interdependencies, a graph theory method is applied. With a network analysis approach, the relative importance and criticality of each project/product are computed according to the graph structure using several models, including a modified Page Ranking algorithm, a node weight balance model, and a degree based algorithm. The preliminary results have shown that the proposed modelling method has the potential to provide a structure and methodology for quantitatively evaluating Defence program interdependencies. The use of the analysis and supporting visualisation tools will enhance the awareness of program interdependencies and provide a decision-aid for identifying program/project/product development priorities, gaps, risks and issues in the interdependency context.","PeriodicalId":22356,"journal":{"name":"Tenth International Conference on Computer Modeling and Simulation (uksim 2008)","volume":"24 1","pages":"32-37"},"PeriodicalIF":0.0,"publicationDate":"2017-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86709327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}