Pub Date : 2018-07-01DOI: 10.1109/JCSSE.2018.8457353
Nat Sararit, P. Haddawy, S. Suebnukarn
This paper describes the development and evaluation of a low-cost, portable VR system for training of emergency management decision making in dental surgery. We designed and developed a smart phone based virtual reality system with simulated dental surgery related emergencies during a virtual root canal treatment that records user actions and response time.The evaluation was conducted with 20 dentistry students of the 4th year and 5th year of Thammasat University. Each group went through three sessions of an interactive VR root canal treatment in which the students were tasked with completing the procedure and managing various emergency situations. We measured skin conductance to determine the stress response and during each session. The response time to emergency between two groups from all sessions was analyzed to determine knowledge gain and retention using the system.
{"title":"Effectiveness of a low-cost VR simulator for emergency management training in dental surgery","authors":"Nat Sararit, P. Haddawy, S. Suebnukarn","doi":"10.1109/JCSSE.2018.8457353","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457353","url":null,"abstract":"This paper describes the development and evaluation of a low-cost, portable VR system for training of emergency management decision making in dental surgery. We designed and developed a smart phone based virtual reality system with simulated dental surgery related emergencies during a virtual root canal treatment that records user actions and response time.The evaluation was conducted with 20 dentistry students of the 4th year and 5th year of Thammasat University. Each group went through three sessions of an interactive VR root canal treatment in which the students were tasked with completing the procedure and managing various emergency situations. We measured skin conductance to determine the stress response and during each session. The response time to emergency between two groups from all sessions was analyzed to determine knowledge gain and retention using the system.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/JCSSE.2018.8457360
Nilubon Kurubanjerdjit
The major goals of the ICGdb are 1) to provide a one site of current genomic cancer information gathering from various resources for the future studies on the discovering of cancer biomarker and efficient drugs and 2) to collect findings from our current and future research works. There are two main contributions in this study, firstly, the ICGdb was constructed by integrating essential pieces of genomic data of more than 30 tumors or diseases including genomic and epigenomics information. The input datasets for our current and future research works will be extracted from this database. Secondly, protein complexes as biomarker of the six tumor types were identified by network clustering approach and the target drugs were also investigated.
{"title":"ICGdb: An Integrative Cancer Genomic Database","authors":"Nilubon Kurubanjerdjit","doi":"10.1109/JCSSE.2018.8457360","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457360","url":null,"abstract":"The major goals of the ICGdb are 1) to provide a one site of current genomic cancer information gathering from various resources for the future studies on the discovering of cancer biomarker and efficient drugs and 2) to collect findings from our current and future research works. There are two main contributions in this study, firstly, the ICGdb was constructed by integrating essential pieces of genomic data of more than 30 tumors or diseases including genomic and epigenomics information. The input datasets for our current and future research works will be extracted from this database. Secondly, protein complexes as biomarker of the six tumor types were identified by network clustering approach and the target drugs were also investigated.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/JCSSE.2018.8457337
Mohammad Rezaei, M. Salahshoor
This paper studies the possibilities of hiding data within a JPEG file without making any changes to the image content, and in a way that any JPEG decoder normally opens the file. These possibilities are found by careful studying the JPEG file format. A steganalysis system needs to check these simple embedding techniques before complicated analyses of DCT coefficients. We also present a number of system attacks on JPEG files, which can lead to detection of hidden data. The attacks are based on the fingerprints left in the stego file by JPEG encoders, or the steganography algorithm itself.
{"title":"Content-independent steganography and steganalysis of JPEG images","authors":"Mohammad Rezaei, M. Salahshoor","doi":"10.1109/JCSSE.2018.8457337","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457337","url":null,"abstract":"This paper studies the possibilities of hiding data within a JPEG file without making any changes to the image content, and in a way that any JPEG decoder normally opens the file. These possibilities are found by careful studying the JPEG file format. A steganalysis system needs to check these simple embedding techniques before complicated analyses of DCT coefficients. We also present a number of system attacks on JPEG files, which can lead to detection of hidden data. The attacks are based on the fingerprints left in the stego file by JPEG encoders, or the steganography algorithm itself.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127786461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/JCSSE.2018.8457345
H. Imani, Mohammad Rezaei
The changes made by steganography to an image can be considered as noise addition. A fundamental question is how well targeted steganalytic methods distinguish between the stego signal and naturally occurring noise in images. Moreover, several researchers have proposed steganographic methods that hide the message data in the complex regions of images. They argue that those regions are more secure for data hiding. However, no systematic experiments, to the best of our knowledge, have been presented to confirm the claims. This paper provides an experimental study to answer the questions about the impact of noise and complexity on the performance of targeted steganalytic methods. Three well-known targeted steganalytic methods are tested when spatial domain steganography is considered. Three types of noise at different levels are added to images, and two groups of complex and non-complex images are considered. Our experiments show a significant decrease in the detection accuracy of all the selected steganalytic methods for complex images. The methods demonstrate different responses to different noise types. Their performance degrades the most by Gaussian, and the least by salt & pepper noise.
{"title":"Impact of Noise and Complexity on Targeted Image Steganalysis","authors":"H. Imani, Mohammad Rezaei","doi":"10.1109/JCSSE.2018.8457345","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457345","url":null,"abstract":"The changes made by steganography to an image can be considered as noise addition. A fundamental question is how well targeted steganalytic methods distinguish between the stego signal and naturally occurring noise in images. Moreover, several researchers have proposed steganographic methods that hide the message data in the complex regions of images. They argue that those regions are more secure for data hiding. However, no systematic experiments, to the best of our knowledge, have been presented to confirm the claims. This paper provides an experimental study to answer the questions about the impact of noise and complexity on the performance of targeted steganalytic methods. Three well-known targeted steganalytic methods are tested when spatial domain steganography is considered. Three types of noise at different levels are added to images, and two groups of complex and non-complex images are considered. Our experiments show a significant decrease in the detection accuracy of all the selected steganalytic methods for complex images. The methods demonstrate different responses to different noise types. Their performance degrades the most by Gaussian, and the least by salt & pepper noise.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125173077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is an experiment conducted on deep learning technique, which is currently popular and efficient in the field of image classification. The Convolutional Neural Networks (CNNs) has been achieved in many tasks of image classification and used to classify cloud images for meteorology task. The CNNs can be applied to classify rainmaking cloud images. There are three steps of warm clouds: fattening, attacking, and enhancing. The challenge in this work is the images required for classification are very similar. That means the sampling images are the images of cloud in the same type but difference at the formation stage, while the image shooting format and equipment is not fixed. The images are taken with varying degrees of angle, height, lightness and resolution. From the experimental results, it was found that CNNs had prominent characteristics for learning to extract the necessary attributes used in solving problem along with self-classification, leading to the developed model had higher accurate classification than traditional method around 5–8%.
{"title":"Images Based Classification for Warm Cloud Rainmaking using Convolutional Neural Networks","authors":"Sarawut Arthayakun, Suwatchai Kamonsantiroj, Luepol Pipanmaekaporn","doi":"10.1109/JCSSE.2018.8457398","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457398","url":null,"abstract":"This paper is an experiment conducted on deep learning technique, which is currently popular and efficient in the field of image classification. The Convolutional Neural Networks (CNNs) has been achieved in many tasks of image classification and used to classify cloud images for meteorology task. The CNNs can be applied to classify rainmaking cloud images. There are three steps of warm clouds: fattening, attacking, and enhancing. The challenge in this work is the images required for classification are very similar. That means the sampling images are the images of cloud in the same type but difference at the formation stage, while the image shooting format and equipment is not fixed. The images are taken with varying degrees of angle, height, lightness and resolution. From the experimental results, it was found that CNNs had prominent characteristics for learning to extract the necessary attributes used in solving problem along with self-classification, leading to the developed model had higher accurate classification than traditional method around 5–8%.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131356591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arranging your furniture correctly can be the difference between having a cramped, gloomy, impractical space and a cozy, elegant and functional room. Although everyone wants their place to be functional and stylish, room design demands time and expertise. While there are extensive systems for room and layout design, most of them require users to drag and drop the 3D furniture models into their 3D room, modify the furniture size/color/texture or change the camera viewpoint around to see their newly designed room from different perspectives by means of the mobile phones or tablets screen. These complications diminish the user satisfaction as well as restrict synchronous collaboration among multiple users. In this work, we propose a system for designing a furniture layout based on the augmented reality technology. Given the room floor plan and multiple QR markers, users are able to physically move their furniture (each QR marker corresponds to a 3D furniture model) around the limited space (inside the specific area defined by the room plan) to design their own functional and stylish room layout. Finally, We demonstrate that our system can not only alleviate the difficulties of existing room design systems, but also amplify the users satisfaction of room design application. Moreover, we posit that it will encourage co-design from simultaneous multiple users.
{"title":"AR Development For Room Design","authors":"Peeranut Reuksupasompon, Maytichai Aruncharathorn, Sirion Vittayakorn","doi":"10.1109/JCSSE.2018.8457343","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457343","url":null,"abstract":"Arranging your furniture correctly can be the difference between having a cramped, gloomy, impractical space and a cozy, elegant and functional room. Although everyone wants their place to be functional and stylish, room design demands time and expertise. While there are extensive systems for room and layout design, most of them require users to drag and drop the 3D furniture models into their 3D room, modify the furniture size/color/texture or change the camera viewpoint around to see their newly designed room from different perspectives by means of the mobile phones or tablets screen. These complications diminish the user satisfaction as well as restrict synchronous collaboration among multiple users. In this work, we propose a system for designing a furniture layout based on the augmented reality technology. Given the room floor plan and multiple QR markers, users are able to physically move their furniture (each QR marker corresponds to a 3D furniture model) around the limited space (inside the specific area defined by the room plan) to design their own functional and stylish room layout. Finally, We demonstrate that our system can not only alleviate the difficulties of existing room design systems, but also amplify the users satisfaction of room design application. Moreover, we posit that it will encourage co-design from simultaneous multiple users.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134153149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/JCSSE.2018.8457367
S. Kuramochi, Yu-on Chatchakan, Kousuke Mouri, K. Kaneko
It is impossible to operate a parallel system that contains a large number of elements ignoring the existence of faulty elements. In fault-tolerant routing in a parallel system, the method to make each non-faulty vertex store the compressed fault information (limited global information) is effective. The torus is the most popular topology adopted for interconnection networks of parallel systems. However, because of its complexity, any effective method that utilizes the limited global information has not been proposed. In this paper, we propose a stochastic fault-tolerant routing method in tori, which can tolerate the link and/or vertex faults. We can expect that our result achieves drastic improvement regarding fault-tolerant routing in many parallel systems.
{"title":"Stochastic Link-Fault-Tolerant Routing In A Torus","authors":"S. Kuramochi, Yu-on Chatchakan, Kousuke Mouri, K. Kaneko","doi":"10.1109/JCSSE.2018.8457367","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457367","url":null,"abstract":"It is impossible to operate a parallel system that contains a large number of elements ignoring the existence of faulty elements. In fault-tolerant routing in a parallel system, the method to make each non-faulty vertex store the compressed fault information (limited global information) is effective. The torus is the most popular topology adopted for interconnection networks of parallel systems. However, because of its complexity, any effective method that utilizes the limited global information has not been proposed. In this paper, we propose a stochastic fault-tolerant routing method in tori, which can tolerate the link and/or vertex faults. We can expect that our result achieves drastic improvement regarding fault-tolerant routing in many parallel systems.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134257132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/JCSSE.2018.8457350
Piriya Utamachant, Chutiporn Anutariya
Thailand’s national open data portal (data.go.th) has been launched since 2013, having over 1,000 datasets publicly available andprovided by 107 data providers. However, there exists very limited study about these datasets which is vital to the improvement of Thailand’s Open Government Data (TOGD). Hence, this paper aims to fill this needt Specifically, its objectives are threefold: 1) to evaluate domain coverage of high-value datasets with respect to the global standards, 2) to analyze TOGD datasets with respect to their available data fields and categorization, and 3) to evaluate the datasets’ qualities, and thus provide process and policy guidelines to overcome the quality weaknesses. In our in-depth study, the high-value datasets announced by Electronic Government Agency of Thailand (EGA) were comprehensively and thoroughly analyzed.
泰国的国家开放数据门户网站(data.go.th)自2013年启动以来,有超过1000个公开数据集,由107个数据提供商提供。然而,关于这些数据集的研究非常有限,而这些数据集对于改善泰国的开放政府数据(TOGD)至关重要。因此,本文旨在满足这一需求,具体而言,其目标有三个:1)根据全球标准评估高价值数据集的领域覆盖范围;2)分析TOGD数据集的可用数据字段和分类;3)评估数据集的质量,从而提供克服质量弱点的过程和政策指导。在深入研究中,我们对泰国电子政府机构(Electronic Government Agency of Thailand, EGA)公布的高价值数据集进行了全面深入的分析。
{"title":"An Analysis of High-Value Datasets: A Case Study of Thailand’s Open Government Data","authors":"Piriya Utamachant, Chutiporn Anutariya","doi":"10.1109/JCSSE.2018.8457350","DOIUrl":"https://doi.org/10.1109/JCSSE.2018.8457350","url":null,"abstract":"Thailand’s national open data portal (data.go.th) has been launched since 2013, having over 1,000 datasets publicly available andprovided by 107 data providers. However, there exists very limited study about these datasets which is vital to the improvement of Thailand’s Open Government Data (TOGD). Hence, this paper aims to fill this needt Specifically, its objectives are threefold: 1) to evaluate domain coverage of high-value datasets with respect to the global standards, 2) to analyze TOGD datasets with respect to their available data fields and categorization, and 3) to evaluate the datasets’ qualities, and thus provide process and policy guidelines to overcome the quality weaknesses. In our in-depth study, the high-value datasets announced by Electronic Government Agency of Thailand (EGA) were comprehensively and thoroughly analyzed.","PeriodicalId":338973,"journal":{"name":"2018 15th International Joint Conference on Computer Science and Software Engineering (JCSSE)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}